Online handwritten signature verification system: A Review

Size: px
Start display at page:

Download "Online handwritten signature verification system: A Review"

Transcription

1 Online handwritten signature verification system: A Review Abstract: Online handwritten signature verification system is one of the most reliable, fast and cost effective tool for user authentication. This work examines the online handwritten signature verification system methodologies. Signatures are acquired from devices such as pressure sensitive tablets, digitizer, etc. The aim of this paper is to review the signature feature extraction algorithms, techniques and methodologies. This gives a brief description of the performance evaluation parameters. The performance of algorithms is compared using various factors which include the False Acceptance Rate (FAR), False Reject Rate (FRR) and Equal Error Rate (EER) etc. Keywords: Feature extraction, Segmentation, False Acceptance Rate, False Rejection Rate. 1. INTRODUCTION Many business applications (e.g. E-banking) depend on biometrics since using biometrics is the only way to pledge the presence of the owner when a transaction is made. The main benefit of using a biometrics can t easily be lost, stolen, hacked, and forged. The future of biometrics looks increasingly bright with the demand for security rising day by day. Application areas of online signature verification include protection of small personal devices (e.g. PDA, laptop, mobile, etc.); protection of data of computer users from unauthorized persons and authentication of individuals for access to documents, physical devices. The signatures of the same person can vary with time and state of mind. This factor is not considered in offline verification system, but in online verification system these factors are also considered to make the system more precise. Numbers of techniques have been proposed to authenticate forgeries. Some of them are discussed in this paper to provide the performance analysis in the field of online handwritten signature verification system. The paper is structured in six sections; Section 1 is the introductory part, Section 2 describes the challenges associated with online handwritten signature verification system. Section 3 presents the basic aspects of data acquisition and preprocessing stage. In section 4, the feature extraction stage is addressed. The Study of various existing methods of Online Signature verification systems brief description of papers of each category is given in Section 5.Finally the conclusion of the paper is reported in Section 6. Prathiba M.K. 1 and Dr. L. Basavaraj 2 1 Visvesvaraya technological University, ATME College of Engineering, Mysore , India. 2 Visvesvaraya technological University, ATME College of Engineering, Mysore , India. 2. CHALLENGES ASSOCIATED WITH ONLINE HANDWRITTEN SIGNATURE VERIFICATION SYSTEM One of the main challenges in signature verification is related to the signature inconsistency. Skilled forgers can perform forgery with high resemblance to the user s signature. The variability noticed in this case is known as inter-person variability. Significant differences have also been noticed with the signatures of the user taken at different times known as intra-person variability. It is a challenge to distinguish both and to get better result. The signing relies on a very fast, practiced, and repeatable motion. But, this motion may change over time, generating another completely different signature. The signatures signed with a digitize pen and unfamiliar signing surface may also affect the signing process. 3. DATA ACQUISITION AND PREPROCESSING Signature verification involves signature acquisition, preprocessing, feature extraction, enrollment, matching, and threshold selection. 3.1 Signature acquisition Online signature verification uses the signature which is captured by data acquisition devices like pressuresensitive tablet. The use of dynamic features makes the signature more unique and more difficult to reproduce. As a result the online signature verification is more reliable than offline signature verification. Commonly used data acquisition device is a digitizing tablet and digitize pen. 3.2 Preprocessing After data acquisition, preprocessing steps are commonly performed to improve the performance of a verification system. Typically, there are three stages in the preprocessing phase. These include smoothing, normalization, and segmentation Smoothing Low resolution tablet suffer from discretization errors, resulting in jagged signature trajectories. Extracting local features from jagged signature trajectories and then using them for verification lead to poor performance. Hence, smoothing is required for low resolution tablets Normalization In the systems where tablets of different active areas are used, signature size normalization is a frequently used as Volume 3, Issue 2 March April 2014 Page 263

2 preprocessing technique. Comparing two signatures having the same shape with different sizes would result in low similarity scores. Size normalization is applied to remove this effect, i.e. the characteristics of signature are preserved Segmentation Segmentation is an important preprocessing step, which influences all the successive phases of signature verification system. Signature segmentation is a complex task since different signatures produced by the same signer can differ from one another. Because of this, specific attention has been devoted to signature segmentation and several techniques have been proposed [11], [8]. 4. FEATURE EXTRACTION Performance of the online signature verification depend system the selection of features are very significant. The features are related to the shape of the signature and independent of the data acquisition device. The efficiency of a signature verification system mainly depends on Feature extraction stage. Feature extraction techniques should be fast and easy to compute so that system has low computational power. Selected features should discriminate between genuine and forgery signature. There are two types of features that validate a signature. Static features are those, which are extracted from signatures that are recorded as an image. Dynamic features are extracted from signatures that are acquired in real time which provides the information about the number and order of strokes, the overall speed of the signature, the pen pressure at each point etc. which make the signature more unique. Two main approaches in feature extraction process are parameters-based approach and functions-based approach. When parameter-based features are used, the signature is characterized as a vector of elements, and each one represents the value of a feature [10]. When function-based features are used, the signature is usually characterized in terms of a time function whose values constitute the feature set. In general, function-based features allow better performance than parameters-based features [2]. Parameter based features are generally classified into two main categories such as global and local. Global features are those which are extracted from the whole signature. They can be extracted easily, but it delivers only limited information about signature. Global features include signature size, signing time, number of pen ups, signature height to width ratio, etc. Local parameters concern features extracted from specific parts of the signature. Based on the extracted features, local parameters can be divided into component-oriented parameters, which are extracted at the level of each component (i.e., height to width ratio of the stroke, relative positions of the strokes, stroke orientation, etc.), and pixel-oriented parameters, which are extracted at pixel level (i.e., grid-based information, pixel density, gray-level intensity, texture, etc.). Generally, local features are computationally expensive but more accurate than the global features. Some parameters features, which are generally considered to be global features, can also be applied locally, and vice versa. 4.1 Performance evaluation parameters The performance of signature verification systems is typically described by two parameters; False Acceptance Rate and False Reject Rate. The percentage of genuine signatures rejected as forgery which is called False Rejection Rate and the percentage of the forgery signatures accepted as genuine is called False Acceptance Rate. These two errors are directly correlated, where a change in one of the rates will inversely affect the other. Generally signature verification system shall have an acceptable trade-off between a low FAR and a low FRR. A common alternative to describe the performance of system is to calculate the Equal Error Rate. EER corresponds to the point where the false accept and false reject rates are equal. 5. STUDY OF VARIOUS EXISTING METHODS OF ONLINE SIGNATURE VERIFICATION SYSTEMS Every Signature verification system is differing from one another, based on their feature selection method, decision making method or both. This section reviews some of the existing signature verification systems such as Tablet PC and digitalize pen, Hidden Markov Models (HMM s), modified Dynamic Time Wrapping Technique (DTW) and Neural Networks (NNs). 5.1 Tablet PC and digitize pen The online signature verification systems are using the Tablet PCs and its pen. Tablet PC is a stable and reliable signature capturing devices. It captures both the dynamic and static features of a signature at the same time. Commonly used data acquisition device is a digitizing tablet. However, the signing process using digitizing tablet is different because the signer instantaneously cannot see what he has written, which may cause inconvenience [3],[4].Digitize pens with touch-sensitive screens and digital-ink technologies are developed to avoid signer disorientation by providing immediate feedback to the writer. In a digitize pen several electronic components are used to detect pen motion, velocity, inclination, and other dynamic features which are extracted during the signing process. Alonso-Fernandez [3] developed a prototype of securing access and securing document application using Tablet PC system. Two different commercial Tablet PCs(Hewlett-Packard TC 1100with Intel Pentium Mobile 1.1 GHz processor and Toshiba Portege M200 with Intel Centrinto 1.6GHz processor)had been used. The signature verification systems based on the pressure statics of the signature. The experiments were tested against both random and skilled forgeries by using data base containing 3000 signatures. According to their reports F. Alonso-Fernandez et al. [4], the Toshiba tablet performed Volume 3, Issue 2 March April 2014 Page 264

