##plugins.themes.academic_pro.article.main##

Abstract

Forensics document Examiner examines handwritten documents. The proposed system examines document using graphology science which generate a profile report of a person through handwritten text. The proposed system is a pattern recognition system for the organization which is involved in handwriting analysis and Cyber Crime Investigation. FODEX is designed to provide online facilities to the Users who want to verify their handwriting. This enhances the graphology to the next level where users can be across the globe. More specifically, FODEX is designed to provide a user interface which will facilitate easy of analyzing the handwriting samples. The system accepts scanned input image of handwriting and processes it using image processing algorithms and extract features from the image. These features are compared against a standard data set to generate a report about the sample submitted by the person later the generated report is either emailed or printed for the user accordingly. FODEX processes image and extracts features through various processed such as gray scale, threshold detection, RGB splitting, thinning, segmentation, scaling. 

 

Keywords: Image Processing, Handwriting Analysis, Forensic Document Examiner

##plugins.themes.academic_pro.article.details##

Author Biographies

Shweta Hegade, Smt Kashibai Navle College of Engineering Savitribai Phule Pune University

Computer Engineering

Gargee Hiray, Smt Kashibai Navle College of Engineering Savitribai Phule Pune University

Computer Engineering

Prajkta Mali, Smt Kashibai Navle College of Engineering Savitribai Phule Pune University

Computer Engineering

Prof Punam Raskar, Smt Kashibai Navle College of Engineering Savitribai Phule Pune University

Computer Engineering
How to Cite
Hegade, S., Hiray, G., Mali, P., & Raskar, P. P. (2015). FODEX: Forensic Document Examiner –Using Graphology Science. International Journal of Emerging Trends in Science and Technology, 2(03). Retrieved from http://igmpublication.org/ijetst.in/index.php/ijetst/article/view/547

References

1. Santana O., Travisco C. M., Alonzo J. B., Ferrer M. A., “Writer Identification Based on Graphology Techniques , IEEE Xplore, 2008 Perut .
2. Boribalburephan and Boonnatee Sakboonyarat , “An Algorithm Development for Handwritten Character Recognition by Personal Handwriting Identity Analysis [PHIA]”, Knowledge and Smart Technology(KST),2012 TH International Conference, Pages 6-10.
3. Champa H N,K R Ananda Kumar, “Automated Human Behavior Prediction through Handwriting Analysis”, Procedings in integrated intelligent computing(ICIIC),2010 FIRST INTERNATIONAL CONFERENCE,PAGES 160-165, 2010.
4. Champa H N, Dr. K R AnandaKumar “Artificial Neural Network for Human Behavior Prediction through Handwriting Analysis”, International Journal of Computer Applications (0975 – 8887) Volume 2 – No.2, May 2010
5. S. N. Srihari, H. Srinivasan and K. Desai, "Questioned Document Examination using CEDAR-FOX,"Journal of Forensic Document Examination, 18, 2007, pp. 1-20
6. A. Srihari, S. Cha, H. Arora, S. Lee, “Individuality of Handwriting: A Validity Study”,Proc. ICDAR‟01, Seattle (USA), pp 106-109, 2001.
7. Nobuyuki Otsu (1979). "A threshold selection method from gray-level histograms". IEEE Trans. Sys., Man., Cyber. 9 (1): 62 66
8. M. Sezgin and B. Sankur (2004). "Survey over image thresholding techniques and quantitative performance evaluation". Journal of Electronic Imaging 13 (1): 146–165.
9. L. Lam, S.W. Lee and C.Y. Suen, “Thinning Methodologies –A Comprehensive Survey”, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 14, No. 9, Sept. 1992, pp. 869-885
10. Siew Hock Ow, Kean Siang Teh and Li Yi Yee, “An Overview on the Use of Graphology as a Tool for Career Guidance”,CMU. Journal (2005) Vol. 4(1)