Handwritten Signature Verification by Multiple Reference Sets

Size: px
Start display at page:

Download "Handwritten Signature Verification by Multiple Reference Sets"

Transcription

1 Handwritten Signature Verification by Multiple s D. Impedovo (^)( ), R. Modugno (*)( ),G. Pirlo (*)( ) (*) ( ), E. Stasolla (*) Dipartimento di Informatica Università degli Studi di Bari Via Orabona 4 Bari Italy (^) Dipartimento di Elettrotecnica ed Elettronica Politecnico di Bari Via Orabona 4 Bari Italy ( ) Centro Rete Puglia - Università degli Studi di Bari Via G. Petroni 15/F.1 Bari Italy {segreteria@retepuglia.uniba.it} Abstract This paper presents a new approach for on-line handwritten signature verification, which exploits the potential of multiple reference sets. Preliminarily, system performance is estimated using different sets of reference signatures for each writer. Successively, reference sets leading to diverse system behaviors are enrolled into the personal nowledge-base and used in a multi-stage verification process. The experimental results show the effectiveness of the proposed approach, compared to traditional techniques. Keywords: Biometry, Classification, Dynamic Signature, Signature Verification, Multi-expert system. 1. Introduction The development of the e-society is strongly dependent on the possibility to fully exploit potentials of internetworing. In other words it is necessary for more and more people to use the net for performing all the daily activities and operations, such as teamwor cooperation and distance learning, baning transactions and fund transfers, access to information resources, etc. Therefore there is a growing need for secure personal verification. Automatic personal verification systems can be categorized on the basis of the means they use for personal verification: physical mechanisms belonging to the individual (i.e. ey or badge), information (i.e. password, numeric string, ey-phrase) and biometric characteristics (i.e. speech, finger-print, palm-print, signature) [1, 2, 3]. Compared to personal verification systems based on physical mechanisms and information, the main advantage of biometric systems is that biometric characteristics cannot be lost, stolen or forgotten [4, 5]. Furthermore, among the various biometrics, handwritten signature verification has the advantage that signature has long been established as one of the widespread means for personal verification in our daily life; it is well-recognized by legal and financial institutions and well-accepted by users [1,4,6,7]. Therefore, the field of signature verification has attracted many researchers which are interested not only to the scientific challenges but also to the valuable applications this field offers [8, 9]. Several excellent survey papers report the progress in the field of automatic signature verification [10, 11, 12, 13, 14, 15]. Recently, the extraordinary growth of the internet has augmented the interest toward automatic signature verification, as demonstrated by the creation of specific laws and regulations, approved in many countries and the attention to the standardization of signature data interchange formats by various important associations and institutes [16, 17, 18]. Therefore, along with these important results, signature verification technologies are becoming much more profitable solutions for a wide range of commercial applications such as baning, insurance, health care, ID-security, document management, e-commerce and retail point-of-sale (POS) [19, 20, 21, 22, 23]. Howeve many efforts are still necessary to perform automatic signature verification effectively. In fact, automatic signature verification is a complex tas that involves many biophysical and psychological aspects related to human behavior as well as many engineering issues [24, 25, 26, 27, 28, 29]. A handwritten signature is the result of a complex process based on a sequence of actions stored into the brain and realized by the writing system of the signer (arms and hands) through ballistic-lie movements. Thus, signatures of the same person can considerably differ depending on the physical and psychological condition of the writer. Two types of variability must be considered [9, 10]: short period and long-period variability. Short-period variability is evident on a day-to-day basis, it is mainly due to the psychological condition of the writer and on the writing conditions (posture of the write type of pen and pape size of the writing area, etc.). Longperiod variability is due to the modifications of the physical writing system of the signer as well as of the sequence of actions stored in his/her brain [10, 11]. So fa many efforts have been devoted to automatic signature verification systems using different function-based and parameter-based features as well as advanced techniques for signature comparison [9, 10, 13, 14, 15]. Anyway, whatever feature set and comparison technique is considered, the performance of signature verification systems is strictly dependent on the type and quality of information

2 used for reference and on the way in which it is organized and exploited for verification. So fa two different strategies have been addressed for reference information construction and management [30]. A first strategy uses a single prototype of genuine signatures for each write and several techniques have been proposed for the development of the optimal average prototype for a signer and for determining the optimal threshold representing the personal variability in signing, by shape and dynamic feature combination [30], time- and position-based averaging [31]. A second strategy uses a set of genuine signatures for reference. In this case a crucial problem concerns the selection, among the samples available, of the optimal subset of reference signatures that represents the signature of an individual in the best way. In fact, it is worth noting that the number of authentic signatures, acquired during the enrolment phase, is generally larger than the number of reference signatures employed in the verification process. When static signature verification is considered, the validity of the reference model is evaluated according to specific quality criterion, as for instance the intra-class variability that should be as low as possible [32, 33]. In dynamic signature verification, the selection of the best sub-set of reference signature has been determined on the basis of the stability regions in the signatures of the sub-set, determined by a well-defined index of local stability [34, 35, 36]. Of course, the selection of the best subset of reference signature can be avoided at the cost of using multiple models for signature verification [37, 38, 39], also by considering synthetic signatures generated from the existing ones by convolutions [40], elastic matching [41] and perturbations [42]. This paper presents a new approach for on-line handwritten signature verification, which exploits potential of multiple reference sets leading to diverse system behaviors. In a preliminary phase, system performance is estimated using different subsets of reference signatures extracted from the available set of authentic signatures. Subsets leading to diverse system behavior estimated by means of well-suited optimality functions - are considered for reference and used in a multi-stage verification process. The experimental result shows the potential of the proposed approach with respect to traditional strategies for reference information selection. 2. Analysis of s In this paper the analysis of different sets of genuine signatures is performed on the basis of their effectiveness, when used as reference. The process of signature verification can be considered as a function D( ), that associates a Boolean value to each input signature S i : D(S i )= G if the signature is considered to be genuine; D(S i )= F if the signature is considered to be a Of course, the signature verification process can produce two types of errors: the Type I errors - that concern with the false rejection of genuine signatures, and the Type II errors - that concern with the false acceptance of forged signatures. Therefore, the False Rejection Rate () and the False Acceptance Rate () are the most diffuse estimators of the accuracy of a signature verification system [9, 10]. In many practical applications a trade-off between the two error types must be defined since any reduction of increases, and vice-versa. For this purpose the Total (TER), that is defined as +, is also widely considered as a measure of the overall error of the system [42]. Now, let S r : { S r i i=1,2,,n r } be the set of genuine signatures available for reference and let us consider the problem concerning with the selection of the best subset of reference signatures S, from S r. Traditionally, this can be done by the analysis of the subset S TER for which the TER is minimum (see Figure 1) [42]. In other word let S g = { S g i i=1,2,,n g } and S f = { S f i i=1,2,,n f } be respectively a set of genuine and forgery signatures, the set S TER is considered as the set for which it is minimum the function where: O TER (S ) = ( + ) (1) = 1 N = 1 N g f card card g g D( Si ) = F} f f { S D( S ) = G} i i, (2). (3) Obviously, when S TER is considered, the function D TER( ), that associates to each input signature S i a Boolean value, can be rewritten as: D TER(S i )= G if the signature is considered to be genuine; D TER(S i )= F if the signature is considered to be a In this pape starting from the consideration that the characteristics of different subsets can be exploited to improve the overall verification accuracy, a two-level verification strategy is considered (see Figure 2). At the first level the following subsets are considered: S : the subset for which it is minimum the value of the optimality function O (S ) = α + β, (4) where α and β weight the cost of False Rejection Errors and False Acceptance Errors (in this case α >> β ). In this case the function D ( ), that associates to each input signature S i a Boolean value can be rewritten as: D (S i )= G if the signature is considered to be genuine; D (S i )= F if the signature is considered to be a

