Research Article

Cubic Bezier Curve Approach for Automated Offline Signature Verification with Intrusion Identification

Algorithm 2

(1)    Function GETCONTROLLINGANDSTART-ENDPOINTS(BEZIERCURVE BC1)
(2)   Begin
(3)  Get Start-End points of BezierCurve BC1
(4)  Plot a new BezierCurve BC2 with Start-End points of
  BezierCurve BC1
(5)  Adjust controlling points of BezierCurve BC2 to
  match BezierCurve BC1
(6)  if (BC1 == BC2)
(7)   GetControllingPoint of BezierrCurve BC2
(8)   Return the Start-End points and ControllingPoint
(9)  End if
(10) End function