SlideShare a Scribd company logo
1 of 10
Download to read offline
Shohel Sayeed, Nidal S. Kamel and Rosli Besar
Signal Processing: An International Journal, Volume (2) : Issue (1) 1
A Sensor-Based Approach for Dynamic Signature
Verification using Data Glove
Shohel Sayeed shohel.sayeed@mmu.edu.my
Faculty of Information Science and Technology,
Multimedia University,
Jalan Ayer Keroh Lama,
75450 Melaka, Malaysia.
*Corresponding author
Nidal S. Kamel nidalkamel@petronas.com.my
Department of Electrical & Electronic Engineering,
Universiti Teknologi PETRONAS,
Bandar Seri Iskandar,
31750 Tronoh, Perak, Malaysia.
Rosli Besar rosli@mmu.edu.my
Faculty of Engineering and Technology,
Multimedia University,
Jalan Ayer Keroh Lama,
75450 Melaka, Malaysia.
Abstract
Data glove is a new dimension in the field of virtual reality environments, initially
designed to satisfy the stringent requirements of modern motion capture and
animation professionals. In this paper we try to shift the implementation of data
glove from motion animation towards signature verification problem, making use
of the offered multiple degrees of freedom for each finger and for the hand as
well. The proposed technique is based on the Singular Value Decomposition
(SVD) in finding r singular vectors sensing the maximal energy of glove data
matrix A, called principal subspace, and thus account for most of the variation in
the original data, so the effective dimensionality of the data can be reduced.
Having identified data glove signature through its r-th principal subspace, the
authenticity is then can be obtained by calculating the angles between the
different subspaces. The SVD-signature verification technique is tested with
large number of authentic and forgery signatures and shows remarkable level of
accuracy in finding the similarities between genuine samples as well as the
differences between genuine-forgery trials.
Keywords: Data glove, Signature verification, Singular value decomposition, Euclidean distance.
Shohel Sayeed, Nidal S. Kamel and Rosli Besar
Signal Processing: An International Journal, Volume (2) : Issue (1) 2
1. INTRODUCTION
Biometry offers potential for automatic personal verification and differently from other means for
personal verification, biometric means are not based on the possession of anything or the
knowledge of some information. Of the various biometrics, signature-based verification has the
advantage that signature analysis requires no invasive measurement and is widely accepted
since signature has long been established as the most diffuse mean for personal verification in
our daily life, including commerce applications, banking transactions, automatic fund transfers,
etc. A wide variety of feature extraction and classification methods have been applied to the
signature recognition. Two categories of verification systems are usually distinguished: off-line
and online systems for hand written signature authentication and verification.
Off-line approaches for signature recognition: In off-line systems for which the signature is
captured once the writing processing is over, and thus only a static image is available. As for off-
line signature verification processing, most of the earlier work involves the extraction of features
from the signatures image by various schemes. Y. Qi et al. [1] used local grid features and global
geometric features to build multi-scale verification functions. Sabourin et al. [2] used an extended
shadow code as a feature vector to incorporate both local and global information into the
verification decision. B. Fang et al. [3] used positional variances of the 1 dimensional projection
profiles of the signature patterns and the relative stroke positions of two-dimensional patterns. K.
Meenakshi et al. [4] used a quasi-multiresolution technique using GCS (Gradient, Structural and
Concavity) features for feature extraction.
On-line approaches to signature recognition: Input devices in this category are either digitizing
tables or smart pens and hand gloves. In digitizing table-based systems both global and local
features that summarize aspects of signature shape and dynamics of signature production are
used for signature verification. In Pen-based systems a smart pen is used to collect data such as
pen-tip positions, speeds, accelerations, or forces while a person is signing. The invisible pen-up
parts of the signature are used to construct a signature verification system. Trajectories left in
pen-up situation, called ‘‘virtual strokes,’’ are used to extract the optimal features, which represent
the personal characteristics of the authentic signature and affect the error rate greatly
[5],[6],[7],[8],[9].
2. DATA GLOVE
Data glove is a new dimension in the field of signature verification, which can reflect the identity of
a person and that renders the forging process nearly impossible. Glove signature is a virtual-
reality- based environment to support the signing process and it offers multiple degrees of
freedom for each finger and for the hand as well [10].
The dynamic features of the data glove provide information on:
1. Patterns distinctive to an individuals’ signature and hand size
2. Time elapsed during the signing process
3. Hand trajectory dependent rolling
Thus, the glove as a tool for signature recognition allows authentication of people not only
through the biometric characteristics of their signatures but also through the size of their hands.
Figure 1 shows the data glove [11] and location of sensors. Figure 2 shows signals from the data
glove during signing process.
In our research, we proposed a new approach for handwritten signature verification using 14
sensor-based data glove. The technique is based on correlation measure through the use of
Singular Value Decomposition (SVD) of different signature groups.
Shohel Sayeed, Nidal S. Kamel and Rosli Besar
Signal Processing: An International Journal, Volume (2) : Issue (1) 3
FIGURE 1: Sensor Mappings for 5DT Data Glove 14 Ultra
FIGURE 2: Signals From The Data Glove Of A Signature
3. SVD-BASED SIGNATURE VERIFICATION TECHNIQUE
Singular value decomposition (SVD) provides a new way for extracting algebraic features from
the signature data using data glove. SVD has been used in many fields such as data
compression, signal processing, and control system and pattern analysis. Consider a data glove
of m sensors each generates n samples per signature, producing an output data matrix, A(m×n).
Usually n >> m, where m denotes the number of measured channels while n denotes the number
of measurements.
Sensor # Location
0 Thumb Near
1 Thumb Far
2 Thumb/Index
3 Index Near
4 Index Far
5 Index/Middle
6 Middle Near
7 Middle Far
8 Middle/Ring
9 Ring Near
10 Ring Far
11 Ring/Little
12 Little Near
13 Little Far
Shohel Sayeed, Nidal S. Kamel and Rosli Besar
Signal Processing: An International Journal, Volume (2) : Issue (1) 4
The properties of the singular values are described in detail in the following:
Theorem 1. Singular Value Decomposition- If
mxn
RA∈ , then there exists the diagonal matrices
[ ] mxm
m RuuU ∈Λ= ,,1 and [ ] nxn
n RvvV ∈Λ= ,,1 so that ),( ,1 p
T
diagAVU σσ Λ=
where 0),,min( 21 ≥≥Λ≥≥= pnmp σσσ
,,...2,1, pii =σ are the singular values of A .
The singular values are the square roots of eigenvalues iλ of
H
AA or AAH
, that is ii λσ =
Theorem 2. The stability of Singular Value:
Assume ,, mxnmxnmxn
RBA ∈ and their singular values are ,, 2121 nn τττσσσ ≥Λ≥≥≥Λ≥≥
respectively, then 2
BAii −≤−τσ . This means that there is a disturbance at A, the variation
of its singular values is not more than the 2
. -norm of the disturbance matrix.
Theorem 3. The scaling property- If singular values of
mxn
A are kσσσ ,,2,1 Λ , the singular values
of
mxn
A*α are
**
2
*
1 ,,, kσσσ Λ , then ),,,(),,,( **
2
*
121 kk σσσσσσα Λ=Λ
Theorem 4. The rotation invariant property- If P is the unitary matrix, then the singular values of
PA are the same as those of A.
The above properties of SVD are very desirable in signature verification, when signature data are
taken using data glove.
3.1 Distance Measurement for Signature Data Sets
By establishing the properties of SVD, we extracted the first r left singular vectors (U) of glove
data matrix A, which is account for most of the variation in the original data. This means that with
m × n data matrix that is usually largely over determined with much more samples (columns) than
channels (rows): n >> m the singular value decomposition allows to compact the most of
signature characteristics into r vectors.
Now, having identified each signature through its r-th principal subspace, the authenticity of the
tried signature can be obtained by calculating the Euclidean distance between its principal
subspace and the genuine reference. The Euclidian distance for every genuine or forged
signature { }ki xxxX ,...,, 21∈ with the reference signature { }ki yyyY ,...,, 21∈ is calculated by
given equation:
( )
2
1
2
1
,








