Novel Approach to Dynamic Signature Verification Using Sensor-Based Data glove
#1

.


Novel Approach to Dynamic Signature Verification Using Sensor-Based Data glove

1Shohel Sayeed, 2Nidal S. Kamel and 3Rosli Besar
1Faculty of Information Science and Technology, Multimedia University,
Jalan Ayer Keroh Lama, 75450 Melaka, Malaysia
2 Department of Electrical and Electronic Engineering, Universiti Teknologi PETRONAS,
Bandar Seri Iskandar, 31750 Tronoh, Perak, Malaysia
3Faculty of Engineering and Technology, Multimedia University,
Jalan Ayer Keroh Lama, 75450 Melaka, Malaysia



Abstract: Data glove is a new dimension in the field of virtual reality environments, initially designed
to satisfy the stringent requirements of modern motion capture and animation professionals. In this
study we try to shift the implementation of data glove from motion animation towards signature
verification problem, making use of the offered multiple degrees of freedom for each finger and for the
hand as well. We used an SVD-based technique to extract the feature values of different sensors’
locating on corresponding fingers in the signing process and evaluated the results for writer
authentication. The technique is tested with large number of authentic and forgery signatures using
data gloves with 14, 5 and 4 sensor and shows a significant level of accuracy with 2.46~5.0% of EER.

INTRODUCTION


In early days, human beings were commonly identified by their names. As the human population increased, method of identifying a person became more sophisticated. People needed to be associated with more information such as family’s background, nationality, gender, age and blood group to label each and every human being as the unique person in the world. The problem of personal identification is multiplied when computer comes into the communication channel of two parties. For this reason, more reliable authentication scheme is needed to build up the required trust of communication link. Password, PINs and token are examples of traditional authentication technology. However, these methods have major drawbacks as passwords and PINs tend to be forgotten or shared out whereas token can be easily lost or stolen. Alternatively, biometry offers potential for automatic personal verification and differently from other biometric means it is not based on the possession of anything or the knowledge of some information. People recognition by means of biometrics[1-3] can be split into two main categories: a) Passive or Physiological biometrics such as face recognition, fingerprint, iris or retina, hand geometry, off-line hand signature and DNA (Deoxyribonucleic Acid) analysis.b) Active or Behavioral biometrics such as voice recognition, hand signature and typing behavior. Signature recognition belongs to this last category and according to market share reports[4] it is the second most important within this group, just behind speech recognition and over keystroke, gait, gesture, etc.




for more http://findarticlesp/articles/mi_7109/is_2_6/ai_n28552271/
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: e mine novel web mining approach, ieee paper for signature verification using neural networks seminar topic, e mine a novel web mining approach definition, bodedo malaysia, enable talking glove seminar report download, signature verification using ann on ppt, data verification and control system for automobiles,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Block Chain and Data Science jntuworldforum 0 8,109 06-10-2018, 12:15 PM
Last Post: jntuworldforum
  Host-Based Intrusion Detection Using user signatures nit_cal 2 2,397 06-10-2016, 10:27 AM
Last Post: ijasti
  Data Encryption Standard (DES) seminar class 2 9,362 20-02-2016, 01:59 PM
Last Post: seminar report asees
  Multi signature smart paper boy 2 2,073 11-01-2016, 02:00 PM
Last Post: seminar report asees
  Skin Tone based Secret Data hiding in Images seminar class 9 7,030 23-12-2015, 04:18 PM
Last Post: HelloGFS
  Implementation of Diffie-Hellman Key Exchange on Wireless Sensor Using Elliptic Curv project report helper 2 3,165 31-10-2015, 02:16 PM
Last Post: seminar report asees
  Digital Signature Full Seminar Report Download computer science crazy 20 44,327 16-09-2015, 02:51 PM
Last Post: seminar report asees
  Dynamic Search Algorithm in Unstructured Peer-to-Peer Networks seminar surveyer 3 2,833 14-07-2015, 02:24 PM
Last Post: seminar report asees
  Heterogeneous Wireless Sensor Networks in a Tele-monitoring System for Homecare electronics seminars 2 2,568 26-02-2015, 08:03 PM
Last Post: Guest
Brick XML Data Compression computer science crazy 2 2,393 07-10-2014, 09:26 PM
Last Post: seminar report asees

Forum Jump: