Off-line signature verification and forgery detection using fuzzy modeling
Automatic signature verification is a well-established and an active area of research with numerous applications such as bank check verification, ATM access, etc. This paper proposes a novel approach to the problem of automatic off-line signature verification and forgery detection. The proposed appr...
| Main Authors: | Hanmandlu, , M, Yusof, , MHM, Madasu,, VK |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
2005
|
| Subjects: | |
| Online Access: | http://shdl.mmu.edu.my/2254/ http://shdl.mmu.edu.my/2254/1/1558.pdf |
Similar Items
Off-line signature verification and forgery detection system based on fuzzy modeling
by: Krishna Madasu, Vamsi, et al.
Published: (2003)
by: Krishna Madasu, Vamsi, et al.
Published: (2003)
Forgery Detection in Dynamic Signature Verification by Entailing Principal Component Analysis
by: Sayeed, Shohel, et al.
Published: (2007)
by: Sayeed, Shohel, et al.
Published: (2007)
Fuzzy modeling based recognition of multi-font numerals
by: Hanmandlu, Madasu, et al.
Published: (2003)
by: Hanmandlu, Madasu, et al.
Published: (2003)
Offline Signature Verification through Biometric Strengthening
by: Ooi, Shih-Yin, et al.
Published: (2007)
by: Ooi, Shih-Yin, et al.
Published: (2007)
Glove-Based Approach to Online Signature Verification
by: Kamel, N.S., et al.
Published: (2008)
by: Kamel, N.S., et al.
Published: (2008)
Unconstrained handwritten character recognition based on fuzzy logic
by: Hanmandlu, M
Published: (2003)
by: Hanmandlu, M
Published: (2003)
Dynamic Handwritten Signature Verification Based on Statistical Quantization Mechanism
by: Ong, Thian Song, et al.
Published: (2009)
by: Ong, Thian Song, et al.
Published: (2009)
SVD-BASED SIGNATURE VERIFICATION TECHNIQUE USING DATA GLOVE
by: KAMEL, NIDAL S., et al.
Published: (2008)
by: KAMEL, NIDAL S., et al.
Published: (2008)
Virtual Reality Based Dynamic Signature Verification Using Data glove
by: Sayeed, Shohel, et al.
Published: (2007)
by: Sayeed, Shohel, et al.
Published: (2007)
Enhancement of Glove-Based Approach to Dynamic Signature Verification by Reducing Number of Sensors
by: Shohel, Sayeed, et al.
Published: (2008)
by: Shohel, Sayeed, et al.
Published: (2008)
Fuzzy-based parameterized Gaussian edge detector using global and local properties
by: See, J., et al.
Published: (2005)
by: See, J., et al.
Published: (2005)
An efficient certificateless signature scheme
by: Yap, Wun She, et al.
Published: (2006)
by: Yap, Wun She, et al.
Published: (2006)
3-Move undeniable signature scheme
by: Kurosawa, Kaoru, et al.
Published: (2005)
by: Kurosawa, Kaoru, et al.
Published: (2005)
Signature Verification And Forgery Detection Including Recognition Of Courtesy Amount In Cheques
by: Mohd Yusof, Mohd Hafizuddin
Published: (2005)
by: Mohd Yusof, Mohd Hafizuddin
Published: (2005)
Variable order verification use of logic representation
by: Prasad, , PWC, et al.
Published: (2003)
by: Prasad, , PWC, et al.
Published: (2003)
Generalized Scheme For Fractal Based Digital Signature (GFDS).
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
Fuzzy C mean clustering in off-line handwriting signature verfication system
by: Lee, Beng Yong
Published: (2006)
by: Lee, Beng Yong
Published: (2006)
Personalization of interactive news through J2EE, XML, XSLT, and SMIL in a Web-based multimedia content management system
by: Cheong,, S, et al.
Published: (2002)
by: Cheong,, S, et al.
Published: (2002)
Personalization of interactive news through J2EE, XML, XSLT, and SMIL in a Web-based multimedia content management system
by: Cheong,, S, et al.
Published: (2002)
by: Cheong,, S, et al.
Published: (2002)
Generation of replaceable cryptographic keys from dynamic handwritten signatures
by: Yip, , WK, et al.
Published: (2006)
by: Yip, , WK, et al.
Published: (2006)
High security Iris verification system based on random secret integration
by: SIEWCHIN, C, et al.
Published: (2006)
by: SIEWCHIN, C, et al.