−= ∑=
k
i
iiii YXYXceantDis
3.2 Model for the SVD-based Signature verification Technique
The model for the proposed signature verification technique is shown in Figure 3. The whole
system is divided into two phases:
Enrollment phase:
• Use data glove to provide the system with 10 genuine samples of his/her signature.
• Out of the collected 10 genuine samples select the reference signature.
• Extract the r-principal subspace of the reference signature and save it in the database for
matching.
Shohel Sayeed, Nidal S. Kamel and Rosli Besar
Signal Processing: An International Journal, Volume (2) : Issue (1) 5
FIGURE 3. Proposed Model for the SVD-based Signature Verification Technique
Verification phase:
• Use data glove to input the signature of the user (one sample).
• Calculate the r-principal subspace of the claimed identity using SVD.
• Match the principal subspace of the claimed identity to the enrolled models in the database
through the similarity factor.
• Compare the similarity factor with the decision threshold for ACCEPT or REJECT.
Some typical signatures along with their forgeries are given in Figure 4.
Genuine Skilled forgery (Imposter)
FIGURE 4: Some Example Of Genuine Signatures And Their Typical Skilled Forgeries
Verification
Phase
Enrollment
Phase
Finding the r-principal subspace of
A through SVD
Data Glove output matrix A
(Capture one signature per writer)
The r-left singular vectors
of user # 1
(Signature Database)
Input
signature (A)
Accepted
or
Rejected
r-principal
subspace
Matching
Decision
threshold
Shohel Sayeed, Nidal S. Kamel and Rosli Besar
Signal Processing: An International Journal, Volume (2) : Issue (1) 6
4. EXPERIMENTAL RESULTS AND DISCUSSION
To verify the efficiency of the proposed technique in handwritten signature verification, the 5DT
Data Glove 14 Ultra is used. This glove is using 14 sensors to measure finger flexure (two
sensors per finger) as well as the abduction between fingers. Glove data is acquired using 8-bit
resolution (256 positions) for each figure as well as for the axes of the tilt sensor roll and pitch.
The roll and bitch angle of the glove are measured using tilt sensor through a ±60o linear range.
The 5DT Data Glove starts up in command mode. The full hand (five fingers, roll angle, pitch
angle) can be sampled at least at 60 samples per second. The system interfaces with computer
via cable to USB port. The SVD-signature verification algorithm is written in MATLAB 7.01 and
run on a machine powered by Intel Core 2 Duo processor. The CPU time is about 80 ms.
In the first experiment we asked 40 writers to repeat their signature 25 times creating 25 authentic
samples per writer. Then we randomly mixed up the 25 genuine samples of each writer creating
50 pairs genuine of samples. This scenario is extended towards the available 40 genuine writers
to create 50 × 40 = 2000 pairs of genuine signatures. The SVD-based signature verification
technique is then run with each of the 2000 genuine trials and the Euclidean distances between
the extracted features of the different signatures are calculated and included as similarity factor in
percent in Table 1.
In the second experiment we take one sample from each of the 40 genuine writers and consider it
as a baseline. Next, we collect 10 forgery samples for each baseline from 20 skilled forgers,
producing 200 forgery samples per baseline. The baseline sample for each genuine writer is then
paired with each of 200 forgery trials to generate 200 pairs per baseline. This scenario is
extended over the available 40 baseline samples generating 200 × 40 = 8000 genuine-forgery
pairs. The SVD-based signature verification technique is then run with each of the 8000 imposter
trials and the Euclidean distances between the extracted features of the different signatures is
calculated and included as similarity factor in percent in Table 1.
Glove-based
Similarity factor In percentage
Genuine Imposter
(91-100)% 35% 0
(86-90)% 26% 0
(81-85)% 23% 0
(76-80)% 16% 0
(71–75)% 0 0
(66–70)% 0 1%
(61-65)% 0 19.7%
(51–60)% 0 53.65%
< 50% 0 25.65%
Table 1: The Similarity Factor In Percentage For Genuine and Imposter Samples.
Shohel Sayeed, Nidal S. Kamel and Rosli Besar
Signal Processing: An International Journal, Volume (2) : Issue (1) 7
Table 1 shows clearly that with the different 2000 genuine pairs of samples the SVD-signature
verification technique using data glove produces 100% samples with similarity factor > 76% and
approximately zero samples for similarity factor lower than 76%. This simply means that, for the
worst case of repetition of a signature by the same writer, the SVD-based signature verification
technique manages to recognize the similarity with other genuine one by at least 76% and for
average quality of repeated samples the similarity factor is about 90%.
Table 1 also shows the good capability of the SVD-based signature verification technique using
data glove in identifying forgery samples from genuine. Where, out of the 8000 forgery samples
the suggested technique produces 0% number of trials with similarity factor greater than 70%,
making it nearly impossible for any skilful forger to exceed this threshold.
0
10
20
30
40
50
60
91-100 86-90 81-85 76-80 71-75 66-70 61-65 51-60 <50
Class Limit of Signatures Similarity (%)
Samples(%)
Genuine
Skilled Forgery
FIGURE 5: Similarity Measure Between The Mean Genuine Signature
And Skilled Forgery Trials Using Glove-Based Signature Data
In summary it can be said that the suggested SVD-based signature verification technique using
data glove compare to corresponding signature images is showing quite powerful performance in
recognizing the similarities between genuine signatures with lower bound of 76% and upper
bound of approximately 97%. On the other hand it recognizes the differences between forgery
and genuine samples with upper bound of 70% and lower with less than 50%. This performance
creates gap between the two cases (genuine-genuine & genuine-forgery) large enough to easily
and safely distinguish between authentic and forgery trials with approximately zero error.
In evaluating the performance of a signature verification system, the FAR and FRR factors are
used to assess the performance of the suggested technique.
For further evaluating the performance of a signature verification system, we adopt the equal
error rate (EER), that is the error rate when the false rejection rate (FRR) of genuine signatures
and the false acceptance rate (FAR) of forgery signatures assume the same value; it can be
adopted as a unique measure for characterizing the security level of a biometric system. Figure 6
shows that the EER of our proposed technique. The FAR and FRR are calculated for the
normalized threshold values ranging from 0 to 1. FAR and FRR are calculated by
