BORANG PENGESAHAN STATUS TESIS* TERHAD (Mengandungi maklumat TERHAD yang telah ditentukan oleh organisasi/badan di mana penyelidikan dijalankan)

Similar documents
BORANG PENGESAHAN STATUS TESIS

BORANG PENGESAHAN STATUS TESIS

DEVELOPMENT OF VENDING MACHINE WITH PREPAID PAYMENT METHOD AMAR SAFUAN BIN ALYUSI

TUITION CENTRE MANAGEMENT SYSTEM (TCMS) ZARIFAH BINTI MOHD PAHMI UNIVERSITI TEKNIKAL MALAYSIA MELAKA

DESIGN ANALYSIS OF EXTERIOR CAR BODY PART BASTIAN WIBAR BIN MOMANG

UNIVERSITI MALAYSIA PAHANG BORANG PENGESAHAN STATUS TESIS

PREDICTION OF SURFACE ROUGHNESS IN TURNING OPERATION OF LOW CARBON STEEL AISI 1018 FAKHRUR RAZI BIN BAHRIN UNIVERSITI MALAYSIA PAHANG

WEB-BASED DEVICE CONTROL AND COMMUNICATION VIA PARALLEL PORT MOHD RASHDAN BIN ABD RAHMAN UNIVERSITI TEKNIKAL MALAYSIA MELAKA

BORANG PENGESAHAN STATUS TESIS

SYSTEM MANAGEMENT AQIQAH AND QURBAN ONLINE (SMAQO)

HOME APPLIANCE CONTROL SYSTEM TAN WEI SYE

COMPARATIVE STUDY BETWEEN FEATURE EXTRACTION METHODS FOR FACE RECOGNITION

BORANG PENGESAHAN STATUS TESIS*

THE APPLICATION OF DIFFERETIAL BOX-COUNTING METHOD FOR IRIS RECOGNITION AHMAD AZFAR BIN MAHMAMI

REMOVING AL-QURAN ILLUMINATION AMIRUL RAMZANI BIN RADZID UNIVERSITI TEKNIKAL MALAYSIA MELAKA

BORANG PENGESAHAN STATUS TESIS*

VIDEO DISTORTION MEASUREMENT USING PSNR IN WAVELET DOMAIN MOK YUNG LENG

PROTOTYPE OF POWER LINE INTERFACE SOCKET USING EMBEDDED CONTROLLER FOR DATA ACQUISITION AND CONTROL. LAI CHING HUAT

AN ANDROID-BASED SMART SECURITY TOURING SYSTEM FOR REAL-TIME DATA RECORDING USING NFC, GPS AND GSM TECHNOLOGY.

IMPLEMENTATION OF DIAMOND SEARCH (DS) ALGORITHM FOR MOTION ESTIMATION USING MATLAB SITI HAJAR BINTI AHMAD

BORANG PENGESAHAN STATUS TESIS JUDUL: TAILOR SYSTEM (TailorSys) (HURUF BESAR)

ZIGBEE-BASED SMART HOME SYSTEM NURUL ILMI BINTI OMAR

PERFORMANCE EVALUATION OF LEACH PROTOCOL FOR WIRELESS SENSOR NETWORKS USING NS2 MUHAMAD FAIZ BIN RAMDZAN

EDUCATION PATH SYSTEM MOHD ZULHAFIZ BIN HUSSIN

COORDINATION PROTECTION SYSTEM IN INDUSTRIAL PLANTS AHMAD TARMIZI BIN MD NOR

SESSION BASED ACTIVITY MONITORING APPLICATION FOR ANDROID TAN LEIK HO

UPGRADE FMS200: SHAFT SUPPLY MODULE THOUGH HUMAN MACHINE INTERFACE LEE HO CHUNG

HOME APPLIANCES MONITORING AND CONTROL USING SMARTPHONE APPLICATION AHMAD DANIAL BIN AHMAD NAZRI

PERFORMANCE ANALYSIS OF VIDEO TRANSMISSION OVER IEEE ARCHITECTURE NOOR HURUL-AIN BINTI MOHAMAD

SMART PARKING SYSTEM USING LABVIEW MUHAMMAD NAZIR BIN MAT ISA

Performance of Real Time Traffic In The Ethernet And WLAN Using TCP And UDP Protocols. Punitha Subbramaniam

