<?xml version="1.0" encoding="utf-8"?><!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2d1 20170631//EN" "JATS-journalpublishing1.dtd">
<ArticleSet>
  <Article>
    <Journal>
      <PublisherName>IJIRCSTJournal</PublisherName>
      <JournalTitle>International Journal of Innovative Research in Computer Science and Technology</JournalTitle>
      <PISSN>I</PISSN>
      <EISSN>S</EISSN>
      <Volume-Issue>Volume 3 Issue 3</Volume-Issue>
      <PartNumber/>
      <IssueTopic>Electronics and Communication Engineering</IssueTopic>
      <IssueLanguage>English</IssueLanguage>
      <Season>May - June 2015</Season>
      <SpecialIssue>N</SpecialIssue>
      <SupplementaryIssue>N</SupplementaryIssue>
      <IssueOA>Y</IssueOA>
      <PubDate>
        <Year>2019</Year>
        <Month>12</Month>
        <Day>02</Day>
      </PubDate>
      <ArticleType>Computer Sciences</ArticleType>
      <ArticleTitle>Image Processing for Signature Verification</ArticleTitle>
      <SubTitle/>
      <ArticleLanguage>English</ArticleLanguage>
      <ArticleOA>Y</ArticleOA>
      <FirstPage>127</FirstPage>
      <LastPage>129</LastPage>
      <AuthorList>
        <Author>
          <FirstName> Pallavi V. Hatkar</FirstName>          
          <AuthorLanguage>English</AuthorLanguage>
          <Affiliation/>
          <CorrespondingAuthor>Y</CorrespondingAuthor>
          <ORCID/>
                      <FirstName>Zareen J Tamboli</FirstName>          
          <AuthorLanguage>English</AuthorLanguage>
          <Affiliation/>
          <CorrespondingAuthor>N</CorrespondingAuthor>
          <ORCID/>
           
        </Author>
      </AuthorList>
      <DOI></DOI>
      <Abstract>As signature is the primary mechanism both for authentication and authorization in legal transactions, the need for efficient auto-mated solutions for signature verification has increased [3]. Unlike a password, PIN, PKI or key cards &amp;ndash; identification data that can be forgotten, lost, stolen or shared &amp;ndash; the captured values of the handwritten signature are unique to an individual and virtually impossible to duplicate. The primary advantage that signature verification systems have over other type&amp;rsquo;s technologies is that signatures are already accepted as the common method of identity verification [4]. A signature verification system and the techniques used to solve this problem can be divided into two classes Online and Off-line [5].On-line approach uses an electronic tablet and a stylus connected to a computer to extract information about a signature and takes dynamic information like pressure, velocity, speed of writing etc. for verification purpose. Whereas Off- line signature verification involves less electronic control and uses signature images captured by scanner or camera. An offline signature verification system uses features extracted from scanned signature image. In this only the pixel image needs to be evaluated.</Abstract>
      <AbstractLanguage>English</AbstractLanguage>
      <Keywords>Artificial Neural Network, Average Error verification rate, Handwritten Signature Verification Probabilistic Neural Network</Keywords>
      <URLs>
        <Abstract>https://ijircst.org/abstract.php?article_id=213</Abstract>
      </URLs>      
    </Journal>
  </Article>
</ArticleSet>