Offline Handwritten Signature Verification Approaches: A Review
|
|
- Brandon Jessie Gilmore
- 5 years ago
- Views:
Transcription
1 Offline Handwritten Signature Verification Approaches: A Review 1 Sanjay S. Gharde, 2 K. P. Adhiya, 3 Harsha G. Chavan 1,2,3 Dept. of Com. Engg., SSBT s College of Engg. and Tech., Bambhori, Jalgaon, Maharashtra, India Abstract A growing need for personal verification in many daily applications, signature verification is being considered with renewed interest. Handwritten signature is first few biometrics used even before computers. Signature verification is widely discussed using two approaches. On-line approach and offline approach. Offline systems are extra applicable and easy to use in comparison with on-line systems in many parts of the world though it is considered more difficult than on-line verification due to the lack of dynamic information. Offline signature verification system has more attraction because of its necessity for use in daily life routines. This paper presents survey of signature forgery type, features types, methods used for features extraction and approaches used for verification in signature verification systems. Forgeries in signature verification systems are classified in three types: Unskilled Forgeries are signatures in which forger signs without any information about name and signature shape. Random Forgeries are signatures in which forger knows just the name of the signatory without any prior examples. Skilled Forgeries are signatures in which forger knows the signatory name and the form of the original signature. II. Methodology The state of the art in signature verification follows a pattern that is like image processing as shown in fig. 1. Keywords Offline Signature Verification System, Features Extraction I. Introduction Nowadays, human identifications are necessary these days for our routine activities such as entering any secure locations besides the many other applications. To that end, higher security levels need with easier user interaction which can be achieved using biometric verification. Biometric verification helps us identify people based on their extracted physical or behavioral features. These features should have certain properties such as uniqueness, permanence, acceptability, collectability, and the cost to employ any biometric. Commonly, there are two common biometric feature types: 1. Physical Features are including face, fingerprint, iris, ear, palm print, retina, hand, finger geometry and DNA. Most of these features are relatively stable over time. 2. Behavioral Features are including features that measure the action of the person such as speaking and writing. These features change over time due to aging and other developmental factors. Signature verification is the task of validating a person based on his handwritten signature. There are two types of signature verification systems in the literature: On-line Signature Verification System is when a signature is written onto an interactive electronic device such as a tablet and is read online, and compared to the signatures on file of the person to check for truthfulness. Many vital features are utilized with online signatures that are not available for the offline ones. Offline Signature Verification System is when a signature is written offline such as bank checks and the system read the image scan then authenticates it with the signatures on file for the customer. Handwritten signatures have been used as a biometric feature that recognizes individuals. It has been recognized that handwritten signatures are a very good biometric feature with a low conflict percentage. Some signatures might be similar but there are various scientific mechanisms to differentiate between them and for detection of forged signatures. Fig. 1: Signature Verification System The input signatures are preprocessed, and then the personal features are extracted and stored into the knowledge base. In the classification phase, personal features removed from an inputted signature are compared with template signature stored in the knowledge base, to check the validity of the test signature. Fig. 2: Work Flow for Signature Verification System A. Data Acquisition and Pre Processing A preprocessing stage is done to recover the signature image after scanning it using a scanner device. Signature preprocessing is a essential step to improve the accuracy, and to reduce their computational time. It consists of the following steps: International Journal of Computer Science And Technology 265
2 A noise filter (like median filter) is applied to eliminate the noise caused by the scanner. Then the image is cropped, to the bounding rectangle of the signature. Transformation from color to grayscale, and then finally to black and white. Thinning the black and white image results always into the huge information loss. B. Segmentation In this segmentation stage, an image of signature is decomposed into sub-images. Segmentation refers to a process of partitioning an image into groups of pixels which are similar with respect to some criterion, which consists of Signature Extraction through extracting the smallest box that contains the signature data, the signature s height and width are determined, and then the signature image is cropped. Image segmentation can be broadly classified in two types, Local Segmentation deals with the segmenting sub images which are small windows on whole image. Global Segmentation deals with the images consisting of relatively large number of pixels and makes estimated parameter values for global segments are more robust. C. Feature Extraction It is the process of removing the characteristics or attributes from an image. The accuracy of verification in pattern systems depends mainly on the removed features. Classification of the signature verification systems in terms of extracted features can be done into two kinds. 1. Global Features Global features describes the signature image as a whole like length, width, density, edge points of the signature, and wavelet transforms. These features are less sensitive to noise and signature variations. So it will not give us a high accuracy for skilled forgeries, but it would be suitable for random forgeries and it is better to be combined with other types of features. 2. Local Features Which describe a small area of signature image and extract information in more details from it, it is more accurate than the global one but the computational time is high, it can be divided into two groups: statistical as well as geometrical features. Statistical Features are taken from the pixel distribution of the signature image. Geometrical Features describes the geometrical characteristics of the signature image; Geometrical features have the ability to tolerate with distortion, style variations, rotation variations and certain degree of translation. III. Signature Verification Approaches A. Template Matching Approach It is a process of pattern comparison so it is called template matching. A test signature is matched with templates of genuine signatures stored in a knowledge base; the most common approaches use Dynamic Time Wrapping (DTW) for signature matching. A.Piyush and Rajagopalan [5], proposed an offline signature verification system based on DTW and they applied their modified DTW algorithms. The modification was the addition of a steadiness factor. Better results were gained than using the basic DTW algorithm. Almudena [6], established an offline signature 266 In t e r n a t i o n a l Jo u r n a l o f Co m p u t e r Sc i e n c e An d Te c h n o l o g y verification system based on contour features. The features were mined from the directional contour of the signature and the length of regions enclosed between letters. For feature matching stage, each signature (set of