SlideShare a Scribd company logo
1 of 6
Download to read offline
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE)
e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 2, Ver. IV (Mar - Apr.2015), PP 48-53
www.iosrjournals.org
DOI: 10.9790/2834-10244853 www.iosrjournals.org 48 | Page
Online Signature Verification Using Vector Quantization and
Hidden Markov Model
Behrouz Vaseghi1
, Somayeh Hashemi2
1,2
(Department of Electrical Engineering ,Abhar Branch, Islamic Azad University, Abhar, Iran.)
Abstract: In this paper an on-line signature verification system, using vector quantization and Hidden Markov
Model (VQ-HMM) is presented. After the signature acquisition, a Chebichef filter is used for noise reduction,
and size and phase normalization is performed using Fourier transform. Each signature is segmented and mean
velocity, acceleration and pressure are used as extracted features. K-means clustering is used for generation a
codebook and VQ generates a code word for each signature. These code words are used as observation vectors
in training and recognition phase. HMM models are trained using Baum Welch algorithm. In the verification
phase, the forward algorithm is used. The Threshold used in the verification phase is a function of the minimum
probability in training phase. Equal Error Rate obtained from this system is 14%.
Keywords: online signature verification, HMM, Vector Quantization, Baum Welch, K-means
I. Introduction
NOWADAYS, the society demands secure means for person authentication. traditional authentication
methods are based on the knowledge (password, Personal Identification Number numbers) or on the possession
of a token (Identificator card, keys), which can be forgotten or stolen. This fact places a lot of attention in
biometrics as an alternative method for person authentication and identification. Biometrics is defined in [1] as
the use of physiological or behavioral characteristics for person recognition, and hence, they are not affected by
the disadvantages of the traditional authentication methods since they cannot be forgotten or stolen. Biometrics
can be coarsely categorized into behavioral and physiological biometrics. Physiological biometrics are based on
measurable physiological traits, such as fingerprints or the iris pattern. Behavioral biometrics are based on
measurements extracted from an activity performed by the user, in a conscious or unconscious way, and they are
inherent to his/her own personality or learned behavior, although influenced also by the physical characteristics
of the person. in this sense, behavioral biometrics have some interesting advantages, like user acceptance and
cancelability, but they still lack the same level of uniqueness as physiological biometrics. Among all the
biometric traits that can be categorized as pure behavioral, the signature, and the way that we sign, is the one
that has the widest social acceptance for identity authentication. On the basis of the signature acquisition
method, signature recognition methods can be categorized into static (or offline) and dynamic (or online)
methods [2]. Offline signature verification uses the shape of the signature to authenticate the signer. Online
signature verification uses dynamic characteristics of the signature (time-dependent signals) to authenticate the
signer. Learning the dynamics of the real signer is a difficult task for an impostor, compared to replicate only the
shape of a signature. Moreover, the use of devices with built-in pen input such as smartphones, Personal Digital
Assistants, or tablet PCs has been spread in the last years. These facts have motivated great research efforts in
the last decade on dynamic or online signature verification, as reviewed in [3].
II. Signatures Database And Preprocessing
2.1 data collection
By using a graphic tablet, a total of 500 genuine signatures were collected from a population of 50
human subjects including 25 men and 25 women that each of the men and women contributed 10 genuine
signature samples. Additionally, 250 forgery signatures (5 forgery signatures for each person) were used for
testing rejection capabilities of the system. All of these forgery signatures were “skilled forgeries”. In fact, the
data acquisition procedure involves a signer and a forger. While the signer is seated and writes signatures, the
forger is looking over the shoulder of the signer to capture both the image and the dynamic information of the
written signature.
2.2 preprocessing
After the signatures collected, a four-order Chebychev filter with cutoff frequency 20 hertz is used for
noise reduction and size and phase normalization is performed using Fourier transform [4],[5]. Then each
signature is segmented based on the points where 0yv , 0xv [6],[7] . After initial segmentation, in order to
divide each person‟s signatures into the same number of segments, dominant number of segments for each
Online Signature Verification Using Vector Quantization and Hidden Markov Model
DOI: 10.9790/2834-10244853 www.iosrjournals.org 49 | Page
signature is calculated and signatures with segments different from this number are redivided based on this
number (figure 1).
Fig.1 Result of signature segmentation
III. Feature Extraction and Vector quantization
3.1 Feature Extraction
The result of segmentation is a number of segments for each signature. Each segment is characterized
by location of its most significant point in the signature, average velocity, average acceleration, average
pressure, pressure variance and two angles of tangent lines to curve of segment in two segment end points (see
Figure 2).
Fig.2 Angle of tangent lines at two end points of a segment
As described, signatures are captured using a pen tablet model Graphire2 Universal Serial Bus, branded
by [6]. The tablet spatial resolution is 100 lines per millimeter. The precision is ±0.25 mm. The maximum
detection height is 1 cm, and the sampling rate is 100 Hz. Time signals for each segment provided by the
digitizer are as follows [8],[9],[10]:
1) Coordinate information: x and y.
2) Pressure: pr .
3) Angles: start , end
Additional dynamic features are derived from these features.
1) Velocity 2222
)()( yx
t
y
t
x vvv 



 and logVelocity )0.1log(log vV 
2) Acceleration
t
va

 .
3) Tangential angle )(tan 1
x
y
v
v
 .
4) Curvature radius vcr
t
/)(


 .
5) logPressure )0.1log(log prpr  .
Online Signature Verification Using Vector Quantization and Hidden Markov Model
DOI: 10.9790/2834-10244853 www.iosrjournals.org 50 | Page
Therefore, eleven parameters are extracted on each segment of the signature. In this way, each signature is
represented by a sequence of frames with aforementioned features.
]log,log,,,,,,.,,[ prvcravpryxp endstarti 
3.2 Vector Quantization
A set of feature vectors extracted ( },,,{ 21 npppP  ) from signature segments (frames) were gathered to
generate a codebook. The K-means algorithm is used to segment this vector space into C-partitions represented
by a set of cluster centers [11],[ 12]. After generating the codebook, a given feature vector ( iv ) is mapped into a
membership vector ],...,,[ 21 iciii uuuU  . Thus, each signature, represented by a sequence of feature vectors
extracted from signature frame, is now mapped into an observation sequence of membership vectors (instead of
an observation sequence of single values in the case of conventional VQ/HMM). Therefore, the Baum Welch
Re-estimation algorithm (in training phase) and Forward algorithm (in recognition phase) must be used to take
into account this observation sequences.
IV. Hidden Markov Model
In this method, each signature class is modeled by a single HMM. A HMM, is defined by the following
parameter: [12],[13](see figure 3)
 The number of states (N) which is set for each class is proportional to the average numbers of frames in
training samples in that class. The individual states are denoted as:
},,,{ 21 NSSSS  (1)
and the state at time t as tq .
 The number of distinct observation symbols per state (M), which is set equal to 10 in this case. we denote
the individual symbols as
},,,{ 21 MvvvV  (2)
Which are c cluster centers obtained by K- means clustering algorithm.
 The state transition probability distribution:
}{ ijaA 
(3)
That ]/[ 1 ittij sqqpa   Nji  ,1, (4)
And 0ija )()( ijorijif  (5)
The maximum number of forward jumps in each state (  ) is chosen experimentally to be between 2
and 4 for each class during training.
 The observation symbol probability distribution :
)}({ mbB j (6)
That
]/[)( jtmj sqatvpmb  MmNj  1,1, (7)
 The initial state distribution :
}{ i Ni 1, (8)
That