3 S : the subset for which it is minimum the value of the optimality function O (S ) = α + β, (5) where α and β weight the cost of False Rejection Errors and False Acceptance Errors (in this case α << β ). In this case the function D ( ), that associates to each input signature S i a Boolean value can be rewritten as: D (S i )= G if the signature is considered to be genuine; D (S i )= F if the signature is considered to be a FFR Figure 1. Single S S TER First Level Second Level S TER* Figure 2. Multiple s S Using S FFR and S the first level allows the direct verification of an input signature S i for the following cases: D (S i )= G and D (S i )= G, then S i is considered to be a genuine sample; D (S i )= F and D (S i )= F, then S i is considered to be a forged sample; Of course, the other cases must be considered through a second-level verification. For this purpose let be S g* = { S g i S g i=1,2,,n g : D (S i ) D (S i )} and S f* = { S f i S f i=1,2,,n f : D (S i ) D (S i )}, the set S TER* is considered, that is defined as the set for which it is minimum the value of the optimality function O TER* (S ) = ( * + * ) (6) where * * 1 * g g g S D( Si ) = " F" } = card (7) g* Card( S ) 1 * f f f S D( Si ) = " G" } = card (8) f * Card ( S ) Obviously, when S TER* is considered, the function D TER*( ), that associates to each input signature S i a Boolean value can be rewritten as: D TER*(S i )= G if the signature is considered to be genuine; D TER*(S i )= F if the signature is considered to be a 3. Signature Verification System The approach proposed in this paper is general and it does not depend on the specificities of the signature verification system considered. Anyway, in this wor the novel approach for multiple reference sets selection has been applied to a online signature verification system that uses very simple strategies based on velocity signals as function-features and Dynamic Time Warping for signature comparison [9, 10, 11]. Although the complete description of the system is not included in this paper (it can be found in the literature [34, 35]), some major characteristics of the system are described in the following. After signature acquisition, the raw data are preprocessed by removing the undesired initial and final sequences of coordinates. Successively the signature is normalised so that the rectangle surrounding the signature is scaled to a fixed area [34]. After preprocessing, the velocity of the tip of the pen during signing is evaluated numerically from the position signal provided by the tablet. Of course, during the training process, the features extracted from the set of reference signatures are enrolled into the personal database. In the comparison phase they are matched against those belonging to the input (test) signature by DTW. The result is used to judge the authenticity of the input signature. For this purpose, the worst dissimilarity measures obtained from the local analysis of the reference signature are used as threshold

4 values, since they are considered as a measure of personal variability in signing. Depending on the approach used for reference set selection, the following verification schemes are adopted: 1) Single reference set. In this case the verification decision for an input signature S i is performed by the traditional one-level scheme: D TER(S i )= G S i genuine D TER(S i )= F S i 2) Multiple reference sets. In this case the verification decision for an input signature S i is performed by the new two-level scheme: (first level) D FFR(S i )= G and D (S i )= G S i genuine D FFR(S i )= F and D (S i )= F S i otherwise (second level) D TER*(S i )= G S i genuine D TER*(S i )= F S i 4. Experimental Results For the experimental tests, a database has been developed by ten signers, that have collected the genuine signatures, and ten writers, that have produced the forged samples in daily writing sessions. For each write the database includes forty genuine signatures and forty silled forgeries. Writers have had time to exercise and improve their capabilities in imitating the genuine signatures. Furthermore, each signer has produced N r =10 extra signatures to be used for the selection of the best subsets of reference signatures. Of course, although the proposed approach is general, at the moment only subsets of =3 signatures have been considered. Therefore, in the analysis of the reference sets N r 10 = =120 sets of =3 3 signature each have been considered. Table I compares the performance of the system when the single reference set selected by (1) is considered (Approach 1) and when multiple reference sets selected by (4) are used (Approach 2). In the last case the woring parameters are the following: α =1, β =10, (eq. 5); α =10,β =1 (eq. 6). Although a small testing database has been considered so fa the preliminary result point out that, the approach based on multiple reference sets generally outperforms the traditional approach based on single reference. Concerning and, the new approach is superior to the traditional one respectively 9 times out of 10 and 7 times out of ten. At the best, a 100% reduction has been obtained for the of the signers n. 5, 7, 8, 9, 10; and for the of the signers 8, 9, 10. If the total system error rate - defined as + - is considered, an improvement ranging from 11.7% to 100% has been obtained set 9 times out of Conclusion This paper presents a new approach for selecting multiple sets of reference specimens for automatic signature verification. Form the analysis of different behaviours related to various sets of reference signatures, a multi-level verification strategy is proposed which uses well-selected sets of reference signatures. The experimental results, carried out in the field of dynamic signatures, demonstrate the effectiveness of the new approach. References [1] C. Vielhauer and J. Dittmann, Biometrics for User Authentication : Encyclopedia of Multimedia, ed. B. Furth, Springer-Verlag, Berlin, [2] A. Jain, R. Bolle, S. Pananti (eds), Biometrics: Personal Identification in Networed Society, Kluwer Academic Publishers, Boston, USA, [3] S. Nanavati, M. Thieme, R. Nanavati, Biometrics: Identity Verification in a Networed World, pp , Wiley, New Yor, [4] K.W. Boye V. Govindaraju, N.K. Ratha (Eds.), Special Issue on Recent Advances in Biometric Systems, IEEE Trans. on Syst., Man and Cybernetics Part B, Vol. 37, No. 5, Oct [5] S. Prabhaa J. Kittle D. Maltoni, L. O'Gorman, T. Tan (Eds.), Special Issue on Biometrics: Progress and Directions, IEEE T-PAMI, Vol. 29, No. 4, April [6] M.C. Fairhurst, New Perspectives in Automatic Signature Verification, Information Security Technical Report, Vol. 3, No. 1, 1998, pp [7] M.C. Fairhust, S. Ng, Management of access through biometric control: A case study based on automatic signature verification, Universal Access in the Information Society (UAIS), Springer-Verlag, Vol. 1, No. 1, 2001, pp [8] E. Newham, Survey: Signature Verification Technologies, Signature Verification, Elsevier Science Ltd, April 2000, pp [9] R. Plamondon, G. Lorette, Automatic Signature Verification and Writer Table I. Performance. Signer Approach 1: Single 17% 20% 18% 25% 16% 16% 9% 2% 8% 18% 17% 20% 18% 25% 16% 16% 9% 2% 8% 18% + 34% 40% 36% 50% 32% 32% 18% 4% 16% 36% Approach 2: Multiple s 5% 2.5% 22.5% 7.5% 0% 5% 0% 0% 0% 0% 25% 40% 5% 20% 20% 5% 5% 0% 0% 0% + 30% 42% 27.5% 27.5% 20% 10% 5% 0% 0% 0%

