IJRIT International Journal of Research in Information Technology, Volume 1, Issue 5, May 2013, Pg. 65-73

International Journal of Research in Information Technology (IJRIT)

www.ijrit.com

ISSN 2001-5569

Online Signature Verification using PCA and Neural Network 1

1

Jyoti Bhalla

Student, MTech , Department of Information Technology, Guru Gobind Singh Indraprastha University, Delhi

1

[email protected]

Abstract The purpose of this paper is to study about the use of distinctive anatomical biometric characteristic- Signature for automatically recognizing individuals. Biometric techniques have been used for personal identification in the past. Various identification methods include iris, retina, face, fingerprint, and signature-based identification. The nonvision based techniques include face recognition, fingerprint recognition, iris scanning and retina scanning and the vision-based ones include voice recognition and signature verification. Signature has been a distinguishing feature for person identification because of its ease of acceptance by the public, and lower implementation cost. Signature verification can be applied in commercial fields such as E-business, which includes online banking transactions, electronic payments, access control, and so on. In this paper Online signature recognition and verification using Neural Network is proposed. PCA is used to extract features used for training the network. A verification stage includes applying the extracted features of test signature to a trained neural network which will classify it as a genuine or forged.

Keywords: Biometrics, Online signature, PCA, Neural Network.

Full text: https://sites.google.com/site/ijrit1/home/V1I521

IJRIT

1

Online Signature Verification using PCA and Neural ...

vision-based ones include voice recognition and signature verification. Signature has been a ... electronic payments, access control, and so on. In this paper ...

46KB Sizes 0 Downloads 120 Views

Recommend Documents

speaker identification and verification using eigenvoices
approach, in which client and test speaker models are confined to a low-dimensional linear ... 100 client speakers for a high-security application, 60 seconds or more of ..... the development of more robust eigenspace training techniques. 5.

Speaker Recognition using Kernel-PCA and ... - Semantic Scholar
[11] D. A. Reynolds, T. F. Quatieri and R. B. Dunn, "Speaker verification using adapted Gaussian mixture models,". Digital Signal Processing, Vol. 10, No.1-3, pp.

Handwritten Signature Verification for Mobile Phones
used and on the method used to acquire data related to the signature: online and offline signature verifica- tion. Offline methods process handwritten signatures taken from scanned documents, which are, therefore, represented as images. This means th

Neural signature of the conscious processing of ...
Feb 3, 2009 - temporal regularities that are either local in time or global across ..... Bonferroni corrected F tests were performed for each time frame. No differ-.

A Review on Neural Network for Offline Signature ...
This paper represents a brief review on various approaches used in signature verification systems. Keywords: Signature, Biometric, Artificial Neural Networks, Off-line Signature Recognition and Verification. I. INTRODUCTION. Biometrics are technologi

Misleading Worm Signature Generators Using ... - Roberto Perdisci
this case the real worm flow and all its fake anomalous flows ... gorithm creates an ordered list of tokens that is present in all the .... Of course, the question is how to obtain p(false ...... Proceedings of the 10th ACM Conference on Computer and