Online handwritten signature verification system: A Review
|
|
- Warren Cain
- 6 years ago
- Views:
Transcription
1 Online handwritten signature verification system: A Review Abstract: Online handwritten signature verification system is one of the most reliable, fast and cost effective tool for user authentication. This work examines the online handwritten signature verification system methodologies. Signatures are acquired from devices such as pressure sensitive tablets, digitizer, etc. The aim of this paper is to review the signature feature extraction algorithms, techniques and methodologies. This gives a brief description of the performance evaluation parameters. The performance of algorithms is compared using various factors which include the False Acceptance Rate (FAR), False Reject Rate (FRR) and Equal Error Rate (EER) etc. Keywords: Feature extraction, Segmentation, False Acceptance Rate, False Rejection Rate. 1. INTRODUCTION Many business applications (e.g. E-banking) depend on biometrics since using biometrics is the only way to pledge the presence of the owner when a transaction is made. The main benefit of using a biometrics can t easily be lost, stolen, hacked, and forged. The future of biometrics looks increasingly bright with the demand for security rising day by day. Application areas of online signature verification include protection of small personal devices (e.g. PDA, laptop, mobile, etc.); protection of data of computer users from unauthorized persons and authentication of individuals for access to documents, physical devices. The signatures of the same person can vary with time and state of mind. This factor is not considered in offline verification system, but in online verification system these factors are also considered to make the system more precise. Numbers of techniques have been proposed to authenticate forgeries. Some of them are discussed in this paper to provide the performance analysis in the field of online handwritten signature verification system. The paper is structured in six sections; Section 1 is the introductory part, Section 2 describes the challenges associated with online handwritten signature verification system. Section 3 presents the basic aspects of data acquisition and preprocessing stage. In section 4, the feature extraction stage is addressed. The Study of various existing methods of Online Signature verification systems brief description of papers of each category is given in Section 5.Finally the conclusion of the paper is reported in Section 6. Prathiba M.K. 1 and Dr. L. Basavaraj 2 1 Visvesvaraya technological University, ATME College of Engineering, Mysore , India. 2 Visvesvaraya technological University, ATME College of Engineering, Mysore , India. 2. CHALLENGES ASSOCIATED WITH ONLINE HANDWRITTEN SIGNATURE VERIFICATION SYSTEM One of the main challenges in signature verification is related to the signature inconsistency. Skilled forgers can perform forgery with high resemblance to the user s signature. The variability noticed in this case is known as inter-person variability. Significant differences have also been noticed with the signatures of the user taken at different times known as intra-person variability. It is a challenge to distinguish both and to get better result. The signing relies on a very fast, practiced, and repeatable motion. But, this motion may change over time, generating another completely different signature. The signatures signed with a digitize pen and unfamiliar signing surface may also affect the signing process. 3. DATA ACQUISITION AND PREPROCESSING Signature verification involves signature acquisition, preprocessing, feature extraction, enrollment, matching, and threshold selection. 3.1 Signature acquisition Online signature verification uses the signature which is captured by data acquisition devices like pressuresensitive tablet. The use of dynamic features makes the signature more unique and more difficult to reproduce. As a result the online signature verification is more reliable than offline signature verification. Commonly used data acquisition device is a digitizing tablet and digitize pen. 3.2 Preprocessing After data acquisition, preprocessing steps are commonly performed to improve the performance of a verification system. Typically, there are three stages in the preprocessing phase. These include smoothing, normalization, and segmentation Smoothing Low resolution tablet suffer from discretization errors, resulting in jagged signature trajectories. Extracting local features from jagged signature trajectories and then using them for verification lead to poor performance. Hence, smoothing is required for low resolution tablets Normalization In the systems where tablets of different active areas are used, signature size normalization is a frequently used as Volume 3, Issue 2 March April 2014 Page 263
2 preprocessing technique. Comparing two signatures having the same shape with different sizes would result in low similarity scores. Size normalization is applied to remove this effect, i.e. the characteristics of signature are preserved Segmentation Segmentation is an important preprocessing step, which influences all the successive phases of signature verification system. Signature segmentation is a complex task since different signatures produced by the same signer can differ from one another. Because of this, specific attention has been devoted to signature segmentation and several techniques have been proposed [11], [8]. 4. FEATURE EXTRACTION Performance of the online signature verification depend system the selection of features are very significant. The features are related to the shape of the signature and independent of the data acquisition device. The efficiency of a signature verification system mainly depends on Feature extraction stage. Feature extraction techniques should be fast and easy to compute so that system has low computational power. Selected features should discriminate between genuine and forgery signature. There are two types of features that validate a signature. Static features are those, which are extracted from signatures that are recorded as an image. Dynamic features are extracted from signatures that are acquired in real time which provides the information about the number and order of strokes, the overall speed of the signature, the pen pressure at each point etc. which make the signature more unique. Two main approaches in feature extraction process are parameters-based approach and functions-based approach. When parameter-based features are used, the signature is characterized as a vector of elements, and each one represents the value of a feature [10]. When function-based features are used, the signature is usually characterized in terms of a time function whose values constitute the feature set. In general, function-based features allow better performance than parameters-based features [2]. Parameter based features are generally classified into two main categories such as global and local. Global features are those which are extracted from the whole signature. They can be extracted easily, but it delivers only limited information about signature. Global features include signature size, signing time, number of pen ups, signature height to width ratio, etc. Local parameters concern features extracted from specific parts of the signature. Based on the extracted features, local parameters can be divided into component-oriented parameters, which are extracted at the level of each component (i.e., height to width ratio of the stroke, relative positions of the strokes, stroke orientation, etc.), and pixel-oriented parameters, which are extracted at pixel level (i.e., grid-based information, pixel density, gray-level intensity, texture, etc.). Generally, local features are computationally expensive but more accurate than the global features. Some parameters features, which are generally considered to be global features, can also be applied locally, and vice versa. 