features) was represented by probability density function and Hamming distance was used for similarity measure. MCYT database, which consists of 75 subjects, were used. The total signatures which were used are B. Neural Networks Approach This approach is widely used in signature verification systems, power, ease of use, capabilities in learning and generalizing are the main reasons to use this approach. When using this approach we have to structure the Neural Network (NN) by removing features from signers samples and learning the relationship between the signature and its class. Thus the signature verification process parallels this learning mechanism. There are many ways to structure the NN training, but a very simple approach is to firstly extract the feature set representing the signature (details like length, height, duration, etc.), with several samples from different signers. The second step for the NN is to learn the relationship between a signature and its class (either genuine or forgery ). Once this relationship has been learned, the network can be presented with test signatures that can be categorized as belonging to a particular signer. NNs therefore are highly suitable to modeling global aspects of handwritten signatures. Edson [7] presented another method for off-line signature verification uses hough transform to detect stroke lines from signature image. The Hough transform (general Radon transform) is used to remove the parameterized Hough space from signature skeleton as unique characteristic feature of signatures. In this method, the Back Propagation Neural Network is used as a tool to estimate the performance of the proposed method. The system has been tested with 70 test signatures from different persons revealing the recognition rate of 95.24%. Velez [8] presented the robust offline signature verification using compression networks and positional cuttings. Each signature class was tested using the compression NN. The advantage of using compression networks is that they can act as auto-associative or the content addressable memories. C. Hidden Markov Models Approach Hidden Markov Model (HMM) is one of the most widely used models for sequence analysis in signature verification. Handwritten signature is a sequence of vectors of values related to each point of signature in its route. Coetzer [9], developed a system that automatically authenticates offline handwritten signatures using the Discrete Radon Transform (DRT) and a hidden Markov model (HMM). Given the robustness of the algorithm and the fact that only global features are considered, the system achieves an Equal Error Rate (EER) of 18% when only high-quality forgeries (skilled forgeries) are considered and an EER of 4.5% in the case of only casual forgeries. Justino [10] in his work presented a robust system for off-line signature verification using simple features, different cell resolutions and multiple codebooks in a HMM framework. The simple and random forgery error rates have been shown to be low and close of each other. A FRR of 2.83% and a FAR of 1.44%, 2.50%, and 22.67% are reported for random, casual, and skilled forgeries, respectively. D. Statistical Approach The statistical knowledge is used to perform some of the statistical concepts like the relation, deviation, etc between two or more data items to find out a specific relation between them. Generally, it
3 follows the concept of Correlation Coefficients which refers to the departure of the two variables from independence. In signature verification system, average signature (template) is calculated from previously collected signatures, stored in knowledge base, when new input signature is read, correlation concept is followed to find the distance between the test signature and average signature, then to decide if it is accepted or rejected. Debnath [11], presented a Statistical Approach for offline handwritten signature verification. The algorithm proposed has the flexibility of choosing the number of signatures, i.e., no-of-sign for testing purpose to generate a signature as a Avg-Sign containing the specialized mean features set from the test signature set. After collecting signatures for testing, the algorithm converts them into a set of 2D arrays of binary data values-0 and 1. From these binary arrays using statistical methods of calculating the expected mean an average data set. The Recognition scheme is based on an extensive Statistical Analysis of Correlation Coefficient between bivariate data set. In implementation of proposed algorithm to constant factors carry major impact on the validity of the method and the strength of the verification lies in the efficiency of selection of these constant parameters, namely AvgSign, Threshold Value and decision value. E. Structural Approach The main idea in structural pattern recognition is the representation of patterns by means of symbolic data structure such as trees, graphs and strings. When a forged signature comes, its symbolic representation is compared with prototypes stored in database. In other words, Structural approach is based on the relational organization of the low-level features into higher-level structures, and then theses structures are matched with models stored in database. Structural features use Modified direction and transition Distance Feature (MDF) which extracts the transition locations and are based on the relational organization of low-level features into higher- level structures. Nguyen [12], presents the new method in which structural features are extracted from the signature s contour using the (MDF) and its extended version: the Enhanced MDF (EMDF) and further two neural network-based techniques and Support Vector Machines (SVMs) are investigated and compared for process of the signature verification. The classifiers were trained using genuine specimens and other randomly selected signatures taken from the publicly available database of 3840 genuine signatures from 160 volunteers and 4800 targeted forged signatures. A Distinguishing Error Rate (DER) of 17.78% was obtained with a SVM whilst keeping the false acceptance rate for random forgeries (FARR) below 0.16%. Ferrer [13] calculates geometric features of the signature in fixed-point arithmetic for offline verification. The proposed features are then checked with different classifiers, such as the Hidden Markov Models, the Support Vector Machines, and the Euclidean distance verifier. The results show that HMM works slightly better than SVM and the distance Euclidean verifier, but, bearing in mind that the SVM and Euclidean distance-based verifiers can be programmed in a fixed-point microprocessor, the results encourage us to follow the SVM research line in order to built a smart card capable of detecting a simple forgery. F. Wavelet- Based Approach In general, the multi-resolution wavelet transform can decompose a signal into low pass and high pass information. The high pass information usually represents features that contain sharper variations in time domain. Hou and Feng proposed [14] the method uses a wavelet-based transformation to extract the inflections of the signature curves by using different scale wavelet transforms in the curvature signature signals transformation. After analysis, the proper scale is selected. The zero-crossings points are mined and are taken as the inflections of the signature. Then this signature curves are divided into several parts, i.e. the strokes, according to the above inflections. The distance between the two corresponding strokes can be measured with Dynamic Time Warping algorithm. In the end, the training algorithm of the signature verification system also the verification method of the signatures is also introduced. The experimental result shows that this method is superior to those methods that match