Shohel Sayeed, Nidal S. Kamel and Rosli Besar
Signal Processing: An International Journal, Volume (2) : Issue (1) 8
100X
forgeriestestedofnumberTotal
forgeriesacceptedofnumberTotal
FAR =
100X
genuinestestedofnumberTotal
rejectedgenuineofnumberTotal
FRR =
0 0 .1 0.2 0 .3 0.4 0 .5 0.6 0 .7
-10
0
10
20
30
40
50
60
70
80
Th res ho ld
ErrorRate[%]
F A R
F R R
FIGURE 6: False Acceptance Rate (FAR) And False Rejection Rate (FRR)
As A Function Of A Decision Threshold
Figure 6 shows that the Equal Error Rate (EER) of the SVD-based signature verification
technique using data glove is 2.46%.
5. COMPARISON WITH OTHER ON-LINE METHODS
It is difficult to make comparison between different signature verification techniques based on
different databases [12]. Hence, here we just compared the performance achieved by some of
the suggested signature verification techniques. An automatic handwritten signature verification
system based on a serial multi-expert architecture obtained false acceptance rate (FAR) and
false rejection rate (FRR) for skilled forgeries 19.8% and 2.04% respectively, and EER of 10.92%
[13]. On-line handwritten signature verification system using Hidden Markov Model (HMM) has
achieved a false acceptance rate (FAR) of 4% and a false rejection rate (FRR) of 12% for both
random and skilled forgeries and EER of 11.5% [14]. Dynamic alignment distance based on-line
signature verification method presented by Amac et al. [15] has achieved 7.83% for EER with
data set of skilled forgeries. In addition to the aforementioned verification techniques, the First
International Signature Verification Competition (SVC2004) has tested more than 15 systems
from industry and academia and found that the best equal error rate is 2.84%, achieved by [16].
Our proposed technique comparing with others, the equal error rate value of the SVD-based
signature verification technique (EER =2.46%) is considerably acceptable level than the most of
the suggested techniques.
EER = 2.46%
Shohel Sayeed, Nidal S. Kamel and Rosli Besar
Signal Processing: An International Journal, Volume (2) : Issue (1) 9
6. CONSLUSION & FUTURE WORK
In this research paper we have summarized and critically discussed the main issues to be taken
into account for the evaluation of the accuracy and performance of signature verification
technique. The real-time signature identification and verification is necessary in most practical
application. Our proposed SVD-based signature verification technique can process glove-based
signature data in high speed and obtained a significant result. Its effectiveness and significant
performance has been proven by the experiments. In order to compare the proposed technique
using data glove with other on-line signature verification technique, the equal error rate value of
the SVD-based signature verification technique is calculated and proved to be significantly lower
(EER = 2.46%) than the other on-line techniques. Hence, from the experimental point of view, our
proposed technique for signature identification and verification need low computational time as
well as produce high level of accuracy. So, the SVD-based signature verification technique using
data glove may represent a new trend in real-time signature verification system.
In future, the structure of the data glove can be further simplified by interfacing with the computer
wirelessly by means of Bluetooth technology as well as increase the database size and reduce
the number of sensors.
7. REFERENCES
1. Y. Qi. and B.R. Hunt. “Signature verification using global and grid features”. Pattern
Recognition, 27(12):1621-1629, 1994.
2. R. Sabourin, , G. Genest, F. Prêteux. “Off-line signature verification by local granulometric
size distributions”. IEEE Trans. Pattern Analysis and Machine Intelligence. 19(9): 976-988,
1997.
3. B. Fang, C.H. Leung, Y.Y. Tang, K.W. Tse, P.C.K. Kwok, Y.K. Wong. “Offline signature
verification by the tracking of feature and stroke positions”. Pattern Recognition, 36(1): 91–
101, 2003.
4. K. K. Meenaskhi, S. Srihari, A. Xu. “Offline signature verification and identification using
distance statistics”. International Journal of Pattern Recognition and Artificial Intelligence,
18(7):1339-1360, 2004.
5. R. Plamondon. “The design of an on-line signature verification system: from theory to
practice”. International Journal of Pattern Recognition Artificial Intelligence, 1994.
6. M. Paulik, J. Mark and N. Mohankrishanan. “Sequence decomposition based, autoregressive
hidden markov model for dynamic signature identification and verification”.IEEE Press, 1993.
7. T. H. Rhee, S. J. Cho and J. H. Kim. “On-line signature verification using model–guided
segmentation and discriminative feature selection for skilled forgeries”, Proceedings Sixth
International Conference In Document Analysis and Verification, pp. 645–649, 2001.
8. L. Lee, T. Berger and E. Aviczer. “Reliable on–line human signature verification systems”,
IEEE Transaction On Pattern Analysis and Machine Intelligence, 18(6): 643–647, 1996.
9. R. Kashi, J. Hu, W.L. Nelson and W. Turin. “A hidden markov model approach to on-line
handwritten signature verification”, International Journal on Document Analysis and
Verification, no.1, pp. 102–109, 1998.
10. S. Sayeed, R. Besar, and N. S. Kamel. "Dynamic signature verification using sensor based
data glove", Proceedings of 8th International Conference on Signal Processing, IEEE Press,
pp. 2387-2390, 2006.
11. http://www.5dt.com/products/pdataglove14.html
12. B. Fang, C.H. Leung, Y.Y. Tang, P.C.K. Kwork, K.W. Tse and Y.K. Wong. “Offline signature
verification with generated training samples”, IEE Proceedings on Vision, Image and Signal
Processing. 149(2): 85-90, 2002.
Shohel Sayeed, Nidal S. Kamel and Rosli Besar
Signal Processing: An International Journal, Volume (2) : Issue (1) 10
13. C. Sansone and M.Vento. “Signature verification: increasing performance by a multi-stage
system”, International Journal on Document Analysis and Applications, Springer-Verlag,
London Limited, vol. 3, pp. 169-181, 2000.
14. M. S. Mohammad and R. R. Hamid. “A new on-line signature verification algorithm using
variable length segmentation and hidden markov models”, Proceeding of the Seventh
International Conference on Document Analysis and Recognition. 2003.
15. H. Amac and A. Ethem. “Dynamic alignment distance based online signature verification”,
The 13th Turkish Symposium on Artificial Intelligence and Artificial Neural Networks, Izmir,
Turkey, 2004.
16. D. Yeung, H. Chang, Y. Xiong, S. George, R. Kashi, T. Matsumoto and G. Rigoll. “SVC2004:
first international signature verification competition”. ICBA 2004, Lecture Notes in Computer
Science, Springer-Verlag, Berlin Heidelberg, vol. 3072, pp. 16-22, 2004.