1,1
1,0
][
i
i
sqp iii (9)
Online Signature Verification Using Vector Quantization and Hidden Markov Model
DOI: 10.9790/2834-10244853 www.iosrjournals.org 51 | Page
 The last state distribution :
}{ i Ni 1, (10)
That






Ni
Ni
sqp iTi
,1
,0
][ (11)
 The set of K observation sequences (training samples) for each signature class:
},...,{ )()2()1( K
OOOO  (12)
That
},...,{ )()2(
2
)1(
1
)( K
T
K
K
OOOO  (13)
And
)(K
tO is the observation vector at frame t in the Kth training sample.
Fig. 3. HMM structure and parameters
In this way each signature in the test data set is represented as sequences of T observation and for
each signature set, a separate left-right HMM is trained by these observations and Baum-Welch algorithm. The
distributions  and  are not re-estimated since they are predefined in left-right HMM as show in equations
(8-11). For each signer i, an HMM is trained using 7 genuine signatures of i. The number of states of each HMM
model equals 0.9 times the number of segments that in segmentation step is computed for each signature in the
training set.
After training all of the HMMs by Baum-Welch algorithm the probability that o has been generated by
signature model, ( 501),|(  hoP h ) ,was computed by forward algorithm as follows:
Nj
TtObai
tob
j
k
k
tj
N
i
ij
k
t
k
tjj
K
t 















1,
2) ,().(
1),.(.
)( )(
1
)(
1
)(



(14)
Similarly, the backward variable for given signature sample K is calculated as:
Nj
TtiOba
Tt
j
K
N
i
k
t
k
tjji
Kj
k
t 















1,
1,...,1,)()(
,
)(
1
)(
1
)(
)(


 (15)
Finally the observation probability is calculated as:
iTh
K
hK iOPP
K
K
 .)()|(
)(
)(
,  (16)
Online Signature Verification Using Vector Quantization and Hidden Markov Model
DOI: 10.9790/2834-10244853 www.iosrjournals.org 52 | Page
The Threshold used in the verification phase is a function of the minimum probability in training phase
x
trainthr pp 
 10 (17)
That trainp was obtained from the train phase and x is a constant value for all signatures.
V. Experimental results
Two quantities can characterize the performance of a signature verification algorithm; False Rejection
(FR), that is when a true signature is rejected, and False Acceptance (FA) that is when a forgery is accepted as
true signature. Traditionally, the value of threshold is chosen such as to realize the Equal Error Rate (ERR). As
mentioned earlier, an HMM is trained using 7 signatures for each person. All other signatures of this person and
forgeries of his/her signature were used for testing purposes.
In this work effects of Threshold that used in the verification phase, number of signatures in training
phase, optimum selection of signatures for training the model and number of state in the model relative to the
number of segments of the signature have been studied.
In Figure 4, the FR/FA Error rate diagrams are shown for the system that uses 7 signatures of each
person for training and all of remaining signatures for testing purpose. As shown in figure 4, when The
Threshold is the function of the minimum probability in training phase ERR is reduced.
Figure 5 shows the FR/FA Error rate diagrams for the system that uses 4 and 7 signatures of each
person for training .In this case, we observed that when we use 7 signatures for training the model, reduced the
verification error.
In a third experiment, we tested the verification reliability based on the signature selection for training
the model.in this case we observed that the optimum selection of signatures for training the model will reduce
the verification error.
Finally as shown in table 1, when we use Nstates= 0.9 Nsegments, the Equal Error Rate (ERR) of the
system was 14%.
(a) (b)
Fig.4. FAR and FRR diagram: (a) Threshold is constant for all signatures and (b) threshold is a function of the
minimum probability in training phase
(a) (b)
Fig.5. FAR and FRR diagram: (a) 4 signatures for train (b) 7 signatures for training
Online Signature Verification Using Vector Quantization and Hidden Markov Model
DOI: 10.9790/2834-10244853 www.iosrjournals.org 53 | Page
(a) (b)
Fig.5. FAR and FRR diagram: (a) random selection of signatures (b) optimum selection of signatures
Table.1. Equal Error Rate (ERR) versos the a=Nstate/Nseg
a 0.3 0.4 0.5 0.6 0.7 0.8 0.9
EER 19% 19% 0.19% 0.17% 0.17% 0.16% 0.14%
x 27 28 29 29 30 31 32
VI. Conclusion
The purpose of this paper is to design an automatic on-line signature verification system, using Vector
Quantization and Hidden Markov Model (VQ-HMM). We have used a graphic tablet for signature acquisition.
Our database contains 500 authentic signatures and 250 forgeries, signed by 50 persons. A Chebichef filter is
used for noise reduction, and size and phase normalization is performed using Fourier transform. Each signature
is segmented based on the points where 0yv , 0xv . After initial segmentation, in order to divide each
person‟s signatures into the same number of segments, dominant number of segments for each signature is
calculated and signatures with segments different from this number are redivided based on this number. Mean
velocity, acceleration and pressure are used as extracted features. K-means clustering is used for generation a
codebook and VQ generates a code word for each signature. These code words are used as observation vectors
in training and recognition phase. HMM models are trained using Baum Welch algorithm. In the verification
phase, the forward algorithm is used. The Threshold used in the verification phase is a function of the minimum
probability in training phase. Equal Error Rate obtained from this system is 14%. We observed that the optimum
selection of signatures for training the model, calculating the verification threshold as a function of the training
probability and increasing the number of states will reduce the verification error.
Acknowledgements
This work has been supported by the Islamic Azad University, Abhar Branch, Abhar-Iran
References
[1]. N. K. Ratha, A. W. Senior, and R. M. Bolle, “Automated biometrics,” in Proc. 2nd Int. Conf. Adv. Pattern Recog., Rio de Janeiro, Brazil,
Mar. 2001, pp. 445–474.
[2]. B.Vaseghi , S.Hashemi „Offline signatures Recognition system using Discrete Cosine Transform‟ Australian Journal of Basic and Applied
Sciences, 6(12): 423-428, 2012 ISSN 1991-8178
[3]. P.O. D. Impedovo and G. Pirlo, “Automatic signature verification: The state of the art,” IEEE Trans. Syst., Man, Cybern. C, Appl. Rev., vol.
38, no. 5,pp. 609–635, Sep. 2008.
[4]. F. D. Griess, K. Jain, “Online signature verification”, Project Report, Michigan State University, department of computer science
[5]. D.S. R. Plamondon, G. Lorette, “Automatic signature verification and writer identification – the state of the art”, Pattern Recognition
Journal, vol. 22, no. 2, pp. 107-131, 1989.
[6]. R. S. Kashi, W. L. Nelson, “Online handwritten signature verification using hidden markov model features”, Proceeding of 4thInter. conf. on
document analysis and recognition, pp. 253-257, 1997.
[7]. L. R. Rabiner, “A tutorial on hidden markov models and selected applications in speech recognition”, Proceedings of IEEE, vol. 77, no.2, pp.
257-286, February 1989.
[8]. J. Fiérrez-Aguilar, J. Ortega-Garcia, and J. Gonzalez-Rodriguez, “Target dependent score normalization techniques and their application to
signature verification,” IEEE Trans. Syst., Man, Cybern. C, Appl. Rev., vol. 35, no. 3, pp. 418–425, Aug. 2005.
[9]. J. Ortega-Garcia, J. Fiérrez-Aguilar, J. Martin-Rello, and J. Gonzalez-Rodriguez, “Complete signal modeling and score normalization for
function-based dynamic signature verification,” in Proc. 4th Int. Conf. Audio Video-Based Biometrie Person Authentication, Guildford,
U.K., Jun. 2003, pp. 658–667.
[10]. B. L. Van, S. Garcia-Salicetti, and B. Dorizzi, “Fusion of HMMs likelihood and Viterbi path for on-line signature verification,” in Proc. Eur.
Conf. Comput. Vis., Prague, Czech Republic, May 2004, pp. 318–331.
[11]. E. Justino, A. Yacoubi, R. Sabourin and F. Bortolozzi. 2000“An off-line signature verification system using HMM and graphometric
features”, Proc. of the 4th International Workshop on Document Analysis Systems, pp. 211-222.
[12]. A.K. Jain, M.N. Murty, andP.J. Flynn, “Data Clustering: A Review”, ACM Computing Surveys, Vol. 31, No. 3, September 1999.
[13]. Vaseghi.B., Alirezaee.Sh., "Off-line Farsi/Arabic Handwritten word recognition using vectorquantization and hidden markov model,"
Proceedings of the 12th IEEE International Multitopic Conference, 978-1-4244-2824-3/08/$25.00