4.1 Performance evaluation parameters The performance of signature verification systems is typically described by two parameters; False Acceptance Rate and False Reject Rate. The percentage of genuine signatures rejected as forgery which is called False Rejection Rate and the percentage of the forgery signatures accepted as genuine is called False Acceptance Rate. These two errors are directly correlated, where a change in one of the rates will inversely affect the other. Generally signature verification system shall have an acceptable trade-off between a low FAR and a low FRR. A common alternative to describe the performance of system is to calculate the Equal Error Rate. EER corresponds to the point where the false accept and false reject rates are equal. 5. STUDY OF VARIOUS EXISTING METHODS OF ONLINE SIGNATURE VERIFICATION SYSTEMS Every Signature verification system is differing from one another, based on their feature selection method, decision making method or both. This section reviews some of the existing signature verification systems such as Tablet PC and digitalize pen, Hidden Markov Models (HMM s), modified Dynamic Time Wrapping Technique (DTW) and Neural Networks (NNs). 5.1 Tablet PC and digitize pen The online signature verification systems are using the Tablet PCs and its pen. Tablet PC is a stable and reliable signature capturing devices. It captures both the dynamic and static features of a signature at the same time. Commonly used data acquisition device is a digitizing tablet. However, the signing process using digitizing tablet is different because the signer instantaneously cannot see what he has written, which may cause inconvenience [3],[4].Digitize pens with touch-sensitive screens and digital-ink technologies are developed to avoid signer disorientation by providing immediate feedback to the writer. In a digitize pen several electronic components are used to detect pen motion, velocity, inclination, and other dynamic features which are extracted during the signing process. Alonso-Fernandez [3] developed a prototype of securing access and securing document application using Tablet PC system. Two different commercial Tablet PCs(Hewlett-Packard TC 1100with Intel Pentium Mobile 1.1 GHz processor and Toshiba Portege M200 with Intel Centrinto 1.6GHz processor)had been used. The signature verification systems based on the pressure statics of the signature. The experiments were tested against both random and skilled forgeries by using data base containing 3000 signatures. According to their reports F. Alonso-Fernandez et al. [4], the Toshiba tablet performed Volume 3, Issue 2 March April 2014 Page 264
3 better with the reporting result of 8.27% to 8.05% EER for Skilled forgeries and 3.20% to 2.76% EER for random forgeries. A. K. Jain [1] utilized a digitizing tablet to capture the spatial and dynamic information of signature. The digitizing tablet used was the IBM CrossPad from A.T. Cross Company. IBM CrossPad records the x-coordinates and y-coordinates of the points in the signature with a sampling rate of samples per second. Experiments were conducted using a database with over 1232 signatures collected from 102 individuals. The best result reported a false accept rate of 1.6% and a false reject rate of 2.8%. Thanin Maneechot[15] Proposed an algorithm for online signature verification, using N-tuple learning machine. The features are extracted from hand written signature on WACOM digital tablet. This captures dynamic information of signature such as X-Y position, pressure of pen and pen altitude angle. The verification employed N- tuple learning machine. The basic structure is similar to an encoder, which the inputs are binary values N-tuple simulated from RAM s. It was establish that pen pressure was influenced feature. They obtained a FAR for a forgery was 1.32% and FRR for genuine signature was 0.2%. Syed Khaleel Ahmed [14] designed signature verification system using the WACOM Graphire 3 pressure pad with pressure sensitive pen. The tablet captures the position co-ordinates x, y and pressure P as a function of time of the signature were extracted. A signature verification system based on the Self-Organizing Map (SOM) of Neural Network model was designed in MATLAB to verify the signature. The system performance was evaluated by using 50 epochs and 200 epochs for two different cases. The best result reported a FRR and FAR was 19.05% and 9.29% for 200 epochs. The comparison of selected performance evaluation parameters for the Tablet PC and digitalize pen methodology illustrated in Table-1with high accuracy was reported by Thanin Maneechot[15]. Table 1- Performance Evaluation Parameters obtained from the Tablet Pc and Digitize Pen Sl. Year FAR FRR Authors No. (%) (%) Anil. K. Jain al [2] 2 3 Thanin Maneechot[15] Syed Khaleel Ahmed [14] Dynamic Time Wrapping Technique Dynamic Time Wrapping (DTW) is an algorithm used for measuring similarity between two signatures, which may vary in time. The signatures are warped non-linearly in time dimension to determine an optimal match between two signatures. A. Kolmatov [2] proposed a system for online handwritten signature verification, approaching the problem as a two-class pattern recognition problem. DTW was used to establish the test signature s legitimacy. During enrollment phase, the user supplies a number of signatures. The variation in a user s signatures, are stored as measuring parameters, with a unique user identifier in the system s database. When a test signature is input to the system for verification, it is compared to each of the reference signatures of the claimed individual. The resulting minimum, maximum, and template distance values normalized by the equivalent average values stored in the user s profile. A three dimensional feature vectors was formed in classifying the test signature. The experiment was conducted using a data base from 94 people producing 619 signatures. The experiment result was 2.8% EER when tested with skilled forgeries and awarded the first place at First International Signature Verification Competition. S.A. Daramolo [13] proposed a robust automatic online signature verification system. They have used a good resolution signature capturing device i.e. graphics tablet and hence preprocessing stage is not used in the system. To establish a correspondence between feature sequences of signature samples the Dynamic Time Wrapping (DTW) algorithm were used in the training and classification stages. The