the whole signature curves. Samaneh and Mohsen [15], presented a method for offline Persian signature identification and verification based on image registration and fusion. Discrete Wavelet Transform (DWT) is applied on the preprocessed signature to get high frequency sub-images, then an image reduction and fusion methods are used to create a feature matrix from sub-images. In verification phase, for test signature; the feature matrix is compared with all feature matrixes stored in knowledge base using Euclidian distance. And then upon the specified threshold, the test signature would be accepted or rejected Larkins and Mayo [16], presented an offline signature verification method based on Adaptive Feature Thresholding (AFT). They converted the signature image to binary feature vector; by using the above conversion, the comparison was more accurate. That vector was based on gradient direction for each pixel from across a signature. Gradient direction gave a global features level; Spatial Pyramids were used to express a signature at deep levels, Equimass sampling grid with Spatial Pyramids were combined to improve the structural features. In classification phase, DWT and graph matching methods were used. G. Support Vector Machine Approach Vahid and Hamid [17], proposed an offline signature verification using LRT and SVM. They used the LRT locally for line segments detection for feature extractions and SVM for classification. The proposed system consisted of the two models (1) Learning genuine signatures and (2) Verification model. Preprocessing phase was shared between learning and verification models. Feature extraction phase included the line segment detection, line segment existences validation, feature vector extraction and summarization, and feature vector normalization. Classification: in the classification phase they used SVM with Radial Basis Functions (RBF) kernel to achieve the best results. In the best case, they achieved the same 96% identification rate. Shailedra Kumar Shrivastava, Sanjay S. Gharde [18] Support Vector Machine is supervised Machine Learning technique. Support Vector Machines (SVM) is used for classification in pattern recognition widely Moment Invariant and Affine Moment Invariant techniques are used as feature extractor. Emre and Karshgil [19] presented an offline signature verification system based on the SVM. Feature extraction phase which consists of global features, mask features, and grid features. IV. Evaluation and Discussion Table 1, shows the details of the Feature extraction, verification approaches of different authors along with their verification rate. After the comparative study of various verification approaches from the Table 1 it is observed that average accuracy for template matching signature verification 56.41% which is minimum and average accuracy for statistical approach is 89.47% which is maximum in all signature verification approaches. In case of SVM approach signature verification rate is 96% which is higher as International Journal of Computer Science And Technology 267
4 compared to other approaches. SVM approach is still suitable for skilled forgeries and suitable for simple and random forgeries. Table 1: Different verification approaches, feature extraction & verification rates used by different authors Sr. No Author Approaches Features Piyush and Rajagopalan [5] Justino, F. Bortolozzi, and R. Sabourin [7] Jose, Angel, Moreno [8] Debnath, Samir Kumar and Deepsikha [11] Samaneh and Moghaddam [15] Ramachandra, Ravi, Venugopal, Patnaik [20] Emre and M. Elif Karshgil [19] Template Matching Hidden Markov Model Neural Networks Statistical Approach Wavelet based Structural Support Vector Machine Dynamic Time Wrapping Grid Segmentation Compression n/w and Positional Cuttings Correlation Coefficient, Standard Deviation Discrete Wavelet Transform (DWT), Image Reduction and Fusion Graph Matching and Cross Validation Principle Radial Basis Function Verification rate in % 268 In t e r n a t i o n a l Jo u r n a l o f Co m p u t e r Sc i e n c e An d Te c h n o l o g y AVG Accuracy 2.1% FAR 56.41% 4.7% FAR 85.15% 4.20% FAR 86.24% 7.9% FAR 89.47% 3.45% FAR 63.57% 3.7% FAR 73% 9.5% FAR 9.2% FAR 96 % V. Conclusion This system holds true from the number of perspectives i.e. ease of use, low implementation cost and the ease of embedding the system in an organization, without excessively disrupting or affecting the existing operations. In this paper we present a stateof-the-art for latest methods used in offline signature verification systems. We classify the offline signature verification systems in terms of extracted features type into local and global features and also we classify local features into statistical and geometrical features. On the other hand, we summarize the approaches used in offline signature verification systems, then we discuss these approaches depending on forgery type it detect, even there are many approaches used in this problem but the accuracy still needs to be increased for especially skilled forgeries. VI. Future Work We can try other approaches used in other pattern recognition systems like finger print, face, etc. On the other hand, we can increase the number and quality of extracted features, and combine between global and local features, because the system performance is mainly depending on the extracted features. References [1] Yazan M. Al-Omari, Siti Norul Huda Sheikh Abdullah, Khairuddin Omar, State-of-the-Art in Offline Signature Verification System, International Conference on Pattern Analysis and Intelligent Robotics, Vol. 1, pp , Putrajaya, Malaysia, June [2] V. A. Bharadi, H. B. Kekre, Offline Signature Recognition System, International Journal of Computer Applications,Vol. 1, No. 27, [3] Meenakshi S Arya, Vandana S Inamdar, A Preliminary Study on Various Off-line Hand Written Signature Verification Approaches, International Journal of Computer Applications, No. 9, [4] Ibrahim S. I. ABUHAIBA, Offline Signature Verification Using Graph Matching, Turk J Elect. Engg., Vol. 15, NO [5] Piyush, Rajagopalan, Offline signature verification using Dynamic Time wrapping, Pattern Recognition Letters, Vol. 28, 1 Sep [6] Almudena, Fernandez, Pecharroman and Fierrez, Off-line signature verification system based on contour features, 11th International Conference on Frontiers in Handwriting Recognition, [7] Edson J. R. Justino, Abdenaimel Yacoubi, Flaviob Ortolozzi, Roberts Abourin, An Off-Line Signature Verification System Using Hidden Markov Model and Cross-Validation, IEEE Int. Workshop on Neural Networks for Signal Processing, pp , [8] Jose F. Velez, Angel Sanchez, A. Moreno, Robust, Off-line Signature Verification Using Compression Networks and Positional Cuttings, Neural Networks for Signal Processing, IEEE 13th Workshop on Digital Object Identifier, pp , [9] Coetzer, Herbst, Preezp, Offline Signature Verification Using the Discrete Radon Transform and a Hidden Markov Model, EURASIP Journal on Applied Signal Processing, [10] E. J. R. Justino, F. Bortolozzi, R. Sabourin, Off-line signature verification using HMM for random, simple and skilled forgeries, in International Conference on Document Analysis and Recognition, Vol. 1, pp , Seattle, Wash, USA, [11] Debnath Bhattacharyya, Samir Kumar Bandyopadhyay and Deepsikha Chaudhury, Handwritten signature authentication scheme using integrated statistical analysis of bi-color images, IEEE ICCSA 2007 Conference, Kuala Lumpur, Malaysia, August 26-29, pp , [12] Vu Nguyen; Blumenstein, M.; Muthukkumarasamy V.; Leedham G., Off-line Signature Verification Using Enhanced Modified Direction Features in Conjunction with Neural Classifiers and Support Vector Machines, in Proc. 9th Int Conf on document analysis and recognition, Vol. 02, pp , Sep [13] Miguel A. Ferrer, Jesus B. Alonso, Carlos M. Travieso, "Offline Geometric Parameters for Automatic Signature Verification Using Fixed-Point Arithmetic, IEEE Transactions On Pattern Analysis And Machine Intelligence, Vol. 27, No. 6, June [14] Xiufen Ye, Weiping Hou, Weixing Feng, Off-line Handwritten Signature Verification", with Inflections Feature, Proc. of the IEEE International Conference on Mechatronics & Automation, Canada, July [15] Samaneh, Moghaddam, Off-Line Persian Signature Identification and Verification Based on Image Registration and Fusion, Journal of Multimedia, Vol. 4, No. 3, [16] Larkins, Mayo,"Adaptive Feature Thresholding for offline signature verification, 23rd International Conference In Image and Vision Computing New Zealand, pp. 1-6, [17] Vahid,Reza, Hamid Pourreza, Offline Signature Verification Using Local Radon Transform and Support Vector Machines International Journal of Image Processing (IJIP), Vol. 3,
