Offline Signature Verification Using Contour Tracing
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 111 | Weekly Hits: ⮙3 | Monthly Hits: ⮙18

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 8, August 2015

Offline Signature Verification Using Contour Tracing

Madhuri, Alok

The paper proposed a centroid based method for offline signature verification. The signatures are acquired by the individuals on sheet of paper within boxes of pre-determined size. These sheets are then scanned to produce reference signature images. After pre-processing, the global and local features of the signature images are extracted. The authenticity of the signer is determined by comparing the features of the input signature and features of the stored reference signatures. The similarity between the features of input signature and reference signatures is calculated and compared with a threshold. If this similarity value exceeds the threshold, the input signature is authenticated as original signature otherwise they are considered as a forgery. The results are produced focusing on two vital parameters False Acceptance Rate (FAR) and False Rejection Rate (FRR).

Keywords: Authenticity, Biometric, Pre-processing, Signature verification, Threshold

Edition: Volume 4 Issue 8, August 2015

Pages: 143 - 146

Share this Article

How to Cite this Article?

Madhuri, Alok, "Offline Signature Verification Using Contour Tracing", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=1061504, Volume 4 Issue 8, August 2015, 143 - 146

Enter Your Registered Email Address





Similar Articles with Keyword 'Authenticity'

Downloads: 92 | Weekly Hits: ⮙1 | Monthly Hits: ⮙13

Informative Article, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020

Pages: 85 - 88

CBCD Methods in Video Copy Detection

Jan Mary Thomas

Share this Article

Downloads: 104 | Weekly Hits: ⮙3 | Monthly Hits: ⮙14

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 598 - 602

Dynamic Key Generation Algorithm for User Authentication at Mobile Cloud Enviroinment

Deepak G, Dr. Pradeep. B. S, Shreyas Srinath

Share this Article

Downloads: 105 | Weekly Hits: ⮙3 | Monthly Hits: ⮙14

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2712 - 2714

Privacy Preserving DAC for Data in Cloud

Pankaj R. Chandre, Swati S. Gore

Share this Article

Downloads: 105 | Weekly Hits: ⮙1 | Monthly Hits: ⮙10

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1520 - 1522

Survey of Various Techniques for Signature Recognition and Verification

Sharayu S. Sangekar, D. C. Dhanwani

Share this Article

Downloads: 105 | Weekly Hits: ⮙4 | Monthly Hits: ⮙9

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1325 - 1328

A Survey on Copy Move Forgery Detection in Images

Rameeza M Ashraf, Veena K Viswam

Share this Article

Similar Articles with Keyword 'Biometric'

Downloads: 66 | Weekly Hits: ⮙2 | Monthly Hits: ⮙35

Research Paper, Computer Science & Engineering, Congo, Volume 10 Issue 3, March 2021

Pages: 61 - 70

Contribution of an Embedded and Biometric System in a Replicated Database for Access Control in a Multi-Entry Institution

Bopatriciat Boluma Mangata, Eugene Mbuyi Mukendi, Jean-Didier Batubenga

Share this Article

Downloads: 67 | Weekly Hits: ⮙3 | Monthly Hits: ⮙16

Survey Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020

Pages: 890 - 894

A Survey on Types of Crawlers and Web Searching Algorithms

T. Yogameera, Dr. D. Shanthi

Share this Article

Downloads: 82 | Monthly Hits: ⮙6

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 3, March 2013

Pages: 165 - 167

Statistical Analysis of DCT Coefficients for Ascertaining Ears Biometrics

Nisha, Jatinder Kansal, JPS Raina

Share this Article

Downloads: 105 | Weekly Hits: ⮙1 | Monthly Hits: ⮙10

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1520 - 1522

Survey of Various Techniques for Signature Recognition and Verification

Sharayu S. Sangekar, D. C. Dhanwani

Share this Article

Downloads: 105 | Weekly Hits: ⮙3 | Monthly Hits: ⮙10

Comparative Studies, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2049 - 2052

Fingerprint Compression Technique using Sparse Representation

Swapnil Raut, Nisha Wankhade

Share this Article

Similar Articles with Keyword 'Pre-processing'

