Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
International Journal of Engineering & Technology
…
5 pages
1 file
The signing process is one of the most important processes used by organizations to ensure the confidentiality of information and to protect it against any unauthorized penetration or access to such information. As organizations and individuals enter the digital world, there is an urgent need for a digital system capable of distinguishing between the original and fraud signature, in order to ensure individuals authorization and determine the powers allowed to them. In this paper, three widely used feature detection algorithms, HARRIS, BRISK (Binary Robust Invariant Scalable Keypoints) and FAST (Features from Accelerated Segment), these algorithms are compared to calculate the run time and accuracy for set of signature images. Three techniques have been applied using (UTSig) dataset; the experiment consisted of four phases: first, applying the techniques on one image, then on four images, then on eight images, finally applying the techniques on ten images where time and accuracy were...
MATEC Web of Conferences, 2016
Handwritten signature is broadly utilized as personal verification in financial institutions ensures the necessity for a robust automatic signature verification tool. This tool aims to reduce fraud in all related financial transactions' sectors. This paper proposes an online, robust, and automatic signature verification technique using the recent advances in image processing and machine learning. Once the image of a handwritten signature for a customer is captured, several pre-processing steps are performed on it including filtration and detection of the signature edges. Afterwards, a feature extraction process is applied on the image to extract Speeded up Robust Features (SURF) and Scale-Invariant Feature Transform (SIFT) features. Finally, a verification process is developed and applied to compare the extracted image features with those stored in the database for the specified customer. Results indicate high accuracy, simplicity, and rapidity of the developed technique, which are the main criteria to judge a signature verification tool in banking and other financial institutions.
Automated signature verification is an important capability when doing fraud detection from high volumes of document images. The challenge is mainly caused by the combination of inherent writer variations and the conscious attention placed by the fraudster on imitating a legitimate signature. Getting good signature references is the first and most important step affecting verification accuracy. Typical production systems use signature cards which have one or more signature variations. In this paper, we show the improvement in verification accuracy from increasing the number of signature references used in verification processing. As many as 20 signature references were used. In production operations, comparing a sample signature to more than one or two reference signatures using current methods requires too much processing time. The main contribution of this paper is the description of a feature-based approach that allows for matching of a sample signature against a large number of ...
Emerging Research in Computing, Information, Communication and Applications, 2019
Forgery of signature has become very common, and the need for identification and verification is vital in security and resource access control. There are three types of forgery: random forgery, simple or casual forgery, expert or skilled or simulated forgery. The main aim of signature verification is to extract the characteristics of the signature and determine whether it is genuine or forgery. There are two types of signature verification: static or offline and dynamic or online. In our proposed solution, we use offline signature analysis for forgery detection which is carried out by first acquiring the signature and then using image pre-processing techniques to enhance the image. Feature extraction algorithms are further used to extract the relevant features. These features are used as input parameters to the machine learning algorithm which analyses the signature and detects for forgery. Performance evaluation is then carried out to check the accuracy of the output.
Jurnal ELTIKOM
Signature is used to legally approve an agreement, treaty, and state administrative activities. Identification of the signature is required to ensure ownership of a signature and to prevent things like forgery from happening to the owner of the signature. In this study, data signatures were obtained from 25 people over the age of 50. The signers provided 20 signatures and were free to choose the stationery used to write the signature on white paper. The total data obtained in this study was 500 signature data. The obtained signature was scanned to create a signature image, which was then pre-processed to prepare it for feature extraction, which can characterize the signature images. The HOG method was used to extract features, resulting in a dataset with 4,536 feature vectors for each signature image. To identify the signature image, the classification methods SVM, Decision Tree, Nave Bayes, and K-NN were compared. SVM achieved the highest accuracy, which is 100%. When K=5, the K-NN...
international journal for research in applied science and engineering technology ijraset, 2020
Signature has been a special feature that helps in unique identification of an individual. Mostly the business and financial transactions are done using this unique feature i.e. signatures. Keeping this fact in mind we need to provide automatic signature methods that also provides authenticity. If we talk about documents such as bank cheques, there the manual verification of signatures are really tough to be maintained.
As signature is the primary mechanism both for authentication and authorization in legal transactions, the need for efficient automated solutions for signature verification has increased [3]. Unlike a password, PIN, PKI or key cards – identification data that can be forgotten, lost, stolen or shared – the captured values of the handwritten signature are unique to an individual and virtually impossible to duplicate. The primary advantage that signature verification systems have over other type's technologies is that signatures are already accepted as the common method of identity verification [4]. A signature verification system and the techniques used to solve this problem can be divided into two classes Online and Off-line [5].On-line approach uses an electronic tablet and a stylus connected to a computer to extract information about a signature and takes dynamic information like pressure, velocity, speed of writing etc. for verification purpose. Whereas Off-line signature verification involves less electronic control and uses signature images captured by scanner or camera. An off-line signature verification system uses features extracted from scanned signature image. In this only the pixel image needs to be evaluated.
2013
This paper presents a novel signature verification system based on local features of signatures. The proposed system uses Fast Retina Keypoints (FREAK) which represent local features and are inspired by the human visual system, particularly the retina. To locate local points of interest in signatures, two local keypoint detectors, i.e., Features from Accelerated Segment Test (FAST) and Speeded-up Robust Features (SURF), have been used and their performance comparison in terms of Equal Error Rate (EER) and time is presented. The proposed system has been evaluated on publicly available dataset of forensic signature verification competition, 4NSigComp2010, which contains genuine, forged, and disguised signatures. The proposed system achieved an EER of 30%, which is considerably very low when compared against all the participants of the said competition. In addition to EER, the proposed system requires only 0.6 seconds on average to verify a 3000*1500 scanned signature. This shows that the proposed system has a potential and suitability for forensic signature verification as well as real time applications.
Lecture Notes in Computer Science, 2013
In this paper we present a novel comparison among three local features based offline systems for forensic signature verification. Forensic signature verification involves various signing behaviors, e.g., disguised signatures, which are generally not considered by Pattern Recognition (PR) researchers. The first system is based on nine local features with Gaussian Mixture Models (GMMs) classification. The second system utilizes a combination of scale-invariant Speeded Up Robust Features (SURF) and Fast Retina Keypoints (FREAK). The third system is based on a combination of Features from Accelerated Segment Test (FAST) and FREAK. All of these systems are evaluated on the dataset of the 4NSigComp2010 signature verification competition which is the first publicly available dataset containing disguised signatures. Results indicate that our local features based systems outperform all the participants of the said competition both in terms of time and equal error rate.
Anthropological and Archaeological Sciences, 2019
Feminist Heidegger: Sex, Gender, and the Politics of Birth, 2024
Journal of Media Critiques (University of Lincoln), 2017
7th International Conference on Information and Communication Technology, ICoICT 2019, 2019
Műszaki Tudományos Közlemények, 2017
Söğüt Dergisi 26. Sayı , 2024
International Journal of Current Research, 2024
Homage to Jackson Pollock Volume 3
Александар I Карађорђевић : од Цетиња до Марсеја, каталог изложбе, Нови Сад: Музеј Војводине, 2024., 2024
Multicultural Shakespeare, 2022
Applied Physics A: Materials Science & Processing, 1997
PROTEOMICS, 2007
Historia Mathematica, 1994
Journal of Psychopharmacology, 2019
How to write a novel, 2024