The Graphology Applied to Signature Verification

نویسندگان

  • Luiz S. OLIVEIRA
  • Edson JUSTINO
  • Cinthia FREITAS
  • Robert SABOURIN
چکیده

In this paper we discuss automatic signature verification in the context of the graphology. Graphology is claimed to be useful for everything from understanding health issues, morality and past experiences to hidden talents, and mental problems. It is not restricted to this, though. Forensic document examiners use the concepts of graphology to examine handwriting in order to detect authenticity or forgery. In this work, we describe some of the main features of the graphology and propose a set of features to automatic signature verification. They are evaluated in a database of 5,600 signatures using hidden Markov models.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Use of the Shearlet Transform and Transfer Learning in Offline Handwritten Signature Verification and Recognition

Despite the growing growth of technology, handwritten signature has been selected as the first option between biometrics by users. In this paper, a new methodology for offline handwritten signature verification and recognition based on the Shearlet transform and transfer learning is proposed. Since, a large percentage of handwritten signatures are composed of curves and the performance of a sig...

متن کامل

Evaluation of Local and Global Features for Offline Signature Verification

In this paper we evaluate the impact of two stateof-the-art offline signature verification systems which are based on local and global features, respectively. It is important to take into account the real world needs of Forensic Handwriting Examiners (FHEs). In forensic scenarios, the FHEs have to make decisions not only about forged and genuine signatures but also about disguised signatures, i...

متن کامل

A Novel Patch-Based Digital Signature

In this paper a new patch-based digital signature (DS) is proposed. The proposed approach similar to steganography methods hides the secure message in a host image. However, it uses a patch-based key to encode/decode the data like cryptography approaches. Both the host image and key patches are randomly initialized. The proposed approach consists of encoding and decoding algorithms. The encodin...

متن کامل

The ICDAR 2009 Signature Verification Competition

Recent results of forgery detection by implementing biometric signature verification methods are promising. At present, forensic signature verification in daily casework is performed through visual examination by trained forensic handwriting experts, without reliance on computerassisted methods. With this competition on onand offline skilled forgery detection, our objective is to make a first s...

متن کامل

An ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure

Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication.  This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005