5 Identification - The State of the Art, Pattern Recognition, 1989, Vol 22(2), pp [10] F. Leclerc, R. Plamondon, Signature verification: The state of the Art , IJPRAI, 1994, Vol 8(3),pp [11] G. Dimauro, S. Impedovo, G. Pirlo, Algorithms for Automatic Signature Verification, in Handboo of Character Recognition and Document Image Analysis, World Scientific Publ., H. Bune and P. S. P. Wang (Eds.), 1997, pp [12] G. Pirlo, D. Impedovo, Automatic Signature Verification: The State of the Art, IEEE-System Man and Cybernetics Part C, 2008 (in press). [13] V. S. Nalwa, Automatic On-line Signature Verification, Proceedings of the IEEE, Vol. 85, No. 2, Feb. 1997, pp [14] G. Dimauro, S. Impedovo, M.G. Lucchese, R. Modugno, and G. Pirlo, Recent Advancements in Automatic Signature Verification, 9 th International Worshop on Frontiers in Handwriting Recognition (IWFHR-9), Kichijoji, October 25-29, [15] R. Plamondon, S.N. Srihari, On-line and off-line handwriting recognition: A Comprehensive Survey, IEEE T-PAMI, 2000, 22(1), pp [16] ANSI, Information technology Biometric Data Interchange Formats Signature/Sign Data, ANSI INCITS , [17] ISO, Information technology Biometric data interchange formats Part 7: Signature/sign time series data, ISO/IEC FCD [18] ISO Information technology Biometric data interchange formats Part 11: Signature/Sign Processed Dynamic Data, ISO/IEC WD [19] M.C. Fairhurst, Signature Verification Revisited: Promoting Practical Exploitation of Biometric Technology, IEE Electronics and Communication Engineering Journal (ECEJ), Vol. 9, No. 6, Dec. 1997, pp [20] U. Uludag, S. Pananti,S. Prabhaa A.K. Jain, Biometric Cryptosystems: Issues and Challenges, Proc. of the IEEE, Vol. 92, No. 6, June 2004, pp [21] O. Urèche and R. Plamondon, Document Transport, Transfe and Exchange, Security and Commercial Aspects, Proc. ICDAR 99, Bangalore, India, Sept. 1999, pp [22] C. Vielhaue L.C. Ferri, Applications of a hologram watermaring protocol: aging-aware biometric signature verification and time validity chec with personal documents, Proc. SPIE, Vol. 5020, Jun. 2003, pp [23] C. Vielhaue A Behavioural Biometrics, Public Service Review: European Union, 2005, No. 9, pp [24] J.-J. Brault and R. Plamondon, A Complexity Measure of Handwritten Curves: Modeling of Dynamic Signature Forgery, IEEE Transactions on Systems, Man, and Cybernetics (T-SMC), Vol. 23, No. 2, 1993, pp [25] G. Pirlo, Algorithms for Signature Verification, in Proc. of NATO-ASI Series Fundamentals in Handwriting Recognition, S. Impedovo (Ed.), Springer-Verlag, Berlin, 1994, pp [26] R. Plamondon, A Kinematic Theory of Rapid Human Movements: Part I: Movement Representation and generation, Biological Cybernetics, Vol. 72, No. 4, 1995, pp [27] R. Plamondon, A Kinematic Theory of Rapid Human Movements: Part II: Movement Time and Control, Biological Cybernetics, Vol. 72, No. 4, 1995, pp [28] R. Plamondon, A Kinematic Theory of Rapid Human Movements: Part III: Kinetic Outcomes, Biological Cybernetics, Jan [29] R. Plamondon, W. Guerfali, The generation of handwriting with deltalognormal synergies, Biological Cybernetics, 1998, Vol. 78 (2), pp [30] C. Schmidt and K.-F. Kraiss, Establishment of Personalized Templates for Automatic Signature Verification, 4 th International Conference on Document Analysis and Recognition (ICDAR-4), IEEE Computer Society, Ulm, Germany, Vol. I, Aug. 1997, pp [31] B. Wirtz, Average Prototypes for Stroe-Based Signature Verification, 4 th International Conference on Document Analysis and Recognition (ICDAR-4), IEEE Computer Society Press, Ulm, Germany, Vol. I, Aug. 1997, pp [32] C. Allgrove and M.C. Fairhurst, Enrolment model stability in static signature verification, 7 th International Worshop on Frontiers in Handwriting Recognition (IWFHR-7), L.R.B. Schomaer and L.G. Vuurpijl (Eds.), Amsterdam, The Netherlands, September 2000, pp [33] M.C. Fairhurst, Signature Verification Revisited: Promoting Practical Exploitation of Biometric Technology, IEE Electronics and Communication Engineering Journal (ECEJ), Vol. 9, No. 6, Dec. 1997, pp [34] G. Congedo, G. Dimauro, A.M. Forte, S. Impedovo, G. Pirlo, Selecting Reference Signatures for On-Line Signature Verification, 8 th International Conference on Image Analysis and Processing (ICIAP-8), Series: Lecture Notes in Computer Science, Vol. 974, Springer-Verlag Berlin, Heidelberg, C. Braccini, L. De Floriani and G. Vernazza (Eds.), San Remo, Italy, Sept. 1995, pp [35] V. Di Lecce, G. Dimauro, A. Guerriero, S. Impedovo, G. Pirlo, A. Salzo, L. Sarcinella, Selection of Reference Signatures for Automatic Signature Verification, 5 th International Conference on Document Analysis and Recognition (ICDAR-5), Bangalore, India, Sept , 1999, pp [36] R. Kashi and W.L. Nelson, Signature Verification: Benefits of Multiple Tries, 8 th International Worshop on Frontiers in Handwriting Recognition (IWFHR-8), Niagara-on-the-Lae Ontario, Canada, Aug. 2002, pp [37] Mingming Ma, W.S. Wijesoma, Automatic online signature verification based on multiple models, IEEE/IAFE/INFORMS Conference on Computational Intelligence for Financial Engineering, 2000, pp [38] Mingming Ma, W.S. Wijesoma and Eric Sung, An automatic on-line signature verification system based on three models, Canadian Conference on Elect. and Comp. Eng., 2000, pp [39] C. de Oliveira, C.A A Kaestne Flávio Bortolozzi e Robert Sabourin, Generation of Signatures by Deformations, Proc. BSDIA, [40] B. Fang and Y.Y. Tang, Reduction of Feature Statistics Estimation Error for Small Training Sample Size in Off-Line Signature Verification, ICBA 2004, LNCS 3072, Springer-Verlag Berlin Heidelberg, D. Zhang and A.K. Jain (Eds.), 2004, pp [41] K. Huang and H. Yan, Off-line signature verification based on geometric feature extraction and neural networ classification, Pattern Recognition, Vol. 30, Issue 1, Jan. 1997, pp [42] B.Wirtz, Technical Evaluation of Biometric Systems, ACCU'98, Hong Kong, [43] G. Dimauro, S. Impedovo, G. Pirlo, G. Congedo, Signature Verification through a Dynamical Segmentation technique, Proc. 3th IWFHR, 1993, NY, USA, pp

SVC2004: First International Signature Verification Competition

SVC2004: First International Signature Verification Competition SVC2004: First International Signature Verification Competition Dit-Yan Yeung 1, Hong Chang 1, Yimin Xiong 1, Susan George 2, Ramanujan Kashi 3, Takashi Matsumoto 4, and Gerhard Rigoll 5 1 Hong Kong University

More information

IMPACT OF SIGNATURE LEGIBILITY AND SIGNATURE TYPE IN OFF-LINE SIGNATURE VERIFICATION.

