Learn More
Signature verification and Identification has great importance in authentication systems. Persian signatures are different from other signature types because people usually do not use text in it and they draw a shape as their signature. In this paper, a method for off-line Persian signature identification and verification is proposed that is based on DWT(More)
— Signature verification and Identification has great importance for authentication purpose. Persian signatures are different from other signature types because people usually do not use text in it and they draw a shape as their signature, therefore, a different approach should be considered to process such signatures. In this paper, a method for off-line(More)
The signature verification system is always the most sought after biometric verification system. Being a behavioral biometric trait which can be imitated, the researcher faces a challenge in designing such a system to counter intrapersonal and interpersonal variations. This papers presents DWT based Off-line Signature Verification using Angular Features(More)
In this paper a novel steganography technique based on the combination of a secret sharing method and wavelet transform is presented. In this method, a secret image is shared into some shares. Then, the shares and Fletcher- 16 checksum of shares are hidden into cover images using an integer wavelet based steganography technique. In the decoding part, the(More)
This paper presents a novel diagnosis and logic debugging method for gate-level arithmetic circuits. It detects logic bugs in a synthesized circuit caused by using a wrong gate ("gate replacement" error), which change the functionality of the circuit. The method is based on modeling the circuit in an algebraic domain and computing its algebraic "signature".(More)
Complexity in digital systems is pushing the system design more and more toward the two almost separate phases, design of computational units and design of communication structures for connecting these units. As technology grows, these communication networks become more complex and require protection for their reliability. On the other hand, by shrinking(More)