More Related Content

What's hot

Filtering of Frequency Components for Privacy Preserving Facial Recognition
Filtering of Frequency Components for Privacy Preserving Facial RecognitionFiltering of Frequency Components for Privacy Preserving Facial Recognition
Filtering of Frequency Components for Privacy Preserving Facial RecognitionArtur Filipowicz
 
An offline signature recognition and verification system based on neural network
An offline signature recognition and verification system based on neural networkAn offline signature recognition and verification system based on neural network
An offline signature recognition and verification system based on neural networkeSAT Journals
 
Offline signatures matching using haar wavelet subbands
Offline signatures matching using haar wavelet subbandsOffline signatures matching using haar wavelet subbands
Offline signatures matching using haar wavelet subbandsTELKOMNIKA JOURNAL
 
A Simple Signature Recognition System
A Simple Signature Recognition System A Simple Signature Recognition System
A Simple Signature Recognition System iosrjce
 
Hybrid fingerprint matching algorithm for high accuracy and reliability
Hybrid fingerprint matching algorithm for high accuracy and reliabilityHybrid fingerprint matching algorithm for high accuracy and reliability
Hybrid fingerprint matching algorithm for high accuracy and reliabilityeSAT Publishing House
 
Gait using moment with gray and
Gait using moment with gray andGait using moment with gray and
Gait using moment with gray andijsc
 
A Novel 2D Feature Extraction Method for Fingerprints Using Minutiae Points a...
A Novel 2D Feature Extraction Method for Fingerprints Using Minutiae Points a...A Novel 2D Feature Extraction Method for Fingerprints Using Minutiae Points a...
A Novel 2D Feature Extraction Method for Fingerprints Using Minutiae Points a...IJECEIAES
 
Survey on Different Methods for Defect Detection
Survey on Different Methods for Defect DetectionSurvey on Different Methods for Defect Detection
Survey on Different Methods for Defect DetectionIRJET Journal
 
Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...eSAT Publishing House
 
22 29 dec16 8nov16 13272 28268-1-ed(edit)
22 29 dec16 8nov16 13272 28268-1-ed(edit)22 29 dec16 8nov16 13272 28268-1-ed(edit)
22 29 dec16 8nov16 13272 28268-1-ed(edit)IAESIJEECS
 
Handwritten Signature Verification using Artificial Neural Network
Handwritten Signature Verification using Artificial Neural NetworkHandwritten Signature Verification using Artificial Neural Network
Handwritten Signature Verification using Artificial Neural NetworkEditor IJMTER
 
A Sensor-Based Approach for Dynamic Signature Verification using Data Glove
A Sensor-Based Approach for Dynamic Signature Verification using Data GloveA Sensor-Based Approach for Dynamic Signature Verification using Data Glove
A Sensor-Based Approach for Dynamic Signature Verification using Data GloveCSCJournals
 
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...IJNSA Journal
 
Handwritten Signature Verification System using Sobel Operator and KNN Classi...
Handwritten Signature Verification System using Sobel Operator and KNN Classi...Handwritten Signature Verification System using Sobel Operator and KNN Classi...
Handwritten Signature Verification System using Sobel Operator and KNN Classi...ijtsrd
 
Spot Edge Detection in cDNA Microarray Images using Window based Bi-Dimension...
Spot Edge Detection in cDNA Microarray Images using Window based Bi-Dimension...Spot Edge Detection in cDNA Microarray Images using Window based Bi-Dimension...
Spot Edge Detection in cDNA Microarray Images using Window based Bi-Dimension...idescitation
 
Automatic signature verification with chain code using weighted distance and ...
Automatic signature verification with chain code using weighted distance and ...Automatic signature verification with chain code using weighted distance and ...
Automatic signature verification with chain code using weighted distance and ...eSAT Journals
 
Image Processing Based Signature Recognition and Verification Technique Using...
Image Processing Based Signature Recognition and Verification Technique Using...Image Processing Based Signature Recognition and Verification Technique Using...
Image Processing Based Signature Recognition and Verification Technique Using...Priyanka Pradhan
 
Dynamic Threshold in Clip Analysis and Retrieval
Dynamic Threshold in Clip Analysis and RetrievalDynamic Threshold in Clip Analysis and Retrieval
Dynamic Threshold in Clip Analysis and RetrievalCSCJournals
 

What's hot (20)

Filtering of Frequency Components for Privacy Preserving Facial Recognition
Filtering of Frequency Components for Privacy Preserving Facial RecognitionFiltering of Frequency Components for Privacy Preserving Facial Recognition
Filtering of Frequency Components for Privacy Preserving Facial Recognition
 
An offline signature recognition and verification system based on neural network
An offline signature recognition and verification system based on neural networkAn offline signature recognition and verification system based on neural network
An offline signature recognition and verification system based on neural network
 
Offline signatures matching using haar wavelet subbands
Offline signatures matching using haar wavelet subbandsOffline signatures matching using haar wavelet subbands
Offline signatures matching using haar wavelet subbands
 
A Simple Signature Recognition System
A Simple Signature Recognition System A Simple Signature Recognition System
A Simple Signature Recognition System
 
Hybrid fingerprint matching algorithm for high accuracy and reliability
Hybrid fingerprint matching algorithm for high accuracy and reliabilityHybrid fingerprint matching algorithm for high accuracy and reliability
Hybrid fingerprint matching algorithm for high accuracy and reliability
 
Gait using moment with gray and
Gait using moment with gray andGait using moment with gray and
Gait using moment with gray and
 
H364752
H364752H364752
H364752
 
A Novel 2D Feature Extraction Method for Fingerprints Using Minutiae Points a...
A Novel 2D Feature Extraction Method for Fingerprints Using Minutiae Points a...A Novel 2D Feature Extraction Method for Fingerprints Using Minutiae Points a...
A Novel 2D Feature Extraction Method for Fingerprints Using Minutiae Points a...
 
