OFFLINE SIGNATURE VERIFICATION

Size: px
Start display at page:

Download "OFFLINE SIGNATURE VERIFICATION"

Transcription

1 International Journal of Electronics and Communication Engineering and Technology (IJECET) Volume 8, Issue 2, March - April 2017, pp , Article ID: IJECET_08_02_016 Available online at ISSN Print: and ISSN Online: IAEME Publication OFFLINE SIGNATURE VERIFICATION Dr. M. Narayana Professor, Dept. of ECE, Jaya Prakash Narayan College of Engineering, Mahabubnagar, Telangana, India L. Bhavani Annapurna Associate Professor, Dept. of ECE, Jaya Prakash Narayan College of Engineering, Mahabubnagar, Telangana, India K. Mounika B. Tech, Final year, Dept. of ECE, Jaya Prakash Narayan College of Engineering, Mahabubnagar, Telangana, India ABSTRACT In the era of growing technology, security is the major concern to avoid fake and forgeries. It is also one of the most easily forgeable biometric identity when compared to other biometric features like thumb impression, face recognition etc. Now a day s Signature verification is one of the most important features for checking the authenticity of a person. The classification of the feature utilizes statistical features. Our proposed model has three stages: image pre-processing, feature extraction and classification and verification. Scanned signatures are introduced into the computer, our proposed method modifies their quality by image enhancement and noise reduction, to be followed by feature extraction in which we extract threshold, mean of bounding box, perimeter, total pixel count, ratio of height and width, area out of which threshold is efficient and combination of those properties leads in better results and finally used Euclidean distance model for classification of signature either genuine or forgery. Key words: Forgeries, Signature Verification, Euclidean Distance Model, Recognition Cite this Article: Dr. M. Narayana, L. Bhavani Annapurna and K. Mounika, Offline Signature Verification, International Journal of Electronics and Communication Engineering and Technology, 8(2), 2017, pp editor@iaeme.com

2 Offline Signature Verification 1. INTRODUCTION Signature verification is a biometric verification which is an important research area targeted at automatic identity verification such as legal, banking and high security environments.[1] Signature verification can be divided into two classes online and offline. Online approach uses a stylus and electronic tablet. Stylus which is connected to a computer to extract information about a signature and dynamic information like pressure, speed of writing, velocity etc which is used for verification purpose. Offline signature verification involves less electronic control and uses signature images captured by scanner or camera. In this features are extracted from scanned signature image and these signature images captured simple [2]. Difficulty lies in the fact that it is hard to segment signature strokes due to highly stylish and unconventional writing styles and non-repetitive nature of variation of signature because of age, illness and emotional state of a person [3]. When we couple all these it causes a large variation. A robust system has to be designed that should consider all these types of factors but also detect various type of forgery. System should neither be too coarse nor too sensitive. It should have acceptable trade-off between low False Acceptance Rate and a low False Rejection Rate Types of forgery There are various types of signature forgeries, some of them are: 1. Random Forgery: This is also known as simple forgery and is very easy to detect. The signer creates a signature in his own style by just knowing the name of an individual whose sign is to be made. 2. Unskilled Forgery: The signer creates a signature after observing the signature once or twice without any prior experience. 3. Skilled Forgery: The signer may be a professional in copying signatures. He creates a signature after having a good practice over it. Such signatures are most difficult to detect. 2. OBJECTIVES We need to be overcome four problems for better results. They are: To extract the Region of Interest (ROI). To find the angle of inclination of the user signature. To remove the noise in the signature. Eliminating the effects of scaling factor. 3. METHODOLOGY In order to design a system, which will detect the forged signatures by comparing some special features with original one, the following architecture has been proposed editor@iaeme.com

3 Dr. M. Narayana, L. Bhavani Annapurna and K. Mounika Figure 1 Algorithm of offline signature verification system 3.1. Image acquisition In the offline signature verification system individual person signature are taken on a paper but the signature to be preprocessed by the system must be in digital format. Hence we use a scanner or a camera for image acquisition in which we scan the user signature which is in the paper form and after scanning it will be in digital format and now it is used for preprocessing Pre-Processing It is performed to improve the quality of signature image and to verify the signature correctly, preprocessing of acquired signature is required. In this stage, we will perform binarization, noise elimination, size normalization, extracting the region of interest, image thinning and image rotation. Binarization As we know there is no importance of color in which the signer is signing that s why we convert the image from color image to gray scale image. Then for future calculation we have converted that image to binary image using threshold which is found using OTSU s method. In binarization a color image is converted into binary image so as to make feature extraction easier because it is required to compare only two pixel values (colors). It allows us to reduce the amount of image information (removing color and background), so the output image is black-white. The black-white type of the image is much easier for further processing. Noise removal The acquired sign may sometimes contain noise because while scanning some noise will be included because of the issues in the scanning device and extra pen dots other than signature. It is necessary to remove those extra pixels from acquired image to verify the signature correctly. In this phase, the noise associated with the image need to be removed. This can be done using median filter editor@iaeme.com

4 Offline Signature Verification Thinning The signer may use different pen at different time and that s why thickness of the signature may vary and so as to eliminate the thickness differences thinning is to be performed and it makes the image one pixel thick. It improves the accuracy rate and also the computational time is reduced. Finding the bounding box of the image and cropping the image After previous step it is required to locate the extract position of the signature in the image to perform signature verification, because signature can be anywhere on the paper and they never start from the same position and neither do they terminate at the same position and they can sign in different angles and sizes. Now the 1 st problem is to find the exact position of the signature from the paper and the 2 nd problem is to find the angle of the signature. After that the necessary correction need to be done in the context mentioned above. To solve the 1 st problem a solution has been proposed. And the solution is to scan the signature and find the smallest rectangular area covering the total signature. It is achieved using bounding box property from regionprops command and after that the required portion is extracted. Angular problem solution Another important task is that the angular detection of a user. To compare the signature signed in different angles that is stored in database we need to overcome this problem. And to solve this angular problem firstly we need to find the endpoints of an image and some mathematical formula is used. After finding endpoints, for image rotation to be done here we need to use co-ordinate geometry, to find the angle and to rotate the image accordingly. Those two end points are considered as point a and point b. Now we get x1, y1 co-ordinates from point a and x2, y2 co-ordinates from point b. we need to draw a straight line between these two points and then we need to find the angle between the line joining the end points and the horizontal x-axis and then the image is to be rotated by the angle to make it horizontal to x- axis. tanθ= () () θ=tan^-1 () () (1) (2) Size normalization After image rotation is performed the size of the signature image gets enlarged hence size normalization is required for the comparison of two images. In this method we need to fix the height and width of the image so that it remains constant and comparison can be performed Feature extraction Feature extraction techniques take vital role to improve the accuracy of signature verification system. Similar characteristics of a signature are called features of that signature and accurately extract those features are called extraction. In this we have used threshold, number of connected components, and mean of bounding box, perimeter and aspect ratio. Aspect ratio is defined as the ratio of width and height of signature. The individual property efficiency and the elapsed time are shown in the below table 1. Threshold: We perform thresholding using OTSU s method editor@iaeme.com

