SlideShare a Scribd company logo
1 of 17
Download to read offline
© 2012 Parascript, LLC parascript.com
Automating Signature Verification
The basics of software verification
2
© 2012 Parascript, LLC
Signatures are critically important in
society
3
© 2012 Parascript, LLC
Signatures authorize transactions
Checks, cards, debits
4
© 2012 Parascript, LLC
Signatures validate documents
Applications, contracts, taxes
5
© 2012 Parascript, LLC
Signatures authorize voting
Vote-by-mail
6
© 2012 Parascript, LLC
Signatures are a form of biometric
7
© 2012 Parascript, LLC
Signatures are a subconscious expression
Both the signer and the authorizer are impacted by:
Mood Environment
Writing
Instrument
Writing
Surface
Fatigue
8
© 2012 Parascript, LLC
But signatures can be forged
9
© 2012 Parascript, LLC
Types of forgeries
Random | Blind | Skilled
Person 1 Person 2 Person 3
10
© 2012 Parascript, LLC
Validating authenticity is manual, expensive
If Amount > $X, Check Signature
Not everything can be checked so rules are applied
11
© 2012 Parascript, LLC
and human performance is conditional
Performance degrades over time and in different environments
12
© 2012 Parascript, LLC
Software verification lowers costs and
doesn’t get tired
13
© 2012 Parascript, LLC
Signature software reduces cost and risk
 Doesn’t get tired or have a bad day
 Can process much higher volumes
 Consistently demonstrates higher accuracy
14
© 2012 Parascript, LLC
and helps prevent common human errors
Genuine Profile Image
Rejected Genuine
Accepted Forgery
Genuine Profile Image
15
© 2012 Parascript, LLC
Software can be used with electronic
or paper capture
16
© 2012 Parascript, LLC
There are many applications
 Automated fraud management
 Matching for document search
and retrieval
 Transaction authorization
 Voting
 And more…
17
© 2012 Parascript, LLC
See how it works
 Watch Video
http://info.parascript.com/automati
ng-signature-verification-video
 Get the Whitepaper:
http://www.parascript.com/signatures
 Follow on Twitter
http://www.twitter.com/ParascriptLLC

More Related Content

Viewers also liked

Hand Written Character Recognition Using Neural Networks
Hand Written Character Recognition Using Neural Networks Hand Written Character Recognition Using Neural Networks
Hand Written Character Recognition Using Neural Networks
Chiranjeevi Adi
 

Viewers also liked (9)

ONLINE SIGNATURE BASED APPLICATION LOCKING SYSTEM
ONLINE SIGNATURE BASED APPLICATION LOCKING SYSTEMONLINE SIGNATURE BASED APPLICATION LOCKING SYSTEM
ONLINE SIGNATURE BASED APPLICATION LOCKING SYSTEM
 
Features for Detecting Malware on Computing Environments
Features for Detecting Malware on Computing EnvironmentsFeatures for Detecting Malware on Computing Environments
Features for Detecting Malware on Computing Environments
 
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHYDATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
 
Malware Detection Using Machine Learning Techniques
Malware Detection Using Machine Learning TechniquesMalware Detection Using Machine Learning Techniques
Malware Detection Using Machine Learning Techniques
 
Electronic banking presentation
Electronic banking presentationElectronic banking presentation
Electronic banking presentation
 
Internet Banking
Internet BankingInternet Banking
Internet Banking
 
E banking
E bankingE banking
E banking
 
Internet banking
Internet bankingInternet banking
Internet banking
 
Hand Written Character Recognition Using Neural Networks
Hand Written Character Recognition Using Neural Networks Hand Written Character Recognition Using Neural Networks
Hand Written Character Recognition Using Neural Networks
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Recently uploaded (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 

The Basics of Signature Verification Software

  • 1. © 2012 Parascript, LLC parascript.com Automating Signature Verification The basics of software verification
  • 2. 2 © 2012 Parascript, LLC Signatures are critically important in society
  • 3. 3 © 2012 Parascript, LLC Signatures authorize transactions Checks, cards, debits
  • 4. 4 © 2012 Parascript, LLC Signatures validate documents Applications, contracts, taxes
  • 5. 5 © 2012 Parascript, LLC Signatures authorize voting Vote-by-mail
  • 6. 6 © 2012 Parascript, LLC Signatures are a form of biometric
  • 7. 7 © 2012 Parascript, LLC Signatures are a subconscious expression Both the signer and the authorizer are impacted by: Mood Environment Writing Instrument Writing Surface Fatigue
  • 8. 8 © 2012 Parascript, LLC But signatures can be forged
  • 9. 9 © 2012 Parascript, LLC Types of forgeries Random | Blind | Skilled Person 1 Person 2 Person 3
  • 10. 10 © 2012 Parascript, LLC Validating authenticity is manual, expensive If Amount > $X, Check Signature Not everything can be checked so rules are applied
  • 11. 11 © 2012 Parascript, LLC and human performance is conditional Performance degrades over time and in different environments
  • 12. 12 © 2012 Parascript, LLC Software verification lowers costs and doesn’t get tired
  • 13. 13 © 2012 Parascript, LLC Signature software reduces cost and risk  Doesn’t get tired or have a bad day  Can process much higher volumes  Consistently demonstrates higher accuracy
  • 14. 14 © 2012 Parascript, LLC and helps prevent common human errors Genuine Profile Image Rejected Genuine Accepted Forgery Genuine Profile Image
  • 15. 15 © 2012 Parascript, LLC Software can be used with electronic or paper capture
  • 16. 16 © 2012 Parascript, LLC There are many applications  Automated fraud management  Matching for document search and retrieval  Transaction authorization  Voting  And more…
  • 17. 17 © 2012 Parascript, LLC See how it works  Watch Video http://info.parascript.com/automati ng-signature-verification-video  Get the Whitepaper: http://www.parascript.com/signatures  Follow on Twitter http://www.twitter.com/ParascriptLLC

Editor's Notes

  1. We see a lot more use-cases than what have been listed here. What are you seeing? partner@parascript.com