• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 6
  • 3
  • 1
  • 1
  • 1
  • Tagged with
  • 15
  • 15
  • 4
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Verificação de assinaturas off-line utilizando o coeficiente de correlação de Pearson

Clerot, Davi Delgado 28 April 2014 (has links)
Submitted by Fabio Sobreira Campos da Costa (fabio.sobreira@ufpe.br) on 2016-06-13T13:50:41Z No. of bitstreams: 2 license_rdf: 1232 bytes, checksum: 66e71c371cc565284e70f40736c94386 (MD5) Dissertação - Davi Delgado Clerot - UFPE.pdf: 1275511 bytes, checksum: 8413259c0fde19c85569221d062625a8 (MD5) / Made available in DSpace on 2016-06-13T13:50:41Z (GMT). No. of bitstreams: 2 license_rdf: 1232 bytes, checksum: 66e71c371cc565284e70f40736c94386 (MD5) Dissertação - Davi Delgado Clerot - UFPE.pdf: 1275511 bytes, checksum: 8413259c0fde19c85569221d062625a8 (MD5) Previous issue date: 2014-04-28 / No âmbito da biometria comportamental, o reconhecimento automático de assinaturas manuscritas off-line se destaca pela boa aceitação em diversos segmentos, tais como Bancos, Cartórios e Imobiliárias. Dentre os fatores que estimulam sua utilização estão a facilidade na aquisição, pois não depende de equipamentos específicos, e seu valor legal ao ser realizada de próprio punho. No intuito de investigar métodos alternativos para realizar sua verificação automática, esta dissertação testa uma abordagem baseada no Coeficiente de Correlação de Pearson. O experimento foi realizado em seis etapas; da primeira à terceira, são utilizadas variações na extração de características, sem o auxílio de um classificador baseado em aprendizado automático. No quarto experimento, foi utilizada uma rede neural artificial como classificador, para efeito de comparação com os resultados anteriores. No quinto experimento, um peso associado ao limiar de resposta utilizado nos experimentos anteriores foi adicionado objetivando minimizar efeitos dos falsos positivos obtidos. No sexto e último experimento, para efeito de comparação com trabalhos relacionados, foi utilizada a base de dados disponibilizada no ICDAR (Conferência Internacional em Reconhecimento e Análise de Documentos) 2011. A configuração empregada nesta etapa, a qual utilizou a base do ICDAR, foi a do melhor experimento realizado dentre os anteriores. Os métodos propostos apresentaram resultados promissores em comparação com os resultados apresentados na literatura. / In the field of behavioral biometrics, automatic off-line handwritten signature recognition stands out for its widespread acceptance in different market segments, such as Banks, Civil Registry Offices and Real State Agencies. Among the reasons why its use is widely stimulated are its ease of acquisition, once it does not depend on specific equipment, and its legal value when it is done by the author’s own handwriting. With the purpose of searching for alternative methods to proceed to its automatic verification, this essay tests out an approach based on Pearson Correlation Coefficient. The experiment was carried out through six steps; from the first to the third ones, there were used variations for feature extraction, without the assistance of a learning classifier. In the fourth experiment, there was used an artificial neural network as a classifier, in order to compare its results with those obtained in the previous tests. In the fifth experiment, a weight associated to the threshold results obtained in the previous experiments was added, so as to minimize the false positive rate. In the sixth and last experiment, for comparison with related essays, there was used the ICDAR (International Conference on Document Analysis and Recognition) 2011 database. The configuration utilized in this last step was the one obtained in the best test among the previous ones. The proposed methods presented promising results compared to others reported in the literature.
12

Implementación del sistema de verificación de identificación biométrica por el procedimiento de verificación de firmas en RENIEC

