Off-Line Signature Recognition

Off-Line Signature Recognition

Indrani Chakravarty (Indian Institute of Technology, India), Nilesh Mishra (Indian Institute of Technology, India), Mayank Vatsa (Indian Institute of Technology, India), Richa Singh (Indian Institute of Technology, India) and P. Gupta (Indian Institute of Technology, India)
Copyright: © 2005 |Pages: 6
DOI: 10.4018/978-1-59140-557-3.ch165
OnDemand PDF Download:
No Current Special Offers


The most commonly used protection mechanisms today are based on either what a person possesses (e.g. an ID card) or what the person remembers (like passwords and PIN numbers). However, there is always a risk of passwords being cracked by unauthenticated users and ID cards being stolen, in addition to shortcomings like forgotten passwords and lost ID cards (Huang & Yan, 1997). To avoid such inconveniences, one may opt for the new methodology of Biometrics, which though expensive will be almost infallible as it uses some unique physiological and/or behavioral (Huang & Yan, 1997) characteristics possessed by an individual for identity verification. Examples include signature, iris, face, and fingerprint recognition based systems.

Complete Chapter List

Search this Book: