Font Size: a A A

Signature Authentication Method Research Based On Tip Trajectory Of Signature

Posted on:2017-03-21Degree:MasterType:Thesis
Country:ChinaCandidate:Z B ChenFull Text:PDF
GTID:2308330503486817Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
In today’s world, technology has brought significant changes to our daily life. Meanwhile, it appears a dramatical growth of both varying interpersonal communication and business activities in economic society. Therefore, the identity authentication becomes more important due to the fact that it is a certain way to make people identified appropriately. It also brings much positive effects to study identity authentication. Signature verification plays an important role in the daily activities which is considered as a traditional way to identify people. Generally, traditional online signature verification involves two ways. First, off-line verification by submitting the signature of picture. Second,gathering the dynamic data which generated during writing on writing board, is used to identify. This paper discusses the approach in handwriting signature verification, which is based on the movement of nip in signature videos.In the beginning, I will give an introduction of nip movement video system. It shows some similarities and differences compared to traditional online signature. Nip movement video system picks up the movement of nip during writing from video. Nip movement refers to two dimensions, what the signature looks like and how the different strokes to be coherent. In consequence, the nip movement video system is recognized as an extraordinary way in identifying authentication.This kind of system uses the mobile phones to extract the movement of signature to make sure the original location of first frame. In my paper, I assume that the nip movement system is an effective method to identify the signature though four steps. First, recognizing the color of the signature picture to find the nip’s original place approximately,further, using the prior knowledge of nip shapes to definite the original place of nip. Second, acquiring time series of nip movement by summarizing the object tracking method and applying nuclear related filtering method. Third, For data get from tracking, we can do preprocessing operations for example rotation, interpolation and normalization Fourth.categorizing and extracting the time series of nip movement. This paper defines the micro stokes as the smallest unit to match the nip movement, then respectively applying lcs and surf. Eventually, using the match results to identify authentication.The study results illustrate there are three advantages by using nip movement system. Firstly, the method robustness.Secondly, tracking nip method could be an effective and quick way to track the nip movement. Thirdly, lcs and surf could be combined and blended methods to match the appropriate identity authentication, as well as stay competitive.
Keywords/Search Tags:signature verification, target tracking, kernelized correlation filters
PDF Full Text Request
Related items