proposed online signature verification system was tested using 800 genuine signatures from 200 users, 400 skilled forgeries from 200 forgers and 400 random signatures. Experiments showed that it had 0.25% error (FRR) accepting the genuine signatures. While in rejecting skilled and random forgeries (FAR) error was of 0.5% and 0.0 % respectively. DTW technique has two drawbacks viz. Heavy computational load which consumes more time, Warping forgery which makes the verification more difficult. F. Hao. [5]proposed a new warping technique which was named as Extreme Points Warping (EPW).Which involves selected important points of a signature, matching them, and then warping the segments between them. The experiment was conducted using 1000 signatures of 25 users and compared between the DTW and EPW methods. When the Euclidean distance was used, DTW showed an EER of 33.0% but EPW showed an EER of 25.4%. When the correlation coefficient was used, DTW showed an EER of 35.0% but EPW showed an EER of 27.7%. The results shows that EPW is much faster than DTW and leads to slightly better EER J. Zhang and S. kamata [9] proposed a signature verification method dividing a signature into several segments. A Modified DTW algorithm was used by considering the local properties of the signature. This can effectively remove the redundant points in the input signature. The dissimilarity scores based on the obtained segment-to-segment mapping information was calculated to evaluate whether the input signature is genuine. The Volume 3, Issue 2 March April 2014 Page 265
4 experiments reported the EER of 6.02% to 7.82% for the 60 and 40 user s database respectively. 5.3 Hidden Markov Models HMMs models have found to be well suited for signature modeling since they are highly adaptable to personal variability. HMM performs stochastic matching of the two signatures using a sequence of probability distributions of the features along the signature. Mohammad M. Shafli and Hamid R. Rabiee [11] introduced signature verification system using variable length segmentation and Hidden Markov Models. The signature was described by using the HMM as a sequence of vectors of values related to each point of signature in its trajectory. From each segment of the signature seven parameters were extracted. For each person, mean (µ) and variance (σ) of log-likelihood obtained from its HMM model divided by average segments number for his signatures in the training set and these values were saved beside the HMM model as a template for his signing process. These two values show acceptable range of loglikelihood value for genuine signature. For the verification purpose, the researchers used a database from 622 genuine signatures were collected, from a population of 69 human subjects including 12 women and 6 left hand writers. Additionally 1010 skilled forged samples were used to evaluate the performance of system. They obtained a FAR of 4% and a FRR of 12%. 5.4 Neural Networks Syed Khaleel Ahmed [14] designed signature verification system with 4 modules. They are feature extraction, reference module, sample module, and intelligent decision module. The feature selection module captures the position co-ordinates X, Y, and pressure P as a function of time of the signature were extracted from the tablet. The reference module stores the data for training. The sample module consists of data for validation. The Self-Organizing Map (SOM) of Neural Network model was used as an intelligent decision module. This system makes it easy to visualize and classify data by clustering similar data groups. The high dimensional data map into a 1 or 2 dimensions. The system performance was evaluated by using 50 epochs and 200 epochs for two different cases. The FAR and FRR were 11.43% and 20.95%for 50 epochs 9.29% and 19.05% for 200 epochs respectively. Results obtained using prototype system was encouraging. Zhan Enqi et al [16] presented online handwritten signature verification based on two levels back propagation neural network [BPNN]. The first level selects 15 statistic features as the input to BPNN. These features can reflect the signature speed and shape of signature. The second level selects wavelet features, which includes only important features extracting for matching and recognition of signature. The author used five groups of signature samples. Each group of training sample is composed of 5 genuine signature and 10 forged signatures, which include genuine, random, and skilled forged signatures. They obtained 1.07%of FAR and 6% of FRR. Nan Xu [12] proposed a method for online handwritten signature verification by using back propagation neural networks. A touch-based tablet was used to acquire the signature visual outline, the coordinates (x, y), pressure, time, length and other information in the form of vector was stored in computer. These acquired features of the signature were not sufficient to build the template of the reference signature. They considered the intrinsic properties of signature which leads to the FR errors. i.e. randomness of handwriting the signature such as the size and spacing between the words. Total of 49 features were designed using Matlab by considering the above acquired features of the signature and then calculated the corresponding characteristic values for each specimen signatures and a standard uniform vector used as a template of the reference signature. They obtained a FAR of 1.5% and a FRR of 3.5%. Table-2 summarizes the results of various Neural Networks based signature verification techniques. A high accuracy was reported by Zhan Enqi [16]. Table- 2 Performance Evaluation Parameters for Neural Networks Sl. FAR Authors Year No. (%) Syed Khallel Ahmed et al [14] FRR (%) Zhan Enqi et al [16] Nan Xu et al [12] Conclusion The signature verification system must take into an account the volatile characteristics of the signature. i.e. the signatures of the same person are similar but not identical. In addition, a person s signatures often change during their life due to age, illness and up to some extent the emotional state of the person. This makes it difficult for the researcher to achieve a better performance of the system. The signature acquiring system plays a very important role in signature verification systems. This opens another research area. The accurate segmentation of the signature is a key factor of signature verification system. Many promising techniques and algorithms have been developed but, there is still room for improvement in signature segmentation methodologies. The study of number of works did on signature verification systems shows that a large number of existing systems employ limited number of feature extraction with Volume 3, Issue 2 March April 2014 Page 266