More Related Content

What's hot

Automatic signature verification with chain code using weighted distance and ...
Automatic signature verification with chain code using weighted distance and ...Automatic signature verification with chain code using weighted distance and ...
Automatic signature verification with chain code using weighted distance and ...eSAT Journals
 
Online signature recognition using sectorization of complex walsh
Online signature recognition using sectorization of complex walshOnline signature recognition using sectorization of complex walsh
Online signature recognition using sectorization of complex walshDr. Vinayak Bharadi
 
Fusion based multimodal authentication in biometrics using context sensitive ...
Fusion based multimodal authentication in biometrics using context sensitive ...Fusion based multimodal authentication in biometrics using context sensitive ...
Fusion based multimodal authentication in biometrics using context sensitive ...csandit
 
Image Processing Based Signature Recognition and Verification Technique Using...
Image Processing Based Signature Recognition and Verification Technique Using...Image Processing Based Signature Recognition and Verification Technique Using...
Image Processing Based Signature Recognition and Verification Technique Using...Priyanka Pradhan
 
A Blind Multiple Watermarks based on Human Visual Characteristics
A Blind Multiple Watermarks based on Human Visual Characteristics A Blind Multiple Watermarks based on Human Visual Characteristics
A Blind Multiple Watermarks based on Human Visual Characteristics IJECEIAES
 
An offline signature recognition and verification system based on neural network
An offline signature recognition and verification system based on neural networkAn offline signature recognition and verification system based on neural network
An offline signature recognition and verification system based on neural networkeSAT Journals
 
Handwritten Signature Verification using Artificial Neural Network
Handwritten Signature Verification using Artificial Neural NetworkHandwritten Signature Verification using Artificial Neural Network
Handwritten Signature Verification using Artificial Neural NetworkEditor IJMTER
 
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...IJNSA Journal
 
A Simple Signature Recognition System
A Simple Signature Recognition System A Simple Signature Recognition System
A Simple Signature Recognition System iosrjce
 
Double layer security using visual cryptography and transform based steganogr...
Double layer security using visual cryptography and transform based steganogr...Double layer security using visual cryptography and transform based steganogr...
Double layer security using visual cryptography and transform based steganogr...eSAT Publishing House
 
Recognition of handwritten digits using rbf neural network
Recognition of handwritten digits using rbf neural networkRecognition of handwritten digits using rbf neural network
Recognition of handwritten digits using rbf neural networkeSAT Publishing House
 
Implementation and Evaluation of Document Retrieval System
Implementation and Evaluation of Document Retrieval SystemImplementation and Evaluation of Document Retrieval System
Implementation and Evaluation of Document Retrieval SystemNasir Mahmood, PhD
 
Off-line Signature Verification
Off-line Signature VerificationOff-line Signature Verification
Off-line Signature Verificationlemon_au
 
Devanagari Character Recognition
Devanagari Character RecognitionDevanagari Character Recognition
Devanagari Character RecognitionPulkit Goyal
 
Artificial Neural Network For Recognition Of Handwritten Devanagari Character
Artificial Neural Network For Recognition Of Handwritten Devanagari CharacterArtificial Neural Network For Recognition Of Handwritten Devanagari Character
Artificial Neural Network For Recognition Of Handwritten Devanagari CharacterIOSR Journals
 

What's hot (19)

Automatic signature verification with chain code using weighted distance and ...
Automatic signature verification with chain code using weighted distance and ...Automatic signature verification with chain code using weighted distance and ...
Automatic signature verification with chain code using weighted distance and ...
 
Online signature recognition using sectorization of complex walsh
Online signature recognition using sectorization of complex walshOnline signature recognition using sectorization of complex walsh
Online signature recognition using sectorization of complex walsh
 
I010244853
I010244853I010244853
I010244853
 
Fusion based multimodal authentication in biometrics using context sensitive ...
Fusion based multimodal authentication in biometrics using context sensitive ...Fusion based multimodal authentication in biometrics using context sensitive ...
Fusion based multimodal authentication in biometrics using context sensitive ...
 
1918 1923
1918 19231918 1923
1918 1923
 
Image Processing Based Signature Recognition and Verification Technique Using...
Image Processing Based Signature Recognition and Verification Technique Using...Image Processing Based Signature Recognition and Verification Technique Using...
Image Processing Based Signature Recognition and Verification Technique Using...
 
A Blind Multiple Watermarks based on Human Visual Characteristics
A Blind Multiple Watermarks based on Human Visual Characteristics A Blind Multiple Watermarks based on Human Visual Characteristics
A Blind Multiple Watermarks based on Human Visual Characteristics
 
Offline Signature Verification and Recognition using Neural Network
Offline Signature Verification and Recognition using Neural NetworkOffline Signature Verification and Recognition using Neural Network
Offline Signature Verification and Recognition using Neural Network
 
An offline signature recognition and verification system based on neural network
An offline signature recognition and verification system based on neural networkAn offline signature recognition and verification system based on neural network
An offline signature recognition and verification system based on neural network
 
Handwritten Signature Verification using Artificial Neural Network
Handwritten Signature Verification using Artificial Neural NetworkHandwritten Signature Verification using Artificial Neural Network
Handwritten Signature Verification using Artificial Neural Network
 
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...
 
A Simple Signature Recognition System
A Simple Signature Recognition System A Simple Signature Recognition System
A Simple Signature Recognition System
 
Double layer security using visual cryptography and transform based steganogr...
Double layer security using visual cryptography and transform based steganogr...Double layer security using visual cryptography and transform based steganogr...
Double layer security using visual cryptography and transform based steganogr...
 
Recognition of handwritten digits using rbf neural network
Recognition of handwritten digits using rbf neural networkRecognition of handwritten digits using rbf neural network
Recognition of handwritten digits using rbf neural network
 
Implementation and Evaluation of Document Retrieval System
Implementation and Evaluation of Document Retrieval SystemImplementation and Evaluation of Document Retrieval System
Implementation and Evaluation of Document Retrieval System
 
Off-line Signature Verification
Off-line Signature VerificationOff-line Signature Verification
Off-line Signature Verification
 
Co4201605611
Co4201605611Co4201605611
Co4201605611
 
Devanagari Character Recognition
Devanagari Character RecognitionDevanagari Character Recognition
Devanagari Character Recognition
 
Artificial Neural Network For Recognition Of Handwritten Devanagari Character
Artificial Neural Network For Recognition Of Handwritten Devanagari CharacterArtificial Neural Network For Recognition Of Handwritten Devanagari Character
Artificial Neural Network For Recognition Of Handwritten Devanagari Character
 

Viewers also liked

Printers by Faixan
Printers by Faixan Printers by Faixan
Printers by Faixan ٖFaiXy :)
 
Input devices
Input devicesInput devices
Input devicesSytahuri
 
The Image-based data glove presentation
The Image-based data glove presentationThe Image-based data glove presentation
The Image-based data glove presentationVitor Pamplona
 
Graphics inputdevices
Graphics inputdevicesGraphics inputdevices
Graphics inputdevicesBCET
 
Cathode ray tube
Cathode ray tubeCathode ray tube
Cathode ray tubeBCET
 

Viewers also liked (6)

Printers by Faixan
Printers by Faixan Printers by Faixan
Printers by Faixan
 
Input devices
Input devicesInput devices
Input devices
 
The Image-based data glove presentation
The Image-based data glove presentationThe Image-based data glove presentation
The Image-based data glove presentation
 
Graphics inputdevices
Graphics inputdevicesGraphics inputdevices
Graphics inputdevices
 
Input and output design
Input and output designInput and output design
Input and output design
 
Cathode ray tube
Cathode ray tubeCathode ray tube
Cathode ray tube
 

Similar to A Sensor-Based Approach for Dynamic Signature Verification using Data Glove

Low Power Elliptic Curve Digital Signature Design for Constrained Devices
Low Power Elliptic Curve Digital Signature Design for Constrained DevicesLow Power Elliptic Curve Digital Signature Design for Constrained Devices
Low Power Elliptic Curve Digital Signature Design for Constrained DevicesCSCJournals
 
Implementation of ECC and ECDSA for Image Security
Implementation of ECC and ECDSA for Image SecurityImplementation of ECC and ECDSA for Image Security
Implementation of ECC and ECDSA for Image Securityrahulmonikasharma
 
Signature verification based on proposed fast hyper deep neural network
Signature verification based on proposed fast hyper deep neural networkSignature verification based on proposed fast hyper deep neural network
Signature verification based on proposed fast hyper deep neural networkIAESIJAI
 
Analysis of Inertial Sensor Data Using Trajectory Recognition Algorithm
Analysis of Inertial Sensor Data Using Trajectory Recognition AlgorithmAnalysis of Inertial Sensor Data Using Trajectory Recognition Algorithm
Analysis of Inertial Sensor Data Using Trajectory Recognition Algorithmijcisjournal
 
Ijarcet vol-2-issue-7-2363-2368
Ijarcet vol-2-issue-7-2363-2368Ijarcet vol-2-issue-7-2363-2368
Ijarcet vol-2-issue-7-2363-2368Editor IJARCET
 
Ijarcet vol-2-issue-7-2363-2368
Ijarcet vol-2-issue-7-2363-2368Ijarcet vol-2-issue-7-2363-2368
Ijarcet vol-2-issue-7-2363-2368Editor IJARCET
 
An offline signature verification using pixels intensity levels
An offline signature verification using pixels intensity levelsAn offline signature verification using pixels intensity levels
An offline signature verification using pixels intensity levelsSalam Shah
 
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...TELKOMNIKA JOURNAL
 
Handwritten Signature Verification System using Sobel Operator and KNN Classi...
Handwritten Signature Verification System using Sobel Operator and KNN Classi...Handwritten Signature Verification System using Sobel Operator and KNN Classi...
Handwritten Signature Verification System using Sobel Operator and KNN Classi...ijtsrd
 
Chaotic systems with pseudorandom number generate to protect the transmitted...
Chaotic systems with pseudorandom number generate to  protect the transmitted...Chaotic systems with pseudorandom number generate to  protect the transmitted...
Chaotic systems with pseudorandom number generate to protect the transmitted...nooriasukmaningtyas
 
Offline Handwritten Signature Verification using Neural Network
Offline Handwritten Signature Verification using Neural NetworkOffline Handwritten Signature Verification using Neural Network
Offline Handwritten Signature Verification using Neural Networkijiert bestjournal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE ...
FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE ...FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE ...
FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE ...cscpconf
 
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKSLOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKSEditor IJCATR
 
Media Control Using Hand Gesture Moments
Media Control Using Hand Gesture MomentsMedia Control Using Hand Gesture Moments
Media Control Using Hand Gesture MomentsIRJET Journal
 
Comparative Analysis of Hand Gesture Recognition Techniques
Comparative Analysis of Hand Gesture Recognition TechniquesComparative Analysis of Hand Gesture Recognition Techniques
Comparative Analysis of Hand Gesture Recognition TechniquesIJERA Editor
 
IRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNNIRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNNIRJET Journal
 

Similar to A Sensor-Based Approach for Dynamic Signature Verification using Data Glove (20)

Low Power Elliptic Curve Digital Signature Design for Constrained Devices
Low Power Elliptic Curve Digital Signature Design for Constrained DevicesLow Power Elliptic Curve Digital Signature Design for Constrained Devices
Low Power Elliptic Curve Digital Signature Design for Constrained Devices
 
Journal_IJABME
Journal_IJABMEJournal_IJABME
Journal_IJABME
 
Implementation of ECC and ECDSA for Image Security
Implementation of ECC and ECDSA for Image SecurityImplementation of ECC and ECDSA for Image Security
Implementation of ECC and ECDSA for Image Security
 
Signature verification based on proposed fast hyper deep neural network
Signature verification based on proposed fast hyper deep neural networkSignature verification based on proposed fast hyper deep neural network
Signature verification based on proposed fast hyper deep neural network
 
Analysis of Inertial Sensor Data Using Trajectory Recognition Algorithm
Analysis of Inertial Sensor Data Using Trajectory Recognition AlgorithmAnalysis of Inertial Sensor Data Using Trajectory Recognition Algorithm
Analysis of Inertial Sensor Data Using Trajectory Recognition Algorithm
 
International Journal of Engineering Inventions (IJEI), www.ijeijournal.com,c...
International Journal of Engineering Inventions (IJEI), www.ijeijournal.com,c...International Journal of Engineering Inventions (IJEI), www.ijeijournal.com,c...
International Journal of Engineering Inventions (IJEI), www.ijeijournal.com,c...
 
Ijarcet vol-2-issue-7-2363-2368
Ijarcet vol-2-issue-7-2363-2368Ijarcet vol-2-issue-7-2363-2368
Ijarcet vol-2-issue-7-2363-2368
 
Ijarcet vol-2-issue-7-2363-2368
Ijarcet vol-2-issue-7-2363-2368Ijarcet vol-2-issue-7-2363-2368
Ijarcet vol-2-issue-7-2363-2368
 
An offline signature verification using pixels intensity levels
An offline signature verification using pixels intensity levelsAn offline signature verification using pixels intensity levels
An offline signature verification using pixels intensity levels
 
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
 
Handwritten Signature Verification System using Sobel Operator and KNN Classi...
Handwritten Signature Verification System using Sobel Operator and KNN Classi...Handwritten Signature Verification System using Sobel Operator and KNN Classi...
Handwritten Signature Verification System using Sobel Operator and KNN Classi...
 
A NEW CODING METHOD IN PATTERN RECOGNITION FINGERPRINT IMAGE USING VECTOR QUA...
A NEW CODING METHOD IN PATTERN RECOGNITION FINGERPRINT IMAGE USING VECTOR QUA...A NEW CODING METHOD IN PATTERN RECOGNITION FINGERPRINT IMAGE USING VECTOR QUA...
A NEW CODING METHOD IN PATTERN RECOGNITION FINGERPRINT IMAGE USING VECTOR QUA...
 
Chaotic systems with pseudorandom number generate to protect the transmitted...
Chaotic systems with pseudorandom number generate to  protect the transmitted...Chaotic systems with pseudorandom number generate to  protect the transmitted...
Chaotic systems with pseudorandom number generate to protect the transmitted...
 
