To see the other types of publications on this topic, follow the link: Signature Authentication.

Journal articles on the topic 'Signature Authentication'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Signature Authentication.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

PU, Guangning, and Fengmei YIN. "An Anonymous Authentication Scheme with Selective Linkability and Threshold Traceability." Wuhan University Journal of Natural Sciences 28, no. 4 (2023): 317–23. http://dx.doi.org/10.1051/wujns/2023284317.

Full text
Abstract:
In order to protect the user's privacy identity, authentication requires anonymous authentication. Anonymous authentication is divided into unconditional anonymous authentication and traceable anonymous authentication. Unconditional anonymous authentication can verify that the user belongs to an anonymous set, but the user's true identity cannot be obtained. However, in some applications, it is necessary to trace the true identity of the user. Therefore, a traceable anonymous authentication scheme is proposed. In order to prevent random tracing, the proposed scheme uses threshold joint tracing
APA, Harvard, Vancouver, ISO, and other styles
2

Mohd Taib Wahid, Mohd Taib Wahid. "Enhancement of DTW Algorithm in on-Line Signature Mapping Using the Lost-Box Recovery Algorithm." journal of king abdulaziz university computing and information technology sciences 1, no. 2 (2012): 105–22. http://dx.doi.org/10.4197/comp.1-2.5.

Full text
Abstract:
Signature is a common practice as a way of identifies authentication or verification. Signature On-line validation and authentication is a field of authenticating the time series signature data which is generally acquired from the tablet-based device. Different from common traditional signature image, the on-line signature image data contain number of points that are arranged in sequence of time. The aim of this research is to enhance existing approach to map the strokes in both test and reference signatures. Current methods make use of the DTW (Dynamic Time Warping) algorithm and its deviate
APA, Harvard, Vancouver, ISO, and other styles
3

Dr., Praveen Kumar K. V., Kumar Mandal Pramit, Anand Rishav, Singh Sakshee, and Choskit Tsewang. "Signature Forgery Detection." International Journal of Innovative Science and Research Technology (IJISRT) 9, no. 3 (2024): 6. https://doi.org/10.5281/zenodo.10793129.

Full text
Abstract:
The usage of advanced signature verification technologies is required because of the growing dependence on digital transactions and authentication technology. This survey looks at the current state of dynamic signature representation techniques, with a focus on learning without forgeries. The efficacy of enhancing the security of signature-based authentication systems through the combination of 1D CNNs and the novel signature embedding approach Synsig2Vec is assessed. The survey's first section addresses the dangers of forgery attacks and the weaknesses of employing traditional signature verif
APA, Harvard, Vancouver, ISO, and other styles
4

Huang, Juanjuan, Yuhang Xue, and Linhui Liu. "Dynamic Signature Verification Technique for the Online and Offline Representation of Electronic Signatures in Biometric Systems." Processes 11, no. 1 (2023): 190. http://dx.doi.org/10.3390/pr11010190.

Full text
Abstract:
Biometric systems input physical or personal human characteristics for identification, authentication, and security purposes. With the advancement in communication and intelligent security systems, biometrics are programmed to validate electronic signatures (E-signatures) for online and offline authentication. This article introduces a dynamic signature verification technique (DSVT) using mutual compliance (MC) between the security system and the biometric device. The security system is responsible for online and offline signature approval using personal inputs from humans. This personal verif
APA, Harvard, Vancouver, ISO, and other styles
5

Nista, Elizabeth. "Signature Authentication." Biology of Blood and Marrow Transplantation 19, no. 2 (2013): S170. http://dx.doi.org/10.1016/j.bbmt.2012.11.144.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Farida, Yeni, Arsya Dyani Azzahra, Andriani Adi Lestari, Sepha Siswantyo, Annisa Dini Handayani, and Dimas Febriyan Priambodo. "A Security Enhancement to The Secure Mutual Authentication Protocol for Fog/Edge." Jurnal Nasional Pendidikan Teknik Informatika (JANAPATI) 14, no. 1 (2025): 73–80. https://doi.org/10.23887/janapati.v14i1.84725.

Full text
Abstract:
A secured mutual authentication protocol (SMAP Fog/Edge) has been developed for fog computing. The protocol provides secure mutual authentication which lightweight and efficient for fog computing environments. However, based on AVISPA’s verification from Azzahra research, this protocol has been found to be vulnerable to man-in-the-middle (MITM) attacks due to the absence of an authentication scheme between authentication server and the edge user. The attacks are carried out assuming that the public key of the fog server is not distributed over a secure channel. Rhim research and Lestari resear
APA, Harvard, Vancouver, ISO, and other styles
7

Jang, Jae Young, Soo Young Jeong, Hyun Il Kim, and Chang Ho Seo. "A Study on Multi-Signature Scheme for Efficient User Authentication in Metaverse." Korean Institute of Smart Media 12, no. 2 (2023): 27–35. http://dx.doi.org/10.30693/smj.2023.12.2.27.