3 better with the reporting result of 8.27% to 8.05% EER for Skilled forgeries and 3.20% to 2.76% EER for random forgeries. A. K. Jain [1] utilized a digitizing tablet to capture the spatial and dynamic information of signature. The digitizing tablet used was the IBM CrossPad from A.T. Cross Company. IBM CrossPad records the x-coordinates and y-coordinates of the points in the signature with a sampling rate of samples per second. Experiments were conducted using a database with over 1232 signatures collected from 102 individuals. The best result reported a false accept rate of 1.6% and a false reject rate of 2.8%. Thanin Maneechot[15] Proposed an algorithm for online signature verification, using N-tuple learning machine. The features are extracted from hand written signature on WACOM digital tablet. This captures dynamic information of signature such as X-Y position, pressure of pen and pen altitude angle. The verification employed N- tuple learning machine. The basic structure is similar to an encoder, which the inputs are binary values N-tuple simulated from RAM s. It was establish that pen pressure was influenced feature. They obtained a FAR for a forgery was 1.32% and FRR for genuine signature was 0.2%. Syed Khaleel Ahmed [14] designed signature verification system using the WACOM Graphire 3 pressure pad with pressure sensitive pen. The tablet captures the position co-ordinates x, y and pressure P as a function of time of the signature were extracted. A signature verification system based on the Self-Organizing Map (SOM) of Neural Network model was designed in MATLAB to verify the signature. The system performance was evaluated by using 50 epochs and 200 epochs for two different cases. The best result reported a FRR and FAR was 19.05% and 9.29% for 200 epochs. The comparison of selected performance evaluation parameters for the Tablet PC and digitalize pen methodology illustrated in Table-1with high accuracy was reported by Thanin Maneechot[15]. Table 1- Performance Evaluation Parameters obtained from the Tablet Pc and Digitize Pen Sl. Year FAR FRR Authors No. (%) (%) Anil. K. Jain al [2] 2 3 Thanin Maneechot[15] Syed Khaleel Ahmed [14] Dynamic Time Wrapping Technique Dynamic Time Wrapping (DTW) is an algorithm used for measuring similarity between two signatures, which may vary in time. The signatures are warped non-linearly in time dimension to determine an optimal match between two signatures. A. Kolmatov [2] proposed a system for online handwritten signature verification, approaching the problem as a two-class pattern recognition problem. DTW was used to establish the test signature s legitimacy. During enrollment phase, the user supplies a number of signatures. The variation in a user s signatures, are stored as measuring parameters, with a unique user identifier in the system s database. When a test signature is input to the system for verification, it is compared to each of the reference signatures of the claimed individual. The resulting minimum, maximum, and template distance values normalized by the equivalent average values stored in the user s profile. A three dimensional feature vectors was formed in classifying the test signature. The experiment was conducted using a data base from 94 people producing 619 signatures. The experiment result was 2.8% EER when tested with skilled forgeries and awarded the first place at First International Signature Verification Competition. S.A. Daramolo [13] proposed a robust automatic online signature verification system. They have used a good resolution signature capturing device i.e. graphics tablet and hence preprocessing stage is not used in the system. To establish a correspondence between feature sequences of signature samples the Dynamic Time Wrapping (DTW) algorithm were used in the training and classification stages. The proposed online signature verification system was tested using 800 genuine signatures from 200 users, 400 skilled forgeries from 200 forgers and 400 random signatures. Experiments showed that it had 0.25% error (FRR) accepting the genuine signatures. While in rejecting skilled and random forgeries (FAR) error was of 0.5% and 0.0 % respectively. DTW technique has two drawbacks viz. Heavy computational load which consumes more time, Warping forgery which makes the verification more difficult. F. Hao. [5]proposed a new warping technique which was named as Extreme Points Warping (EPW).Which involves selected important points of a signature, matching them, and then warping the segments between them. The experiment was conducted using 1000 signatures of 25 users and compared between the DTW and EPW methods. When the Euclidean distance was used, DTW showed an EER of 33.0% but EPW showed an EER of 25.4%. When the correlation coefficient was used, DTW showed an EER of 35.0% but EPW showed an EER of 27.7%. The results shows that EPW is much faster than DTW and leads to slightly better EER J. Zhang and S. kamata [9] proposed a signature verification method dividing a signature into several segments. A Modified DTW algorithm was used by considering the local properties of the signature. This can effectively remove the redundant points in the input signature. The dissimilarity scores based on the obtained segment-to-segment mapping information was calculated to evaluate whether the input signature is genuine. The Volume 3, Issue 2 March April 2014 Page 265

