IJISC
  • Indexed in

  • Latest News

    December 29, 2018
    Volume 7, Issue 2 of the International Journal of Information Security and Cybercrime was published
    June 29, 2018
    Volume 7, Issue 1 of the International Journal of Information Security and Cybercrime was published
    December 29, 2017
    Volume 6, Issue 2 of IJISC – International Journal of Information Security and Cybercrime was published
    December 4, 2017
    IJISC has been successfully evaluated for the ICI Journals Master List 2016 and received the ICV of 85.83 points
  • --- More News ---
  • Popular Articles

  • Offline Signature Verification Approaches: A Review


    Author(s): GAUR, Anu; BHARDWAJ, Minakshi

    Quick view | Full article | Citations | Views: 969


    Author(s) keywords: , , ,


    Reference keywords:


    Abstract:

    Signatures are the most common medium for establishing identity and validation of a person's credentials. However not everybody has the same signatures although similarity may exist. So it becomes very important to try and prove the authenticity of signatures based on their functional and behavioral property. However signatures are prone to being copied and recently the world has been witnessing a rise in spurious signatures hence an efficient signature verification system is the need of the hour. Although similar papers and lots of research has gone on in this field here we simply propose an off line verification system review based on analysis of signatures.



    References:

    [1]. K. Bowyer, V. Govindaraju, N. Ratha, Introduction to the special issue on recent advances in biometric systems, IEEE Transactions on Systems, Man and Cybernetics - B 37(5)(2007)1091–1095.

    [2]. D. Zhang, J. Campbell, D. Maltoni, R. Bolle, Special issue on biometric systems, IEEE Transactions on Systems, Man and Cybernetics - C 35(3)(2005)273–275.

    [3]. S. Prabhakar, J. Kittler, D. Maltoni, L. O’Gorman, T. Tan, Introduction to the special issue on biometrics: progress and directions, PAMI29(4)(2007)513–516.

    [4]. S. Liu, M. Silverman, A practical guide to biometric security technology, IEEE IT Professional 3 (1) (2001) 27–32.

    [5]. K. Franke, J. Ruiz-del-Solar, M. Köppen, Soft-Biometrics: Soft-Computing for Biometric-Applications, Tech. Rep. IPK, 2003.

    [6]. S. Impedovo, G. Pirlo, Verification of hand written signatures: an overview, in: ICIAP ’07:Proceedings of the 14th International Conference on Image.

    [7]. R. Plamondon, in: Progress in Automatic Signature Verification, World Scientific publications, 1994.

    [8]. M. Fairhurst, New perspectives in automatic signature verification, Tech.Rep. 1, Information Security Technical Report, 1998.

    [9]. Batista, L., Rivard D., Sabourin R., Granger E., Maupin P. 2007. State of the art in off-line signature verification. In: Verma B., Blumenstein M. (eds.), Pattern Recognition Technologies and Applications: Recent Advances, (1e). IGI Global, Hershey (2007).

    [10]. Madasu V K and Lovell B. C. 2007. An Automatic Off-Line Signature Verification and Forgery Detection System. In: Verma, B., Blumenstein, M. (eds.) Pattern Recognition Technologies and Applications: Recent Advances, 1st ed. IGI Global, Hershey (2007).

    [11]. Kiani V, Pourreza R and Pourreza H R. 2009. Offline Signature Verification Using Local Radon Transform and SVM. International Journal of Image Processing (IJIP) Volume(3), Issue(5), (pp 184 – 194).

    [12]. Batista, L., Rivard D., Sabourin R., Granger E., Maupin P. 2007. State of the art in off-line signature verification. In: Verma B., Blumenstein M. (eds.), Pattern Recognition Technologies and Applications: Recent Advances, (1e). IGI Global, Hershey (2007).

    [13]. Yazan M. Al-Omari, Siti Norul Huda Sheikh Abdullah and Khairuddin Omar. 2011. State of the art Offline signature verification system. IEEE International Conference on Pattern Analysis and Intelligent Robotics 28-29 June 2011, Putrajaya, Malaysia

    [14]. Arya M S and Inamdar V S. (2010). A Preliminary Study on Various Off-line Hand Written Signature Verification Approaches. 2010 International Journal of Computer Applications. Volume 1, No. 9 (pp 0975 – 8887).

    [15]. Debasish Jena, Banshidhar Majhi, Saroj Kumar Panigrahy, Sanjay Kumar Jena(2008)Improved Offline Signature Verification SchemeUsing Feature Point Extraction Method

    [16]. Vu Nguyen, Michael Blumenstein, Graham Leedham(2009) Global Features for the Off-Line Signature Verification Problem

    [17]. Jesus F. Vargas, Miguel A. Ferrer, Carlos M. Travieso, Jesus B. Alonso(2009) Offline Signature Verification Based on Pseudo-Cepstral Coefficients

    [18]. RamachandraA C, Jyothi Srinivasa Rao,K BRaja,KRVenugopla,L M Patnaik(2009)Robust Offline Signature Verification Based OnGlobal Features.

    [19]. Bradley Schafer,serestina viriri (2009) an offline signature verification system.

    [20]. Sanjay N. Gunjal, Manoj Lipton (2011) Robust Offline Signature Verification Based on Polygon Matching Technique.

    [21]. M.S. Shirdhonkar and Manesh Kokare (2011) Off-Line Handwritten Signature Identification Using Rotated Complex Wavelet Filters.

    [22]. J.F. Vargas b,n, M.A.Ferrer a, C.M.Travieso a, J.B.Alonso a (2011) Off-line signature verification based on grey level information using texture features.

    [23]. Ashwini Pansare, Shalini Bhatia(2012) Handwritten Signature Verification using Neural Network.

    [24]. Md. Asraful Haque, Tofik Ali(2012) Improved Offline Signature Verification MethodUsing Parallel Block Analysis.

    [25]. Shiwani Sthapak, Minal Khopade, Chetana KashidArtificial(2013) Neural Network Based Signature Recognition &Verification.

    [26]. Indrajit Bhattacharyaa, Prabir Ghoshb, Swarup Biswasb(2013)Offline Signature Verification Using Pixel Matching Technique.

    [27]. Anu Gaur ,garima joshi,sheenu gupta(2015) Hand-written Word Recognition using Fusion of Shape Based Features.

    [28]. Ms. RajpalKaur, Ms .Pooja Choudhary(2015) Handwritten Signature Verification Based on Surf Features using HMM



    Additional Information

    Article Title: Offline Signature Verification Approaches: A Review
    Author(s): GAUR, Anu; BHARDWAJ, Minakshi
    Date of Publication: 2016-06-29
    Publication: International Journal of Information Security and Cybercrime
    ISSN: 2285-9225 e-ISSN: 2286-0096
    Digital Object Identifier: 10.19107/IJISC.2016.01.08
    Issue: Volume 5, Issue 1, Year 2016
    Section: Cyber-Attacks Evolution and Cybercrime Trends
    Page Range: 81-88 (8 pages)



    Copyright

    Copyright ©2012-2019 IJISC - International Journal of Information Security and Cybercrime

    All rights reserved: International Journal of Information Security and Cybercrime is a trademark of RAISA - Romanian Association for Information Security Assurance.
    No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from RAISA. When authors submit their papers for publication, they agree that the copyright for their article be transferred to Romanian Association for Information Security Assurance, if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.