SlideShare a Scribd company logo
2
Most read
4
Most read
10
Most read
Submitted By:
NAVEEN TOKAS
 Computers are largely used in almost each and
every field including financial transactions,
thus providing additional security measures
for computer system is necessary.
 The security measures to be used must be
cheap, reliable and un-intrusive to the
authorized person. The technique which
meets these requirements is handwritten
signature verification.
 Everyday transaction
 Individuals less likely to object
 Individual’s signature is unique
 Less controversial
 Offline Signature Verification
deals with shape only
 Online signature Verification
deals with dynamic features like speed, pen
pressure, directions, stroke length, and when the
pen is lifted from the paper
 The main challenge with online Signature
Identification technology is differentiating between
the consistent parts of the signature and the
behavioral parts of the signature that vary with
each signing . A person’s signature is never entirely
the same. The signature can vary substantially over
an individual’s lifetime. Allowing for these
variations while providing protection against forgers
is a challenging task.
 Signature Acquisition
 Signature Identification using global features
 average pressure
 pen tilt
 average velocity
 Number of pen ups
 Training
Signature verification
 Low error rate.
 Forgery is detected even when the forger has
managed to get a copy of the authentic
signature.
 Fast and simple training.
 Cheap hardware.
 Little storage requirements.
Signature verification
Signature verification

More Related Content

PPTX
Bike-Riders-Helmet-Detection-2 (1).pptx
PPTX
Cybersecurity artificial intelligence presentation
PPTX
Machine Learning for Disease Prediction
PPTX
Biometric Signature Recognization
PPT
Training management
PDF
Structure du rapport d'etat d'avancement doctorat
PPTX
Powerpoint presentation on E-Waste 2017
PPT
Business writing power point presentation
Bike-Riders-Helmet-Detection-2 (1).pptx
Cybersecurity artificial intelligence presentation
Machine Learning for Disease Prediction
Biometric Signature Recognization
Training management
Structure du rapport d'etat d'avancement doctorat
Powerpoint presentation on E-Waste 2017
Business writing power point presentation

What's hot (20)

PPTX
Handwritten Character Recognition
PDF
Fingerprint recognition
PPTX
Keystroke dynamics
PPT
Sign verification
PPTX
Handwriting Recognition
PPTX
Signature recognition
PPTX
Handwriting Recognition Using Deep Learning and Computer Version
PPTX
Biometric technology
PPTX
Off-line Signature Verification
PPTX
Fingerprint recognition presentation
PPT
Online signature recognition
PDF
Counterfeit Currency Detection
PPTX
Text Detection and Recognition
PPTX
Pattern recognition 3d face recognition
PPT
Bio-metrics Authentication Technique
PPTX
Currency recognition using image processing in MATLAB
PPT
Credit card fraud detection pptx (1) (1)
PPTX
Multi modal biometric system
PPTX
Fingerprint
PPTX
Pattern recognition facial recognition
Handwritten Character Recognition
Fingerprint recognition
Keystroke dynamics
Sign verification
Handwriting Recognition
Signature recognition
Handwriting Recognition Using Deep Learning and Computer Version
Biometric technology
Off-line Signature Verification
Fingerprint recognition presentation
Online signature recognition
Counterfeit Currency Detection
Text Detection and Recognition
Pattern recognition 3d face recognition
Bio-metrics Authentication Technique
Currency recognition using image processing in MATLAB
Credit card fraud detection pptx (1) (1)
Multi modal biometric system
Fingerprint
Pattern recognition facial recognition
Ad

Viewers also liked (20)

PPTX
Signature verification in biometrics
PDF
Offline Signature Verification and Recognition using Neural Network
PDF
Offline Handwritten Signature Identification and Verification using Multi-Res...
PDF
ONLINE SIGNATURE BASED APPLICATION LOCKING SYSTEM
PDF
Programme STRP SCENE #2
PDF
Features for Detecting Malware on Computing Environments
PDF
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
PPT
Retinal Recognition
PPTX
Malware Detection Using Machine Learning Techniques
DOCX
Ip traceback seminar full report
PPTX
Jamming aware traffic allocation for multiple-path routing using portfolio se...
PPTX
BIOMETRIC IDENTIFICATION IN ATM’S PPT
PPTX
Biometric authentication ppt by navin 6 feb
PPT
Fingerprint recognition
PPT
A study on biometric authentication techniques
PPTX
Electronic banking presentation
PPTX
Internet Banking
PPT
Biometric's final ppt
PPTX
E banking
PPT
Fingerprint Recognition Technique(PPT)
Signature verification in biometrics
Offline Signature Verification and Recognition using Neural Network
Offline Handwritten Signature Identification and Verification using Multi-Res...
ONLINE SIGNATURE BASED APPLICATION LOCKING SYSTEM
Programme STRP SCENE #2
Features for Detecting Malware on Computing Environments
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
Retinal Recognition
Malware Detection Using Machine Learning Techniques
Ip traceback seminar full report
Jamming aware traffic allocation for multiple-path routing using portfolio se...
BIOMETRIC IDENTIFICATION IN ATM’S PPT
Biometric authentication ppt by navin 6 feb
Fingerprint recognition
A study on biometric authentication techniques
Electronic banking presentation
Internet Banking
Biometric's final ppt
E banking
Fingerprint Recognition Technique(PPT)
Ad

Similar to Signature verification (20)

PPTX
Signature Verification.pptx
PPTX
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
PDF
Are E-signatures Worth it?
PDF
xyzmo Company Overview
PPTX
Seminar-Two Factor Authentication
PDF
Eezi sign WEB
PDF
Signature Capture for iPad and Android - Sign on the Dotted Screen
PPTX
Advanced Security with Fingerprint Access Control
PPTX
Two factor authentication presentation mcit
PDF
The Ultimate Guide to Digital Signatures
PDF
The ultimate guide to digital signatures
PDF
Two Factor Authentication Using Smartphone Generated One Time Password
PPTX
Jiit;project 2013-2014;cse;project presentation
PDF
Paper id 35201568
PDF
#MFSummit2016 Secure: Mind the gap strengthening the information security model
PPSX
Welcome to the 3rd generation in user authentication
PPTX
Pattern recognition on line signature
PDF
Multi Factor Authentication Whitepaper Arx - Intellect Design
PDF
DrySign E-signatures: The Mobile Solution for Modern Businesses
Signature Verification.pptx
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Are E-signatures Worth it?
xyzmo Company Overview
Seminar-Two Factor Authentication
Eezi sign WEB
Signature Capture for iPad and Android - Sign on the Dotted Screen
Advanced Security with Fingerprint Access Control
Two factor authentication presentation mcit
The Ultimate Guide to Digital Signatures
The ultimate guide to digital signatures
Two Factor Authentication Using Smartphone Generated One Time Password
Jiit;project 2013-2014;cse;project presentation
Paper id 35201568
#MFSummit2016 Secure: Mind the gap strengthening the information security model
Welcome to the 3rd generation in user authentication
Pattern recognition on line signature
Multi Factor Authentication Whitepaper Arx - Intellect Design
DrySign E-signatures: The Mobile Solution for Modern Businesses

More from NAVEEN TOKAS (12)

PPTX
Leakage power optimization for ripple carry adder
PPTX
Implementation of size reduction techniques in microstrip patch antennas
PPTX
Cardiac Image Analysis based on K Means Clustering
PPTX
ALGORITHM LEVEL ANALYSIS and DATA CORRELATION
PPTX
Low power VLSI Degisn
PPT
CHRACTERISTICS OF MEASURING INSTRUMENTS by NAVEEN TOKAS
PPTX
PRESSURE MEASUREMENY by NAVEEN TOKAS
PPTX
CHANNEL EQUALIZATION by NAVEEN TOKAS
PPTX
Communication skills ppt by naveen tokas
PPTX
BOOK on RANI MUKHERJEE BY NAVEEN TOKAS
PPTX
JAVA PPT by NAVEEN TOKAS
PPTX
php with wordpress and mysql ppt by Naveen Tokas
Leakage power optimization for ripple carry adder
Implementation of size reduction techniques in microstrip patch antennas
Cardiac Image Analysis based on K Means Clustering
ALGORITHM LEVEL ANALYSIS and DATA CORRELATION
Low power VLSI Degisn
CHRACTERISTICS OF MEASURING INSTRUMENTS by NAVEEN TOKAS
PRESSURE MEASUREMENY by NAVEEN TOKAS
CHANNEL EQUALIZATION by NAVEEN TOKAS
Communication skills ppt by naveen tokas
BOOK on RANI MUKHERJEE BY NAVEEN TOKAS
JAVA PPT by NAVEEN TOKAS
php with wordpress and mysql ppt by Naveen Tokas

Recently uploaded (20)

PDF
Integrating Fractal Dimension and Time Series Analysis for Optimized Hyperspe...
PPTX
communication and presentation skills 01
PPTX
Fundamentals of safety and accident prevention -final (1).pptx
PDF
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
PDF
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
PDF
Categorization of Factors Affecting Classification Algorithms Selection
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PPTX
Nature of X-rays, X- Ray Equipment, Fluoroscopy
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
UNIT 4 Total Quality Management .pptx
PDF
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
PDF
Exploratory_Data_Analysis_Fundamentals.pdf
PPT
introduction to datamining and warehousing
PDF
86236642-Electric-Loco-Shed.pdf jfkduklg
PPT
INTRODUCTION -Data Warehousing and Mining-M.Tech- VTU.ppt
PDF
UNIT no 1 INTRODUCTION TO DBMS NOTES.pdf
PPT
Total quality management ppt for engineering students
PDF
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
PDF
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
Integrating Fractal Dimension and Time Series Analysis for Optimized Hyperspe...
communication and presentation skills 01
Fundamentals of safety and accident prevention -final (1).pptx
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
Categorization of Factors Affecting Classification Algorithms Selection
R24 SURVEYING LAB MANUAL for civil enggi
Nature of X-rays, X- Ray Equipment, Fluoroscopy
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
UNIT 4 Total Quality Management .pptx
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
Exploratory_Data_Analysis_Fundamentals.pdf
introduction to datamining and warehousing
86236642-Electric-Loco-Shed.pdf jfkduklg
INTRODUCTION -Data Warehousing and Mining-M.Tech- VTU.ppt
UNIT no 1 INTRODUCTION TO DBMS NOTES.pdf
Total quality management ppt for engineering students
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx

Signature verification

  • 2.  Computers are largely used in almost each and every field including financial transactions, thus providing additional security measures for computer system is necessary.  The security measures to be used must be cheap, reliable and un-intrusive to the authorized person. The technique which meets these requirements is handwritten signature verification.
  • 3.  Everyday transaction  Individuals less likely to object  Individual’s signature is unique  Less controversial
  • 4.  Offline Signature Verification deals with shape only  Online signature Verification deals with dynamic features like speed, pen pressure, directions, stroke length, and when the pen is lifted from the paper
  • 5.  The main challenge with online Signature Identification technology is differentiating between the consistent parts of the signature and the behavioral parts of the signature that vary with each signing . A person’s signature is never entirely the same. The signature can vary substantially over an individual’s lifetime. Allowing for these variations while providing protection against forgers is a challenging task.
  • 6.  Signature Acquisition  Signature Identification using global features  average pressure  pen tilt  average velocity  Number of pen ups  Training
  • 8.  Low error rate.  Forgery is detected even when the forger has managed to get a copy of the authentic signature.  Fast and simple training.  Cheap hardware.  Little storage requirements.