Offline Handwritten Signature Verification using Neural Network
Offline Handwritten Signature Verification using Neural NetworkOffline Handwritten Signature Verification using Neural Network
Offline Handwritten Signature Verification using Neural Network
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE ...
FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE ...FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE ...
FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE ...
 
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKSLOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
 
Media Control Using Hand Gesture Moments
Media Control Using Hand Gesture MomentsMedia Control Using Hand Gesture Moments
Media Control Using Hand Gesture Moments
 
Comparative Analysis of Hand Gesture Recognition Techniques
Comparative Analysis of Hand Gesture Recognition TechniquesComparative Analysis of Hand Gesture Recognition Techniques
Comparative Analysis of Hand Gesture Recognition Techniques
 
IRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNNIRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNN
 

Recently uploaded

Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 

Recently uploaded (20)

Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 

A Sensor-Based Approach for Dynamic Signature Verification using Data Glove

  • 1. Shohel Sayeed, Nidal S. Kamel and Rosli Besar Signal Processing: An International Journal, Volume (2) : Issue (1) 1 A Sensor-Based Approach for Dynamic Signature Verification using Data Glove Shohel Sayeed shohel.sayeed@mmu.edu.my Faculty of Information Science and Technology, Multimedia University, Jalan Ayer Keroh Lama, 75450 Melaka, Malaysia. *Corresponding author Nidal S. Kamel nidalkamel@petronas.com.my Department of Electrical & Electronic Engineering, Universiti Teknologi PETRONAS, Bandar Seri Iskandar, 31750 Tronoh, Perak, Malaysia. Rosli Besar rosli@mmu.edu.my Faculty of Engineering and Technology, Multimedia University, Jalan Ayer Keroh Lama, 75450 Melaka, Malaysia. Abstract Data glove is a new dimension in the field of virtual reality environments, initially designed to satisfy the stringent requirements of modern motion capture and animation professionals. In this paper we try to shift the implementation of data glove from motion animation towards signature verification problem, making use of the offered multiple degrees of freedom for each finger and for the hand as well. The proposed technique is based on the Singular Value Decomposition (SVD) in finding r singular vectors sensing the maximal energy of glove data matrix A, called principal subspace, and thus account for most of the variation in the original data, so the effective dimensionality of the data can be reduced. Having identified data glove signature through its r-th principal subspace, the authenticity is then can be obtained by calculating the angles between the different subspaces. The SVD-signature verification technique is tested with large number of authentic and forgery signatures and shows remarkable level of accuracy in finding the similarities between genuine samples as well as the differences between genuine-forgery trials. Keywords: Data glove, Signature verification, Singular value decomposition, Euclidean distance.
  • 2. Shohel Sayeed, Nidal S. Kamel and Rosli Besar Signal Processing: An International Journal, Volume (2) : Issue (1) 2 1. INTRODUCTION Biometry offers potential for automatic personal verification and differently from other means for personal verification, biometric means are not based on the possession of anything or the knowledge of some information. Of the various biometrics, signature-based verification has the advantage that signature analysis requires no invasive measurement and is widely accepted since signature has long been established as the most diffuse mean for personal verification in our daily life, including commerce applications, banking transactions, automatic fund transfers, etc. A wide variety of feature extraction and classification methods have been applied to the signature recognition. Two categories of verification systems are usually distinguished: off-line and online systems for hand written signature authentication and verification. Off-line approaches for signature recognition: In off-line systems for which the signature is captured once the writing processing is over, and thus only a static image is available. As for off- line signature verification processing, most of the earlier work involves the extraction of features from the signatures image by various schemes. Y. Qi et al. [1] used local grid features and global geometric features to build multi-scale verification functions. Sabourin et al. [2] used an extended shadow code as a feature vector to incorporate both local and global information into the verification decision. B. Fang et al. [3] used positional variances of the 1 dimensional projection profiles of the signature patterns and the relative stroke positions of two-dimensional patterns. K. Meenakshi et al. [4] used a quasi-multiresolution technique using GCS (Gradient, Structural and Concavity) features for feature extraction. On-line approaches to signature recognition: Input devices in this category are either digitizing tables or smart pens and hand gloves. In digitizing table-based systems both global and local features that summarize aspects of signature shape and dynamics of signature production are used for signature verification. In Pen-based systems a smart pen is used to collect data such as pen-tip positions, speeds, accelerations, or forces while a person is signing. The invisible pen-up parts of the signature are used to construct a signature verification system. Trajectories left in pen-up situation, called ‘‘virtual strokes,’’ are used to extract the optimal features, which represent the personal characteristics of the authentic signature and affect the error rate greatly [5],[6],[7],[8],[9]. 2. DATA GLOVE Data glove is a new dimension in the field of signature verification, which can reflect the identity of a person and that renders the forging process nearly impossible. Glove signature is a virtual- reality- based environment to support the signing process and it offers multiple degrees of freedom for each finger and for the hand as well [10]. The dynamic features of the data glove provide information on: 1. Patterns distinctive to an individuals’ signature and hand size 2. Time elapsed during the signing process 3. Hand trajectory dependent rolling Thus, the glove as a tool for signature recognition allows authentication of people not only through the biometric characteristics of their signatures but also through the size of their hands. Figure 1 shows the data glove [11] and location of sensors. Figure 2 shows signals from the data glove during signing process. In our research, we proposed a new approach for handwritten signature verification using 14 sensor-based data glove. The technique is based on correlation measure through the use of Singular Value Decomposition (SVD) of different signature groups.
  • 3. Shohel Sayeed, Nidal S. Kamel and Rosli Besar Signal Processing: An International Journal, Volume (2) : Issue (1) 3 FIGURE 1: Sensor Mappings for 5DT Data Glove 14 Ultra FIGURE 2: Signals From The Data Glove Of A Signature 3. SVD-BASED SIGNATURE VERIFICATION TECHNIQUE Singular value decomposition (SVD) provides a new way for extracting algebraic features from the signature data using data glove. SVD has been used in many fields such as data compression, signal processing, and control system and pattern analysis. Consider a data glove of m sensors each generates n samples per signature, producing an output data matrix, A(m×n). Usually n >> m, where m denotes the number of measured channels while n denotes the number of measurements. Sensor # Location 0 Thumb Near 1 Thumb Far 2 Thumb/Index 3 Index Near 4 Index Far 5 Index/Middle 6 Middle Near 7 Middle Far 8 Middle/Ring 9 Ring Near 10 Ring Far 11 Ring/Little 12 Little Near 13 Little Far