IMPACT OF SIGNATURE LEGIBILITY AND SIGNATURE TYPE IN OFF-LINE SIGNATURE VERIFICATION. IMPACT OF SIGNATURE LEGIBILITY AND SIGNATURE TYPE IN OFF-LINE SIGNATURE VERIFICATION F. Alonso-Fernandez a, M.C. Fairhurst b, J. Fierrez a and J. Ortega-Garcia a. a Biometric Recognition Group - ATVS,

More information

The Use of Static Biometric Signature Data from Public Service Forms

The Use of Static Biometric Signature Data from Public Service Forms The Use of Static Biometric Signature Data from Public Service Forms Emma Johnson and Richard Guest School of Engineering and Digital Arts, University of Kent, Canterbury, UK {ej45,r.m.guest}@kent.ac.uk

More information

Offline Signature Verification for Cheque Authentication Using Different Technique

Offline Signature Verification for Cheque Authentication Using Different Technique Offline Signature Verification for Cheque Authentication Using Different Technique Dr. Balaji Gundappa Hogade 1, Yogita Praful Gawde 2 1 Research Scholar, NMIMS, MPSTME, Associate Professor, TEC, Navi

More information

Classification of Features into Strong and Weak Features for an Intelligent Online Signature Verification System

Classification of Features into Strong and Weak Features for an Intelligent Online Signature Verification System Classification of Features into Strong and Weak Features for an Intelligent Online Signature Verification System Saad Tariq, Saqib Sarwar & Waqar Hussain Department of Electrical Engineering Air University

More information

Biometric Recognition: How Do I Know Who You Are?

Biometric Recognition: How Do I Know Who You Are? Biometric Recognition: How Do I Know Who You Are? Anil K. Jain Department of Computer Science and Engineering, 3115 Engineering Building, Michigan State University, East Lansing, MI 48824, USA jain@cse.msu.edu

More information

Static Signature Verification and Recognition using Neural Network Approach-A Survey

Static Signature Verification and Recognition using Neural Network Approach-A Survey Available online www.ejaet.com European Journal of Advances in Engineering and Technology, 2015, 2(4): 46-50 Review Article ISSN: 2394-658X Static Signature Verification and Recognition using Neural Network

More information

Evaluating the Biometric Sample Quality of Handwritten Signatures

Evaluating the Biometric Sample Quality of Handwritten Signatures Evaluating the Biometric Sample Quality of Handwritten Signatures Sascha Müller 1 and Olaf Henniger 2 1 Technische Universität Darmstadt, Darmstadt, Germany mueller@sec.informatik.tu-darmstadt.de 2 Fraunhofer

More information

Evaluation of Online Signature Verification Features

Evaluation of Online Signature Verification Features Evaluation of Online Signature Verification Features Ghazaleh Taherzadeh*, Roozbeh Karimi*, Alireza Ghobadi*, Hossein Modaberan Beh** * Faculty of Information Technology Multimedia University, Selangor,

More information

Nikhil Gupta *1, Dr Rakesh Dhiman 2 ABSTRACT I. INTRODUCTION

Nikhil Gupta *1, Dr Rakesh Dhiman 2 ABSTRACT I. INTRODUCTION International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 6 ISSN : 2456-3307 An Offline Handwritten Signature Verification Using

More information

Classification of Handwritten Signatures Based on Name Legibility

Classification of Handwritten Signatures Based on Name Legibility Classification of Handwritten Signatures Based on Name Legibility Javier Galbally, Julian Fierrez and Javier Ortega-Garcia Biometrics Research Lab./ATVS, EPS, Universidad Autonoma de Madrid, Campus de

More information

Algorithm for Detection and Elimination of False Minutiae in Fingerprint Images

Algorithm for Detection and Elimination of False Minutiae in Fingerprint Images Algorithm for Detection and Elimination of False Minutiae in Fingerprint Images Seonjoo Kim, Dongjae Lee, and Jaihie Kim Department of Electrical and Electronics Engineering,Yonsei University, Seoul, Korea

More information

Complexity-based Biometric Signature Verification

Complexity-based Biometric Signature Verification Complexity-based Biometric Signature Verification Ruben Tolosana, Ruben Vera-Rodriguez, Richard Guest, Julian Fierrez and Javier Ortega-Garcia Biometrics and Data Pattern Analytics (BiDA) Lab - ATVS, Escuela

More information

Proposed Method for Off-line Signature Recognition and Verification using Neural Network

Proposed Method for Off-line Signature Recognition and Verification using Neural Network e-issn: 2349-9745 p-issn: 2393-8161 Scientific Journal Impact Factor (SJIF): 1.711 International Journal of Modern Trends in Engineering and Research www.ijmter.com Proposed Method for Off-line Signature

More information

Analysis of Stability in Static Signatures using Cosine Similarity

Analysis of Stability in Static Signatures using Cosine Similarity 202 International Conference on Frontier in Handwriting Recognition Analyi of in Static Signature uing Coine Similarity D. Impedovo, G. Pirlo, L. Sarcinella, E. Staolla, C. A. Trullo Dipartimento di Informatica

More information

DETECTING OFF-LINE SIGNATURE MODEL USING WIDE AND NARROW VARIETY CLASS OF LOCAL FEATURE

DETECTING OFF-LINE SIGNATURE MODEL USING WIDE AND NARROW VARIETY CLASS OF LOCAL FEATURE DETECTING OFF-LINE SIGNATURE MODEL USING WIDE AND NARROW VARIETY CLASS OF LOCAL FEATURE Agung Sediyono 1 and YaniNur Syamsu 2 1 Universitas Trisakti, Indonesia, trisakti_agung06@yahoo.com 2 LabFor Polda

More information

Online handwritten signature verification system: A Review

Online handwritten signature verification system: A Review Online handwritten signature verification system: A Review Abstract: Online handwritten signature verification system is one of the most reliable, fast and cost effective tool for user authentication.