UNIVERSITI TEKNIKAL MALAYSIA MELAKA

DEVELOPMENT OF HOME ENERGY MANAGEMENT SYSTEM (HEMS) CHEA MENG HUAT UNIVERSITI TEKNIKAL MALAYSIA MELAKA

NUR FARAH DIYANA BINTI SABARUDIN

7 I I, BORANG PENGESAHAN STATUS TESIS* SESI PENGAnAN: 2012 I Saya MOHD FARID BIN MOHD YUSOF (B )

Study of Distributed Coordination Function (DCF) and Enhanced DCF (EDCF) in IEEE MAC Protocols for Multimedia Applications.

UNIVERSITI TEKNIKAL MALAYSIA MELAKA

SMART BODY MONITORING SYSTEM MOHAMAD KASYFUL AZIM BIN AHMAD

AUTO SILENT MODE FOR ANDROID SMARTPHONES MUHAMMAD AZLAN SHAHARIMAN BIN AHMAD

LOW COST MP3 PLAYER USING SD CARD KHAIRIL AMRI BIN MUHAMAD UNIVERSITI TEKNIKAL MALAYSIA MELAKA

KARAOKE MACHINE TOOL MOHD AIEZATT DANIAL B RAMIZAN

FORCE ANALYSIS ON ROBOTIC DEBURRING PROCESS

THE DEVELOPMENT OF MODULAR PRODUCT DESIGN: FOLDABLE CHAIR

UNIVERSITI TEKNIKAL MALAYSIA MELAKA

UNIVERSITI TEKNIKAL MALAYSIA MELAKA

2D CUT-OUT ANIMATION "MAT TUNANGKU"

HOME APPLIANCES AND SECURITY CONTROLLED VIA GSM SYSTEM NUR SYAFIQAH BINTI YUSOP

UNIVERSITI TEKNIKAL MALAYSIA MELAKA OPTIMIZATION OF MEASUREMENT PARAMETERS IN NON- CONTACT MEASURING SYSTEM

NUR ZURAIN BT ZUBAIDI B

DEVELOPMENT OF TIMETABLING PROGRAM FONG WOON KEAT

UNIVERSITI TEKNOLOGI MALAYSIA

PLC APPLICATION FOR FLOOD DETECTION AND PROTECTION VIA COMMUNICATION SYSTEM MOHD AKMAL BIN ZAINAL ABIDIN

PROJECT TITLE JARIPAH BINTI ADZHAR

UNIVERSITI TEKNIKAL MALAYSIA MELAKA

DESIGN OF ENERGY SAVING AIR CONDITIONING CONTROL SYSTEM MOHD KHUZAIRIE BIN MOHD TAUFIK

SIT1 NURI-IAZA BINTI MOHD RAMLI

UNIVERSITI TEKNIKAL MALAYSIA MELAKA

UNIVERSITI TEKNIKAL MALAYSIA MELAKA

PERPUSTAKAAN UTHM *

FINITE ELEMENT ANALYSIS OF SEEPAGE FLOW UNDER A SHEET PILE LOH LING PING

INFORMATION TECHNOLOGY EQUIPMENT MANAGEMENT SYSTEM (ITEMS) MOHD NOR IRMAN BIN SULAIh4AN UNIVERSITI TEKNCKAL MALAYSIA MELAKA

KOLEJ UNIVERSITI TEKNOLOGI TUN HUSSEIN ONN

BORANG PANGESAHAII STATUS TESIS

UNIVERSITI TEKNIKAL MALAYSIA MELAKA

DEVELOPMENT OF MOBILE ROBOT CONTROLLER BASED ON BLUETOOTH COMMUNICATION SYSTEM MUHAMAD ROZAIMI BIN MUHAMAD SABRI B

BORANG PENGESAHAN STATUS TESIS ν

This item is protected by original copyright

ELECTROMAGNETIC MODELLING OF ARTIFICIAL PACEMAKER. Emelia Anak Gunggu

PERFORMANCE ANALYSIS OF SMARTPHONE BASED REAL-TIME DRIVER ASSIST SYSTEM OVER IEEE WIRELESS NETWORKS WONG CHEE YIN

HOME MAILBOX NOTIFICATION MOHD HAZWAN BIN MOHAMED HARITH

90(111H7. AND 1800i1H7. MOBILE PHONE SI1Il'LATION WITH HVNIAN HEAD ANI) HAND 11ODEl.