Full text
Abstract:
Currently, online user authentication is perform using joint certificates issued by accredited certification authorities and simple certificates issued by private agency. In such a PKI(Public Key Infrastructure) system, various cryptographic technologies are used, and in particular, digital signatures are used as a core technology. The digital signature scheme is equally used in DID(Decentralized Identity), which is attracting attention to replace the existing centralized system. As such, the digital signature-based user authentication used in current online services is also applied in the met
APA, Harvard, Vancouver, ISO, and other styles
8

R. Saleh, Shaymaa, Zamen F. Jabr, and Abeer N. Fasial. "A Hybrid Features for Signature Recognition Using Neural Network." University of Thi-Qar Journal of Science 6, no. 1 (2016): 83–89. http://dx.doi.org/10.32792/utq/utjsci/v6i1.52.

Full text
Abstract:
In automatic personal recognition systems, biometric features is used as recognition measure based on biological traits such as face, iris, fingerprint, etc…or gait, signature which is considered behavioral characteristics. Signature verification is one of the authentication methods which can provide security at maintenance and low cost. The most essential and challenging stage of any off-line signature system is feature extraction stage. The accuracy and robust of the recognition system depends basically on the usefulness of the signature features extracted by this system. If the extracted fe
APA, Harvard, Vancouver, ISO, and other styles
9

Mosaher, Quazi Saad-ul, and Mousumi Hasan. "Offline Handwritten Signature Recognition Using Deep Convolution Neural Network." European Journal of Engineering and Technology Research 7, no. 4 (2022): 44–47. http://dx.doi.org/10.24018/ejeng.2022.7.4.2851.

Full text
Abstract:
In the modern age, technological advancement reached a new limit where authentication plays a vital role in security management. Biometric-based authentication is the most referenced procedure for authentication where signature verification is a significant part of it for authentication of a person. To prevent the falsification of signatures on important documents & legal transactions it is necessary to recognize a person's signature accurately. This paper focused on recognizing offline handwritten original & forged signatures using a deep convolution neural network. We use a completel
APA, Harvard, Vancouver, ISO, and other styles
10

Oida, Kazumasa. "Uniqueness and Reproducibility of Traffic Signatures." Journal of Telecommunications and Information Technology, no. 4 (December 30, 2015): 44–53. http://dx.doi.org/10.26636/jtit.2015.4.984.

Full text
Abstract:
Usable user authentication is an important research topic. The traffic signature-based approach is a new authentication technology that identifies the devices used by online users based on traffic signatures, where the traffic signature is a statistic of the video stream delivered by the authentication server to the user device. This approach has two advantages. First, users need not do any operations regarding the device identification. Second, users need not be sensitive to the privacy loss and computer theft. In this paper, an author evaluates the uniqueness and reproducibility of the signa
APA, Harvard, Vancouver, ISO, and other styles
11

Muraharirao, Siva Charan, and Manik Lal Das. "Digital Image Protection using Keyed Hash Function." International Journal of Computer Vision and Image Processing 2, no. 2 (2012): 36–47. http://dx.doi.org/10.4018/ijcvip.2012040103.

Full text
Abstract:
Digital image authentication is an essential attribute for protecting digital image from piracy and copyright violator. Anti-piracy, digital watermarking, and ownership verification are some mechanisms evolving over the years for achieving digital image authentication. Cryptographic primitives, such as hash function, digital signature, and message authentication codes are being used in several applications including digital image authentication. Use of Least Significant Bit (LSB) is one of the classical approaches for digital image authentication. Although LSB approach is efficient, it does no
APA, Harvard, Vancouver, ISO, and other styles
12

Andreevskih, D. A., S. D. Razboynikov, M. P. Silich, and K. S. Sarin. "Comparing the use of local and global features of handwritten signatures for user authentication." Proceedings of Tomsk State University of Control Systems and Radioelectronics 23, no. 4 (2020): 30–34. http://dx.doi.org/10.21293/1818-0442-2020-23-4-30-34.

Full text
Abstract:
The paper compares two methods of user authentication based on a handwritten signature. The first is based on the extraction of local signature features as functions that depend on the time of its application. The second extracts global signature features that characterize it entirely without reference to the moments of application. Authentication algorithms are presented for each of the methods; experiments are carried out on real handwritten signatures obtained during the study.
APA, Harvard, Vancouver, ISO, and other styles
13

Turcanu, Dinu, Serghei Popovici, and Tatiana Turcanu. "DIGITAL SIGNATURE: ADVANTAGES, CHALLENGES AND STRATEGIES." Journal of Social Sciences III (4) (December 15, 2020): 62–72. https://doi.org/10.5281/zenodo.4296327.

Full text
Abstract:
Digital signature solutions are rapidly replacing classic signatures and have the potential to dominate signature-related processes. The concept of a digital signature is based on the transition from paper to electronic documentation and the automation of workflow systems, by reducing the processing time of documents. The digital signature offers the possibility to identify a person who has signed an electronic document. The main benefits of this technology include increased efficiency, lower costs, and increased customer satisfaction. Digital signatures must be clearly distinguished from ordi
APA, Harvard, Vancouver, ISO, and other styles
14

Cheng, Huayang, Yang Li, Jing Yan, Dan Wang, Liangyu Dong, and Junjie Gu. "A security algorithm based on SM9 for interdomain communication." Journal of Physics: Conference Series 2906, no. 1 (2024): 012007. https://doi.org/10.1088/1742-6596/2906/1/012007.