More information

Signature verification revisited:

Signature verification revisited: Signature verification revisited: promoting practical exploitation of biometric technology by MI C. Fairhurst Despite research over a long period, biometric approaches to authenticating personal identity

More information

Effective and Efficient Fingerprint Image Postprocessing

Effective and Efficient Fingerprint Image Postprocessing Effective and Efficient Fingerprint Image Postprocessing Haiping Lu, Xudong Jiang and Wei-Yun Yau Laboratories for Information Technology 21 Heng Mui Keng Terrace, Singapore 119613 Email: hplu@lit.org.sg

More information

Segmentation of Fingerprint Images

Segmentation of Fingerprint Images Segmentation of Fingerprint Images Asker M. Bazen and Sabih H. Gerez University of Twente, Department of Electrical Engineering, Laboratory of Signals and Systems, P.O. box 217-75 AE Enschede - The Netherlands

More information

A New Fake Iris Detection Method

A New Fake Iris Detection Method A New Fake Iris Detection Method Xiaofu He 1, Yue Lu 1, and Pengfei Shi 2 1 Department of Computer Science and Technology, East China Normal University, Shanghai 200241, China {xfhe,ylu}@cs.ecnu.edu.cn

More information

A Novel Algorithm for Hand Vein Recognition Based on Wavelet Decomposition and Mean Absolute Deviation

A Novel Algorithm for Hand Vein Recognition Based on Wavelet Decomposition and Mean Absolute Deviation Sensors & Transducers, Vol. 6, Issue 2, December 203, pp. 53-58 Sensors & Transducers 203 by IFSA http://www.sensorsportal.com A Novel Algorithm for Hand Vein Recognition Based on Wavelet Decomposition

More information

An Offline Handwritten Signature Verification System - A Comprehensive Review

An Offline Handwritten Signature Verification System - A Comprehensive Review An Offline Handwritten Signature Verification System - A Comprehensive Review Ms. Deepti Joon 1, Ms. Shaloo Kikon 2 1 M. Tech. Scholar, Dept. of ECE, P.D.M. College of Engineering, Bahadurgarh, Haryana

More information

Development of a Biometric Testing Protocol for Dynamic Signature Verification

Development of a Biometric Testing Protocol for Dynamic Signature Verification 1 Development of a Biometric Testing Protocol for Dynamic Signature Verification Stephen J. Elliott Abstract-- This paper accounts the testing protocols used at the author's university. It examines the

More information

Writer identification clustering letters with unknown authors

Writer identification clustering letters with unknown authors Writer identification clustering letters with unknown authors Joanna Putz-Leszczynska To cite this version: Joanna Putz-Leszczynska. Writer identification clustering letters with unknown authors. 17th

More information

An Enhanced Biometric System for Personal Authentication

An Enhanced Biometric System for Personal Authentication IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735. Volume 6, Issue 3 (May. - Jun. 2013), PP 63-69 An Enhanced Biometric System for Personal Authentication

More information

MULTIMODAL BIOMETRIC SYSTEMS STUDY TO IMPROVE ACCURACY AND PERFORMANCE

MULTIMODAL BIOMETRIC SYSTEMS STUDY TO IMPROVE ACCURACY AND PERFORMANCE MULTIMODAL BIOMETRIC SYSTEMS STUDY TO IMPROVE ACCURACY AND PERFORMANCE K.Sasidhar 1, Vijaya L Kakulapati 2, Kolikipogu Ramakrishna 3 & K.KailasaRao 4 1 Department of Master of Computer Applications, MLRCET,

More information

Real time verification of Offline handwritten signatures using K-means clustering

Real time verification of Offline handwritten signatures using K-means clustering Real time verification of Offline handwritten signatures using K-means clustering Alpana Deka 1, Lipi B. Mahanta 2* 1 Department of Computer Science, NERIM Group of Institutions, Guwahati, Assam, India

More information

Shape Representation Robust to the Sketching Order Using Distance Map and Direction Histogram

Shape Representation Robust to the Sketching Order Using Distance Map and Direction Histogram Shape Representation Robust to the Sketching Order Using Distance Map and Direction Histogram Kiwon Yun, Junyeong Yang, and Hyeran Byun Dept. of Computer Science, Yonsei University, Seoul, Korea, 120-749

More information

IRIS Biometric for Person Identification. By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology

IRIS Biometric for Person Identification. By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology IRIS Biometric for Person Identification By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology What are Biometrics? Why are Biometrics used? How Biometrics is today? Iris Iris is the area

More information

ADVANCES IN DIGITAL HANDWRITTEN SIGNATURE PROCESSING

ADVANCES IN DIGITAL HANDWRITTEN SIGNATURE PROCESSING ADVANCES IN DIGITAL HANDWRITTEN SIGNATURE PROCESSING A Human Artefact for e-society This page intentionally left blank ADVANCES IN DIGITAL HANDWRITTEN SIGNATURE PROCESSING A Human Artefact for e-society

More information

A comparative study of different feature sets for recognition of handwritten Arabic numerals using a Multi Layer Perceptron

A comparative study of different feature sets for recognition of handwritten Arabic numerals using a Multi Layer Perceptron Proc. National Conference on Recent Trends in Intelligent Computing (2006) 86-92 A comparative study of different feature sets for recognition of handwritten Arabic numerals using a Multi Layer Perceptron

More information

Pixel Based Off-line Signature Verification System

Pixel Based Off-line Signature Verification System Research Paper American Journal of Engineering Research (AJER) e-issn : 2320-0847 p-issn : 2320-0936 Volume-04, Issue-01, pp-187-192 www.ajer.org Open Access Pixel Based Off-line Signature Verification

More information

Feature Extraction Techniques for Dorsal Hand Vein Pattern

Feature Extraction Techniques for Dorsal Hand Vein Pattern Feature Extraction Techniques for Dorsal Hand Vein Pattern Pooja Ramsoful, Maleika Heenaye-Mamode Khan Department of Computer Science and Engineering University of Mauritius Mauritius pooja.ramsoful@umail.uom.ac.mu,

More information

A new seal verification for Chinese color seal

A new seal verification for Chinese color seal Edith Cowan University Research Online ECU Publications 2011 2011 A new seal verification for Chinese color seal Zhihu Huang Jinsong Leng Edith Cowan University 10.4028/www.scientific.net/AMM.58-60.2558

More information

Content Based Image Retrieval Using Color Histogram

Content Based Image Retrieval Using Color Histogram Content Based Image Retrieval Using Color Histogram Nitin Jain Assistant Professor, Lokmanya Tilak College of Engineering, Navi Mumbai, India. Dr. S. S. Salankar Professor, G.H. Raisoni College of Engineering,

More information

A Cryptosystem With Private Key Generation From Dynamic Properties of Human Hand Signature

A Cryptosystem With Private Key Generation From Dynamic Properties of Human Hand Signature A Cryptosystem With Private Key Generation From Dynamic Properties of Human Hand Signature HAO FENG School of Electrical & Electronic Engineering A thesis submitted to the Nanyang Technological University

More information

About user acceptance in hand, face and signature biometric systems

About user acceptance in hand, face and signature biometric systems About user acceptance in hand, face and signature biometric systems Aythami Morales, Miguel A. Ferrer, Carlos M. Travieso, Jesús B. Alonso Instituto Universitario para el Desarrollo Tecnológico y la Innovación

More information

Analyzing features learned for Offline Signature Verification using Deep CNNs

Analyzing features learned for Offline Signature Verification using Deep CNNs Accepted as a conference paper for ICPR 2016 Analyzing features learned for Offline Signature Verification using Deep CNNs Luiz G. Hafemann, Robert Sabourin Lab. d imagerie, de vision et d intelligence

More information

Image Forgery Detection Using Svm Classifier

Image Forgery Detection Using Svm Classifier Image Forgery Detection Using Svm Classifier Anita Sahani 1, K.Srilatha 2 M.E. Student [Embedded System], Dept. Of E.C.E., Sathyabama University, Chennai, India 1 Assistant Professor, Dept. Of E.C.E, Sathyabama

More information

Punjabi Offline Signature Verification System Using Neural Network

Punjabi Offline Signature Verification System Using Neural Network International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 8958, Volume-3, Issue-2, December 2013 Punjabi Offline Signature Verification System Using Neural Network Rimpi Suman, Dinesh

