scispace - formally typeset
Search or ask a question
Topic

Signature recognition

About: Signature recognition is a research topic. Over the lifetime, 2138 publications have been published within this topic receiving 37605 citations.


Papers
More filters
Book ChapterDOI
01 Jan 2015
TL;DR: This system is designed using cluster based features which are modeled using vector quantization as its density matching property provides improved results compared to statistical techniques.
Abstract: Signature is a behavioral trait of an individual and forms a special class of handwriting in which legible letters or words may not be exhibited. Signature Verification System (SVS) can be classified as either offline or online. [1] In this paper, we used vector quantization technique for signature verification. The data is captured at a later time by using an optical scanner to convert the image into a bit pattern. The features thus extracted are said to be static. Our system is designed using cluster based features which are modeled using vector quantization as its density matching property provides improved results compared to statistical techniques. The classification ratio achieved using Vector Quantization is 67%.

9 citations

Proceedings ArticleDOI
01 Sep 2013
TL;DR: A survey of signature verification systems is presented and an account of the various approaches that have been proposed for signature verification is given.
Abstract: Signatures are widely used as a means of personal identification and verification. Many documents like bank cheques and legal transactions require signature verification. Signature-based verification of a large number of documents is a very difficult and time consuming task. Consequently an explosive growth has been observed in biometric personal verification and authentication systems that are connected with quantifiable physical unique characteristics (finger prints, hand geometry, face, ear, iris scan, or DNA) or behavioral features (gait, voice etc.). As traditional identity verification methods such as tokens, passwords, pins etc suffer from some fatal flaws and are incapable to satisfy the security necessities, the paper aims to consider a more reliable biometric feature, signature verification for the considering. We present a survey of signature verification systems. We classify and give an account of the various approaches that have been proposed for signature verification.

9 citations

Proceedings ArticleDOI
23 Apr 2008
TL;DR: This paper proposes a method known as randomized dynamic quantization transformation (RDQT) to binarize biometric data but still highly distinctive among the users and highly random.
Abstract: Fuzzy Commitment Scheme is one of the biometric encryption approaches for biometric template protection. The idea is to bind an identifier with a biometric template in binary format called difference vector during enrollment. Ideally, a difference vector is infeasible to recover either the biometric template or the identifier without any knowledge of the user's biometric data. Yet, this is only valid if the biometric template is uniformly random, but this is not the case in reality. In this paper, we propose a method known as randomized dynamic quantization transformation (RDQT) to binarize biometric data but still highly distinctive among the users and highly random. We demonstrate the implementation in the context of fingerprint biometrics. The experiment results and the security analysis in DB1 (FVC 2002) dataset suggest that the technique is feasible in practical usage.

9 citations

Proceedings Article
01 Jan 2007
TL;DR: It is shown that there exist stronger methods such as discrete cosine transform (DCT) in face recognition than principal component analysis (PCA), which is the most popular one.
Abstract: Face recognition is a biometric identification methodwhich among the other methods such as, finger printidentification, speech recognition, signature and hand writtenrecognition has assigned a special place to itself. In principle, thebiometric identification methods include a wide range of sciencessuch as machine vision, image processing, pattern recognitionneural networks and has various applications in film processing,control access networks and etc. There are several methods forrecognition and appearance based methods is one of them. One of the most important algorithms in appearance based methods islinear discriminant analysis (LDA) method. One of the drawbacksfor LDA in face recognition is the small sample size (SSS) problemso it is suggested to first reduce the dimension of the space usingmethods among which, principal component analysis (PCA) is themost popular one. In this paper we show that there exist strongermethods such as discrete cosine transform (DCT).

9 citations


Network Information
Related Topics (5)
Feature extraction
111.8K papers, 2.1M citations
89% related
Image segmentation
79.6K papers, 1.8M citations
85% related
Feature (computer vision)
128.2K papers, 1.7M citations
85% related
Convolutional neural network
74.7K papers, 2M citations
83% related
Deep learning
79.8K papers, 2.1M citations
83% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202310
202219
202122
202028
201925
201832