
	<!DOCTYPE ArticleSet PUBLIC "-//NLM//DTD PubMed 2.0//EN" "http://www.ncbi.nlm.nih.gov:80/entrez/query/static/PubMed.dtd">
	<ArticleSet>

	<Article> 

	<Journal> 

	<PublisherName>International Science Community Association</PublisherName>

	<JournalTitle>Research Journal of Recent Sciences</JournalTitle> 

	<Issn>2277 - 2502</Issn>

	<Volume>5</Volume>

	<Issue>2</Issue>

	<PubDate PubStatus="ppublish"> 

	<Year>2016</Year> 

	<Month>February</Month> 

	<Day>2</Day> 

	</PubDate>

	</Journal>



	<ArticleTitle>A study on the Rarest case of Disguised Signatures in the form of Lateral expansion</ArticleTitle> 


	<FirstPage>51</FirstPage>

	<LastPage>55</LastPage>



	<ELocationID EIdType="pii"></ELocationID>

	<Language>EN</Language> 
	<AuthorList>

	
		<Author> 

		<FirstName>V.</FirstName>

		<MiddleName> </MiddleName>

		<LastName>Rani</LastName>

		<Suffix>1</Suffix>

		<Affiliation>Dept. of Biotechnology, Shoolini University of Biotechnology and Management Sciences, Solan, Himachal Pradesh, India  </Affiliation>

		</Author>
		<Author> 

		<FirstName>K.</FirstName>

		<MiddleName> </MiddleName>

		<LastName>Dev</LastName>

		<Suffix>2</Suffix>

		<Affiliation></Affiliation>

		</Author>
		<Author> 

		<FirstName>SagnonParfait</FirstName>

		<MiddleName> </MiddleName>

		<LastName>Hounsinou1</LastName>

		<Suffix>1</Suffix>

		<Affiliation>1Laboratoire d’Hydrologie Appliquée, Faculté des Sciences et Techniques (FAST), Université d’Abomey – Calavi, 01 BP: 526 Cotonou, Benin </Affiliation>

		</Author>
		<Author> 

		<FirstName>Daouda</FirstName>

		<MiddleName> </MiddleName>

		<LastName>Mama</LastName>

		<Suffix>2</Suffix>

		<Affiliation> Laboratoire de Chimie Inorganique et de l’Environnement (LACIE), Faculté des sciences et techniques (FAST), Université d’Abomey – Calavi,01 BP : 526 Cotonou, Benin </Affiliation>

		</Author>
		<Author> 

		<FirstName>Abdoukarim</FirstName>

		<MiddleName> </MiddleName>

		<LastName>Alassane</LastName>

		<Suffix>3</Suffix>

		<Affiliation> Laboratoire d’Etude et de Recherche en Chimie Appliquée (LERCA), Ecole Polytechnique d’Abomey – Calavi (EPAC), Université d’AbomeyCalavi,Benin </Affiliation>

		</Author>
		<Author> 

		<FirstName>Nicaise</FirstName>

		<MiddleName> </MiddleName>

		<LastName>Yalo</LastName>

		<Suffix>4</Suffix>

		<Affiliation></Affiliation>

		</Author>
		<Author> 

		<FirstName>Etienne</FirstName>

		<MiddleName> </MiddleName>

		<LastName>Sagbo</LastName>

		<Suffix>5</Suffix>

		<Affiliation></Affiliation>

		</Author>
		<Author> 

		<FirstName>Boukari</FirstName>

		<MiddleName> </MiddleName>

		<LastName>Moussa</LastName>

		<Suffix>6</Suffix>

		<Affiliation></Affiliation>

		</Author>
		<Author> 

		<FirstName>Dominique</FirstName>

		<MiddleName> </MiddleName>

		<LastName>Sohounhloue</LastName>

		<Suffix>7</Suffix>

		<Affiliation></Affiliation>

		</Author>
		<Author> 

		<FirstName>Gupta</FirstName>

		<MiddleName> </MiddleName>

		<LastName>Ekta</LastName>

		<Suffix>1</Suffix>

		<Affiliation>Department of Botany, Government College Ajmer, Rajasthan, India  </Affiliation>