More information

Empirical Evidence for Correct Iris Match Score Degradation with Increased Time-Lapse between Gallery and Probe Matches

Empirical Evidence for Correct Iris Match Score Degradation with Increased Time-Lapse between Gallery and Probe Matches Empirical Evidence for Correct Iris Match Score Degradation with Increased Time-Lapse between Gallery and Probe Matches Sarah E. Baker, Kevin W. Bowyer, and Patrick J. Flynn University of Notre Dame {sbaker3,kwb,flynn}@cse.nd.edu

More information

License Plate Localisation based on Morphological Operations

License Plate Localisation based on Morphological Operations License Plate Localisation based on Morphological Operations Xiaojun Zhai, Faycal Benssali and Soodamani Ramalingam School of Engineering & Technology University of Hertfordshire, UH Hatfield, UK Abstract

More information

Integrated Digital System for Yarn Surface Quality Evaluation using Computer Vision and Artificial Intelligence

Integrated Digital System for Yarn Surface Quality Evaluation using Computer Vision and Artificial Intelligence Integrated Digital System for Yarn Surface Quality Evaluation using Computer Vision and Artificial Intelligence Sheng Yan LI, Jie FENG, Bin Gang XU, and Xiao Ming TAO Institute of Textiles and Clothing,

More information

Biometric Authentication for secure e-transactions: Research Opportunities and Trends

Biometric Authentication for secure e-transactions: Research Opportunities and Trends Biometric Authentication for secure e-transactions: Research Opportunities and Trends Fahad M. Al-Harby College of Computer and Information Security Naif Arab University for Security Sciences (NAUSS) fahad.alharby@nauss.edu.sa

More information

An Efficient Approach for Iris Recognition by Improving Iris Segmentation and Iris Image Compression

An Efficient Approach for Iris Recognition by Improving Iris Segmentation and Iris Image Compression An Efficient Approach for Iris Recognition by Improving Iris Segmentation and Iris Image Compression K. N. Jariwala, SVNIT, Surat, India U. D. Dalal, SVNIT, Surat, India Abstract The biometric person authentication

More information

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN IJSER

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN IJSER International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December-2016 192 A Novel Approach For Face Liveness Detection To Avoid Face Spoofing Attacks Meenakshi Research Scholar,

More information

Fingerprint Combination for Privacy Protection

Fingerprint Combination for Privacy Protection Fingerprint Combination for Privacy Protection Mr. Bharat V Warude, Prof. S.K.Bhatia ME Student, Assistant Professor Department of Electronics and Telecommunication JSPM s ICOER, Wagholi, Pune India Abstract

More information

Specific Sensors for Face Recognition

Specific Sensors for Face Recognition Specific Sensors for Face Recognition Walid Hizem, Emine Krichen, Yang Ni, Bernadette Dorizzi, and Sonia Garcia-Salicetti Département Electronique et Physique, Institut National des Télécommunications,

More information

Proceedings of the 2014 Federated Conference on Computer Science and Information Systems pp

Proceedings of the 2014 Federated Conference on Computer Science and Information Systems pp Proceedings of the 204 Federated Conference on Computer Science and Information Systems pp. 70 708 DOI: 0.5439/204F59 ACSIS, Vol. 2 Handwritten Signature Verification with 2D Color Barcodes Marco Querini,

More information

Context-Aware Interaction in a Mobile Environment

Context-Aware Interaction in a Mobile Environment Context-Aware Interaction in a Mobile Environment Daniela Fogli 1, Fabio Pittarello 2, Augusto Celentano 2, and Piero Mussio 1 1 Università degli Studi di Brescia, Dipartimento di Elettronica per l'automazione

More information

Iris Recognition using Hamming Distance and Fragile Bit Distance

Iris Recognition using Hamming Distance and Fragile Bit Distance IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 06, 2015 ISSN (online): 2321-0613 Iris Recognition using Hamming Distance and Fragile Bit Distance Mr. Vivek B. Mandlik

More information

Postprint.

Postprint. http://www.diva-portal.org Postprint This is the accepted version of a paper presented at IEEE Intl. Conf. on Control, Automation, Robotics and Vision, ICARCV, Special Session on Biometrics, Singapore,

More information

Image Averaging for Improved Iris Recognition

Image Averaging for Improved Iris Recognition Image Averaging for Improved Iris Recognition Karen P. Hollingsworth, Kevin W. Bowyer, and Patrick J. Flynn University of Notre Dame Abstract. We take advantage of the temporal continuity in an iris video

More information

Authenticated Document Management System

Authenticated Document Management System Authenticated Document Management System P. Anup Krishna Research Scholar at Bharathiar University, Coimbatore, Tamilnadu Dr. Sudheer Marar Head of Department, Faculty of Computer Applications, Nehru College

More information

3 Department of Computer science and Application, Kurukshetra University, Kurukshetra, India

3 Department of Computer science and Application, Kurukshetra University, Kurukshetra, India Minimizing Sensor Interoperability Problem using Euclidean Distance Himani 1, Parikshit 2, Dr.Chander Kant 3 M.tech Scholar 1, Assistant Professor 2, 3 1,2 Doon Valley Institute of Engineering and Technology,

More information

Apply Multi-Layer Perceptrons Neural Network for Off-line signature verification and recognition

Apply Multi-Layer Perceptrons Neural Network for Off-line signature verification and recognition www.ijcsi.org 261 Apply Multi-Layer Perceptrons eural etwork for Off-line signature verification and recognition Suhail Odeh and Manal Khalil Computer And Information Systems Department, Bethlehem University

More information

Touchless Fingerprint Recognization System

Touchless Fingerprint Recognization System e-issn 2455 1392 Volume 2 Issue 4, April 2016 pp. 501-505 Scientific Journal Impact Factor : 3.468 http://www.ijcter.com Touchless Fingerprint Recognization System Biju V. G 1., Anu S Nair 2, Albin Joseph

More information

EFFICIENT ATTENDANCE MANAGEMENT SYSTEM USING FACE DETECTION AND RECOGNITION

EFFICIENT ATTENDANCE MANAGEMENT SYSTEM USING FACE DETECTION AND RECOGNITION EFFICIENT ATTENDANCE MANAGEMENT SYSTEM USING FACE DETECTION AND RECOGNITION 1 Arun.A.V, 2 Bhatath.S, 3 Chethan.N, 4 Manmohan.C.M, 5 Hamsaveni M 1,2,3,4,5 Department of Computer Science and Engineering,

More information

Biometric Signature for Mobile Devices

Biometric Signature for Mobile Devices Chapter 13 Biometric Signature for Mobile Devices Maria Villa and Abhishek Verma CONTENTS 13.1 Biometric Signature Recognition 309 13.2 Introduction 310 13.2.1 How Biometric Signature Works 310 13.2.2

More information

Integrated Detection and Tracking in Multistatic Sonar

Integrated Detection and Tracking in Multistatic Sonar Stefano Coraluppi Reconnaissance, Surveillance, and Networks Department NATO Undersea Research Centre Viale San Bartolomeo 400 19138 La Spezia ITALY coraluppi@nurc.nato.int ABSTRACT An ongoing research

