Enhancing the Authentication of Bank Cheque Signatures by Implementing Automated System Using Recurrent Neural Network
نویسندگان
چکیده
---------------------------------------------------ABSTRACT-----------------------------------------------The associative memory feature of the Hopfield type recurrent neural network is used for the pattern storage and pattern authentication. This paper outlines an optimization relaxation approach for signature verification based on the Hopfield neural network (HNN) which is a recurrent network. The standard sample signature of the customer is cross matched with the one supplied on the Cheque. The difference percentage is obtained by calculating the different pixels in both the images. The network topology is built so that each pixel in the difference image is a neuron in the network. Each neuron is categorized by its states, which in turn signifies that if the particular pixel is changed. The network converges to unwavering condition based on the energy function which is derived in experiments. The Hopfield’s model allows each node to take on two binary state values (changed/unchanged) for each pixel. The performance of the proposed technique is evaluated by applying it in various binary and gray scale images. This paper contributes in finding an automated scheme for verification of authentic signature on bank Cheques. The derived energy function allows a trade-off between the influence of its neighborhood and its own criterion. This device is able to recall as well as complete partially specified inputs. The network is trained via a storage prescription that forces stable states to correspond to (local) minima of a network “energy” function.
منابع مشابه
The Optimization of Forecasting ATMs Cash Demand of Iran Banking Network Using LSTM Deep Recursive Neural Network
One of the problems of the banking system is cash demand forecasting for ATMs (Automated Teller Machine). The correct prediction can lead to the profitability of the banking system for the following reasons and it will satisfy the customers of this banking system. Accuracy in this prediction are the main goal of this research. If an ATM faces a shortage of cash, it will face the decline of bank...
متن کاملSecure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines
Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...
متن کاملFace Detection with methods based on color by using Artificial Neural Network
The face Detection methodsis used in order to provide security. The mentioned methods problems are that it cannot be categorized because of the great differences and varieties in the face of individuals. In this paper, face Detection methods has been presented for overcoming upon these problems based on skin color datum. The researcher gathered a face database of 30 individuals consisting of ov...
متن کاملMonte Carlo Simulation to Compare Markovian and Neural Network Models for Reliability Assessment in Multiple AGV Manufacturing System
We compare two approaches for a Markovian model in flexible manufacturing systems (FMSs) using Monte Carlo simulation. The model which is a development of Fazlollahtabar and Saidi-Mehrabad (2013), considers two features of automated flexible manufacturing systems equipped with automated guided vehicle (AGV) namely, the reliability of machines and the reliability of AGVs in a multiple AGV jobsho...
متن کاملBiometric Authentication of Fingerprint for Banking Users, Using Stream Cipher Algorithm
Providing banking services, especially online banking and electronic payment systems, has always been associated with high concerns about security risks. In this paper, customer authentication for their transactions in electronic banking has been discussed, and a more appropriate way of using biometric fingerprint data, as well as encrypting those data in a different way, has been suggest...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1006.2684 شماره
صفحات -
تاریخ انتشار 2010