5 Dr. M. Narayana, L. Bhavani Annapurna and K. Mounika OTSU s method In computer vision and image processing, OTSU s method is used to automatically perform histogram shape-based image thresholding. The algorithm assumes that the image to be threshold contains 2 classes of pixels (e.g. foreground and background then calculates the optimum threshold separating those 2 classes. Connected component Pen up and pen down are one of the most important properties that a person follows while signature. And this feature could be difficult to copy for a fake person. This feature of a signature is extracted by counting the number of stroke in a signature. The line between pen up and pen down is said to be a stroke. Height/width ratio Height and width of signature is obtained after drawing a smallest rectangle in which signature can fit. Height and the width of a signature remain same for a same person. The size of the signature might differ in different time but the ratio of height and width remain approximately same for same person Signature verification This process identifies and differentiates a person s signature from another and here we have used Euclidean distance to verify the signature. This classifier is good for features extracted and fast in computation. This is simple distance Euclidean distance model by following equation. In threshold calculation these distances are useful. We can calculate distance (d) by using the equation below: Distance (d) = Sqrt( ( ) ) (3) If the Euclidean distance equals to zero then the test image is considered as the matched original image otherwise it is treated as forged signature. 4. RESULTS AND DISCUSSIONS 4.1. FACTORS OF PERFORMANCE EVALUATION False Acceptance Ratio (FAR) and False Rejection Ratio (FRR) are the two parameters used for measuring the performance of any signature verification method: The false acceptance ratio is given by the number of fake signatures accepted by the system with respect to the number of comparisons made. The values of FAR are obtained when a sample genuine database is tested upon by false signatures. The lower the value of FAR the better it is and FAR is evaluated by FAR= ( ) ( ) 100 (4) The false rejection ratio is the total number of genuine signatures rejected by the system with respect to the number of comparisons made. The values of FRR are obtained when a sample false database is tested upon by genuine signatures. The lower the value of FRR the better it is and FRR is evaluated by $%%= ( '( ) ) ( '( ) 100 (5) editor@iaeme.com

6 Offline Signature Verification 4.2. Performance analysis of proposed work Table 1 Values of FAR and FRR S. No Genuine database Forged database FAR FRR False Acceptance Ratio (FRR) and False Rejection Ratio (FRR) are the two parameters used for measuring the performance of any signature verification method. The lower the value of FAR the better it is and the value is 0 and it indicates it is best. The lower the value of FRR the better it is and the value is 0 and it indicates it is best. Table 2 Results of individual properties PROPERTY EFFICIENCY ELAPSED TIME Threshold Ratio of height and width Perimeter Mean of bounding box Number of connected components The following experiments are part of our results. Table 1 shows the individual property results. Obviously threshold alone has higher efficiency when compared to other properties Test images 4.4. Database images (a) (b) (c) (d) Figure 2 Test images (a) (b) (c) (d) editor@iaeme.com

7 Dr. M. Narayana, L. Bhavani Annapurna and K. Mounika (e) (f) (g) (h) Figure 3 Database images The above images are taken as samples from the database there are twenty seven different genuine signatures and sixty seven forged signatures available in datasets. We need to use this datasets for signature verification RESULTS Figure 4 Output 4.6. COMPARATIVE ANALYSIS We have performed all the possible combinations and out of which the effective combination of properties with their efficiency and computational time are shown below: Table 3 Combined results Properties Efficiency Elapsed time 1, ,3, ,2,4, ,2,3,4, Foot note: 1- Threshold, 2-Mean of bounding box, 3- Area, 4-Perimeter, 5-Ratio of height and width, 6-Total pixel count editor@iaeme.com

8 Offline Signature Verification 5. CONCLUSION The algorithm developed by us, uses various statistical features to characterize signatures that effectively serve to distinguish signatures of different persons and also it can detect the three types of forgeries i.e., random forgery, unskilled forgery and skilled forgery. From the performance evaluating factors FAR and FRR we can also say that this is the best algorithm for signature verification and as we have overcome the problems due to angle of inclination and region of interest and scaling factors it can be said as the modified off-line signature verification. 6. FUTURE SCOPE As the database increases the computational time of offline signature verification system increases. And the dynamic information is lost using this method. Dynamic information is much more efficient than the static information which we have used in this. Hence as a future work we can design a system which is a combination of static and dynamic information i.e., the combination of offline and online verification systems. Or we can design an On-line signature verification system which is purely based on dynamic features which is much more efficient than this. REFERENCES [1] Off-line signature verification Mrs. Tulsi Gupta Student of M. Tech (weekend Programme) IT, Guru Gobind Singh Indraprastha University, Dwaraka. [2] Offline signature verification using Grid based and Centroid based approach (Sayantan Roy, Department of Computer Science Engineering), ISM Dhanbad Jharkhand. [3] ISS (Aug 25, 2013) Offline Signature Verification system with Gaussian Mixture Models (GMM) Charu Jain1, Priti Singh2, Preeti Rana3. [4] Signature verification, Dr. H.B.Kekre et.al/ International Journal on Computer Science and Engineering (IJCSE). [5] Online Signature Recognition Using Matlab, International Journal of Innovative Research in Electrical, Electronics, Instrumentation and Control Engineering Vol. 3, Issue 2, February [6] Offline Signature Verification for Detecting Signature Forgery: A Comparative Study, International Journal on Computer Trends and Technology (IJCTT)-Volume 21 Number 3-Mar [7] A Review Paper on Signature Recognition, International Journal for Research in Applies Science & Engineering Technology (IJRASET), vol. 3, Issue VI, June 2015, ISSN: [8] An Automatic Offline Signature Verification and Forgery Detection System. [9] Hand Written Signature recognition & Verification, International Journal of Advanced Research in Computer Science and Software Engineering, Vol 3, Issue 3, March [10] A Survey for offline signature verification and recognition techniques using image processing, Volume 1, Spl. Issue 2 (May, 2014). [11] Enhanced signature verification and recognition using MATLAB, International Journal of Innovative Research in Advanced Engineering (IJIRAE), vol 1, issue 4 (May 2014). [12] Offline handwritten signature identification and verification using feature point extraction, International Journal on Computer Applications ( ), vol 141-No 14, May [13] Offline signature verification and identification using distance statistics, International journal of pattern recognition and Artificial Intelligence, vol. 18, No 7, (2004) editor@iaeme.com