More information

Stamp detection in scanned documents

Stamp detection in scanned documents Annales UMCS Informatica AI X, 1 (2010) 61-68 DOI: 10.2478/v10065-010-0036-6 Stamp detection in scanned documents Paweł Forczmański Chair of Multimedia Systems, West Pomeranian University of Technology,

More information

Introduction to Biometrics 1

Introduction to Biometrics 1 Introduction to Biometrics 1 Gerik Alexander v.graevenitz von Graevenitz Biometrics, Bonn, Germany May, 14th 2004 Introduction to Biometrics Biometrics refers to the automatic identification of a living

More information

Computational Intelligence in Digital Forensics: Forensic Investigation and Applications

Computational Intelligence in Digital Forensics: Forensic Investigation and Applications Signature-Based Biometric Authentication Author Pal, Srikanta, Pal, Umapada, Blumenstein, Michael Published 2014 Book Title Computational Intelligence in Digital Forensics: Forensic Investigation and Applications

More information

An Hybrid MLP-SVM Handwritten Digit Recognizer

An Hybrid MLP-SVM Handwritten Digit Recognizer An Hybrid MLP-SVM Handwritten Digit Recognizer A. Bellili ½ ¾ M. Gilloux ¾ P. Gallinari ½ ½ LIP6, Université Pierre et Marie Curie ¾ La Poste 4, Place Jussieu 10, rue de l Ile Mabon, BP 86334 75252 Paris

More information

Software Development Kit to Verify Quality Iris Images

Software Development Kit to Verify Quality Iris Images Software Development Kit to Verify Quality Iris Images Isaac Mateos, Gualberto Aguilar, Gina Gallegos Sección de Estudios de Posgrado e Investigación Culhuacan, Instituto Politécnico Nacional, México D.F.,

More information

An Algorithm for Fingerprint Image Postprocessing

An Algorithm for Fingerprint Image Postprocessing An Algorithm for Fingerprint Image Postprocessing Marius Tico, Pauli Kuosmanen Tampere University of Technology Digital Media Institute EO.BOX 553, FIN-33101, Tampere, FINLAND tico@cs.tut.fi Abstract Most

More information

Preprocessing and postprocessing for skeleton-based fingerprint minutiae extraction

Preprocessing and postprocessing for skeleton-based fingerprint minutiae extraction Pattern Recognition 40 (2007) 1270 1281 www.elsevier.com/locate/pr Preprocessing and postprocessing for skeleton-based fingerprint minutiae extraction Feng Zhao, Xiaoou Tang Department of Information Engineering,

More information

Biometric Recognition Techniques

Biometric Recognition Techniques Biometric Recognition Techniques Anjana Doshi 1, Manisha Nirgude 2 ME Student, Computer Science and Engineering, Walchand Institute of Technology Solapur, India 1 Asst. Professor, Information Technology,

More information

A Novel Region Based Liveness Detection Approach for Fingerprint Scanners

A Novel Region Based Liveness Detection Approach for Fingerprint Scanners A Novel Region Based Liveness Detection Approach for Fingerprint Scanners Brian DeCann, Bozhao Tan, and Stephanie Schuckers Clarkson University, Potsdam, NY 13699 USA {decannbm,tanb,sschucke}@clarkson.edu

More information

Haptic-Based Biometrics: A Feasibility Study

Haptic-Based Biometrics: A Feasibility Study Haptic-Based Biometrics: A Feasibility Study Yednek Asfaw, Mauricio Orozco, Shervin Shirmohammadi, Andy Adler, and Abdulmotaleb El Saddik School of Information Technology and Engineering University of

More information

Biometrics - A Tool in Fraud Prevention

Biometrics - A Tool in Fraud Prevention Biometrics - A Tool in Fraud Prevention Agenda Authentication Biometrics : Need, Available Technologies, Working, Comparison Fingerprint Technology About Enrollment, Matching and Verification Key Concepts

More information

Iris Recognition using Histogram Analysis

Iris Recognition using Histogram Analysis Iris Recognition using Histogram Analysis Robert W. Ives, Anthony J. Guidry and Delores M. Etter Electrical Engineering Department, U.S. Naval Academy Annapolis, MD 21402-5025 Abstract- Iris recognition

More information

UTSig: A Persian Offline Signature Dataset

UTSig: A Persian Offline Signature Dataset UTSig: A Persian Offline Signature Dataset Amir Soleimani 1*, Kazim Fouladi 2, Babak N. Araabi 1, 3 1 Control and Intelligent Processing Center of Excellence, School of Electrical and Computer Engineering,

More information

Iris Segmentation & Recognition in Unconstrained Environment

Iris Segmentation & Recognition in Unconstrained Environment www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Issue -8 August, 2014 Page No. 7514-7518 Iris Segmentation & Recognition in Unconstrained Environment ABSTRACT

More information

ISSN Vol.02,Issue.17, November-2013, Pages:

ISSN Vol.02,Issue.17, November-2013, Pages: www.semargroups.org, www.ijsetr.com ISSN 2319-8885 Vol.02,Issue.17, November-2013, Pages:1973-1977 A Novel Multimodal Biometric Approach of Face and Ear Recognition using DWT & FFT Algorithms K. L. N.

More information

Online Signature Verification on Mobile Devices

Online Signature Verification on Mobile Devices IJSTE - International Journal of Science Technology & Engineering Volume 2 Issue 10 April 2016 ISSN (online): 2349-784X Online Signature Verification on Mobile Devices Miss. Hude. Kalyani. A. Miss. Khande

More information

Audio Fingerprinting using Fractional Fourier Transform

Audio Fingerprinting using Fractional Fourier Transform Audio Fingerprinting using Fractional Fourier Transform Swati V. Sutar 1, D. G. Bhalke 2 1 (Department of Electronics & Telecommunication, JSPM s RSCOE college of Engineering Pune, India) 2 (Department,

More information

Palm Vein Recognition System using Directional Coding and Back-propagation Neural Network

Palm Vein Recognition System using Directional Coding and Back-propagation Neural Network , October 21-23, 2015, San Francisco, USA Palm Vein Recognition System using Directional Coding and Back-propagation Neural Network Mark Erwin C. Villariña and Noel B. Linsangan, Member, IAENG Abstract

More information

International Conference on Innovative Applications in Engineering and Information Technology(ICIAEIT-2017)

International Conference on Innovative Applications in Engineering and Information Technology(ICIAEIT-2017) Sparsity Inspired Selection and Recognition of Iris Images 1. Dr K R Badhiti, Assistant Professor, Dept. of Computer Science, Adikavi Nannaya University, Rajahmundry, A.P, India 2. Prof. T. Sudha, Dept.

