OFF - LINE SIGNATURE RECOG NITION USING MODIFIE D NEURAL NETWORKS APPROACH
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 4, Issue 7
Abstract
Biometrics, which refers to identifying an individual based on his or her physiological or behavioral characteristics, has the capability to reliably distinguish between an authorized person and an imposter. Signature verification systems can be categorize d as offline (static) and online (dynamic). This paper presents neural network based recognition of offline signatures system that is trained with low - resolution scanned signature images. The signature of a person is an important biometric attribute of a h uman being which can be used to authenticate human identity. However human signatures can be handled as an image and recognized using computer vision and neural network techniques. With modern computers, there is need to develop fast algorithms for signatu re recognition. There are various approaches to signature recognition with a lot of scope of research. In this paper, off - line signature recognition & verification using neural network is proposed, where the signature is captured and presented to the user in an image format. Signatures are verified based on parameters extracted from the signature using various image processing techniques. The Off - line Signature Recognition and Verification is implemented using Matlab. This work has been tested and found sui table for its purpose. For the implementation of this proposed work we use the Matlab software
Authors and Affiliations
Navpreet Singh*,
A Comparative Study of Sorting Algorithm Based on Their Time Complexity The quest to develop the most memory efficient and the fastest sorting algorithm has become one of the crucial mathematical challenges of the last half century, resulting in many tried and tested algorithm available to the individual, who needs to sort the list of data. Today, the amount of data is very large, we requ
A REVIEW ON SECURE DATA TRANSMISSION USING CRYPTOGRAPHIC TECHNIQUES
The ability to protect and secure information is vital to the growth of electronic commerce and to the growth of the Internet itself. Many people need or want to use communications and data security in different ar...
A Novel Method of Shoe Print Recognition Based On KLT
Shoe print recognition is an important research field of pattern recognition. It’s a typical multi recognition problem. For a long time, it caused researchers concern from pattern recognition greatly, computer vision,...
Trust Aware Routing Framework
The multi-hop routing in wireless sensor networks (WSNs) offers little protection against identity deception through replaying routing information. An adversary can exploit this defect to launch various harmful or...
IDENTICAL PARALLEL BATCH PROCESSING MACHINES BASED ON ACO MULTI-OBJECTIVE SCHEDULING
In this paper, the Batch Processing Machine (BPMs) and its scheduling problem in a semiconductor wafer fabrication facility (fab) has been focused ,where in there are many BPMs, such as diffusion machines, oxidati...