Signature Verification using SVM Classifier
DOI:
https://doi.org/10.32628/CSEIT241061164Abstract
This review examines the use of Support Vector Machine (SVM) classification for automated handwritten signature verification, a vital aspect of biometric authentication and fraud detection. Addressing challenges like intra-class variations and inter-class similarities, the system leverages MATLAB's SVM framework with image preprocessing techniques, including dimensional standardization (100x100 pixels), grayscale conversion, and vector transformation for feature extraction. Using a linear kernel, the SVM effectively constructs optimal hyperplanes to distinguish genuine signatures from forgeries with high accuracy and computational efficiency. The system excels in handling variations in signature styles and writing pressure, demonstrating robust performance through empirical testing and comparisons with recent studies. Future improvements could explore advanced feature extraction, alternative kernel functions, and deep learning integration to enhance reliability in real-world applications. This review underscores SVM's effectiveness as a reliable tool for biometric authentication.
Downloads
References
Tomislav Fotak, Miroslav Bača, Petra Koruga” Handwritten signature identification using basic concepts of graph theory”, Varaždin, Croatia, 2010.
A. Piyush Shanker, A.N. Rajagopalan, “Offline signature verification using DTW “, 2017.
Anil K. Jain, Arun Ross, Salil Prabhakar,”An Introduction to biometric recognition”, 2004. DOI: https://doi.org/10.1109/TCSVT.2003.818349
Nalini K. Ratha, Jonathan Connell, Ruud M. Bolle, “An analysis of minutiae matching strength“2001. DOI: https://doi.org/10.1007/3-540-45344-X_32
Battista Biggio,Giorgio Fumera,Paolo Russu, Luca Didaci, and Fabio Roli “Adversarial Biometric Recognition: A review on biometric system security from the adversarial machine- learning perspective”, 2015. DOI: https://doi.org/10.1109/MSP.2015.2426728
Christian Szegedy, Wojciech Zaremba,”Intriguing Properties of Neural Networks “, 2014.
Ian J. Goodfellow, Jonathon Shlens & Christian SzegedyGoogle Inc., Mountain View, CA “Explaining and Harnessing Adversarial Examples”, 2015.
Aleksander Madry, Dimitris Tsipras, “Towards Deep Learning Models Resistant to Adversarial Attacks”, 2018.
M.S. Haroon, H.M. Ali, “Ensemble Adversarial Training: Attacks and Defenses", 2023.
Nicholas Carlini, David Wagner, “Adversarial Examples Are Not Easily Detected: Bypassing Ten Detection Methods”, 2017. DOI: https://doi.org/10.1145/3128572.3140444
Downloads
Published
Issue
Section
License
Copyright (c) 2024 International Journal of Scientific Research in Computer Science, Engineering and Information Technology
This work is licensed under a Creative Commons Attribution 4.0 International License.