Offline Signature Verification and Recognition using Neural Network
Offline Signature Verification and Recognition using Neural NetworkOffline Signature Verification and Recognition using Neural Network
Offline Signature Verification and Recognition using Neural Network
 
Survey on Different Methods for Defect Detection
Survey on Different Methods for Defect DetectionSurvey on Different Methods for Defect Detection
Survey on Different Methods for Defect Detection
 
Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...
 
22 29 dec16 8nov16 13272 28268-1-ed(edit)
22 29 dec16 8nov16 13272 28268-1-ed(edit)22 29 dec16 8nov16 13272 28268-1-ed(edit)
22 29 dec16 8nov16 13272 28268-1-ed(edit)
 
Handwritten Signature Verification using Artificial Neural Network
Handwritten Signature Verification using Artificial Neural NetworkHandwritten Signature Verification using Artificial Neural Network
Handwritten Signature Verification using Artificial Neural Network
 
A Sensor-Based Approach for Dynamic Signature Verification using Data Glove
A Sensor-Based Approach for Dynamic Signature Verification using Data GloveA Sensor-Based Approach for Dynamic Signature Verification using Data Glove
A Sensor-Based Approach for Dynamic Signature Verification using Data Glove
 
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...
 
Handwritten Signature Verification System using Sobel Operator and KNN Classi...
Handwritten Signature Verification System using Sobel Operator and KNN Classi...Handwritten Signature Verification System using Sobel Operator and KNN Classi...
Handwritten Signature Verification System using Sobel Operator and KNN Classi...
 
Spot Edge Detection in cDNA Microarray Images using Window based Bi-Dimension...
Spot Edge Detection in cDNA Microarray Images using Window based Bi-Dimension...Spot Edge Detection in cDNA Microarray Images using Window based Bi-Dimension...
Spot Edge Detection in cDNA Microarray Images using Window based Bi-Dimension...
 
Automatic signature verification with chain code using weighted distance and ...
Automatic signature verification with chain code using weighted distance and ...Automatic signature verification with chain code using weighted distance and ...
Automatic signature verification with chain code using weighted distance and ...
 
Image Processing Based Signature Recognition and Verification Technique Using...
Image Processing Based Signature Recognition and Verification Technique Using...Image Processing Based Signature Recognition and Verification Technique Using...
Image Processing Based Signature Recognition and Verification Technique Using...
 
Dynamic Threshold in Clip Analysis and Retrieval
Dynamic Threshold in Clip Analysis and RetrievalDynamic Threshold in Clip Analysis and Retrieval
Dynamic Threshold in Clip Analysis and Retrieval
 

Viewers also liked

Comparative study of sympathetic cardiovascular parameters in overweight, nor...
Comparative study of sympathetic cardiovascular parameters in overweight, nor...Comparative study of sympathetic cardiovascular parameters in overweight, nor...
Comparative study of sympathetic cardiovascular parameters in overweight, nor...IOSR Journals
 
Optimization Technologies for Low-Bandwidth Networks
Optimization Technologies for Low-Bandwidth NetworksOptimization Technologies for Low-Bandwidth Networks
Optimization Technologies for Low-Bandwidth NetworksIOSR Journals
 
Leather Quality Estimation Using an Automated Machine Vision System
Leather Quality Estimation Using an Automated Machine Vision SystemLeather Quality Estimation Using an Automated Machine Vision System
Leather Quality Estimation Using an Automated Machine Vision SystemIOSR Journals
 
Implementation of XOR Based Pad Generation Mutual Authentication Protocol for...
Implementation of XOR Based Pad Generation Mutual Authentication Protocol for...Implementation of XOR Based Pad Generation Mutual Authentication Protocol for...
Implementation of XOR Based Pad Generation Mutual Authentication Protocol for...IOSR Journals
 
Analysis characteristics of power PV cells and wind turbine from power genera...
Analysis characteristics of power PV cells and wind turbine from power genera...Analysis characteristics of power PV cells and wind turbine from power genera...
Analysis characteristics of power PV cells and wind turbine from power genera...IOSR Journals
 
Prevalence of anemia and socio-demographic factors associated with anemia amo...
Prevalence of anemia and socio-demographic factors associated with anemia amo...Prevalence of anemia and socio-demographic factors associated with anemia amo...
Prevalence of anemia and socio-demographic factors associated with anemia amo...IOSR Journals
 
Novel Way to Isolate Adipose Derive Mesenchymal Stem Cells & Its Future Clini...
Novel Way to Isolate Adipose Derive Mesenchymal Stem Cells & Its Future Clini...Novel Way to Isolate Adipose Derive Mesenchymal Stem Cells & Its Future Clini...
Novel Way to Isolate Adipose Derive Mesenchymal Stem Cells & Its Future Clini...IOSR Journals
 
“Recurrent Lower Abdomen Pain, An Introspection.”
“Recurrent Lower Abdomen Pain, An Introspection.”“Recurrent Lower Abdomen Pain, An Introspection.”
“Recurrent Lower Abdomen Pain, An Introspection.”IOSR Journals
 
Soil-transmitted helminth infections in relation to the knowledge and practic...
Soil-transmitted helminth infections in relation to the knowledge and practic...Soil-transmitted helminth infections in relation to the knowledge and practic...
Soil-transmitted helminth infections in relation to the knowledge and practic...IOSR Journals
 
A Two Grid Discretization Method For Decoupling Time-Harmonic Maxwell’s Equat...
A Two Grid Discretization Method For Decoupling Time-Harmonic Maxwell’s Equat...A Two Grid Discretization Method For Decoupling Time-Harmonic Maxwell’s Equat...
A Two Grid Discretization Method For Decoupling Time-Harmonic Maxwell’s Equat...IOSR Journals
 
To study the factors effecting sales of leading tractor brands in Haryana (In...
To study the factors effecting sales of leading tractor brands in Haryana (In...To study the factors effecting sales of leading tractor brands in Haryana (In...
To study the factors effecting sales of leading tractor brands in Haryana (In...IOSR Journals
 
Bryophyllum Pinnatum: A Potential Attenuator of Cadmium-Induced Oxidative Str...
Bryophyllum Pinnatum: A Potential Attenuator of Cadmium-Induced Oxidative Str...Bryophyllum Pinnatum: A Potential Attenuator of Cadmium-Induced Oxidative Str...
Bryophyllum Pinnatum: A Potential Attenuator of Cadmium-Induced Oxidative Str...IOSR Journals
 
Cloud Computing for E-Commerce
Cloud Computing for E-CommerceCloud Computing for E-Commerce
Cloud Computing for E-CommerceIOSR Journals
 

Viewers also liked (20)

Comparative study of sympathetic cardiovascular parameters in overweight, nor...
Comparative study of sympathetic cardiovascular parameters in overweight, nor...Comparative study of sympathetic cardiovascular parameters in overweight, nor...
Comparative study of sympathetic cardiovascular parameters in overweight, nor...
 
