Novel Approach to Dynamic Signature Verification Using Sensor-Based Data glove
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
project report helper
Active In SP

Posts: 2,270
Joined: Sep 2010
01-11-2010, 10:47 AM


Novel Approach to Dynamic Signature Verification Using Sensor-Based Data glove

1Shohel Sayeed, 2Nidal S. Kamel and 3Rosli Besar
1Faculty of Information Science and Technology, Multimedia University,
Jalan Ayer Keroh Lama, 75450 Melaka, Malaysia
2 Department of Electrical and Electronic Engineering, Universiti Teknologi PETRONAS,
Bandar Seri Iskandar, 31750 Tronoh, Perak, Malaysia
3Faculty of Engineering and Technology, Multimedia University,
Jalan Ayer Keroh Lama, 75450 Melaka, Malaysia

Abstract: Data glove is a new dimension in the field of virtual reality environments, initially designed
to satisfy the stringent requirements of modern motion capture and animation professionals. In this
study we try to shift the implementation of data glove from motion animation towards signature
verification problem, making use of the offered multiple degrees of freedom for each finger and for the
hand as well. We used an SVD-based technique to extract the feature values of different sensors’
locating on corresponding fingers in the signing process and evaluated the results for writer
authentication. The technique is tested with large number of authentic and forgery signatures using
data gloves with 14, 5 and 4 sensor and shows a significant level of accuracy with 2.46~5.0% of EER.


In early days, human beings were commonly identified by their names. As the human population increased, method of identifying a person became more sophisticated. People needed to be associated with more information such as family’s background, nationality, gender, age and blood group to label each and every human being as the unique person in the world. The problem of personal identification is multiplied when computer comes into the communication channel of two parties. For this reason, more reliable authentication scheme is needed to build up the required trust of communication link. Password, PINs and token are examples of traditional authentication technology. However, these methods have major drawbacks as passwords and PINs tend to be forgotten or shared out whereas token can be easily lost or stolen. Alternatively, biometry offers potential for automatic personal verification and differently from other biometric means it is not based on the possession of anything or the knowledge of some information. People recognition by means of biometrics[1-3] can be split into two main categories: a) Passive or Physiological biometrics such as face recognition, fingerprint, iris or retina, hand geometry, off-line hand signature and DNA (Deoxyribonucleic Acid) analysis.b) Active or Behavioral biometrics such as voice recognition, hand signature and typing behavior. Signature recognition belongs to this last category and according to market share reports[4] it is the second most important within this group, just behind speech recognition and over keystroke, gait, gesture, etc.

for more

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Tagged Pages: dynamic signature verification using pattern recognition, dynamic signature verification, signature verification, dynamic sign verification project abstract, project report for data glove, ppt on dynamic signature verification techniques,
Popular Searches: data verification techiniques checksum, a novel approach for texture retrival, robustness of verification of signature based on gray level, advantages of signature verification using pen type sensors full report, ppts on signature verification using ann, novel light based sensor information transmission system, authentication signature verification and language translation using dynamic virtual keyboard ppt,

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Cut Detection in Wireless Sensor Networks pdf project girl 2 1,219 16-07-2015, 09:21 PM
Last Post: Guest
  Wireless Sensor Network Security model using Zero Knowledge Protocol seminar ideas 2 1,412 31-03-2015, 09:08 AM
Last Post: Guest
  mobile data internetworking standards jaseelati 0 300 29-01-2015, 01:15 PM
Last Post: jaseelati
  cloud data protection for the masses project documentation jaseelati 0 305 21-01-2015, 04:19 PM
Last Post: jaseelati
  computational intelligence in wireless sensor networks ppt jaseelati 0 351 10-01-2015, 03:10 PM
Last Post: jaseelati
  3d optical data storage technology seminar report jaseelati 0 393 06-01-2015, 04:47 PM
Last Post: jaseelati
  3d optical data storage technology seminar report jaseelati 0 307 30-12-2014, 03:23 PM
Last Post: jaseelati
  Towards Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks seminar ideas 11 3,911 02-04-2014, 12:50 PM
Last Post: Guest
  Bluetooth Based Smart Sensor Networks (Download Full Seminar Report) Computer Science Clay 91 68,780 04-03-2014, 12:46 AM
Last Post: nikhil goyal
  Intrusion Detection: An Energy Efficient Approach in Heterogeneous WSN pdf study tips 1 924 09-02-2014, 05:40 PM
Last Post: Guest