Font Size: a A A

Offline Chinese Signature Identification

Posted on:2005-04-09Degree:MasterType:Thesis
Country:ChinaCandidate:G S WangFull Text:PDF
GTID:2208360122495468Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The information technologies are now more and more blended into our daily life as the coming of electronic era. Traditional security ways, such as PIN code, are no longer reliable and difficult to satisfy the complex behaviors of e-commerce and information security. Unlike PIN code or passwords, biometrics can not be easily duplicated or stolen. Hence, they are more trustworthy and secure for identity verification.There are various kinds of biometrics that can be utilized for personal identification. With the popularity of credit cards, signature plays a very important role in authenticity and authorization. People are getting more familiar with the process of handwritten signature verification. In this thesis, we will study the off-line Chinese signature.In this article, an off-line Chinese signature verification system based on pseudo feature and shape feature extraction is introduced, furthermore, we adopted 2-pass verification method. As the writing styles are different, our signatures have their characteristics. The optional copy is easily identified using shape features. But it is difficult to find the intentional copies only using shape features. Imitating the writing press, peed and other dynamic features is difficult leads to superficially similar signatures have much difference. So we combine shape features with pseudo features to verify the signature. By this way we improve the ability of the signature verification system.We try to improve the speed by using 2-pass verifying. It requires order the extracted features in advance. Then we can only extract those important features while verifying to classify the unknown signature. We shortened the time need for verification without descending the correct verification rate.
Keywords/Search Tags:Chinese signature verification, feature extraction, pattern recognition, 2-pass system, offline recognition
PDF Full Text Request
Related items