More information

Incorporating Touch Biometrics to Mobile One-Time Passwords: Exploration of Digits

Incorporating Touch Biometrics to Mobile One-Time Passwords: Exploration of Digits Incorporating Touch Biometrics to Mobile One-Time Passwords: Exploration of Digits Ruben Tolosana, Ruben Vera-Rodriguez, Julian Fierrez and Javier Ortega-Garcia Biometrics and Data Pattern Analtics (BiDA)

More information

Enhanced MLP Input-Output Mapping for Degraded Pattern Recognition

Enhanced MLP Input-Output Mapping for Degraded Pattern Recognition Enhanced MLP Input-Output Mapping for Degraded Pattern Recognition Shigueo Nomura and José Ricardo Gonçalves Manzan Faculty of Electrical Engineering, Federal University of Uberlândia, Uberlândia, MG,

More information

A novel method to generate Brute-Force Signature Forgeries

A novel method to generate Brute-Force Signature Forgeries A novel method to generate Brute-Force Signature Forgeries DIUF-RR 274 06-09 Alain Wahl 1 Jean Hennebert 2 Andreas Humm 3 Rolf Ingold 4 June 12, 2006 Department of Informatics Research Report Département

More information

THE Touchless SDK released by Microsoft provides the

THE Touchless SDK released by Microsoft provides the 1 Touchless Writer: Object Tracking & Neural Network Recognition Yang Wu & Lu Yu The Milton W. Holcombe Department of Electrical and Computer Engineering Clemson University, Clemson, SC 29631 E-mail {wuyang,

More information

http://www.diva-portal.org This is the published version of a paper presented at SAI Annual Conference on Areas of Intelligent Systems and Artificial Intelligence and their Applications to the Real World

More information

TIMIT LMS LMS. NoisyNA

TIMIT LMS LMS. NoisyNA TIMIT NoisyNA Shi NoisyNA Shi (NoisyNA) shi A ICA PI SNIR [1]. S. V. Vaseghi, Advanced Digital Signal Processing and Noise Reduction, Second Edition, John Wiley & Sons Ltd, 2000. [2]. M. Moonen, and A.

More information

Open Access An Improved Character Recognition Algorithm for License Plate Based on BP Neural Network

Open Access An Improved Character Recognition Algorithm for License Plate Based on BP Neural Network Send Orders for Reprints to reprints@benthamscience.ae 202 The Open Electrical & Electronic Engineering Journal, 2014, 8, 202-207 Open Access An Improved Character Recognition Algorithm for License Plate

More information

Handwritten Character Recognition using Different Kernel based SVM Classifier and MLP Neural Network (A COMPARISON)

Handwritten Character Recognition using Different Kernel based SVM Classifier and MLP Neural Network (A COMPARISON) Handwritten Character Recognition using Different Kernel based SVM Classifier and MLP Neural Network (A COMPARISON) Parveen Kumar Department of E.C.E Lecturer, NCCE Israna Nitin Sharma Department of E.C.E

More information

FEASIBILITY STUDY OF PHOTOPLETHYSMOGRAPHIC SIGNALS FOR BIOMETRIC IDENTIFICATION. Petros Spachos, Jiexin Gao and Dimitrios Hatzinakos

FEASIBILITY STUDY OF PHOTOPLETHYSMOGRAPHIC SIGNALS FOR BIOMETRIC IDENTIFICATION. Petros Spachos, Jiexin Gao and Dimitrios Hatzinakos FEASIBILITY STUDY OF PHOTOPLETHYSMOGRAPHIC SIGNALS FOR BIOMETRIC IDENTIFICATION Petros Spachos, Jiexin Gao and Dimitrios Hatzinakos The Edward S. Rogers Sr. Department of Electrical and Computer Engineering,

More information

An Overview of Biometrics. Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University

An Overview of Biometrics. Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University An Overview of Biometrics Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University What are Biometrics? Biometrics refers to identification of humans by their characteristics or traits Physical

More information

Online Signature Verification by Using FPGA

Online Signature Verification by Using FPGA Online Signature Verification by Using FPGA D.Sandeep Assistant Professor, Department of ECE, Vignan Institute of Technology & Science, Telangana, India. ABSTRACT: The main aim of this project is used

More information

The Role of Biometrics in Virtual Communities. and Digital Governments

The Role of Biometrics in Virtual Communities. and Digital Governments The Role of Biometrics in Virtual Communities and Digital Governments Chang-Tsun Li Department of Computer Science University of Warwick Coventry CV4 7AL UK Tel: +44 24 7657 3794 Fax: +44 24 7657 3024

More information

International Conference on Advances in Engineering & Technology 2014 (ICAET-2014) 48 Page

International Conference on Advances in Engineering & Technology 2014 (ICAET-2014) 48 Page Analysis of Visual Cryptography Schemes Using Adaptive Space Filling Curve Ordered Dithering V.Chinnapudevi 1, Dr.M.Narsing Yadav 2 1.Associate Professor, Dept of ECE, Brindavan Institute of Technology

More information

On The Correlation of Image Size to System Accuracy in Automatic Fingerprint Identification Systems

On The Correlation of Image Size to System Accuracy in Automatic Fingerprint Identification Systems On The Correlation of Image Size to System Accuracy in Automatic Fingerprint Identification Systems J.K. Schneider, C. E. Richardson, F.W. Kiefer, and Venu Govindaraju Ultra-Scan Corporation, 4240 Ridge

More information

3D Face Recognition in Biometrics

3D Face Recognition in Biometrics 3D Face Recognition in Biometrics CHAO LI, ARMANDO BARRETO Electrical & Computer Engineering Department Florida International University 10555 West Flagler ST. EAS 3970 33174 USA {cli007, barretoa}@fiu.edu

More information

Design a Model and Algorithm for multi Way Gesture Recognition using Motion and Image Comparison

Design a Model and Algorithm for multi Way Gesture Recognition using Motion and Image Comparison e-issn 2455 1392 Volume 2 Issue 10, October 2016 pp. 34 41 Scientific Journal Impact Factor : 3.468 http://www.ijcter.com Design a Model and Algorithm for multi Way Gesture Recognition using Motion and

More information

A Review of Optical Character Recognition System for Recognition of Printed Text

A Review of Optical Character Recognition System for Recognition of Printed Text IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 3, Ver. II (May Jun. 2015), PP 28-33 www.iosrjournals.org A Review of Optical Character Recognition

More information

VEHICLE LICENSE PLATE DETECTION ALGORITHM BASED ON STATISTICAL CHARACTERISTICS IN HSI COLOR MODEL

VEHICLE LICENSE PLATE DETECTION ALGORITHM BASED ON STATISTICAL CHARACTERISTICS IN HSI COLOR MODEL VEHICLE LICENSE PLATE DETECTION ALGORITHM BASED ON STATISTICAL CHARACTERISTICS IN HSI COLOR MODEL Instructor : Dr. K. R. Rao Presented by: Prasanna Venkatesh Palani (1000660520) prasannaven.palani@mavs.uta.edu

More information

RESEARCH AND DEVELOPMENT OF DSP-BASED FACE RECOGNITION SYSTEM FOR ROBOTIC REHABILITATION NURSING BEDS

RESEARCH AND DEVELOPMENT OF DSP-BASED FACE RECOGNITION SYSTEM FOR ROBOTIC REHABILITATION NURSING BEDS RESEARCH AND DEVELOPMENT OF DSP-BASED FACE RECOGNITION SYSTEM FOR ROBOTIC REHABILITATION NURSING BEDS Ming XING and Wushan CHENG College of Mechanical Engineering, Shanghai University of Engineering Science,

More information

A Training Based Approach for Vehicle Plate Recognition (VPR)

A Training Based Approach for Vehicle Plate Recognition (VPR) A Training Based Approach for Vehicle Plate Recognition (VPR) Laveena Agarwal 1, Vinish Kumar 2, Dwaipayan Dey 3 1 Department of Computer Science & Engineering, Sanskar College of Engineering &Technology,

More information