4 experiments reported the EER of 6.02% to 7.82% for the 60 and 40 user s database respectively. 5.3 Hidden Markov Models HMMs models have found to be well suited for signature modeling since they are highly adaptable to personal variability. HMM performs stochastic matching of the two signatures using a sequence of probability distributions of the features along the signature. Mohammad M. Shafli and Hamid R. Rabiee [11] introduced signature verification system using variable length segmentation and Hidden Markov Models. The signature was described by using the HMM as a sequence of vectors of values related to each point of signature in its trajectory. From each segment of the signature seven parameters were extracted. For each person, mean (µ) and variance (σ) of log-likelihood obtained from its HMM model divided by average segments number for his signatures in the training set and these values were saved beside the HMM model as a template for his signing process. These two values show acceptable range of loglikelihood value for genuine signature. For the verification purpose, the researchers used a database from 622 genuine signatures were collected, from a population of 69 human subjects including 12 women and 6 left hand writers. Additionally 1010 skilled forged samples were used to evaluate the performance of system. They obtained a FAR of 4% and a FRR of 12%. 5.4 Neural Networks Syed Khaleel Ahmed [14] designed signature verification system with 4 modules. They are feature extraction, reference module, sample module, and intelligent decision module. The feature selection module captures the position co-ordinates X, Y, and pressure P as a function of time of the signature were extracted from the tablet. The reference module stores the data for training. The sample module consists of data for validation. The Self-Organizing Map (SOM) of Neural Network model was used as an intelligent decision module. This system makes it easy to visualize and classify data by clustering similar data groups. The high dimensional data map into a 1 or 2 dimensions. The system performance was evaluated by using 50 epochs and 200 epochs for two different cases. The FAR and FRR were 11.43% and 20.95%for 50 epochs 9.29% and 19.05% for 200 epochs respectively. Results obtained using prototype system was encouraging. Zhan Enqi et al [16] presented online handwritten signature verification based on two levels back propagation neural network [BPNN]. The first level selects 15 statistic features as the input to BPNN. These features can reflect the signature speed and shape of signature. The second level selects wavelet features, which includes only important features extracting for matching and recognition of signature. The author used five groups of signature samples. Each group of training sample is composed of 5 genuine signature and 10 forged signatures, which include genuine, random, and skilled forged signatures. They obtained 1.07%of FAR and 6% of FRR. Nan Xu [12] proposed a method for online handwritten signature verification by using back propagation neural networks. A touch-based tablet was used to acquire the signature visual outline, the coordinates (x, y), pressure, time, length and other information in the form of vector was stored in computer. These acquired features of the signature were not sufficient to build the template of the reference signature. They considered the intrinsic properties of signature which leads to the FR errors. i.e. randomness of handwriting the signature such as the size and spacing between the words. Total of 49 features were designed using Matlab by considering the above acquired features of the signature and then calculated the corresponding characteristic values for each specimen signatures and a standard uniform vector used as a template of the reference signature. They obtained a FAR of 1.5% and a FRR of 3.5%. Table-2 summarizes the results of various Neural Networks based signature verification techniques. A high accuracy was reported by Zhan Enqi [16]. Table- 2 Performance Evaluation Parameters for Neural Networks Sl. FAR Authors Year No. (%) Syed Khallel Ahmed et al [14] FRR (%) Zhan Enqi et al [16] Nan Xu et al [12] Conclusion The signature verification system must take into an account the volatile characteristics of the signature. i.e. the signatures of the same person are similar but not identical. In addition, a person s signatures often change during their life due to age, illness and up to some extent the emotional state of the person. This makes it difficult for the researcher to achieve a better performance of the system. The signature acquiring system plays a very important role in signature verification systems. This opens another research area. The accurate segmentation of the signature is a key factor of signature verification system. Many promising techniques and algorithms have been developed but, there is still room for improvement in signature segmentation methodologies. The study of number of works did on signature verification systems shows that a large number of existing systems employ limited number of feature extraction with Volume 3, Issue 2 March April 2014 Page 266

5 the intention of reducing the algorithm size, thus making the system run faster. Among the studied papers in this review, S.A. Daramolo [10] has the best performance evaluation parameter values with FAR of 0.25% and FRR of 0.5% for skilled forgeries and completely rejecting the random forgeries. References: [1] Anil.K.Jain,FriederikeGriess, Scotto,Connel online signature verification. Pattern Recognition letters, volume 35, Issue 12, 2002 pp [2] AlisheiKolmatov, BerrinYainkoglu, Identity authentication using improved online signature verification method, Pattern Recognition letters, volume 26,Issue 15, November 2005,pp [3] Alonso-Fernandez, J. Fierrez-Aguilar, and J. Ortega- Garcia, Sensor interoperability and fusion in signature verification: A case study using tablet PC, (Lecture Notes in Computer Science 3781) in Proc. Int. Workshop Biometric Recognit. Syst. (IWBRS). Beijing, China Springer- Verlag, Oct. 2005, pp [4] Alonso-Fernandez, J. Fierrez-Aguilar, F. Del Valle, and J. Ortega- Garcia, On-line signature verification using tablet PC, in Proc. 4th Int. Symp. Image Signal Process. Anal. (ISPA 2005), pp [5] Hao, and C. W. Chan, Online Signature Verification Using a New Extreme Points Warping Technique, Pattern Recognition Letters, Volume 24 Issue 16, December [6] Shimizu, S. Kiyono, T. Motoki, and W. Gao, An electrical pen for signature verification using a twodimensional optical angle sensor, Sens. Actuators, vol. 111, pp , [7] Taguchi, K. Kiriyama, E. Tanaka, and K. Fujii, On-line recognition of handwritten signatures by feature extraction of the pen movements, IEICE Trans., vol. 71, no. 5, pp , [8] Lee, H.-S. Yoon, J. Soh, B. T. Chun, and Y. K. Chung. Using geometric extrema for segment-tosegment characteristics comparison in online signature verification. [9] J.Zhang and S.kamata, Online signature verification using, segment to segment matching. In:Int. conf. on Frontiers in handwriting recognition ICFHR,2008. [10] L. Lee, T. Berger, and E. Aviczer. Reliable on-line human signature verification systems. IEEE Trans. on Pattern Analysis and Machine Intelligence, 18(6): , [11] Mohammad M.Shafiei and Hamid R.Rabiee,a new on-line signature verification algorithm using variable length segmentation and Hidden Markov Models. Proceedings of the seventh international conference on document Analysis and recognition, [12] Nan Xu, Li Cheng, Yan Guo, Xiaogang Wu and Jiali Zhao, online handwritten signature verification by using back propagation neural networks /11/$ IEEE. [13] S.A. Daramolo and T. S.Ibiyemi, Efficient Online Signature Verification System, International Journal of Engineering and Technology IJET-IJENS, [14] Syed Khallel Ahmed, Agileswari K. Ramaswamy, anissalwa Mohd. Khairuddin and Jamaludinomar, Automatic online signature verification, A prototype using neural networks, TENCON 2009, pp [15] Thanin Maneechot and Yuttana Kitjaidure Signature Verification Using N-tuple Learning Machine Proceedings of the 2005 IEEE Engineerimg in Medicine and Biology 27 th Annual conference Shanghai,China,September 1-4,2005. [16] Zhan Enqi,Guojinxu,ZhengJianbin Ma chan&wanglinjuan, online handwritten signature verification based on two levels back propagation neural network. In: International Symposium on Intelligent Ubiquitous Computing and Education, 2009 pp AUTHORS Prathiba M.K received her Bachelor of Engineering Degree in Electronics and Communication Engineering from Mysore University in She did her Master of Technology in Industrial Electronics from Visvesvaraya Technological University, Belgaum in Presently she is pursuing Ph.D. in the area of Biometric Application under the guidance of Dr. L. Basavaraj. Her area of interest is Signal processing and Image processing. Dr. L. Basavaraj received his M.E degree in Digital Electronics from Karnatak University in 1994, and Ph.D in Electronics from University of Mysore in His researches interests include VLSI Implementation of signal Processing Applications, Biomedical Signal Processing, Offline, and on-line handwritten signature recognition. Volume 3, Issue 2 March April 2014 Page 267

Offline Signature Verification for Cheque Authentication Using Different Technique

Offline Signature Verification for Cheque Authentication Using Different Technique Offline Signature Verification for Cheque Authentication Using Different Technique Dr. Balaji Gundappa Hogade 1, Yogita Praful Gawde 2 1 Research Scholar, NMIMS, MPSTME, Associate Professor, TEC, Navi

More information

Evaluation of Online Signature Verification Features

Evaluation of Online Signature Verification Features Evaluation of Online Signature Verification Features Ghazaleh Taherzadeh*, Roozbeh Karimi*, Alireza Ghobadi*, Hossein Modaberan Beh** * Faculty of Information Technology Multimedia University, Selangor,

More information

IMPACT OF SIGNATURE LEGIBILITY AND SIGNATURE TYPE IN OFF-LINE SIGNATURE VERIFICATION.

