{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T11:13:42Z","timestamp":1651835622617},"reference-count":27,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,4]]},"abstract":"<jats:p>A smart society is an empowered society, which can improve the lives of its citizens by using the latest innovations and technologies. This improvement can happen in several dimensions out of which security is a major one. Inconsistency and forgery are very common phenomenon where handwritten signatures are often preserved for training a classifier to authenticate a person. The removal of outliers, at the outset, obviously improves the quality of training and the classifier. The present article deals with the mechanized segregation of the poor-quality authentic signatures from reliable ones. Machine learning algorithms for outlier handling utilizing clustering, classification and statistical techniques have been implemented in this context. Subsequent performance evaluation after outlier removal reflects improvement of both true positive and true negative recognition rate accuracy. The performance evaluation presents the significant differences between authentication accuracy and forgery accuracy in the context of building a safe, secure and smart society.<\/jats:p>","DOI":"10.4018\/ijdst.2019040104","type":"journal-article","created":{"date-parts":[[2019,4,4]],"date-time":"2019-04-04T14:08:01Z","timestamp":1554386881000},"page":"64-83","source":"Crossref","is-referenced-by-count":0,"title":["Innovative Outlier Removal Techniques to Enhance Signature Authentication Accuracy for Smart Society"],"prefix":"10.4018","volume":"10","author":[{"given":"Anindita","family":"Desarkar","sequence":"first","affiliation":[{"name":"Jadavpur University, Kolkata, India"}]},{"given":"Shisna","family":"Sanyal","sequence":"additional","affiliation":[{"name":"Jadavpur University, Kolkata, India"}]},{"given":"Anupam","family":"Baidya","sequence":"additional","affiliation":[{"name":"Jadavpur University, Kolkata, India"}]},{"given":"Ajanta","family":"Das","sequence":"additional","affiliation":[{"name":"University of Engineering & Management, Kolkata, India"}]},{"given":"Chitrita","family":"Chaudhuri","sequence":"additional","affiliation":[{"name":"Jadavpur University, Kolkata, India"}]}],"member":"2432","reference":[{"key":"IJDST.2019040104-0","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1016\/j.protcy.2013.12.340","article-title":"Classification of heart disease using k-nearest neighbor and genetic algorithm.","volume":"10","author":"B. L.Deekshatulu","year":"2013","journal-title":"Procedia Technology"},{"key":"IJDST.2019040104-1","doi-asserted-by":"publisher","DOI":"10.1016\/S0952-1976(00)00064-6"},{"key":"IJDST.2019040104-2","first-page":"1","article-title":"Comparative analysis of density based outlier detection techniques on breast cancer data using hadoop and map reduce.","volume":"Vol. 2","author":"S.Behera","year":"2016","journal-title":"International Conference on Inventive Computation Technologies (ICICT)"},{"key":"IJDST.2019040104-3","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-28349-8_2"},{"issue":"3","key":"IJDST.2019040104-4","first-page":"43","article-title":"Features Extraction and Verification of Signature Image using Clustering Technique","volume":"4","author":"S.Biswas","year":"2010","journal-title":"International Journal of Smart Home"},{"issue":"5","key":"IJDST.2019040104-5","first-page":"157","article-title":"Auto-Upgrading of Signature Case-Base used for Efficient Detection of Identity and Authenticity","volume":"6","author":"C.Chaudhuri","year":"2016","journal-title":"International Journal of Research in Engineering and Applied Sciences"},{"key":"IJDST.2019040104-6","doi-asserted-by":"publisher","DOI":"10.1109\/EAIT.2014.38"},{"key":"IJDST.2019040104-7","doi-asserted-by":"publisher","DOI":"10.1155\/S1110865704309042"},{"key":"IJDST.2019040104-8","doi-asserted-by":"publisher","DOI":"10.1142\/S0218001497000378"},{"key":"IJDST.2019040104-9","first-page":"1","article-title":"Offline Handwritten Signature Verification Literature Review","author":"L. G.Hafemann","year":"2017","journal-title":"International Conference on Pattern