Handwritten Signature Verification by Multiple Reference Sets
|
|
- Laureen Ross
- 6 years ago
- Views:
Transcription
1 Handwritten Signature Verification by Multiple s D. Impedovo (^)( ), R. Modugno (*)( ),G. Pirlo (*)( ) (*) ( ), E. Stasolla (*) Dipartimento di Informatica Università degli Studi di Bari Via Orabona 4 Bari Italy (^) Dipartimento di Elettrotecnica ed Elettronica Politecnico di Bari Via Orabona 4 Bari Italy ( ) Centro Rete Puglia - Università degli Studi di Bari Via G. Petroni 15/F.1 Bari Italy {segreteria@retepuglia.uniba.it} Abstract This paper presents a new approach for on-line handwritten signature verification, which exploits the potential of multiple reference sets. Preliminarily, system performance is estimated using different sets of reference signatures for each writer. Successively, reference sets leading to diverse system behaviors are enrolled into the personal nowledge-base and used in a multi-stage verification process. The experimental results show the effectiveness of the proposed approach, compared to traditional techniques. Keywords: Biometry, Classification, Dynamic Signature, Signature Verification, Multi-expert system. 1. Introduction The development of the e-society is strongly dependent on the possibility to fully exploit potentials of internetworing. In other words it is necessary for more and more people to use the net for performing all the daily activities and operations, such as teamwor cooperation and distance learning, baning transactions and fund transfers, access to information resources, etc. Therefore there is a growing need for secure personal verification. Automatic personal verification systems can be categorized on the basis of the means they use for personal verification: physical mechanisms belonging to the individual (i.e. ey or badge), information (i.e. password, numeric string, ey-phrase) and biometric characteristics (i.e. speech, finger-print, palm-print, signature) [1, 2, 3]. Compared to personal verification systems based on physical mechanisms and information, the main advantage of biometric systems is that biometric characteristics cannot be lost, stolen or forgotten [4, 5]. Furthermore, among the various biometrics, handwritten signature verification has the advantage that signature has long been established as one of the widespread means for personal verification in our daily life; it is well-recognized by legal and financial institutions and well-accepted by users [1,4,6,7]. Therefore, the field of signature verification has attracted many researchers which are interested not only to the scientific challenges but also to the valuable applications this field offers [8, 9]. Several excellent survey papers report the progress in the field of automatic signature verification [10, 11, 12, 13, 14, 15]. Recently, the extraordinary growth of the internet has augmented the interest toward automatic signature verification, as demonstrated by the creation of specific laws and regulations, approved in many countries and the attention to the standardization of signature data interchange formats by various important associations and institutes [16, 17, 18]. Therefore, along with these important results, signature verification technologies are becoming much more profitable solutions for a wide range of commercial applications such as baning, insurance, health care, ID-security, document management, e-commerce and retail point-of-sale (POS) [19, 20, 21, 22, 23]. Howeve many efforts are still necessary to perform automatic signature verification effectively. In fact, automatic signature verification is a complex tas that involves many biophysical and psychological aspects related to human behavior as well as many engineering issues [24, 25, 26, 27, 28, 29]. A handwritten signature is the result of a complex process based on a sequence of actions stored into the brain and realized by the writing system of the signer (arms and hands) through ballistic-lie movements. Thus, signatures of the same person can considerably differ depending on the physical and psychological condition of the writer. Two types of variability must be considered [9, 10]: short period and long-period variability. Short-period variability is evident on a day-to-day basis, it is mainly due to the psychological condition of the writer and on the writing conditions (posture of the write type of pen and pape size of the writing area, etc.). Longperiod variability is due to the modifications of the physical writing system of the signer as well as of the sequence of actions stored in his/her brain [10, 11]. So fa many efforts have been devoted to automatic signature verification systems using different function-based and parameter-based features as well as advanced techniques for signature comparison [9, 10, 13, 14, 15]. Anyway, whatever feature set and comparison technique is considered, the performance of signature verification systems is strictly dependent on the type and quality of information
2 used for reference and on the way in which it is organized and exploited for verification. So fa two different strategies have been addressed for reference information construction and management [30]. A first strategy uses a single prototype of genuine signatures for each write and several techniques have been proposed for the development of the optimal average prototype for a signer and for determining the optimal threshold representing the personal variability in signing, by shape and dynamic feature combination [30], time- and position-based averaging [31]. A second strategy uses a set of genuine signatures for reference. In this case a crucial problem concerns the selection, among the samples available, of the optimal subset of reference signatures that represents the signature of an individual in the best way. In fact, it is worth noting that the number of authentic signatures, acquired during the enrolment phase, is generally larger than the number of reference signatures employed in the verification process. When static signature verification is considered, the validity of the reference model is evaluated according to specific quality criterion, as for instance the intra-class variability that should be as low as possible [32, 33]. In dynamic signature verification, the selection of the best sub-set of reference signature has been determined on the basis of the stability regions in the signatures of the sub-set, determined by a well-defined index of local stability [34, 35, 36]. Of course, the selection of the best subset of reference signature can be avoided at the cost of using multiple models for signature verification [37, 38, 39], also by considering synthetic signatures generated from the existing ones by convolutions [40], elastic matching [41] and perturbations [42]. This paper presents a new approach for on-line handwritten signature verification, which exploits potential of multiple reference sets leading to diverse system behaviors. In a preliminary phase, system performance is estimated using different subsets of reference signatures extracted from the available set of authentic signatures. Subsets leading to diverse system behavior estimated by means of well-suited optimality functions - are considered for reference and used in a multi-stage verification process. The experimental result shows the potential of the proposed approach with respect to traditional strategies for reference information selection. 