The Graphology Applied to Signature Verification
نویسندگان
چکیده
In this paper we discuss automatic signature verification in the context of the graphology. Graphology is claimed to be useful for everything from understanding health issues, morality and past experiences to hidden talents, and mental problems. It is not restricted to this, though. Forensic document examiners use the concepts of graphology to examine handwriting in order to detect authenticity or forgery. In this work, we describe some of the main features of the graphology and propose a set of features to automatic signature verification. They are evaluated in a database of 5,600 signatures using hidden Markov models.
منابع مشابه
Use of the Shearlet Transform and Transfer Learning in Offline Handwritten Signature Verification and Recognition
Despite the growing growth of technology, handwritten signature has been selected as the first option between biometrics by users. In this paper, a new methodology for offline handwritten signature verification and recognition based on the Shearlet transform and transfer learning is proposed. Since, a large percentage of handwritten signatures are composed of curves and the performance of a sig...
متن کاملEvaluation of Local and Global Features for Offline Signature Verification
In this paper we evaluate the impact of two stateof-the-art offline signature verification systems which are based on local and global features, respectively. It is important to take into account the real world needs of Forensic Handwriting Examiners (FHEs). In forensic scenarios, the FHEs have to make decisions not only about forged and genuine signatures but also about disguised signatures, i...
متن کاملA Novel Patch-Based Digital Signature
In this paper a new patch-based digital signature (DS) is proposed. The proposed approach similar to steganography methods hides the secure message in a host image. However, it uses a patch-based key to encode/decode the data like cryptography approaches. Both the host image and key patches are randomly initialized. The proposed approach consists of encoding and decoding algorithms. The encodin...
متن کاملThe ICDAR 2009 Signature Verification Competition
Recent results of forgery detection by implementing biometric signature verification methods are promising. At present, forensic signature verification in daily casework is performed through visual examination by trained forensic handwriting experts, without reliance on computerassisted methods. With this competition on onand offline skilled forgery detection, our objective is to make a first s...
متن کاملAn ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure
Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication. This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005