Published: (2006)
Off-line keyword guessing attacks on recent Public Key Encryption with Keyword Search Schemes
by: Wei-Chuen, Yau, et al.
Published: (2008)
by: Wei-Chuen, Yau, et al.
Published: (2008)
Security mediated certificateless signatures
by: Yap, Nvun-She, et al.
Published: (2007)
by: Yap, Nvun-She, et al.
Published: (2007)
Cryptographic keys from dynamic hand-signatures with biometric secrecy preservation and replaceability
by: Kuan, , YW, et al.
Published: (2005)
by: Kuan, , YW, et al.
Published: (2005)
A New Digital Signature Scheme Based on Mandelbrot and Julia Fractal Sets.
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
A face and speech biometric verification system using a simple Bayesian structure
by: Teoh, , ABJ, et al.
Published: (2005)
by: Teoh, , ABJ, et al.
Published: (2005)
An efficient fingerprint verification system using integrated wavelet and Fourier–Mellin invariant transform
by: Jin, A
Published: (2004)
by: Jin, A
Published: (2004)
Nearest neighbourhood classifiers in a bimodal biometric verification system fusion decision scheme
by: Teoh,, A, et al.
Published: (2004)
by: Teoh,, A, et al.
Published: (2004)
Theoretic evidence k-nearest neighbourhood classifiers in a bimodal biometric verification system
by: Jin, , ATB, et al.
Published: (2003)
by: Jin, , ATB, et al.
Published: (2003)
Self-Verification Of Public-Key
Agreement Over Voip Using Random
Fusion Scheme
by: Alfin Syafalni, Alfin Syafalni
Published: (2016)
by: Alfin Syafalni, Alfin Syafalni
Published: (2016)
Probabilistic random projections and speaker verification
by: Ying, Chong Lee, et al.
Published: (2007)
by: Ying, Chong Lee, et al.
Published: (2007)
Linkability of some blind signature schemes
by: Heng, Swee-Huay, et al.
Published: (2007)
by: Heng, Swee-Huay, et al.
Published: (2007)
Partial Verification Bias Correction In Diagnostic Accuracy Studies Using Propensity Score-Based Methods
by: Wan Mansor, Wan Nor Arifin
Published: (2023)
by: Wan Mansor, Wan Nor Arifin
Published: (2023)
Using Fuzzy Cognitive Maps to Reduce False Alerts in SOM based Intrusion Detection Sensors
by: Jazzar, Mahmoud, et al.
by: Jazzar, Mahmoud, et al.
Loss-tolerant stream authentication via configurable integration of one-time signatures and hash-graphs
by: Goh,, A, et al.
Published: (2003)
by: Goh,, A, et al.
Published: (2003)
Passive operating system fingerprinting based on multi-layered sub-signature matching scheme (MLSMS).
by: Aljammal, Ashraf Hamdan Rashid
Published: (2011)
by: Aljammal, Ashraf Hamdan Rashid
Published: (2011)
Speaker verification using probabilistic 2D CLAFIC
by: Ying, Chong Lee, et al.
Published: (2007)
by: Ying, Chong Lee, et al.
Published: (2007)
An appraisal of off-line signature verification techniques
by: Shah, Abdul Salam, et al.
Published: (2015)
by: Shah, Abdul Salam, et al.
Published: (2015)
Two Novel E-Visas Verification Schemes Based On
Public Key Infrastructure (Pki) And Identity Based
Encryption (Ibe).
by: Abuadhmah, Najlaa Abdullah
Published: (2010)
by: Abuadhmah, Najlaa Abdullah
Published: (2010)
Cryptanalysis of some proxy signature schemes without certificates
by: Yap, Wun-She, et al.
Published: (2007)
by: Yap, Wun-She, et al.
Published: (2007)
Similar Items
-
Off-line signature verification and forgery detection system based on fuzzy modeling
by: Krishna Madasu, Vamsi, et al.
Published: (2003) -
Forgery Detection in Dynamic Signature Verification by Entailing Principal Component Analysis
by: Sayeed, Shohel, et al.
Published: (2007) -
Fuzzy modeling based recognition of multi-font numerals
by: Hanmandlu, Madasu, et al.
Published: (2003) -
Offline Signature Verification through Biometric Strengthening
by: Ooi, Shih-Yin, et al.
Published: (2007) -
Glove-Based Approach to Online Signature Verification
by: Kamel, N.S., et al.
Published: (2008)