IMPACT OF SIGNATURE LEGIBILITY AND SIGNATURE TYPE IN OFF-LINE SIGNATURE VERIFICATION. IMPACT OF SIGNATURE LEGIBILITY AND SIGNATURE TYPE IN OFF-LINE SIGNATURE VERIFICATION F. Alonso-Fernandez a, M.C. Fairhurst b, J. Fierrez a and J. Ortega-Garcia a. a Biometric Recognition Group - ATVS,

More information

Classification of Features into Strong and Weak Features for an Intelligent Online Signature Verification System

Classification of Features into Strong and Weak Features for an Intelligent Online Signature Verification System Classification of Features into Strong and Weak Features for an Intelligent Online Signature Verification System Saad Tariq, Saqib Sarwar & Waqar Hussain Department of Electrical Engineering Air University

More information

SVC2004: First International Signature Verification Competition

SVC2004: First International Signature Verification Competition SVC2004: First International Signature Verification Competition Dit-Yan Yeung 1, Hong Chang 1, Yimin Xiong 1, Susan George 2, Ramanujan Kashi 3, Takashi Matsumoto 4, and Gerhard Rigoll 5 1 Hong Kong University

More information

Static Signature Verification and Recognition using Neural Network Approach-A Survey

Static Signature Verification and Recognition using Neural Network Approach-A Survey Available online www.ejaet.com European Journal of Advances in Engineering and Technology, 2015, 2(4): 46-50 Review Article ISSN: 2394-658X Static Signature Verification and Recognition using Neural Network

More information

Real time verification of Offline handwritten signatures using K-means clustering

Real time verification of Offline handwritten signatures using K-means clustering Real time verification of Offline handwritten signatures using K-means clustering Alpana Deka 1, Lipi B. Mahanta 2* 1 Department of Computer Science, NERIM Group of Institutions, Guwahati, Assam, India

More information

Research Seminar. Stefano CARRINO fr.ch

Research Seminar. Stefano CARRINO  fr.ch Research Seminar Stefano CARRINO stefano.carrino@hefr.ch http://aramis.project.eia- fr.ch 26.03.2010 - based interaction Characterization Recognition Typical approach Design challenges, advantages, drawbacks

More information

Nikhil Gupta *1, Dr Rakesh Dhiman 2 ABSTRACT I. INTRODUCTION

Nikhil Gupta *1, Dr Rakesh Dhiman 2 ABSTRACT I. INTRODUCTION International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 6 ISSN : 2456-3307 An Offline Handwritten Signature Verification Using

More information

Complexity-based Biometric Signature Verification

Complexity-based Biometric Signature Verification Complexity-based Biometric Signature Verification Ruben Tolosana, Ruben Vera-Rodriguez, Richard Guest, Julian Fierrez and Javier Ortega-Garcia Biometrics and Data Pattern Analytics (BiDA) Lab - ATVS, Escuela

More information

Writer identification clustering letters with unknown authors

Writer identification clustering letters with unknown authors Writer identification clustering letters with unknown authors Joanna Putz-Leszczynska To cite this version: Joanna Putz-Leszczynska. Writer identification clustering letters with unknown authors. 17th

More information

Proposed Method for Off-line Signature Recognition and Verification using Neural Network

Proposed Method for Off-line Signature Recognition and Verification using Neural Network e-issn: 2349-9745 p-issn: 2393-8161 Scientific Journal Impact Factor (SJIF): 1.711 International Journal of Modern Trends in Engineering and Research www.ijmter.com Proposed Method for Off-line Signature

More information

A novel method to generate Brute-Force Signature Forgeries

A novel method to generate Brute-Force Signature Forgeries A novel method to generate Brute-Force Signature Forgeries DIUF-RR 274 06-09 Alain Wahl 1 Jean Hennebert 2 Andreas Humm 3 Rolf Ingold 4 June 12, 2006 Department of Informatics Research Report Département

More information

On-Line, Low-Cost and Pc-Based Fingerprint Verification System Based on Solid- State Capacitance Sensor

On-Line, Low-Cost and Pc-Based Fingerprint Verification System Based on Solid- State Capacitance Sensor On-Line, Low-Cost and Pc-Based Fingerprint Verification System Based on Solid- State Capacitance Sensor Mohamed. K. Shahin *, Ahmed. M. Badawi **, and Mohamed. S. Kamel ** *B.Sc. Design Engineer at International

More information

Evaluating the Biometric Sample Quality of Handwritten Signatures

Evaluating the Biometric Sample Quality of Handwritten Signatures Evaluating the Biometric Sample Quality of Handwritten Signatures Sascha Müller 1 and Olaf Henniger 2 1 Technische Universität Darmstadt, Darmstadt, Germany mueller@sec.informatik.tu-darmstadt.de 2 Fraunhofer

More information

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN IJSER

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN IJSER International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December-2016 192 A Novel Approach For Face Liveness Detection To Avoid Face Spoofing Attacks Meenakshi Research Scholar,

More information

Classification of Handwritten Signatures Based on Name Legibility

Classification of Handwritten Signatures Based on Name Legibility Classification of Handwritten Signatures Based on Name Legibility Javier Galbally, Julian Fierrez and Javier Ortega-Garcia Biometrics Research Lab./ATVS, EPS, Universidad Autonoma de Madrid, Campus de

More information

Content Based Image Retrieval Using Color Histogram

Content Based Image Retrieval Using Color Histogram Content Based Image Retrieval Using Color Histogram Nitin Jain Assistant Professor, Lokmanya Tilak College of Engineering, Navi Mumbai, India. Dr. S. S. Salankar Professor, G.H. Raisoni College of Engineering,

More information

Pixel Based Off-line Signature Verification System

Pixel Based Off-line Signature Verification System Research Paper American Journal of Engineering Research (AJER) e-issn : 2320-0847 p-issn : 2320-0936 Volume-04, Issue-01, pp-187-192 www.ajer.org Open Access Pixel Based Off-line Signature Verification

More information

Comparison of ridge- and intensity-based perspiration liveness detection methods in fingerprint scanners

Comparison of ridge- and intensity-based perspiration liveness detection methods in fingerprint scanners Comparison of ridge- and intensity-based perspiration liveness detection methods in fingerprint scanners Bozhao Tan and Stephanie Schuckers Department of Electrical and Computer Engineering, Clarkson University,

More information

A Mathematical model for the determination of distance of an object in a 2D image

A Mathematical model for the determination of distance of an object in a 2D image A Mathematical model for the determination of distance of an object in a 2D image Deepu R 1, Murali S 2,Vikram Raju 3 Maharaja Institute of Technology Mysore, Karnataka, India rdeepusingh@mitmysore.in

More information

Online Signature Verification: A Review

Online Signature Verification: A Review J. Appl. Environ. Biol. Sci., 4(9S)303-308, 2014 2014, TextRoad Publication ISSN: 2090-4274 Journal of Applied Environmental and Biological Sciences www.textroad.com Online Signature Verification: A Review

More information

Online Signature Verification on Mobile Devices

Online Signature Verification on Mobile Devices IJSTE - International Journal of Science Technology & Engineering Volume 2 Issue 10 April 2016 ISSN (online): 2349-784X Online Signature Verification on Mobile Devices Miss. Hude. Kalyani. A. Miss. Khande