Recognition"},{"key":"IJDST.2019040104-10","unstructured":"Han, J., & Kamber, M. (2006). Data Mining Concepts and Techniques (2nd ed.). Elsevier. Retrieved from http:\/\/atvs.ii.uam.es\/mcyt75so.html"},{"key":"IJDST.2019040104-11","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(96)00063-5"},{"issue":"5","key":"IJDST.2019040104-12","first-page":"605","article-title":"Application of K-Nearest Neighbor (KNN) Approach for Predicting Economic Events: Theoretical Background","volume":"3","author":"S.Imandoust","year":"2013","journal-title":"International Journal of Engineering Research and Applications"},{"issue":"1","key":"IJDST.2019040104-13","first-page":"22","article-title":"Online Signature Verification System using DRT, DCT and K-NN Classifier","volume":"3","author":"K. S.Khabiya","year":"2016","journal-title":"International Journal for Innovative Research in Science & Technology"},{"key":"IJDST.2019040104-14","first-page":"18","article-title":"Survey of Classification Techniques in Data Mining","volume":"1","author":"V.Krishnaiah","year":"2014","journal-title":"International Journal on Computer Science and Engineering"},{"issue":"1","key":"IJDST.2019040104-15","article-title":"Survey on Offline Handwritten Signature Verification","volume":"2","author":"L.Malphedwar","year":"2017","journal-title":"International Journal of Emerging Technology and Computer Science"},{"key":"IJDST.2019040104-16","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.3.8.9-22"},{"key":"IJDST.2019040104-17","first-page":"1","article-title":"Efficient algorithm for the extraction of association rules in data mining.","author":"P.Mitra","year":"2006","journal-title":"International Conference on Computational Science and Its Applications"},{"key":"IJDST.2019040104-18","first-page":"342","article-title":"A Review of Offline Signature Verification Techniques","volume":"4","author":"M.Nazakat","year":"2014","journal-title":"Journal of Applied Environmental and Biological Sciences"},{"key":"IJDST.2019040104-19","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.1979.4310076"},{"key":"IJDST.2019040104-20","unstructured":"Purohit, N., Purohit, S., & Satsangi, C. S. (2014). Offline Handwritten Signature Verification Using Template Matching and Clustering Technique. International Journal of Soft Computing and Artificial Intelligence, 2(2)."},{"issue":"1","key":"IJDST.2019040104-21","first-page":"307","article-title":"Outlier Detection: Applications and Techniques","volume":"9","author":"K.Singh","year":"2012","journal-title":"International Journal of Computer Science Issues"},{"key":"IJDST.2019040104-22","doi-asserted-by":"publisher","DOI":"10.1109\/CSNT.2013.51"},{"issue":"7","key":"IJDST.2019040104-23","article-title":"Application of k-Nearest Neighbour Classification Method for Intrusion Detection in Network Data","volume":"97","author":"S.Venkata Lakshmi","year":"2014","journal-title":"International Journal of Computers and Applications"},{"issue":"3","key":"IJDST.2019040104-24","first-page":"1379","article-title":"A comparative study of various clustering algorithms in data mining","volume":"2","author":"M.Verma","year":"2012","journal-title":"International Journal of Engineering Research and Applications"},{"key":"IJDST.2019040104-25","article-title":"Security and privacy in your smart city","author":"A.Bartoli","year":"2011","journal-title":"Proceedings of the Barcelona smart cities congress"},{"key":"IJDST.2019040104-26","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2016.070277"}],"container-title":["International Journal of Distributed Systems and Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=226962","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T10:28:58Z","timestamp":1651832938000},"score":1,"resource":{"primary":{"URL":"http:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJDST.2019040104"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2019,4]]},"references-count":27,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.4018\/ijdst.2019040104","relation":{},"ISSN":["1947-3532","1947-3540"],"issn-type":[{"value":"1947-3532","type":"print"},{"value":"1947-3540","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,4]]}}}