E017352634
E017352634E017352634
E017352634
 
M1802037781
M1802037781M1802037781
M1802037781
 
E012542629
E012542629E012542629
E012542629
 
I012527580
I012527580I012527580
I012527580
 
K012556370
K012556370K012556370
K012556370
 
L1803058388
L1803058388L1803058388
L1803058388
 
Optimization Technologies for Low-Bandwidth Networks
Optimization Technologies for Low-Bandwidth NetworksOptimization Technologies for Low-Bandwidth Networks
Optimization Technologies for Low-Bandwidth Networks
 
Leather Quality Estimation Using an Automated Machine Vision System
Leather Quality Estimation Using an Automated Machine Vision SystemLeather Quality Estimation Using an Automated Machine Vision System
Leather Quality Estimation Using an Automated Machine Vision System
 
Implementation of XOR Based Pad Generation Mutual Authentication Protocol for...
Implementation of XOR Based Pad Generation Mutual Authentication Protocol for...Implementation of XOR Based Pad Generation Mutual Authentication Protocol for...
Implementation of XOR Based Pad Generation Mutual Authentication Protocol for...
 
Analysis characteristics of power PV cells and wind turbine from power genera...
Analysis characteristics of power PV cells and wind turbine from power genera...Analysis characteristics of power PV cells and wind turbine from power genera...
Analysis characteristics of power PV cells and wind turbine from power genera...
 
Prevalence of anemia and socio-demographic factors associated with anemia amo...
Prevalence of anemia and socio-demographic factors associated with anemia amo...Prevalence of anemia and socio-demographic factors associated with anemia amo...
Prevalence of anemia and socio-demographic factors associated with anemia amo...
 
Novel Way to Isolate Adipose Derive Mesenchymal Stem Cells & Its Future Clini...
Novel Way to Isolate Adipose Derive Mesenchymal Stem Cells & Its Future Clini...Novel Way to Isolate Adipose Derive Mesenchymal Stem Cells & Its Future Clini...
Novel Way to Isolate Adipose Derive Mesenchymal Stem Cells & Its Future Clini...
 
“Recurrent Lower Abdomen Pain, An Introspection.”
“Recurrent Lower Abdomen Pain, An Introspection.”“Recurrent Lower Abdomen Pain, An Introspection.”
“Recurrent Lower Abdomen Pain, An Introspection.”
 
Soil-transmitted helminth infections in relation to the knowledge and practic...
Soil-transmitted helminth infections in relation to the knowledge and practic...Soil-transmitted helminth infections in relation to the knowledge and practic...
Soil-transmitted helminth infections in relation to the knowledge and practic...
 
A Two Grid Discretization Method For Decoupling Time-Harmonic Maxwell’s Equat...
A Two Grid Discretization Method For Decoupling Time-Harmonic Maxwell’s Equat...A Two Grid Discretization Method For Decoupling Time-Harmonic Maxwell’s Equat...
A Two Grid Discretization Method For Decoupling Time-Harmonic Maxwell’s Equat...
 
To study the factors effecting sales of leading tractor brands in Haryana (In...
To study the factors effecting sales of leading tractor brands in Haryana (In...To study the factors effecting sales of leading tractor brands in Haryana (In...
To study the factors effecting sales of leading tractor brands in Haryana (In...
 
Bryophyllum Pinnatum: A Potential Attenuator of Cadmium-Induced Oxidative Str...
Bryophyllum Pinnatum: A Potential Attenuator of Cadmium-Induced Oxidative Str...Bryophyllum Pinnatum: A Potential Attenuator of Cadmium-Induced Oxidative Str...
Bryophyllum Pinnatum: A Potential Attenuator of Cadmium-Induced Oxidative Str...
 
B010230811
B010230811B010230811
B010230811
 
Cloud Computing for E-Commerce
Cloud Computing for E-CommerceCloud Computing for E-Commerce
Cloud Computing for E-Commerce
 

Similar to I010244853

Offline Handwritten Signature Verification using Neural Network
Offline Handwritten Signature Verification using Neural NetworkOffline Handwritten Signature Verification using Neural Network
Offline Handwritten Signature Verification using Neural Networkijiert bestjournal
 
IRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNNIRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNNIRJET Journal
 
Multimodal Biometrics at Feature Level Fusion using Texture Features
Multimodal Biometrics at Feature Level Fusion using Texture FeaturesMultimodal Biometrics at Feature Level Fusion using Texture Features
Multimodal Biometrics at Feature Level Fusion using Texture FeaturesCSCJournals
 
An Enhanced Authentication System Using Face and Fingerprint Technologies
An Enhanced Authentication System Using Face and Fingerprint TechnologiesAn Enhanced Authentication System Using Face and Fingerprint Technologies
An Enhanced Authentication System Using Face and Fingerprint Technologiesiosrjce
 
IRJET- Emotion recognition using Speech Signal: A Review
IRJET-  	  Emotion recognition using Speech Signal: A ReviewIRJET-  	  Emotion recognition using Speech Signal: A Review
IRJET- Emotion recognition using Speech Signal: A ReviewIRJET Journal
 
ADAPTIVE WATERMARKING TECHNIQUE FOR SPEECH SIGNAL AUTHENTICATION
ADAPTIVE WATERMARKING TECHNIQUE FOR SPEECH SIGNAL AUTHENTICATION ADAPTIVE WATERMARKING TECHNIQUE FOR SPEECH SIGNAL AUTHENTICATION
ADAPTIVE WATERMARKING TECHNIQUE FOR SPEECH SIGNAL AUTHENTICATION ijcsit
 
Improvement of Security Systems by Keystroke Dynamics of Passwords
Improvement of Security Systems by Keystroke Dynamics of PasswordsImprovement of Security Systems by Keystroke Dynamics of Passwords
Improvement of Security Systems by Keystroke Dynamics of PasswordsIJCSIS Research Publications
 
Final Thesis Presentation
Final Thesis PresentationFinal Thesis Presentation
Final Thesis PresentationSajid Rasheed
 
Comparative Analysis of Hand Gesture Recognition Techniques
Comparative Analysis of Hand Gesture Recognition TechniquesComparative Analysis of Hand Gesture Recognition Techniques
Comparative Analysis of Hand Gesture Recognition TechniquesIJERA Editor
 