  • 4. Shohel Sayeed, Nidal S. Kamel and Rosli Besar Signal Processing: An International Journal, Volume (2) : Issue (1) 4 The properties of the singular values are described in detail in the following: Theorem 1. Singular Value Decomposition- If mxn RA∈ , then there exists the diagonal matrices [ ] mxm m RuuU ∈Λ= ,,1 and [ ] nxn n RvvV ∈Λ= ,,1 so that ),( ,1 p T diagAVU σσ Λ= where 0),,min( 21 ≥≥Λ≥≥= pnmp σσσ ,,...2,1, pii =σ are the singular values of A . The singular values are the square roots of eigenvalues iλ of H AA or AAH , that is ii λσ = Theorem 2. The stability of Singular Value: Assume ,, mxnmxnmxn RBA ∈ and their singular values are ,, 2121 nn τττσσσ ≥Λ≥≥≥Λ≥≥ respectively, then 2 BAii −≤−τσ . This means that there is a disturbance at A, the variation of its singular values is not more than the 2 . -norm of the disturbance matrix. Theorem 3. The scaling property- If singular values of mxn A are kσσσ ,,2,1 Λ , the singular values of mxn A*α are ** 2 * 1 ,,, kσσσ Λ , then ),,,(),,,( ** 2 * 121 kk σσσσσσα Λ=Λ Theorem 4. The rotation invariant property- If P is the unitary matrix, then the singular values of PA are the same as those of A. The above properties of SVD are very desirable in signature verification, when signature data are taken using data glove. 3.1 Distance Measurement for Signature Data Sets By establishing the properties of SVD, we extracted the first r left singular vectors (U) of glove data matrix A, which is account for most of the variation in the original data. This means that with m × n data matrix that is usually largely over determined with much more samples (columns) than channels (rows): n >> m the singular value decomposition allows to compact the most of signature characteristics into r vectors. Now, having identified each signature through its r-th principal subspace, the authenticity of the tried signature can be obtained by calculating the Euclidean distance between its principal subspace and the genuine reference. The Euclidian distance for every genuine or forged signature { }ki xxxX ,...,, 21∈ with the reference signature { }ki yyyY ,...,, 21∈ is calculated by given equation: ( ) 2 1 2 1 ,         −= ∑= k i iiii YXYXceantDis 3.2 Model for the SVD-based Signature verification Technique The model for the proposed signature verification technique is shown in Figure 3. The whole system is divided into two phases: Enrollment phase: • Use data glove to provide the system with 10 genuine samples of his/her signature. • Out of the collected 10 genuine samples select the reference signature. • Extract the r-principal subspace of the reference signature and save it in the database for matching.
  • 5. Shohel Sayeed, Nidal S. Kamel and Rosli Besar Signal Processing: An International Journal, Volume (2) : Issue (1) 5 FIGURE 3. Proposed Model for the SVD-based Signature Verification Technique Verification phase: • Use data glove to input the signature of the user (one sample). • Calculate the r-principal subspace of the claimed identity using SVD. • Match the principal subspace of the claimed identity to the enrolled models in the database through the similarity factor. • Compare the similarity factor with the decision threshold for ACCEPT or REJECT. Some typical signatures along with their forgeries are given in Figure 4. Genuine Skilled forgery (Imposter) FIGURE 4: Some Example Of Genuine Signatures And Their Typical Skilled Forgeries Verification Phase Enrollment Phase Finding the r-principal subspace of A through SVD Data Glove output matrix A (Capture one signature per writer) The r-left singular vectors of user # 1 (Signature Database) Input signature (A) Accepted or Rejected r-principal subspace Matching Decision threshold
  • 6. Shohel Sayeed, Nidal S. Kamel and Rosli Besar Signal Processing: An International Journal, Volume (2) : Issue (1) 6 4. EXPERIMENTAL RESULTS AND DISCUSSION To verify the efficiency of the proposed technique in handwritten signature verification, the 5DT Data Glove 14 Ultra is used. This glove is using 14 sensors to measure finger flexure (two sensors per finger) as well as the abduction between fingers. Glove data is acquired using 8-bit resolution (256 positions) for each figure as well as for the axes of the tilt sensor roll and pitch. The roll and bitch angle of the glove are measured using tilt sensor through a ±60o linear range. The 5DT Data Glove starts up in command mode. The full hand (five fingers, roll angle, pitch angle) can be sampled at least at 60 samples per second. The system interfaces with computer via cable to USB port. The SVD-signature verification algorithm is written in MATLAB 7.01 and run on a machine powered by Intel Core 2 Duo processor. The CPU time is about 80 ms. In the first experiment we asked 40 writers to repeat their signature 25 times creating 25 authentic samples per writer. Then we randomly mixed up the 25 genuine samples of each writer creating 50 pairs genuine of samples. This scenario is extended towards the available 40 genuine writers to create 50 × 40 = 2000 pairs of genuine signatures. The SVD-based signature verification technique is then run with each of the 2000 genuine trials and the Euclidean distances between the extracted features of the different signatures are calculated and included as similarity factor in percent in Table 1. In the second experiment we take one sample from each of the 40 genuine writers and consider it as a baseline. Next, we collect 10 forgery samples for each baseline from 20 skilled forgers, producing 200 forgery samples per baseline. The baseline sample for each genuine writer is then paired with each of 200 forgery trials to generate 200 pairs per baseline. This scenario is extended over the available 40 baseline samples generating 200 × 40 = 8000 genuine-forgery pairs. The SVD-based signature verification technique is then run with each of the 8000 imposter trials and the Euclidean distances between the extracted features of the different signatures is calculated and included as similarity factor in percent in Table 1. Glove-based Similarity factor In percentage Genuine Imposter (91-100)% 35% 0 (86-90)% 26% 0 (81-85)% 23% 0 (76-80)% 16% 0 (71–75)% 0 0 (66–70)% 0 1% (61-65)% 0 19.7% (51–60)% 0 53.65% < 50% 0 25.65% Table 1: The Similarity Factor In Percentage For Genuine and Imposter Samples.
  • 7. Shohel Sayeed, Nidal S. Kamel and Rosli Besar Signal Processing: An International Journal, Volume (2) : Issue (1) 7 Table 1 shows clearly that with the different 2000 genuine pairs of samples the SVD-signature verification technique using data glove produces 100% samples with similarity factor > 76% and approximately zero samples for similarity factor lower than 76%. This simply means that, for the worst case of repetition of a signature by the same writer, the SVD-based signature verification technique manages to recognize the similarity with other genuine one by at least 76% and for average quality of repeated samples the similarity factor is about 90%. Table 1 also shows the good capability of the SVD-based signature verification technique using data glove in identifying forgery samples from genuine. Where, out of the 8000 forgery samples the suggested technique produces 0% number of trials with similarity factor greater than 70%, making it nearly impossible for any skilful forger to exceed this threshold. 0 10 20 30 40 50 60 91-100 86-90 81-85 76-80 71-75 66-70 61-65 51-60 <50 Class Limit of Signatures Similarity (%) Samples(%) Genuine Skilled Forgery FIGURE 5: Similarity Measure Between The Mean Genuine Signature And Skilled Forgery Trials Using Glove-Based Signature Data In summary it can be said that the suggested SVD-based signature verification technique using data glove compare to corresponding signature images is showing quite powerful performance in recognizing the similarities between genuine signatures with lower bound of 76% and upper bound of approximately 97%. On the other hand it recognizes the differences between forgery and genuine samples with upper bound of 70% and lower with less than 50%. This performance creates gap between the two cases (genuine-genuine & genuine-forgery) large enough to easily and safely distinguish between authentic and forgery trials with approximately zero error. In evaluating the performance of a signature verification system, the FAR and FRR factors are used to assess the performance of the suggested technique. For further evaluating the performance of a signature verification system, we adopt the equal error rate (EER), that is the error rate when the false rejection rate (FRR) of genuine signatures and the false acceptance rate (FAR) of forgery signatures assume the same value; it can be adopted as a unique measure for characterizing the security level of a biometric system. Figure 6 shows that the EER of our proposed technique. The FAR and FRR are calculated for the normalized threshold values ranging from 0 to 1. FAR and FRR are calculated by