2. Analysis of s In this paper the analysis of different sets of genuine signatures is performed on the basis of their effectiveness, when used as reference. The process of signature verification can be considered as a function D( ), that associates a Boolean value to each input signature S i : D(S i )= G if the signature is considered to be genuine; D(S i )= F if the signature is considered to be a Of course, the signature verification process can produce two types of errors: the Type I errors - that concern with the false rejection of genuine signatures, and the Type II errors - that concern with the false acceptance of forged signatures. Therefore, the False Rejection Rate () and the False Acceptance Rate () are the most diffuse estimators of the accuracy of a signature verification system [9, 10]. In many practical applications a trade-off between the two error types must be defined since any reduction of increases, and vice-versa. For this purpose the Total (TER), that is defined as +, is also widely considered as a measure of the overall error of the system [42]. Now, let S r : { S r i i=1,2,,n r } be the set of genuine signatures available for reference and let us consider the problem concerning with the selection of the best subset of reference signatures S, from S r. Traditionally, this can be done by the analysis of the subset S TER for which the TER is minimum (see Figure 1) [42]. In other word let S g = { S g i i=1,2,,n g } and S f = { S f i i=1,2,,n f } be respectively a set of genuine and forgery signatures, the set S TER is considered as the set for which it is minimum the function where: O TER (S ) = ( + ) (1) = 1 N = 1 N g f card card g g D( Si ) = F} f f { S D( S ) = G} i i, (2). (3) Obviously, when S TER is considered, the function D TER( ), that associates to each input signature S i a Boolean value, can be rewritten as: D TER(S i )= G if the signature is considered to be genuine; D TER(S i )= F if the signature is considered to be a In this pape starting from the consideration that the characteristics of different subsets can be exploited to improve the overall verification accuracy, a two-level verification strategy is considered (see Figure 2). At the first level the following subsets are considered: S : the subset for which it is minimum the value of the optimality function O (S ) = α + β, (4) where α and β weight the cost of False Rejection Errors and False Acceptance Errors (in this case α >> β ). In this case the function D ( ), that associates to each input signature S i a Boolean value can be rewritten as: D (S i )= G if the signature is considered to be genuine; D (S i )= F if the signature is considered to be a
3 S : the subset for which it is minimum the value of the optimality function O (S ) = α + β, (5) where α and β weight the cost of False Rejection Errors and False Acceptance Errors (in this case α << β ). In this case the function D ( ), that associates to each input signature S i a Boolean value can be rewritten as: D (S i )= G if the signature is considered to be genuine; D (S i )= F if the signature is considered to be a FFR Figure 1. Single S S TER First Level Second Level S TER* Figure 2. Multiple s S Using S FFR and S the first level allows the direct verification of an input signature S i for the following cases: D (S i )= G and D (S i )= G, then S i is considered to be a genuine sample; D (S i )= F and D (S i )= F, then S i is considered to be a forged sample; Of course, the other cases must be considered through a second-level verification. For this purpose let be S g* = { S g i S g i=1,2,,n g : D (S i ) D (S i )} and S f* = { S f i S f i=1,2,,n f : D (S i ) D (S i )}, the set S TER* is considered, that is defined as the set for which it is minimum the value of the optimality function O TER* (S ) = ( * + * ) (6) where * * 1 * g g g S D( Si ) = " F" } = card (7) g* Card( S ) 1 * f f f S D( Si ) = " G" } = card (8) f * Card ( S ) Obviously, when S TER* is considered, the function D TER*( ), that associates to each input signature S i a Boolean value can be rewritten as: D TER*(S i )= G if the signature is considered to be genuine; D TER*(S i )= F if the signature is considered to be a 3. Signature Verification System The approach proposed in this paper is general and it does not depend on the specificities of the signature verification system considered. Anyway, in this wor the novel approach for multiple reference sets selection has been applied to a online signature verification system that uses very simple strategies based on velocity signals as function-features and Dynamic Time Warping for signature comparison [9, 10, 11]. Although the complete description of the system is not included in this paper (it can be found in the literature [34, 35]), some major characteristics of the system are described in the following. After signature acquisition, the raw data are preprocessed by removing the undesired initial and final sequences of coordinates. Successively the signature is normalised so that the rectangle surrounding the signature is scaled to a fixed area [34]. After preprocessing, the velocity of the tip of the pen during signing is evaluated numerically from the position signal provided by the tablet. Of course, during the training process, the features extracted from the set of reference signatures are enrolled into the personal database. In the comparison phase they are matched against those belonging to the input (test) signature by DTW. The result is used to judge the authenticity of the input signature. For this purpose, the worst dissimilarity measures obtained from the local analysis of the reference signature are used as threshold
4 values, since they are considered as a measure of personal variability in signing. Depending on the approach used for reference set selection, the following verification schemes are adopted: 1) Single reference set. In this case the verification decision for an input signature S i is performed by the traditional one-level scheme: D TER(S i )= G S i genuine D TER(S i )= F S i 2) Multiple reference sets. In this case the verification decision for an input signature S i is performed by the new two-level scheme: (first level) D FFR(S i )= G and D (S i )= G S i genuine D FFR(S i )= F and D (S i )= F S i otherwise (second level) D TER*(S i )= G S i genuine D TER*(S i )= F S i 4. Experimental Results For the experimental tests, a database has been developed by ten signers, that have collected the genuine signatures, and ten writers, that have produced the forged samples in daily writing sessions. For each write the database includes forty genuine signatures and forty silled forgeries. Writers have had time to exercise and improve their capabilities in imitating the genuine signatures. Furthermore, each