IJRIT International Journal of Research in Information Technology, Volume 1, Issue 5, May 2013, Pg. 65-73

International Journal of Research in Information Technology (IJRIT)

www.ijrit.com

ISSN 2001-5569

Online Signature Verification using PCA and Neural Network 1

1

Jyoti Bhalla

Student, MTech , Department of Information Technology, Guru Gobind Singh Indraprastha University, Delhi

1

[email protected]

Abstract The purpose of this paper is to study about the use of distinctive anatomical biometric characteristic- Signature for automatically recognizing individuals. Biometric techniques have been used for personal identification in the past. Various identification methods include iris, retina, face, fingerprint, and signature-based identification. The nonvision based techniques include face recognition, fingerprint recognition, iris scanning and retina scanning and the vision-based ones include voice recognition and signature verification. Signature has been a distinguishing feature for person identification because of its ease of acceptance by the public, and lower implementation cost. Signature verification can be applied in commercial fields such as E-business, which includes online banking transactions, electronic payments, access control, and so on. In this paper Online signature recognition and verification using Neural Network is proposed. PCA is used to extract features used for training the network. A verification stage includes applying the extracted features of test signature to a trained neural network which will classify it as a genuine or forged.

Keywords: Biometrics, Online signature, PCA, Neural Network.

Full text: https://sites.google.com/site/ijrit1/home/V1I521

IJRIT

1

Online Signature Verification using PCA and ... - IJRIT

vision based techniques include face recognition, fingerprint recognition, iris scanning and retina scanning and the vision-based ones include voice recognition ...

46KB Sizes 0 Downloads 235 Views

Recommend Documents

Online Signature Verification using PCA and Neural Network - IJRIT
includes online banking transactions, electronic payments, access control, and so on. ... prevalence of credit cards and bank cheques has long been the target of ...

Online Signature Verification using PCA and Neural Network - IJRIT
Signature verification can be applied in commercial fields such as E-business, which includes online banking transactions, electronic payments, access control, ...

Online Signature Verification using PCA and Neural ...
vision-based ones include voice recognition and signature verification. Signature has been a ... electronic payments, access control, and so on. In this paper ...

Online Signature Verification using Dynamic Time ... - Semantic Scholar
Online Signature Verification, Dynamic Time Warping ... applications such as bank checks. ... achieved the best result with Equal Error Rate of 1.46%. H. Lei et al ...

BPS Log and Signature Verification Form 2015-2016.pdf ...
Service, Leadership, and Character. Failure to do so could result in the termination of my membership. I am aware of and subscribe to the local chapter ...

Speaker Recognition using Kernel-PCA and ...
Modeling in common speaker subspace (CSS). The purpose of the projection of the common-speaker subspace into Rm using the distance preserving ...

speaker identification and verification using eigenvoices
approach, in which client and test speaker models are confined to a low-dimensional linear ... 100 client speakers for a high-security application, 60 seconds or more of ..... the development of more robust eigenspace training techniques. 5.

Speaker Recognition using Kernel-PCA and ... - Semantic Scholar
[11] D. A. Reynolds, T. F. Quatieri and R. B. Dunn, "Speaker verification using adapted Gaussian mixture models,". Digital Signal Processing, Vol. 10, No.1-3, pp.

Handwritten Signature Verification for Mobile Phones
used and on the method used to acquire data related to the signature: online and offline signature verifica- tion. Offline methods process handwritten signatures taken from scanned documents, which are, therefore, represented as images. This means th

Digital Signature Verification on Mobile Devices
With the purpose of having a solution that can be used in any mobile device, the e-signature solution should be independent of the operating system. • A user can have more than one identity. Therefore, it should be interesting that the solution cou

Digital Signature Verification on Mobile Devices - International Journal ...
qualified signature, mobile signature, SIM card, Java ME, signature services, mobile devices, .... Microsoft's cryptographic system basically consists of several components; ... out the following functions: the generation and exchange keys, data ...

Enhanced Group Signature Based Intruder Detection System ... - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, ... (MANET) is a collection of mobile nodes equipped with both a wireless.

Efficient Visual Digital Signature Scheme for E- Governance ... - IJRIT
In this paper, we introduce a new digital signature scheme based on the concept ... A Visual Digital Signature scheme is a method to support visual verification of ...

A Review on Neural Network for Offline Signature Recognition ... - IJRIT
Based on Fusion of Grid and Global Features Using Neural Networks. ... original signatures using the identity and four Gabor transforms, the second step is to ...

An Approach For Integrity Verification In Multi Cloud Storage ... - IJRIT
using virtual infrastructure management (VIM) , a multi-cloud allows clients to easily ... These tools help cloud providers construct a distributed cloud storage ...

Enhanced Group Signature Based Intruder Detection System ... - IJRIT
Keywords- Digital signature, digital signature algorithm (DSA), Enhanced Group Signature Based Intruder Detection System (EGIDS), Mobile. Ad hoc NETwork ...

An Approach For Integrity Verification In Multi Cloud Storage ... - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 2, Issue 7, July 2014, Pg: 100-105. Vinitha Varghese ... In this paper, we address the ... Since cloud computing environment is constructed based on open architectures ...

Efficient Visual Digital Signature Scheme for E- Governance ... - IJRIT
Email Id: [email protected] , [email protected] ... Therefore, the sender (signer) has to depend on a computer to digitally sign a document. Also, the ...

Misleading Worm Signature Generators Using Deliberate ... - CiteSeerX
tain TI. Whenever two worm flows wi and wj are consid- ered together, a signature containing TI will be generated. Whereas, whenever two fake anomalous ...

Misleading Worm Signature Generators Using ... - Roberto Perdisci
jected code, e.g., [15, 10, 5, 1] are not considered because they are largely ... to a host in B, it also sends a fake anomalous flow to the same host, as shown in ...

Face Verification using Gabor Filtering and Adapted ...
2École Polytechnique Fédérale de Lausanne, Switzerland. 1. Abstract. ▷ Face authentication is difficult because of the high-variability of face images.

Speaker Verification Using Fisher Vector
Models-Universal Background Models(GMM-UBM)[1] lay the foundation of modeling speaker space and many approaches based on GMM-UBM framework has been proposed to improve the performance of speaker verification including Support Vec- tor Machine(SVM)[2]

Identity Verification using Shape and Geometry of ...
Fig.1. Process of joining the disjoint finger to the hand, (a) original hand image, (b) generated hand mask using pre-processing, the ring finger is disjoint from hand, (c) hand mask is rotated such that ring finger became vertical, (d) ring finger i