Signature Verification using DCT
Signature Verification using DCTSignature Verification using DCT
Signature Verification using DCTIRJET Journal
 
Portable and Efficient Fingerprint Authentication System Based on a Microcont...
Portable and Efficient Fingerprint Authentication System Based on a Microcont...Portable and Efficient Fingerprint Authentication System Based on a Microcont...
Portable and Efficient Fingerprint Authentication System Based on a Microcont...IJECEIAES
 
Pso based optimized security scheme for image authentication and tamper proofing
Pso based optimized security scheme for image authentication and tamper proofingPso based optimized security scheme for image authentication and tamper proofing
Pso based optimized security scheme for image authentication and tamper proofingcsandit
 
PSO BASED OPTIMIZED SECURITY SCHEME FOR IMAGE AUTHENTICATION AND TAMPER PROOFING
PSO BASED OPTIMIZED SECURITY SCHEME FOR IMAGE AUTHENTICATION AND TAMPER PROOFINGPSO BASED OPTIMIZED SECURITY SCHEME FOR IMAGE AUTHENTICATION AND TAMPER PROOFING
PSO BASED OPTIMIZED SECURITY SCHEME FOR IMAGE AUTHENTICATION AND TAMPER PROOFINGcscpconf
 
Artificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification SystemArtificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification SystemIRJET Journal
 

Similar to I010244853 (20)

Offline Handwritten Signature Verification using Neural Network
Offline Handwritten Signature Verification using Neural NetworkOffline Handwritten Signature Verification using Neural Network
Offline Handwritten Signature Verification using Neural Network
 
IRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNNIRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNN
 
Multimodal Biometrics at Feature Level Fusion using Texture Features
Multimodal Biometrics at Feature Level Fusion using Texture FeaturesMultimodal Biometrics at Feature Level Fusion using Texture Features
Multimodal Biometrics at Feature Level Fusion using Texture Features
 
An Enhanced Authentication System Using Face and Fingerprint Technologies
An Enhanced Authentication System Using Face and Fingerprint TechnologiesAn Enhanced Authentication System Using Face and Fingerprint Technologies
An Enhanced Authentication System Using Face and Fingerprint Technologies
 
M017637484
M017637484M017637484
M017637484
 
IRJET- Emotion recognition using Speech Signal: A Review
IRJET-  	  Emotion recognition using Speech Signal: A ReviewIRJET-  	  Emotion recognition using Speech Signal: A Review
IRJET- Emotion recognition using Speech Signal: A Review
 
Signature recognition
Signature recognitionSignature recognition
Signature recognition
 
1
11
1
 
Choudhary2015
Choudhary2015Choudhary2015
Choudhary2015
 
ADAPTIVE WATERMARKING TECHNIQUE FOR SPEECH SIGNAL AUTHENTICATION
ADAPTIVE WATERMARKING TECHNIQUE FOR SPEECH SIGNAL AUTHENTICATION ADAPTIVE WATERMARKING TECHNIQUE FOR SPEECH SIGNAL AUTHENTICATION
ADAPTIVE WATERMARKING TECHNIQUE FOR SPEECH SIGNAL AUTHENTICATION
 
Improvement of Security Systems by Keystroke Dynamics of Passwords
Improvement of Security Systems by Keystroke Dynamics of PasswordsImprovement of Security Systems by Keystroke Dynamics of Passwords
Improvement of Security Systems by Keystroke Dynamics of Passwords
 
Final Thesis Presentation
Final Thesis PresentationFinal Thesis Presentation
Final Thesis Presentation
 
A NEW CODING METHOD IN PATTERN RECOGNITION FINGERPRINT IMAGE USING VECTOR QUA...
A NEW CODING METHOD IN PATTERN RECOGNITION FINGERPRINT IMAGE USING VECTOR QUA...A NEW CODING METHOD IN PATTERN RECOGNITION FINGERPRINT IMAGE USING VECTOR QUA...
A NEW CODING METHOD IN PATTERN RECOGNITION FINGERPRINT IMAGE USING VECTOR QUA...
 
Comparative Analysis of Hand Gesture Recognition Techniques
Comparative Analysis of Hand Gesture Recognition TechniquesComparative Analysis of Hand Gesture Recognition Techniques
Comparative Analysis of Hand Gesture Recognition Techniques
 
Signature Verification using DCT
Signature Verification using DCTSignature Verification using DCT
Signature Verification using DCT
 
Portable and Efficient Fingerprint Authentication System Based on a Microcont...
Portable and Efficient Fingerprint Authentication System Based on a Microcont...Portable and Efficient Fingerprint Authentication System Based on a Microcont...
Portable and Efficient Fingerprint Authentication System Based on a Microcont...
 
Pso based optimized security scheme for image authentication and tamper proofing
Pso based optimized security scheme for image authentication and tamper proofingPso based optimized security scheme for image authentication and tamper proofing
Pso based optimized security scheme for image authentication and tamper proofing
 
PSO BASED OPTIMIZED SECURITY SCHEME FOR IMAGE AUTHENTICATION AND TAMPER PROOFING
PSO BASED OPTIMIZED SECURITY SCHEME FOR IMAGE AUTHENTICATION AND TAMPER PROOFINGPSO BASED OPTIMIZED SECURITY SCHEME FOR IMAGE AUTHENTICATION AND TAMPER PROOFING
PSO BASED OPTIMIZED SECURITY SCHEME FOR IMAGE AUTHENTICATION AND TAMPER PROOFING
 
Artificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification SystemArtificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification System
 
1834 1840
1834 18401834 1840
1834 1840
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Recently uploaded (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