5 the intention of reducing the algorithm size, thus making the system run faster. Among the studied papers in this review, S.A. Daramolo [10] has the best performance evaluation parameter values with FAR of 0.25% and FRR of 0.5% for skilled forgeries and completely rejecting the random forgeries. References: [1] Anil.K.Jain,FriederikeGriess, Scotto,Connel online signature verification. Pattern Recognition letters, volume 35, Issue 12, 2002 pp [2] AlisheiKolmatov, BerrinYainkoglu, Identity authentication using improved online signature verification method, Pattern Recognition letters, volume 26,Issue 15, November 2005,pp [3] Alonso-Fernandez, J. Fierrez-Aguilar, and J. Ortega- Garcia, Sensor interoperability and fusion in signature verification: A case study using tablet PC, (Lecture Notes in Computer Science 3781) in Proc. Int. Workshop Biometric Recognit. Syst. (IWBRS). Beijing, China Springer- Verlag, Oct. 2005, pp [4] Alonso-Fernandez, J. Fierrez-Aguilar, F. Del Valle, and J. Ortega- Garcia, On-line signature verification using tablet PC, in Proc. 4th Int. Symp. Image Signal Process. Anal. (ISPA 2005), pp [5] Hao, and C. W. Chan, Online Signature Verification Using a New Extreme Points Warping Technique, Pattern Recognition Letters, Volume 24 Issue 16, December [6] Shimizu, S. Kiyono, T. Motoki, and W. Gao, An electrical pen for signature verification using a twodimensional optical angle sensor, Sens. Actuators, vol. 111, pp , [7] Taguchi, K. Kiriyama, E. Tanaka, and K. Fujii, On-line recognition of handwritten signatures by feature extraction of the pen movements, IEICE Trans., vol. 71, no. 5, pp , [8] Lee, H.-S. Yoon, J. Soh, B. T. Chun, and Y. K. Chung. Using geometric extrema for segment-tosegment characteristics comparison in online signature verification. [9] J.Zhang and S.kamata, Online signature verification using, segment to segment matching. In:Int. conf. on Frontiers in handwriting recognition ICFHR,2008. [10] L. Lee, T. Berger, and E. Aviczer. Reliable on-line human signature verification systems. IEEE Trans. on Pattern Analysis and Machine Intelligence, 18(6): , [11] Mohammad M.Shafiei and Hamid R.Rabiee,a new on-line signature verification algorithm using variable length segmentation and Hidden Markov Models. Proceedings of the seventh international conference on document Analysis and recognition, [12] Nan Xu, Li Cheng, Yan Guo, Xiaogang Wu and Jiali Zhao, online handwritten signature verification by using back propagation neural networks /11/$ IEEE. [13] S.A. Daramolo and T. S.Ibiyemi, Efficient Online Signature Verification System, International Journal of Engineering and Technology IJET-IJENS, [14] Syed Khallel Ahmed, Agileswari K. Ramaswamy, anissalwa Mohd. Khairuddin and Jamaludinomar, Automatic online signature verification, A prototype using neural networks, TENCON 2009, pp [15] Thanin Maneechot and Yuttana Kitjaidure Signature Verification Using N-tuple Learning Machine Proceedings of the 2005 IEEE Engineerimg in Medicine and Biology 27 th Annual conference Shanghai,China,September 1-4,2005. [16] Zhan Enqi,Guojinxu,ZhengJianbin Ma chan&wanglinjuan, online handwritten signature verification based on two levels back propagation neural network. In: International Symposium on Intelligent Ubiquitous Computing and Education, 2009 pp AUTHORS Prathiba M.K received her Bachelor of Engineering Degree in Electronics and Communication Engineering from Mysore University in She did her Master of Technology in Industrial Electronics from Visvesvaraya Technological University, Belgaum in Presently she is pursuing Ph.D. in the area of Biometric Application under the guidance of Dr. L. Basavaraj. Her area of interest is Signal processing and Image processing. Dr. L. Basavaraj received his M.E degree in Digital Electronics from Karnatak University in 1994, and Ph.D in Electronics from University of Mysore in His researches interests include VLSI Implementation of signal Processing Applications, Biomedical Signal Processing, Offline, and on-line handwritten signature recognition. Volume 3, Issue 2 March April 2014 Page 267
Offline Signature Verification for Cheque Authentication Using Different Technique
Offline Signature Verification for Cheque Authentication Using Different Technique Dr. Balaji Gundappa Hogade 1, Yogita Praful Gawde 2 1 Research Scholar, NMIMS, MPSTME, Associate Professor, TEC, Navi
More informationEvaluation of Online Signature Verification Features
Evaluation of Online Signature Verification Features Ghazaleh Taherzadeh*, Roozbeh Karimi*, Alireza Ghobadi*, Hossein Modaberan Beh** * Faculty of Information Technology Multimedia University, Selangor,
More informationIMPACT OF SIGNATURE LEGIBILITY AND SIGNATURE TYPE IN OFF-LINE SIGNATURE VERIFICATION.
IMPACT OF SIGNATURE LEGIBILITY AND SIGNATURE TYPE IN OFF-LINE SIGNATURE VERIFICATION F. Alonso-Fernandez a, M.C. Fairhurst b, J. Fierrez a and J. Ortega-Garcia a. a Biometric Recognition Group - ATVS,
More informationClassification of Features into Strong and Weak Features for an Intelligent Online Signature Verification System
Classification of Features into Strong and Weak Features for an Intelligent Online Signature Verification System Saad Tariq, Saqib Sarwar & Waqar Hussain Department of Electrical Engineering Air University
More informationSVC2004: First International Signature Verification Competition
SVC2004: First International Signature Verification Competition Dit-Yan Yeung 1, Hong Chang 1, Yimin Xiong 1, Susan George 2, Ramanujan Kashi 3, Takashi Matsumoto 4, and Gerhard Rigoll 5 1 Hong Kong University
More informationStatic Signature Verification and Recognition using Neural Network Approach-A Survey
Available online www.ejaet.com European Journal of Advances in Engineering and Technology, 2015, 2(4): 46-50 Review Article ISSN: 2394-658X Static Signature Verification and Recognition using Neural Network
More informationReal time verification of Offline handwritten signatures using K-means clustering
Real time verification of Offline handwritten signatures using K-means clustering Alpana Deka 1, Lipi B. Mahanta 2* 1 Department of Computer Science, NERIM Group of Institutions, Guwahati, Assam, India
More informationResearch Seminar. Stefano CARRINO fr.ch
Research Seminar Stefano CARRINO stefano.carrino@hefr.ch http://aramis.project.eia- fr.ch 26.03.2010 - based interaction Characterization Recognition Typical approach Design challenges, advantages, drawbacks
More informationNikhil Gupta *1, Dr Rakesh Dhiman 2 ABSTRACT I. INTRODUCTION
International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 6 ISSN : 2456-3307 An Offline Handwritten Signature Verification Using
More informationComplexity-based Biometric Signature Verification
Complexity-based Biometric Signature Verification Ruben Tolosana, Ruben Vera-Rodriguez, Richard Guest, Julian Fierrez and Javier Ortega-Garcia Biometrics and Data Pattern Analytics (BiDA) Lab - ATVS, Escuela
More informationWriter identification clustering letters with unknown authors
Writer identification clustering letters with unknown authors Joanna Putz-Leszczynska To cite this version: Joanna Putz-Leszczynska. Writer identification clustering letters with unknown authors. 17th
More informationProposed Method for Off-line Signature Recognition and Verification using Neural Network
e-issn: 2349-9745 p-issn: 2393-8161 Scientific Journal Impact Factor (SJIF): 1.711 International Journal of Modern Trends in Engineering and Research www.ijmter.com Proposed Method for Off-line Signature
More informationA novel method to generate Brute-Force Signature Forgeries
A novel method to generate Brute-Force Signature Forgeries DIUF-RR 274 06-09 Alain Wahl 1 Jean Hennebert 2 Andreas Humm 3 Rolf Ingold 4 June 12, 2006 Department of Informatics Research Report Département