Full text
Abstract:
Abstract In interdomain communication, confirming member identity and ensuring security is critical, yet identity forgery remains a challenge. Traditional solutions rely on a Certification Authority (CA) to issue authentication certificates and create a trust chain for identity verification. However, different security domains often have incompatible signature mechanisms, complicating certificate management and authentication. We propose a novel ring signature algorithm based on SM9 to address these issues. This algorithm enables member authentication across different domains, ensuring securit
APA, Harvard, Vancouver, ISO, and other styles
15

Prakash, Gautam S., and Shanu Sharma. "Offline Signature Verification and Forgery Detection Based on Computer Vision and Fuzzy Logic." IAES International Journal of Artificial Intelligence (IJ-AI) 3, no. 4 (2014): 156. http://dx.doi.org/10.11591/ijai.v3.i4.pp156-165.

Full text
Abstract:
<p>Automated signature verification and forgery detection has many applications in the field of Bank-cheque processing,document authentication, ATM access etc. Handwritten signatures have proved to be important in authenticating a person's identity, who is signing the document. In this paper a Fuzzy Logic and Artificial Neural Network Based Off-line Signature Verification and Forgery Detection System is presented. As there are unique and important variations in the feature elements of each signature, so in order to match a particular signature with the database, the structural parameters
APA, Harvard, Vancouver, ISO, and other styles
16

Sangdiah, Nana Suarna, Irfan Ali, and Dendy Indriya Efendi. "Authenticity Accuracy Improvement Through the Analysis of Signature Ownership Using Convolutional Neural Network Algorithm." Journal of Artificial Intelligence and Engineering Applications (JAIEA) 4, no. 2 (2025): 1289–93. https://doi.org/10.59934/jaiea.v4i2.900.

Full text
Abstract:
This research aims to improve the accuracy of signature authenticity classification using a Convolutional Neural Network (CNN) model, implemented in a web-based application using the Flask framework. In the digital era, signature authentication has become a crucial component in maintaining data security and transaction validity. However, the classification of genuine and forged signatures presents its own challenges due to the unique variations in patterns and styles of each individual. Using a public dataset from Kaggle consisting of 1,084 signature images (620 forged and 464 genuine), the CN
APA, Harvard, Vancouver, ISO, and other styles
17

K N, Madhu, and Mrs Bhavana G. "Signature Recognition for Banking System." International Journal for Research in Applied Science and Engineering Technology 10, no. 7 (2022): 1555–58. http://dx.doi.org/10.22214/ijraset.2022.45500.

Full text
Abstract:
Abstract: The use of signatures for personal identification and verification is very common. Verifying signatures is necessary for many documents, including legal transactions and bank checks. The authentication of several papers using signatures is an extremely challenging and time-consuming job. As a result, systems for biometric personal verification and identification that rely on measurable, distinctive physical traits (such as fingerprints, hand geometry, faces, iris scans, or DNA) or behavioural traits have experienced an accelerating expansion (gait, voice etc.). Since tokens, password
APA, Harvard, Vancouver, ISO, and other styles
18

Al-Tamimi, Abdel-Karim, Asseel Qasaimeh, and Kefaya Qaddoum. "Offline signature recognition system using oriented FAST and rotated BRIEF." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 5 (2021): 4095. http://dx.doi.org/10.11591/ijece.v11i5.pp4095-4103.

Full text
Abstract:
Despite recent developments in offline signature recognition systems, there is however limited focus on the recognition problem facet of using an inadequate sample size for training that could deliver reliable and easy to use authentication systems. Signature recognition systems are one of the most popular biometric authentication systems. They are regarded as non-invasive, socially accepted, and adequately precise. Research on offline signature recognition systems still has not shown competent results when a limited number of signatures are used. This paper describes our proposed practical of
APA, Harvard, Vancouver, ISO, and other styles
19

Abdel-Karim, Al-Tamimi, Qasaimeh Asseel, and Qaddoum Kefaya. "Offline signature recognition system using oriented FAST and rotated BRIEF." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 5 (2021): 4095–103. https://doi.org/10.11591/ijece.v11i5.pp4095-4103.

Full text
Abstract:
Despite recent developments in offline signature recognition systems, there is however limited focus on the recognition problem facet of using an inadequate sample size for training that could deliver reliable and easy to use authentication systems. Signature recognition systems are one of the most popular biometric authentication systems. They are regarded as non-invasive, socially accepted, and adequately precise. Research on offline signature recognition systems still has not shown competent results when a limited number of signatures are used. This paper describes our proposed practical of
APA, Harvard, Vancouver, ISO, and other styles
20

Qiu, Shi, Fengchang Fei, and Ying Cui. "Offline Signature Authentication Algorithm Based on the Fuzzy Set." Mathematical Problems in Engineering 2021 (March 18, 2021): 1–8. http://dx.doi.org/10.1155/2021/5554341.

Full text
Abstract:
There exists a problem that it is difficult to identify the authenticity of offline signatures. Firstly, a segmentation model is established based on the theory of fuzzy sets to extract signatures completely. Secondly, statistical shape model (SSM) and variance distance discretization of intraclass signatures are introduced for stability analysis and quantification. Finally, multilayer classifiers are constructed to realize signature authentication. The algorithm has low false detection rate and short authentication time.
APA, Harvard, Vancouver, ISO, and other styles
21

Chande, Manoj Kumar, Cheng-Chi Lee, and Chun-Ta Li. "A New Self-Certified Convertible Authenticated Encryption Scheme Based on Discrete Logarithm Problem." Parallel Processing Letters 26, no. 04 (2016): 1650018. http://dx.doi.org/10.1142/s0129626416500183.

Full text
Abstract:
The convertible authentication encryption (CAE) scheme, enables the signatory to send a secret message and its associated signature to a designated receiver. If some dispute happens, then the receiver has the ability to get ordinary signature by converting the ciphertext signature. The receiver can solely perform this signature conversion without any extra computational costs. The recipient of the signature can prove himself that he/she is the actual designated recipient. We incorporate self - certified public key (SCPK) systems into a CAE scheme to propose our CAE scheme with authentication a
APA, Harvard, Vancouver, ISO, and other styles
22

Li, Fengyin, Junhui Wang, Mengxue Shang, Dandan Zhang, and Tao Li. "Research on Quantum-Attack-Resistant Strong Forward-Secure Signature Schemes." Entropy 25, no. 8 (2023): 1159. http://dx.doi.org/10.3390/e25081159.

Full text
Abstract:
The security of digital signatures depends significantly on the signature key. Therefore, to reduce the impact of leaked keys upon existing signatures and subsequent ones, a digital signature scheme with strong forward security could be an effective solution. Most existing strong forward-secure digital signature schemes rely on traditional cryptosystems, which cannot effectively resist quantum attacks. By introducing lattice-based delegation technology into the key-iteration process, a two-direction and lattice-based key-iteration algorithm with strong forward security is proposed. In the prop
APA, Harvard, Vancouver, ISO, and other styles
23

Seo, Seog Chung, and Taek-Young Youn. "TLDA: An Efficient Two-Layered Data Authentication Mechanism for Content-Centric Networking." Security and Communication Networks 2018 (July 4, 2018): 1–17. http://dx.doi.org/10.1155/2018/5429798.

Full text
Abstract:
Content-Centric Networking (CCN) is a new networking paradigm for the future Internet, which shifts the communication paradigm from host-centric to data-centric. In CCN, contents are routed by their unique names and they are stored in network nodes by units of segment during transmission for future usage. Since contents are stored in network nodes in a distributed manner, security is built into CCN data packets by embedding a public key signature to enable any content requesters to verify authenticity and integrity of contents. However, the use of public key signatures for authenticating CCN d
APA, Harvard, Vancouver, ISO, and other styles
24

Zhou, Quan, Yulong Zheng, Kaijun Wei, Minhui Chen, and Zhikang Zeng. "A Multi-Party Functional Signatures Scheme for Private Blockchain." Cryptography 7, no. 2 (2023): 21. http://dx.doi.org/10.3390/cryptography7020021.

Full text
Abstract:
Digital signature technology is essential for ensuring the authenticity and unforgeability of transactions in a private blockchain framework. In some scenarios, transactions require verification from multiple parties, each of whom needs to authenticate different parts of the transaction. To address this issue, researchers have developed multi-party ECDSA (Elliptic Curve Digital Signature Algorithm) signature schemes. However, these schemes either need to consider the authentication of different parts of the transaction or generate an aggregated signature. This paper proposes a novel solution t
APA, Harvard, Vancouver, ISO, and other styles
25

Nadimi Goki, Pantea, Thomas Teferi Mulugeta, Roberto Caldelli, and Luca Potì. "Optical Systems Identification through Rayleigh Backscattering." Sensors 23, no. 11 (2023): 5269. http://dx.doi.org/10.3390/s23115269.

Full text
Abstract:
We introduce a technique to generate and read the digital signature of the networks, channels, and optical devices that possess the fiber-optic pigtails to enhance physical layer security (PLS). Attributing a signature to the networks or devices eases the identification and authentication of networks and systems thus reducing their vulnerability to physical and digital attacks. The signatures are generated using an optical physical unclonable function (OPUF). Considering that OPUFs are established as the most potent anti-counterfeiting tool, the created signatures are robust against malicious
APA, Harvard, Vancouver, ISO, and other styles
26

Bojič Burgos, Jay, and Matevž Pustišek. "Decentralized IoT Data Authentication with Signature Aggregation." Sensors 24, no. 3 (2024): 1037. http://dx.doi.org/10.3390/s24031037.

Full text
Abstract:
The rapid expansion of the Internet of Things (IoT) has introduced significant challenges in data authentication, necessitating a balance between scalability and security. Traditional approaches often rely on third parties, while blockchain-based solutions face computational and storage bottlenecks. Our novel framework employs edge aggregating servers and Ethereum Layer 2 rollups, offering a scalable and secure IoT data authentication solution that reduces the need for continuous, direct interaction between IoT devices and the blockchain. We utilize and compare the Nova and Risc0 proving syste
APA, Harvard, Vancouver, ISO, and other styles
27

Tehsin, Sara, Ali Hassan, Farhan Riaz, Inzamam Mashood Nasir, Norma Latif Fitriyani, and Muhammad Syafrudin. "Enhancing Signature Verification Using Triplet Siamese Similarity Networks in Digital Documents." Mathematics 12, no. 17 (2024): 2757. http://dx.doi.org/10.3390/math12172757.

Full text
Abstract:
In contexts requiring user authentication, such as financial, legal, and administrative systems, signature verification emerges as a pivotal biometric method. Specifically, handwritten signature verification stands out prominently for document authentication. Despite the effectiveness of triplet loss similarity networks in extracting and comparing signatures with forged samples, conventional deep learning models often inadequately capture individual writing styles, resulting in suboptimal performance. Addressing this limitation, our study employs a triplet loss Siamese similarity network for o
APA, Harvard, Vancouver, ISO, and other styles
28

Nadzifarin, Aulia, and Asmunin Asmunin. "Penerapan Elliptic Curve Digital Signature Algorithm pada Tanda Tangan Digital dengan Studi Kasus Dokumen Surat – Menyurat." Journal of Informatics and Computer Science (JINACS) 4, no. 01 (2022): 1–9. http://dx.doi.org/10.26740/jinacs.v4n01.p1-9.

Full text
Abstract:
Changes in the pattern of human life through electronic digital media are the impact of very rapid technological developments, one of which is the change in patterns from paper to paperless. At the same time as the COVID-19 pandemic, which affected policies in most areas of employment and education, this was done online, so electronic documents were often used in every process in these fields. As in the case of administrative correspondence or other document exchange transactions. And the authenticity of the document is needed by using a mechanism, one of which is a digital signature. Digital
APA, Harvard, Vancouver, ISO, and other styles
29

Diksha Singh, Dileep Kumar, and Poonam Prakash. "Analysis of Signature Patterns: Consistency and Distinctiveness in Handwritten Signatures for Forensic Authentication." Indian Journal of Forensic Medicine & Toxicology 18, no. 1 (2024): 26–34. http://dx.doi.org/10.37506/c15rg139.

Full text
Abstract:
Handwritten signatures are unique behavioural attributes that serve as a distinct form of identification forindividuals. This study focuses on the analysis of signature patterns using various parameters, including aspect ratio, angle of the first letter with respect to the baseline, and the ratio of the area of a circle to its radius within the signature. A dataset consisting of 1200 genuine and 1200 simulated (English) signature samples from 12 individuals were examined using an image analysis tool to record measurements for these parameters. The primary objectives were to investigate the con
APA, Harvard, Vancouver, ISO, and other styles
30

Kurowski, Mariusz, Andrzej Sroczyński, Georgis Bogdanis, and Andrzej Czyżewski. "An Automated Method for Biometric Handwritten Signature Authentication Employing Neural Networks." Electronics 10, no. 4 (2021): 456. http://dx.doi.org/10.3390/electronics10040456.

Full text
Abstract:
Handwriting biometrics applications in e-Security and e-Health are addressed in the course of the conducted research. An automated analysis method for the dynamic electronic representation of handwritten signature authentication was researched. The developed algorithms are based on the dynamic analysis of electronically handwritten signatures employing neural networks. The signatures were acquired with the use of the designed electronic pen described in the paper. The triplet loss method was used to train a neural network suitable for writer-invariant signature verification. For each signature
APA, Harvard, Vancouver, ISO, and other styles
31

Kokku, Sai Anoushka, Akila Telugu, Sreeja Kompelly, Mallikarjuna Rao Gundavarapu, and Sneha Nimmala. "Performance Analysis of Deep Learning Approaches for Offline Signature Verification." International Journal of Engineering and Advanced Technology 11, no. 4 (2022): 94–99. http://dx.doi.org/10.35940/ijeat.d3482.0411422.

Full text
Abstract:
Signature verification plays a significant role in many biometric authentication places. Many financial institutes require a robust signature verification process for check clearance, loan sanction, processing, pension relation documents, etc. Expert forgeries make it hard to authenticate an individual's identification based on signatures. Typically, this occurs when the forger understands the user's intricate features of the signature and strives to mimic it. Online signature verification approaches can extract various features such as keystrokes, pressure of the pointer, duration between the
APA, Harvard, Vancouver, ISO, and other styles
32

Mallikarjuna, Rao Gundavarapu, Kompelly Sreeja, Anoushka Kokku Sai, Telugu Akila, and Nimmala Sneha. "Performance Analysis of Deep Learning Approaches for Offline Signature Verification." International Journal of Engineering and Advanced Technology (IJEAT) 12, no. 4 (2022): 94–99. https://doi.org/10.35940/ijeat.D3482.0411422.