Calle Angulo, David Eduardo, Espinoza Novoa, Rommel Eduardo, Rimachi Martinez, Eduardo, Salazar Seminario , César Augusto 31 August 2019 (has links)
La presente investigación tiene como objetivo evaluar la conveniencia de implementar mejoras a través del uso de la tecnología al procedimiento de verificación de firmas que se encuentra a cargo de la Sub Gerencia de Verificación de Firmas y Apoyo Electoral del Registro Nacional de Identificación y Estado Civil (RENIEC). La finalidad es demostrar que es factible brindar un mejor servicio al ciudadano y así fortalecer el valor público dentro del sistema democrático del país, ya que la manera en la que actualmente se desarrolla este procedimiento se evidencia serios cuestionamientos en su seguridad científica y jurídica debido a los problemas existentes: firmas falsificadas, demora en la entrega de resultados, marco jurídico inadecuado, falta de personal capacitado y la no optimización de recursos públicos. Para efectuar este cambio en el procedimiento, se propone la modificación del marco normativo, la restructuración del procedimiento principal y la identificación de beneficios como consecuencia de la implementación propuesta. Este informe de la investigación realizada se encuentra organizada en cinco capítulos. En el primero, se presenta el marco teórico general. Aquí se describen aspectos relacionados con el sistema electoral peruano, como son el cuerpo normativo electoral, la legislación vigente en materia de creación y regulación del RENIEC, la gestión por indicadores, el valor público y los lineamientos de la política de modernización del Estado. El segundo capítulo se enfoca en describir la situación actual del procedimiento de verificación de firmas. En este, se detalla el área técnica del RENIEC que está a cargo de la realización de dicha actividad. Además, se hace una breve descripción del marco normativo de este procedimiento y de los indicadores de gestión que utiliza para su desarrollo. En el tercer capítulo, se abarcarán los objetivos estratégicos de la RENIEC con la finalidad de identificar como estos coadyuvan al mejoramiento del procedimiento de verificación de firmas. Además, se identifica cuál es el servicio brindado, los clientes que se benefician y los requerimientos utilizados para efectuar el mencionado procedimiento. En el cuarto capítulo, se identifican las áreas u órganos que intervienen en la ejecución del procedimiento de verificación de firmas. Asimismo, se detalla la forma en la que se realiza el mismo de acuerdo al marco normativo vigente; también, se presenta la evolución histórica del procedimiento de acuerdo a los últimos años. Finalmente, en el quinto capítulo, se aborda la mejora del procedimiento y, tras el análisis y evaluación del mismo, se identifican las dificultades existentes. Luego de ello, se valora la propuesta de mejora y se indica la secuencia lógica para su implementación. Para ello, se efectuó la propuesta normativa adecuada para implementar el nuevo sistema de verificación de identificación biométrica. Además, se indican los beneficios de uso del mismo y la estrategia para su implementación en el RENIEC en un plazo de tres (3) años, con lo cual se coadyuvará a la optimización de recursos y entrega de resultados. Y para finalizar, se presentan las conclusiones y recomendaciones en base a la propuesta de mejora y al plan de implementación. / The research is intended to evaluate the suitability of implementing improvements through the use of technology to the signature verification procedure performed by the Sub-Department of Signature Verification and Electoral Support of the National Registry of Identification and Civil Status (RENIEC). The purpose is to demonstrate the feasibility of providing user citizens with more effective services and strenghten public value within the country´s democratic system, since the way in which this procedure is currently being carried out does not generate legal certainty due to existing problems: forged signatures, delays in the delivery of results, an inadequate legal framework, insuffciently trained staff and nonoptimized public resources. In order to improve on the procedure, modifications to the regulatory framework, a restructuring of the main procedure and the identification of benefits derived from the proposed implementation are proposed. This research report consists of five chapters. In the first one, a general theoretical framework is presented. Aspects related to the Peruvian electoral system are described, such as the electoral regulatory body, such as the electoral regulatory body, the legislation responsible of the creation and regulation of RENIEC, its indicator-based management practices and the guidelines for the State modernization policy. The second chapter focuses on describing the current status of the signature verification procedure and of RENIEC’s technical department in charge of carrying out this activity is discussed. In addition, the chapter includes a brief description of the regulatory framework for this procedure and of the management indicators that it uses for its development. The third chapter covers RENIEC’s strategic objectives, in order to determine their contribution to the improvement of the signature verification procedure. It also identifies the service that is provided, the users that benefit from it and the requirements to perform this procedure. In the fourth chapter, the areas or bodies involved in the execution of the signature verification procedure are identified. The chapter also presents the steps to perform this procedure in compliance with the current regulatory framework. The historical evolution of the procedure in recent years is discussed as well. Finally, the fifth chapter discusses the improvement of the procedure and, after due analysis and evaluation, the identification of existing difficulties. The proposed improvement is assessed and the logical steps towards its implementation are provided. An appropriate normative proposal consisting of implementing the new biometric identification verification system is made. In addition, the chapter discusses its potential benefits and the strategy for its implementation by RENIEC in a three-year period, which will support the optimization of resources and the delivery of results. The final section of this research report includes conclusions and recommendations based on the proposed improvement and implementation plan. / Trabajo de investigación
13