9 Dr. M. Narayana, L. Bhavani Annapurna and K. Mounika [14] Handwritten signature verification ECE-533-Project by Ashish dhawan and Aditi R. Ganesan. [15] Extraction of global features for off line signature recognition, Faculty of computer science, Bialystok Technical University. [16] A survey on handwritten signature verification techniques, IJARCSMS, vol 3, issue 1, January [17] Improved offline signature verification scheme using feature point extraction method. [18] Enhanced signature verification and recognition using MATLAB, International Journal of nnovative Research in Advanced Engineering (IJIRAE), Volume 1, issue 4 (may 2014). [19] A Review Paper on Signature Recognition, International Journal for Research in Applies Science & Engineering Technology (IJRASET), Volume 3, Issue VI, June 2015, ISSN: [20] Padmajadevi G and Dr. Aprameya K.S, Offline Handwritten Signature Recognition Using Edge hinge and Edge extraction Techniques and Manhattan Distance Classifier, International Journal of Electronics and Communication Engineering and Technology, 8(1), 2017, pp [21] Dr. Vangala Padmaja, A Brief Review on Hand Written Character Recognition, International Journal of Advanced Research in Engineering and Technology (IJARET), 5(2), 2014, pp [22] A New Approach for Object Feature Extract and Recognition, 9 th International Conference on Advanced Computer Systems editor@iaeme.com

Online Signature Verification Technique

Online Signature Verification Technique Volume 3, Issue 1 ISSN: 2320-5288 International Journal of Engineering Technology & Management Research Journal homepage: www.ijetmr.org Online Signature Verification Technique Ankit Soni M Tech Student,

More information

HANDWRITTEN SIGNATURE VERIFICATION USING NEURAL NETWORK & ECLUDEAN APPROACH

HANDWRITTEN SIGNATURE VERIFICATION USING NEURAL NETWORK & ECLUDEAN APPROACH http:// HANDWRITTEN SIGNATURE VERIFICATION USING NEURAL NETWORK & ECLUDEAN APPROACH Shalu Saraswat 1, Prof. Sitesh Kumar Sinha 2, Prof. Mukesh Kumar 3 1,2,3 Department of Computer Science, AISECT University

More information

NOVATEUR PUBLICATIONS INTERNATIONAL JOURNAL OF INNOVATIONS IN ENGINEERING RESEARCH AND TECHNOLOGY [IJIERT] ISSN: VOLUME 2, ISSUE 1 JAN-2015

NOVATEUR PUBLICATIONS INTERNATIONAL JOURNAL OF INNOVATIONS IN ENGINEERING RESEARCH AND TECHNOLOGY [IJIERT] ISSN: VOLUME 2, ISSUE 1 JAN-2015 Offline Handwritten Signature Verification using Neural Network Pallavi V. Hatkar Department of Electronics Engineering, TKIET Warana, India Prof.B.T.Salokhe Department of Electronics Engineering, TKIET

More information

Offline Signature Verification using Grid based and Centroid based Approach

Offline Signature Verification using Grid based and Centroid based Approach Offline Signature Verification using Grid based and Centroid based Approach Sayantan Roy Department of Computer Science Engineering ISM Dhanbad Jharkhand ABSTRACT Now a day s Signature verification is

More information

Signature Recognition by Pixel Variance Analysis Using Multiple Morphological Dilations

Signature Recognition by Pixel Variance Analysis Using Multiple Morphological Dilations Signature Recognition by Pixel Variance Analysis Using Multiple Morphological Dilations H B Kekre 1, Department of Computer Engineering, V A Bharadi 2, Department of Electronics and Telecommunication**

More information

Offline Signature verification and recognition using ART 1

Offline Signature verification and recognition using ART 1 Offline Signature verification and recognition using ART 1 R. Sukanya K.Malathy M.E Infant Jesus College of Engineering And Technology Abstract: The main objective of this project is signature verification

More information

Touchless Fingerprint recognition using MATLAB

Touchless Fingerprint recognition using MATLAB International Journal of Innovation and Scientific Research ISSN 2351-814 Vol. 1 No. 2 Oct. 214, pp. 458-465 214 Innovative Space of Scientific Research Journals http://www.ijisr.issr-journals.org/ Touchless

More information

Off-line Signature Verification Using Neural Network

Off-line Signature Verification Using Neural Network International Journal of Scientific & Engineering Research, Volume 3, Issue 2, February-2012 1 Off-line Signature Verification Using Neural Network Ashwini Pansare, Shalini Bhatia Abstract a number of

More information

IJESRT. Scientific Journal Impact Factor: (ISRA), Impact Factor: 1.852

IJESRT. Scientific Journal Impact Factor: (ISRA), Impact Factor: 1.852 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY INTELLEGENT APPROACH FOR OFFLINE SIGNATURE VERIFICATION USING CHAINCODE AND ENERGY FEATURE EXTRACTION ON MULTICORE PROCESSOR Raju

More information

A Novel Automated Approach for Offline Signature Verification Based on Shape Matrix

A Novel Automated Approach for Offline Signature Verification Based on Shape Matrix A Novel Automated Approach for Offline Signature Verification Based on Shape Matrix Sumbal Iqbal Ahmed Peshawar Pakistan Rashid Jalal Qureshi Emirates Aviation University Dubai,UAE Imran Khan Peshawar,

More information

Automatic Static Signature Verification Systems: A Review

Automatic Static Signature Verification Systems: A Review Automatic Static Signature Verification Systems: A Review 1 Vitthal K. Bhosale1 Dr. Anil R. Karwankar2 1 PG Student, Government College of Engineering, Aurangabad (M.S.), 2 Assistant Professor, Dept. Of

More information

Biometric Security System Using Palm print

Biometric Security System Using Palm print ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference

More information

AUTOMATED STUDENT S ATTENDANCE ENTERING SYSTEM BY ELIMINATING FORGE SIGNATURES

AUTOMATED STUDENT S ATTENDANCE ENTERING SYSTEM BY ELIMINATING FORGE SIGNATURES AUTOMATED STUDENT S ATTENDANCE ENTERING SYSTEM BY ELIMINATING FORGE SIGNATURES K. P. M. L. P. Weerasinghe 149235H Faculty of Information Technology University of Moratuwa June 2017 AUTOMATED STUDENT S

More information

Gurmeet Kaur 1, Parikshit 2, Dr. Chander Kant 3 1 M.tech Scholar, Assistant Professor 2, 3

Gurmeet Kaur 1, Parikshit 2, Dr. Chander Kant 3 1 M.tech Scholar, Assistant Professor 2, 3 Volume 8 Issue 2 March 2017 - Sept 2017 pp. 72-80 available online at www.csjournals.com A Novel Approach to Improve the Biometric Security using Liveness Detection Gurmeet Kaur 1, Parikshit 2, Dr. Chander

More information

Polar Harmonic Transform for Fingerprint Recognition

Polar Harmonic Transform for Fingerprint Recognition International Journal Of Engineering Research And Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 13, Issue 11 (November 2017), PP.50-55 Polar Harmonic Transform for Fingerprint

More information

Finger Print Enhancement Using Minutiae Based Algorithm

Finger Print Enhancement Using Minutiae Based Algorithm Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 8, August 2014,

More information

Cursive Handwriting Recognition System Using Feature Extraction and Artificial Neural Network

Cursive Handwriting Recognition System Using Feature Extraction and Artificial Neural Network Cursive Handwriting Recognition System Using Feature Extraction and Artificial Neural Network Utkarsh Dwivedi 1, Pranjal Rajput 2, Manish Kumar Sharma 3 1UG Scholar, Dept. of CSE, GCET, Greater Noida,

More information

Handwritten Devanagari Character Recognition Model Using Neural Network

Handwritten Devanagari Character Recognition Model Using Neural Network Handwritten Devanagari Character Recognition Model Using Neural Network Gaurav Jaiswal M.Sc. (Computer Science) Department of Computer Science Banaras Hindu University, Varanasi. India gauravjais88@gmail.com

More information

Segmentation of Kannada Handwritten Characters and Recognition Using Twelve Directional Feature Extraction Techniques

Segmentation of Kannada Handwritten Characters and Recognition Using Twelve Directional Feature Extraction Techniques Segmentation of Kannada Handwritten Characters and Recognition Using Twelve Directional Feature Extraction Techniques 1 Lohitha B.J, 2 Y.C Kiran 1 M.Tech. Student Dept. of ISE, Dayananda Sagar College

More information

Automatic Recognition and Verification of Handwritten Legal and Courtesy Amounts in English Language Present on Bank Cheques

Automatic Recognition and Verification of Handwritten Legal and Courtesy Amounts in English Language Present on Bank Cheques Automatic Recognition and Verification of Handwritten Legal and Courtesy Amounts in English Language Present on Bank Cheques Ajay K. Talele Department of Electronics Dr..B.A.T.U. Lonere. Sanjay L Nalbalwar

More information

An Efficient on-line Signature Verification System Using Histogram Features

An Efficient on-line Signature Verification System Using Histogram Features RESEARCH ARTICLE OPEN ACCESS An Efficient on-line Signature Verification System Using Histogram Features Mr.Abilash S 1, Mrs.M.Janani, M.E 2 ME Computer Science and Engineering,Department of CSE, Annai

More information

Biometrics Technology: Hand Geometry

Biometrics Technology: Hand Geometry Biometrics Technology: Hand Geometry References: [H1] Gonzeilez, S., Travieso, C.M., Alonso, J.B., and M.A. Ferrer, Automatic biometric identification system by hand geometry, Proceedings of IEEE the 37th

More information

OFFLINE SIGNATURE VERIFICATION USING SUPPORT LOCAL BINARY PATTERN

OFFLINE SIGNATURE VERIFICATION USING SUPPORT LOCAL BINARY PATTERN OFFLINE SIGNATURE VERIFICATION USING SUPPORT LOCAL BINARY PATTERN P.Vickram, Dr. A. Sri Krishna and D.Swapna Department of Computer Science & Engineering, R.V. R & J.C College of Engineering, Guntur ABSTRACT

More information

An Efficient Character Segmentation Based on VNP Algorithm

An Efficient Character Segmentation Based on VNP Algorithm Research Journal of Applied Sciences, Engineering and Technology 4(24): 5438-5442, 2012 ISSN: 2040-7467 Maxwell Scientific organization, 2012 Submitted: March 18, 2012 Accepted: April 14, 2012 Published:

More information

I. INTRODUCTION. Image Acquisition. Denoising in Wavelet Domain. Enhancement. Binarization. Thinning. Feature Extraction. Matching

I. INTRODUCTION. Image Acquisition. Denoising in Wavelet Domain. Enhancement. Binarization. Thinning. Feature Extraction. Matching A Comparative Analysis on Fingerprint Binarization Techniques K Sasirekha Department of Computer Science Periyar University Salem, Tamilnadu Ksasirekha7@gmail.com K Thangavel Department of Computer Science

More information

Segmentation of Characters of Devanagari Script Documents

Segmentation of Characters of Devanagari Script Documents WWJMRD 2017; 3(11): 253-257 www.wwjmrd.com International Journal Peer Reviewed Journal Refereed Journal Indexed Journal UGC Approved Journal Impact Factor MJIF: 4.25 e-issn: 2454-6615 Manpreet Kaur Research

More information

OCR For Handwritten Marathi Script

OCR For Handwritten Marathi Script International Journal of Scientific & Engineering Research Volume 3, Issue 8, August-2012 1 OCR For Handwritten Marathi Script Mrs.Vinaya. S. Tapkir 1, Mrs.Sushma.D.Shelke 2 1 Maharashtra Academy Of Engineering,

More information

A Combined Method for On-Line Signature Verification

A Combined Method for On-Line Signature Verification BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 14, No 2 Sofia 2014 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2014-0022 A Combined Method for On-Line

More information

HANDWRITTEN GURMUKHI CHARACTER RECOGNITION USING WAVELET TRANSFORMS

HANDWRITTEN GURMUKHI CHARACTER RECOGNITION USING WAVELET TRANSFORMS International Journal of Electronics, Communication & Instrumentation Engineering Research and Development (IJECIERD) ISSN 2249-684X Vol.2, Issue 3 Sep 2012 27-37 TJPRC Pvt. Ltd., HANDWRITTEN GURMUKHI

