Documente Academic
Documente Profesional
Documente Cultură
BY
DIVYA SWAPNA
INTRODUCTION
The signature verification is an established and accepted form of verification. It is an important source of authentication about ones identity. However, with the increasing use of computer network , it is difficult to confirm whether information had been truly sent by the person whose name is mentioned or someone else in unsecured data networks.
INTRODUCTION contd
Moreover the present approach of using passwords for accessing restricted database is also cumbersome.
So it is proposed to use users mouseentered signature to access the restricted database for moderate security category.
Start
SYSTEM DESCRIPTION
Pre-processing
No
Is signature verified?
Display error
Yes
Stop
MOUSE PROGRAMMING
Workspace of 200 x 100 pixels was provided for user to enter signature. Functions were developed to restrict the mouse pointer within this specified workspace during signature insertion process. The x-y co-ordinates of present mouse position were continuously captured in an array.
PRE-PROCESSING
The number of points captured for mousewritten signature varies w.r.t size and speed of writing. It is therefore, desired to resample the signature contour data to reduce the noise. Re-sampled signature contour would contain fixed number of points. 100 points were chosen for re-sampling.
FEATURE EXTRACTION
In this application slope and DWT coefficients are extracted for verification. SLOPE: Slope is calculated for each two successive points obtained from re-sampling. Each individual has a unique way of running signature and also slope parameter.
WAVELET:
The discrete wavelet transform (DWT) for a signal, f(n) with period N is given by,
N 1
DWT f [n,a ]=
f [m]a
j /2
= ((m n) / a )
m !0
Where m and n are integers, a=2 for a dynamic transform And (n) is mother wavelet with zero mean value.
SF f[n, ]= a
m!0
f [ m]a
j /2
** (( m n) / a j )
Initially activation functions and the thresholds are defined by a recursive optimization technique.
Learning Phase:
Neural network is trained separately for each target model with 10 samples of mouse-entered signatures of the target and 10 signatures of the impostor. Zero mean random Gaussian noise of 5% variance was added during the training to check robustness of the system.
Testing Phase:
Testing phase was used to verify the inserted signature by comparing their features.
APPLICATIONS
Business and financial transactions Checking forgeries in high security applications Banks ,telecom companies ,insurance companies.
Conclusion contd
For person having skewed signature with variable inclination, alignment can be done along X-axis using histogram technique before per-processing phase. This approach can also be easily applied to enter non-English alphabets (for eg. Devnagri script letters) without the need to use cumbersome encoding of keyboard keystrokes and their combinations.