Biomechanical online signature modeling applied to verification / Modélisation biomécanique des signatures en ligne appliqué à la vérification

Coutinho Canuto, Jânio 08 December 2014 (has links)
Cette thèse porte sur la modélisation et vérification des signatures en ligne. La première partie a pour thème principal la modélisation biomécanique des mouvements de la main. Un modèle basé sur le critère de Minimum de Secousse (MS) a été choisi parmi plusieurs théories du contrôle moteur. Ensuite, le problème de la segmentation des trajectoires en traits qui correspondent au modèle cinématique choisi a été étudié, ce qui a conduit à la mise au point d'une méthode de segmentation itérative. Le choix du modèle et de la méthode de segmentation sont basé sur le compromis entre la qualité de reconstruction et la compression. Dans la deuxième partie, le modèle polynomial issu du critère de MS est volontairement dégradé. Les zéros non-Réels des polynômes sont jetés et les effets de cette dégradation sont étudiés dans une perspective de vérification biométrique. Cette dégradation est équivalente à la technique connue sous le nom d’Infinity Clipping, initialement appliqué à des signaux de parole. Pour les signatures en ligne, comme pour la parole, la préservation de l'information essentielle a été observée sur des tâches de vérification de signature. En fait, en utilisant seulement la distance de Levenshtein sur la représentation dégradée, un taux d'erreur comparable à ceux des méthodes plus élaborées a été obtenu. En outre, la représentation symbolique issue de l’Infinity Clipping permet d’établir une relation conceptuelle entre le nombre de segments obtenus par la segmentation itératif basée sur le MS et la complexité de Lempel-Ziv. Cette relation est potentiellement utile pour l'analyse des signatures en ligne et pour l’amélioration des systèmes de reconnaissance / This thesis deals with the modelling and verification of online signatures. The first part has as main theme the biomechanical modelling of hand movements associated to the signing gesture. A model based on the Minimum Jerk (MJ) criterion was chosen amongst the several available motor control theories. Next, the problem of signature trajectory segmentation into strokes that better fit the chosen kinematic model is studied, leading to the development of an iterative segmentation method. Both the choice of the model and the segmentation method are strongly based on the tradeoff between reconstruction quality and compression. On the second part, the polynomial model provided by the MJ criterion is intentionally degraded. The non-Real zeroes of the polynomials are discarded and the effects of this degradation are studied from a biometric verification perspective. This degradation is equivalent to the signal processing technique known as Infinity Clipping, originally applied to speech signals. On signatures, as for speech, the preservation of essential information was observed on signature verification tasks. As a matter of fact, using only the Levenshtein distance over the infinitely clipped representation, verification error rates comparable to those of more elaborate methods were obtained. Furthermore, the symbolic representation yielded by the infinity clipping technique allows for a conceptual relationship between the number of polynomial segments obtained through the Minimum Jerk-Based iterative segmentation and the Lempel-Ziv complexity. This relationship is potentially useful for the analysis of online signature signals and the improvement of recognition systems
14

Recuperação de trajetória de ponta de caneta em assinaturas offline com referencial online

