Open Access
Subscription Access
Signature Verification And Application In Data Encryption
This paper tells how the signature verification is used for security problems. An improved offline signature verification scheme is used which is based on the feature points. The scheme described gives the differences between the two types of original and forged signature. This method takes care of all types of forgeries done in the signature. The two parameters used in signature verification scheme are False Acceptance Rate (FAR) and False Rejection Ratio (FRR).
Keywords
Offline signature, FAR(False Acceptance Rate), Feature point, FRR(False Rejection Rate), Forgeries, Euclidean Distance model
User
Font Size
Information
Abstract Views: 117
PDF Views: 0