G. N. Sekhar

Learn More
Over the last two decades, in the field of secure communication and financial on-line applications, we have witnessed an explosive growth in biometric personal authentication systems which are covenant with a measurable physical characteristic or behavioral trait. On-line refers to making use of the time functions of the signing process. Verification of(More)
Current network based authentication applications require simple robust methods which are faster and does not choke the bandwidth. Minimal features are considered using subpattern analysis which leads to less response time in a real time scenario. Certain subsections of signature vary in a genuine case subvailable online 22 December 2010 ff-line signature(More)
In this work, shape analysis of the acceleration plot, using lower order Zernike moments is performed for authentication of on-line signature. The on-line signature uses time functions of the signing process. The lower order Zernike moments represent the global shape of a pattern. The derived feature, acceleration vector is computed for the sample signature(More)
In online applications, there is a foreseeable explosive growth in biometric personal authentication systems which are covenant with a measurable behavioral trait. Hand written object [HO] verification is the process used to recognize an individual, which is intuitive reliable indicator. Verification of a HO as a biometric modality still is a challenging(More)
Hand written object [HO] verification is the process used to recognize an individual, is intuitive reliable indicator which can be character recognition, handwriting verification, style classification, shape recognition and signature recognition. This paper discusses the trajectory generation [TG] methods, as novel methods to deal interclass and intra-class(More)
Authentication systemswhich are covenantwith ameasurable behavioral andphysiological traits are essential for an online system. In this paper, two types of biometric sample authentication from di®erent databases on a common algorithm using Continuous Dynamic Programming [CDP] are discussed. Using a common algorithm, a method for user-dependent threshold(More)
Biometrics, which refers to identifying an individual based on his or her physiological or behavioral characteristics, has the capabilities to the reliably distinguish between an authorized person and an imposter. The Signature recognition systems can categorized as offline (static) and online (dynamic). This paper presents Surf Feature based recognition of(More)