More information

A Survey of Problems of Overlapped Handwritten Characters in Recognition process for Gurmukhi Script

A Survey of Problems of Overlapped Handwritten Characters in Recognition process for Gurmukhi Script A Survey of Problems of Overlapped Handwritten Characters in Recognition process for Gurmukhi Script Arwinder Kaur 1, Ashok Kumar Bathla 2 1 M. Tech. Student, CE Dept., 2 Assistant Professor, CE Dept.,

More information

Offline Handwritten Signatures Classification Using Wavelet Packets and Level Similarity Based Scoring

Offline Handwritten Signatures Classification Using Wavelet Packets and Level Similarity Based Scoring Offline Handwritten Signatures Classification Using Wavelet Packets and Level Similarity Based Scoring Poornima G Patil #1, Ravindra S Hegadi #2 1 Department of Computer Science and Applications 2 School

More information

Offline Signature Verification using Feature Point Extraction

Offline Signature Verification using Feature Point Extraction Offline Signature Verification using Feature Point S.N. Gunjal Computer Engg. Dept SRES s College of Engineering, Kopargaon-423603. Maharashtra (India) B.J. Dange Computer Engg. Dept SRES s College of

More information

RULE BASED SIGNATURE VERIFICATION AND FORGERY DETECTION

RULE BASED SIGNATURE VERIFICATION AND FORGERY DETECTION RULE BASED SIGNATURE VERIFICATION AND FORGERY DETECTION M. Hanmandlu Multimedia University Jalan Multimedia 63100, Cyberjaya Selangor, Malaysia E-mail:madasu.hanmandlu@mmu.edu.my M. Vamsi Krishna Dept.

More information

wavelet packet transform

wavelet packet transform Research Journal of Engineering Sciences ISSN 2278 9472 Combining left and right palmprint for enhanced security using discrete wavelet packet transform Abstract Komal Kashyap * and Ekta Tamrakar Department

More information

Estimating Speed, Velocity, Acceleration and Angle Using Image Addition Method

Estimating Speed, Velocity, Acceleration and Angle Using Image Addition Method Estimating Speed, Velocity, Acceleration and Angle Using Image Addition Method Sawan Singh Third Year Student, Dept. of ECE, UIET, CSJM University, Kanpur, India ABSTRACT: This paper leads us to a new

More information

Comparative Study of Hand Gesture Recognition Techniques

Comparative Study of Hand Gesture Recognition Techniques Reg. No.:20140316 DOI:V2I4P16 Comparative Study of Hand Gesture Recognition Techniques Ann Abraham Babu Information Technology Department University of Mumbai Pillai Institute of Information Technology

More information

DETECTION OF INDIAN COUNTERFEIT BANKNOTES USING NEURAL NETWORK

DETECTION OF INDIAN COUNTERFEIT BANKNOTES USING NEURAL NETWORK DETECTION OF INDIAN COUNTERFEIT BANKNOTES USING NEURAL NETWORK E.HARIPRIYA 1, Dr. K. ANUSDHA 2 1 M.Tech, DEE, Pondicherry University, Puducherry, India. 2 Assistant Professor, DEE,Pondicherry University,

More information

Skew Detection and Correction of Document Image using Hough Transform Method

Skew Detection and Correction of Document Image using Hough Transform Method Skew Detection and Correction of Document Image using Hough Transform Method [1] Neerugatti Varipally Vishwanath, [2] Dr.T. Pearson, [3] K.Chaitanya, [4] MG JaswanthSagar, [5] M.Rupesh [1] Asst.Professor,

More information

Comparative Study of ROI Extraction of Palmprint

Comparative Study of ROI Extraction of Palmprint 251 Comparative Study of ROI Extraction of Palmprint 1 Milind E. Rane, 2 Umesh S Bhadade 1,2 SSBT COE&T, North Maharashtra University Jalgaon, India Abstract - The Palmprint region segmentation is an important

More information

Optical Character Recognition (OCR) for Printed Devnagari Script Using Artificial Neural Network

Optical Character Recognition (OCR) for Printed Devnagari Script Using Artificial Neural Network International Journal of Computer Science & Communication Vol. 1, No. 1, January-June 2010, pp. 91-95 Optical Character Recognition (OCR) for Printed Devnagari Script Using Artificial Neural Network Raghuraj

More information

Keywords:- Fingerprint Identification, Hong s Enhancement, Euclidian Distance, Artificial Neural Network, Segmentation, Enhancement.

Keywords:- Fingerprint Identification, Hong s Enhancement, Euclidian Distance, Artificial Neural Network, Segmentation, Enhancement. Volume 5, Issue 8, August 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Embedded Algorithm

More information

Graph Geometric Approach and Bow Region Based Finger Knuckle Biometric Identification System

Graph Geometric Approach and Bow Region Based Finger Knuckle Biometric Identification System _ Graph Geometric Approach and Bow Region Based Finger Knuckle Biometric Identification System K.Ramaraj 1, T.Ummal Sariba Begum 2 Research scholar, Assistant Professor in Computer Science, Thanthai Hans

More information

FUZZY LOGIC BASED ADAPTIVE RESONANCE THEORY-1 APPROACH FOR OFFLINE SIGNATURE VERIFICATION

FUZZY LOGIC BASED ADAPTIVE RESONANCE THEORY-1 APPROACH FOR OFFLINE SIGNATURE VERIFICATION Volume 118 No. 16 2018, 681-694 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu FUZZY LOGIC BASED ADAPTIVE RESONANCE THEORY-1 APPROACH FOR OFFLINE

More information

AStudyonPreprocessingandFeatureExtractioninofflineHandwrittenSignatures

AStudyonPreprocessingandFeatureExtractioninofflineHandwrittenSignatures Global Journal of Computer Science and Technology: F Graphics & Vision Volume 15 Issue 2 Version 1.0 Year 2015 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

Peg-Free Hand Geometry Verification System

Peg-Free Hand Geometry Verification System Peg-Free Hand Geometry Verification System Pavan K Rudravaram Venu Govindaraju Center for Unified Biometrics and Sensors (CUBS), University at Buffalo,New York,USA. {pkr, govind} @cedar.buffalo.edu http://www.cubs.buffalo.edu

More information

Machine Learning: Handwritten Character Recognition

Machine Learning: Handwritten Character Recognition Machine Learning: Handwritten Character Recognition Ayush Bharti, Shivani Srivastava, Jyoti Singh, Swarnima Pandey (Research Scholar, Department of Computer Science & Engineering, Sagar Institute of Technology