More information

A Novel Algorithm for Hand Vein Recognition Based on Wavelet Decomposition and Mean Absolute Deviation

A Novel Algorithm for Hand Vein Recognition Based on Wavelet Decomposition and Mean Absolute Deviation Sensors & Transducers, Vol. 6, Issue 2, December 203, pp. 53-58 Sensors & Transducers 203 by IFSA http://www.sensorsportal.com A Novel Algorithm for Hand Vein Recognition Based on Wavelet Decomposition

More information

Biometric Signature for Mobile Devices

Biometric Signature for Mobile Devices Chapter 13 Biometric Signature for Mobile Devices Maria Villa and Abhishek Verma CONTENTS 13.1 Biometric Signature Recognition 309 13.2 Introduction 310 13.2.1 How Biometric Signature Works 310 13.2.2

More information

Iris Recognition using Hamming Distance and Fragile Bit Distance

Iris Recognition using Hamming Distance and Fragile Bit Distance IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 06, 2015 ISSN (online): 2321-0613 Iris Recognition using Hamming Distance and Fragile Bit Distance Mr. Vivek B. Mandlik

More information

ENHANCHED PALM PRINT IMAGES FOR PERSONAL ACCURATE IDENTIFICATION

ENHANCHED PALM PRINT IMAGES FOR PERSONAL ACCURATE IDENTIFICATION ENHANCHED PALM PRINT IMAGES FOR PERSONAL ACCURATE IDENTIFICATION Prof. Rahul Sathawane 1, Aishwarya Shende 2, Pooja Tete 3, Naina Chandravanshi 4, Nisha Surjuse 5 1 Prof. Rahul Sathawane, Information Technology,

More information

3 Department of Computer science and Application, Kurukshetra University, Kurukshetra, India

3 Department of Computer science and Application, Kurukshetra University, Kurukshetra, India Minimizing Sensor Interoperability Problem using Euclidean Distance Himani 1, Parikshit 2, Dr.Chander Kant 3 M.tech Scholar 1, Assistant Professor 2, 3 1,2 Doon Valley Institute of Engineering and Technology,

More information

Fast identification of individuals based on iris characteristics for biometric systems

Fast identification of individuals based on iris characteristics for biometric systems Fast identification of individuals based on iris characteristics for biometric systems J.G. Rogeri, M.A. Pontes, A.S. Pereira and N. Marranghello Department of Computer Science and Statistic, IBILCE, Sao

More information

Iris Recognition-based Security System with Canny Filter

Iris Recognition-based Security System with Canny Filter Canny Filter Dr. Computer Engineering Department, University of Technology, Baghdad-Iraq E-mail: hjhh2007@yahoo.com Received: 8/9/2014 Accepted: 21/1/2015 Abstract Image identification plays a great role

More information

Image Recognition for PCB Soldering Platform Controlled by Embedded Microchip Based on Hopfield Neural Network

Image Recognition for PCB Soldering Platform Controlled by Embedded Microchip Based on Hopfield Neural Network 436 JOURNAL OF COMPUTERS, VOL. 5, NO. 9, SEPTEMBER Image Recognition for PCB Soldering Platform Controlled by Embedded Microchip Based on Hopfield Neural Network Chung-Chi Wu Department of Electrical Engineering,

More information

License Plate Localisation based on Morphological Operations

License Plate Localisation based on Morphological Operations License Plate Localisation based on Morphological Operations Xiaojun Zhai, Faycal Benssali and Soodamani Ramalingam School of Engineering & Technology University of Hertfordshire, UH Hatfield, UK Abstract

More information

DETECTING OFF-LINE SIGNATURE MODEL USING WIDE AND NARROW VARIETY CLASS OF LOCAL FEATURE

DETECTING OFF-LINE SIGNATURE MODEL USING WIDE AND NARROW VARIETY CLASS OF LOCAL FEATURE DETECTING OFF-LINE SIGNATURE MODEL USING WIDE AND NARROW VARIETY CLASS OF LOCAL FEATURE Agung Sediyono 1 and YaniNur Syamsu 2 1 Universitas Trisakti, Indonesia, trisakti_agung06@yahoo.com 2 LabFor Polda

More information

Research on Hand Gesture Recognition Using Convolutional Neural Network

Research on Hand Gesture Recognition Using Convolutional Neural Network Research on Hand Gesture Recognition Using Convolutional Neural Network Tian Zhaoyang a, Cheng Lee Lung b a Department of Electronic Engineering, City University of Hong Kong, Hong Kong, China E-mail address:

More information

Segmentation of Fingerprint Images

Segmentation of Fingerprint Images Segmentation of Fingerprint Images Asker M. Bazen and Sabih H. Gerez University of Twente, Department of Electrical Engineering, Laboratory of Signals and Systems, P.O. box 217-75 AE Enschede - The Netherlands

More information

Image Forgery Detection Using Svm Classifier

Image Forgery Detection Using Svm Classifier Image Forgery Detection Using Svm Classifier Anita Sahani 1, K.Srilatha 2 M.E. Student [Embedded System], Dept. Of E.C.E., Sathyabama University, Chennai, India 1 Assistant Professor, Dept. Of E.C.E, Sathyabama

More information

Offline Handwritten Signature Verification Approaches: A Review

Offline Handwritten Signature Verification Approaches: A Review Offline Handwritten Signature Verification Approaches: A Review 1 Sanjay S. Gharde, 2 K. P. Adhiya, 3 Harsha G. Chavan 1,2,3 Dept. of Com. Engg., SSBT s College of Engg. and Tech., Bambhori, Jalgaon, Maharashtra,

More information

Automatic Licenses Plate Recognition System

Automatic Licenses Plate Recognition System Automatic Licenses Plate Recognition System Garima R. Yadav Dept. of Electronics & Comm. Engineering Marathwada Institute of Technology, Aurangabad (Maharashtra), India yadavgarima08@gmail.com Prof. H.K.

More information

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1 IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 2, Issue 2, Apr- Generating an Iris Code Using Iris Recognition for Biometric Application S.Banurekha 1, V.Manisha

More information

COMPARATIVE PERFORMANCE ANALYSIS OF HAND GESTURE RECOGNITION TECHNIQUES

COMPARATIVE PERFORMANCE ANALYSIS OF HAND GESTURE RECOGNITION TECHNIQUES International Journal of Advanced Research in Engineering and Technology (IJARET) Volume 9, Issue 3, May - June 2018, pp. 177 185, Article ID: IJARET_09_03_023 Available online at http://www.iaeme.com/ijaret/issues.asp?jtype=ijaret&vtype=9&itype=3

More information

A new seal verification for Chinese color seal

A new seal verification for Chinese color seal Edith Cowan University Research Online ECU Publications 2011 2011 A new seal verification for Chinese color seal Zhihu Huang Jinsong Leng Edith Cowan University 10.4028/www.scientific.net/AMM.58-60.2558

More information

Linear Gaussian Method to Detect Blurry Digital Images using SIFT

Linear Gaussian Method to Detect Blurry Digital Images using SIFT IJCAES ISSN: 2231-4946 Volume III, Special Issue, November 2013 International Journal of Computer Applications in Engineering Sciences Special Issue on Emerging Research Areas in Computing(ERAC) www.caesjournals.org

