CFP last date
22 April 2024
Reseach Article

An Image Authentication Technique by Handwritten Signature Verification using DWT and ANN

by Tanmay Bhattacharya, Sirshendu Hore, S. R. Bhadra Chaudhuri
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 47 - Number 21
Year of Publication: 2012
Authors: Tanmay Bhattacharya, Sirshendu Hore, S. R. Bhadra Chaudhuri
10.5120/7476-0575

Tanmay Bhattacharya, Sirshendu Hore, S. R. Bhadra Chaudhuri . An Image Authentication Technique by Handwritten Signature Verification using DWT and ANN. International Journal of Computer Applications. 47, 21 ( June 2012), 35-40. DOI=10.5120/7476-0575

@article{ 10.5120/7476-0575,
author = { Tanmay Bhattacharya, Sirshendu Hore, S. R. Bhadra Chaudhuri },
title = { An Image Authentication Technique by Handwritten Signature Verification using DWT and ANN },
journal = { International Journal of Computer Applications },
issue_date = { June 2012 },
volume = { 47 },
number = { 21 },
month = { June },
year = { 2012 },
issn = { 0975-8887 },
pages = { 35-40 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume47/number21/7476-0575/ },
doi = { 10.5120/7476-0575 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:42:29.771629+05:30
%A Tanmay Bhattacharya
%A Sirshendu Hore
%A S. R. Bhadra Chaudhuri
%T An Image Authentication Technique by Handwritten Signature Verification using DWT and ANN
%J International Journal of Computer Applications
%@ 0975-8887
%V 47
%N 21
%P 35-40
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Image authentication is important in content delivery to preserve originality as well as integrity of data. Using handwritten signature we can authenticate a person accurately. This paper proposes an efficient image authentication technique by hiding handwritten signature image in selected DWT sub-band of the image. At the receiver end signature image is extracted and verified with template signature using Artificial Neural Network and hence image authentication is achieved.

References
  1. G. L. Friedman, "The trustworthy digital camera: Restoring credibility to the photographic image," IEEE Trans. Consumer Electron. vol. 39, pp. 905–910, Nov. 1993.
  2. S. Walton, "Image authentication for a slippery new age," Dr. Dobb's J. , pp. 18–26, April 1995.
  3. V. Nalwa. Automatic on-line signature verification. Proceedings of the IEEE, 85(2):215– 239, 1997
  4. N. F. Johnson and S. Katzenbeisser," . A survey of steganographic techniques", in S. Katzenbeisser and F. Peticolas (Eds. ): Information Hiding, pp. 43-78. Artech House, Norwood, MA, 2000.
  5. Lou, D. C. and Liu, J. L. 2002. "Steganography Method for Secure Communications". Elsevier Science on Computers& Security, 21, 5: 449-460.
  6. J. Fridrich and M. Goljan, . Practical steganalysis of digital images-state of the art. , Proc. SPIE Photonics West, Vol. 4675, pp. 1-13, San Jose, California, Jan. 2002.
  7. A. K. Jain, F. Griess, and S. Connell. On-line signature verification. Pattern recognition, 35(12):2963 2972, 2002
  8. Chan, C. K. and Cheng, L. M. 2003. Hiding data in image by simple LSB substitution. Pattern Recognition, 37:469-474.
  9. M. Kalera, S. Srihari, and A. Xu. Offline signature verification and identification using distance Statistics, 2004.
  10. A. K. Jain, A. Ross, and S. Prabhakar, "An introduction to biometric recognition," IEEE Trans. on Circuits and Systems for Video Technology, vol. 14, pp. 4–20, Jan 2004.
  11. Iwata, M. , Miyake, K. and Shiozaki, A. 2004. "Digital Steganography Utilizing Features of JPEG Images", IEICE Transfusion Fundamentals, E87-A, 4:929-936.
  12. Po-Yueh Chen* and Hung-Ju Lin, "A DWT Based Approach for Image Steganography", International Journal of Applied Science and Engineering 2006. 4, 3: 275-290
  13. Ali Al-Ataby and Fawzi Al-Naima, "A Modified High Capacity Image Steganography Technique Based on Wavelet Transform", The International Arab Journal of Information Technology, Vol. 7, No. 4, October 2010
  14. Blossom Kaur, Amandeep Kaur, Jasdeep Singh, "Steganographic Approach for Hiding Image in DCT Domain", International Journal of Advances in Engineering & Technology, July 2011.
  15. Tanmay Bhattacharya, Sirshendu Hore and S. R. BhadraChaudhuri, "A Novel Data Encryption Technique by Genetic Crossover of Robust Finger Print Based Key and Handwritten Signature Key", International Journal of Computer Science Issues (IJCSI), Vol. 8, Issue 5, No 2, September 2011, Pp209-214.
  16. Tanmay Bhattacharya, Nilanjan Dey and S. R. BhadraChaudhuri, "A Session based Multiple Image Hiding Technique using DWT and DCT", International Journal of Computer Applications (IJCA) (0975 – 8887) Volume 38– No. 5, January 2012, Pp 18-21.
Index Terms

Computer Science
Information Sciences

Keywords

Dwt Aspect Ratio Cross & End Points Confusion Matrix Center Of Gravity Ann