Open Access Open Access  Restricted Access Subscription or Fee Access

Security on Mobile Agent Based Communication System

Tarun Dhar Diwan, Jahangeer Mohiudin Lone

Abstract


In this paper, as signatures continue to play an important role in financial, commercial and legal transactions, truly secured authentication becomes more and more crucial. to perform verification or identification of a signature, several steps must be performed. online signature verification has been shown to achieve much higher verification rate than offline verification this paper proposes a novel framework for online signature verification. Different from previous methods, our approach makes use of online handwriting instead of handwritten images for registration. The online registrations enable robust recovery of the writing trajectory from an input online signature and thus allow effective shape matching between registration and verification signatures. In addition, the online registrations enable robust recovery of the writing trajectory from an input online signature and thus allow effective shape matching between registration and verification signatures. in addition, the features have been calculated using 16 bits fixed-point arithmetic and tested with different classifiers, such as hidden markov models, support vector machines, and euclidean distance classifier. We propose several new techniques to improve the performance of the new signature verification rate system.

Keywords


Verification Rate, Verification Rate, Hand Writing Recognition, Training Data, Testing Data.

Full Text:

PDF

References


Domenico Amalfitano, Anna Rita Fasolino, Porfirio Tramontana," A GUI Crawling-based technique for Android Mobile Application Testing", 2011 Fourth International Conference on Software Testing, Verification and Validation Workshops.

Md. Faizan Farooqui, Dr. Md. Rizwan Beg And Dr. Md. Qasim Rafiq," An Extended Model For Effective Migrating Parallel Web Crawling With Domain Specific And Incremental Crawling", International Journal On Web Service Computing (Ijwsc), Vol.3, No.3, September 2012.

Ismet Aktas, Florian Schmidt, Muhammad Hamad Alizai, Tobias Drüner, Klaus Wehrle,"CRAWLER: An Experimentation Platform for System Monitoring and Cross-Layer-Coordination", 978-1-4673-1239-4/12/$31.00 c 2012 IEEE.

Pavalam S. M., S. V. Kasmir Raja, Jawahar M., and Felix K. Akorli," Web Crawler inMobile Systems", International Journal of Machine Learning and Computing, Vol. 2, No.4,August 2012.

Sameendra Samarawickrama, Lakshman Jayaratne," A Survey of Focused Web Crawling Approaches", 11 October 2011, Revised 18 November 2011, Accepted 23 November 2011 -2012 DLINE. All rights reserved.

Jai Balasubramaniyan, Jose Omar Garcia-Fernandez, David Isacoff, E. H. Spafford, and Diego Zamboni, “An Architecture for Intrusion Detection using Autonomous Agents,” Department of Computer Sciences, Purdue University; Coast TR98-05,1998.URL: http://www.cs.purdue.edu/coast/coast-library.html

Barrett, Michael, W. Booth, M. Conner, D. Dumas, M. Gaughan, S, Jacobs, M. Little, “Intelligent Agents System Requirements and Architecture,” Report to ATIRP, p. 5, October 1998.

Bauer, David S. and Koblentz, Michael E., “NIDX: An Expert System for Real-Time Network Intrusion Detection,” Proceedings of the Computer Networking Symposium, pp. 90-106, April 1988, Washington, DC.

Jeffrey M. Bradshaw,“An Introduction to Software Agents,” In Jeffrey M. Bradshaw, editor, Software Agents, chapter 1. AAAI Press/The MIT Press, 1997.

Chess, D., B. Grosof, C. Harrison, D. Levine, C. Parris, G. Tsudik, “Itinerant Agents for Mobile Computing,” IBM Research Report, RC 20010, March 1995. URL:http://www.research.ibm.com/massdist

G.Back and W. Hsieh.Drawing the red line in Java. In Seventh IEEE Workshop on Hot Topics in Operating Systems, Rio Rico, AZ, USA, Mar. 1999.

W.Binder.Design and implementation of the J-SEAL2 mobile agent kernel.In The 2001 Symposium on Applications and the Internet (SAINT-2001), San Diego, CA, USA, Jan. 2001.

W.Binder, J.Hulaas, A. Villaz´on, and R.Vidal. Portable resource control in Java: The J-SEAL2 approach. In ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA’01), Tampa Bay, Florida, USA, Oct. 2001.

G. Bollella, B. Brosgol, P. Dibble, S. Furr, J. Gosling, D. Hardin, and M. Turnbull. TheReal-TimeSpecification for Java. Addison-Wesley, Reading, MA, USA, 2000.

Gosling,J., B. Joy, and G.L. Steele. (1996). The Java Language Specification. The Java Series.Reading, MA: Addison-Wesley. Available via WWW at URL: http://java.sun.com/docs/books/jls/html/index.html.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.