More information

Introduction to Video Forgery Detection: Part I

Introduction to Video Forgery Detection: Part I Introduction to Video Forgery Detection: Part I Detecting Forgery From Static-Scene Video Based on Inconsistency in Noise Level Functions IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 5,

More information

Online Signature Verification by Using FPGA

Online Signature Verification by Using FPGA Online Signature Verification by Using FPGA D.Sandeep Assistant Professor, Department of ECE, Vignan Institute of Technology & Science, Telangana, India. ABSTRACT: The main aim of this project is used

More information

Analyzing features learned for Offline Signature Verification using Deep CNNs

Analyzing features learned for Offline Signature Verification using Deep CNNs Accepted as a conference paper for ICPR 2016 Analyzing features learned for Offline Signature Verification using Deep CNNs Luiz G. Hafemann, Robert Sabourin Lab. d imagerie, de vision et d intelligence

More information

A Study on Handwritten Signature

A Study on Handwritten Signature A Study on Handwritten Signature L B. Mahanta Institute of Adv. Study in Science and Technology Guwahati 35, P.O- Gorchuk Assam, India ABSTRACT Handwritten signature verification is a behavioral biometric.

More information

Feature Extraction Technique Based On Circular Strip for Palmprint Recognition

Feature Extraction Technique Based On Circular Strip for Palmprint Recognition Feature Extraction Technique Based On Circular Strip for Palmprint Recognition Dr.S.Valarmathy 1, R.Karthiprakash 2, C.Poonkuzhali 3 1, 2, 3 ECE Department, Bannari Amman Institute of Technology, Sathyamangalam

More information

Touchless Fingerprint Recognization System

Touchless Fingerprint Recognization System e-issn 2455 1392 Volume 2 Issue 4, April 2016 pp. 501-505 Scientific Journal Impact Factor : 3.468 http://www.ijcter.com Touchless Fingerprint Recognization System Biju V. G 1., Anu S Nair 2, Albin Joseph

More information

A Cryptosystem With Private Key Generation From Dynamic Properties of Human Hand Signature

A Cryptosystem With Private Key Generation From Dynamic Properties of Human Hand Signature A Cryptosystem With Private Key Generation From Dynamic Properties of Human Hand Signature HAO FENG School of Electrical & Electronic Engineering A thesis submitted to the Nanyang Technological University

More information

Student Attendance Monitoring System Via Face Detection and Recognition System

Student Attendance Monitoring System Via Face Detection and Recognition System IJSTE - International Journal of Science Technology & Engineering Volume 2 Issue 11 May 2016 ISSN (online): 2349-784X Student Attendance Monitoring System Via Face Detection and Recognition System Pinal

More information

Global and Local Quality Measures for NIR Iris Video

Global and Local Quality Measures for NIR Iris Video Global and Local Quality Measures for NIR Iris Video Jinyu Zuo and Natalia A. Schmid Lane Department of Computer Science and Electrical Engineering West Virginia University, Morgantown, WV 26506 jzuo@mix.wvu.edu

More information

Proceedings of the 2014 Federated Conference on Computer Science and Information Systems pp

Proceedings of the 2014 Federated Conference on Computer Science and Information Systems pp Proceedings of the 204 Federated Conference on Computer Science and Information Systems pp. 70 708 DOI: 0.5439/204F59 ACSIS, Vol. 2 Handwritten Signature Verification with 2D Color Barcodes Marco Querini,

More information

Feature Extraction Techniques for Dorsal Hand Vein Pattern

Feature Extraction Techniques for Dorsal Hand Vein Pattern Feature Extraction Techniques for Dorsal Hand Vein Pattern Pooja Ramsoful, Maleika Heenaye-Mamode Khan Department of Computer Science and Engineering University of Mauritius Mauritius pooja.ramsoful@umail.uom.ac.mu,

More information

Iris Segmentation & Recognition in Unconstrained Environment

Iris Segmentation & Recognition in Unconstrained Environment www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Issue -8 August, 2014 Page No. 7514-7518 Iris Segmentation & Recognition in Unconstrained Environment ABSTRACT

More information

Preprocessing and Segregating Offline Gujarati Handwritten Datasheet for Character Recognition

Preprocessing and Segregating Offline Gujarati Handwritten Datasheet for Character Recognition Preprocessing and Segregating Offline Gujarati Handwritten Datasheet for Character Recognition Hetal R. Thaker Atmiya Institute of Technology & science, Kalawad Road, Rajkot Gujarat, India C. K. Kumbharana,

More information

A Study on Handwritten Signature Verification Approaches

A Study on Handwritten Signature Verification Approaches A Study on Handwritten Signature Verification Approaches Surabhi Garhawal, Neeraj Shukla Abstract People are comfortable with pen and papers for authentication and authorization in legal transactions.

More information

Efficient Car License Plate Detection and Recognition by Using Vertical Edge Based Method

Efficient Car License Plate Detection and Recognition by Using Vertical Edge Based Method Efficient Car License Plate Detection and Recognition by Using Vertical Edge Based Method M. Veerraju *1, S. Saidarao *2 1 Student, (M.Tech), Department of ECE, NIE, Macherla, Andrapradesh, India. E-Mail:

More information

An Efficient Approach for Iris Recognition by Improving Iris Segmentation and Iris Image Compression

An Efficient Approach for Iris Recognition by Improving Iris Segmentation and Iris Image Compression An Efficient Approach for Iris Recognition by Improving Iris Segmentation and Iris Image Compression K. N. Jariwala, SVNIT, Surat, India U. D. Dalal, SVNIT, Surat, India Abstract The biometric person authentication

More information

Method for Real Time Text Extraction of Digital Manga Comic

Method for Real Time Text Extraction of Digital Manga Comic Method for Real Time Text Extraction of Digital Manga Comic Kohei Arai Information Science Department Saga University Saga, 840-0027, Japan Herman Tolle Software Engineering Department Brawijaya University

More information

Punjabi Offline Signature Verification System Using Neural Network

Punjabi Offline Signature Verification System Using Neural Network International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 8958, Volume-3, Issue-2, December 2013 Punjabi Offline Signature Verification System Using Neural Network Rimpi Suman, Dinesh

More information

Empirical Evidence for Correct Iris Match Score Degradation with Increased Time-Lapse between Gallery and Probe Matches

Empirical Evidence for Correct Iris Match Score Degradation with Increased Time-Lapse between Gallery and Probe Matches Empirical Evidence for Correct Iris Match Score Degradation with Increased Time-Lapse between Gallery and Probe Matches Sarah E. Baker, Kevin W. Bowyer, and Patrick J. Flynn University of Notre Dame {sbaker3,kwb,flynn}@cse.nd.edu

More information

Integrated Digital System for Yarn Surface Quality Evaluation using Computer Vision and Artificial Intelligence

Integrated Digital System for Yarn Surface Quality Evaluation using Computer Vision and Artificial Intelligence Integrated Digital System for Yarn Surface Quality Evaluation using Computer Vision and Artificial Intelligence Sheng Yan LI, Jie FENG, Bin Gang XU, and Xiao Ming TAO Institute of Textiles and Clothing,

