International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 5 Issue 1, January 2016

Signature Authentication Using Biometric Methods

A. S. Syed Navaz, K. Durairaj

Signature identification using Biometrics methods is a well-studied problem in Biometrics. It involves the authentication of a person based on his signature. This paper is developed by using Vb.net as a front end Ms Access as backend. Our method validates the signature based on hand movement when a person signs his signature. Our method has a unique advantage over existing systems. A signature can be drawn easily by other unintended persons in important documents. But it is sure that only the original person can sign with the same fast movement and correct sequence. Since our method tracks the movement sequence and the speed with which the person signs his signature, it is highly accurate for authentication than any other existing system. One of the main advantages of our method is computationally inexpensive, that is it uses minimum system resources, less memory and hence offers a very high speed of recognition. Also, the signature identification cannot be duplicated unlike the existing methods where the passwords could be cracked using trail-and-error methods. We implement the system using the GUI tools of VB.NET. He has to draw his signature using the mouse in the panel and he/she is entered into the website based on the recognition result.

Keywords: Biometric, Authentication, Signature, Palm, Scan

Edition: Volume 5 Issue 1, January 2016

Pages: 1581 - 1584


How to Cite this Article?

A. S. Syed Navaz, K. Durairaj, "Signature Authentication Using Biometric Methods", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV153159, Volume 5 Issue 1, January 2016, 1581 - 1584

12 PDF Views | 18 PDF Downloads

Download Article PDF

Video Lecture of Above Article is Not Available Yet

You be the First to Request! Press the Button below!



Similar Articles with Keyword 'Biometric'

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 1, January 2013

Pages: 729 - 732

Secure One Time Password Generation for Website Security using Mobile Phone with Biometrics

C. Josy Nambickai Rani, Linda Joseph, E.R.Naganathan

Share this article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 3, March 2013

Pages: 165 - 167

Statistical Analysis of DCT Coefficients for Ascertaining Ear's Biometrics

Nisha, Jatinder Kansal, JPS Raina

Share this article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 3, March 2013

Pages: 428 - 431

A Secure Account based Mobile Payment Protocol with Public Key Cryptography and Biometric Characteristics

Pawandeep Singh Aujla, Harneet Arora

Share this article

Comparative Studies, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 150 - 154

Comparative Analysis of Various Biometric Techniques for Database Security

Harpreet Saini, Kanwal Garg

Share this article

Research Proposals / Synopsis, Computer Science & Engineering, India, Volume 2 Issue 5, May 2013

Pages: 151 - 154

Study and Analysis of Human Gait to Recognize the Person

Huma Khan, Yogesh Rathore

Share this article

Similar Articles with Keyword 'Authentication'

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 1, January 2013

Pages: 729 - 732

Secure One Time Password Generation for Website Security using Mobile Phone with Biometrics

C. Josy Nambickai Rani, Linda Joseph, E.R.Naganathan

Share this article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 5, May 2013

Pages: 284 - 286

Challenges in Password Memorization for Multiple Accounts of Single User

Pratik Ranjan, Nachiketa Tarasia

Share this article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 6, June 2013

Pages: 329 - 334

Secure and Optimized Algorithm for Implementation of Digital Signature

Isha Jauhari, Jitendra Kumar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 7, July 2013

Pages: 74 - 77

Web Based Security using Online Password Authentication in Mobile Application

A. T. Bhole, Sheetal Chaudhari

Share this article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 7, July 2013

Pages: 123 - 126

DSP for Smart Bio-Metric Solutions

Maddineni Rakesh Chowdari

Share this article

Similar Articles with Keyword 'Signature'

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 6, June 2013

Pages: 329 - 334

Secure and Optimized Algorithm for Implementation of Digital Signature

Isha Jauhari, Jitendra Kumar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 7, July 2013

Pages: 123 - 126

DSP for Smart Bio-Metric Solutions

Maddineni Rakesh Chowdari

Share this article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 7, July 2013

Pages: 241 - 245

Comparative Analysis of Off-line Signature Recognition

Ankit Arora, Aakanksha S. Choubey

Share this article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 8, August 2013

Pages: 196 - 200

Offline Signature Verification and Recognition using Neural Network

Ankit Arora, Aakanksha S. Choubey

Share this article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 12, December 2013

Pages: 112 - 116

Authentication of an Image over Wireless Channels Based on Secure Digital Signature Scheme

A. Swetha, P. Chenna Reddy

Share this article

Similar Articles with Keyword 'Palm'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 3, March 2014

Pages: 317 - 322

User Authentication Using Hand Images

Aditya Pratap Singh, Ranjan Kumar Thakur, Arabind Kumar, Ram Baksh

Share this article

Survey Paper, Computer Science & Engineering, Nigeria, Volume 3 Issue 10, October 2014

Pages: 1774 - 1778

An Analytical Survey of Real Time System Scheduling Techniques

Ayeni, J. A., Odion A. E., Ogbormor-Odikayor I.F

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2810 - 2813

Palm Print Recognition System ? Review

Mohit Trehan, Nitin Bhagat

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 12, December 2016

Pages: 1298 - 1302

A Novel Approach for Palm Print Recognition Using Minutiae Points with BFOA

Ridhima Prothia, Jatinder Kumar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 9, September 2013

Pages: 279 - 283

A New Design of Algorithm for Enhancing Security in Bluetooth Communication with Triple DES

B. Parsharamulu, R. V. Krishnaiah

Share this article

Similar Articles with Keyword 'Scan'

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 7, July 2013

Pages: 123 - 126

DSP for Smart Bio-Metric Solutions

Maddineni Rakesh Chowdari

Share this article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 7, July 2013

Pages: 131 - 134

A Novel Approach for Cluster Outlier Detection in High Dimensional Data

R. K. Singh, Rashmi Sharma

Share this article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 7, July 2013

Pages: 135 - 138

Techniques Used for Mask Less Lithography

R. K. Singh, Rashmi Sharma

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1263 - 1266

Finding Frequent Pattern by Reducing Transctions Scan

Chandani Thakkar, Vinitkumar Gupta

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 511 - 516

Graph-based Attack Detection in Cloud using KDD CUP 99 Dataset

Swapnali G. Game, S. B. Natikar

Share this article

Top