Online Signature Verification: a Robust Approach for Persian Signatures
Journal Title: Journal of Information Systems and Telecommunication - Year 2015, Vol 3, Issue 2
Abstract
In this paper, the specific trait of Persian signatures is applied to signature verification. Efficient features, which can discriminate among Persian signatures, are investigated in this approach. Persian signatures, in comparison with other languages signatures, have more curvature and end in a specific style. Usually, Persian signatures have special characteristics, in terms of speed, acceleration and pen pressure, during drawing curves. An experiment has been designed to determine the function indicating the most robust features of Persian signatures. Results obtained from this experiment are then used in feature extraction stage. To improve the performance of verification, a combination of shape based and dynamic extracted features is applied to Persian signature verification. To classify these signatures, Support Vector Machine (SVM) is applied. The proposed method is examined on two common Persian datasets, the new proposed Persian dataset in this paper (Noshirvani Dynamic Signature Dataset) and an international dataset (SVC2004). For three Persian datasets EER value are equal to 3, 3.93, 4.79, while for SVC2004 the EER value is 4.43.
Authors and Affiliations
Mohammad Esmaeel Yahyatabar, Yasser Baleghi, Mohammad Reza Karami
A New Architecture for Intrusion-Tolerant Web Services Based on Design Diversity Techniques
Web services are the realization of service-oriented architecture (SOA). Security is an important challenge of SOAP-based Web services. So far, several security techniques and standards based on traditional security mech...
Representing a Model to Measure Absorbency Of Information Technology in Small And Medium Sized Enterprises
With rapid development of information technology (IT) and further deepening of informationization construction, more and more enterprises have realized the strategic value of IT and made great investments in it. However,...
Cover Selection Steganography Via Run Length Matrix and Human Visual System
A novel approach for steganography cover selection is proposed, based on image texture features and human visual system. Our proposed algorithm employs run length matrix to select a set of appropriate images from an imag...
GoF-Based Spectrum Sensing of OFDM Signals over Fading Channels
Goodness-of-Fit (GoF) based spectrum sensing of orthogonal frequency-division multiplexing (OFDM) signals is investigated in this paper. To this end, some novel local sensing methods based on Shapiro-Wilk (SW), Shapiro-F...
Trust evaluation in unsupervised network: A fuzzy logic approach
Because of the possibility of anonymity and impersonation in social networks, trust plays an important role in these networks. Pear to pear networks, by eliminating the supervisor roles, besides its benefit in decreasing...