Professional Documents
Culture Documents
IRJET - V8I6528 With Cover Page v2
IRJET - V8I6528 With Cover Page v2
IRJET
ACTIVE AUTHENTICATION:
© 2021, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2969
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 08 Issue: 06 | June 2021 www.irjet.net p-ISSN: 2395-0072
watermarking are significant methods for digital image brain without any careful attention to information until an
authenticity. individual is used to sign his signature. Signature
verification and forgery detection is the method of
1.1DIGITAL WATERMARKING: automatically and immediately checking signatures to
determine whether or not the signature is authentic.
For image forgery detection, watermarking is often used.
Several methods of watermarking have been suggested. There are two main forms of signature verification:
One uses a checksum schema to apply data to the last most
significant pixel bit[3]. Others add to the pixel data a 1.Static2.Dynamic
maximum length linear shift register sequence and then
define the watermark by computing the sequence's spatial Static or offline verification is the method of verifying an
cross-correlation function and the watermarked image. electronic or paper signature after it has been produced,
whereas dynamic or online verification takes place as the
These watermarks are intended to be invisible or to blend subject produces its signature on a digital tablet or similar
in with natural noise from the camera or scanner. Often, computer.The signature in question then constitutes the
visible watermarks exist. In addition to this, there is also a database or knowledge base, compared with previous
visually undetectable watermarking schema that can samples of target signatures. The machine allows the
detect the change in single pixels and locate where the sample to be scanned for analysis in the case of an ink
change takes place[3]. Embedding watermarks during signature on a document, where the digital signature that
digital image production can restrict its application if the is already stored in data format can be used for signature
mechanism for generating digital images has built-in authentication.
watermarking capabilities. There are some drawbacks to
these active strategies since they require some human Signatures are now one of the most commonly recognized
interaction or specially designed cameras. Passive personal characteristics for identity controversy, whether
authentication has been suggested to resolve this problem. from the banking or business field. Thus in some cases,
these signatures are easy to counterfeit. Four types of
1.2 DIGITAL SIGNATIURE: forgeries are possible in this situation.
© 2021, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2970
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 08 Issue: 06 | June 2021 www.irjet.net p-ISSN: 2395-0072
2. RELATED WORKS:
3. THEORETICAL ANALYSIS
© 2021, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2971
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 08 Issue: 06 | June 2021 www.irjet.net p-ISSN: 2395-0072
© 2021, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2972
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 08 Issue: 06 | June 2021 www.irjet.net p-ISSN: 2395-0072
7. REFERENCES:
© 2021, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2973