  • 8. Shohel Sayeed, Nidal S. Kamel and Rosli Besar Signal Processing: An International Journal, Volume (2) : Issue (1) 8 100X forgeriestestedofnumberTotal forgeriesacceptedofnumberTotal FAR = 100X genuinestestedofnumberTotal rejectedgenuineofnumberTotal FRR = 0 0 .1 0.2 0 .3 0.4 0 .5 0.6 0 .7 -10 0 10 20 30 40 50 60 70 80 Th res ho ld ErrorRate[%] F A R F R R FIGURE 6: False Acceptance Rate (FAR) And False Rejection Rate (FRR) As A Function Of A Decision Threshold Figure 6 shows that the Equal Error Rate (EER) of the SVD-based signature verification technique using data glove is 2.46%. 5. COMPARISON WITH OTHER ON-LINE METHODS It is difficult to make comparison between different signature verification techniques based on different databases [12]. Hence, here we just compared the performance achieved by some of the suggested signature verification techniques. An automatic handwritten signature verification system based on a serial multi-expert architecture obtained false acceptance rate (FAR) and false rejection rate (FRR) for skilled forgeries 19.8% and 2.04% respectively, and EER of 10.92% [13]. On-line handwritten signature verification system using Hidden Markov Model (HMM) has achieved a false acceptance rate (FAR) of 4% and a false rejection rate (FRR) of 12% for both random and skilled forgeries and EER of 11.5% [14]. Dynamic alignment distance based on-line signature verification method presented by Amac et al. [15] has achieved 7.83% for EER with data set of skilled forgeries. In addition to the aforementioned verification techniques, the First International Signature Verification Competition (SVC2004) has tested more than 15 systems from industry and academia and found that the best equal error rate is 2.84%, achieved by [16]. Our proposed technique comparing with others, the equal error rate value of the SVD-based signature verification technique (EER =2.46%) is considerably acceptable level than the most of the suggested techniques. EER = 2.46%
  • 9. Shohel Sayeed, Nidal S. Kamel and Rosli Besar Signal Processing: An International Journal, Volume (2) : Issue (1) 9 6. CONSLUSION & FUTURE WORK In this research paper we have summarized and critically discussed the main issues to be taken into account for the evaluation of the accuracy and performance of signature verification technique. The real-time signature identification and verification is necessary in most practical application. Our proposed SVD-based signature verification technique can process glove-based signature data in high speed and obtained a significant result. Its effectiveness and significant performance has been proven by the experiments. In order to compare the proposed technique using data glove with other on-line signature verification technique, the equal error rate value of the SVD-based signature verification technique is calculated and proved to be significantly lower (EER = 2.46%) than the other on-line techniques. Hence, from the experimental point of view, our proposed technique for signature identification and verification need low computational time as well as produce high level of accuracy. So, the SVD-based signature verification technique using data glove may represent a new trend in real-time signature verification system. In future, the structure of the data glove can be further simplified by interfacing with the computer wirelessly by means of Bluetooth technology as well as increase the database size and reduce the number of sensors. 7. REFERENCES 1. Y. Qi. and B.R. Hunt. “Signature verification using global and grid features”. Pattern Recognition, 27(12):1621-1629, 1994. 2. R. Sabourin, , G. Genest, F. Prêteux. “Off-line signature verification by local granulometric size distributions”. IEEE Trans. Pattern Analysis and Machine Intelligence. 19(9): 976-988, 1997. 3. B. Fang, C.H. Leung, Y.Y. Tang, K.W. Tse, P.C.K. Kwok, Y.K. Wong. “Offline signature verification by the tracking of feature and stroke positions”. Pattern Recognition, 36(1): 91– 101, 2003. 4. K. K. Meenaskhi, S. Srihari, A. Xu. “Offline signature verification and identification using distance statistics”. International Journal of Pattern Recognition and Artificial Intelligence, 18(7):1339-1360, 2004. 5. R. Plamondon. “The design of an on-line signature verification system: from theory to practice”. International Journal of Pattern Recognition Artificial Intelligence, 1994. 6. M. Paulik, J. Mark and N. Mohankrishanan. “Sequence decomposition based, autoregressive hidden markov model for dynamic signature identification and verification”.IEEE Press, 1993. 7. T. H. Rhee, S. J. Cho and J. H. Kim. “On-line signature verification using model–guided segmentation and discriminative feature selection for skilled forgeries”, Proceedings Sixth International Conference In Document Analysis and Verification, pp. 645–649, 2001. 8. L. Lee, T. Berger and E. Aviczer. “Reliable on–line human signature verification systems”, IEEE Transaction On Pattern Analysis and Machine Intelligence, 18(6): 643–647, 1996. 9. R. Kashi, J. Hu, W.L. Nelson and W. Turin. “A hidden markov model approach to on-line handwritten signature verification”, International Journal on Document Analysis and Verification, no.1, pp. 102–109, 1998. 10. S. Sayeed, R. Besar, and N. S. Kamel. "Dynamic signature verification using sensor based data glove", Proceedings of 8th International Conference on Signal Processing, IEEE Press, pp. 2387-2390, 2006. 11. http://www.5dt.com/products/pdataglove14.html 12. B. Fang, C.H. Leung, Y.Y. Tang, P.C.K. Kwork, K.W. Tse and Y.K. Wong. “Offline signature verification with generated training samples”, IEE Proceedings on Vision, Image and Signal Processing. 149(2): 85-90, 2002.
  • 10. Shohel Sayeed, Nidal S. Kamel and Rosli Besar Signal Processing: An International Journal, Volume (2) : Issue (1) 10 13. C. Sansone and M.Vento. “Signature verification: increasing performance by a multi-stage system”, International Journal on Document Analysis and Applications, Springer-Verlag, London Limited, vol. 3, pp. 169-181, 2000. 14. M. S. Mohammad and R. R. Hamid. “A new on-line signature verification algorithm using variable length segmentation and hidden markov models”, Proceeding of the Seventh International Conference on Document Analysis and Recognition. 2003. 15. H. Amac and A. Ethem. “Dynamic alignment distance based online signature verification”, The 13th Turkish Symposium on Artificial Intelligence and Artificial Neural Networks, Izmir, Turkey, 2004. 16. D. Yeung, H. Chang, Y. Xiong, S. George, R. Kashi, T. Matsumoto and G. Rigoll. “SVC2004: first international signature verification competition”. ICBA 2004, Lecture Notes in Computer Science, Springer-Verlag, Berlin Heidelberg, vol. 3072, pp. 16-22, 2004.