More informationOn-Line, Low-Cost and Pc-Based Fingerprint Verification System Based on Solid- State Capacitance Sensor
On-Line, Low-Cost and Pc-Based Fingerprint Verification System Based on Solid- State Capacitance Sensor Mohamed. K. Shahin *, Ahmed. M. Badawi **, and Mohamed. S. Kamel ** *B.Sc. Design Engineer at International
More informationEvaluating the Biometric Sample Quality of Handwritten Signatures
Evaluating the Biometric Sample Quality of Handwritten Signatures Sascha Müller 1 and Olaf Henniger 2 1 Technische Universität Darmstadt, Darmstadt, Germany mueller@sec.informatik.tu-darmstadt.de 2 Fraunhofer
More informationInternational Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN IJSER
International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December-2016 192 A Novel Approach For Face Liveness Detection To Avoid Face Spoofing Attacks Meenakshi Research Scholar,
More informationClassification of Handwritten Signatures Based on Name Legibility
Classification of Handwritten Signatures Based on Name Legibility Javier Galbally, Julian Fierrez and Javier Ortega-Garcia Biometrics Research Lab./ATVS, EPS, Universidad Autonoma de Madrid, Campus de
More informationContent Based Image Retrieval Using Color Histogram
Content Based Image Retrieval Using Color Histogram Nitin Jain Assistant Professor, Lokmanya Tilak College of Engineering, Navi Mumbai, India. Dr. S. S. Salankar Professor, G.H. Raisoni College of Engineering,
More informationPixel Based Off-line Signature Verification System
Research Paper American Journal of Engineering Research (AJER) e-issn : 2320-0847 p-issn : 2320-0936 Volume-04, Issue-01, pp-187-192 www.ajer.org Open Access Pixel Based Off-line Signature Verification
More informationComparison of ridge- and intensity-based perspiration liveness detection methods in fingerprint scanners
Comparison of ridge- and intensity-based perspiration liveness detection methods in fingerprint scanners Bozhao Tan and Stephanie Schuckers Department of Electrical and Computer Engineering, Clarkson University,
More informationA Mathematical model for the determination of distance of an object in a 2D image
A Mathematical model for the determination of distance of an object in a 2D image Deepu R 1, Murali S 2,Vikram Raju 3 Maharaja Institute of Technology Mysore, Karnataka, India rdeepusingh@mitmysore.in
More informationOnline Signature Verification: A Review
J. Appl. Environ. Biol. Sci., 4(9S)303-308, 2014 2014, TextRoad Publication ISSN: 2090-4274 Journal of Applied Environmental and Biological Sciences www.textroad.com Online Signature Verification: A Review
More informationOnline Signature Verification on Mobile Devices
IJSTE - International Journal of Science Technology & Engineering Volume 2 Issue 10 April 2016 ISSN (online): 2349-784X Online Signature Verification on Mobile Devices Miss. Hude. Kalyani. A. Miss. Khande
More informationA Novel Algorithm for Hand Vein Recognition Based on Wavelet Decomposition and Mean Absolute Deviation
Sensors & Transducers, Vol. 6, Issue 2, December 203, pp. 53-58 Sensors & Transducers 203 by IFSA http://www.sensorsportal.com A Novel Algorithm for Hand Vein Recognition Based on Wavelet Decomposition
More informationBiometric Signature for Mobile Devices
Chapter 13 Biometric Signature for Mobile Devices Maria Villa and Abhishek Verma CONTENTS 13.1 Biometric Signature Recognition 309 13.2 Introduction 310 13.2.1 How Biometric Signature Works 310 13.2.2
More informationIris Recognition using Hamming Distance and Fragile Bit Distance
IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 06, 2015 ISSN (online): 2321-0613 Iris Recognition using Hamming Distance and Fragile Bit Distance Mr. Vivek B. Mandlik
More informationENHANCHED PALM PRINT IMAGES FOR PERSONAL ACCURATE IDENTIFICATION
ENHANCHED PALM PRINT IMAGES FOR PERSONAL ACCURATE IDENTIFICATION Prof. Rahul Sathawane 1, Aishwarya Shende 2, Pooja Tete 3, Naina Chandravanshi 4, Nisha Surjuse 5 1 Prof. Rahul Sathawane, Information Technology,
More information3 Department of Computer science and Application, Kurukshetra University, Kurukshetra, India
Minimizing Sensor Interoperability Problem using Euclidean Distance Himani 1, Parikshit 2, Dr.Chander Kant 3 M.tech Scholar 1, Assistant Professor 2, 3 1,2 Doon Valley Institute of Engineering and Technology,
More informationFast identification of individuals based on iris characteristics for biometric systems
Fast identification of individuals based on iris characteristics for biometric systems J.G. Rogeri, M.A. Pontes, A.S. Pereira and N. Marranghello Department of Computer Science and Statistic, IBILCE, Sao
More informationIris Recognition-based Security System with Canny Filter
Canny Filter Dr. Computer Engineering Department, University of Technology, Baghdad-Iraq E-mail: hjhh2007@yahoo.com Received: 8/9/2014 Accepted: 21/1/2015 Abstract Image identification plays a great role
More informationImage Recognition for PCB Soldering Platform Controlled by Embedded Microchip Based on Hopfield Neural Network
436 JOURNAL OF COMPUTERS, VOL. 5, NO. 9, SEPTEMBER Image Recognition for PCB Soldering Platform Controlled by Embedded Microchip Based on Hopfield Neural Network Chung-Chi Wu Department of Electrical Engineering,
More informationLicense Plate Localisation based on Morphological Operations
License Plate Localisation based on Morphological Operations Xiaojun Zhai, Faycal Benssali and Soodamani Ramalingam School of Engineering & Technology University of Hertfordshire, UH Hatfield, UK Abstract
More informationDETECTING OFF-LINE SIGNATURE MODEL USING WIDE AND NARROW VARIETY CLASS OF LOCAL FEATURE
DETECTING OFF-LINE SIGNATURE MODEL USING WIDE AND NARROW VARIETY CLASS OF LOCAL FEATURE Agung Sediyono 1 and YaniNur Syamsu 2 1 Universitas Trisakti, Indonesia, trisakti_agung06@yahoo.com 2 LabFor Polda
More informationResearch on Hand Gesture Recognition Using Convolutional Neural Network
Research on Hand Gesture Recognition Using Convolutional Neural Network Tian Zhaoyang a, Cheng Lee Lung b a Department of Electronic Engineering, City University of Hong Kong, Hong Kong, China E-mail address:
More informationSegmentation of Fingerprint Images
Segmentation of Fingerprint Images Asker M. Bazen and Sabih H. Gerez University of Twente, Department of Electrical Engineering, Laboratory of Signals and Systems, P.O. box 217-75 AE Enschede - The Netherlands
More informationImage Forgery Detection Using Svm Classifier
Image Forgery Detection Using Svm Classifier Anita Sahani 1, K.Srilatha 2 M.E. Student [Embedded System], Dept. Of E.C.E., Sathyabama University, Chennai, India 1 Assistant Professor, Dept. Of E.C.E, Sathyabama
More informationOffline Handwritten Signature Verification Approaches: A Review
Offline Handwritten Signature Verification Approaches: A Review 1 Sanjay S. Gharde, 2 K. P. Adhiya, 3 Harsha G. Chavan 1,2,3 Dept. of Com. Engg., SSBT s College of Engg. and Tech., Bambhori, Jalgaon, Maharashtra,
More informationAutomatic Licenses Plate Recognition System
Automatic Licenses Plate Recognition System Garima R. Yadav Dept. of Electronics & Comm. Engineering Marathwada Institute of Technology, Aurangabad (Maharashtra), India yadavgarima08@gmail.com Prof. H.K.