signer has produced N r =10 extra signatures to be used for the selection of the best subsets of reference signatures. Of course, although the proposed approach is general, at the moment only subsets of =3 signatures have been considered. Therefore, in the analysis of the reference sets N r 10 = =120 sets of =3 3 signature each have been considered. Table I compares the performance of the system when the single reference set selected by (1) is considered (Approach 1) and when multiple reference sets selected by (4) are used (Approach 2). In the last case the woring parameters are the following: α =1, β =10, (eq. 5); α =10,β =1 (eq. 6). Although a small testing database has been considered so fa the preliminary result point out that, the approach based on multiple reference sets generally outperforms the traditional approach based on single reference. Concerning and, the new approach is superior to the traditional one respectively 9 times out of 10 and 7 times out of ten. At the best, a 100% reduction has been obtained for the of the signers n. 5, 7, 8, 9, 10; and for the of the signers 8, 9, 10. If the total system error rate - defined as + - is considered, an improvement ranging from 11.7% to 100% has been obtained set 9 times out of Conclusion This paper presents a new approach for selecting multiple sets of reference specimens for automatic signature verification. Form the analysis of different behaviours related to various sets of reference signatures, a multi-level verification strategy is proposed which uses well-selected sets of reference signatures. The experimental results, carried out in the field of dynamic signatures, demonstrate the effectiveness of the new approach. References [1] C. Vielhauer and J. Dittmann, Biometrics for User Authentication : Encyclopedia of Multimedia, ed. B. Furth, Springer-Verlag, Berlin, [2] A. Jain, R. Bolle, S. Pananti (eds), Biometrics: Personal Identification in Networed Society, Kluwer Academic Publishers, Boston, USA, [3] S. Nanavati, M. Thieme, R. Nanavati, Biometrics: Identity Verification in a Networed World, pp , Wiley, New Yor, [4] K.W. Boye V. Govindaraju, N.K. Ratha (Eds.), Special Issue on Recent Advances in Biometric Systems, IEEE Trans. on Syst., Man and Cybernetics Part B, Vol. 37, No. 5, Oct [5] S. Prabhaa J. Kittle D. Maltoni, L. O'Gorman, T. Tan (Eds.), Special Issue on Biometrics: Progress and Directions, IEEE T-PAMI, Vol. 29, No. 4, April [6] M.C. Fairhurst, New Perspectives in Automatic Signature Verification, Information Security Technical Report, Vol. 3, No. 1, 1998, pp [7] M.C. Fairhust, S. Ng, Management of access through biometric control: A case study based on automatic signature verification, Universal Access in the Information Society (UAIS), Springer-Verlag, Vol. 1, No. 1, 2001, pp [8] E. Newham, Survey: Signature Verification Technologies, Signature Verification, Elsevier Science Ltd, April 2000, pp [9] R. Plamondon, G. Lorette, Automatic Signature Verification and Writer Table I. Performance. Signer Approach 1: Single 17% 20% 18% 25% 16% 16% 9% 2% 8% 18% 17% 20% 18% 25% 16% 16% 9% 2% 8% 18% + 34% 40% 36% 50% 32% 32% 18% 4% 16% 36% Approach 2: Multiple s 5% 2.5% 22.5% 7.5% 0% 5% 0% 0% 0% 0% 25% 40% 5% 20% 20% 5% 5% 0% 0% 0% + 30% 42% 27.5% 27.5% 20% 10% 5% 0% 0% 0%
5 Identification - The State of the Art, Pattern Recognition, 1989, Vol 22(2), pp [10] F. Leclerc, R. Plamondon, Signature verification: The state of the Art , IJPRAI, 1994, Vol 8(3),pp [11] G. Dimauro, S. Impedovo, G. Pirlo, Algorithms for Automatic Signature Verification, in Handboo of Character Recognition and Document Image Analysis, World Scientific Publ., H. Bune and P. S. P. Wang (Eds.), 1997, pp [12] G. Pirlo, D. Impedovo, Automatic Signature Verification: The State of the Art, IEEE-System Man and Cybernetics Part C, 2008 (in press). [13] V. S. Nalwa, Automatic On-line Signature Verification, Proceedings of the IEEE, Vol. 85, No. 2, Feb. 1997, pp [14] G. Dimauro, S. Impedovo, M.G. Lucchese, R. Modugno, and G. Pirlo, Recent Advancements in Automatic Signature Verification, 9 th International Worshop on Frontiers in Handwriting Recognition (IWFHR-9), Kichijoji, October 25-29, [15] R. Plamondon, S.N. Srihari, On-line and off-line handwriting recognition: A Comprehensive Survey, IEEE T-PAMI, 2000, 22(1), pp [16] ANSI, Information technology Biometric Data Interchange Formats Signature/Sign Data, ANSI INCITS , [17] ISO, Information technology Biometric data interchange formats Part 7: Signature/sign time series data, ISO/IEC FCD [18] ISO Information technology Biometric data interchange formats Part 11: Signature/Sign Processed Dynamic Data, ISO/IEC WD [19] M.C. Fairhurst, Signature Verification Revisited: Promoting Practical Exploitation of Biometric Technology, IEE Electronics and Communication Engineering Journal (ECEJ), Vol. 9, No. 6, Dec. 1997, pp [20] U. Uludag, S. Pananti,S. Prabhaa A.K. Jain, Biometric Cryptosystems: Issues and Challenges, Proc. of the IEEE, Vol. 92, No. 6, June 2004, pp [21] O. Urèche and R. Plamondon, Document Transport, Transfe and Exchange, Security and Commercial Aspects, Proc. ICDAR 99, Bangalore, India, Sept. 1999, pp [22] C. Vielhaue L.C. Ferri, Applications of a hologram watermaring protocol: aging-aware biometric signature verification and time validity chec with personal documents, Proc. SPIE, Vol. 5020, Jun. 2003, pp [23] C. Vielhaue A Behavioural Biometrics, Public Service Review: European Union, 2005, No. 9, pp [24] J.-J. Brault and R. Plamondon, A Complexity Measure of Handwritten Curves: Modeling of Dynamic Signature Forgery, IEEE Transactions on Systems, Man, and Cybernetics (T-SMC), Vol. 23, No. 2, 1993, pp [25] G. Pirlo, Algorithms for Signature Verification, in Proc. of NATO-ASI Series Fundamentals in Handwriting Recognition, S. Impedovo (Ed.), Springer-Verlag, Berlin, 1994, pp [26] R. Plamondon, A Kinematic Theory of Rapid Human Movements: Part I: Movement Representation and generation, Biological Cybernetics, Vol. 72, No. 4, 1995, pp [27] R. Plamondon, A Kinematic Theory of Rapid Human Movements: Part II: Movement Time and Control, Biological Cybernetics, Vol. 72, No. 4, 1995, pp [28] R. Plamondon, A Kinematic Theory of Rapid Human Movements: Part III: Kinetic Outcomes, Biological Cybernetics, Jan [29] R. Plamondon, W. Guerfali, The generation of handwriting with deltalognormal synergies, Biological Cybernetics, 1998, Vol. 78 (2), pp [30] C. Schmidt and K.