5 [18] Shailedra Kumar Shrivastava, Sanjay S. Gharde, Support Vector Machine for Handwritten Devanagari Numeral Recognition, International Journal of Computer Applications Vol. 7, No. 11, pp. 9-14, [19] Emre, M. Elif Karshgil, Off-line signature verification and recognition by support vector machine, Pattern Recognition Letters, Vol. 26, pp , Nov [20] Ramachandra, Ravi, Raja, Venugopal, Patnaik,"Signature Verification using Graph Matching and Cross-Validation Principle", Int. J. of Recent Trends in Engineering (IJRTE), Vol. 1 (1), pp , Sanjay S. Gharde, Assistant Professor, Head of Information Technology Department took his Bachelor s Degree in 2001 from Rajiv Gandhi College of Engineering, Research and Technology, Chandrapur. Nagpur University and obtained Masters Degree in 2010 from Samrat Ashok Technological Institute (Engineering College),Vidisha, Rajiv Gandhi Proudyogiki Vishwavidyalaya University, Bhopal. Presently he is the Assistant Professor with 10.4 Years Experience in Teaching and Head of the Information Technology Department in Shrama Sadhana Bomaby Trust s College of Engineering and Technology, Bambhori, Jalgaon, India. To his credit more than 21 papers published in International & National Conferences and published various papers in National & International Journals and he is working in the areas of Image processing Handwritten Character Recognition, Machine Learning, Support Vector Machines, Image Processing and Pattern Recognition, Feature Extraction, Image Retrieval, Object Recognition, Text Classification, Soft Computing. He is guiding many research scholars and he is a member of ISTE, IACSIT and IAENG. He is Reviewer of Journal for Pattern Recognition and Research, San Diego, California, USA. (ISSN X), International Journal of Science, Spirituality, Business and Technology. Krishnakant P. Adhiya, Associate Professor, Head of Computer Department took his Bachelor s Degree in 1999 from Govt. College of Engineering Amravati M.H. India and obtained Masters Degree in 1996 from M.N.R.E.C., Alahabad. Presently he is the Associate Professor and Head of the Computer Department Department in Shrama Sadhana Bomaby Trust s College of Engineering and Technology, Bambhori, Jalgaon, India. To his credit more than 30 papers published in International & National Conferences. He is a member of ISTE. Ms. Harsha G. Chavan, Lecturer in Computer Department from K.C.E College of Engineering and Technology, Jalgaon, M.H. She obtained his Bachelor Degree in 2005 from North Mahrashtra University, Jalgaon. Currently she is pursuing her Master Degree Shrama Sadhana Bomaby Trust s College of Engineering and Technology, Bambhori, Jalgaon, under the esteemed guidance of Sanjay S. Gharde. And her area of interest is Data Structure & Image Processing. To her credit 10 papers have been published in International & National Conferences and 4 papers have been published in International journals and she is a member of ISTE and CSI. International Journal of Computer Science And Technology 269
Static Signature Verification and Recognition using Neural Network Approach-A Survey
Available online www.ejaet.com European Journal of Advances in Engineering and Technology, 2015, 2(4): 46-50 Review Article ISSN: 2394-658X Static Signature Verification and Recognition using Neural Network
More informationPunjabi Offline Signature Verification System Using Neural Network
International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 8958, Volume-3, Issue-2, December 2013 Punjabi Offline Signature Verification System Using Neural Network Rimpi Suman, Dinesh
More informationA Review of Offline Signature Verification Techniques
J. Appl. Environ. Biol. Sci., 4(9S)342-347, 2014 2014, TextRoad Publication ISSN: 2090-4274 Journal of Applied Environmental and Biological Sciences www.textroad.com A Review of Offline Signature Verification
More informationProposed Method for Off-line Signature Recognition and Verification using Neural Network
e-issn: 2349-9745 p-issn: 2393-8161 Scientific Journal Impact Factor (SJIF): 1.711 International Journal of Modern Trends in Engineering and Research www.ijmter.com Proposed Method for Off-line Signature
More informationA Study on Handwritten Signature Verification Approaches
A Study on Handwritten Signature Verification Approaches Surabhi Garhawal, Neeraj Shukla Abstract People are comfortable with pen and papers for authentication and authorization in legal transactions.
More informationOnline handwritten signature verification system: A Review
Online handwritten signature verification system: A Review Abstract: Online handwritten signature verification system is one of the most reliable, fast and cost effective tool for user authentication.
More informationISSN Vol.02,Issue.17, November-2013, Pages:
www.semargroups.org, www.ijsetr.com ISSN 2319-8885 Vol.02,Issue.17, November-2013, Pages:1973-1977 A Novel Multimodal Biometric Approach of Face and Ear Recognition using DWT & FFT Algorithms K. L. N.
More informationReal time verification of Offline handwritten signatures using K-means clustering
Real time verification of Offline handwritten signatures using K-means clustering Alpana Deka 1, Lipi B. Mahanta 2* 1 Department of Computer Science, NERIM Group of Institutions, Guwahati, Assam, India
More informationNikhil Gupta *1, Dr Rakesh Dhiman 2 ABSTRACT I. INTRODUCTION
International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 6 ISSN : 2456-3307 An Offline Handwritten Signature Verification Using
More informationAbout user acceptance in hand, face and signature biometric systems
About user acceptance in hand, face and signature biometric systems Aythami Morales, Miguel A. Ferrer, Carlos M. Travieso, Jesús B. Alonso Instituto Universitario para el Desarrollo Tecnológico y la Innovación
More informationIris Recognition using Hamming Distance and Fragile Bit Distance
IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 06, 2015 ISSN (online): 2321-0613 Iris Recognition using Hamming Distance and Fragile Bit Distance Mr. Vivek B. Mandlik
More informationImage Extraction using Image Mining Technique
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 9 (September. 2013), V2 PP 36-42 Image Extraction using Image Mining Technique Prof. Samir Kumar Bandyopadhyay,
More informationPixel Based Off-line Signature Verification System
Research Paper American Journal of Engineering Research (AJER) e-issn : 2320-0847 p-issn : 2320-0936 Volume-04, Issue-01, pp-187-192 www.ajer.org Open Access Pixel Based Off-line Signature Verification
More informationOffline Signature Verification for Cheque Authentication Using Different Technique
Offline Signature Verification for Cheque Authentication Using Different Technique Dr. Balaji Gundappa Hogade 1, Yogita Praful Gawde 2 1 Research Scholar, NMIMS, MPSTME, Associate Professor, TEC, Navi
More informationKeyword: Morphological operation, template matching, license plate localization, character recognition.