More informationPublished by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1
IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 2, Issue 2, Apr- Generating an Iris Code Using Iris Recognition for Biometric Application S.Banurekha 1, V.Manisha
More informationCOMPARATIVE PERFORMANCE ANALYSIS OF HAND GESTURE RECOGNITION TECHNIQUES
International Journal of Advanced Research in Engineering and Technology (IJARET) Volume 9, Issue 3, May - June 2018, pp. 177 185, Article ID: IJARET_09_03_023 Available online at http://www.iaeme.com/ijaret/issues.asp?jtype=ijaret&vtype=9&itype=3
More informationA new seal verification for Chinese color seal
Edith Cowan University Research Online ECU Publications 2011 2011 A new seal verification for Chinese color seal Zhihu Huang Jinsong Leng Edith Cowan University 10.4028/www.scientific.net/AMM.58-60.2558
More informationLinear Gaussian Method to Detect Blurry Digital Images using SIFT
IJCAES ISSN: 2231-4946 Volume III, Special Issue, November 2013 International Journal of Computer Applications in Engineering Sciences Special Issue on Emerging Research Areas in Computing(ERAC) www.caesjournals.org
More informationIntroduction to Video Forgery Detection: Part I
Introduction to Video Forgery Detection: Part I Detecting Forgery From Static-Scene Video Based on Inconsistency in Noise Level Functions IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 5,
More informationOnline Signature Verification by Using FPGA
Online Signature Verification by Using FPGA D.Sandeep Assistant Professor, Department of ECE, Vignan Institute of Technology & Science, Telangana, India. ABSTRACT: The main aim of this project is used
More informationAnalyzing features learned for Offline Signature Verification using Deep CNNs
Accepted as a conference paper for ICPR 2016 Analyzing features learned for Offline Signature Verification using Deep CNNs Luiz G. Hafemann, Robert Sabourin Lab. d imagerie, de vision et d intelligence
More informationA Study on Handwritten Signature
A Study on Handwritten Signature L B. Mahanta Institute of Adv. Study in Science and Technology Guwahati 35, P.O- Gorchuk Assam, India ABSTRACT Handwritten signature verification is a behavioral biometric.
More informationFeature Extraction Technique Based On Circular Strip for Palmprint Recognition
Feature Extraction Technique Based On Circular Strip for Palmprint Recognition Dr.S.Valarmathy 1, R.Karthiprakash 2, C.Poonkuzhali 3 1, 2, 3 ECE Department, Bannari Amman Institute of Technology, Sathyamangalam
More informationTouchless Fingerprint Recognization System
e-issn 2455 1392 Volume 2 Issue 4, April 2016 pp. 501-505 Scientific Journal Impact Factor : 3.468 http://www.ijcter.com Touchless Fingerprint Recognization System Biju V. G 1., Anu S Nair 2, Albin Joseph
More informationA Cryptosystem With Private Key Generation From Dynamic Properties of Human Hand Signature
A Cryptosystem With Private Key Generation From Dynamic Properties of Human Hand Signature HAO FENG School of Electrical & Electronic Engineering A thesis submitted to the Nanyang Technological University
More informationStudent Attendance Monitoring System Via Face Detection and Recognition System
IJSTE - International Journal of Science Technology & Engineering Volume 2 Issue 11 May 2016 ISSN (online): 2349-784X Student Attendance Monitoring System Via Face Detection and Recognition System Pinal
More informationGlobal and Local Quality Measures for NIR Iris Video
Global and Local Quality Measures for NIR Iris Video Jinyu Zuo and Natalia A. Schmid Lane Department of Computer Science and Electrical Engineering West Virginia University, Morgantown, WV 26506 jzuo@mix.wvu.edu
More informationProceedings of the 2014 Federated Conference on Computer Science and Information Systems pp
Proceedings of the 204 Federated Conference on Computer Science and Information Systems pp. 70 708 DOI: 0.5439/204F59 ACSIS, Vol. 2 Handwritten Signature Verification with 2D Color Barcodes Marco Querini,
More informationFeature Extraction Techniques for Dorsal Hand Vein Pattern
Feature Extraction Techniques for Dorsal Hand Vein Pattern Pooja Ramsoful, Maleika Heenaye-Mamode Khan Department of Computer Science and Engineering University of Mauritius Mauritius pooja.ramsoful@umail.uom.ac.mu,
More informationIris Segmentation & Recognition in Unconstrained Environment
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Issue -8 August, 2014 Page No. 7514-7518 Iris Segmentation & Recognition in Unconstrained Environment ABSTRACT
More informationPreprocessing and Segregating Offline Gujarati Handwritten Datasheet for Character Recognition
Preprocessing and Segregating Offline Gujarati Handwritten Datasheet for Character Recognition Hetal R. Thaker Atmiya Institute of Technology & science, Kalawad Road, Rajkot Gujarat, India C. K. Kumbharana,
More informationA Study on Handwritten Signature Verification Approaches
A Study on Handwritten Signature Verification Approaches Surabhi Garhawal, Neeraj Shukla Abstract People are comfortable with pen and papers for authentication and authorization in legal transactions.