HARDWARE/SOFTWARE SYSTEM-ON-CHIP CO-VERIFICATION PLATFORM BASED ON LOGIC-BASED ENVIRONMENT FOR APPLICATION PROGRAMMING INTERFACING TEO HONG YAP

AUTOMATIC RAILWAY GATE CONTROLLERUSING ZIGBEE NURLIYANA HAZIRAH BINTI MOHD SAFEE (B )

FINGERPRINT DATABASE NUR AMIRA BINTI ARIFFIN THESIS SUBMITTED IN FULFILMENT OF THE DEGREE OF COMPUTER SCIENCE (COMPUTER SYSTEM AND NETWORKING)

MD RIDZUAN BIN TALIB DESIGN A MULTI-FUNCTION DIGITAL THERMOMETER

INTEGRATION OF CUBIC MOTION AND VEHICLE DYNAMIC FOR YAW TRAJECTORY MOHD FIRDAUS BIN MAT GHANI

UNIVERSITI TEKNIKAL MALAYSIA MELAKA

BORANG PENGESAHAN STATUS TESIS JUDUL : ADVANCE SMARTPHONE CLASSROOM ANDROID APPLICATION SYSTEM

SUPERVISED MACHINE LEARNING APPROACH FOR DETECTION OF MALICIOUS EXECUTABLES YAHYE ABUKAR AHMED

GARIS PANDUAN PERMOHONAN IMBUHAN PENERBITAN JURNAL / PROSIDING / SITASI BERINDEKS SCOPUS

BORANG PENCALONAN HADIAH UNIVERSITI NOMINATION FORM FOR UNIVERSITY AWARD

LOGICAL OPERATORS AND ITS APPLICATION IN DETERMINING VULNERABLE WEBSITES CAUSED BY SQL INJECTION AMONG UTM FACULTY WEBSITES NURUL FARIHA BINTI MOKHTER

PERPUSTAKAAN KUi TTHO 3 OOOO

BORANG PENGESAHAN STATUS TESIS* ( I-I URUF BESAR) membuat salinan tesis ini sebagai bahan pcrtukaran antara institusi pengajian tinggi.

PERPUSTAKAAN UTHM 'I "-: -, * '

ENHANCING TIME-STAMPING TECHNIQUE BY IMPLEMENTING MEDIA ACCESS CONTROL ADDRESS PACU PUTRA SUARLI

OPTIMIZE PERCEPTUALITY OF DIGITAL IMAGE FROM ENCRYPTION BASED ON QUADTREE HUSSEIN A. HUSSEIN

SECURE-SPIN WITH HASHING TO SUPPORT MOBILITY AND SECURITY IN WIRELESS SENSOR NETWORK MOHAMMAD HOSSEIN AMRI UNIVERSITI TEKNOLOGI MALAYSIA

PROCESS AND YIELD IMPROVEMENT FOR HSDPA MODEM COLLABORATION WITH CUBIC ELECTRONICS SDN BHD NORUL HUSNA BINTI KHOLIAH

INTELLIGENT FINGERPRINT RECOGNITION SYSTEM SY MOHD SYATHIR BIN SY ALI ZAINOL ABIDIN UNIVERSITI MALAYSIA PAHANG

PANDUAN PENGGUNA (PENTADBIR SYSTEM/SYSTEM ADMINISTRATOR) (INFOTECH, BPPF DAN POLIS

ENHANCING SRAM PERFORMANCE OF COMMON GATE FINFET BY USING CONTROLLABLE INDEPENDENT DOUBLE GATES CHONG CHUNG KEONG UNIVERSITI TEKNOLOGI MALAYSIA

