Eman Alajrami, Belal A. M. Ashqar, Bassem S. Abu-Nasser, Ahmed J. Khalil, Musleh M. Musleh, Alaa M. Barhoom & Samy S. Abu-Naser
International Journal of Academic Multidisciplinary Research (IJAMR) 3 (12):39-44 (2020)
AbstractEvery person has his/her own unique signature that is used mainly for the purposes of personal identification and verification of important documents or legal transactions. There are two kinds of signature verification: static and dynamic. Static(off-line) verification is the process of verifying an electronic or document signature after it has been made, while dynamic(on-line) verification takes place as a person creates his/her signature on a digital tablet or a similar device. Offline signature verification is not efficient and slow for a large number of documents. To overcome the drawbacks of offline signature verification, we have seen a growth in online biometric personal verification such as fingerprints, eye scan etc. In this paper we created CNN model using python for offline signature and after training and validating, the accuracy of testing was 99.70%.
Similar books and articles
Concerning 'Eschatological Verification Reconsidered'.Beth Mackie - 1987 - Religious Studies 23 (1):129 - 135.
Group–Proxy Signature Scheme: A Novel Solution to Electronic Cash.Zhenfu Cao & Haiyong Bao - 2013 - Journal of Intelligent Systems 22 (2):95-110.
Program verification: the very idea.James H. Fetzer - 1988 - Communications of the Acm 31 (9):1048--1063.
Secure Fingerprint Authentication Using Deep Learning and Minutiae Verification.S. Vadivel, Saad Bayezeed & V. M. Praseetha - 2019 - Journal of Intelligent Systems 29 (1):1379-1387.
Robust Algorithms for a Multimodal Biometric System Using Palmprint and Speech.R. Raghavendra - 2011 - Journal of Intelligent Systems 20 (4):305-326.
Adaptive Model Checking.Alex Groce, Doron Peled & Mihalis Yannakakis - 2006 - Logic Journal of the IGPL 14 (5):729-744.
Program verification, defeasible reasoning, and two views of computer science.Timothy R. Colburn - 1991 - Minds and Machines 1 (1):97-116.
How Old Are These Bones? Putnam, Wittgenstein and Verification.Cora Diamond - 1999 - Aristotelian Society Supplementary Volume 73:99-150.
How Old Are These Bones?: Putnam, Wittgenstein and Verification.Cora Diamond & Steven Gerrard - 1999 - Aristotelian Society Supplementary Volume 73 (1):99-150.
Verificationist Theory of Meaning.Markus Schrenk - 2008 - In U. Windhorst, M. Binder & N. Hirowaka (eds.), Encyclopaedic Reference of Neuroscience. Springer.
Verification and Validation of Simulations Against Holism.Julie Jebeile & Vincent Ardourel - 2019 - Minds and Machines 29 (1):149-168.
Medical Image Reliability Verification Using Hash Signatures and Sequential Square Encoding.J. Jennifer Ranjani & M. Babu - 2018 - Journal of Intelligent Systems 27 (1):19-30.
Computer modeling and simulation: towards epistemic distinction between verification and validation.Vitaly Pronskikh - unknown
Verification of concurrent programs: the automata-theoretic framework.Moshe Y. Vardi - 1991 - Annals of Pure and Applied Logic 51 (1-2):79-98.
Added to PP
Historical graph of downloads
Citations of this work
Fraudulent Financial Transactions Detection Using Machine Learning.Mosa M. M. Megdad, Samy S. Abu-Naser & Bassem S. Abu-Nasser - 2022 - International Journal of Academic Information Systems Research (IJAISR) 6 (3):30-39.
Classification of Alzheimer's Disease Using Convolutional Neural Networks.Lamis F. Samhan, Amjad H. Alfarra & Samy S. Abu-Naser - 2022 - International Journal of Academic Information Systems Research (IJAISR) 6 (3):18-23.
Detection of Brain Tumor Using Deep Learning.Hamza Rafiq Almadhoun & Samy S. Abu-Naser - 2022 - International Journal of Academic Engineering Research (IJAER) 6 (3):29-47.
Classification of Real and Fake Human Faces Using Deep Learning.Fatima Maher Salman & Samy S. Abu-Naser - 2022 - International Journal of Academic Engineering Research (IJAER) 6 (3):1-14.
Diagnosis of Pneumonia Using Deep Learning.Alaa M. A. Barhoom & Samy S. Abu-Naser - 2022 - International Journal of Academic Engineering Research (IJAER) 6 (2):48-68.
References found in this work
No references found.