International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 11, November 2014

Implementation of Digital Signature Verification Using Relative Slope Algorithm

P. N. Ganorkar, Kalyani Pendke, Hemant Turkar

In the era of growing technology, security is the major concern to avoid fakes and forgeries. There are various biometric technique which help in personal identification, among those verification systems, one system is Signature Verification System, Signature is a behavioral biometric.It is not based on figure print, retina or any facial expression, according to the data available in the input, signature verification split into two part: Online and Offline. It also referred as static and dynamic. Signature verification also used to provide authentication to user. The main advantages of signature verification are that it used for e-business which helps in banking applications. The proposed paper present slope based method to identify the signature using various parameters like speed, time, pressure, movement of signature, accuracy and matching percentage of two signature etc.

Keywords: Segmentation, Hidden Marko Method, Support Vector Machine Relative slope algorithm, signature verification, Gaussian elimination algorithm

Edition: Volume 3 Issue 11, November 2014

Pages: 517 - 521


How to Cite this Article?

P. N. Ganorkar, Kalyani Pendke, Hemant Turkar, "Implementation of Digital Signature Verification Using Relative Slope Algorithm", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=OCT14898, Volume 3 Issue 11, November 2014, 517 - 521

23 PDF Views | 13 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Segmentation'

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 12, December 2016

Pages: 1962 - 1965

Modified Adaptive Contrast Based Degraded Document Image Binarization Technique

Sanooja Beegam M.A, Veena S Babu

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 938 - 943

HCR Using K-Means Clustering Algorithm

Meha Mathur, Anil Saroliya

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2515 - 2518

Ameliorating Brain Image Segmentation Using Fuzzy Clustering Techniques

Sana Tak, Toran Verma

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 707 - 710

Chronological Comparison for Organizing Summaries of Content Anatomy

A. Geetha Vani, B. Naresh Achari

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2319 - 2323

Performance Enhancement of a Transform Domain Based SteganographicTechnique Using Segmentation

Harjeet Kaur, Er Divya Goyal

Share this article

Similar Articles with Keyword 'signature verification'

Research Paper, Computer Science & Engineering, United Kingdom, Volume 3 Issue 7, July 2014

Pages: 2387 - 2389

Cryptanalysis of Identity Transmission Authentication System

Sattar J. Aboud

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 143 - 146

Offline Signature Verification Using Contour Tracing

Madhuri, Alok

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 517 - 521

Implementation of Digital Signature Verification Using Relative Slope Algorithm

P. N. Ganorkar, Kalyani Pendke, Hemant Turkar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 8, August 2013

Pages: 196 - 200

Offline Signature Verification and Recognition using Neural Network

Ankit Arora, Aakanksha S. Choubey

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1644 - 1648

Survey on VANET Protocols and Security Techniques

Ashok Shivaji Dadali, Prof. Ram Joshi

Share this article

Top