Novel Approach to Dynamic Signature Verification Using Sensor-Based Data glove
#1

.


Novel Approach to Dynamic Signature Verification Using Sensor-Based Data glove

1Shohel Sayeed, 2Nidal S. Kamel and 3Rosli Besar
1Faculty of Information Science and Technology, Multimedia University,
Jalan Ayer Keroh Lama, 75450 Melaka, Malaysia
2 Department of Electrical and Electronic Engineering, Universiti Teknologi PETRONAS,
Bandar Seri Iskandar, 31750 Tronoh, Perak, Malaysia
3Faculty of Engineering and Technology, Multimedia University,
Jalan Ayer Keroh Lama, 75450 Melaka, Malaysia



Abstract: Data glove is a new dimension in the field of virtual reality environments, initially designed
to satisfy the stringent requirements of modern motion capture and animation professionals. In this
study we try to shift the implementation of data glove from motion animation towards signature
verification problem, making use of the offered multiple degrees of freedom for each finger and for the
hand as well. We used an SVD-based technique to extract the feature values of different sensors’
locating on corresponding fingers in the signing process and evaluated the results for writer
authentication. The technique is tested with large number of authentic and forgery signatures using
data gloves with 14, 5 and 4 sensor and shows a significant level of accuracy with 2.46~5.0% of EER.

INTRODUCTION


In early days, human beings were commonly identified by their names. As the human population increased, method of identifying a person became more sophisticated. People needed to be associated with more information such as family’s background, nationality, gender, age and blood group to label each and every human being as the unique person in the world. The problem of personal identification is multiplied when computer comes into the communication channel of two parties. For this reason, more reliable authentication scheme is needed to build up the required trust of communication link. Password, PINs and token are examples of traditional authentication technology. However, these methods have major drawbacks as passwords and PINs tend to be forgotten or shared out whereas token can be easily lost or stolen. Alternatively, biometry offers potential for automatic personal verification and differently from other biometric means it is not based on the possession of anything or the knowledge of some information. People recognition by means of biometrics[1-3] can be split into two main categories: a) Passive or Physiological biometrics such as face recognition, fingerprint, iris or retina, hand geometry, off-line hand signature and DNA (Deoxyribonucleic Acid) analysis.b) Active or Behavioral biometrics such as voice recognition, hand signature and typing behavior. Signature recognition belongs to this last category and according to market share reports[4] it is the second most important within this group, just behind speech recognition and over keystroke, gait, gesture, etc.




for more http://findarticlesp/articles/mi_7109/is_2_6/ai_n28552271/
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: emine a novel web mining approach doc, fingerprint verification using php, deloitte malaysia, e mine novel web mining approach, glove mouse project pdf, electronic embedded data verification and control system**erification and control system, ppt on a novel approach for concealed data sharing and data embeeding for secured communication,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Block Chain and Data Science jntuworldforum 0 7,906 06-10-2018, 12:15 PM
Last Post: jntuworldforum
  Host-Based Intrusion Detection Using user signatures nit_cal 2 2,366 06-10-2016, 10:27 AM
Last Post: ijasti
  Data Encryption Standard (DES) seminar class 2 9,317 20-02-2016, 01:59 PM
Last Post: seminar report asees
  Multi signature smart paper boy 2 2,056 11-01-2016, 02:00 PM
Last Post: seminar report asees
  Skin Tone based Secret Data hiding in Images seminar class 9 6,968 23-12-2015, 04:18 PM
Last Post: HelloGFS
  Implementation of Diffie-Hellman Key Exchange on Wireless Sensor Using Elliptic Curv project report helper 2 3,134 31-10-2015, 02:16 PM
Last Post: seminar report asees
  Digital Signature Full Seminar Report Download computer science crazy 20 43,492 16-09-2015, 02:51 PM
Last Post: seminar report asees
  Dynamic Search Algorithm in Unstructured Peer-to-Peer Networks seminar surveyer 3 2,809 14-07-2015, 02:24 PM
Last Post: seminar report asees
  Heterogeneous Wireless Sensor Networks in a Tele-monitoring System for Homecare electronics seminars 2 2,537 26-02-2015, 08:03 PM
Last Post: Guest
Brick XML Data Compression computer science crazy 2 2,372 07-10-2014, 09:26 PM
Last Post: seminar report asees

Forum Jump: