SlideShare a Scribd company logo
1 of 4
Download to read offline
IOSR Journal of Mechanical and Civil Engineering (IOSR-JMCE)
e-ISSN: 2278-1684,p-ISSN: 2320-334X, Volume 12, Issue 6 Ver. IV (Nov. - Dec. 2015), PP 79-82
www.iosrjournals.org
DOI: 10.9790/1684-12647982 www.iosrjournals.org 79 | Page
A Simple Signature Recognition System
Suvarnsing G. Bhable
Research Student Dept. of CS & IT Dr. B.A.M.University, Aurangabad
Abstract: The signature of a person is an important biometric characteristic of a human being which can be
used to verify human identity. Signature verification is an important research area in the field of authentication
of a person as well as documents in e-commerce and banking. Signatures are verified based on features
extracted from the signature using Invariant Central Moment and Modified Zernike moment for its invariant
feature extraction because the signatures are Hampered by the large amount of variation in size, translation
and rotation and shearing parameter. This signature recognition system is designed using MATLAB. This work
has been tested and found suitable for its purpose.
Keywords: Biometrics, Hidden Markov models (HMM), Normalized area of signature, Off-line Signature
Recognition, OCR
I. Introduction
Biometrics is technologies used for measuring and analysing a person's unique characteristics. There
are two types of biometrics: behavioral and physical. Behavioral biometrics are generally used for verification
while physical biometrics can be used for either identification or verification. Among the different forms of
biometric recognition systems such as fingerprint, iris, DNA, face, voice, vein structure palm etc.,In our society,
traditional and accepted means for a person to identify and authenticate himself either to another human being or
to a computer system is based on one or more of these three (3) general principles:
 What the person knows
 What he possesses
 What he is
The signature recognition & verification system shown in Fig. 1 is broadly divided into three subparts
a) Preprocessing,
b) Feature extraction,
c) Recognition & Verification.
The input signature is captured from the scanner or digital high pixel camera which provides the output
image in term of BMP Color image. The preprocessing algorithm provides the required data suitable for the
final processing. In the feature extraction phase the invariant central moment and Zernike moment are used to
extract the feature for the classification purpose. In classification the Back propagation Neural Network is used
to provide high accuracy and less computational complexity in training and testing phase of the system.
Fig.1: Flow Diagram of SRS (Signature Recognition System)
A Simple Signature Recognition System
DOI: 10.9790/1684-12647982 www.iosrjournals.org 80 | Page
II. Classification
Major techniques used for offline signature verification system are based on Template Matching,
Statistical Approach, Structural Analysis Approach, Spectrum Analysis Approach, Neural Network Approach
[1]
 Template Matching Approach – The template matching is the simplest and earliest but rigid
approach to pattern recognition in which instances of pre-stored patterns are sought in an image. It is
performed at the pixel level and also on higher level. This approach has a number of disadvantages due
to its rigidity. It may fail if the patterns are distorted due to the imaging process, viewpoint change etc
as in the case of signatures. It can detect casual forgeries from genuine signatures But cant verify
between the genuine signature and skilled ones. The template matching method can be categorized into
several forms such as graphics matching, stroke analysis and geometric feature extraction, depending
on different features.
 Statistical Approach – In this approach, each pattern
is represented in terms of features and is viewed as a
point in a d-dimensional space. Each pattern vector
belonging to different categories occupy compact and disjoint regions in a d-dimensional feature space.
Decision boundaries are set in feature space to separate different classes. The effectiveness of the
feature set is determined by how well patterns from different classes can be separated. Hidden Markov
Model (HMM), Bayesian these are some statistical approach commonly used in pattern recognition.
They can detect causal forgeries as well as skilled and traced forgeries from the genuine ones.
 Structural Approach - It is related to graph, string and tree matching techniques and is used in
combination with other techniques. It shows good performance detecting genuine signatures and
forgeries. Its major disadvantage is that it uses large dataset for greater accuracy.
 Spectrum Analysis Approach- In this method the first stage of the procedure is the transformation of
the data into another matrix which is a version of the trajectory matrix in Spectrum Analysis. Than a
square window is placed in all possible places of image.[2] It basically decomposes a curvature-based
signature into a multi-resolution format. This approach is used for long scripted signatures
 Neural Network Approach- The main characteristics of neural networks are that they have the ability
to learn complex nonlinear input-output relationships, use sequential training procedures, and adapt
themselves to the data. The most commonly used family of neural networks for pattern classification
tasks is the feed-forward network, which includes multilayer perceptron, Radial-Basis Function (RBF)
networks Self-Organizing Map (SOM), or Kohonen- Network.
III. Database
For training and testing of the signature recognition and verification system 500 signatures are used.
The signatures were taken from 50 persons. The templates of the signature as shown in Fig.2 for training the
system 50 person’s signatures are used. Each of these persons signed 8 original signature and The input
signature is captured from the scanner or digital high pixel camera which provides the output image in term of
BMP Colour image. The preprocessing algorithm provides the required data suitable for the final processing. In
the feature extraction phase the invariant central moment and Zernike moment are used to extract the feature for
the classification purpose. In classification the Back propagation Neural Network is used to provide high
accuracy and less computational complexity in training and testing phase of the system.
Signed 4 forgery signatures in the training set the total number of signatures is 500 (10 x 50) are used.
In order to make the system robust, signers were asked to use as much as variation in their signature size and
shape and the signatures are collected at different times without seeing other signatures they signed before.
For testing the system, another 100 genuine signatures and 100 forgery signatures are taken from the same 50
persons in the training set.
IV. Preprocessing
Signature verification system is pre-processing. The need of pre-processing is explained through
system. It can be clearly seen that while scanning a signature on white paper, residues are also scanned. This
increases in fuzziness of the pattern. Thus, in the first step such scanning noise must be eliminated. We perform
this by first converting the image to gray scale image. We then convert the image to binary image with a
threshold. This results in particularly clear signature pattern as seen in system. Considering that the signature is
scanned against a white background, it can be present at any side of the paper or it can be centralized.
Considering this whole image as a sample will lead to improper statistics. Hence ROI of the signature must be
A Simple Signature Recognition System
DOI: 10.9790/1684-12647982 www.iosrjournals.org 81 | Page
extracted first. Many literatures have proposed signature ROI detection using simple bounding box which is
demonstrated in system. This involves two steps: First inverting the signature so that background becomes black
and foreground is white and then obtaining a bounding box. However this traditional solution is many
limitations when it comes to detecting discontinues signature as shown in that system.
This problem is overcome by first dilating input signature with a structuring element of size 16x16 and
then applying the bounding box over it. The bounding box region is then annotated over non dilated image to
extract the exact region. Results are shown in system.
Process of binary conversion also results in disconnected lines due to conversion error. This is
overcome by first dilating and then eroding the binary image.
V. Feature Extraction
Emphasis of the proposed work is in detecting shape or boundary features. Features can be applied on
binary image or thin image or edges. We performed a test to analyse the dominance of features in all three
scenarios.
Figure 6 reveals that radon features are natural to shapes. Thus descriptors are dominant in same
dimension for both normal as well as edge detected images. However number of dominant features is low in
both cases. In order to obtain better descriptors we applied thinning with a structuring of kernel 2x2. Results are
presented in Figure 7.
Place Tables/Figures/Images in text as close to the reference as possible. It may extend across both
columns to a maximum width of 17.78 cm (7”).
Captions should be Times New Roman 9-point bold. They should be numbered, please note that the
word for Table and Figure are spelled out. Figure’s captions should be centered beneath the image or picture,
and Table captions should be centered above the table body.
Therefore it is proved that region of interest extraction must be followed by thinning process to extract
good descriptor in signature verification system. Size is another important aspect of signatures. Local feature
extraction techniques like Grid/Zone based features extractors demand that all the images be of same size. To
study the effect of resizing, we performed feature extraction from resized ROI and without resizing. It can be
clearly seen from that resizing induces interpolation losses. Hence feature descriptor changes. This leads to
misclassification and results in low accuracy. To avoid this problem descriptor must be used on the actual image
rather than resized image. However actual image size will vary from one signature to the other. Thus number of
descriptors will also vary. One of the prerequisite for any classification is that feature dimensions must be same.
Therefore it is wise to extract projection on different angles and extract statistics from them. It can be clearly
seen that the transform descriptors varies as angle of projection varies. It is quite difficult to claim the actual
projections that would result in optimized feature set. Hence we obtain Radon descriptors for 0' to 360' in steps
of 15' and extract mean and standard deviation for each projection as our Radon feature set. Once Radon
transform is extracted, we obtain Zernike moments before classifying or adding the features to database. Zernike
like Radon is a shift invariant moments obtained from polar projection of image. Zernike moments are complex.
Therefore real components from the moments are extracted as feature descriptor. Another major limitation of
using Zernike moment is that the exponent of the dimension increases as number of moments is increased. But
for modelling with HMM, dimensions must be normalized to single value domain. Hence after obtaining
Zernike moments we normalize each dimension by dividing it with the highest exponent of that dimension. Thus
all the feature values are brought in same value domain. Overall methodology is explained with a block diagram
VI. Conclusion
Signature verification and analysis are part of larger domain of work which finds application in
graphology and forensic science. In this work we have presented a Novel technique of Signature Verification by
combining Zernike moments with Radon transform values at different angle of projection from the user's
Signature pattern and then forming a statistical state machine with HMM and PLSR. Further the technique was
improved by the aid of kernel based techniques with the Help of SVM. It gives the poor performance for
signature that is not in the training phase. Generally the failure to recognize/verify a signature was due to poor
image quality and high similarity between 2 signatures. Recognition and verification ability of the system can be
increased by using additional features in the input data set.
References
[1]. M. J. Alhaddad, D. Mohamad and A. M. Ahsan, “Online Signature Verification Using Probablistic Modeling and Neural Network”,
IEEE, (2012)
[2]. S. Srivastava and S. Agarwal, “Offline signature verification using grid based feature extraction”, IEEE, (2011)
[3]. J. Coetzer, B. M. Herbst and J. A. du Preez, “Offline Signature Verification Using the Discrete Radon Transform and a Hidden
Markov Model”, EURASIP Journal on Applied Signal Processing, (2004)
[4]. Sangramsing Kayte, Suvarnsing G.Bhable and Jaypalsing Kayte, ―A Review Paper on Multimodal Biometrics System using
Fingerprint and Signature‖. IJCA Volume 128 – No.15, October 2015.
A Simple Signature Recognition System
DOI: 10.9790/1684-12647982 www.iosrjournals.org 82 | Page
[5]. Ashwini Pansare, Shalini Bhatia,Handwritten Signature Verification using Neural Network, International Journal of Applied
Information Systems (IJAIS) – ISSN : 2249-0868 Foundation of Computer Science FCS, New York, USA Volume 1– No.2,
January 2012
[6]. O.C Abikoye, M.A MabayojeR. Ajibade “Offline Signature Recognition & Verification using Neural Network” International
Journal of Computer Applications (0975 – 8887) Volume 35– No.2, December 2011
[7]. Ozgunduz, E., Karsligil, E., and Senturk, T. 2005.Off-line Signature Verification and Recognition by Support Vector Machine.
Paper presented at the European Signal processing Conference.
[8]. Jain, A., Griess, F., and Connel1, S. “Online Signature Recognition”, Pattern Recognition, vol.35,2002, pp 2963-2972.
[9]. Shashi Kumar D R, K B Raja, R. K Chhotaray, Sabyasachi Pattanaik, Off-line Signature Verification Based on Fusion of Grid and
Global Features Using Neural Networks , International Journal of Engineering Science and Technology Vol. 2(12), 2010, 7035-
7044
[10]. Julio Martínez-R.,Rogelio Alcántara-S.,On-line signature verification based on optimal feature representation and neural network-
driven fuzzy reasoning
[11]. ICAO, Development of a Logical Data Structure – LDS for Optional Capacity Expansion Technologies, International Civil Aviation
Organisation, Tech. Rep., Machine Readable Travel Documents, Revision 1.7, 2004.

More Related Content

What's hot

A design of license plate recognition system using convolutional neural network
A design of license plate recognition system using convolutional neural networkA design of license plate recognition system using convolutional neural network
A design of license plate recognition system using convolutional neural networkIJECEIAES
 
IRJET- Optical Character Recognition using Image Processing
IRJET-  	  Optical Character Recognition using Image ProcessingIRJET-  	  Optical Character Recognition using Image Processing
IRJET- Optical Character Recognition using Image ProcessingIRJET Journal
 
Automatic digital terrain modelling
Automatic digital terrain modellingAutomatic digital terrain modelling
Automatic digital terrain modellingSumant Diwakar
 
IRJET - A Detailed Review of Different Handwriting Recognition Methods
IRJET -  	  A Detailed Review of Different Handwriting Recognition MethodsIRJET -  	  A Detailed Review of Different Handwriting Recognition Methods
IRJET - A Detailed Review of Different Handwriting Recognition MethodsIRJET Journal
 
A Review of Optical Character Recognition System for Recognition of Printed Text
A Review of Optical Character Recognition System for Recognition of Printed TextA Review of Optical Character Recognition System for Recognition of Printed Text
A Review of Optical Character Recognition System for Recognition of Printed Textiosrjce
 
Free-scale Magnification for Single-Pixel-Width Alphabetic Typeface Characters
Free-scale Magnification for Single-Pixel-Width Alphabetic Typeface CharactersFree-scale Magnification for Single-Pixel-Width Alphabetic Typeface Characters
Free-scale Magnification for Single-Pixel-Width Alphabetic Typeface Charactersinventionjournals
 
Bangla Optical Digits Recognition using Edge Detection Method
Bangla Optical Digits Recognition using Edge Detection MethodBangla Optical Digits Recognition using Edge Detection Method
Bangla Optical Digits Recognition using Edge Detection MethodIOSR Journals
 
Recognition Technology for Four Arithmetic Operations
Recognition Technology for Four Arithmetic OperationsRecognition Technology for Four Arithmetic Operations
Recognition Technology for Four Arithmetic OperationsTELKOMNIKA JOURNAL
 
Fingerprint Image Compression using Sparse Representation and Enhancement wit...
Fingerprint Image Compression using Sparse Representation and Enhancement wit...Fingerprint Image Compression using Sparse Representation and Enhancement wit...
Fingerprint Image Compression using Sparse Representation and Enhancement wit...Editor IJCATR
 
Image to text Converter
Image to text ConverterImage to text Converter
Image to text ConverterDhiraj Raj
 
IRJET- Object Detection using Hausdorff Distance
IRJET-  	  Object Detection using Hausdorff DistanceIRJET-  	  Object Detection using Hausdorff Distance
IRJET- Object Detection using Hausdorff DistanceIRJET Journal
 
PERFORMANCE EVALUATION OF JPEG IMAGE COMPRESSION USING SYMBOL REDUCTION TECHN...
PERFORMANCE EVALUATION OF JPEG IMAGE COMPRESSION USING SYMBOL REDUCTION TECHN...PERFORMANCE EVALUATION OF JPEG IMAGE COMPRESSION USING SYMBOL REDUCTION TECHN...
PERFORMANCE EVALUATION OF JPEG IMAGE COMPRESSION USING SYMBOL REDUCTION TECHN...cscpconf
 
Number Plate Recognition of Still Images in Vehicular Parking System
Number Plate Recognition of Still Images in Vehicular Parking SystemNumber Plate Recognition of Still Images in Vehicular Parking System
Number Plate Recognition of Still Images in Vehicular Parking SystemIRJET Journal
 
Selection of intra prediction modes for intra frame
Selection of intra prediction modes for intra frameSelection of intra prediction modes for intra frame
Selection of intra prediction modes for intra frameeSAT Publishing House
 

What's hot (19)

A design of license plate recognition system using convolutional neural network
A design of license plate recognition system using convolutional neural networkA design of license plate recognition system using convolutional neural network
A design of license plate recognition system using convolutional neural network
 
IRJET- Optical Character Recognition using Image Processing
IRJET-  	  Optical Character Recognition using Image ProcessingIRJET-  	  Optical Character Recognition using Image Processing
IRJET- Optical Character Recognition using Image Processing
 
Automatic digital terrain modelling
Automatic digital terrain modellingAutomatic digital terrain modelling
Automatic digital terrain modelling
 
IRJET - A Detailed Review of Different Handwriting Recognition Methods
IRJET -  	  A Detailed Review of Different Handwriting Recognition MethodsIRJET -  	  A Detailed Review of Different Handwriting Recognition Methods
IRJET - A Detailed Review of Different Handwriting Recognition Methods
 
A Review of Optical Character Recognition System for Recognition of Printed Text
A Review of Optical Character Recognition System for Recognition of Printed TextA Review of Optical Character Recognition System for Recognition of Printed Text
A Review of Optical Character Recognition System for Recognition of Printed Text
 
Choudhary2015
Choudhary2015Choudhary2015
Choudhary2015
 
Free-scale Magnification for Single-Pixel-Width Alphabetic Typeface Characters
Free-scale Magnification for Single-Pixel-Width Alphabetic Typeface CharactersFree-scale Magnification for Single-Pixel-Width Alphabetic Typeface Characters
Free-scale Magnification for Single-Pixel-Width Alphabetic Typeface Characters
 
Bangla Optical Digits Recognition using Edge Detection Method
Bangla Optical Digits Recognition using Edge Detection MethodBangla Optical Digits Recognition using Edge Detection Method
Bangla Optical Digits Recognition using Edge Detection Method
 
Recognition Technology for Four Arithmetic Operations
Recognition Technology for Four Arithmetic OperationsRecognition Technology for Four Arithmetic Operations
Recognition Technology for Four Arithmetic Operations
 
M1803016973
M1803016973M1803016973
M1803016973
 
Fingerprint Image Compression using Sparse Representation and Enhancement wit...
Fingerprint Image Compression using Sparse Representation and Enhancement wit...Fingerprint Image Compression using Sparse Representation and Enhancement wit...
Fingerprint Image Compression using Sparse Representation and Enhancement wit...
 