More information

Volume 2, Issue 9, September 2014 ISSN

Volume 2, Issue 9, September 2014 ISSN Fingerprint Verification of the Digital Images by Using the Discrete Cosine Transformation, Run length Encoding, Fourier transformation and Correlation. Palvee Sharma 1, Dr. Rajeev Mahajan 2 1M.Tech Student

More information

Signature Verification Why xyzmo offers the leading solution

Signature Verification Why xyzmo offers the leading solution Dynamic (Biometric) Signature Verification The signature is the last remnant of the hand-written document in a digital world, and is considered an acceptable and trustworthy means of authenticating all

More information

Design of Digital Signature Verification Algorithm using Relative Slopemethod

Design of Digital Signature Verification Algorithm using Relative Slopemethod Design of Digital Signature Verification Algorithm using Relative Slopemethod Prof. Miss. P.N.Ganorkar, Dept.of Computer Engineering SRPCE,Nagpur (Maharashtra), India Email:prachiti.ganorkar@gmail.com

More information

Review on Optical Character Recognition and Signature Recognition and Verification Technique

Review on Optical Character Recognition and Signature Recognition and Verification Technique Review on Optical Character Recognition and Signature Recognition and Verification Technique Fenil Maisuria, Nil Patel, Jignesh Bhakta, Kush Ahir, Krunal Solanki and Gayatri Patel Babu Madhav Institute

More information

Fuzzy Inference System based Edge Detection in Images

Fuzzy Inference System based Edge Detection in Images Fuzzy Inference System based Edge Detection in Images Anjali Datyal 1 and Satnam Singh 2 1 M.Tech Scholar, ECE Department, SSCET, Badhani, Punjab, India 2 AP, ECE Department, SSCET, Badhani, Punjab, India

More information

Character Recognition

Character Recognition Character Recognition 5.1 INTRODUCTION Recognition is one of the important steps in image processing. There are different methods such as Histogram method, Hough transformation, Neural computing approaches

More information

A New Algorithm for Shape Detection

A New Algorithm for Shape Detection IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 19, Issue 3, Ver. I (May.-June. 2017), PP 71-76 www.iosrjournals.org A New Algorithm for Shape Detection Hewa

More information

A Survey on Signature Verification Approaches

A Survey on Signature Verification Approaches A Survey on Signature Verification Approaches Shailaja Dilip Pawar CSE, RGPV Bhopal, India Abstract Signature is one of the most popular biometrics used for authentication. There are different techniques

More information

HCR Using K-Means Clustering Algorithm

HCR Using K-Means Clustering Algorithm HCR Using K-Means Clustering Algorithm Meha Mathur 1, Anil Saroliya 2 Amity School of Engineering & Technology Amity University Rajasthan, India Abstract: Hindi is a national language of India, there are

More information

Biometrics- Fingerprint Recognition

Biometrics- Fingerprint Recognition International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 11 (2014), pp. 1097-1102 International Research Publications House http://www. irphouse.com Biometrics- Fingerprint

More information

Adaptive Fingerprint Image Enhancement Techniques and Performance Evaluations

Adaptive Fingerprint Image Enhancement Techniques and Performance Evaluations Adaptive Fingerprint Image Enhancement Techniques and Performance Evaluations Kanpariya Nilam [1], Rahul Joshi [2] [1] PG Student, PIET, WAGHODIYA [2] Assistant Professor, PIET WAGHODIYA ABSTRACT: Image

More information

Face Detection Using Color Based Segmentation and Morphological Processing A Case Study

Face Detection Using Color Based Segmentation and Morphological Processing A Case Study Face Detection Using Color Based Segmentation and Morphological Processing A Case Study Dr. Arti Khaparde*, Sowmya Reddy.Y Swetha Ravipudi *Professor of ECE, Bharath Institute of Science and Technology

More information

Signature Verification Using Neural Network

Signature Verification Using Neural Network Signature Verification Using Neural Network Manoj Kumar Department of Information Technology JSS Academy of Technical education Noida India manojkumar@jssaten.ac.in Abstract In this paper we present new

More information

Restoring Warped Document Image Based on Text Line Correction

Restoring Warped Document Image Based on Text Line Correction Restoring Warped Document Image Based on Text Line Correction * Dep. of Electrical Engineering Tamkang University, New Taipei, Taiwan, R.O.C *Correspondending Author: hsieh@ee.tku.edu.tw Abstract Document

More information

CPSC 695. Geometric Algorithms in Biometrics. Dr. Marina L. Gavrilova

CPSC 695. Geometric Algorithms in Biometrics. Dr. Marina L. Gavrilova CPSC 695 Geometric Algorithms in Biometrics Dr. Marina L. Gavrilova Biometric goals Verify users Identify users Synthesis - recently Biometric identifiers Courtesy of Bromba GmbH Classification of identifiers

More information

Spatial Topology of Equitemporal Points on Signatures for Retrieval

Spatial Topology of Equitemporal Points on Signatures for Retrieval Spatial Topology of Equitemporal Points on Signatures for Retrieval D.S. Guru, H.N. Prakash, and T.N. Vikram Dept of Studies in Computer Science,University of Mysore, Mysore - 570 006, India dsg@compsci.uni-mysore.ac.in,

More information

Palmprint Recognition Using Transform Domain and Spatial Domain Techniques

Palmprint Recognition Using Transform Domain and Spatial Domain Techniques Palmprint Recognition Using Transform Domain and Spatial Domain Techniques Jayshri P. Patil 1, Chhaya Nayak 2 1# P. G. Student, M. Tech. Computer Science and Engineering, 2* HOD, M. Tech. Computer Science

More information

Projected Texture for Hand Geometry based Authentication

Projected Texture for Hand Geometry based Authentication Projected Texture for Hand Geometry based Authentication Avinash Sharma Nishant Shobhit Anoop Namboodiri Center for Visual Information Technology International Institute of Information Technology, Hyderabad,

More information

A New Approach to Detect and Extract Characters from Off-Line Printed Images and Text

A New Approach to Detect and Extract Characters from Off-Line Printed Images and Text Available online at www.sciencedirect.com Procedia Computer Science 17 (2013 ) 434 440 Information Technology and Quantitative Management (ITQM2013) A New Approach to Detect and Extract Characters from

More information

Finger Vein Biometric Approach for Personal Identification Using IRT Feature and Gabor Filter Implementation

