An Appraisal of Off-line Signature Verification Techniques

Full Text (PDF, 349KB), PP.67-75

Views: 0 Downloads: 0

Author(s)

Abdul Salam Shah 1,* M. N. A. Khan 1 Asadullah Shah 2

1. Shaheed Zulfikar Ali Bhutto Institute of Science and Technology, Islamabad, Pakistan

2. International Islamic University Malaysia (IIUM), Kuala Lumpur, Malaysia

* Corresponding author.

DOI: https://doi.org/10.5815/ijmecs.2015.04.08

Received: 4 Jan. 2015 / Revised: 12 Feb. 2015 / Accepted: 2 Mar. 2015 / Published: 8 Apr. 2015

Index Terms

Biometrics, Offline Signature, Data acquisition, Preprocessing, Forgery

Abstract

Biometrics is being commonly used nowadays for the identification and verification of humans everywhere in the world. In biometrics humans unique characteristics like palm, fingerprints, iris etc. are being used. Pattern Recognition and image processing are the major areas where research on signature verification is carried out. Hand written Signature of an individual is also unique and for identification of humans are being used and accepted specially in the banking and other financial transactions. The hand written signatures due to its importance are at target of fraudulence. In this paper we have surveyed different papers on techniques that are currently used for the identification and verification of Offline signatures.

Cite This Paper

Abdul Salam Shah, M. N. A. Khan, Asadullah Shah, "An Appraisal of Off-line Signature Verification Techniques", International Journal of Modern Education and Computer Science (IJMECS), vol.7, no.4, pp.67-75, 2015. DOI:10.5815/ijmecs.2015.04.08

Reference

[1]M. Tomar, and P. Singh, “A directional feature with energy based offline signature verification network,” International Journal on Soft Computing, vol.2, pp. 48–57, February 2011, “doi: 10.5121/ijsc.2011.2105”.
[2]K. Harika, and T.C.S. Ready, “A tool for robust offline signature verification,” International journal of advanced research in computer and communication engineering, vol.2, pp. 3417–3420, September 2013.
[3]S. Odeh, and M. Khalil, “Apply multi-layer perceptron neural network for off-line signature verification and recognition,” IJCSI International Journal of Computer Science Issues, vol.8, pp. 261–266, November 2011.
[4]R. Anjali, and M.R. Mathew, “An efficient approach to offline signature verification based on neural network,” IJREAT International Journal of Research in Engineering & Advanced Technology, vol.1, pp. 1–5, June-July 2013.
[5]V.M. Deshmukh, and S.A. Murab, “Signature recognition & verification using ANN,” International Journal of Innovative Technology and Exploring Engineering, vol.1, pp. 6–8, November 2012.
[6]G.P. Patil, and R.S.Hegadi, “Offline handwritten signatures classification using wavelets and support vector machines,” International Journal of Engineering Science and Innovative Technology, vol.2, pp. 573–579, July 2013.
[7]A. Pansare, and S.Bhatia, “Handwritten signature verification using neural network,” International Journal of Applied Information Systems, vol.1, pp. 44–49, January 2012.
[8]M.B.Yilmaz, B. Yanikoglu, C. Tirkaz, and A. Kholmatov, “Offline signature verification using classifier combination of HOG and LBP features,” IEEE, In Biometrics (IJCB), pp. 1–7, 2011 [2011 International Joint Conference, p.1–7, 2011].
[9]D.S.A. Daramola, and P.T.S. Ibiyemi, “Offline signature recognition using hidden markov model (HMM),” International Journal of Computer Applications, vol.10, pp. 17–22, November 2010.
[10]M.V. Kanawade, and S.S. Katariya,“Offline signature verification and recognition,” International Journal of Electronics, Communication & Instrumentation Engineering Research and Development, vol.3, pp. 107–114, August 2013.
[11]N. Abbas, and Chibani, “SVM-DSmT combination for off-line signature verification,” International Conference on Computer, Information and Telecommunication Systems, pp.45–56, May 2012.
[12]M.A. Ferrer, J.F. Vargas, A. Morales, and A. Ordonez, “Robustness of offline signature verification based on gray level features,” IEEE Transactions on Information Forensics and Security, vol.7, pp.966–977, June 2012.
[13]S. Adke, and P.A.P. Khekar, “An enhanced artificial neural network based offline signature verification and recognition system,” International Journal of Engineering Research & Technology, vol.2, pp. 175–178, December 2013.
[14]C.R. Prashanth, and K.B. Raja, “Off-line signature verification based on angular features,” International Journal of Modeling and Optimization, vol.2, pp. 477–481, August 2012.
[15]E.N.Zois, A.Nassiopoulos, K.Tselios, E.Siores, and G.Economou, “Off-line signature verification using two step transitional features,” MVA2011 Conference on Machine Vision Applications, pp. 295–298, June 2011.
[16]Iqbal S., Khalid M., Khan, M N A. A Distinctive Suite of Performance Metrics for Software Design. International Journal of Software Engineering & Its Applications, 7(5),(2013).
[17]Iqbal S., Khan M.N.A., Yet another Set of Requirement Metrics for Software Projects. International Journal of Software Engineering & Its Applications, 6(1),(2012).
[18]Faizan M., Ulhaq S., Khan M N A., Defect Prevention and Process Improvement Methodology for Outsourced Software Projects. Middle-East Journal of Scientific Research, 19(5), 674-682,(2014).
[19]Faizan M., Khan M NA., Ulhaq S., Contemporary Trends in Defect Prevention: A Survey Report. International Journal of Modern Education & Computer Science, 4(3),(2012).
[20]Khan K., Khan A., Aamir M., Khan M N A., Quality Assurance Assessment in Global Software Development. World Applied Sciences Journal, 24(11),(2013).
[21]Amir M., Khan K., Khan A., Khan M N A., An Appraisal of Agile Software Development Process. International Journal of Advanced Science & Technology, 58,(2013).
[22]Khan, M., & Khan, M. N. A. Exploring Query Optimization Techniques in Relational Databases. International Journal of Database Theory & Application, 6(3). (2013).
[23]Khan, MNA., Khalid M., ulHaq S., Review of Requirements Management Issues in Software Development. International Journal of Modern Education & Computer Science, 5(1),(2013).
[24]Umar M., Khan, M N A., A Framework to Separate Non-Functional Requirements for System Maintainability. Kuwait Journal of Science & Engineering, 39(1 B), 211-231,(2012).
[25]Umar M., Khan, M. N. A, Analyzing Non-Functional Requirements (NFRs) for software development. In IEEE 2nd International Conference on Software Engineering and Service Science (ICSESS), 2011 pp. 675-678), (2011).
[26]Khan, M. N. A., Chatwin, C. R., & Young, R. C. (2007). A framework for post-event timeline reconstruction using neural networks. digital investigation, 4(3), 146-157.
[27]Khan, M. N. A., Chatwin, C. R., & Young, R. C. (2007). Extracting Evidence from Filesystem Activity using Bayesian Networks. International journal of Forensic computer science, 1, 50-63.
[28]Khan, M. N. A. (2012). Performance analysis of Bayesian networks and neural networks in classification of file system activities. Computers & Security, 31(4), 391-401.
[29]Rafique, M., & Khan, M. N. A. (2013). Exploring Static and Live Digital Forensics: Methods, Practices and Tools. International Journal of Scientific & Engineering Research 4(10): 1048-1056.
[30]Bashir, M. S., & Khan, M. N. A. (2013). Triage in Live Digital Forensic Analysis. International journal of Forensic Computer Science 1, 35-44.
[31]Sarwar, A., & Khan, M. N. (2013). A Review of Trust Aspects in Cloud Computing Security. International Journal of Cloud Computing and Services Science (IJ-CLOSER), 2(2), 116-122.
[32]Gondal, A. H., & Khan, M. N. A. (2013). A review of fully automated techniques for brain tumor detection from MR images. International Journal of Modern Education and Computer Science (IJMECS), 5(2), 55.
[33]Zia, A., & Khan, M. N. A. (2012). Identifying key challenges in performance issues in cloud computing. International Journal of Modern Education and Computer Science (IJMECS), 4(10), 59.
[34]Ur Rehman, K., & Khan, M. N. A. (2013). The Foremost Guidelines for Achieving Higher Ranking in Search Results through Search Engine Optimization. International Journal of Advanced Science and Technology, 52, 101-110.
[35]Khan, M., & Khan, M. N. A. (2013). Exploring query optimization techniques in relational databases. International Journal of Database Theory & Application,6(3).
[36]Shehzad, R., KHAN, M. N., & Naeem, M. (2013). Integrating knowledge management with business intelligence processes for enhanced organizational learning. International Journal of Software Engineering and Its Applications, 7(2), 83-91.
[37]Ul Haq, S., Raza, M., Zia, A., & Khan, M. N. A. (2011). Issues in global software development: A critical review. Journal of Software Engineering and Applications, 4(10), 590.
[38]Zia, A., & Khan, M. N. A. (2013). A Scheme to Reduce Response Time in Cloud Computing Environment. International Journal of Modern Education and Computer Science (IJMECS), 5(6), 56.
[39]Khan, M., & Tariq, M. (2011). The Context of Global Software Development: Challenges, Best Practices and Benefits. Information Management & Business Review, 3(4).
[40]Shahzad, A., Hussain, M., & Khan, M. N. A. (2013). Protecting from Zero-Day Malware Attacks. Middle-East Journal of Scientific Research, 17(4), 455-464.
[41]Khan, A. A., & Khan, M. (2011). Internet content regulation framework. International Journal of U-& E-Service, Science & Technology, 4(3).
[42]Kaleem Ullah, K. U., & MNA Khan, M. K. (2014). Security and Privacy Issues in Cloud Computing Environment: A Survey Paper. International Journal of Grid and Distributed Computing, 7(2), 89-98.
[43]Abbasi, A. A., Khan, M. N. A., & Khan, S. A. (2013). A Critical Survey of Iris Based Recognition Systems. Middle-East Journal of Scientific Research, 15(5), 663-668.
[44]Khan, M. N. A., Qureshi, S. A., & Riaz, N. (2013). Gender classification with decision trees. Int. J. Signal Process. Image Process. Patt. Recog, 6, 165-176.
[45]Ali, S. S., & Khan, M. N. A. (2013). ICT Infrastructure Framework for Microfinance Institutions and Banks in Pakistan: An Optimized Approach.International Journal of Online Marketing (IJOM), 3(2), 75-86.
[46]Mahmood, A., Ibrahim, M., & Khan, M. N. A. (2013). Service Composition in the Context of Service Oriented Architecture. Middle East Journal of Scientific Research, 15(11).
[47]Masood, M. A., & Khan, M. N. A. (2015). Clustering Techniques in Bioinformatics. I.J. Modern Education and Computer Science, 2015, 1, 38-46.