Cavalcante Neto, Luiz Miranda 30 January 2017 (has links)
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior - CAPES / The handwritten signature is a form of personal identification widely accepted, both socially and legally, used for centuries to authenticate documents such as bank checks, letters, contracts and any type of service that requires proof of authorship. When signing, an individual inserts a large amount of information to transform the movement of his hand into an identifying element. Writing speed, trajectory traversed, pen inclination, applied pressure, all these data are articulated (in the form of latent variables) to result in a static figure in the signed document. This dissertation investigates the problem of trajectory extraction of the pen that generates this signature from the resulting static image. For this, the work was divided in three main steps that are: (i) compute the skeleton of the offline signature; (ii) extract its characteristics using a concept addressed in this work called UCSS, and, with the help of previously recorded online signatures, (iii) estimate the path that the pen traveled over the skeleton. In each of these steps, a review of relevant work on the themes was done prior to begin implementation. Three experiments were carried out during this work, the first one was done with the objective of comparing the results obtained with the developed algorithm and the results obtained in a reference work, the other two were realized during the production of an article destined to the publication attached to this job. / A assinatura manuscrita é uma forma de identificação pessoal amplamente aceita, tanto social como juridicamente, utilizada há séculos para autenticar documentos como cheques bancários, cartas, contratos e todo tipo de serviço que necessite prova de autoria. Ao assinar, um indivíduo insere uma grande quantidade de informação para transformar o movimento de sua mão em um elemento identificador. Velocidade de escrita, trajetória percorrida, inclinação da caneta, pressão aplicada, todos esses dados são articulados (na forma de variáveis latentes) para resultar em uma figura estática no documento assinado. Essa dissertação investiga o problema de extração de trajetória da caneta que gera essa assinatura a partir da imagem estática resultante. Para isso, o trabalho foi divido em três passos principais que são: (i) computar o esqueleto da assinatura offline; (ii) extrair suas características utilizando um conceito abordado neste trabalho chamado UCSS, e, com o auxílio de assinaturas online registradas previamente; (iii) estimar o caminho que a caneta percorreu sobre o esqueleto. Em cada um desses passos, foi feita uma revisão de trabalhos relevantes sobre os temas para só então iniciar as implementações. Foram realizados três experimentos durante este trabalho, o primeiro foi feito com o objetivo de comparar os resultados obtidos com o algoritmo desenvolvido e os resultados obtidos em um trabalho de referência, os outros dois foram realizados durante a produção de um artigo destinado a publicação anexado a este trabalho.
15

Efficient, Scalable and Secure Vehicular Communication System : An Experimental Study

Singh, Shubhanker January 2020 (has links)
Awareness of vehicles’ surrounding conditions is important in today’s intelligent transportation system. A wide range of effort has been put in to deploy Vehicular Communication (VC) systems to make driving conditions safer and more efficient. Vehicles are aware of their surroundings with the help of authenticated safety beacons in VC systems. Since vehicles act according to the information conveyed by such beacons, verification of beacons plays an important role in becoming aware of and predicting the status of the sender vehicle. The idea of implementing secure mechanisms to deal with a high rate of incoming beacons and processing them with high efficiency becomes a very important part of the whole VC network. The goal of this work was to implement a scheme that deals with a high rate of the incoming beacon, preserve non-repudiation of the accepted messages which contains information about the current and near-future status of the sender vehicle, and at the same time keep the computation overhead as low as possible. Along with this, maintaining user privacy from a legal point of view as well as from a technical perspective by implementing privacy-enhancing technologies. These objectives were achieved by the introduction of Timed Efficient Stream Loss-Tolerant Authentication (TESLA), periodic signature verification, and cooperative verification respectively. Four different scenarios were implemented and evaluated, starting and building upon the baseline approach. Each approach addressed the problems that were aimed at this work and results show improved scalability and efficiency with the introduction of TESLA, periodic signature verification, and cooperative verification. / Medvetenheten om fordons omgivande förhållanden är viktig i dagens intelligenta transportsystem. Ett stort antal ansträngningar har lagts ned för att distribuera VC system för att göra körförhållandena säkrare och effektivare. Fordon är medvetna om sin omgivning med hjälp av autentiserade säkerhetsfyrar i VC system. Eftersom fordon agerar enligt den information som förmedlas av sådana fyrar, spelar verifiering av fyrar en viktig roll för att bli medveten om och förutsäga avsändarfordonets status. Idén att implementera säkra mekanismer för att hantera en hög frekvens av inkommande fyrar och bearbeta dem med hög effektivitet blir en mycket viktig del av hela VC nätverket. Målet med detta arbete var att implementera ett schema som behandlar en hög hastighet för det inkommande fyren, bevara icke-förkastelse av de accepterade meddelandena som innehåller information om den aktuella och närmaste framtida statusen för avsändarfordonet och samtidigt håll beräkningen så låg som möjligt. Tillsammans med detta upprätthåller användarnas integritet ur juridisk synvinkel såväl som ur ett tekniskt perspektiv genom att implementera integritetsförbättrande teknik. Dessa mål uppnåddes genom införandet av TESLA, periodisk signatur verifiering respektive samarbets verifiering. Fyra olika scenarier implementerades och utvärderades med utgångspunkt från baslinjemetoden. Varje tillvägagångssätt tog upp de problem som riktades mot detta arbete och resultaten visar förbättrad skalbarhet och effektivitet med införandet av TESLA, periodisk signatur verifiering och samarbets verifiering.

Page generated in 0.1372 seconds