2,478 research outputs found

    Online Signature Verification using SVD Method

    Get PDF
    Online signature verification rests on hypothesis which any writer has similarity among signature samples, with scale variability and small distortion. This is a dynamic method in which users sign and then biometric system recognizes the signature by analyzing its characters such as acceleration, pressure, and orientation. The proposed technique for online signature verification is based on the Singular Value Decomposition (SVD) technique which involves four aspects: I) data acquisition and preprocessing 2) feature extraction 3) matching (classification), 4) decision making. The SVD is used to find r-singular vectors sensing the maximal energy of the signature data matrix A, called principle subspace thus account for most of the variation in the original data. Having modeled the signature through its r-th principal subspace, the authenticity of the tried signature can be determined by calculating the average distance between its principal subspace and the template signature. The input device used for this signature verification system is 5DT Data Glove 14 Ultra which is originally design for virtual reality application. The output of the data glove, which captures the dynamic process in the signing action, is the data matrix, A to be processed for feature extraction and matching. This work is divided into two parts. In part I, we investigate the performance of the SVD-based signature verification system using a new matching technique, that is, by calculating the average distance between the different subspaces. In part IJ, we investigate the performance of the signature verification with reducedsensor data glove. To select the 7-most prominent sensors of the data glove, we calculate the F-value for each sensor and choose 7 sensors that gives the highest Fvalue

    Effective Identity Management on Mobile Devices Using Multi-Sensor Measurements

    Get PDF
    Due to the dramatic increase in popularity of mobile devices in the past decade, sensitive user information is stored and accessed on these devices every day. Securing sensitive data stored and accessed from mobile devices, makes user-identity management a problem of paramount importance. The tension between security and usability renders the task of user-identity verification on mobile devices challenging. Meanwhile, an appropriate identity management approach is missing since most existing technologies for user-identity verification are either one-shot user verification or only work in restricted controlled environments. To solve the aforementioned problems, we investigated and sought approaches from the sensor data generated by human-mobile interactions. The data are collected from the on-board sensors, including voice data from microphone, acceleration data from accelerometer, angular acceleration data from gyroscope, magnetic force data from magnetometer, and multi-touch gesture input data from touchscreen. We studied the feasibility of extracting biometric and behaviour features from the on-board sensor data and how to efficiently employ the features extracted to perform user-identity verification on the smartphone device. Based on the experimental results of the single-sensor modalities, we further investigated how to integrate them with hardware such as fingerprint and Trust Zone to practically fulfill a usable identity management system for both local application and remote services control. User studies and on-device testing sessions were held for privacy and usability evaluation.Computer Science, Department o

    Neural Network Based Approach For Signature Verification And Recognition

    Get PDF
    Signature can be seen as an individual characteristic of a person which can be used for his/her validation. An automated signature verification and recognition technique saves valuable time and money. Neural network based approach for signature verification and recognition discussed in this paper which enables the user to recognize whether a signature is original or a fraud. The user introduces into the computer the scanned images, modifies their quality by image enhancement and noise reduction techniques, to be followed by feature extraction and neural network training, and finally verifies the authenticity of the signature. The paper is primarily focused on five features of extraction like eccentricity, kurtosis, skewness, orientation and centroid. The extracted features of investigation signature are compared with the previously trained features of the reference signature. This technique is suitable for various applications such as bank transactions, passports with good authentication results et

    Online Signature Verification using SVD Method

    Get PDF
    Online signature verification rests on hypothesis which any writer has similarity among signature samples, with scale variability and small distortion. This is a dynamic method in which users sign and then biometric system recognizes the signature by analyzing its characters such as acceleration, pressure, and orientation. The proposed technique for online signature verification is based on the Singular Value Decomposition (SVD) technique which involves four aspects: I) data acquisition and preprocessing 2) feature extraction 3) matching (classification), 4) decision making. The SVD is used to find r-singular vectors sensing the maximal energy of the signature data matrix A, called principle subspace thus account for most of the variation in the original data. Having modeled the signature through its r-th principal subspace, the authenticity of the tried signature can be determined by calculating the average distance between its principal subspace and the template signature. The input device used for this signature verification system is 5DT Data Glove 14 Ultra which is originally design for virtual reality application. The output of the data glove, which captures the dynamic process in the signing action, is the data matrix, A to be processed for feature extraction and matching. This work is divided into two parts. In part I, we investigate the performance of the SVD-based signature verification system using a new matching technique, that is, by calculating the average distance between the different subspaces. In part IJ, we investigate the performance of the signature verification with reducedsensor data glove. To select the 7-most prominent sensors of the data glove, we calculate the F-value for each sensor and choose 7 sensors that gives the highest Fvalue

    Time Complexity of Color Camera Depth Map Hand Edge Closing Recognition Algorithm

    Get PDF
    The objective of this paper is to calculate the time complexity of the colored camera depth map hand edge closing algorithm of the hand gesture recognition technique. It has been identified as hand gesture recognition through human-computer interaction using color camera and depth map technique, which is used to find the time complexity of the algorithms using 2D minima methods, brute force, and plane sweep. Human-computer interaction is a very much essential component of most people's daily life. The goal of gesture recognition research is to establish a system that can classify specific human gestures and can make its use to convey information for the device control. These methods have different input types and different classifiers and techniques to identify hand gestures. This paper includes the algorithm of one of the hand gesture recognition “Color camera depth map hand edge recognition” algorithm and its time complexity and simulation on MATLAB
    corecore