scispace - formally typeset
Search or ask a question
Proceedings ArticleDOI

Handwritten Signature Authentication Using Statistical Estimation

TL;DR: A new handwritten signature authentication scheme based on extensive statistical analysis, Mean variance and theory of estimation that supports the application environment and could be a solid platform for future research and study.
Abstract: In this paper we propose a new handwritten signature authentication scheme. The scheme consists of two main rule set algorithms and one authentication algorithm. The Algorithms are based on extensive statistical analysis, Mean variance and theory of estimation. This is an extension work of handwritten signature identification. This scheme supports the application environment and we strongly believe that "user authentication" could be a solid platform for future research and study.
Citations
More filters
Journal ArticleDOI
TL;DR: In this paper, the distance and similarities play an important role, where the greater the dissimilarity measure or distance of genes, the more dissimilar are the two chromosomes.

3 citations


Cites background from "Handwritten Signature Authenticatio..."

  • ...This is very common, because, algorithm(s) have to handle large sets of image data [19]....

    [...]

Proceedings ArticleDOI
05 Jul 2019
TL;DR: This work proposes an effective biometric recognition system for iris templates based on XOR function, while protecting the privacy of iris template as well as above requirements by following feature transformation techniques.
Abstract: The patterns of the structure of the irises are differed and unique to every single person. Any biometric authentication approach should consist of three requirements. They are non-invertibility, non-linkability, and revocability. By following feature transformation techniques, we propose an effective biometric recognition system for iris templates based on XOR function, while protecting the privacy of iris templates as well as above requirements. Compared to the other existing works, the recognition performances of the proposed approach are satisfactory. The final results of the research are fairly positive. The study opens for future enhancements.

1 citations


Cites methods from "Handwritten Signature Authenticatio..."

  • ...[4] have proposed a handwritten signature authentication scheme based on statistics....

    [...]

Book ChapterDOI
10 Dec 2009
TL;DR: In this paper, distance and similarities play an important role, where the greater the dissimilarity measure or distance of genes, the more dissimilar are the two chromosomes.
Abstract: In this paper we propose Handwritten Signature Classification using supervised chromosome clustering technique. Due to the time variant nature of handwriting of human being, a set of hundred sample Handwritten Signatures first collected from the user or individual in form of same sized grayscale images. These grayscale handwritten signature images will be used as the training set in our classification algorithm. Our propose algorithm will then decide whether the future incoming handwritten signature of an individual can be a member of the training set or not. In this paper, distance and similarities play an important role, where the greater the dissimilarity measure or distance of genes, the more dissimilar are the two chromosomes.

Cites background from "Handwritten Signature Authenticatio..."

  • ...This is very common, because, algorithm(s) have to handle large sets of image data [ 14 ]....

    [...]

References
More filters
Journal ArticleDOI
TL;DR: An approach to user authentication that generalizes the notion of a textual password and that, in many cases, improves the security of user authentication over that provided by textual passwords is explored.
Abstract: For the vast majority of computer systems, passwords are the method of choice for authenticating users. The most widely and commonly used authentication is traditional “Username” and “Password”. For such authentication generally text (alphanumeric) is used. It is wellknown, however, that passwords are susceptible to attack: users tend to choose passwords that are easy to remember, and often this means that they are also easy for an attacker to obtain by searching for candidate passwords. On the other hand, if a password is hard, then it is often hard to remember. Keeping these things in mind we propose a novel, innovative and more secure way of selecting passwords: Graphical Passwords. In this paper we explore an approach to user authentication that generalizes the notion of a textual password and that, in many cases, improves the security of user authentication over that provided by textual passwords. We design and analyze graphical passwords, which can be input by the user to any device with a graphical input interface. We also try to answer two most important questions: “Are graphical passwords as secure and easy to use as text-based passwords”? “Major design and implementation issues for graphical passwords”? Ankesh Khandelwal Department of Information Technology and Engineering Heritage Institute of Technology, Anandapur, Kolkata -700107, India Shashank Singh Department of Computer Science and Engineering Heritage Institute of Technology, Anandapur, Kolkata -700107, India Niraj Satnalika Department of Instrumentation and Engineering Heritage Institute of Technology, Anandapur, Kolkata -700107, India The full text of the article is not available in the cache. Kindly refer the IJCA digital library at www.ijcaonline.org for the complete article. In case, you face problems while downloading the full-text, please send a mail to editor at editor@ijcaonline.org

