INTELLEGENT APPROACH FOR OFFLINE SIGNATURE VERIFICATION USING CHAINCODE AND ENERGY FEATURE EXTRACTION ON MULTICORE PROCESSOR
Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.4, No. 4)Publication Date: 2015-04-30
Authors : Raju Pawar; Roopali Soni;
Page : 516-520
Keywords : Neural network; feature extraction; chain code; etc.;
Abstract
The signature of a person is an important biometric attribute of a human being which can be used to authenticate human identification. A number of biometric techniques have been proposed for personal identification in the past. Among the vision-based ones are voice recognition, iris scanning and retina scanning, fingerprint recognition, face recognition. Signature verification are the most widely known among the non-vision based ones. As signatures continue to play a very important role in financial, legal transactions and commercial, in truly secured authentication becomes more and more crucial. However human signatures can be handled as an image and recognized using computer vision and neural network techniques. There are various approaches to signature recognition with a lot of scope of research. In this paper consists of image prepossessing, parallel process, feature extraction, verification and neural network training with extracted features. A verification stage includes applying the extracted features of test signature to a trained neural network which will classify it as a genuine or forged. In this paper, offline signature recognition & verification using neural network is proposed. Signatures are verified based on parameters extracted from the signature using parallel processing techniques.
Other Latest Articles
- TRANSMISSION OF WIRELESS POWER IN MEDICAL FIELD
- FPGA IMPLEMENTATION AND DESIGN OF LOW POWER SEQUENTIAL FILTER
- AUTHENTICATION AND SELF-SYNCHRONISATION OF AUDIO SIGNAL BY WATERMARKING USING EMPIRICAL MODE DECCOMPOSITION
- IC ENGINE WET LINERS THERMAL ANALYSIS
- REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING HISTOGRAM AND CIPHERING TECHNIQUE
Last modified: 2015-05-07 19:57:48