Finger Vein Biometric Approach for Personal Identification Using IRT Feature and Gabor Filter Implementation Finger Vein Biometric Approach for Personal Identification Using IRT Feature and Gabor Filter Implementation Sowmya. A (Digital Electronics (MTech), BITM Ballari), Shiva kumar k.s (Associate Professor,

More information

A Technique for Classification of Printed & Handwritten text

A Technique for Classification of Printed & Handwritten text 123 A Technique for Classification of Printed & Handwritten text M.Tech Research Scholar, Computer Engineering Department, Yadavindra College of Engineering, Punjabi University, Guru Kashi Campus, Talwandi

More information

An Improvement Study for Optical Character Recognition by using Inverse SVM in Image Processing Technique

An Improvement Study for Optical Character Recognition by using Inverse SVM in Image Processing Technique An Improvement Study for Optical Character Recognition by using Inverse SVM in Image Processing Technique I Dinesh KumarVerma, II Anjali Khatri I Assistant Professor (ECE) PDM College of Engineering, Bahadurgarh,

More information

A Directional Feature with Energy based Offline Signature Verification Network

A Directional Feature with Energy based Offline Signature Verification Network A Directional Feature with Energy based Offline Signature Verification Network Minal Tomar * and Pratibha Singh Department of Electrical & Electronics * Malwa Institute of Technology Indore (M.P.) 452016

More information

A Novel Approach to the Indian Paper Currency Recognition Using Image Processing

A Novel Approach to the Indian Paper Currency Recognition Using Image Processing A Novel Approach to the Indian Paper Currency Recognition Using Image Processing Lakshmi Narayanan 1, Bhavna Pancholi 2 1 PG Student, Dept of EE, The Faculty of Technology and Engineering Maharaja Sayajirao

More information

Mingle Face Detection using Adaptive Thresholding and Hybrid Median Filter

Mingle Face Detection using Adaptive Thresholding and Hybrid Median Filter Mingle Face Detection using Adaptive Thresholding and Hybrid Median Filter Amandeep Kaur Department of Computer Science and Engg Guru Nanak Dev University Amritsar, India-143005 ABSTRACT Face detection

More information

Structural Feature Extraction to recognize some of the Offline Isolated Handwritten Gujarati Characters using Decision Tree Classifier

Structural Feature Extraction to recognize some of the Offline Isolated Handwritten Gujarati Characters using Decision Tree Classifier Structural Feature Extraction to recognize some of the Offline Isolated Handwritten Gujarati Characters using Decision Tree Classifier Hetal R. Thaker Atmiya Institute of Technology & science, Kalawad

More information

Fingerprint Image Enhancement Algorithm and Performance Evaluation

Fingerprint Image Enhancement Algorithm and Performance Evaluation Fingerprint Image Enhancement Algorithm and Performance Evaluation Naja M I, Rajesh R M Tech Student, College of Engineering, Perumon, Perinad, Kerala, India Project Manager, NEST GROUP, Techno Park, TVM,

More information

Automatic Detection of Change in Address Blocks for Reply Forms Processing

Automatic Detection of Change in Address Blocks for Reply Forms Processing Automatic Detection of Change in Address Blocks for Reply Forms Processing K R Karthick, S Marshall and A J Gray Abstract In this paper, an automatic method to detect the presence of on-line erasures/scribbles/corrections/over-writing

More information

Fingerprint Based Gender Classification Using Block-Based DCT

Fingerprint Based Gender Classification Using Block-Based DCT Fingerprint Based Gender Classification Using Block-Based DCT Akhil Anjikar 1, Suchita Tarare 2, M. M. Goswami 3 Dept. of IT, Rajiv Gandhi College of Engineering & Research, RTM Nagpur University, Nagpur,

More information

RESTORATION OF DEGRADED DOCUMENTS USING IMAGE BINARIZATION TECHNIQUE

RESTORATION OF DEGRADED DOCUMENTS USING IMAGE BINARIZATION TECHNIQUE RESTORATION OF DEGRADED DOCUMENTS USING IMAGE BINARIZATION TECHNIQUE K. Kaviya Selvi 1 and R. S. Sabeenian 2 1 Department of Electronics and Communication Engineering, Communication Systems, Sona College

More information

Using Edge Detection in Machine Vision Gauging Applications

Using Edge Detection in Machine Vision Gauging Applications Application Note 125 Using Edge Detection in Machine Vision Gauging Applications John Hanks Introduction This application note introduces common edge-detection software strategies for applications such

More information

Enhancing the Character Segmentation Accuracy of Bangla OCR using BPNN

Enhancing the Character Segmentation Accuracy of Bangla OCR using BPNN Enhancing the Character Segmentation Accuracy of Bangla OCR using BPNN Shamim Ahmed 1, Mohammod Abul Kashem 2 1 M.S. Student, Department of Computer Science and Engineering, Dhaka University of Engineering

More information

AUTOMATIC LOGO EXTRACTION FROM DOCUMENT IMAGES

AUTOMATIC LOGO EXTRACTION FROM DOCUMENT IMAGES AUTOMATIC LOGO EXTRACTION FROM DOCUMENT IMAGES Umesh D. Dixit 1 and M. S. Shirdhonkar 2 1 Department of Electronics & Communication Engineering, B.L.D.E.A s CET, Bijapur. 2 Department of Computer Science

More information

FRAGMENTATION OF HANDWRITTEN TOUCHING CHARACTERS IN DEVANAGARI SCRIPT

FRAGMENTATION OF HANDWRITTEN TOUCHING CHARACTERS IN DEVANAGARI SCRIPT International Journal of Information Technology, Modeling and Computing (IJITMC) Vol. 2, No. 1, February 2014 FRAGMENTATION OF HANDWRITTEN TOUCHING CHARACTERS IN DEVANAGARI SCRIPT Shuchi Kapoor 1 and Vivek

More information

Segmentation of Isolated and Touching characters in Handwritten Gurumukhi Word using Clustering approach

Segmentation of Isolated and Touching characters in Handwritten Gurumukhi Word using Clustering approach Segmentation of Isolated and Touching characters in Handwritten Gurumukhi Word using Clustering approach Akashdeep Kaur Dr.Shaveta Rani Dr. Paramjeet Singh M.Tech Student (Associate Professor) (Associate

More information

Time Stamp Detection and Recognition in Video Frames

Time Stamp Detection and Recognition in Video Frames Time Stamp Detection and Recognition in Video Frames Nongluk Covavisaruch and Chetsada Saengpanit Department of Computer Engineering, Chulalongkorn University, Bangkok 10330, Thailand E-mail: nongluk.c@chula.ac.th

