<?xml version="1.0" encoding="utf-8"?><!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2d1 20170631//EN" "JATS-journalpublishing1.dtd">
<ArticleSet>
  <Article>
    <Journal>
      <PublisherName>IJIRCSTJournal</PublisherName>
      <JournalTitle>International Journal of Innovative Research in Computer Science and Technology</JournalTitle>
      <PISSN>I</PISSN>
      <EISSN>S</EISSN>
      <Volume-Issue>Volume 10 Issue 2</Volume-Issue>
      <PartNumber/>
      <IssueTopic>Management</IssueTopic>
      <IssueLanguage>English</IssueLanguage>
      <Season>March - April 2022</Season>
      <SpecialIssue>N</SpecialIssue>
      <SupplementaryIssue>N</SupplementaryIssue>
      <IssueOA>Y</IssueOA>
      <PubDate>
        <Year>2022</Year>
        <Month>05</Month>
        <Day>26</Day>
      </PubDate>
      <ArticleType>Computer Sciences</ArticleType>
      <ArticleTitle>A Comprehensive Review of Various Security Features</ArticleTitle>
      <SubTitle/>
      <ArticleLanguage>English</ArticleLanguage>
      <ArticleOA>Y</ArticleOA>
      <FirstPage>57</FirstPage>
      <LastPage>61</LastPage>
      <AuthorList>
        <Author>
          <FirstName>Jaskirandeep kaur Jossan</FirstName>          
          <AuthorLanguage>English</AuthorLanguage>
          <Affiliation/>
          <CorrespondingAuthor>Y</CorrespondingAuthor>
          <ORCID/>
             
        </Author>
      </AuthorList>
      <DOI> https://doi.org/10.55524/ijircst.2022.10.2.11</DOI>
      <Abstract>In recent decades the subject of &amp;quot;handwritten authentication verification&amp;quot; has been investigated extensively, although there is still an open research issue. People are familiar with stylus and paperwork for legal transaction certification and approval. Due to the expansion of the usage of handwritten authentications, it is necessary to identify authentications by a person manually. Authentication is a social biometric which is defined by a social characteristic that a person learns over time and becomes his unique identity. This article explains the significance of the offline system and gives an overview of several methods in many areas. As this is a region under consideration, the overview deals with a number of examples. The objective of an independent confirmation system is to distinguish whether a given authentication can be certified or duplicated. The result was a tough task in particular in the offline (static) scenario, where the dynamic data about the objectivism process is not available. Although extensive research has been done in this field but there are more opportunities of more research in future.</Abstract>
      <AbstractLanguage>English</AbstractLanguage>
      <Keywords>Authentication, Biometric, Duplicity, Identification, Validation, Verification.</Keywords>
      <URLs>
        <Abstract>https://ijircst.org/abstract.php?article_id=841</Abstract>
      </URLs>      
    </Journal>
  </Article>
</ArticleSet>