نتایج جستجو برای: signature verification

تعداد نتایج: 138762  

2005
Jarrod Trevathan Alan McCabe

This paper presents a secure real-time remote user authentication system based on dynamic handwritten signature verification. The system allows users to establish their identities to other parties in real-time via a trusted verification server. The system can be used to gain remote access to restricted content on a server or to verify a signature on a legal document. State of the art dynamic ve...

2013
DINA DARWISH

The digital signature verification has become an interesting domain, which is widely needed. The usage of online and offline digital signatures has been spreaded worldwide due to the increase of use of bank transactions and user authentication and other similar activities. This requires the creation and the diversification of new online and offline signature verification methods. The signature ...

2017
N. Srinivasan

Online Internet applications are used widely all over the world. Especially the secured applications like banking and financial applications the basic authentication is password and one time password verification. The new system is facilitated with signature based authentication and graphical pattern authentication based on Multimodal Verification System. The new system uses contourlet based tr...

2014
Aditya Kapil Jaspreet Singh Varun Srivastava

The signature of a person is an important biometric attribute of a human being which can be used to authenticate human identity. Various complex methodologies in the past have been proposed for signature verification through feature extraction. This paper presents a new hybrid algorithm for signature verification which incorporates feed forward training of parameters derived through feature ext...

2003
Cemil OZ Fikret Ercal Zafer Demir

In this paper, we present an off-line signature recognition and verification system which is based on moment invariant method and ANN. Two separate neural networks are designed; one for signature recognition, and another for verification (i.e. for detecting forgery). Both networks use a four-step process. First step is to separate the signature from its background. Second step performs normaliz...

2010
Samit Biswas Tai-hoon Kim Debnath Bhattacharyya Samir Kumar Bandyopadhyay Poulami Das Debashis Ganguly

Humans are comfortable with pen and papers for authentication and authorization in legal transactions. In this case it is very much essential that a person’s Hand written signature to be identified uniquely. The development of efficient technique is to extract features from Handwritten Signature Image and verify the signature with higher accuracy. This paper presents a method for off line hand ...

2010
Xinxin Fan Guang Gong

In wireless sensor networks (WSNs), broadcast authentication is a crucial security mechanism that allows a multitude of legitimate users to join in and disseminate messages into the networks in a dynamic and authenticated way. During the past few years, several public-key based multi-user broadcast authentication schemes have been proposed to achieve immediate authentication and to address the ...

2010
Meenakshi S Arya

Biometrics can be classified into two broad categories— behavioral (signature verification, keystroke dynamics, etc.) and physiological (iris characteristics, fingerprint, etc.). Handwritten signature is amongst the first few biometrics to be used even before the advent of computers. Signature verification is widely studied and discussed using two approaches [5]. On-line approach uses an electr...

Journal: :Applied Mathematics and Computation 2005
Shun-Fu Pon Erl-Huei Lu Albert B. Jeng

This study investigates all variations of the He’s digital signature scheme based on factoring and discrete logarithms. In contrast to three modular exponentiation computation, the optimal two schemes of generalized He’s signature verification reveals that only two modular exponentiation is needed for signature verification. Key-Words: Digital signature, Batch verify, Computation complexity.

Journal: :J. Inf. Sci. Eng. 2013
Jianhong Zhang Zhibin Sun

A server-aided verification signature, some complex computation for verification of a signature is carried out by a server. Thus, it is very suitable for low-power computation devices. In this paper, by combining ID-based cryptography and server-aided verification signature, we propose an ID-based server-aided verification signature scheme, and give two SA-Verifying ways to realize server-aided...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید