Call for Paper - July 2023 Edition
IJCA solicits original research papers for the July 2023 Edition. Last date of manuscript submission is June 20, 2023. Read More

An Image Authentication Technique by Handwritten Signature Verification using DWT and ANN

International Journal of Computer Applications
© 2012 by IJCA Journal
Volume 47 - Number 21
Year of Publication: 2012
Tanmay Bhattacharya
Sirshendu Hore
S. R. Bhadra Chaudhuri

Tanmay Bhattacharya, Sirshendu Hore and Bhadra S R Chaudhuri. Article: An Image Authentication Technique by Handwritten Signature Verification using DWT and ANN. International Journal of Computer Applications 47(21):35-40, June 2012. Full text available. BibTeX

	author = {Tanmay Bhattacharya and Sirshendu Hore and S. R. Bhadra Chaudhuri},
	title = {Article: An Image Authentication Technique by Handwritten Signature Verification using DWT and ANN},
	journal = {International Journal of Computer Applications},
	year = {2012},
	volume = {47},
	number = {21},
	pages = {35-40},
	month = {June},
	note = {Full text available}


Image authentication is important in content delivery to preserve originality as well as integrity of data. Using handwritten signature we can authenticate a person accurately. This paper proposes an efficient image authentication technique by hiding handwritten signature image in selected DWT sub-band of the image. At the receiver end signature image is extracted and verified with template signature using Artificial Neural Network and hence image authentication is achieved.


  • G. L. Friedman, "The trustworthy digital camera: Restoring credibility to the photographic image," IEEE Trans. Consumer Electron. vol. 39, pp. 905–910, Nov. 1993.
  • S. Walton, "Image authentication for a slippery new age," Dr. Dobb's J. , pp. 18–26, April 1995.
  • V. Nalwa. Automatic on-line signature verification. Proceedings of the IEEE, 85(2):215– 239, 1997
  • N. F. Johnson and S. Katzenbeisser," . A survey of steganographic techniques", in S. Katzenbeisser and F. Peticolas (Eds. ): Information Hiding, pp. 43-78. Artech House, Norwood, MA, 2000.
  • Lou, D. C. and Liu, J. L. 2002. "Steganography Method for Secure Communications". Elsevier Science on Computers& Security, 21, 5: 449-460.
  • J. Fridrich and M. Goljan, . Practical steganalysis of digital images-state of the art. , Proc. SPIE Photonics West, Vol. 4675, pp. 1-13, San Jose, California, Jan. 2002.
  • A. K. Jain, F. Griess, and S. Connell. On-line signature verification. Pattern recognition, 35(12):2963 2972, 2002
  • Chan, C. K. and Cheng, L. M. 2003. Hiding data in image by simple LSB substitution. Pattern Recognition, 37:469-474.
  • M. Kalera, S. Srihari, and A. Xu. Offline signature verification and identification using distance Statistics, 2004.
  • A. K. Jain, A. Ross, and S. Prabhakar, "An introduction to biometric recognition," IEEE Trans. on Circuits and Systems for Video Technology, vol. 14, pp. 4–20, Jan 2004.
  • Iwata, M. , Miyake, K. and Shiozaki, A. 2004. "Digital Steganography Utilizing Features of JPEG Images", IEICE Transfusion Fundamentals, E87-A, 4:929-936.
  • Po-Yueh Chen* and Hung-Ju Lin, "A DWT Based Approach for Image Steganography", International Journal of Applied Science and Engineering 2006. 4, 3: 275-290
  • Ali Al-Ataby and Fawzi Al-Naima, "A Modified High Capacity Image Steganography Technique Based on Wavelet Transform", The International Arab Journal of Information Technology, Vol. 7, No. 4, October 2010
  • Blossom Kaur, Amandeep Kaur, Jasdeep Singh, "Steganographic Approach for Hiding Image in DCT Domain", International Journal of Advances in Engineering & Technology, July 2011.
  • Tanmay Bhattacharya, Sirshendu Hore and S. R. BhadraChaudhuri, "A Novel Data Encryption Technique by Genetic Crossover of Robust Finger Print Based Key and Handwritten Signature Key", International Journal of Computer Science Issues (IJCSI), Vol. 8, Issue 5, No 2, September 2011, Pp209-214.
  • Tanmay Bhattacharya, Nilanjan Dey and S. R. BhadraChaudhuri, "A Session based Multiple Image Hiding Technique using DWT and DCT", International Journal of Computer Applications (IJCA) (0975 – 8887) Volume 38– No. 5, January 2012, Pp 18-21.