Skip to main content

Personal Verification Using Off-line Signature with Tree-based Features

  • Conference paper
  • First Online:
Networking Communication and Data Knowledge Engineering

Part of the book series: Lecture Notes on Data Engineering and Communications Technologies ((LNDECT,volume 4))

  • 694 Accesses

Abstract

The signature verification is one of the major and general purposes frequently used approach for person’s verification among all the other existing and known biometric-based verification methods. This brought the attention to the development of an automatic signature verification system. In this paper, an off-line signature verification and recognition system based on tree and grid by adopting a feature extraction novel approach such as pixels in tree, eccentricity, and center was used. The problem of using a trained dataset in order to perform the verification was overcome by using only one genuine and test signature at the run time. Decision of the result which was based on authenticity and governed by the maximum correct feature favor, acceptance, and rejection is based on its majority. The usefulness of the proposed approach was acknowledged by the use of experimental results.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Battista Biggio, Zahid Akhtar, Giorgio Fumera, Gian Luca Marcialis, and Fabio Roli, 2012, “Security Evaluation of Biometric Authentication Systems Under Real Spoofing Attacks”, IEEE Biometrics Compendium, IET Biometrics Volume: 1, Issue: 1.

    Google Scholar 

  2. Andrea Ceccarelli, Leonardo Montecchi, Francesco Brancati, Paolo Lollini, Angelo Marguglio, and Andrea Bondavalli, 2015, “Continuous and Transparent User Identity Verification for Secure Internet Services”, IEEE Transactions On Dependable And Secure Computing, Vol. 12, No. 3, DOI 10.1109/TDSC.2013.2297709.

  3. Karan Khare, Surbhi Rautji and Deepak Gaur, 2013, “Behavioural Biometrics and Cognitive Security Authentication Comparison Study”, Advanced Computing: An International Journal (ACIJ), Vol. 4, No. 6, pp. 15–24.

    Google Scholar 

  4. Israa M. Alsaadi, 2015, “Physiological Biometric Authentication Systems, Advantages, Disadvantages And Future Development: A Review”, International Journal Of Scientific & Technology Research Vol. 4, Issue 12, pp. 285–289.

    Google Scholar 

  5. Dakshina Ranjan Kisku, Phalguni Gupta and Jamuna Kanta Sing, IJSIA 2010, “Offline Signature Identification by Fusion of Multiple Classifiers using Statistical Learning Theory,” Computer Vision and Pattern Recognition.

    Google Scholar 

  6. Madasu Hanmandlu, Mohd. Hafizuddin Mohd. Yusof and Vamsi Krishna Madasu, 2005, “Offline Signature Verification and Forgery Detection using Fuzzy Modeling,” The Journal of the Pattern Recognition Society, Vol. 38, pp. 341–356.

    Google Scholar 

  7. Vahid Kiani, Reza Pourreza, Hamid Reza Pourezza, 2010, “Offline Signature Verification Using Local Radon Transform and Support Vector Machines,” International Journal of Image Processing (IJIP), Vol. 3, No. 5, pp. 184–194.

    Google Scholar 

  8. Debasish Jena, Banshidhar Majhi, Saroj kumar Panigrahy and Sanjay Kumar Jena, ICCI 2008, “Improved Offline Signature Verification Scheme Using Feature Point Extraction Method,” Proc. 7th IEEE Int. Conference on Cognitive Informatics, pp. 475–480.

    Google Scholar 

  9. Mishra, Prabit Kumar and Sahoo, Mukti Ranjan, 2009, “Offline Signature Verification Scheme”.

    Google Scholar 

  10. Priyanka Chaurasia, 2009, Offline Signature Verification using High Pressure Regions, US Patent 7, 599,528, Oct 6, 2009.

    Google Scholar 

  11. Meenakshi K. Kalera, Sargur Srihari and Aihua Xu, 2004, “Offline Signature Verification and Identification using Distance Statistics,” International Journal of Pattern Recognition and Artificial Intelligence, Vol. 18, No. 7, pp. 1339–1360.

    Google Scholar 

  12. Banshider Majhi, Y Santhosh Reddy, D Prasanna Babu, 2006, “Novel Features for Offline Signature Verification”, International Journal of Computers, Communications & Control, Vol. I, No. 1, pp. 17–24.

    Google Scholar 

  13. Donato Impedovo, Giuseppe Pirlo, 2008, “Automatic Signature Verification: The State of the Art,” IEEE Transactions on Systems, Man and Cybernetics-Part C: Applications and Reviews, Vol. 38, No. 5, pp. 609–635.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Arun Kumar Shukla .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Shukla, A.K., Kanungo, S. (2018). Personal Verification Using Off-line Signature with Tree-based Features. In: Perez, G., Mishra, K., Tiwari, S., Trivedi, M. (eds) Networking Communication and Data Knowledge Engineering. Lecture Notes on Data Engineering and Communications Technologies, vol 4. Springer, Singapore. https://doi.org/10.1007/978-981-10-4600-1_19

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-4600-1_19

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-4599-8

  • Online ISBN: 978-981-10-4600-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics