Off-Line Signature Recognition

Off-Line Signature Recognition

Indrani Chakravarty, Nilesh Mishra, Mayank Vatsa, Richa Singh, P. Gupta
Copyright: © 2005 |Pages: 6
DOI: 10.4018/978-1-59140-557-3.ch165
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The most commonly used protection mechanisms today are based on either what a person possesses (e.g. an ID card) or what the person remembers (like passwords and PIN numbers). However, there is always a risk of passwords being cracked by unauthenticated users and ID cards being stolen, in addition to shortcomings like forgotten passwords and lost ID cards (Huang & Yan, 1997). To avoid such inconveniences, one may opt for the new methodology of Biometrics, which though expensive will be almost infallible as it uses some unique physiological and/or behavioral (Huang & Yan, 1997) characteristics possessed by an individual for identity verification. Examples include signature, iris, face, and fingerprint recognition based systems.

Complete Chapter List

Search this Book:
Reset