Volume 4, Issue 11, November 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Automatic
More informationAutomatic Licenses Plate Recognition System
Automatic Licenses Plate Recognition System Garima R. Yadav Dept. of Electronics & Comm. Engineering Marathwada Institute of Technology, Aurangabad (Maharashtra), India yadavgarima08@gmail.com Prof. H.K.
More informationPreprocessing and Segregating Offline Gujarati Handwritten Datasheet for Character Recognition
Preprocessing and Segregating Offline Gujarati Handwritten Datasheet for Character Recognition Hetal R. Thaker Atmiya Institute of Technology & science, Kalawad Road, Rajkot Gujarat, India C. K. Kumbharana,
More informationENHANCHED PALM PRINT IMAGES FOR PERSONAL ACCURATE IDENTIFICATION
ENHANCHED PALM PRINT IMAGES FOR PERSONAL ACCURATE IDENTIFICATION Prof. Rahul Sathawane 1, Aishwarya Shende 2, Pooja Tete 3, Naina Chandravanshi 4, Nisha Surjuse 5 1 Prof. Rahul Sathawane, Information Technology,
More informationIMPACT OF SIGNATURE LEGIBILITY AND SIGNATURE TYPE IN OFF-LINE SIGNATURE VERIFICATION.
IMPACT OF SIGNATURE LEGIBILITY AND SIGNATURE TYPE IN OFF-LINE SIGNATURE VERIFICATION F. Alonso-Fernandez a, M.C. Fairhurst b, J. Fierrez a and J. Ortega-Garcia a. a Biometric Recognition Group - ATVS,
More informationImage Forgery Detection Using Svm Classifier
Image Forgery Detection Using Svm Classifier Anita Sahani 1, K.Srilatha 2 M.E. Student [Embedded System], Dept. Of E.C.E., Sathyabama University, Chennai, India 1 Assistant Professor, Dept. Of E.C.E, Sathyabama
More informationIris Recognition-based Security System with Canny Filter
Canny Filter Dr. Computer Engineering Department, University of Technology, Baghdad-Iraq E-mail: hjhh2007@yahoo.com Received: 8/9/2014 Accepted: 21/1/2015 Abstract Image identification plays a great role
More informationA Novel Algorithm for Hand Vein Recognition Based on Wavelet Decomposition and Mean Absolute Deviation
Sensors & Transducers, Vol. 6, Issue 2, December 203, pp. 53-58 Sensors & Transducers 203 by IFSA http://www.sensorsportal.com A Novel Algorithm for Hand Vein Recognition Based on Wavelet Decomposition
More informationStamp detection in scanned documents
Annales UMCS Informatica AI X, 1 (2010) 61-68 DOI: 10.2478/v10065-010-0036-6 Stamp detection in scanned documents Paweł Forczmański Chair of Multimedia Systems, West Pomeranian University of Technology,
More informationNumber Plate Recognition Using Segmentation
Number Plate Recognition Using Segmentation Rupali Kate M.Tech. Electronics(VLSI) BVCOE. Pune 411043, Maharashtra, India. Dr. Chitode. J. S BVCOE. Pune 411043 Abstract Automatic Number Plate Recognition
More informationOnline Signature Verification on Mobile Devices
IJSTE - International Journal of Science Technology & Engineering Volume 2 Issue 10 April 2016 ISSN (online): 2349-784X Online Signature Verification on Mobile Devices Miss. Hude. Kalyani. A. Miss. Khande
More informationFeature Extraction Techniques for Dorsal Hand Vein Pattern
Feature Extraction Techniques for Dorsal Hand Vein Pattern Pooja Ramsoful, Maleika Heenaye-Mamode Khan Department of Computer Science and Engineering University of Mauritius Mauritius pooja.ramsoful@umail.uom.ac.mu,
More informationIris Segmentation & Recognition in Unconstrained Environment
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Issue -8 August, 2014 Page No. 7514-7518 Iris Segmentation & Recognition in Unconstrained Environment ABSTRACT
More informationA comparative study of different feature sets for recognition of handwritten Arabic numerals using a Multi Layer Perceptron
Proc. National Conference on Recent Trends in Intelligent Computing (2006) 86-92 A comparative study of different feature sets for recognition of handwritten Arabic numerals using a Multi Layer Perceptron
More informationWavelet-based Image Splicing Forgery Detection
Wavelet-based Image Splicing Forgery Detection 1 Tulsi Thakur M.Tech (CSE) Student, Department of Computer Technology, basiltulsi@gmail.com 2 Dr. Kavita Singh Head & Associate Professor, Department of
More informationIris Recognition using Histogram Analysis
Iris Recognition using Histogram Analysis Robert W. Ives, Anthony J. Guidry and Delores M. Etter Electrical Engineering Department, U.S. Naval Academy Annapolis, MD 21402-5025 Abstract- Iris recognition
More informationSurvey on Offline Signature Recognition Techniques
Survey on Offline Signature Recognition Techniques Mandeep Kaur #1, Sonika jindal #2 1 Research Scholar, Department of Computer science Engineering, SBSSTC, India 2 Associate Professor, Department of Computer
More informationDETECTING OFF-LINE SIGNATURE MODEL USING WIDE AND NARROW VARIETY CLASS OF LOCAL FEATURE
DETECTING OFF-LINE SIGNATURE MODEL USING WIDE AND NARROW VARIETY CLASS OF LOCAL FEATURE Agung Sediyono 1 and YaniNur Syamsu 2 1 Universitas Trisakti, Indonesia, trisakti_agung06@yahoo.com 2 LabFor Polda
More informationEFFICIENT ATTENDANCE MANAGEMENT SYSTEM USING FACE DETECTION AND RECOGNITION
EFFICIENT ATTENDANCE MANAGEMENT SYSTEM USING FACE DETECTION AND RECOGNITION 1 Arun.A.V, 2 Bhatath.S, 3 Chethan.N, 4 Manmohan.C.M, 5 Hamsaveni M 1,2,3,4,5 Department of Computer Science and Engineering,
More informationStudent Attendance Monitoring System Via Face Detection and Recognition System
IJSTE - International Journal of Science Technology & Engineering Volume 2 Issue 11 May 2016 ISSN (online): 2349-784X Student Attendance Monitoring System Via Face Detection and Recognition System Pinal
More informationLabVIEW based Intelligent Frontal & Non- Frontal Face Recognition System
LabVIEW based Intelligent Frontal & Non- Frontal Face Recognition System Muralindran Mariappan, Manimehala Nadarajan, and Karthigayan Muthukaruppan Abstract Face identification and tracking has taken a
More informationFACE RECOGNITION USING NEURAL NETWORKS
Int. J. Elec&Electr.Eng&Telecoms. 2014 Vinoda Yaragatti and Bhaskar B, 2014 Research Paper ISSN 2319 2518 www.ijeetc.com Vol. 3, No. 3, July 2014 2014 IJEETC. All Rights Reserved FACE RECOGNITION USING
