Open Access Open Access  Restricted Access Subscription Access

Signature Verification And Application In Data Encryption


 

This paper tells how the signature verification is used for security problems. An improved offline signature verification scheme is used which is based on the feature points. The scheme described gives the differences between the two types of original and forged signature. This method takes care of all types of forgeries done in the signature. The two parameters used in signature verification scheme are False Acceptance Rate (FAR) and False Rejection Ratio (FRR).

 


Keywords

Offline signature, FAR(False Acceptance Rate), Feature point, FRR(False Rejection Rate), Forgeries, Euclidean Distance model
User
Notifications
Font Size

Abstract Views: 117

PDF Views: 0




  • Signature Verification And Application In Data Encryption

Abstract Views: 117  |  PDF Views: 0

Authors

Abstract


This paper tells how the signature verification is used for security problems. An improved offline signature verification scheme is used which is based on the feature points. The scheme described gives the differences between the two types of original and forged signature. This method takes care of all types of forgeries done in the signature. The two parameters used in signature verification scheme are False Acceptance Rate (FAR) and False Rejection Ratio (FRR).

 


Keywords


Offline signature, FAR(False Acceptance Rate), Feature point, FRR(False Rejection Rate), Forgeries, Euclidean Distance model