IMPLEMENTATION OF UNMANNED AERIAL VEHICLE MOVING OBJECT DETECTION ALGORITHM ON INTEL ATOM EMBEDDED SYSTEM

A TRUST MODEL FOR BUSINESS TO CUSTOMER CLOUD E-COMMERCE HOSSEIN POURTAHERI

ISOGEOMETRIC ANALYSIS OF PLANE STRESS STRUCTURE CHUM ZHI XIAN

COMBINING TABLES. Akademi Audit Negara. CAATs ASAS ACL / 1

IMPROVED IMAGE COMPRESSION SCHEME USING HYBRID OF DISCRETE FOURIER, WAVELETS AND COSINE TRANSFORMATION MOH DALI MOUSTAFA ALSAYYH

IIIIIIIIIIIIIIII~~I]I~I~IIII UT Cfr~1~vl * *

SISTEM KA W ALAN AUTOMATIK MENGGUNAKAN PENGGESAN UL TRASONIK AZRINA BINTI MASTOR

ENHANCEMENT OF UML-BASED WEB ENGINEERING FOR METAMODELS: HOMEPAGE DEVELOPMENT CASESTUDY KARZAN WAKIL SAID

Transcription:

BORANG PENGESAHAN STATUS TESIS* JUDUL: ONLINE BASED SIGNATURE VERIFICATION TOOLS SESI PENGAJIAN: _2012 / 2013 Saya TANG HAN YANG. (HURUF BESAR) mengaku membenarkan tesis Projek Sarjana Muda ini disimpan di Perpustakaan Fakulti Teknologi Maklumat dan Komunikasi dengan syarat-syarat kegunaan seperti berikut: Tesis dan projek adalah hakmilik Universiti Teknikal Malaysia Melaka. Perpustakaan Fakulti Teknologi Maklumat dan Komunikasi dibenarkan membuat salinan untuk tujuan pengajian sahaja. Perpustakaan Fakulti Teknologi Maklumat dan Komunikasi dibenarkan membuat salinan tesis ini sebagai bahan pertukaran antara institusi pengajian tinggi. **Sila tandakan(/) SULIT (Mengandungi maklumat yang berdarjah keselamatan atau kepentingan Malaysia seperti yang termaktub di dalam AKTA RAHSIA RASMI 1972) TERHAD (Mengandungi maklumat TERHAD yang telah ditentukan oleh organisasi/badan di mana penyelidikan dijalankan) / TIDAK TERHAD (TANDATANGAN PENULIS) Alamat tetap: 147, JLN SRI PELANGI TMN BKT PILAH PERDANA (TANDATANGAN PENYELIA) _DR AZAH KAMILAH MUDA. Nama Penyelia 72000 K.PILAH, N.SEMBILAN Tarikh: Tarikh: CATATAN: * Tesis dimaksudkan sebagai Laporan Akhir Projek Sarjana Muda (PSM) ** Jika tesis ini SULIT atau TERHAD, sila lampirkan surat daripada pihak berkuasa.

ONLINE BASED SIGNATURE VERIFICATION TOOLS TANG HAN YANG This report is submitted in partial fulfillment of the requirements for the Bachelor of Computer Science (Software Development) FACULTY OF INFORMATION AND COMMUNICATION TECHNOLOGY UNIVERSITI TEKNIKAL MALAYSIA MELAKA 2013

ii DECLARATION I hereby declare that this project report entitled ONLINE BASED SIGNATURE VERIFICATION TOOL is written by me and is my own effort and that no part has been plagiarized without citation. STUDENT : Date: (TANG HAN YANG) SUPERVISOR : (DR AZAH KAMILAH MUDA) Date:

iii DEDICATION This report is dedicated to my parents, Mr. Tang Hong Kiat and Mrs. Cheong Chau Lin, for their fully support. To my supervisor, DR AZAH KAMILAH MUDA and all my friends, for making it all worthwhile and have provided encouragement and guidance all the way during the completion of the report.

iv ACKNOWLEDGEMENTS Firstly, I would like to give a special thanks to my Project supervisors, Dr Azah Kamilah Muda for giving assistance, guidance and encouragement to complete this project. All this valuable guidance and constructive evaluations have been of great value for me in all the time of research and writing of this report. Besides that, I would like to have my thanks to my friends that have accessed to the system and giving some valuable and sincere comments. Finally, I would like thanks to my parents who have given full support to me during my study at University Teknikal Malaysia Melaka, (UTeM).

v ABSTRACT Signature verification is a regular task in forensic document examination which is one of the methods that can help decisive whether a questioned signature matches known signature samples. In business, there is always fraudulent and deceptive activity that leads to financial loss. Hence, Online Based Signature Verification Tool will timely and accurately help recognize the original owner of the handwriting or signature and prevent fraud. One of the advantages of this tool is Online Based Signature Verification Tool consists of clients and server that have different role and handle different task. Server side will responsible with all client requests to register new signature owner and verify the signature, while client side will responsible to receives the input and show the result of process from server to the user. This kind of system architecture will make sure the Signature Verification tools more maintainable and secure. This tool consist 5 main modules which are Register new signature owner (Browse Document), Register new signature owner (Handwriting), Verify Signature Owner (Browse Document), Verify Signature Owner (Handwriting) and Search Server Activity Log. The programming language used to develop the tools is Java.

vi ABSTRAK Pengesahan tandatangan merupakan tugas dalam pemeriksaan dokumen forensic yang boleh membantu membuat keputusan sama ada satu tandatangan yang dipersoalkan adalah sama dengan sampel tandatangan yang disimpan. Dalam perniagaan mempunyai banyak aktiviti penipuan yang mengakibatkan kerugian kewangan. Oleh itu, Online Based Signature Verification Tool akan mengelakkan penipuan dengan membantu mengiktiraf pemilik asal tulisan tangan atau tandatangan dengan tepat. Salah satu kelebihan alat ini adalah ia mempunyai Client dan Server yang mempunyai peranan yang berlainan dan mengendalikan tugas yang berbeza. Server akan bertanggungjawab mengendalikan semua permintaan dari Client seperti mendaftar pemilik tandatangan baru dan membuat pengesahan kepada tandatangan, manakala Client pula bertanggungjawab untuk menerima input daripada pengguna dan menunjukkan keputusan proses yang hantar dari Server kepada pangguna. Seni bina system ini memastikan Online Based Signature Verification Tool lebih kekal dan selamat. Alat ini mempunyai 5 modul iaitu mendaftar pemilik tandatangan baru (melayari dokumen), mendaftar pemilik tandatangan baru (tulisan tangan), mengiktiraf tandatangan (melayari dokumen), mengiktiraf dokumen(tulisan tangan) serta carian Server aktiviti log. Bahasa pengatucaraan yang digunakan untuk membangunkan alat ini adalah JAVA.

vii TABLE OF CONTENTS CHAPTER SUBJECT BORANG PENGESAHAN STATUS TESIS DECLARATION DEDICATION ACKNOWLEDGEMENTS ABSTRACT ABSTRAK TABLE OF CONTENT LIST OF TABLES LIST OF FIGURES LIST OF APPENDICES PAGE ii iii iv v vi vii xi xii xiv CHAPTER I INTRODUCTION 1.1 Project Background 1.2 Problem Statements 1.3 Objective 1.4 Scope 1.4.1 User 1.4.2 Modules 1.5 Project Significance 1.6 Expected Output 1.7 Conclusion 1 2 3 3 3 3 4 4 5

viii CHAPTER II LITERATURE REVIEW AND PROJECT METHODOLOGY 2.1 Introduction 2.2 Facts and findings 2.2.1 Handwriting Analysis 2.2.2 Remote Method Invocation 2.3 Project Methodology 2.4 Project requirements 2.4.1 Software Requirement 2.4.2 Hardware Requirement 2.5 Project Schedule and Milestones 2.6 Conclusion 6 6 7 8 9 12 12 13 13 15 CHAPTER III ANALYSIS 3.1 Introduction 3.2 Problem analysis 3.3 Requirement analysis 3.3.1 Functional Requirements 3.3.2 Non-Functional Requirement 3.4 Conclusion 16 16 17 17 20 21 CHAPTER IV DESIGN 4.1 Introduction 4.2 High-Level Design 4.2.1 System Architecture 4.2.2 Class Diagram 4.2.3 Database Design 4.2.3.1 ERD 4.2.3.2 Business Rules 4.2.3.3 Database Dictionary 4.2.4 User Interface Design 4.2.5 Input Design 4.2.6 Output Design 22 22 23 28 30 30 30 30 32 36 37