I010244853

  • 1. IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 2, Ver. IV (Mar - Apr.2015), PP 48-53 www.iosrjournals.org DOI: 10.9790/2834-10244853 www.iosrjournals.org 48 | Page Online Signature Verification Using Vector Quantization and Hidden Markov Model Behrouz Vaseghi1 , Somayeh Hashemi2 1,2 (Department of Electrical Engineering ,Abhar Branch, Islamic Azad University, Abhar, Iran.) Abstract: In this paper an on-line signature verification system, using vector quantization and Hidden Markov Model (VQ-HMM) is presented. After the signature acquisition, a Chebichef filter is used for noise reduction, and size and phase normalization is performed using Fourier transform. Each signature is segmented and mean velocity, acceleration and pressure are used as extracted features. K-means clustering is used for generation a codebook and VQ generates a code word for each signature. These code words are used as observation vectors in training and recognition phase. HMM models are trained using Baum Welch algorithm. In the verification phase, the forward algorithm is used. The Threshold used in the verification phase is a function of the minimum probability in training phase. Equal Error Rate obtained from this system is 14%. Keywords: online signature verification, HMM, Vector Quantization, Baum Welch, K-means I. Introduction NOWADAYS, the society demands secure means for person authentication. traditional authentication methods are based on the knowledge (password, Personal Identification Number numbers) or on the possession of a token (Identificator card, keys), which can be forgotten or stolen. This fact places a lot of attention in biometrics as an alternative method for person authentication and identification. Biometrics is defined in [1] as the use of physiological or behavioral characteristics for person recognition, and hence, they are not affected by the disadvantages of the traditional authentication methods since they cannot be forgotten or stolen. Biometrics can be coarsely categorized into behavioral and physiological biometrics. Physiological biometrics are based on measurable physiological traits, such as fingerprints or the iris pattern. Behavioral biometrics are based on measurements extracted from an activity performed by the user, in a conscious or unconscious way, and they are inherent to his/her own personality or learned behavior, although influenced also by the physical characteristics of the person. in this sense, behavioral biometrics have some interesting advantages, like user acceptance and cancelability, but they still lack the same level of uniqueness as physiological biometrics. Among all the biometric traits that can be categorized as pure behavioral, the signature, and the way that we sign, is the one that has the widest social acceptance for identity authentication. On the basis of the signature acquisition method, signature recognition methods can be categorized into static (or offline) and dynamic (or online) methods [2]. Offline signature verification uses the shape of the signature to authenticate the signer. Online signature verification uses dynamic characteristics of the signature (time-dependent signals) to authenticate the signer. Learning the dynamics of the real signer is a difficult task for an impostor, compared to replicate only the shape of a signature. Moreover, the use of devices with built-in pen input such as smartphones, Personal Digital Assistants, or tablet PCs has been spread in the last years. These facts have motivated great research efforts in the last decade on dynamic or online signature verification, as reviewed in [3]. II. Signatures Database And Preprocessing 2.1 data collection By using a graphic tablet, a total of 500 genuine signatures were collected from a population of 50 human subjects including 25 men and 25 women that each of the men and women contributed 10 genuine signature samples. Additionally, 250 forgery signatures (5 forgery signatures for each person) were used for testing rejection capabilities of the system. All of these forgery signatures were “skilled forgeries”. In fact, the data acquisition procedure involves a signer and a forger. While the signer is seated and writes signatures, the forger is looking over the shoulder of the signer to capture both the image and the dynamic information of the written signature. 2.2 preprocessing After the signatures collected, a four-order Chebychev filter with cutoff frequency 20 hertz is used for noise reduction and size and phase normalization is performed using Fourier transform [4],[5]. Then each signature is segmented based on the points where 0yv , 0xv [6],[7] . After initial segmentation, in order to divide each person‟s signatures into the same number of segments, dominant number of segments for each
  • 2. Online Signature Verification Using Vector Quantization and Hidden Markov Model DOI: 10.9790/2834-10244853 www.iosrjournals.org 49 | Page signature is calculated and signatures with segments different from this number are redivided based on this number (figure 1). Fig.1 Result of signature segmentation III. Feature Extraction and Vector quantization 3.1 Feature Extraction The result of segmentation is a number of segments for each signature. Each segment is characterized by location of its most significant point in the signature, average velocity, average acceleration, average pressure, pressure variance and two angles of tangent lines to curve of segment in two segment end points (see Figure 2). Fig.2 Angle of tangent lines at two end points of a segment As described, signatures are captured using a pen tablet model Graphire2 Universal Serial Bus, branded by [6]. The tablet spatial resolution is 100 lines per millimeter. The precision is ±0.25 mm. The maximum detection height is 1 cm, and the sampling rate is 100 Hz. Time signals for each segment provided by the digitizer are as follows [8],[9],[10]: 1) Coordinate information: x and y. 2) Pressure: pr . 3) Angles: start , end Additional dynamic features are derived from these features. 1) Velocity 2222 )()( yx t y t x vvv      and logVelocity )0.1log(log vV  2) Acceleration t va   . 3) Tangential angle )(tan 1 x y v v  . 4) Curvature radius vcr t /)(    . 5) logPressure )0.1log(log prpr  .
  • 3. Online Signature Verification Using Vector Quantization and Hidden Markov Model DOI: 10.9790/2834-10244853 www.iosrjournals.org 50 | Page Therefore, eleven parameters are extracted on each segment of the signature. In this way, each signature is represented by a sequence of frames with aforementioned features. ]log,log,,,,,,.,,[ prvcravpryxp endstarti  3.2 Vector Quantization A set of feature vectors extracted ( },,,{ 21 npppP  ) from signature segments (frames) were gathered to generate a codebook. The K-means algorithm is used to segment this vector space into C-partitions represented by a set of cluster centers [11],[ 12]. After generating the codebook, a given feature vector ( iv ) is mapped into a membership vector ],...,,[ 21 iciii uuuU  . Thus, each signature, represented by a sequence of feature vectors extracted from signature frame, is now mapped into an observation sequence of membership vectors (instead of an observation sequence of single values in the case of conventional VQ/HMM). Therefore, the Baum Welch Re-estimation algorithm (in training phase) and Forward algorithm (in recognition phase) must be used to take into account this observation sequences. IV. Hidden Markov Model In this method, each signature class is modeled by a single HMM. A HMM, is defined by the following parameter: [12],[13](see figure 3)  The number of states (N) which is set for each class is proportional to the average numbers of frames in training samples in that class. The individual states are denoted as: },,,{ 21 NSSSS  (1) and the state at time t as tq .  The number of distinct observation symbols per state (M), which is set equal to 10 in this case. we denote the individual symbols as },,,{ 21 MvvvV  (2) Which are c cluster centers obtained by K- means clustering algorithm.  The state transition probability distribution: }{ ijaA  (3) That ]/[ 1 ittij sqqpa   Nji  ,1, (4) And 0ija )()( ijorijif  (5) The maximum number of forward jumps in each state (  ) is chosen experimentally to be between 2 and 4 for each class during training.  The observation symbol probability distribution : )}({ mbB j (6) That ]/[)( jtmj sqatvpmb  MmNj  1,1, (7)  The initial state distribution : }{ i Ni 1, (8) That       1,1 1,0 ][ i i sqp iii (9)