Downloads: 108 | Weekly Hits: ⮙2 | Monthly Hits: ⮙13

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1979 - 1982

Palm Vein Authentication: A Review

Gitanjali Sikka, Er. Vikas Wasson

Share this Article

Downloads: 108 | Monthly Hits: ⮙9

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 965 - 969

Identification of Ovarian Mass: A Survey

Hemita Pathak, Vrushali Kulkarni, Sarika Bobde

Share this Article

Downloads: 108 | Weekly Hits: ⮙3 | Monthly Hits: ⮙8

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 994 - 997

Content Based Image Retrieval: Bone Age Assessment

Manjula Gururaj H, Dr. G. S. Nagaraja

Share this Article

Downloads: 109 | Weekly Hits: ⮙3

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 5, May 2017

Pages: 2530 - 2533

Shadow Attacks Based On Password Patterns Password Reuses

Bhavika Garse, N. D. Kale

Share this Article

Downloads: 110 | Weekly Hits: ⮙3 | Monthly Hits: ⮙18

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 619 - 625

Customized Travel Itinerary Mining for Tourism Services

Bonuguntla Saranya, Miryala Venkatesh

Share this Article

Similar Articles with Keyword 'Signature verification'

Downloads: 106 | Weekly Hits: ⮙1

Research Paper, Computer Science & Engineering, United Kingdom, Volume 3 Issue 7, July 2014

Pages: 2387 - 2389

Cryptanalysis of Identity Transmission Authentication System

Sattar J. Aboud

Share this Article

Downloads: 107 | Weekly Hits: ⮙2 | Monthly Hits: ⮙9

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1644 - 1648

Survey on VANET Protocols and Security Techniques

Ashok Shivaji Dadali, Prof. Ram Joshi

Share this Article

Downloads: 111 | Weekly Hits: ⮙3 | Monthly Hits: ⮙18

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 143 - 146

Offline Signature Verification Using Contour Tracing

Madhuri, Alok

Share this Article

Downloads: 118 | Weekly Hits: ⮙4 | Monthly Hits: ⮙19

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 517 - 521

Implementation of Digital Signature Verification Using Relative Slope Algorithm

P. N. Ganorkar, Kalyani Pendke, Hemant Turkar

Share this Article

Downloads: 124 | Weekly Hits: ⮙3 | Monthly Hits: ⮙9

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 2, February 2016

Pages: 310 - 316

Performance Comparison of Devanagari and Gurmukhi Handwritten Numerals Recognition

Gita Sinha, Rakesh Kumar Roshan

Share this Article

Similar Articles with Keyword 'Threshold'

Downloads: 46 | Weekly Hits: ⮙5 | Monthly Hits: ⮙33

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 3, March 2021

Pages: 376 - 379

Glaucoma Detection Using Support Vector Machine Algorithm

Aukif Yousuf Wani, Preeti Sondhi

Share this Article

Downloads: 47 | Weekly Hits: ⮙6 | Monthly Hits: ⮙18

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 2, February 2021

Pages: 1682 - 1686

Support Vector Machine Based MRI Brain Tumor Detection

Nazima Yousuf, Mrigana Walia

Share this Article

Downloads: 63 | Weekly Hits: ⮙1 | Monthly Hits: ⮙15

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020

Pages: 1615 - 1620

Traffic Sign Detection via Graph Based Ranking and Segmentation Algorithm

Premsai Cheedella

Share this Article

Downloads: 64 | Weekly Hits: ⮙3 | Monthly Hits: ⮙15

Research Paper, Computer Science & Engineering, China, Volume 10 Issue 1, January 2021

Pages: 1165 - 1168

A Capsule Robot Attitude Transformation Perception Method based on Intestinal Fold Features

Chengcheng Yan, Yanping Hu

Share this Article

Downloads: 96 | Weekly Hits: ⮙3 | Monthly Hits: ⮙8

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 1690 - 1694

Analytics of Application Resource Utilization within the Virtual Machine

Priyanka H

Share this Article



Top