ix 4.2.7 Activity Diagram 4.3 Conclusion 38 43 CHAPTER V IMPLEMENTATION 5.1 Introduction 5.2 Software Development Environment Setup 5.3 Software Configuration Management 5.4 Implementation Status 5.5 Conclusion 44 45 46 46 48 CHAPTER VI TESTING 6.1 Introduction 6.2 Test Plan 6.2.1 Test Organization 6.2.2 Test Environment 6.2.3 Test Schedule 6.3 Test Strategy 6.3.1 Classes of Test 6.4 Test Design 6.4.1 Test Description and Test Data 6.5 Test Result and Analysis 6.5.1 Unit Test Test Result 6.5.2 System Integration Test Test Result 6.6 Conclusion 49 50 50 50 51 52 53 53 53 54 54 55 55 CHAPTER VII CONCLUSION 7.1 Observation for Weakness and Strengths 7.2 Propositions for Improvement 7.3 Contribution 7.4 Conclusion 56 57 57 57

x BIBLIOGRAPHY APPENDICES 58 59

xi LIST OF TABLES TABLE TITLE PAGE 2.1 Software Requirement 12 2.2 Hardware Requirement 13 2.4 3.1 3.2 4.1 4.2 4.3 4.4 4.5 4.6 5.1 6.1 Project Schedule Functional Requirement Non-Functional Requirement Advantages and Disadvantages of RMI Database Dictionary of User Table Database Dictionary of Signature Table Database Dictionary of serverlog Table Input design Table Output design Table Implementation Status Table Test Schedule Table 14 18 20 25 30 31 31 36 37 47 51

xii LIST OF FIGURES FIGURE TITLE PAGE 2.1 Handwritten Analysis Domain 7 2.2 Oriented Methodology Model 10 3.1 Use Case Diagrams for Signature Verification 19 Tools (User) 3.2 4.1 4.2 4.3 4.4 4.5 4.6 4.7 4.8 4.9 4.10 4.11 4.12 4.13 4.14 4.15 4.16 Use Case Diagram for Signature Verification Tools (Admin) 3-Tier Client Server Architecture Web Based Signature Verification Tools Architecture Application Server Class Diagram Client Application Class Diagram ERD for Signature Verification Tools Registration page for new Signature Owner (Browse Document) Registration page for new Signature Owner (Handwriting) Signature Verification Page (Browse document) Signature Verification Page (Handwriting) Signature Verification Result Server Main Page of Signature Verification Tools Search Server Activity Log Register new signature owner (Browse Document) Module Activity Diagram Register new signature owner (Handwriting) Module Activity Diagram Verify Signature Owner (Browse Document) Module Activity Diagram Verify Signature Owner (Handwriting) Module 19 23 27 28 29 30 32 33 33 34 34 35 35 38 39 40 41

xiii 4.17 5.1 Activity Diagram Search Server Activity Log Module Activity Diagram Software Development Environment 42 45

xiv LIST OF APPENDICES APPENDIX TITLE PAGE Appendix A Test Script 59 Appendix A1 UT01 - Register new signature owner (Browse 60 Document) Test Module Appendix A2 UT02 - Register new signature owner 61 (Handwriting) Test Module Appendix A3 UT03 - Verify Signature Owner (Browse Document) Test Module 62 Appendix A4 UT04 - Verify Signature Owner (Handwriting) Test Module 63 Appendix A5 UT05 - Search Server Activity Log Test Module Application Server Class Diagram 64 Appendix A6 SIT01 - System Integration Testing Test Module 65 Appendix B Appendix B1 Appendix B2 Appendix B3 Appendix B4 Appendix B5 Appendix B6 Test Case Result UT01 - Register new signature owner (Browse Document) Test Module Result UT02 - Register new signature owner (Handwriting) Test Module Result (Handwriting) UT03 - Verify Signature Owner (Browse Document) Test Module Result UT04 - Verify Signature Owner (Handwriting) Test Module Result UT05 - Search Server Activity Log Test Module Result SIT01 - System Integration Testing Test Module Result 66 67 68 69 70 72 73

xv Appendix C User Manual How to Register new Signature Owner through browse document How to Register new Signature Owner through handwriting How to Verify Signature Owner through browsing file How to Verify Signature Owner through handwriting How to Start the Server How to Stop the Server How to Navigate to Searching Server History Log Page How to Search Server History Log 74 75 76 77 78 79 79 79 80

1 CHAPTER I INTRODUCTION 1.1 Project Background Signature verification is a regular task in forensic document examination which is one of the methods that can help decisive whether a questioned signature matches known signature samples. As a pattern recognition application, the performance of signature verification tool is basically depends on the extraction (extracted features from various style of signature) and classification (determination of which group or classes the extracted features are belonging to). In business, there is always fraudulent and deceptive activity that leads to financial loss; customer loyalty and faithfulness can also be affected when unfavourable news hits the streets. Hence to offset potential negative outcomes of any kind and discover more forgeries before losses occur, there are needs for existence of an Online Based Signature Verification Tool that can timely and accurately help recognize the original owner of the handwriting or signature. Online Based Signature Verification Tool consists of clients and server that have different role and handle different task. Server side will responsible with all client requests to register new signature owner and verify the signature, while client side will responsible to receives the input and show the result of process from server to the user. Beside this, the information of database can only access by server side. This kind of system architecture will make sure the Online Based Signature Verification Tool more maintainable and secure.

2 1.2 Problem Statement In today business, the impersonating fraud activity that imitate other people signature on the business documents always happen. This kind of fraudulent and deceptive activity leads to financial loss and losing of customer loyalty to the business. For example, the imitation of signature on bank cheque to withdraw money from bank account will bring lose of money and the faithfulness of customer to the bank. Hence it is important to introduce a signature verification tool that can help verify the signature and prevent fraud activity. The current manual signature verification is very time consuming and troublesome. The process to figure out the uniqueness of individual features in the signature is time consuming because the process requires the analyst to observe, compare and evaluate the feature of both questioned and original signature to find out the similar unique features between them. Hence there will be lack of time efficiency when staffs need to verify many signatures on business document or cheques manually without using the help of signature verification tool. To carry out the signature verification process, the individual features for each signature and similar features between original signature and questioned signature must being identified. By using a verification system, it makes uniqueness of individual signature can be more easy to be identified and comparison can be make efficiently. Beside this, due to expansion of business, the branch of the business is located at different location. Hence, there is a problem to connect the signature verification tool to the main signature database as database cannot locate in all the branches because of security issues. Hence, an Online Based Signature Verification Tool can ensure that the sub branches of the business can connect to the main signature database through internet to get the information for the signature verification process.

3 1.3 Objective This project embarks on the following objectives: i. To reduce fraud and increase confidence of customer to the business ii. To increases efficiency of business process by helps staff make faster decision in signature verification on paper document. iii. To prevent any loss because of bad signature features identify in Signature verification process. iv. To ensure connection of database with all the business branches with promising the safe and secure of the Online Based Signature Verification Tool. 1.4 Scope 1.4.1 User Online Based Signature Verification Tool targets users from any business or government agency which needed signature verification to make sure the validity and identity of signature owner when carry out transaction process. 1.4.2 Modules Module I: Register Signature Owner Module This module allow the registration of signature owner by inserting the name, identification card number of owner, and browsing the paper document consist of the signature or sign on the space provided. Module II: Signature Verification Module This module allow the browsing of paper document consist of signature or sign on the space provided, then the Signature Verification Tool will verify it by extracting individual feature of the questioned signature and compare with handwriting features of original signature exists in the database. The signature owner wills being show out if it is exists in the database.