  • 4. Online Signature Verification Using Vector Quantization and Hidden Markov Model DOI: 10.9790/2834-10244853 www.iosrjournals.org 51 | Page  The last state distribution : }{ i Ni 1, (10) That       Ni Ni sqp iTi ,1 ,0 ][ (11)  The set of K observation sequences (training samples) for each signature class: },...,{ )()2()1( K OOOO  (12) That },...,{ )()2( 2 )1( 1 )( K T K K OOOO  (13) And )(K tO is the observation vector at frame t in the Kth training sample. Fig. 3. HMM structure and parameters In this way each signature in the test data set is represented as sequences of T observation and for each signature set, a separate left-right HMM is trained by these observations and Baum-Welch algorithm. The distributions  and  are not re-estimated since they are predefined in left-right HMM as show in equations (8-11). For each signer i, an HMM is trained using 7 genuine signatures of i. The number of states of each HMM model equals 0.9 times the number of segments that in segmentation step is computed for each signature in the training set. After training all of the HMMs by Baum-Welch algorithm the probability that o has been generated by signature model, ( 501),|(  hoP h ) ,was computed by forward algorithm as follows: Nj TtObai tob j k k tj N i ij k t k tjj K t                 1, 2) ,().( 1),.(. )( )( 1 )( 1 )(    (14) Similarly, the backward variable for given signature sample K is calculated as: Nj TtiOba Tt j K N i k t k tjji Kj k t                 1, 1,...,1,)()( , )( 1 )( 1 )( )(    (15) Finally the observation probability is calculated as: iTh K hK iOPP K K  .)()|( )( )( ,  (16)
  • 5. Online Signature Verification Using Vector Quantization and Hidden Markov Model DOI: 10.9790/2834-10244853 www.iosrjournals.org 52 | Page The Threshold used in the verification phase is a function of the minimum probability in training phase x trainthr pp   10 (17) That trainp was obtained from the train phase and x is a constant value for all signatures. V. Experimental results Two quantities can characterize the performance of a signature verification algorithm; False Rejection (FR), that is when a true signature is rejected, and False Acceptance (FA) that is when a forgery is accepted as true signature. Traditionally, the value of threshold is chosen such as to realize the Equal Error Rate (ERR). As mentioned earlier, an HMM is trained using 7 signatures for each person. All other signatures of this person and forgeries of his/her signature were used for testing purposes. In this work effects of Threshold that used in the verification phase, number of signatures in training phase, optimum selection of signatures for training the model and number of state in the model relative to the number of segments of the signature have been studied. In Figure 4, the FR/FA Error rate diagrams are shown for the system that uses 7 signatures of each person for training and all of remaining signatures for testing purpose. As shown in figure 4, when The Threshold is the function of the minimum probability in training phase ERR is reduced. Figure 5 shows the FR/FA Error rate diagrams for the system that uses 4 and 7 signatures of each person for training .In this case, we observed that when we use 7 signatures for training the model, reduced the verification error. In a third experiment, we tested the verification reliability based on the signature selection for training the model.in this case we observed that the optimum selection of signatures for training the model will reduce the verification error. Finally as shown in table 1, when we use Nstates= 0.9 Nsegments, the Equal Error Rate (ERR) of the system was 14%. (a) (b) Fig.4. FAR and FRR diagram: (a) Threshold is constant for all signatures and (b) threshold is a function of the minimum probability in training phase (a) (b) Fig.5. FAR and FRR diagram: (a) 4 signatures for train (b) 7 signatures for training
  • 6. Online Signature Verification Using Vector Quantization and Hidden Markov Model DOI: 10.9790/2834-10244853 www.iosrjournals.org 53 | Page (a) (b) Fig.5. FAR and FRR diagram: (a) random selection of signatures (b) optimum selection of signatures Table.1. Equal Error Rate (ERR) versos the a=Nstate/Nseg a 0.3 0.4 0.5 0.6 0.7 0.8 0.9 EER 19% 19% 0.19% 0.17% 0.17% 0.16% 0.14% x 27 28 29 29 30 31 32 VI. Conclusion The purpose of this paper is to design an automatic on-line signature verification system, using Vector Quantization and Hidden Markov Model (VQ-HMM). We have used a graphic tablet for signature acquisition. Our database contains 500 authentic signatures and 250 forgeries, signed by 50 persons. A Chebichef filter is used for noise reduction, and size and phase normalization is performed using Fourier transform. Each signature is segmented based on the points where 0yv , 0xv . After initial segmentation, in order to divide each person‟s signatures into the same number of segments, dominant number of segments for each signature is calculated and signatures with segments different from this number are redivided based on this number. Mean velocity, acceleration and pressure are used as extracted features. K-means clustering is used for generation a codebook and VQ generates a code word for each signature. These code words are used as observation vectors in training and recognition phase. HMM models are trained using Baum Welch algorithm. In the verification phase, the forward algorithm is used. The Threshold used in the verification phase is a function of the minimum probability in training phase. Equal Error Rate obtained from this system is 14%. We observed that the optimum selection of signatures for training the model, calculating the verification threshold as a function of the training probability and increasing the number of states will reduce the verification error. Acknowledgements This work has been supported by the Islamic Azad University, Abhar Branch, Abhar-Iran References [1]. N. K. Ratha, A. W. Senior, and R. M. Bolle, “Automated biometrics,” in Proc. 2nd Int. Conf. Adv. Pattern Recog., Rio de Janeiro, Brazil, Mar. 2001, pp. 445–474. [2]. B.Vaseghi , S.Hashemi „Offline signatures Recognition system using Discrete Cosine Transform‟ Australian Journal of Basic and Applied Sciences, 6(12): 423-428, 2012 ISSN 1991-8178 [3]. P.O. D. Impedovo and G. Pirlo, “Automatic signature verification: The state of the art,” IEEE Trans. Syst., Man, Cybern. C, Appl. Rev., vol. 38, no. 5,pp. 609–635, Sep. 2008. [4]. F. D. Griess, K. Jain, “Online signature verification”, Project Report, Michigan State University, department of computer science [5]. D.S. R. Plamondon, G. Lorette, “Automatic signature verification and writer identification – the state of the art”, Pattern Recognition Journal, vol. 22, no. 2, pp. 107-131, 1989. [6]. R. S. Kashi, W. L. Nelson, “Online handwritten signature verification using hidden markov model features”, Proceeding of 4thInter. conf. on document analysis and recognition, pp. 253-257, 1997. [7]. L. R. Rabiner, “A tutorial on hidden markov models and selected applications in speech recognition”, Proceedings of IEEE, vol. 77, no.2, pp. 257-286, February 1989. [8]. J. Fiérrez-Aguilar, J. Ortega-Garcia, and J. Gonzalez-Rodriguez, “Target dependent score normalization techniques and their application to signature verification,” IEEE Trans. Syst., Man, Cybern. C, Appl. Rev., vol. 35, no. 3, pp. 418–425, Aug. 2005. [9]. J. Ortega-Garcia, J. Fiérrez-Aguilar, J. Martin-Rello, and J. Gonzalez-Rodriguez, “Complete signal modeling and score normalization for function-based dynamic signature verification,” in Proc. 4th Int. Conf. Audio Video-Based Biometrie Person Authentication, Guildford, U.K., Jun. 2003, pp. 658–667. [10]. B. L. Van, S. Garcia-Salicetti, and B. Dorizzi, “Fusion of HMMs likelihood and Viterbi path for on-line signature verification,” in Proc. Eur. Conf. Comput. Vis., Prague, Czech Republic, May 2004, pp. 318–331. [11]. E. Justino, A. Yacoubi, R. Sabourin and F. Bortolozzi. 2000“An off-line signature verification system using HMM and graphometric features”, Proc. of the 4th International Workshop on Document Analysis Systems, pp. 211-222. [12]. A.K. Jain, M.N. Murty, andP.J. Flynn, “Data Clustering: A Review”, ACM Computing Surveys, Vol. 31, No. 3, September 1999. [13]. Vaseghi.B., Alirezaee.Sh., "Off-line Farsi/Arabic Handwritten word recognition using vectorquantization and hidden markov model," Proceedings of the 12th IEEE International Multitopic Conference, 978-1-4244-2824-3/08/$25.00