-F. Kraiss, Establishment of Personalized Templates for Automatic Signature Verification, 4 th International Conference on Document Analysis and Recognition (ICDAR-4), IEEE Computer Society, Ulm, Germany, Vol. I, Aug. 1997, pp [31] B. Wirtz, Average Prototypes for Stroe-Based Signature Verification, 4 th International Conference on Document Analysis and Recognition (ICDAR-4), IEEE Computer Society Press, Ulm, Germany, Vol. I, Aug. 1997, pp [32] C. Allgrove and M.C. Fairhurst, Enrolment model stability in static signature verification, 7 th International Worshop on Frontiers in Handwriting Recognition (IWFHR-7), L.R.B. Schomaer and L.G. Vuurpijl (Eds.), Amsterdam, The Netherlands, September 2000, pp [33] M.C. Fairhurst, Signature Verification Revisited: Promoting Practical Exploitation of Biometric Technology, IEE Electronics and Communication Engineering Journal (ECEJ), Vol. 9, No. 6, Dec. 1997, pp [34] G. Congedo, G. Dimauro, A.M. Forte, S. Impedovo, G. Pirlo, Selecting Reference Signatures for On-Line Signature Verification, 8 th International Conference on Image Analysis and Processing (ICIAP-8), Series: Lecture Notes in Computer Science, Vol. 974, Springer-Verlag Berlin, Heidelberg, C. Braccini, L. De Floriani and G. Vernazza (Eds.), San Remo, Italy, Sept. 1995, pp [35] V. Di Lecce, G. Dimauro, A. Guerriero, S. Impedovo, G. Pirlo, A. Salzo, L. Sarcinella, Selection of Reference Signatures for Automatic Signature Verification, 5 th International Conference on Document Analysis and Recognition (ICDAR-5), Bangalore, India, Sept , 1999, pp [36] R. Kashi and W.L. Nelson, Signature Verification: Benefits of Multiple Tries, 8 th International Worshop on Frontiers in Handwriting Recognition (IWFHR-8), Niagara-on-the-Lae Ontario, Canada, Aug. 2002, pp [37] Mingming Ma, W.S. Wijesoma, Automatic online signature verification based on multiple models, IEEE/IAFE/INFORMS Conference on Computational Intelligence for Financial Engineering, 2000, pp [38] Mingming Ma, W.S. Wijesoma and Eric Sung, An automatic on-line signature verification system based on three models, Canadian Conference on Elect. and Comp. Eng., 2000, pp [39] C. de Oliveira, C.A A Kaestne Flávio Bortolozzi e Robert Sabourin, Generation of Signatures by Deformations, Proc. BSDIA, [40] B. Fang and Y.Y. Tang, Reduction of Feature Statistics Estimation Error for Small Training Sample Size in Off-Line Signature Verification, ICBA 2004, LNCS 3072, Springer-Verlag Berlin Heidelberg, D. Zhang and A.K. Jain (Eds.), 2004, pp [41] K. Huang and H. Yan, Off-line signature verification based on geometric feature extraction and neural networ classification, Pattern Recognition, Vol. 30, Issue 1, Jan. 1997, pp [42] B.Wirtz, Technical Evaluation of Biometric Systems, ACCU'98, Hong Kong, [43] G. Dimauro, S. Impedovo, G. Pirlo, G. Congedo, Signature Verification through a Dynamical Segmentation technique, Proc. 3th IWFHR, 1993, NY, USA, pp
SVC2004: First International Signature Verification Competition
SVC2004: First International Signature Verification Competition Dit-Yan Yeung 1, Hong Chang 1, Yimin Xiong 1, Susan George 2, Ramanujan Kashi 3, Takashi Matsumoto 4, and Gerhard Rigoll 5 1 Hong Kong University
More informationIMPACT OF SIGNATURE LEGIBILITY AND SIGNATURE TYPE IN OFF-LINE SIGNATURE VERIFICATION.
IMPACT OF SIGNATURE LEGIBILITY AND SIGNATURE TYPE IN OFF-LINE SIGNATURE VERIFICATION F. Alonso-Fernandez a, M.C. Fairhurst b, J. Fierrez a and J. Ortega-Garcia a. a Biometric Recognition Group - ATVS,
More informationThe Use of Static Biometric Signature Data from Public Service Forms
The Use of Static Biometric Signature Data from Public Service Forms Emma Johnson and Richard Guest School of Engineering and Digital Arts, University of Kent, Canterbury, UK {ej45,r.m.guest}@kent.ac.uk
More informationOffline Signature Verification for Cheque Authentication Using Different Technique
Offline Signature Verification for Cheque Authentication Using Different Technique Dr. Balaji Gundappa Hogade 1, Yogita Praful Gawde 2 1 Research Scholar, NMIMS, MPSTME, Associate Professor, TEC, Navi
More informationClassification of Features into Strong and Weak Features for an Intelligent Online Signature Verification System
Classification of Features into Strong and Weak Features for an Intelligent Online Signature Verification System Saad Tariq, Saqib Sarwar & Waqar Hussain Department of Electrical Engineering Air University
More informationBiometric Recognition: How Do I Know Who You Are?
Biometric Recognition: How Do I Know Who You Are? Anil K. Jain Department of Computer Science and Engineering, 3115 Engineering Building, Michigan State University, East Lansing, MI 48824, USA jain@cse.msu.edu
More informationStatic Signature Verification and Recognition using Neural Network Approach-A Survey
Available online www.ejaet.com European Journal of Advances in Engineering and Technology, 2015, 2(4): 46-50 Review Article ISSN: 2394-658X Static Signature Verification and Recognition using Neural Network
More informationEvaluating the Biometric Sample Quality of Handwritten Signatures
Evaluating the Biometric Sample Quality of Handwritten Signatures Sascha Müller 1 and Olaf Henniger 2 1 Technische Universität Darmstadt, Darmstadt, Germany mueller@sec.informatik.tu-darmstadt.de 2 Fraunhofer
More informationEvaluation of Online Signature Verification Features
Evaluation of Online Signature Verification Features Ghazaleh Taherzadeh*, Roozbeh Karimi*, Alireza Ghobadi*, Hossein Modaberan Beh** * Faculty of Information Technology Multimedia University, Selangor,
More informationNikhil Gupta *1, Dr Rakesh Dhiman 2 ABSTRACT I. INTRODUCTION
International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 6 ISSN : 2456-3307 An Offline Handwritten Signature Verification Using
More informationClassification of Handwritten Signatures Based on Name Legibility
Classification of Handwritten Signatures Based on Name Legibility Javier Galbally, Julian Fierrez and Javier Ortega-Garcia Biometrics Research Lab./ATVS, EPS, Universidad Autonoma de Madrid, Campus de
More informationAlgorithm for Detection and Elimination of False Minutiae in Fingerprint Images
Algorithm for Detection and Elimination of False Minutiae in Fingerprint Images Seonjoo Kim, Dongjae Lee, and Jaihie Kim Department of Electrical and Electronics Engineering,Yonsei University, Seoul, Korea
More informationComplexity-based Biometric Signature Verification
Complexity-based Biometric Signature Verification Ruben Tolosana, Ruben Vera-Rodriguez, Richard Guest, Julian Fierrez and Javier Ortega-Garcia Biometrics and Data Pattern Analytics (BiDA) Lab - ATVS, Escuela
More informationProposed Method for Off-line Signature Recognition and Verification using Neural Network
e-issn: 2349-9745 p-issn: 2393-8161 Scientific Journal Impact Factor (SJIF): 1.711 International Journal of Modern Trends in Engineering and Research www.ijmter.com Proposed Method for Off-line Signature
More informationAnalysis of Stability in Static Signatures using Cosine Similarity
202 International Conference on Frontier in Handwriting Recognition Analyi of in Static Signature uing Coine Similarity D. Impedovo, G. Pirlo, L. Sarcinella, E. Staolla, C. A. Trullo Dipartimento di Informatica
More informationDETECTING OFF-LINE SIGNATURE MODEL USING WIDE AND NARROW VARIETY CLASS OF LOCAL FEATURE
DETECTING OFF-LINE SIGNATURE MODEL USING WIDE AND NARROW VARIETY CLASS OF LOCAL FEATURE Agung Sediyono 1 and YaniNur Syamsu 2 1 Universitas Trisakti, Indonesia, trisakti_agung06@yahoo.com 2 LabFor Polda
More informationOnline handwritten signature verification system: A Review
Online handwritten signature verification system: A Review Abstract: Online handwritten signature verification system is one of the most reliable, fast and cost effective tool for user authentication.