Full text
Abstract:
<strong>Abstract: </strong>Signature verification plays a significant role in many biometric authentication places. Many financial institutes require a robust signature verification process for check clearance, loan sanction, processing, pension relation documents, etc. Expert forgeries make it hard to authenticate an individual&#39;s identification based on signatures. Typically, this occurs when the forger understands the user&#39;s intricate features of the signature and strives to mimic it. Online signature verification approaches can extract various features such as keystrokes, pressure o
APA, Harvard, Vancouver, ISO, and other styles
33

Tsanta Christelle Nadège Ralaibozaka, Maminiaina Alphonse Rafidison, and Hajasoa Malalatiana Ramafiarisona. "CONTRIBUTION TO THE AUTHENTICITY OF DIGITIZED HANDWRITTEN SIGNATURES THROUGH DEEP LEARNING WITH RESNET-50 AND OCR." International Journal of Innovations in Engineering Research and Technology 11, no. 3 (2024): 20–25. http://dx.doi.org/10.26662/ijiert.v11i3.pp20-25.

Full text
Abstract:
This paper explores the contribution of authenticity to digitized handwritten signatures using a deep learning-based approach, implementing ResNet-50 and optical character recognition (OCR). Signature authentication is a crucial issue in various fields, such as transaction security, protection of official documents, and fraud prevention. Our approach aims to improve the reliability of signature verification systems by exploiting the advanced capabilities of deep neural networks. Experimental results demonstrate a high authentication accuracy of 94% on our collected database and 100% on ICDAR 2
APA, Harvard, Vancouver, ISO, and other styles
34

Lu, Xiuhua, Wei Yin, Qiaoyan Wen, Kaitai Liang, Liqun Chen, and Jiageng Chen. "Message Integration Authentication in the Internet-of-Things via Lattice-Based Batch Signatures." Sensors 18, no. 11 (2018): 4056. http://dx.doi.org/10.3390/s18114056.

Full text
Abstract:
The internet-of-things (also known as IoT) connects a large number of information-sensing devices to the Internet to collect all kinds of information needed in real time. The reliability of the source of a large number of accessed information tests the processing speed of signatures. Batch signature allows a signer to sign a group of messages at one time, and signatures’ verification can be completed individually and independently. Therefore, batch signature is suitable for data integration authentication in IoT. An outstanding advantage of batch signature is that a signer is able to sign as m
APA, Harvard, Vancouver, ISO, and other styles
35

Vijayaragavan, Arun, J. Visumathi, and K. L. Shunmuganathan. "Cubic Bezier Curve Approach for Automated Offline Signature Verification with Intrusion Identification." Mathematical Problems in Engineering 2014 (2014): 1–8. http://dx.doi.org/10.1155/2014/928039.

Full text
Abstract:
Authentication is a process of identifying person’s rights over a system. Many authentication types are used in various systems, wherein biometrics authentication systems are of a special concern. Signature verification is a basic biometric authentication technique used widely. The signature matching algorithm uses image correlation and graph matching technique which provides false rejection or acceptance. We proposed a model to compare knowledge from signature. Intrusion in the signature repository system results in copy of the signature that leads to false acceptance. Our approach uses a Bez
APA, Harvard, Vancouver, ISO, and other styles
36

Beck, Gabrielle, Arka Rai Choudhuri, Matthew Green, Abhishek Jain, and Pratyush Ranjan Tiwari. "Time-Deniable Signatures." Proceedings on Privacy Enhancing Technologies 2023, no. 3 (2023): 79–102. http://dx.doi.org/10.56553/popets-2023-0071.

Full text
Abstract:
In this work we propose time-deniable signatures (TDS), a new primitive that facilitates deniable authentication in protocols such as DKIM-signed email. As with traditional signatures, TDS provide strong authenticity for message content, at least {\em for a sender-chosen period of time}. Once this time period has elapsed, however, time-deniable signatures can be forged by any party who obtains a signature. This forgery property ensures that signatures serve a useful authentication purpose for a bounded time period, while also allowing signers to plausibly disavow the creation of older signed c
APA, Harvard, Vancouver, ISO, and other styles
37

Subpratatsavee, Puchong, and Wissawat Sakulsaknimit. "HC2D Barcode for Handwritings Verification Using Embedded Camera on Tablet." Applied Mechanics and Materials 752-753 (April 2015): 1069–72. http://dx.doi.org/10.4028/www.scientific.net/amm.752-753.1069.

Full text
Abstract:
The authentication of a person is used to determine the stage of the transaction, such as a password or authentication by biometric verification. However, the majority such as financial transactions, and communications sector confirmed the use of credit cards and checks your ID card at all. Biometric identification method fingerprints, photographs, and signatures, especially the signature is the most popular. It is simple and easy to use. The signature can be easily copied in a short time because it does not require any special tools or equipment tampering. This paper presents the person ident
APA, Harvard, Vancouver, ISO, and other styles
38

Yang, Chengjun, Jiansheng Peng, Yong Xu, Qingjin Wei, Ling Zhou, and Yuna Tang. "Edge Computing-Based VANETs’ Anonymous Message Authentication." Symmetry 14, no. 12 (2022): 2662. http://dx.doi.org/10.3390/sym14122662.