4 1.5 Project Significance As the project objective is to increase efficiency and reduce fraud in the business process, there were several project significance to be as a result and purposes from developing the application: i. Time saving and accelerate business processes provides faster paper document delivery, approval, in bank cheque processing and document management To increases efficiency of business process by helping staff make faster decision in signature verification on paper document. ii. Database storage provide a digital storage for all signatures and their signature owner information that provide references for future signature verification process. iii. Reduce operational risks Providing a reliable and trustworthy tool to ensure integrity and authenticity of transaction or business documents. iv. Preventing the exposure of business transaction to human errors Reduce the number of financial loss because of human errors when verifying signatures on the business documents. 1.6 Expected Output At the end of this project, the expected output and result would be: i. Specific or Potential Applications - A tool (prototype) for Signature Verification.

5 1.7 Conclusion In this chapter, a brief introduction on the Signature Verification has been discussed. The disadvantages of manual signature verification is being listed in the problem statement and the objective have also been identified in this chapter in order to give a clear view on why Online Based Signature Verification Tool has been proposed. Moreover, the discussion on the scope of the project pointed out the target user of this project and state the modules exists in the project. With these, hopefully, by developing the proposed Online Based Signature Verification Tool, the objective and aim of the project can be achieved.

6 CHAPTER II LITERATURE REVIEW AND PROJECT METHODOLOGY 2.1 Introduction Beginning of this chapter will discuss the literature review. The aim is to broaden the understanding of the details of the uncovered areas in literature which the study attempts to make a useful contribution. The second part of this chapter will introduce an appropriate methodology, models and techniques that fit the system that will be developed to fulfill user requirements. In order to develop the prototype of Online Based Signature Verification Tool, the OOM (Object Oriented Methodology) has been chosen. The third part of this chapter is discussed about the requirement of hardware and software to develop this project. 2.2 Facts and findings Fact and finding is a topic about the discovery or determination of fact or accurate information. After analyze the data gathered and processed, it can be applied to the system so that the strengths are retained and the weaknesses are eliminated.

7 2.2.1 Handwriting Analysis Handwriting is personality and individual because the relation of characters, styles and shapes of writing are dissimilar from one to another. This has caused handwriting to be one of the biometric identifications based on the behavioral characteristics of handwriting analysis in pattern recognition. Biometric is the science of identify or verify the identity of a person based on physiological or behavioral characteristics. Behavioral characteristics are action carry out by a person in typical way including signature (Rohlik, 2003). Handwriting analysis consists 2 categories, which are hand written recognition and handwritten identification. Handwritten recognition is a mission of recognize the exact word or character written by a person and interpreting the conveyed meaning. While handwritten identification will ignore the meaning of the written word or character when differentiates writers based on style or shape of writing, It will recognize the original writer of that handwriting. There are 2 tasks involved in the process of identifying handwritten authorship, which are identification and verification. The identification task will decide the writer of sample handwritings from many writers. On the other way, the verification task will decide whether one question handwritings and suspect handwritings are written by the same writer. Handwritten analysis Handwritten Identification Handwritten Recognition Identification Verification Figure 2.1: Handwritten Analysis Domain

8 2.2.2 RMI (Remote Method Invocation) Java Remote Method Invocation (RMI) is a JAVA Application Programming Interface (API) that allow programmer performs object oriented version of Remote Procedure Call (RPC) which support direct transferring of serialized JAVA object between different computers and interact with each other using distributed network.. RMI has the capability to pass one or more objects along with the request. These objects can be new Java objects, or simple Java wrappers around existing API. RMI provides a direct and simple model for distributed computation with Java objects The object can include information that will change the service that is performed in the remote computer. For example, when user at remote computer fills a register signature owner form, the Java program interact with the user could communicate and exchange information by using RMI, with a Java program located in another computer that always had the latest information about the signature owner. In the return, that program would send back an object and related method and information that would enable the remote computer program to notify the status of the registration process. In this way, user and company both would save time by catching mistakes early. Whenever the company policy changed, it would require a change to a program in only one computer. RMI is implemented three layers: A stub program which locate in the client side of the client server relationship, and corresponding skeleton at the end of the server. The stub appears as program which being call by calling program for a service. A Transport Connection Layer, which manages request and sets up request. A Remote Reference Layer that acts differently based on the parameters passed by the calling program. For example, this layer can decide calls a single remote service or multiple remote programs based on request.