More informationSignature verification revisited:
Signature verification revisited: promoting practical exploitation of biometric technology by MI C. Fairhurst Despite research over a long period, biometric approaches to authenticating personal identity
More informationEffective and Efficient Fingerprint Image Postprocessing
Effective and Efficient Fingerprint Image Postprocessing Haiping Lu, Xudong Jiang and Wei-Yun Yau Laboratories for Information Technology 21 Heng Mui Keng Terrace, Singapore 119613 Email: hplu@lit.org.sg
More informationSegmentation of Fingerprint Images
Segmentation of Fingerprint Images Asker M. Bazen and Sabih H. Gerez University of Twente, Department of Electrical Engineering, Laboratory of Signals and Systems, P.O. box 217-75 AE Enschede - The Netherlands
More informationA New Fake Iris Detection Method
A New Fake Iris Detection Method Xiaofu He 1, Yue Lu 1, and Pengfei Shi 2 1 Department of Computer Science and Technology, East China Normal University, Shanghai 200241, China {xfhe,ylu}@cs.ecnu.edu.cn
More informationA Novel Algorithm for Hand Vein Recognition Based on Wavelet Decomposition and Mean Absolute Deviation
Sensors & Transducers, Vol. 6, Issue 2, December 203, pp. 53-58 Sensors & Transducers 203 by IFSA http://www.sensorsportal.com A Novel Algorithm for Hand Vein Recognition Based on Wavelet Decomposition
More informationAn Offline Handwritten Signature Verification System - A Comprehensive Review
An Offline Handwritten Signature Verification System - A Comprehensive Review Ms. Deepti Joon 1, Ms. Shaloo Kikon 2 1 M. Tech. Scholar, Dept. of ECE, P.D.M. College of Engineering, Bahadurgarh, Haryana
More informationDevelopment of a Biometric Testing Protocol for Dynamic Signature Verification
1 Development of a Biometric Testing Protocol for Dynamic Signature Verification Stephen J. Elliott Abstract-- This paper accounts the testing protocols used at the author's university. It examines the
More informationWriter identification clustering letters with unknown authors
Writer identification clustering letters with unknown authors Joanna Putz-Leszczynska To cite this version: Joanna Putz-Leszczynska. Writer identification clustering letters with unknown authors. 17th
More informationAn Enhanced Biometric System for Personal Authentication
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735. Volume 6, Issue 3 (May. - Jun. 2013), PP 63-69 An Enhanced Biometric System for Personal Authentication
More informationMULTIMODAL BIOMETRIC SYSTEMS STUDY TO IMPROVE ACCURACY AND PERFORMANCE
MULTIMODAL BIOMETRIC SYSTEMS STUDY TO IMPROVE ACCURACY AND PERFORMANCE K.Sasidhar 1, Vijaya L Kakulapati 2, Kolikipogu Ramakrishna 3 & K.KailasaRao 4 1 Department of Master of Computer Applications, MLRCET,
More informationReal time verification of Offline handwritten signatures using K-means clustering
Real time verification of Offline handwritten signatures using K-means clustering Alpana Deka 1, Lipi B. Mahanta 2* 1 Department of Computer Science, NERIM Group of Institutions, Guwahati, Assam, India
More informationShape Representation Robust to the Sketching Order Using Distance Map and Direction Histogram
Shape Representation Robust to the Sketching Order Using Distance Map and Direction Histogram Kiwon Yun, Junyeong Yang, and Hyeran Byun Dept. of Computer Science, Yonsei University, Seoul, Korea, 120-749
More informationIRIS Biometric for Person Identification. By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology
IRIS Biometric for Person Identification By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology What are Biometrics? Why are Biometrics used? How Biometrics is today? Iris Iris is the area
More informationADVANCES IN DIGITAL HANDWRITTEN SIGNATURE PROCESSING
ADVANCES IN DIGITAL HANDWRITTEN SIGNATURE PROCESSING A Human Artefact for e-society This page intentionally left blank ADVANCES IN DIGITAL HANDWRITTEN SIGNATURE PROCESSING A Human Artefact for e-society
More informationA comparative study of different feature sets for recognition of handwritten Arabic numerals using a Multi Layer Perceptron
Proc. National Conference on Recent Trends in Intelligent Computing (2006) 86-92 A comparative study of different feature sets for recognition of handwritten Arabic numerals using a Multi Layer Perceptron
More informationPixel Based Off-line Signature Verification System
Research Paper American Journal of Engineering Research (AJER) e-issn : 2320-0847 p-issn : 2320-0936 Volume-04, Issue-01, pp-187-192 www.ajer.org Open Access Pixel Based Off-line Signature Verification
More informationFeature Extraction Techniques for Dorsal Hand Vein Pattern
Feature Extraction Techniques for Dorsal Hand Vein Pattern Pooja Ramsoful, Maleika Heenaye-Mamode Khan Department of Computer Science and Engineering University of Mauritius Mauritius pooja.ramsoful@umail.uom.ac.mu,
More informationA new seal verification for Chinese color seal
Edith Cowan University Research Online ECU Publications 2011 2011 A new seal verification for Chinese color seal Zhihu Huang Jinsong Leng Edith Cowan University 10.4028/www.scientific.net/AMM.58-60.2558