More information

Wavelet-based Image Splicing Forgery Detection

Wavelet-based Image Splicing Forgery Detection Wavelet-based Image Splicing Forgery Detection 1 Tulsi Thakur M.Tech (CSE) Student, Department of Computer Technology, basiltulsi@gmail.com 2 Dr. Kavita Singh Head & Associate Professor, Department of

More information

FACE RECOGNITION USING NEURAL NETWORKS

FACE RECOGNITION USING NEURAL NETWORKS Int. J. Elec&Electr.Eng&Telecoms. 2014 Vinoda Yaragatti and Bhaskar B, 2014 Research Paper ISSN 2319 2518 www.ijeetc.com Vol. 3, No. 3, July 2014 2014 IJEETC. All Rights Reserved FACE RECOGNITION USING

More information

PHASE PRESERVING DENOISING AND BINARIZATION OF ANCIENT DOCUMENT IMAGE

PHASE PRESERVING DENOISING AND BINARIZATION OF ANCIENT DOCUMENT IMAGE Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 7, July 2015, pg.16

More information

Image Averaging for Improved Iris Recognition

Image Averaging for Improved Iris Recognition Image Averaging for Improved Iris Recognition Karen P. Hollingsworth, Kevin W. Bowyer, and Patrick J. Flynn University of Notre Dame Abstract. We take advantage of the temporal continuity in an iris video

More information

Biometrics - A Tool in Fraud Prevention

Biometrics - A Tool in Fraud Prevention Biometrics - A Tool in Fraud Prevention Agenda Authentication Biometrics : Need, Available Technologies, Working, Comparison Fingerprint Technology About Enrollment, Matching and Verification Key Concepts

More information

AN EXPANDED-HAAR WAVELET TRANSFORM AND MORPHOLOGICAL DEAL BASED APPROACH FOR VEHICLE LICENSE PLATE LOCALIZATION IN INDIAN CONDITIONS

AN EXPANDED-HAAR WAVELET TRANSFORM AND MORPHOLOGICAL DEAL BASED APPROACH FOR VEHICLE LICENSE PLATE LOCALIZATION IN INDIAN CONDITIONS AN EXPANDED-HAAR WAVELET TRANSFORM AND MORPHOLOGICAL DEAL BASED APPROACH FOR VEHICLE LICENSE PLATE LOCALIZATION IN INDIAN CONDITIONS Mo. Avesh H. Chamadiya 1, Manoj D. Chaudhary 2, T. Venkata Ramana 3

More information

Image Processing Based Vehicle Detection And Tracking System

Image Processing Based Vehicle Detection And Tracking System Image Processing Based Vehicle Detection And Tracking System Poonam A. Kandalkar 1, Gajanan P. Dhok 2 ME, Scholar, Electronics and Telecommunication Engineering, Sipna College of Engineering and Technology,

More information

Combined Approach for Face Detection, Eye Region Detection and Eye State Analysis- Extended Paper

Combined Approach for Face Detection, Eye Region Detection and Eye State Analysis- Extended Paper International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 10, Issue 9 (September 2014), PP.57-68 Combined Approach for Face Detection, Eye

More information

An Offline Handwritten Signature Verification System - A Comprehensive Review

An Offline Handwritten Signature Verification System - A Comprehensive Review An Offline Handwritten Signature Verification System - A Comprehensive Review Ms. Deepti Joon 1, Ms. Shaloo Kikon 2 1 M. Tech. Scholar, Dept. of ECE, P.D.M. College of Engineering, Bahadurgarh, Haryana

More information

Fingerprint Segmentation using the Phase of Multiscale Gabor Wavelets

Fingerprint Segmentation using the Phase of Multiscale Gabor Wavelets CCV: The 5 th sian Conference on Computer Vision, 3-5 January, Melbourne, ustralia Fingerprint Segmentation using the Phase of Multiscale Gabor Wavelets Sylvain Bernard,, Nozha Boujemaa, David Vitale,

More information

VEHICLE LICENSE PLATE DETECTION ALGORITHM BASED ON STATISTICAL CHARACTERISTICS IN HSI COLOR MODEL

VEHICLE LICENSE PLATE DETECTION ALGORITHM BASED ON STATISTICAL CHARACTERISTICS IN HSI COLOR MODEL VEHICLE LICENSE PLATE DETECTION ALGORITHM BASED ON STATISTICAL CHARACTERISTICS IN HSI COLOR MODEL Instructor : Dr. K. R. Rao Presented by: Prasanna Venkatesh Palani (1000660520) prasannaven.palani@mavs.uta.edu

More information

Fingerprint Image Quality Parameters

Fingerprint Image Quality Parameters Fingerprint Image Quality Parameters Muskan Sahi #1, Kapil Arora #2 12 Department of Electronics and Communication 12 RPIIT, Bastara Haryana, India Abstract The quality of fingerprint image determines

More information

Apply Multi-Layer Perceptrons Neural Network for Off-line signature verification and recognition

Apply Multi-Layer Perceptrons Neural Network for Off-line signature verification and recognition www.ijcsi.org 261 Apply Multi-Layer Perceptrons eural etwork for Off-line signature verification and recognition Suhail Odeh and Manal Khalil Computer And Information Systems Department, Bethlehem University

More information

An Evaluation of Automatic License Plate Recognition Vikas Kotagyale, Prof.S.D.Joshi

An Evaluation of Automatic License Plate Recognition Vikas Kotagyale, Prof.S.D.Joshi An Evaluation of Automatic License Plate Recognition Vikas Kotagyale, Prof.S.D.Joshi Department of E&TC Engineering,PVPIT,Bavdhan,Pune ABSTRACT: In the last decades vehicle license plate recognition systems

More information

Chapter 6. [6]Preprocessing

Chapter 6. [6]Preprocessing Chapter 6 [6]Preprocessing As mentioned in chapter 4, the first stage in the HCR pipeline is preprocessing of the image. We have seen in earlier chapters why this is very important and at the same time

More information

EFFICIENT ATTENDANCE MANAGEMENT SYSTEM USING FACE DETECTION AND RECOGNITION

EFFICIENT ATTENDANCE MANAGEMENT SYSTEM USING FACE DETECTION AND RECOGNITION EFFICIENT ATTENDANCE MANAGEMENT SYSTEM USING FACE DETECTION AND RECOGNITION 1 Arun.A.V, 2 Bhatath.S, 3 Chethan.N, 4 Manmohan.C.M, 5 Hamsaveni M 1,2,3,4,5 Department of Computer Science and Engineering,

More information

Biometric Recognition Techniques

Biometric Recognition Techniques Biometric Recognition Techniques Anjana Doshi 1, Manisha Nirgude 2 ME Student, Computer Science and Engineering, Walchand Institute of Technology Solapur, India 1 Asst. Professor, Information Technology,

More information

IDENTIFICATION OF SIGNATURES TRANSMITTED OVER RAYLEIGH FADING CHANNEL BY USING HMM AND RLE

IDENTIFICATION OF SIGNATURES TRANSMITTED OVER RAYLEIGH FADING CHANNEL BY USING HMM AND RLE International Journal of Technology (2011) 1: 56 64 ISSN 2086 9614 IJTech 2011 IDENTIFICATION OF SIGNATURES TRANSMITTED OVER RAYLEIGH FADING CHANNEL BY USING HMM AND RLE Djamhari Sirat 1, Arman D. Diponegoro

