A Comparative Analysis of Signature Recognition Methods

A Comparative Analysis of Signature Recognition Methods

Ishrat Nabi, Akib Mohi Ud Din Khanday, Ishrat Rashid, Fayaz Ahmed Khan, Rumaan Bashir
ISBN13: 9781668472163|ISBN10: 1668472163|ISBN13 Softcover: 9781668472170|EISBN13: 9781668472187
DOI: 10.4018/978-1-6684-7216-3.ch007
Cite Chapter Cite Chapter

MLA

Nabi, Ishrat, et al. "A Comparative Analysis of Signature Recognition Methods." Recent Advancements in Multimedia Data Processing and Security: Issues, Challenges, and Techniques, edited by Ahmed A. Abd El-Latif, et al., IGI Global, 2023, pp. 142-165. https://doi.org/10.4018/978-1-6684-7216-3.ch007

APA

Nabi, I., Khanday, A. M., Rashid, I., Khan, F. A., & Bashir, R. (2023). A Comparative Analysis of Signature Recognition Methods. In A. Abd El-Latif, M. Ahmad Wani, Y. Maleh, & M. El-Affendi (Eds.), Recent Advancements in Multimedia Data Processing and Security: Issues, Challenges, and Techniques (pp. 142-165). IGI Global. https://doi.org/10.4018/978-1-6684-7216-3.ch007

Chicago

Nabi, Ishrat, et al. "A Comparative Analysis of Signature Recognition Methods." In Recent Advancements in Multimedia Data Processing and Security: Issues, Challenges, and Techniques, edited by Ahmed A. Abd El-Latif, et al., 142-165. Hershey, PA: IGI Global, 2023. https://doi.org/10.4018/978-1-6684-7216-3.ch007

Export Reference

Mendeley
Favorite

Abstract

Signature recognition is the process of automatically identifying or verifying an individual's signature to determine its authenticity. The basic motivation of developing signature recognition systems is to check whether a signature has been done by an authorized user /genuine user or an unauthorized user/a forger. The objective of this chapter is to study different algorithms that are used to authenticate and authorize the signatures of the individual. For personal identification and verification, Signatures are the most acceptable and economical way that is used for this purpose. Signature verification is used for documents like bank transactions and in offices as well. It is a huge time-consuming task for verifying a large number of documents. Hence the verification systems led to huge dramatic changes based on the physical characteristics and the behavioural characteristics of the individual. The verification methods used in the past suffer from flaws. This chapter provides a comparative analysis of various techniques used for recognizing signatures.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.