More informationContent Based Image Retrieval Using Color Histogram
Content Based Image Retrieval Using Color Histogram Nitin Jain Assistant Professor, Lokmanya Tilak College of Engineering, Navi Mumbai, India. Dr. S. S. Salankar Professor, G.H. Raisoni College of Engineering,
More informationA Cryptosystem With Private Key Generation From Dynamic Properties of Human Hand Signature
A Cryptosystem With Private Key Generation From Dynamic Properties of Human Hand Signature HAO FENG School of Electrical & Electronic Engineering A thesis submitted to the Nanyang Technological University
More informationAbout user acceptance in hand, face and signature biometric systems
About user acceptance in hand, face and signature biometric systems Aythami Morales, Miguel A. Ferrer, Carlos M. Travieso, Jesús B. Alonso Instituto Universitario para el Desarrollo Tecnológico y la Innovación
More informationAnalyzing features learned for Offline Signature Verification using Deep CNNs
Accepted as a conference paper for ICPR 2016 Analyzing features learned for Offline Signature Verification using Deep CNNs Luiz G. Hafemann, Robert Sabourin Lab. d imagerie, de vision et d intelligence
More informationImage Forgery Detection Using Svm Classifier
Image Forgery Detection Using Svm Classifier Anita Sahani 1, K.Srilatha 2 M.E. Student [Embedded System], Dept. Of E.C.E., Sathyabama University, Chennai, India 1 Assistant Professor, Dept. Of E.C.E, Sathyabama
More informationPunjabi Offline Signature Verification System Using Neural Network
International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 8958, Volume-3, Issue-2, December 2013 Punjabi Offline Signature Verification System Using Neural Network Rimpi Suman, Dinesh
More informationEmpirical Evidence for Correct Iris Match Score Degradation with Increased Time-Lapse between Gallery and Probe Matches
Empirical Evidence for Correct Iris Match Score Degradation with Increased Time-Lapse between Gallery and Probe Matches Sarah E. Baker, Kevin W. Bowyer, and Patrick J. Flynn University of Notre Dame {sbaker3,kwb,flynn}@cse.nd.edu
More informationLicense Plate Localisation based on Morphological Operations
License Plate Localisation based on Morphological Operations Xiaojun Zhai, Faycal Benssali and Soodamani Ramalingam School of Engineering & Technology University of Hertfordshire, UH Hatfield, UK Abstract
More informationIntegrated Digital System for Yarn Surface Quality Evaluation using Computer Vision and Artificial Intelligence
Integrated Digital System for Yarn Surface Quality Evaluation using Computer Vision and Artificial Intelligence Sheng Yan LI, Jie FENG, Bin Gang XU, and Xiao Ming TAO Institute of Textiles and Clothing,
More informationBiometric Authentication for secure e-transactions: Research Opportunities and Trends
Biometric Authentication for secure e-transactions: Research Opportunities and Trends Fahad M. Al-Harby College of Computer and Information Security Naif Arab University for Security Sciences (NAUSS) fahad.alharby@nauss.edu.sa
More informationAn Efficient Approach for Iris Recognition by Improving Iris Segmentation and Iris Image Compression
An Efficient Approach for Iris Recognition by Improving Iris Segmentation and Iris Image Compression K. N. Jariwala, SVNIT, Surat, India U. D. Dalal, SVNIT, Surat, India Abstract The biometric person authentication
More informationInternational Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN IJSER
International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December-2016 192 A Novel Approach For Face Liveness Detection To Avoid Face Spoofing Attacks Meenakshi Research Scholar,
More informationFingerprint Combination for Privacy Protection
Fingerprint Combination for Privacy Protection Mr. Bharat V Warude, Prof. S.K.Bhatia ME Student, Assistant Professor Department of Electronics and Telecommunication JSPM s ICOER, Wagholi, Pune India Abstract
More informationSpecific Sensors for Face Recognition
Specific Sensors for Face Recognition Walid Hizem, Emine Krichen, Yang Ni, Bernadette Dorizzi, and Sonia Garcia-Salicetti Département Electronique et Physique, Institut National des Télécommunications,
More informationProceedings of the 2014 Federated Conference on Computer Science and Information Systems pp
Proceedings of the 204 Federated Conference on Computer Science and Information Systems pp. 70 708 DOI: 0.5439/204F59 ACSIS, Vol. 2 Handwritten Signature Verification with 2D Color Barcodes Marco Querini,
More informationContext-Aware Interaction in a Mobile Environment
Context-Aware Interaction in a Mobile Environment Daniela Fogli 1, Fabio Pittarello 2, Augusto Celentano 2, and Piero Mussio 1 1 Università degli Studi di Brescia, Dipartimento di Elettronica per l'automazione
More informationIris Recognition using Hamming Distance and Fragile Bit Distance
IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 06, 2015 ISSN (online): 2321-0613 Iris Recognition using Hamming Distance and Fragile Bit Distance Mr. Vivek B. Mandlik
More informationPostprint.
