Abstract
The signature verification is one of the major and general purposes frequently used approach for person’s verification among all the other existing and known biometric-based verification methods. This brought the attention to the development of an automatic signature verification system. In this paper, an off-line signature verification and recognition system based on tree and grid by adopting a feature extraction novel approach such as pixels in tree, eccentricity, and center was used. The problem of using a trained dataset in order to perform the verification was overcome by using only one genuine and test signature at the run time. Decision of the result which was based on authenticity and governed by the maximum correct feature favor, acceptance, and rejection is based on its majority. The usefulness of the proposed approach was acknowledged by the use of experimental results.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Battista Biggio, Zahid Akhtar, Giorgio Fumera, Gian Luca Marcialis, and Fabio Roli, 2012, “Security Evaluation of Biometric Authentication Systems Under Real Spoofing Attacks”, IEEE Biometrics Compendium, IET Biometrics Volume: 1, Issue: 1.
Andrea Ceccarelli, Leonardo Montecchi, Francesco Brancati, Paolo Lollini, Angelo Marguglio, and Andrea Bondavalli, 2015, “Continuous and Transparent User Identity Verification for Secure Internet Services”, IEEE Transactions On Dependable And Secure Computing, Vol. 12, No. 3, DOI 10.1109/TDSC.2013.2297709.
Karan Khare, Surbhi Rautji and Deepak Gaur, 2013, “Behavioural Biometrics and Cognitive Security Authentication Comparison Study”, Advanced Computing: An International Journal (ACIJ), Vol. 4, No. 6, pp. 15–24.
Israa M. Alsaadi, 2015, “Physiological Biometric Authentication Systems, Advantages, Disadvantages And Future Development: A Review”, International Journal Of Scientific & Technology Research Vol. 4, Issue 12, pp. 285–289.
Dakshina Ranjan Kisku, Phalguni Gupta and Jamuna Kanta Sing, IJSIA 2010, “Offline Signature Identification by Fusion of Multiple Classifiers using Statistical Learning Theory,” Computer Vision and Pattern Recognition.
Madasu Hanmandlu, Mohd. Hafizuddin Mohd. Yusof and Vamsi Krishna Madasu, 2005, “Offline Signature Verification and Forgery Detection using Fuzzy Modeling,” The Journal of the Pattern Recognition Society, Vol. 38, pp. 341–356.
Vahid Kiani, Reza Pourreza, Hamid Reza Pourezza, 2010, “Offline Signature Verification Using Local Radon Transform and Support Vector Machines,” International Journal of Image Processing (IJIP), Vol. 3, No. 5, pp. 184–194.
Debasish Jena, Banshidhar Majhi, Saroj kumar Panigrahy and Sanjay Kumar Jena, ICCI 2008, “Improved Offline Signature Verification Scheme Using Feature Point Extraction Method,” Proc. 7th IEEE Int. Conference on Cognitive Informatics, pp. 475–480.
Mishra, Prabit Kumar and Sahoo, Mukti Ranjan, 2009, “Offline Signature Verification Scheme”.
Priyanka Chaurasia, 2009, Offline Signature Verification using High Pressure Regions, US Patent 7, 599,528, Oct 6, 2009.
Meenakshi K. Kalera, Sargur Srihari and Aihua Xu, 2004, “Offline Signature Verification and Identification using Distance Statistics,” International Journal of Pattern Recognition and Artificial Intelligence, Vol. 18, No. 7, pp. 1339–1360.
Banshider Majhi, Y Santhosh Reddy, D Prasanna Babu, 2006, “Novel Features for Offline Signature Verification”, International Journal of Computers, Communications & Control, Vol. I, No. 1, pp. 17–24.
Donato Impedovo, Giuseppe Pirlo, 2008, “Automatic Signature Verification: The State of the Art,” IEEE Transactions on Systems, Man and Cybernetics-Part C: Applications and Reviews, Vol. 38, No. 5, pp. 609–635.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Shukla, A.K., Kanungo, S. (2018). Personal Verification Using Off-line Signature with Tree-based Features. In: Perez, G., Mishra, K., Tiwari, S., Trivedi, M. (eds) Networking Communication and Data Knowledge Engineering. Lecture Notes on Data Engineering and Communications Technologies, vol 4. Springer, Singapore. https://doi.org/10.1007/978-981-10-4600-1_19
Download citation
DOI: https://doi.org/10.1007/978-981-10-4600-1_19
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-4599-8
Online ISBN: 978-981-10-4600-1
eBook Packages: EngineeringEngineering (R0)