More informationClassification of Features into Strong and Weak Features for an Intelligent Online Signature Verification System
Classification of Features into Strong and Weak Features for an Intelligent Online Signature Verification System Saad Tariq, Saqib Sarwar & Waqar Hussain Department of Electrical Engineering Air University
More informationA Proposal for Security Oversight at Automated Teller Machine System
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 10, Issue 6 (June 2014), PP.18-25 A Proposal for Security Oversight at Automated
More informationIDENTIFICATION OF SIGNATURES TRANSMITTED OVER RAYLEIGH FADING CHANNEL BY USING HMM AND RLE
International Journal of Technology (2011) 1: 56 64 ISSN 2086 9614 IJTech 2011 IDENTIFICATION OF SIGNATURES TRANSMITTED OVER RAYLEIGH FADING CHANNEL BY USING HMM AND RLE Djamhari Sirat 1, Arman D. Diponegoro
More informationWatermarking-based Image Authentication with Recovery Capability using Halftoning and IWT
Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT Luis Rosales-Roldan, Manuel Cedillo-Hernández, Mariko Nakano-Miyatake, Héctor Pérez-Meana Postgraduate Section,
More informationBiometrics 2/23/17. the last category for authentication methods is. this is the realm of biometrics
CSC362, Information Security the last category for authentication methods is Something I am or do, which means some physical or behavioral characteristic that uniquely identifies the user and can be used
More informationAdaptive Feature Analysis Based SAR Image Classification
I J C T A, 10(9), 2017, pp. 973-977 International Science Press ISSN: 0974-5572 Adaptive Feature Analysis Based SAR Image Classification Debabrata Samanta*, Abul Hasnat** and Mousumi Paul*** ABSTRACT SAR
More informationApply Multi-Layer Perceptrons Neural Network for Off-line signature verification and recognition
www.ijcsi.org 261 Apply Multi-Layer Perceptrons eural etwork for Off-line signature verification and recognition Suhail Odeh and Manal Khalil Computer And Information Systems Department, Bethlehem University
More informationTampering Detection Algorithms: A Comparative Study
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 7, Issue 5 (June 2013), PP.82-86 Tampering Detection Algorithms: A Comparative Study
More informationA Study on Handwritten Signature
A Study on Handwritten Signature L B. Mahanta Institute of Adv. Study in Science and Technology Guwahati 35, P.O- Gorchuk Assam, India ABSTRACT Handwritten signature verification is a behavioral biometric.
More informationFeature Extraction Technique Based On Circular Strip for Palmprint Recognition
Feature Extraction Technique Based On Circular Strip for Palmprint Recognition Dr.S.Valarmathy 1, R.Karthiprakash 2, C.Poonkuzhali 3 1, 2, 3 ECE Department, Bannari Amman Institute of Technology, Sathyamangalam
More informationCombined Approach for Face Detection, Eye Region Detection and Eye State Analysis- Extended Paper
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 10, Issue 9 (September 2014), PP.57-68 Combined Approach for Face Detection, Eye
More informationStudy and Analysis of various preprocessing approaches to enhance Offline Handwritten Gujarati Numerals for feature extraction
International Journal of Scientific and Research Publications, Volume 4, Issue 7, July 2014 1 Study and Analysis of various preprocessing approaches to enhance Offline Handwritten Gujarati Numerals for
More informationAnalyzing features learned for Offline Signature Verification using Deep CNNs
Accepted as a conference paper for ICPR 2016 Analyzing features learned for Offline Signature Verification using Deep CNNs Luiz G. Hafemann, Robert Sabourin Lab. d imagerie, de vision et d intelligence
More informationInternational Journal of Advance Research in Computer Science and Management Studies
Volume 3, Issue 2, February 2015 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
More informationINDIAN VEHICLE LICENSE PLATE EXTRACTION AND SEGMENTATION
International Journal of Computer Science and Communication Vol. 2, No. 2, July-December 2011, pp. 593-599 INDIAN VEHICLE LICENSE PLATE EXTRACTION AND SEGMENTATION Chetan Sharma 1 and Amandeep Kaur 2 1
More informationEvaluation of Online Signature Verification Features
Evaluation of Online Signature Verification Features Ghazaleh Taherzadeh*, Roozbeh Karimi*, Alireza Ghobadi*, Hossein Modaberan Beh** * Faculty of Information Technology Multimedia University, Selangor,
More informationRobust Hand Gesture Recognition for Robotic Hand Control
Robust Hand Gesture Recognition for Robotic Hand Control Ankit Chaudhary Robust Hand Gesture Recognition for Robotic Hand Control 123 Ankit Chaudhary Department of Computer Science Northwest Missouri State
More informationMalaviya National Institute of Technology Jaipur
Malaviya National Institute of Technology Jaipur Advanced Pattern Recognition Techniques 26 th 30 th March 2018 Overview Pattern recognition is the scientific discipline in the field of computer science
More informationAn Algorithm for Fingerprint Image Postprocessing
An Algorithm for Fingerprint Image Postprocessing Marius Tico, Pauli Kuosmanen Tampere University of Technology Digital Media Institute EO.BOX 553, FIN-33101, Tampere, FINLAND tico@cs.tut.fi Abstract Most
More informationOnline Signature Verification: A Review
J. Appl. Environ. Biol. Sci., 4(9S)303-308, 2014 2014, TextRoad Publication ISSN: 2090-4274 Journal of Applied Environmental and Biological Sciences www.textroad.com Online Signature Verification: A Review
More informationPublished by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1
IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 2, Issue 2, Apr- Generating an Iris Code Using Iris Recognition for Biometric Application S.Banurekha 1, V.Manisha
More informationAbstract Terminologies. Ridges: Ridges are the lines that show a pattern on a fingerprint image.
An Approach To Extract Minutiae Points From Enhanced Fingerprint Image Annu Saini Apaji Institute of Mathematics & Applied Computer Technology Department of computer Science and Electronics, Banasthali
More informationIMAGE SPLICING FORGERY DETECTION AND LOCALIZATION USING FREQUENCY-BASED FEATURES
Chiew K.T., et al. (Eds.): PGRES 2017, Kuala Lumpur: Eastin Hotel, FCSIT, 2017: pp 35-42 IMAGE SPLICING FORGERY DETECTION AND LOCALIZATION USING FREQUENCY-BASED FEATURES Thamarai Subramaniam and Hamid
More informationMel Spectrum Analysis of Speech Recognition using Single Microphone
International Journal of Engineering Research in Electronics and Communication Mel Spectrum Analysis of Speech Recognition using Single Microphone [1] Lakshmi S.A, [2] Cholavendan M [1] PG Scholar, Sree
More informationDepartment of Computer Engineering
Shram Sadhana Bombay Trust s College of and Technology Bambhori, Jalgaon. Volume II, Issue II Our Inspiration About College News Letter: July December2013 VISION: Today we carry the flame of quality education,
More informationAn Evaluation of Automatic License Plate Recognition Vikas Kotagyale, Prof.S.D.Joshi
An Evaluation of Automatic License Plate Recognition Vikas Kotagyale, Prof.S.D.Joshi Department of E&TC Engineering,PVPIT,Bavdhan,Pune ABSTRACT: In the last decades vehicle license plate recognition systems
More informationInternational Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN IJSER
International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December-2016 192 A Novel Approach For Face Liveness Detection To Avoid Face Spoofing Attacks Meenakshi Research Scholar,
More informationPalm Vein Recognition System using Directional Coding and Back-propagation Neural Network
, October 21-23, 2015, San Francisco, USA Palm Vein Recognition System using Directional Coding and Back-propagation Neural Network Mark Erwin C. Villariña and Noel B. Linsangan, Member, IAENG Abstract
More informationEvaluation of Biometric Systems. Christophe Rosenberger
Evaluation of Biometric Systems Christophe Rosenberger Outline GREYC research lab Evaluation: a love story Evaluation of biometric systems Quality of biometric templates Conclusions & perspectives 2 GREYC
More informationLaser Printer Source Forensics for Arbitrary Chinese Characters
Laser Printer Source Forensics for Arbitrary Chinese Characters Xiangwei Kong, Xin gang You,, Bo Wang, Shize Shang and Linjie Shen Information Security Research Center, Dalian University of Technology,
More informationImage binarization techniques for degraded document images: A review
Image binarization techniques for degraded document images: A review Binarization techniques 1 Amoli Panchal, 2 Chintan Panchal, 3 Bhargav Shah 1 Student, 2 Assistant Professor, 3 Assistant Professor 1
More informationAn Offline Handwritten Signature Verification System - A Comprehensive Review
An Offline Handwritten Signature Verification System - A Comprehensive Review Ms. Deepti Joon 1, Ms. Shaloo Kikon 2 1 M. Tech. Scholar, Dept. of ECE, P.D.M. College of Engineering, Bahadurgarh, Haryana
More informationA Review of Optical Character Recognition System for Recognition of Printed Text
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 3, Ver. II (May Jun. 2015), PP 28-33 www.iosrjournals.org A Review of Optical Character Recognition
More informationFace Recognition Based Attendance System with Student Monitoring Using RFID Technology
Face Recognition Based Attendance System with Student Monitoring Using RFID Technology Abhishek N1, Mamatha B R2, Ranjitha M3, Shilpa Bai B4 1,2,3,4 Dept of ECE, SJBIT, Bangalore, Karnataka, India Abstract:
More informationA DUAL TREE COMPLEX WAVELET TRANSFORM CONSTRUCTION AND ITS APPLICATION TO IMAGE DENOISING
A DUAL TREE COMPLEX WAVELET TRANSFORM CONSTRUCTION AND ITS APPLICATION TO IMAGE DENOISING Sathesh Assistant professor / ECE / School of Electrical Science Karunya University, Coimbatore, 641114, India
More informationA new seal verification for Chinese color seal
Edith Cowan University Research Online ECU Publications 2011 2011 A new seal verification for Chinese color seal Zhihu Huang Jinsong Leng Edith Cowan University 10.4028/www.scientific.net/AMM.58-60.2558
More informationExtraction and Recognition of Text From Digital English Comic Image Using Median Filter
Extraction and Recognition of Text From Digital English Comic Image Using Median Filter S.Ranjini 1 Research Scholar,Department of Information technology Bharathiar University Coimbatore,India ranjinisengottaiyan@gmail.com
More informationA Comprehensive Survey on Kannada Handwritten Character Recognition and Dataset Preparation
A Comprehensive Survey on Kannada Handwritten Character Recognition and Dataset Preparation Kiran Y. C Research Scholar, Jain University Associate Professor, Dept. of ISE Dayananda Sagar College of Engineering
More informationClassification in Image processing: A Survey
Classification in Image processing: A Survey Rashmi R V, Sheela Sridhar Department of computer science and Engineering, B.N.M.I.T, Bangalore-560070 Department of computer science and Engineering, B.N.M.I.T,
More informationAudio Fingerprinting using Fractional Fourier Transform
Audio Fingerprinting using Fractional Fourier Transform Swati V. Sutar 1, D. G. Bhalke 2 1 (Department of Electronics & Telecommunication, JSPM s RSCOE college of Engineering Pune, India) 2 (Department,
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Bank Cheque Authentication
More informationOn-Line, Low-Cost and Pc-Based Fingerprint Verification System Based on Solid- State Capacitance Sensor
On-Line, Low-Cost and Pc-Based Fingerprint Verification System Based on Solid- State Capacitance Sensor Mohamed. K. Shahin *, Ahmed. M. Badawi **, and Mohamed. S. Kamel ** *B.Sc. Design Engineer at International
More informationImplementation of License Plate Recognition System in ARM Cortex A8 Board