http://www.diva-portal.org Postprint This is the accepted version of a paper presented at IEEE Intl. Conf. on Control, Automation, Robotics and Vision, ICARCV, Special Session on Biometrics, Singapore,
More informationImage Averaging for Improved Iris Recognition
Image Averaging for Improved Iris Recognition Karen P. Hollingsworth, Kevin W. Bowyer, and Patrick J. Flynn University of Notre Dame Abstract. We take advantage of the temporal continuity in an iris video
More informationAuthenticated Document Management System
Authenticated Document Management System P. Anup Krishna Research Scholar at Bharathiar University, Coimbatore, Tamilnadu Dr. Sudheer Marar Head of Department, Faculty of Computer Applications, Nehru College
More information3 Department of Computer science and Application, Kurukshetra University, Kurukshetra, India
Minimizing Sensor Interoperability Problem using Euclidean Distance Himani 1, Parikshit 2, Dr.Chander Kant 3 M.tech Scholar 1, Assistant Professor 2, 3 1,2 Doon Valley Institute of Engineering and Technology,
More informationApply Multi-Layer Perceptrons Neural Network for Off-line signature verification and recognition
www.ijcsi.org 261 Apply Multi-Layer Perceptrons eural etwork for Off-line signature verification and recognition Suhail Odeh and Manal Khalil Computer And Information Systems Department, Bethlehem University
More informationTouchless Fingerprint Recognization System
e-issn 2455 1392 Volume 2 Issue 4, April 2016 pp. 501-505 Scientific Journal Impact Factor : 3.468 http://www.ijcter.com Touchless Fingerprint Recognization System Biju V. G 1., Anu S Nair 2, Albin Joseph
More informationEFFICIENT ATTENDANCE MANAGEMENT SYSTEM USING FACE DETECTION AND RECOGNITION
EFFICIENT ATTENDANCE MANAGEMENT SYSTEM USING FACE DETECTION AND RECOGNITION 1 Arun.A.V, 2 Bhatath.S, 3 Chethan.N, 4 Manmohan.C.M, 5 Hamsaveni M 1,2,3,4,5 Department of Computer Science and Engineering,
More informationBiometric Signature for Mobile Devices
Chapter 13 Biometric Signature for Mobile Devices Maria Villa and Abhishek Verma CONTENTS 13.1 Biometric Signature Recognition 309 13.2 Introduction 310 13.2.1 How Biometric Signature Works 310 13.2.2
More informationIntegrated Detection and Tracking in Multistatic Sonar
Stefano Coraluppi Reconnaissance, Surveillance, and Networks Department NATO Undersea Research Centre Viale San Bartolomeo 400 19138 La Spezia ITALY coraluppi@nurc.nato.int ABSTRACT An ongoing research
More informationStamp detection in scanned documents
Annales UMCS Informatica AI X, 1 (2010) 61-68 DOI: 10.2478/v10065-010-0036-6 Stamp detection in scanned documents Paweł Forczmański Chair of Multimedia Systems, West Pomeranian University of Technology,
More informationIntroduction to Biometrics 1
Introduction to Biometrics 1 Gerik Alexander v.graevenitz von Graevenitz Biometrics, Bonn, Germany May, 14th 2004 Introduction to Biometrics Biometrics refers to the automatic identification of a living
More informationComputational Intelligence in Digital Forensics: Forensic Investigation and Applications
Signature-Based Biometric Authentication Author Pal, Srikanta, Pal, Umapada, Blumenstein, Michael Published 2014 Book Title Computational Intelligence in Digital Forensics: Forensic Investigation and Applications
More informationAn Hybrid MLP-SVM Handwritten Digit Recognizer
An Hybrid MLP-SVM Handwritten Digit Recognizer A. Bellili ½ ¾ M. Gilloux ¾ P. Gallinari ½ ½ LIP6, Université Pierre et Marie Curie ¾ La Poste 4, Place Jussieu 10, rue de l Ile Mabon, BP 86334 75252 Paris
More informationSoftware Development Kit to Verify Quality Iris Images
Software Development Kit to Verify Quality Iris Images Isaac Mateos, Gualberto Aguilar, Gina Gallegos Sección de Estudios de Posgrado e Investigación Culhuacan, Instituto Politécnico Nacional, México D.F.,
More informationAn Algorithm for Fingerprint Image Postprocessing
An Algorithm for Fingerprint Image Postprocessing Marius Tico, Pauli Kuosmanen Tampere University of Technology Digital Media Institute EO.BOX 553, FIN-33101, Tampere, FINLAND tico@cs.tut.fi Abstract Most
More informationPreprocessing and postprocessing for skeleton-based fingerprint minutiae extraction
Pattern Recognition 40 (2007) 1270 1281 www.elsevier.com/locate/pr Preprocessing and postprocessing for skeleton-based fingerprint minutiae extraction Feng Zhao, Xiaoou Tang Department of Information Engineering,
More informationBiometric Recognition Techniques
Biometric Recognition Techniques Anjana Doshi 1, Manisha Nirgude 2 ME Student, Computer Science and Engineering, Walchand Institute of Technology Solapur, India 1 Asst. Professor, Information Technology,
More informationA Novel Region Based Liveness Detection Approach for Fingerprint Scanners
A Novel Region Based Liveness Detection Approach for Fingerprint Scanners Brian DeCann, Bozhao Tan, and Stephanie Schuckers Clarkson University, Potsdam, NY 13699 USA {decannbm,tanb,sschucke}@clarkson.edu
More informationHaptic-Based Biometrics: A Feasibility Study
Haptic-Based Biometrics: A Feasibility Study Yednek Asfaw, Mauricio Orozco, Shervin Shirmohammadi, Andy Adler, and Abdulmotaleb El Saddik School of Information Technology and Engineering University of
More informationBiometrics - A Tool in Fraud Prevention
Biometrics - A Tool in Fraud Prevention Agenda Authentication Biometrics : Need, Available Technologies, Working, Comparison Fingerprint Technology About Enrollment, Matching and Verification Key Concepts
More informationIris Recognition using Histogram Analysis
Iris Recognition using Histogram Analysis Robert W. Ives, Anthony J. Guidry and Delores M. Etter Electrical Engineering Department, U.S. Naval Academy Annapolis, MD 21402-5025 Abstract- Iris recognition
More informationUTSig: A Persian Offline Signature Dataset
UTSig: A Persian Offline Signature Dataset Amir Soleimani 1*, Kazim Fouladi 2, Babak N. Araabi 1, 3 1 Control and Intelligent Processing Center of Excellence, School of Electrical and Computer Engineering,
More informationIris Segmentation & Recognition in Unconstrained Environment
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Issue -8 August, 2014 Page No. 7514-7518 Iris Segmentation & Recognition in Unconstrained Environment ABSTRACT
More informationISSN Vol.02,Issue.17, November-2013, Pages:
www.semargroups.org, www.ijsetr.com ISSN 2319-8885 Vol.02,Issue.17, November-2013, Pages:1973-1977 A Novel Multimodal Biometric Approach of Face and Ear Recognition using DWT & FFT Algorithms K. L. N.
More informationOnline Signature Verification on Mobile Devices
IJSTE - International Journal of Science Technology & Engineering Volume 2 Issue 10 April 2016 ISSN (online): 2349-784X Online Signature Verification on Mobile Devices Miss. Hude. Kalyani. A. Miss. Khande
More informationAudio Fingerprinting using Fractional Fourier Transform
Audio Fingerprinting using Fractional Fourier Transform Swati V. Sutar 1, D. G. Bhalke 2 1 (Department of Electronics & Telecommunication, JSPM s RSCOE college of Engineering Pune, India) 2 (Department,
More informationPalm Vein Recognition System using Directional Coding and Back-propagation Neural Network
, October 21-23, 2015, San Francisco, USA Palm Vein Recognition System using Directional Coding and Back-propagation Neural Network Mark Erwin C. Villariña and Noel B. Linsangan, Member, IAENG Abstract
More informationInternational Conference on Innovative Applications in Engineering and Information Technology(ICIAEIT-2017)
Sparsity Inspired Selection and Recognition of Iris Images 1. Dr K R Badhiti, Assistant Professor, Dept. of Computer Science, Adikavi Nannaya University, Rajahmundry, A.P, India 2. Prof. T. Sudha, Dept.
