1 / 9

Signature Verification

Signature Verification. By Mayura Worlikar COSC 5010. Introduction. Computers are largely used in almost each and every field including financial transactions, thus providing additional security measures for computer system is necessary.

trevor
Download Presentation

Signature Verification

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Signature Verification By Mayura Worlikar COSC 5010

  2. Introduction • Computers are largely used in almost each and every field including financial transactions, thus providing additional security measures for computer system is necessary. • The security measures to be used must be cheap, reliable and un-intrusive to the authorized person. The technique which meets these requirements is handwritten signature verification.

  3. Why Handwritten Signature only? • Everyday transaction • Individuals less likely to object • Individual’s signature is unique • Less controversial

  4. Categories of signature Identification • Offline Signature Verification • deals with shape only • Online signature Verification • deals with dynamic features like speed, pen pressure, directions, stroke length, and when the pen is lifted from the paper

  5. Challenging task • The main challenge with online Signature Identification technology is differentiating between the consistent parts of the signature and the behavioral parts of the signature that vary with each signing . A person’s signature is never entirely the same. The signature can vary substantially over an individual’s lifetime. Allowing for these variations while providing protection against forgers is a challenging task.

  6. Some theory • Signature Acquisition • Signature Identification using global features • average pressure • pen tilt • average velocity • Number of pen ups • Training

  7. Signature Identification

  8. Advantages • Low error rate. • Forgery is detected even when the forger has managed to get a copy of the authentic signature. • Fast and simple training. • Cheap hardware. • Little storage requirements.

  9. References • http://www.gaits.com/biometrics_signature.asp • http://www.vision.caltech.edu/mariomu/research/sigverif/ • Dynamic Signature Verification using Local and Global Features ------ By Charles Pippin

More Related