Computer Science Project Topics

Design and Implementation of a Signature Recognition and Verification System (Case Study of Lapo Microfinance Bank)

Design and Implementation of a Signature Recognition and Verification System (Case Study of Lapo Microfinance Bank)

Design and Implementation of a Signature Recognition and Verification System (Case Study of Lapo Microfinance Bank)

Chapter One

AIMS AND OBJECTIVE OF THE STUDY

The main aim of signature recognition and verification is to be capable of efficiently addressing two objective but strongly related tasks:

  • Identification of the signature owner, and,
  •  Decision whether the signature is genuine or forger.

CHAPTER TWO

SYSTEM DESIGN

INTRODUCTION

This chapter describes in detail the system design methodology. It focuses on the system structure and interactions. The proposed system is a signature recognition and verification system. It is created to be a desktop application or deployed on the web and is aimed at providing application processing services for Lapo Microfinance bank as a case study. This chapter begins by examining the Systems Requirement Specification (SRS) document which is majorly focused on only the functional requirements to be provided by the system. It proceeds to the system design which consists of the logic design. The logic design consists of various user interfaces and the chapter also explains the system design using UML diagrams.

SYSTEM REQUIREMENT SPECIFICATION

The system requirement specification is a structured document that collects information which encompasses the requirements of a system. This section would focus mainly on the functional requirements of the proposed system and these include:

  1. The system should have a menu which contains buttons used for verifying signature, and adding information to the database.
  2. The database to be used for the system is Local server MYSQL database.
  3. The system should allow users to create and maintain document with signature and also be able to verify signature to access document from the system.
  4. The system be flexible and user friendly with straight forward menu.
  5. The system should be able to track insecure penetrations and prevent unauthorized intrusions.
  6. The system should allow users to input data.

 

CHAPTER THREE

SYSTEM DESIGN

INTRODUCTION

This chapter describes in detail the system design methodology. It focuses on the system structure and interactions. The proposed system is a signature recognition and verification system. It is created to be a desktop application or deployed on the web and is aimed at providing application processing services for Lapo Microfinance bank as a case study. This chapter begins by examining the Systems Requirement Specification (SRS) document which is majorly focused on only the functional requirements to be provided by the system. It proceeds to the system design which consists of the logic design. The logic design consists of various user interfaces and the chapter also explains the system design using UML diagrams.

SYSTEM REQUIREMENT SPECIFICATION

The system requirement specification is a structured document that collects information which encompasses the requirements of a system. This section would focus mainly on the functional requirements of the proposed system and these include:

  1. The system should have a menu which contains buttons used for verifying signature, and adding information to the database.
  2. The database to be used for the system is Local server MYSQL database.

CHAPTER FOUR

METHODOLOGY AND ANALYSIS OF THE SYSTEM

SYSTEM FLOWCHART

 

CHAPTER FIVE

Introduction

This chapter focuses on summary, conclusion and recommendations.

Here, the entire summary of the research from the problem stage to the implementation stage, the relevant conclusion and recommendations are discussed.

Constraints of the Study

The problems encountered during the course of carrying out this research project include:

  1. Time: Time for the research project was too short coupled with researcher’s academic time table.
  2. Fund:There was limited fund to take care of the research properly in terms of transportation and other expenses especially when visiting attraction sites.
  3. Research Materials: Lack of access to research materials on the topic in the school library and even public libraries were also major constraint in the cause of this project.

Summary

Implementation of a signature recognition and verification system has been created. The new system would be very easy to use because of its accuracy and reliability. Signature created and verified can be easily accessed.

 Conclusion

From this Academic Work, I have been able to show the application of database management system(signature recognition and verification system) and how it can be used, it has achieve the full aim of letting the public know what computer system is all about.

 Recommendations

Having designed, tested and implemented the new system, the following must be put in place to fully achieve the objective of which the software is designed.

Maintenance: The system needs to be maintained. This implies that any fault detected should be reported to the programmer for correction at any point in time.

Research: More research should be conducted on the topic to assess it effectively.

REFERENCES

  •  D.Muramatsu, M. Kondo, M. Sasaki, S. Tachibana, and T. Matsumoto. “A markov chain monte carlo algorithm for bayesian dynamic signature verification”. IEEE Transactionson Information Forensics and Security, 1(1):22–34, March,2006.
  • K. Yasuda, D. Muramatsu, and T. Matsumoto, “Visual-based online signature verification by pen tip tracking”, Proc. CIMCA 2008, 2008, pp. 175–180.
  • Satoshi Shirato, D. Muramatsu, and T. Matsumoto, “camera-based online signature verification: Effects of camera positions.” World Automation congress2010 TSI press.
  •  D. Muramatsu, K. Yasuda, S. Shirato, and T. Matsumoto. “Visual-based online signature verification using features extracted from video”, Journal of Network and Computer Applications Volume 33, Issue 3, May 2010, Pages 333-341.
  • R. Plamondon and G. Lorette. Automatic signature verification and writer identification – the state of the art. Pattern Recognition, 22(2):107–131, 1989.
  • M. E. Munich and P. Perona. “Visual identification by signature tracking.” IEEE Trans. Pattern Analysis and Machine Intelligence, 25(2):200–217, February 2003.
  • F.A.Afsar, M. Arif and U. Farrukh, “Wavelet Transform Based Global Features for Online Signature Recognition”, Proceeding of IEEE International Multi-topic Conference INMIC, pp. 1-6 Dec. 2005.
  •  Mohammad M. Shafiei, Hamid R. Rabiee, “A New On-Line Signature Verification Algorithm Using Variable Length Segmentation and Hidden Markov Models,” Seventh International Conference on Document Analysis and Recognition (ICDAR’03), vol. 1, pp. 443, 2003.
WeCreativez WhatsApp Support
Our customer support team is here to answer your questions. Ask us anything!