		</Author>
		<Author> 

		<FirstName>Yadav</FirstName>

		<MiddleName> </MiddleName>

		<LastName>Manoj</LastName>

		<Suffix>2</Suffix>

		<Affiliation></Affiliation>

		</Author>
		<Author> 

		<FirstName>Negintaji</FirstName>

		<MiddleName> </MiddleName>

		<LastName>Fahimeh</LastName>

		<Suffix>1</Suffix>

		<Affiliation>University of Tehran, Tehran, Iran </Affiliation>

		</Author>
		<Author> 

		<FirstName>Mehdi</FirstName>

		<MiddleName> </MiddleName>

		<LastName>Moradi</LastName>

		<Suffix>2</Suffix>

		<Affiliation> Islamic Azad University, South Tehran Branch, Tehran, Iran  </Affiliation>

		</Author>
		<Author> 

		<FirstName>Ali</FirstName>

		<MiddleName> </MiddleName>

		<LastName>Sohrabi</LastName>

		<Suffix>3</Suffix>

		<Affiliation></Affiliation>

		</Author>
		<Author> 

		<FirstName>Faiza</FirstName>

		<MiddleName> </MiddleName>

		<LastName>Majid</LastName>

		<Suffix>1</Suffix>

		<Affiliation> Department of Management Sciences, Shaheed Zulifiqar Ali Bhutto Institute of Science and Technology (SZABIST), Islamabad, Pakistan  </Affiliation>

		</Author>
		<Author> 

		<FirstName>Bilal</FirstName>

		<MiddleName> </MiddleName>

		<LastName>Atif</LastName>

		<Suffix>2</Suffix>

		<Affiliation></Affiliation>

		</Author>
		<Author> 

		<FirstName>Maria</FirstName>

		<MiddleName> </MiddleName>

		<LastName>Shahid</LastName>

		<Suffix>3</Suffix>

		<Affiliation></Affiliation>

		</Author>
		<Author> 

		<FirstName>B.</FirstName>

		<MiddleName> </MiddleName>

		<LastName>Baroowa</LastName>

		<Suffix>1</Suffix>

		<Affiliation> Department of Environmental Science, Tezpur University, Napaam, Tezpur-784028, Assam, Indian  </Affiliation>

		</Author>
		<Author> 

		<FirstName>N.</FirstName>

		<MiddleName> </MiddleName>

		<LastName>Gogoi</LastName>

		<Suffix>2</Suffix>

		<Affiliation></Affiliation>

		</Author>
		<Author> 

		<FirstName>Misra</FirstName>

		<MiddleName> </MiddleName>

		<LastName>V.C.</LastName>

		<Suffix>1</Suffix>

		<Affiliation>Amity Institute of Forensic Sciences, Amity University, Noida, India </Affiliation>

		</Author>
		<Author> 

		<FirstName>Agrawal</FirstName>

		<MiddleName> </MiddleName>

		<LastName>N.</LastName>

		<Suffix>2</Suffix>

		<Affiliation></Affiliation>

		</Author>
		<Author> 

		<FirstName>Shukla</FirstName>

		<MiddleName> </MiddleName>

		<LastName>S.K.</LastName>

		<Suffix>3</Suffix>

		<Affiliation></Affiliation>

		</Author>

	<Author>

	<CollectiveName></CollectiveName>>

	</Author>

	</AuthorList>


	<PublicationType>Research Paper</PublicationType>


	<History>  
	<PubDate PubStatus="received">
	<Year>2015</Year>
	<Month>2</Month>
	<Day>24</Day>
	</PubDate>
	<PubDate PubStatus="accepted">										
	<Year>2016</Year> 
	<Month>February</Month>									
	<Day>2</Day> 
	</PubDate>

	</History>
	<Abstract>  Questioned documents have always been a challenge in forensic investigations. The disguising of signatures is the most common practice in white collar crime. In case of disguise, people deliberately change their usual pattern of writing including signatures with the intent to deny the authenticity of the same in future for some obvious benefits.  There may be numerous methods to disguise the original handwriting and signatures depending upon the capability of the writer and intention behind disguising.  In the present case study, the subject has disguised his own signatures by putting the alphabets in lateral expansion instead of usually used overlapped alphabets. A critical study was done to decipher the rare methodology of disguising using technique of lateral expansion. </Abstract>

	<CopyrightInformation>Copyright@ International Science Community Association</CopyrightInformation>

	<ObjectList> 
	<Object Type="keyword">
	<Param Name="value"></Param>
	</Object>

	</ObjectList>	

	</Article>

	</ArticleSet>
	