Computer Science

Design and Implementation of a Signature Recognition and Verification System

Design and Implementation of a Signature Recognition and Verification System (A Case Study of Lapo Microfinance Bank)

ABSTRACT

For effective identification of a specify person, signatures have proven to be a significant biometric. The signature of an individual is a significant biometric attribute of a person which can be used to authenticate human identity. Furthermore, individual signatures can be dealt as a picture and recognized using a computer software. With the evolution of modern computers, there is need to develop fast algorithms for signature recognition. They are different ways to deal with signature acknowledgment with a lot of scope of research. In this paper, signature verification and is considered as a means to fight signature forgery, where the signature is captured and verified by the system in an image format. Signatures are verified dependent on parameters recovered from the signature using various image processing techniques. This paper presents a case study on signature verification method for verifying signatures using a verification system.

CHAPTER ONE

INTRODUCTION

1.1 BACKGROUND OF THE STUDY

Step by step, direct and secure access to interconnected frameworks is ending up increasingly. It is also necessary to check and verify people’s identity in a quick, simple, easy to use and user-friendly way. To accomplish more reliable verification or identification we should utilize something that exceptionally fast and recognizes the given person in split seconds. Authentication is the way towards proving, verifying and checking ones identity. It can be very well sorted or categorized in three types: something we know, similar to passwords; something we have, like a bus tickets or tokens; and, something we are, similar to our face, voice, signatures, etc. The third type is also known as Biometric. Together, these sorts are known as 3 factors of confirmation. Biometrics implies the programmed proof of an individual person based on his/her physiological or social attributes. This strategy of verification is preferred over conventional methods. Including and users passwords and PIN numbers for its exactness and case affectability. A biometric structure is fundamentally a model for example acknowledgment framework which makes an individual distinguishing proof by deciding the realness of a particular physiological or social trademark controlled by the client. These attributes are quantifiable and special Identification should be possible utilizing an individual’s character dependent on biometric estimations.

The comparator matches the got biometric with the ones took on the database utilizing a 1: N coordinating calculation for distinguishing proof. Verification involves the process of confirming or denying a person’s claimed identity. The biometric data obtained from the user is compared to the user’s data already stored in the database. In examination with other already adopted biometric verification techniques, signature confirmation presents numerous possible points of interest like these days it is a socially acknowledged strategy as of now being used in banks and credit exchange. Additionally, it is helpful for a large portion of the new age of versatile PCs and individual computerized collaborators (PDAs) use and composing as the primary information channel. A mark might be changed by the client. Likewise to a secret key while it is absurd to expect to change fingerprints iris or retina designs. In mark confirmation, written by hand mark is regularly utilized and acknowledged as an approach to check individuals’ character. Mark check more often than not comprises just of an “eye examination” as though we analyzed two photos, however this isn’t an effective technique against imposters.

Document inspectors normally contrast a suspect signature with few case of legitimate signatures. They search for indications of falsification which incorporate (I) signature composed at higher paces than ordinary, (ii) adjusted endings and beginnings, (iii) poor line quality with shaking of line and (iv) stops in spots where composing ought to be free. All signatures that can be utilized for confirmation are put away in a mark database. The framework utilizes a database, wherein every individual has 25 genuine marks. Simultaneously, every individual makes 5 phonies of everything about/her 5 quickly past sections in the database. This implies for each individual we have 25 genuine marks and 25 fabrications made by 5 unique individuals. Likewise the productivity of this framework is more as the counterfeiter attempts a few times to mimic the genuine client’s mark before the falsification is gained lastly put away in the database.

1.2 PROBLEM STATEMENT

Signature confirmation procedures utilize many different characteristics of an individual’s signature in order to verify that individual. The advantages of using such an authentication techniques are as follows:

(i) Signatures are widely acknowledged by society as a type of verification and identification.

(ii) Information required for identification is not sensitive.

(iii) Forging of one’s signature does not mean a long-life loss of that one’s personality.

The essential idea of this paper is to investigate a signature verification technique which is not expensive to develop, reliable regardless of the individual, whether under different emotions, user friendly in terms of configuration, and robust against frauds.

1.3 AIMS AND OBJECTIVE OF THE STUDY

The main aim of the signature recognition and verification is to be capable of efficiently addressing two objective but strongly related tasks:

(a) Identification of the signature owner, and,

(b) Decision whether the signature is genuine or forger.

1.4 SCOPE OF THE STUDY

The scope of the research is focused on designing and implementing a signature recognition and verification system for signature recognition using innovative technology as a significance tool to drive quality of signatory using a financial institution LAPO Microfinance bank, Nigeria.

1.5 LIMITATION OF THE STUDY

During the cause of the study, I encountered they major challenges:

Data collection from the financial institution was not easy to get since the materials where sensitive.
Lack of time both in combining academy work with conducting the research.
Poor Internet Network and many more.

1.6 DEFINITION OF TERMS

– Financial Institution: Financial institution is a company engaged in the business of dealing with financial and monetary transactions such as deposits, loans, investments, and currency exchange.

– Signature: It is a handwritten (and often stylized) depiction of someone’s name, nickname, or even a simple “X” or other mark that a person writes on documents as a proof of identity and intent.

– Identification: The action or process of identifying someone or something or the fact of being identified.

– Authentication: The process or action of proving or showing something to be true, genuine, or valid.

– Forgery: The action of forging a copy or imitation of a document, signature, banknote, or work of art.

– Identity: Identity is the qualities, beliefs, personality, looks and/or expressions that make a person.



Copyright © 2021 Author(s) retain the copyright of this article.
This article is published under the terms of the Creative Commons Attribution License 4.0

WeCreativez WhatsApp Support
We are here to answer your questions. Ask us anything!
Hi, how can we help?