More information

Effective and Efficient Fingerprint Image Postprocessing

Effective and Efficient Fingerprint Image Postprocessing Effective and Efficient Fingerprint Image Postprocessing Haiping Lu, Xudong Jiang and Wei-Yun Yau Laboratories for Information Technology 21 Heng Mui Keng Terrace, Singapore 119613 Email: hplu@lit.org.sg

More information

Palm Vein Recognition System using Directional Coding and Back-propagation Neural Network

Palm Vein Recognition System using Directional Coding and Back-propagation Neural Network , October 21-23, 2015, San Francisco, USA Palm Vein Recognition System using Directional Coding and Back-propagation Neural Network Mark Erwin C. Villariña and Noel B. Linsangan, Member, IAENG Abstract

More information

3D Face Recognition System in Time Critical Security Applications

3D Face Recognition System in Time Critical Security Applications Middle-East Journal of Scientific Research 25 (7): 1619-1623, 2017 ISSN 1990-9233 IDOSI Publications, 2017 DOI: 10.5829/idosi.mejsr.2017.1619.1623 3D Face Recognition System in Time Critical Security Applications

More information

Postprint.

Postprint. http://www.diva-portal.org Postprint This is the accepted version of a paper presented at IEEE Intl. Conf. on Control, Automation, Robotics and Vision, ICARCV, Special Session on Biometrics, Singapore,

More information

Iris Recognition using Histogram Analysis

Iris Recognition using Histogram Analysis Iris Recognition using Histogram Analysis Robert W. Ives, Anthony J. Guidry and Delores M. Etter Electrical Engineering Department, U.S. Naval Academy Annapolis, MD 21402-5025 Abstract- Iris recognition

More information

EFFICIENT CONTRAST ENHANCEMENT USING GAMMA CORRECTION WITH MULTILEVEL THRESHOLDING AND PROBABILITY BASED ENTROPY

EFFICIENT CONTRAST ENHANCEMENT USING GAMMA CORRECTION WITH MULTILEVEL THRESHOLDING AND PROBABILITY BASED ENTROPY EFFICIENT CONTRAST ENHANCEMENT USING GAMMA CORRECTION WITH MULTILEVEL THRESHOLDING AND PROBABILITY BASED ENTROPY S.Gayathri 1, N.Mohanapriya 2, B.Kalaavathi 3 1 PG student, Computer Science and Engineering,

More information

Keyword: Morphological operation, template matching, license plate localization, character recognition.

Keyword: Morphological operation, template matching, license plate localization, character recognition. Volume 4, Issue 11, November 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Automatic

More information

Postprint.

Postprint. http://www.diva-portal.org Postprint This is the accepted version of a paper presented at 2nd IEEE International Conference on Biometrics - Theory, Applications and Systems (BTAS 28), Washington, DC, SEP.

More information

Analysis and Identification of Rice Granules Using Image Processing and Neural Network

Analysis and Identification of Rice Granules Using Image Processing and Neural Network International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 10, Number 1 (2017), pp. 25-33 International Research Publication House http://www.irphouse.com Analysis and Identification

More information

Automatic Vehicles Detection from High Resolution Satellite Imagery Using Morphological Neural Networks

Automatic Vehicles Detection from High Resolution Satellite Imagery Using Morphological Neural Networks Automatic Vehicles Detection from High Resolution Satellite Imagery Using Morphological Neural Networks HONG ZHENG Research Center for Intelligent Image Processing and Analysis School of Electronic Information

More information

Writer Verification Using Spatial Domain Features under Different Ink Width Conditions

Writer Verification Using Spatial Domain Features under Different Ink Width Conditions Regular Paper Journal of Computing Science and Engineering, Vol. 10, No. 2, June 2016, pp. 39-50 Writer Verification Using Spatial Domain Features under Different Ink Width Conditions Sharada Laxman Kore*

More information

Segmentation of Fingerprint Images Using Linear Classifier

Segmentation of Fingerprint Images Using Linear Classifier EURASIP Journal on Applied Signal Processing 24:4, 48 494 c 24 Hindawi Publishing Corporation Segmentation of Fingerprint Images Using Linear Classifier Xinjian Chen Intelligent Bioinformatics Systems

More information

Evaluation of Waveform Structure Features on Time Domain Target Recognition under Cross Polarization

Evaluation of Waveform Structure Features on Time Domain Target Recognition under Cross Polarization Journal of Physics: Conference Series PAPER OPEN ACCESS Evaluation of Waveform Structure Features on Time Domain Target Recognition under Cross Polarization To cite this article: M A Selver et al 2016

More information

A Comparison of Particle Swarm Optimization and Gradient Descent in Training Wavelet Neural Network to Predict DGPS Corrections

A Comparison of Particle Swarm Optimization and Gradient Descent in Training Wavelet Neural Network to Predict DGPS Corrections Proceedings of the World Congress on Engineering and Computer Science 00 Vol I WCECS 00, October 0-, 00, San Francisco, USA A Comparison of Particle Swarm Optimization and Gradient Descent in Training

More information

ISSN Vol.02,Issue.17, November-2013, Pages:

ISSN Vol.02,Issue.17, November-2013, Pages: www.semargroups.org, www.ijsetr.com ISSN 2319-8885 Vol.02,Issue.17, November-2013, Pages:1973-1977 A Novel Multimodal Biometric Approach of Face and Ear Recognition using DWT & FFT Algorithms K. L. N.

More information

Copyright 2006 Society of Photo-Optical Instrumentation Engineers.

Copyright 2006 Society of Photo-Optical Instrumentation Engineers. Adam Czajka, Przemek Strzelczyk, ''Iris recognition with compact zero-crossing-based coding'', in: Ryszard S. Romaniuk (Ed.), Proceedings of SPIE - Volume 6347, Photonics Applications in Astronomy, Communications,

More information

SIMULATION VOICE RECOGNITION SYSTEM FOR CONTROLING ROBOTIC APPLICATIONS

SIMULATION VOICE RECOGNITION SYSTEM FOR CONTROLING ROBOTIC APPLICATIONS SIMULATION VOICE RECOGNITION SYSTEM FOR CONTROLING ROBOTIC APPLICATIONS 1 WAHYU KUSUMA R., 2 PRINCE BRAVE GUHYAPATI V 1 Computer Laboratory Staff., Department of Information Systems, Gunadarma University,

More information

Stamp detection in scanned documents

Stamp detection in scanned documents Annales UMCS Informatica AI X, 1 (2010) 61-68 DOI: 10.2478/v10065-010-0036-6 Stamp detection in scanned documents Paweł Forczmański Chair of Multimedia Systems, West Pomeranian University of Technology,

More information

GestureCommander: Continuous Touch-based Gesture Prediction

GestureCommander: Continuous Touch-based Gesture Prediction GestureCommander: Continuous Touch-based Gesture Prediction George Lucchese george lucchese@tamu.edu Jimmy Ho jimmyho@tamu.edu Tracy Hammond hammond@cs.tamu.edu Martin Field martin.field@gmail.com Ricardo

More information

An Overview of Biometrics. Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University

An Overview of Biometrics. Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University An Overview of Biometrics Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University What are Biometrics? Biometrics refers to identification of humans by their characteristics or traits Physical

More information