More information

Implementation of Fingerprint Matching Algorithm

Implementation of Fingerprint Matching Algorithm RESEARCH ARTICLE International Journal of Engineering and Techniques - Volume 2 Issue 2, Mar Apr 2016 Implementation of Fingerprint Matching Algorithm Atul Ganbawle 1, Prof J.A. Shaikh 2 Padmabhooshan

More information

International Journal of Advance Research in Engineering, Science & Technology

International Journal of Advance Research in Engineering, Science & Technology Impact Factor (SJIF): 3.632 International Journal of Advance Research in Engineering, Science & Technology e-issn: 2393-9877, p-issn: 2394-2444 (Special Issue for ITECE 2016) Analysis and Implementation

More information

A Comparative Study of Palm Print Recognition Systems

A Comparative Study of Palm Print Recognition Systems A Comparative Study of Palm Print Recognition Systems Akash Patel akash.patel@somaiya.edu Chinmayi Tidke chinmayi.t@somaiya.edu Chirag Dhamecha Mumbai India chirag.d@somaiya.edu Kavisha Shah kavisha.shah@somaiya.edu

More information

Segmentation Based Optical Character Recognition for Handwritten Marathi characters

Segmentation Based Optical Character Recognition for Handwritten Marathi characters Segmentation Based Optical Character Recognition for Handwritten Marathi characters Madhav Vaidya 1, Yashwant Joshi 2,Milind Bhalerao 3 Department of Information Technology 1 Department of Electronics

More information

Machine vision. Summary # 6: Shape descriptors

Machine vision. Summary # 6: Shape descriptors Machine vision Summary # : Shape descriptors SHAPE DESCRIPTORS Objects in an image are a collection of pixels. In order to describe an object or distinguish between objects, we need to understand the properties

More information

Edge Detection and Template Matching Approaches for Human Ear Detection

Edge Detection and Template Matching Approaches for Human Ear Detection Edge and Template Matching Approaches for Human Ear K. V. Joshi G H Patel College Engineering and Technology vallabh vidyanagar, Gujarat, India N. C. Chauhan A D Patel Institute Technology New vallabh

More information

Handwritten Signature Verification And Recognition Using ANN

Handwritten Signature Verification And Recognition Using ANN Handwritten Signature Verification And Recognition Using ANN Mohan Mandaogade Saurabh Vishal Mhaske ABSTRACT Automatic person identification is one of the major concerns in this era of automation. However,

More information

Fusion of Digital Signature & Fingerprint Watermarking using Bit plane slicing

Fusion of Digital Signature & Fingerprint Watermarking using Bit plane slicing RESEARCH ARTICLE OPEN ACCESS Fusion of Digital Signature & Fingerprint Watermarking using Bit plane slicing Sonali V.Satonkar, Dr.seema Kawathekar Dept. of Computer Science &Information Tehnology Dr.Babasaheb

More information

Approach to Increase Accuracy of Multimodal Biometric System for Feature Level Fusion

Approach to Increase Accuracy of Multimodal Biometric System for Feature Level Fusion Approach to Increase Accuracy of Multimodal Biometric System for Feature Level Fusion Er. Munish Kumar, Er. Prabhjit Singh M-Tech(Scholar) Global Institute of Management and Emerging Technology Assistant

More information

Motion Detection Algorithm

Motion Detection Algorithm Volume 1, No. 12, February 2013 ISSN 2278-1080 The International Journal of Computer Science & Applications (TIJCSA) RESEARCH PAPER Available Online at http://www.journalofcomputerscience.com/ Motion Detection

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: Fingerprint Recognition using Robust Local Features Madhuri and

More information

PERFORMANCE IMPACT OF THE USER ATTEMPTS ON FINGERPRINT RECOGNITION SYSTEM (FRS)

PERFORMANCE IMPACT OF THE USER ATTEMPTS ON FINGERPRINT RECOGNITION SYSTEM (FRS) PERFORMANCE IMPACT OF THE USER ATTEMPTS ON FINGERPRINT RECOGNITION SYSTEM (FRS) 1 DR. NEERAJBHARGAVA, 2 DR. RITUBHARGAVA, 3 MANISH MATHURIA, 4 MINAXI COTIA 1 Associate Professor, Department of Computer

More information

Preprocessing of Gurmukhi Strokes in Online Handwriting Recognition

Preprocessing of Gurmukhi Strokes in Online Handwriting Recognition 2012 3rd International Conference on Information Security and Artificial Intelligence (ISAI 2012) IPCSIT vol. 56 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V56.30 Preprocessing of Gurmukhi

More information

Isolated Handwritten Words Segmentation Techniques in Gurmukhi Script

Isolated Handwritten Words Segmentation Techniques in Gurmukhi Script Isolated Handwritten Words Segmentation Techniques in Gurmukhi Script Galaxy Bansal Dharamveer Sharma ABSTRACT Segmentation of handwritten words is a challenging task primarily because of structural features

More information

Extraction and Recognition of Alphanumeric Characters from Vehicle Number Plate

Extraction and Recognition of Alphanumeric Characters from Vehicle Number Plate Extraction and Recognition of Alphanumeric Characters from Vehicle Number Plate Surekha.R.Gondkar 1, C.S Mala 2, Alina Susan George 3, Beauty Pandey 4, Megha H.V 5 Associate Professor, Department of Telecommunication

More information

Security Evaluation of Online Signature Verification System using Webcams

Security Evaluation of Online Signature Verification System using Webcams Security Evaluation of Online Signature Verification System using Webcams T.Venkatesh Research Scholar, K.L.University, A.P.,India Balaji.S Professor, K.L.University, A.P.,India. Chakravarthy A S N Professor,

More information

Digital Image Forgery Detection Based on GLCM and HOG Features

Digital Image Forgery Detection Based on GLCM and HOG Features Digital Image Forgery Detection Based on GLCM and HOG Features Liya Baby 1, Ann Jose 2 Department of Electronics and Communication, Ilahia College of Engineering and Technology, Muvattupuzha, Ernakulam,

More information

Enhanced Online Signature Verification System

Enhanced Online Signature Verification System Enhanced Online Signature Verification System Joslyn Fernandes 1, Nishad Bhandarkar 2 1 F/8, Malinee Apt., Mahakali Caves Road, Andheri east, Mumbai 400093. 2 303, Meena CHS. LTD., 7 bungalows, Andheri

More information