More informationEfficient Car License Plate Detection and Recognition by Using Vertical Edge Based Method
Efficient Car License Plate Detection and Recognition by Using Vertical Edge Based Method M. Veerraju *1, S. Saidarao *2 1 Student, (M.Tech), Department of ECE, NIE, Macherla, Andrapradesh, India. E-Mail:
More informationAn Efficient Approach for Iris Recognition by Improving Iris Segmentation and Iris Image Compression
An Efficient Approach for Iris Recognition by Improving Iris Segmentation and Iris Image Compression K. N. Jariwala, SVNIT, Surat, India U. D. Dalal, SVNIT, Surat, India Abstract The biometric person authentication
More informationMethod for Real Time Text Extraction of Digital Manga Comic
Method for Real Time Text Extraction of Digital Manga Comic Kohei Arai Information Science Department Saga University Saga, 840-0027, Japan Herman Tolle Software Engineering Department Brawijaya University
More informationPunjabi Offline Signature Verification System Using Neural Network
International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 8958, Volume-3, Issue-2, December 2013 Punjabi Offline Signature Verification System Using Neural Network Rimpi Suman, Dinesh
More informationEmpirical Evidence for Correct Iris Match Score Degradation with Increased Time-Lapse between Gallery and Probe Matches
Empirical Evidence for Correct Iris Match Score Degradation with Increased Time-Lapse between Gallery and Probe Matches Sarah E. Baker, Kevin W. Bowyer, and Patrick J. Flynn University of Notre Dame {sbaker3,kwb,flynn}@cse.nd.edu
More informationIntegrated Digital System for Yarn Surface Quality Evaluation using Computer Vision and Artificial Intelligence
Integrated Digital System for Yarn Surface Quality Evaluation using Computer Vision and Artificial Intelligence Sheng Yan LI, Jie FENG, Bin Gang XU, and Xiao Ming TAO Institute of Textiles and Clothing,
More informationWavelet-based Image Splicing Forgery Detection
Wavelet-based Image Splicing Forgery Detection 1 Tulsi Thakur M.Tech (CSE) Student, Department of Computer Technology, basiltulsi@gmail.com 2 Dr. Kavita Singh Head & Associate Professor, Department of
More informationFACE RECOGNITION USING NEURAL NETWORKS
Int. J. Elec&Electr.Eng&Telecoms. 2014 Vinoda Yaragatti and Bhaskar B, 2014 Research Paper ISSN 2319 2518 www.ijeetc.com Vol. 3, No. 3, July 2014 2014 IJEETC. All Rights Reserved FACE RECOGNITION USING
More informationPHASE PRESERVING DENOISING AND BINARIZATION OF ANCIENT DOCUMENT IMAGE
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 7, July 2015, pg.16
More informationImage Averaging for Improved Iris Recognition
Image Averaging for Improved Iris Recognition Karen P. Hollingsworth, Kevin W. Bowyer, and Patrick J. Flynn University of Notre Dame Abstract. We take advantage of the temporal continuity in an iris video
More informationBiometrics - A Tool in Fraud Prevention
Biometrics - A Tool in Fraud Prevention Agenda Authentication Biometrics : Need, Available Technologies, Working, Comparison Fingerprint Technology About Enrollment, Matching and Verification Key Concepts
More informationAN EXPANDED-HAAR WAVELET TRANSFORM AND MORPHOLOGICAL DEAL BASED APPROACH FOR VEHICLE LICENSE PLATE LOCALIZATION IN INDIAN CONDITIONS
AN EXPANDED-HAAR WAVELET TRANSFORM AND MORPHOLOGICAL DEAL BASED APPROACH FOR VEHICLE LICENSE PLATE LOCALIZATION IN INDIAN CONDITIONS Mo. Avesh H. Chamadiya 1, Manoj D. Chaudhary 2, T. Venkata Ramana 3
More informationImage Processing Based Vehicle Detection And Tracking System
Image Processing Based Vehicle Detection And Tracking System Poonam A. Kandalkar 1, Gajanan P. Dhok 2 ME, Scholar, Electronics and Telecommunication Engineering, Sipna College of Engineering and Technology,
More informationCombined Approach for Face Detection, Eye Region Detection and Eye State Analysis- Extended Paper
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 10, Issue 9 (September 2014), PP.57-68 Combined Approach for Face Detection, Eye
More informationAn Offline Handwritten Signature Verification System - A Comprehensive Review
An Offline Handwritten Signature Verification System - A Comprehensive Review Ms. Deepti Joon 1, Ms. Shaloo Kikon 2 1 M. Tech. Scholar, Dept. of ECE, P.D.M. College of Engineering, Bahadurgarh, Haryana
More informationFingerprint Segmentation using the Phase of Multiscale Gabor Wavelets
CCV: The 5 th sian Conference on Computer Vision, 3-5 January, Melbourne, ustralia Fingerprint Segmentation using the Phase of Multiscale Gabor Wavelets Sylvain Bernard,, Nozha Boujemaa, David Vitale,
More informationVEHICLE LICENSE PLATE DETECTION ALGORITHM BASED ON STATISTICAL CHARACTERISTICS IN HSI COLOR MODEL
VEHICLE LICENSE PLATE DETECTION ALGORITHM BASED ON STATISTICAL CHARACTERISTICS IN HSI COLOR MODEL Instructor : Dr. K. R. Rao Presented by: Prasanna Venkatesh Palani (1000660520) prasannaven.palani@mavs.uta.edu
More informationFingerprint Image Quality Parameters
Fingerprint Image Quality Parameters Muskan Sahi #1, Kapil Arora #2 12 Department of Electronics and Communication 12 RPIIT, Bastara Haryana, India Abstract The quality of fingerprint image determines
More informationApply Multi-Layer Perceptrons Neural Network for Off-line signature verification and recognition
www.ijcsi.org 261 Apply Multi-Layer Perceptrons eural etwork for Off-line signature verification and recognition Suhail Odeh and Manal Khalil Computer And Information Systems Department, Bethlehem University
More informationAn Evaluation of Automatic License Plate Recognition Vikas Kotagyale, Prof.S.D.Joshi
An Evaluation of Automatic License Plate Recognition Vikas Kotagyale, Prof.S.D.Joshi Department of E&TC Engineering,PVPIT,Bavdhan,Pune ABSTRACT: In the last decades vehicle license plate recognition systems
More informationChapter 6. [6]Preprocessing
Chapter 6 [6]Preprocessing As mentioned in chapter 4, the first stage in the HCR pipeline is preprocessing of the image. We have seen in earlier chapters why this is very important and at the same time
More informationEFFICIENT ATTENDANCE MANAGEMENT SYSTEM USING FACE DETECTION AND RECOGNITION
EFFICIENT ATTENDANCE MANAGEMENT SYSTEM USING FACE DETECTION AND RECOGNITION 1 Arun.A.V, 2 Bhatath.S, 3 Chethan.N, 4 Manmohan.C.M, 5 Hamsaveni M 1,2,3,4,5 Department of Computer Science and Engineering,
More informationBiometric Recognition Techniques
Biometric Recognition Techniques Anjana Doshi 1, Manisha Nirgude 2 ME Student, Computer Science and Engineering, Walchand Institute of Technology Solapur, India 1 Asst. Professor, Information Technology,
More informationIDENTIFICATION OF SIGNATURES TRANSMITTED OVER RAYLEIGH FADING CHANNEL BY USING HMM AND RLE
International Journal of Technology (2011) 1: 56 64 ISSN 2086 9614 IJTech 2011 IDENTIFICATION OF SIGNATURES TRANSMITTED OVER RAYLEIGH FADING CHANNEL BY USING HMM AND RLE Djamhari Sirat 1, Arman D. Diponegoro
More informationEffective and Efficient Fingerprint Image Postprocessing
Effective and Efficient Fingerprint Image Postprocessing Haiping Lu, Xudong Jiang and Wei-Yun Yau Laboratories for Information Technology 21 Heng Mui Keng Terrace, Singapore 119613 Email: hplu@lit.org.sg
More informationPalm Vein Recognition System using Directional Coding and Back-propagation Neural Network
, October 21-23, 2015, San Francisco, USA Palm Vein Recognition System using Directional Coding and Back-propagation Neural Network Mark Erwin C. Villariña and Noel B. Linsangan, Member, IAENG Abstract
More information3D Face Recognition System in Time Critical Security Applications
Middle-East Journal of Scientific Research 25 (7): 1619-1623, 2017 ISSN 1990-9233 IDOSI Publications, 2017 DOI: 10.5829/idosi.mejsr.2017.1619.1623 3D Face Recognition System in Time Critical Security Applications
More informationPostprint.