More informationIncorporating Touch Biometrics to Mobile One-Time Passwords: Exploration of Digits
Incorporating Touch Biometrics to Mobile One-Time Passwords: Exploration of Digits Ruben Tolosana, Ruben Vera-Rodriguez, Julian Fierrez and Javier Ortega-Garcia Biometrics and Data Pattern Analtics (BiDA)
More informationEnhanced MLP Input-Output Mapping for Degraded Pattern Recognition
Enhanced MLP Input-Output Mapping for Degraded Pattern Recognition Shigueo Nomura and José Ricardo Gonçalves Manzan Faculty of Electrical Engineering, Federal University of Uberlândia, Uberlândia, MG,
More informationA novel method to generate Brute-Force Signature Forgeries
A novel method to generate Brute-Force Signature Forgeries DIUF-RR 274 06-09 Alain Wahl 1 Jean Hennebert 2 Andreas Humm 3 Rolf Ingold 4 June 12, 2006 Department of Informatics Research Report Département
More informationTHE Touchless SDK released by Microsoft provides the
1 Touchless Writer: Object Tracking & Neural Network Recognition Yang Wu & Lu Yu The Milton W. Holcombe Department of Electrical and Computer Engineering Clemson University, Clemson, SC 29631 E-mail {wuyang,
More informationhttp://www.diva-portal.org This is the published version of a paper presented at SAI Annual Conference on Areas of Intelligent Systems and Artificial Intelligence and their Applications to the Real World
More informationTIMIT LMS LMS. NoisyNA
TIMIT NoisyNA Shi NoisyNA Shi (NoisyNA) shi A ICA PI SNIR [1]. S. V. Vaseghi, Advanced Digital Signal Processing and Noise Reduction, Second Edition, John Wiley & Sons Ltd, 2000. [2]. M. Moonen, and A.
More informationOpen Access An Improved Character Recognition Algorithm for License Plate Based on BP Neural Network
Send Orders for Reprints to reprints@benthamscience.ae 202 The Open Electrical & Electronic Engineering Journal, 2014, 8, 202-207 Open Access An Improved Character Recognition Algorithm for License Plate
More informationHandwritten Character Recognition using Different Kernel based SVM Classifier and MLP Neural Network (A COMPARISON)
Handwritten Character Recognition using Different Kernel based SVM Classifier and MLP Neural Network (A COMPARISON) Parveen Kumar Department of E.C.E Lecturer, NCCE Israna Nitin Sharma Department of E.C.E
More informationFEASIBILITY STUDY OF PHOTOPLETHYSMOGRAPHIC SIGNALS FOR BIOMETRIC IDENTIFICATION. Petros Spachos, Jiexin Gao and Dimitrios Hatzinakos
FEASIBILITY STUDY OF PHOTOPLETHYSMOGRAPHIC SIGNALS FOR BIOMETRIC IDENTIFICATION Petros Spachos, Jiexin Gao and Dimitrios Hatzinakos The Edward S. Rogers Sr. Department of Electrical and Computer Engineering,
More informationAn Overview of Biometrics. Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University
An Overview of Biometrics Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University What are Biometrics? Biometrics refers to identification of humans by their characteristics or traits Physical
More informationOnline Signature Verification by Using FPGA
Online Signature Verification by Using FPGA D.Sandeep Assistant Professor, Department of ECE, Vignan Institute of Technology & Science, Telangana, India. ABSTRACT: The main aim of this project is used
More informationThe Role of Biometrics in Virtual Communities. and Digital Governments
The Role of Biometrics in Virtual Communities and Digital Governments Chang-Tsun Li Department of Computer Science University of Warwick Coventry CV4 7AL UK Tel: +44 24 7657 3794 Fax: +44 24 7657 3024
More informationInternational Conference on Advances in Engineering & Technology 2014 (ICAET-2014) 48 Page
Analysis of Visual Cryptography Schemes Using Adaptive Space Filling Curve Ordered Dithering V.Chinnapudevi 1, Dr.M.Narsing Yadav 2 1.Associate Professor, Dept of ECE, Brindavan Institute of Technology
More informationOn The Correlation of Image Size to System Accuracy in Automatic Fingerprint Identification Systems
On The Correlation of Image Size to System Accuracy in Automatic Fingerprint Identification Systems J.K. Schneider, C. E. Richardson, F.W. Kiefer, and Venu Govindaraju Ultra-Scan Corporation, 4240 Ridge
More information3D Face Recognition in Biometrics
3D Face Recognition in Biometrics CHAO LI, ARMANDO BARRETO Electrical & Computer Engineering Department Florida International University 10555 West Flagler ST. EAS 3970 33174 USA {cli007, barretoa}@fiu.edu
More informationDesign a Model and Algorithm for multi Way Gesture Recognition using Motion and Image Comparison
e-issn 2455 1392 Volume 2 Issue 10, October 2016 pp. 34 41 Scientific Journal Impact Factor : 3.468 http://www.ijcter.com Design a Model and Algorithm for multi Way Gesture Recognition using Motion and
More informationA Review of Optical Character Recognition System for Recognition of Printed Text
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 3, Ver. II (May Jun. 2015), PP 28-33 www.iosrjournals.org A Review of Optical Character Recognition
More informationVEHICLE LICENSE PLATE DETECTION ALGORITHM BASED ON STATISTICAL CHARACTERISTICS IN HSI COLOR MODEL
VEHICLE LICENSE PLATE DETECTION ALGORITHM BASED ON STATISTICAL CHARACTERISTICS IN HSI COLOR MODEL Instructor : Dr. K. R. Rao Presented by: Prasanna Venkatesh Palani (1000660520) prasannaven.palani@mavs.uta.edu
More informationRESEARCH AND DEVELOPMENT OF DSP-BASED FACE RECOGNITION SYSTEM FOR ROBOTIC REHABILITATION NURSING BEDS
RESEARCH AND DEVELOPMENT OF DSP-BASED FACE RECOGNITION SYSTEM FOR ROBOTIC REHABILITATION NURSING BEDS Ming XING and Wushan CHENG College of Mechanical Engineering, Shanghai University of Engineering Science,
More informationA Training Based Approach for Vehicle Plate Recognition (VPR)
A Training Based Approach for Vehicle Plate Recognition (VPR) Laveena Agarwal 1, Vinish Kumar 2, Dwaipayan Dey 3 1 Department of Computer Science & Engineering, Sanskar College of Engineering &Technology,
More information