Offline Signature Verification Using Contour Tracing
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064


Amazon Sale


Research Paper | Computer Science & Engineering | India | Volume 4 Issue 8, August 2015

Offline Signature Verification Using Contour Tracing

Madhuri, Alok

The paper proposed a centroid based method for offline signature verification. The signatures are acquired by the individuals on sheet of paper within boxes of pre-determined size. These sheets are then scanned to produce reference signature images. After pre-processing, the global and local features of the signature images are extracted. The authenticity of the signer is determined by comparing the features of the input signature and features of the stored reference signatures. The similarity between the features of input signature and reference signatures is calculated and compared with a threshold. If this similarity value exceeds the threshold, the input signature is authenticated as original signature otherwise they are considered as a forgery. The results are produced focusing on two vital parameters False Acceptance Rate (FAR) and False Rejection Rate (FRR).

Keywords: Authenticity, Biometric, Pre-processing, Signature verification, Threshold

Edition: Volume 4 Issue 8, August 2015

Pages: 143 - 146

Share this Article

How to Cite this Article?

Madhuri, Alok, "Offline Signature Verification Using Contour Tracing", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=1061504, Volume 4 Issue 8, August 2015, 143 - 146

55 PDF Views | 51 PDF Downloads

Download Article PDF


Amazon Sale


Similar Articles with Keyword 'Authenticity'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1724 - 1727

Privacy Preserving Authenticity Framework for Shared Data Cloud Network

P. Vanitha Sree, K. Narayana Rao

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 598 - 602

Dynamic Key Generation Algorithm for User Authentication at Mobile Cloud Enviroinment

Deepak G, Dr. Pradeep. B. S, Shreyas Srinath

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1036 - 1037

Survey on Securely Shared Data on Cloud

Priti Padole, Priti Saktel

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 3, March 2016

Pages: 1024 - 1026

Extraction of Product Information for Trustworthiness

Pooja Vanerkar, Prof. Chaita Jani

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1297 - 1299

Secure Cloud Storage with Anonymous Authentication using Decentralized Access Control

Jessy Cherian

Share this Article

Similar Articles with Keyword 'Biometric'

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 3, March 2013

Pages: 165 - 167

Statistical Analysis of DCT Coefficients for Ascertaining Ear's Biometrics

Nisha, Jatinder Kansal, JPS Raina

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1907 - 1913

Human Gait Recognition Using Multisvm Classifier

Saranya Sasidharan, Smitha K S, Minu Thomas

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2717 - 2720

Multi Biometrics: Overview and User Perception Survey

Harendra Singh Mahour, Hemant Makwana

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1216 - 1220

Finger Vein Weightage Calculation of Imaginary Curve between Minutiae Points for Person Recognition

Reetika, Kiran Gupta

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 3173 - 3178

An Overview of Pattern Recognition Applications and Its Approaches: A Review

Rajleen Kaur

Share this Article

Similar Articles with Keyword 'Pre-processing'

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 5, May 2017

Pages: 2530 - 2533

Shadow Attacks Based On Password Patterns Password Reuses

Bhavika Garse, N. D. Kale

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 965 - 969

Identification of Ovarian Mass: A Survey

Hemita Pathak, Vrushali Kulkarni, Sarika Bobde

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 269 - 272

Classification of Land Use and Land Cover Using Remotely Sensed Data for Parbhani City, Maharashtra, India

Nayana S. Ratnaparkhi, Bharti W. Gawali

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1154 - 1158

Face Illumination and Occlusion based Experimental Research on Face Recognition using Artificial Neural Network

Dr. V. S. Manjula

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 561 - 566

Recognition of Word using different Feature Extraction Methods

Kavita Babalad, Laxmidevi Noolvi, Dr. Jharna Majumdar

Share this Article

Similar Articles with Keyword 'Signature verification'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 517 - 521

Implementation of Digital Signature Verification Using Relative Slope Algorithm

P. N. Ganorkar, Kalyani Pendke, Hemant Turkar

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1644 - 1648

Survey on VANET Protocols and Security Techniques

Ashok Shivaji Dadali, Prof. Ram Joshi

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 143 - 146

Offline Signature Verification Using Contour Tracing

Madhuri, Alok

Share this Article

Research Paper, Computer Science & Engineering, United Kingdom, Volume 3 Issue 7, July 2014

Pages: 2387 - 2389

Cryptanalysis of Identity Transmission Authentication System

Sattar J. Aboud

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 2, February 2016

Pages: 310 - 316

Performance Comparison of Devanagari and Gurmukhi Handwritten Numerals Recognition

Gita Sinha, Rakesh Kumar Roshan

Share this Article

Similar Articles with Keyword 'Threshold'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 4, April 2014

Pages: 751 - 753

Study of Secret Sharing Schemes Using Access Structure

Ashwini Satpute, Reshma Batule, Shweta Wakalkar, Pooja Shelar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 1690 - 1694

Analytics of Application Resource Utilization within the Virtual Machine

Priyanka H

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1227 - 1231

An Efficient Clustering Based High Utility Infrequent Weighted Item Set Mining Approach

Dr. N. Umadevi, A. Gokila Devi

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1964 - 1967

Improving Performance of Hindi-English based Cross Language Information Retrieval using Selective Documents Technique and Query Expansion

Aditi Agrawal, Dr. A. J. Agrawal

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1353 - 1357

Analysis of Energy Efficiency and Throughput for IEEE 802.11 based Mobile Adhoc Networks

Manpreet Kaur, Pooja Saini

Share this Article
Top