Full text
Abstract:
Vehicular Ad-hoc Networks (VANETs) have high requirements for real-time data processing and security of message authentication. In order to solve the computing power asymmetry between vehicles and road side units (RSUs) in VANETs under high-density traffic, accelerate the processing speed of message authentication, and solve the problems of high computational overhead and long message authentication time caused by the use of bilinear pairing encryption technology in similar message-batch-authentication schemes, we propose introducing the concept of edge computing (EC) into VANETs and using idl
APA, Harvard, Vancouver, ISO, and other styles
39

Khurana, Rupali, and Ekta Narwal. "Analysis of code-based digital signature schemes." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 5 (2023): 5534–41. https://doi.org/10.11591/ijece.v13i5.pp5534-5541.

Full text
Abstract:
Digital signatures are in high demand because they allow authentication and non-repudiation. Existing digital signature systems, such as digital signature algorithm (DSA), elliptic curve digital signature algorithm (ECDSA), and others, are based on number theory problems such as discrete logarithmic problems and integer factorization problems. These recently used digital signatures are not secure with quantum computers. To protect against quantum computer attacks, many researchers propose digital signature schemes based on error-correcting codes such as linear, Goppa, polar, and so on. We stud
APA, Harvard, Vancouver, ISO, and other styles
40

Chubaievskyi, Vitalii, Nataliia Lutska, Tetyana Savchenko, Lidiia Vlasenko, and Kyrylo Synelnyk. "ENHANCED CRYPTOGRAPHIC SECURITY OF AGGREGATED DIGITAL SIGNATURES THROUGH UTILIZATION OF A UNIFIED AUTHENTICATION FRAMEWORK." Cybersecurity: Education, Science, Technique 2, no. 22 (2023): 39–53. http://dx.doi.org/10.28925/2663-4023.2023.22.3953.

Full text
Abstract:
The significance of this research lies in safeguarding user information and data against unauthorized alterations and destruction. Throughout the study, key aspects were explored, including user identification and authen-tication methods, cryptographic authentication protocols, digital signature properties, and strategies to enhance the cryptographic robustness of digital signatures. These strategies involved scrutinizing authentication methods using the Saati technique and the RSA algorithm. The analysis revealed that the attributes employed for digital signature recognition are highly resist
APA, Harvard, Vancouver, ISO, and other styles
41

M, Azees, Arun Sekar Rajasekaran, and Muhammad Islam Satti. "An Anonymous Signature-Based Authentication and Key Agreement Scheme for Vehicular Ad Hoc Networks." Security and Communication Networks 2022 (July 18, 2022): 1–9. http://dx.doi.org/10.1155/2022/1222660.

Full text
Abstract:
Anonymous authentication is a critical step in safeguarding vehicle privacy and security in VANETs. VANETs connected with blockchain are gaining popularity as a means to increase the effectiveness of anonymous authentication across many security domains. However, present blockchain-assisted authentication systems cannot successfully achieve anonymity since colluding RSUs or vehicles may acquire linkability via the same retrieved record, hence destroying anonymity. To solve the problem, the proposed work offers an unlinkable anonymous signature-based authentication for VANET to ensure collusion
APA, Harvard, Vancouver, ISO, and other styles
42

Dr. S. Gomathi alias Rohini and K. R. Amuruthavarshini Priya. "Offline Signature Verification System using Convolutional Neural Networks." International Journal of Linguistics Applied Psychology and Technology (IJLAPT) 2, no. 03(Mar) (2025): 37–46. https://doi.org/10.69889/ijlapt.v2i03(mar).105.

Full text
Abstract:
The paper titled “Offline Signature Verification System Using Convolutional Neural Networks (CNN)” is developed to automate the process of verifying handwritten signatures, ensuring accuracy and security in authentication systems. This system was developed using Python, with Tensor Flow / Keras for deep learning model development and OpenCV for image preprocessing. The implementation integrates Canny Edge Detection, Gaussian Blur and Grayscale conversion to pre-process signature images, enhancing feature extraction for accurate classification. The system is designed to replace traditional manu
APA, Harvard, Vancouver, ISO, and other styles
43

M Ranga Swamy. "CNN Versus Conditional Generative Adversarial Network cGAN–Digital Signature Authentication: Case Study." Journal of Information Systems Engineering and Management 10, no. 14s (2025): 396–412. https://doi.org/10.52783/jisem.v10i14s.2309.

Full text
Abstract:
In this research work, the author gathered digital signature images from students in real time appropriate for identifying the fake signature and classifying the images into real and forgery. Convolutional Neural Network based approach, GAN, ResNet and CGAN techniques were employed to extend the system which can authenticate and identify forged signatures among students. The features are extracted from real time signature images using Principle Component Analysis, the most popular multivariate statistical techniques. Moreover, feature selection has done for choosing subset of best and worst fe
APA, Harvard, Vancouver, ISO, and other styles
44

Shang, Pei Ni, and Zhu Lian Gao. "An Authentication Scheme Based on the Light-Weight Rainbow Signature for Wireless Sensor Network." Applied Mechanics and Materials 519-520 (February 2014): 185–88. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.185.

