scispace - formally typeset
Journal ArticleDOI

An efficient offline signature identification method based on Fourier Descriptor and chain codes

Reads0
Chats0
TLDR
A novel offline signature identification method based on Fourier Descriptor (FD) and Chain Codes features and a multilayer feed forward artificial neural network is proposed.
Abstract
This paper proposes a novel offline signature identification method based on Fourier Descriptor (FD) and Chain Codes features. Signature identification was classified into two different problems: recognition and verification. In recognition process, we used Principle Component Analysis. In verification process, we designed a multilayer feed forward artificial neural network. The main steps of constructing a signature identification system are discussed and experiments on real data sets show that the average error rate can reach 3.8%.

read more

Content maybe subject to copyright    Report

Citations
More filters
Proceedings ArticleDOI

Off-line signature verification based on chain code histogram and Support Vector Machine

TL;DR: An approach based on chain code histogram features enhanced through Laplacian of Gaussian filter for off-line signature verification and to reveal its accuracy over the existing approaches is presented.
Proceedings ArticleDOI

Off-line signature verification systems: a survey

TL;DR: In order to convey the state-of-the-art in the field to researchers, in this paper a survey of off-line signature verification systems is presented.

Signature Verification Using Morphological Features Based on Artificial Neural Network

TL;DR: Off-line signature recognition & verification using neural network is proposed, where the signature is captured and presented to the user in an image format and a Feed Forward Neural Network will be used for verifying signatures and to determine its accuracy.

Automatic Off-line Signature Verification Systems: A Review

TL;DR: A survey of off-line signature verification systems is presented in order to convey the state-of-the-art in the field to researchers and in this paper the results show an explosive growth in biometric personal authentication systems.
Journal ArticleDOI

Signature identification and verification techniques: state-of-the-art work

TL;DR: An extensive systematic overview of online and offline signature identification and verification techniques in offline signature verification, surveys related to two approaches, namely, writer-dependent, and writer-independent approaches are presented.
References
More filters
Journal ArticleDOI

Eigenfaces for recognition

TL;DR: A near-real-time computer system that can locate and track a subject's head, and then recognize the person by comparing characteristics of the face to those of known individuals, and that is easy to implement using a neural network architecture.
Journal ArticleDOI

Application of the Karhunen-Loeve procedure for the characterization of human faces

TL;DR: The use of natural symmetries (mirror images) in a well-defined family of patterns (human faces) is discussed within the framework of the Karhunen-Loeve expansion, which results in an extension of the data and imposes even and odd symmetry on the eigenfunctions of the covariance matrix.
Journal ArticleDOI

On aligning curves

TL;DR: The optimal correspondence is found by an efficient dynamic-programming method both for aligning pairs of curve segments and pairs of closed curves, and is effective in the presence of a variety of transformations of the curve.
Book ChapterDOI

An on-line signature verification system based on fusion of local and global information

TL;DR: It is shown experimentally that the machine expert based on local information outperforms the system based on global analysis when enough training data is available and it is found that global analysis is more appropriate in the case of small training set size.
Proceedings ArticleDOI

Off-line signature verification using HMM for random, simple and skilled forgeries

TL;DR: The experiments have shown that the error rates of the simple and random forgery signatures are very closed, and this reflects the real applications in which the simple forgeries represent the principal fraudulent case.
Related Papers (5)