http://www.diva-portal.org Postprint This is the accepted version of a paper presented at IEEE Intl. Conf. on Control, Automation, Robotics and Vision, ICARCV, Special Session on Biometrics, Singapore,
More informationIris Recognition using Histogram Analysis
Iris Recognition using Histogram Analysis Robert W. Ives, Anthony J. Guidry and Delores M. Etter Electrical Engineering Department, U.S. Naval Academy Annapolis, MD 21402-5025 Abstract- Iris recognition
More informationEFFICIENT CONTRAST ENHANCEMENT USING GAMMA CORRECTION WITH MULTILEVEL THRESHOLDING AND PROBABILITY BASED ENTROPY
EFFICIENT CONTRAST ENHANCEMENT USING GAMMA CORRECTION WITH MULTILEVEL THRESHOLDING AND PROBABILITY BASED ENTROPY S.Gayathri 1, N.Mohanapriya 2, B.Kalaavathi 3 1 PG student, Computer Science and Engineering,
More informationKeyword: Morphological operation, template matching, license plate localization, character recognition.
Volume 4, Issue 11, November 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Automatic
More informationPostprint.
http://www.diva-portal.org Postprint This is the accepted version of a paper presented at 2nd IEEE International Conference on Biometrics - Theory, Applications and Systems (BTAS 28), Washington, DC, SEP.
More informationAnalysis and Identification of Rice Granules Using Image Processing and Neural Network
International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 10, Number 1 (2017), pp. 25-33 International Research Publication House http://www.irphouse.com Analysis and Identification
More informationAutomatic Vehicles Detection from High Resolution Satellite Imagery Using Morphological Neural Networks
Automatic Vehicles Detection from High Resolution Satellite Imagery Using Morphological Neural Networks HONG ZHENG Research Center for Intelligent Image Processing and Analysis School of Electronic Information
More informationWriter Verification Using Spatial Domain Features under Different Ink Width Conditions
Regular Paper Journal of Computing Science and Engineering, Vol. 10, No. 2, June 2016, pp. 39-50 Writer Verification Using Spatial Domain Features under Different Ink Width Conditions Sharada Laxman Kore*
More informationSegmentation of Fingerprint Images Using Linear Classifier
EURASIP Journal on Applied Signal Processing 24:4, 48 494 c 24 Hindawi Publishing Corporation Segmentation of Fingerprint Images Using Linear Classifier Xinjian Chen Intelligent Bioinformatics Systems
More informationEvaluation of Waveform Structure Features on Time Domain Target Recognition under Cross Polarization
Journal of Physics: Conference Series PAPER OPEN ACCESS Evaluation of Waveform Structure Features on Time Domain Target Recognition under Cross Polarization To cite this article: M A Selver et al 2016
More informationA Comparison of Particle Swarm Optimization and Gradient Descent in Training Wavelet Neural Network to Predict DGPS Corrections
Proceedings of the World Congress on Engineering and Computer Science 00 Vol I WCECS 00, October 0-, 00, San Francisco, USA A Comparison of Particle Swarm Optimization and Gradient Descent in Training
More informationISSN Vol.02,Issue.17, November-2013, Pages:
www.semargroups.org, www.ijsetr.com ISSN 2319-8885 Vol.02,Issue.17, November-2013, Pages:1973-1977 A Novel Multimodal Biometric Approach of Face and Ear Recognition using DWT & FFT Algorithms K. L. N.
More informationCopyright 2006 Society of Photo-Optical Instrumentation Engineers.
Adam Czajka, Przemek Strzelczyk, ''Iris recognition with compact zero-crossing-based coding'', in: Ryszard S. Romaniuk (Ed.), Proceedings of SPIE - Volume 6347, Photonics Applications in Astronomy, Communications,
More informationSIMULATION VOICE RECOGNITION SYSTEM FOR CONTROLING ROBOTIC APPLICATIONS
SIMULATION VOICE RECOGNITION SYSTEM FOR CONTROLING ROBOTIC APPLICATIONS 1 WAHYU KUSUMA R., 2 PRINCE BRAVE GUHYAPATI V 1 Computer Laboratory Staff., Department of Information Systems, Gunadarma University,
More informationStamp detection in scanned documents
Annales UMCS Informatica AI X, 1 (2010) 61-68 DOI: 10.2478/v10065-010-0036-6 Stamp detection in scanned documents Paweł Forczmański Chair of Multimedia Systems, West Pomeranian University of Technology,
More informationGestureCommander: Continuous Touch-based Gesture Prediction
GestureCommander: Continuous Touch-based Gesture Prediction George Lucchese george lucchese@tamu.edu Jimmy Ho jimmyho@tamu.edu Tracy Hammond hammond@cs.tamu.edu Martin Field martin.field@gmail.com Ricardo
More informationAn Overview of Biometrics. Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University
An Overview of Biometrics Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University What are Biometrics? Biometrics refers to identification of humans by their characteristics or traits Physical
More information