www..org 9 Implementation of License Plate Recognition System in ARM Cortex A8 Board S. Uma 1, M.Sharmila 2 1 Assistant Professor, 2 Research Scholar, Department of Electrical and Electronics Engg, College
More informationOnline Signature Verification Systems: A Survey. V.G. Yogesh Assistant Professor, Department of MCA, BKIT Bhalki, Karnataka, India
e t International Journal on Emerging Technologies (Special Issue on NCRIET-2015) 6(2): 63-67(2015) ISSN No. (Print) : 0975-8364 ISSN No. (Online) : 2249-3255 Online Signature Verification Systems: A Survey
More informationAn Overview of Biometrics. Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University
An Overview of Biometrics Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University What are Biometrics? Biometrics refers to identification of humans by their characteristics or traits Physical
More informationPHASE PRESERVING DENOISING AND BINARIZATION OF ANCIENT DOCUMENT IMAGE
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 7, July 2015, pg.16
More informationProcessing and Enhancement of Palm Vein Image in Vein Pattern Recognition System
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 4, April 2015,
More informationVehicle License Plate Recognition System Using LoG Operator for Edge Detection and Radon Transform for Slant Correction
Vehicle License Plate Recognition System Using LoG Operator for Edge Detection and Radon Transform for Slant Correction Jaya Gupta, Prof. Supriya Agrawal Computer Engineering Department, SVKM s NMIMS University
More informationAn Efficient Approach for Iris Recognition by Improving Iris Segmentation and Iris Image Compression
An Efficient Approach for Iris Recognition by Improving Iris Segmentation and Iris Image Compression K. N. Jariwala, SVNIT, Surat, India U. D. Dalal, SVNIT, Surat, India Abstract The biometric person authentication
More informationFingerprint Recognition using Minutiae Extraction
Fingerprint Recognition using Minutiae Extraction Krishna Kumar 1, Basant Kumar 2, Dharmendra Kumar 3 and Rachna Shah 4 1 M.Tech (Student), Motilal Nehru NIT Allahabad, India, krishnanitald@gmail.com 2
More informationEfficient Car License Plate Detection and Recognition by Using Vertical Edge Based Method
Efficient Car License Plate Detection and Recognition by Using Vertical Edge Based Method M. Veerraju *1, S. Saidarao *2 1 Student, (M.Tech), Department of ECE, NIE, Macherla, Andrapradesh, India. E-Mail:
More informationFeature Extraction of Human Lip Prints
Journal of Current Computer Science and Technology Vol. 2 Issue 1 [2012] 01-08 Corresponding Author: Samir Kumar Bandyopadhyay, Department of Computer Science, Calcutta University, India. Email: skb1@vsnl.com
More informationAN OPTIMIZED APPROACH FOR FAKE CURRENCY DETECTION USING DISCRETE WAVELET TRANSFORM
AN OPTIMIZED APPROACH FOR FAKE CURRENCY DETECTION USING DISCRETE WAVELET TRANSFORM T.Manikyala Rao 1, Dr. Ch. Srinivasa Rao 2 Research Scholar, Department of Electronics and Communication Engineering,
More informationCOMPARATIVE PERFORMANCE ANALYSIS OF HAND GESTURE RECOGNITION TECHNIQUES
International Journal of Advanced Research in Engineering and Technology (IJARET) Volume 9, Issue 3, May - June 2018, pp. 177 185, Article ID: IJARET_09_03_023 Available online at http://www.iaeme.com/ijaret/issues.asp?jtype=ijaret&vtype=9&itype=3
More informationFPGA implementation of DWT for Audio Watermarking Application
FPGA implementation of DWT for Audio Watermarking Application Naveen.S.Hampannavar 1, Sajeevan Joseph 2, C.B.Bidhul 3, Arunachalam V 4 1, 2, 3 M.Tech VLSI Students, 4 Assistant Professor Selection Grade
More informationHand & Upper Body Based Hybrid Gesture Recognition
Hand & Upper Body Based Hybrid Gesture Prerna Sharma #1, Naman Sharma *2 # Research Scholor, G. B. P. U. A. & T. Pantnagar, India * Ideal Institue of Technology, Ghaziabad, India Abstract Communication
More informationIdentification of Fake Currency Based on HSV Feature Extraction of Currency Note
Identification of Fake Currency Based on HSV Feature Extraction of Currency Note Neetu 1, Kiran Narang 2 1 Department of Computer Science Hindu College of Engineering (HCE), Deenbandhu Chhotu Ram University
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
Volume 3, Issue 4, April 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Novel Approach
More informationThe Use of Static Biometric Signature Data from Public Service Forms
The Use of Static Biometric Signature Data from Public Service Forms Emma Johnson and Richard Guest School of Engineering and Digital Arts, University of Kent, Canterbury, UK {ej45,r.m.guest}@kent.ac.uk
More informationMAV-ID card processing using camera images
EE 5359 MULTIMEDIA PROCESSING SPRING 2013 PROJECT PROPOSAL MAV-ID card processing using camera images Under guidance of DR K R RAO DEPARTMENT OF ELECTRICAL ENGINEERING UNIVERSITY OF TEXAS AT ARLINGTON
More informationAn Efficient Color Image Segmentation using Edge Detection and Thresholding Methods
19 An Efficient Color Image Segmentation using Edge Detection and Thresholding Methods T.Arunachalam* Post Graduate Student, P.G. Dept. of Computer Science, Govt Arts College, Melur - 625 106 Email-Arunac682@gmail.com
More informationCamera identification from sensor fingerprints: why noise matters
Camera identification from sensor fingerprints: why noise matters PS Multimedia Security 2010/2011 Yvonne Höller Peter Palfrader Department of Computer Science University of Salzburg January 2011 / PS
More informationResearch Seminar. Stefano CARRINO fr.ch
Research Seminar Stefano CARRINO stefano.carrino@hefr.ch http://aramis.project.eia- fr.ch 26.03.2010 - based interaction Characterization Recognition Typical approach Design challenges, advantages, drawbacks
More information3D Face Recognition System in Time Critical Security Applications
Middle-East Journal of Scientific Research 25 (7): 1619-1623, 2017 ISSN 1990-9233 IDOSI Publications, 2017 DOI: 10.5829/idosi.mejsr.2017.1619.1623 3D Face Recognition System in Time Critical Security Applications
More information