Show simple item record

Fuzzy Logic Classification of Handwritten Signature Based Computer Access and File Encryption

dc.contributor.authorKwarteng, Emmanuel
dc.contributor.advisorFarmer, Michael E.
dc.date.accessioned2016-05-09T15:50:01Z
dc.date.available2016-05-09T15:50:01Z
dc.date.issued2010
dc.identifier.urihttps://hdl.handle.net/2027.42/117719
dc.description.abstractOften times computer access and file encryption is successful based on how complex a password will be, how often users could change their complex password, the length of the complex password and how creative users are in creating a complex passsword to stand against unauthorized access to computer resources or files. This research proposes a new way of computer access and file encryption based on the fuzzy logic classification of handwritten signatures. Feature extraction of the handwritten signatures, the Fourier transformation algorithm and the k-Nearest Algorithm could be implemented to determine how close the signature is to the signature on file to grant or deny users access to computer resources and encrypted files. lternatively implementing fuzzy logic algorithms and fuzzy k-Nearest Neighbor algorithm to the captured signature could determine how close a signature is to the one on file to grant or deny access to computer resources and files. This research paper accomplishes the feature recognition firstly by extracting the features as users sign their signatures for storage, and secondly by determining the shortest distance between the signatures. On the other hand this research work accomplish the fuzzy logic recognition firstly by classifying the signature into a membership groups based on their degree of membership and secondly by determining what level of closeness the signatures are from each other. The signatures were collected from three selected input devices- the mouse, I-Pen and the IOGear. This research demonstrates which input device users found efficient and flexible to sign their respective names. The research work also demonstrates the security levels of implementing the fuzzy logic, fuzzy k-Nearest Neighbor, Fourier Transform.
dc.subjectfuzzy logic
dc.subjectsecurity
dc.subjecthandwriting
dc.subjectsignature
dc.subjectFourier transformation
dc.subjectk-Nearest Neighbor
dc.titleFuzzy Logic Classification of Handwritten Signature Based Computer Access and File Encryption
dc.typeThesis
dc.description.thesisdegreenameMaster's
dc.description.thesisdegreedisciplineCollege of Arts and Sciences: Computer Science
dc.description.thesisdegreegrantorUniversity of Michigan
dc.contributor.committeememberFarmer, Michael
dc.contributor.committeememberTurner, Stephen W.
dc.contributor.affiliationumcampusFlint
dc.identifier.uniqnameekwarten
dc.description.bitstreamurlhttp://deepblue.lib.umich.edu/bitstream/2027.42/117719/1/Kwarteng.pdf
dc.owningcollnameDissertations and Theses (Ph.D. and Master's)


Files in this item

Show simple item record

Remediation of Harmful Language

The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.

Accessibility

If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.