Full text
Abstract:
Based on the rainbow signature scheme and combining the minus perturbation method of the Shamir, a new light-weight rainbow signature scheme is proposed. This scheme only uses the addition and multiplication operation, so it can be performed easily. This scheme has high security and can resist the minimal rank, rank reduction attacks and oil-vinegar attacks, etc. Based new signature scheme, we also design authentication mechanism for the WSN. According to the characters of the cluster WSN, this authentication mechanism can choose proper authentication parameters to realize the authentication o
APA, Harvard, Vancouver, ISO, and other styles
45

Zhao, Run, Dong Wang, Qian Zhang, Xueyi Jin, and Ke Liu. "Smartphone-based Handwritten Signature Verification using Acoustic Signals." Proceedings of the ACM on Human-Computer Interaction 5, ISS (2021): 1–26. http://dx.doi.org/10.1145/3488544.

Full text
Abstract:
Handwritten signature verification techniques, which can facilitate user authentication and enable secure information exchange, are still important in property safety. However, on-line automatic handwritten signature verification usually requires dynamic handwritten patterns captured by a special device, such as a sensor-instrumented pen, a tablet or a smartwatch on the dominant hand. This paper presents SonarSign, an on-line handwritten signature verification system based on inaudible acoustic signals. The key insight is to use acoustic signals to capture the dynamic handwritten signature pat
APA, Harvard, Vancouver, ISO, and other styles
46

Suhardi, Suhardi. "Use of QRCode and Digital Signature Using The DSA Method to Authenticate Student Academic Documents." Journal of Computer Networks, Architecture and High Performance Computing 6, no. 4 (2024): 1913–21. http://dx.doi.org/10.47709/cnahpc.v6i4.4765.

Full text
Abstract:
Verification of digital documents is no longer done conventionally but is also done digitally, such as signatures on documents. A signature is a means of authentic evidence as well as proving a person's identity, is a means of proving the authenticity or validity of an agreement or approval for something in a document issued by two or more parties so that it can be used as a solution to verify the integrity of valid data in a document. Application of signatures Digital is also commonly used at the North Sumatra Islamic University (UINSU) Medan, especially in student study documents. Even thoug
APA, Harvard, Vancouver, ISO, and other styles
47

Wellem, Theophilus, Yessica Nataliani, and Ade Iriani. "Academic Document Authentication using Elliptic Curve Digital Signature Algorithm and QR Code." JOIV : International Journal on Informatics Visualization 6, no. 3 (2022): 667. http://dx.doi.org/10.30630/joiv.6.2.872.

Full text
Abstract:
Paper-based documents or printed documents such as recommendation letters, academic transcripts, and diplomas are prone to forgery. Several methods have been used to protect them, such as watermarking, security holograms, or using paper with specific security features. This paper presents a document authentication system that utilizes QR code and ECDSA as the digital signature algorithm to protect this kind of document from counterfeiting. A digital signature is a well-known technique in modern cryptography used for providing data integrity and authentication. The idea proposed herein is to pu
APA, Harvard, Vancouver, ISO, and other styles
48

HAN, Songshen, Kaiyong XU, Zhiqiang ZHU, Songhui GUO, Haidong LIU, and Zuohui LI. "Hash-Based Signature for Flexibility Authentication of IoT Devices." Wuhan University Journal of Natural Sciences 27, no. 1 (2022): 1–10. http://dx.doi.org/10.1051/wujns/2022271001.

Full text
Abstract:
5G provides a unified authentication architecture and access management for IoT (Internet of Things) devices. But existing authentication services cannot cover massive IoT devices with various computing capabilities. In addition, with the development of quantum computing, authentication schemes based on traditional digital signature technology may not be as secure as we expected. This paper studies the authentication mechanism from the user equipment to the external data network in 5G and proposed an authentication protocol prototype that conforms to the Third Generation Partnership Program (3
APA, Harvard, Vancouver, ISO, and other styles
49

Damanik, Abdi Rahim, Dedy Hartama, Sumarno Sumarno, and Indra Gunawan. "Sistem Presensi Pegawai Berbasis Digital Signatures Dan Gps Location." DIKE : Jurnal Ilmu Multidisiplin 1, no. 1 (2023): 30–36. http://dx.doi.org/10.69688/dike.v1i1.11.

Full text
Abstract:
Digital signatures (Digital Signatures) is one of the authentication used by the user to add a verification that acts as a signature. In this study, the data collection process in the form of signatures by the user will be carried out to carry out employee attendance on every working day. The attendance process that is being carried out at STIKOM Tunas Bangsa still uses manual signatures which are very less effective in the data recording process. Technological advances both in terms of programming and web coding are one of the keys in the process of using digital signatures and a solution to
APA, Harvard, Vancouver, ISO, and other styles
50

Tanvir, Kazi. "Signature Verification System: Using Big Transfer (BiT-M-R50x1) for Accurate Authentication." Aug-Sept 2023, no. 35 (September 7, 2023): 10–19. http://dx.doi.org/10.55529/jipirs.35.10.19.

Full text
Abstract:
In the realm of document security, signature verification stands as a vital pillar for establishing authenticity. This study delves into the utilization of the potent Big Transfer (BiT) BiT-M-R50x1 model for the intricate task of signature validation. This dataset encompasses 2149 signature images sourced from diverse individuals, exhibiting notable fluctuations in writing styles, pen pressures, and signature dimensions. By harnessing the prowess of the pre-trained BiT-M-R50x1 model, renowned for its domaingeneralization capability, we fine-tune it to excel in signature verification. The resul
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!