12 citations


"Handwritten Signature Authenticatio..." refers background in this paper

  • ...Debnath Bhattacharyya, Samir Kumar Bandyopadhyay and Poulami Das, 2007, have conducted [10] an extensive survey of the existing graphical password schemes and proposed an alternate scheme....

    [...]

Proceedings ArticleDOI
22 Apr 2008
TL;DR: An extensive survey of the existing graphical password schemes and a novel and new alternative; Figure as a Password is proposed, which supports the application environment and could be a solid platform for future research and study.
Abstract: Most common computer authentication method is traditional 'User Name' and 'password'. There are numerous Biometric authentication methods also proposed. In this paper, we propose a novel and new alternative; Figure as a Password. In this scheme users will get complete freedom to select their Passwords. In this paper, we conduct an extensive survey of the existing graphical password schemes and propose an alternate scheme. Entire work can be divided into three phases- a. sampling of users passwords, processing and storage; b. security on transmission; and c. Recognition and authentication. Our scheme supports the application environment and we strongly believe that "User Authentication by Secured Graphical Password Implementation'' could be a solid platform for future research and study.

11 citations


"Handwritten Signature Authenticatio..." refers background in this paper

  • ...Bandyopadhyay and Poulami Das, 2007, have conducted [ 10 ] an extensive survey of the existing graphical password schemes and proposed an alternate scheme....

    [...]

Proceedings Article
01 Jan 2007

10 citations


"Handwritten Signature Authenticatio..." refers background or methods in this paper

  • ...Handwritten signature samples are considered input for the artificial neural network model and typically weights also supplied for recognition [3]....

    [...]

  • ...For Handwritten Signature Identification and Authentication - a forward propagation technique is used to authenticate of input image out of the available training images [3]....

    [...]

Proceedings ArticleDOI
26 Apr 2007
TL;DR: This paper presents a technique for watermarking Handwritten Signature that achieves robustness by responding to complexity of copy detection, vulnerability to mark removal after revelation for ownership verification and mark integrity issues due to partial mark removal; these three weaknesses.
Abstract: In this paper, we propose a technique for embedding handwritten signature image data into color images and extracting embedded image data from color images. For the sake of security, two watermarked images will be transmitted in different times from the sender's end to the receiver's end, in due course, from two transmitted images, at the receiver's end, original handwritten signature image data will be extracted; a new way of data hiding. From 1994 onward, the use and popularity of Internet in business particular has explored the area of Intellectual Property protection techniques. This paper presents a technique for watermarking Handwritten Signature that achieves robustness by responding to complexity of copy detection, vulnerability to mark removal after revelation for ownership verification and mark integrity issues due to partial mark removal; these three weaknesses.

9 citations


"Handwritten Signature Authenticatio..." refers methods in this paper

  • ...Law of Independent Assortment is used to watermarking the processed Handwritten Signature; double lined protection is provided during transmission of Handwritten Signature over network [2]....

    [...]

Proceedings Article
01 Jan 2007

9 citations


"Handwritten Signature Authenticatio..." refers background or methods in this paper

  • ...Estimation is done depending on 100 various training signatures, which are already captured, processed [1] and stored in the storage area at the target where extraction and authentication of the test image has to be done....

    [...]

  • ...This drawn image is captured and put into the processes of extracting Region Of Interest (ROI), scaled (the ROI) into a specific size and thinned into single pixel format [1]....

    [...]