Ijetcas14 337
Ijetcas14 337Ijetcas14 337
Ijetcas14 337
 
Image to text Converter
Image to text ConverterImage to text Converter
Image to text Converter
 
IRJET- Object Detection using Hausdorff Distance
IRJET-  	  Object Detection using Hausdorff DistanceIRJET-  	  Object Detection using Hausdorff Distance
IRJET- Object Detection using Hausdorff Distance
 
K1803015864
K1803015864K1803015864
K1803015864
 
G011134454
G011134454G011134454
G011134454
 
PERFORMANCE EVALUATION OF JPEG IMAGE COMPRESSION USING SYMBOL REDUCTION TECHN...
PERFORMANCE EVALUATION OF JPEG IMAGE COMPRESSION USING SYMBOL REDUCTION TECHN...PERFORMANCE EVALUATION OF JPEG IMAGE COMPRESSION USING SYMBOL REDUCTION TECHN...
PERFORMANCE EVALUATION OF JPEG IMAGE COMPRESSION USING SYMBOL REDUCTION TECHN...
 
Number Plate Recognition of Still Images in Vehicular Parking System
Number Plate Recognition of Still Images in Vehicular Parking SystemNumber Plate Recognition of Still Images in Vehicular Parking System
Number Plate Recognition of Still Images in Vehicular Parking System
 
Selection of intra prediction modes for intra frame
Selection of intra prediction modes for intra frameSelection of intra prediction modes for intra frame
Selection of intra prediction modes for intra frame
 

Viewers also liked

Count based Secured Hash Algorithm.
Count based Secured Hash Algorithm.Count based Secured Hash Algorithm.
Count based Secured Hash Algorithm.IOSR Journals
 
Architecture and Evaluation on Cooperative Caching In Wireless P2P
Architecture and Evaluation on Cooperative Caching In Wireless  P2PArchitecture and Evaluation on Cooperative Caching In Wireless  P2P
Architecture and Evaluation on Cooperative Caching In Wireless P2PIOSR Journals
 
Performance Analysis of Positive Output Super-Lift Re-Lift Luo Converter With...
Performance Analysis of Positive Output Super-Lift Re-Lift Luo Converter With...Performance Analysis of Positive Output Super-Lift Re-Lift Luo Converter With...
Performance Analysis of Positive Output Super-Lift Re-Lift Luo Converter With...IOSR Journals
 
Optimal Operation of Wind-thermal generation using differential evolution
Optimal Operation of Wind-thermal generation using differential evolutionOptimal Operation of Wind-thermal generation using differential evolution
Optimal Operation of Wind-thermal generation using differential evolutionIOSR Journals
 
Handoff Management protocols MIPV6 and HMIPV6 Comparative analysis in 4G wire...
Handoff Management protocols MIPV6 and HMIPV6 Comparative analysis in 4G wire...Handoff Management protocols MIPV6 and HMIPV6 Comparative analysis in 4G wire...
Handoff Management protocols MIPV6 and HMIPV6 Comparative analysis in 4G wire...IOSR Journals
 
Optimal Placement of TCSC and SVC Using PSO
Optimal Placement of TCSC and SVC Using PSOOptimal Placement of TCSC and SVC Using PSO
Optimal Placement of TCSC and SVC Using PSOIOSR Journals
 
Design and Simulation of MEMS Based Gyroscope
Design and Simulation of MEMS Based GyroscopeDesign and Simulation of MEMS Based Gyroscope
Design and Simulation of MEMS Based GyroscopeIOSR Journals
 
The effect of Encryption algorithms Delay on TCP Traffic over data networks
The effect of Encryption algorithms Delay on TCP Traffic over data networksThe effect of Encryption algorithms Delay on TCP Traffic over data networks
The effect of Encryption algorithms Delay on TCP Traffic over data networksIOSR Journals
 
Wireless Sensor Grids Energy Efficiency Enrichment Using Quorum Techniques
Wireless Sensor Grids Energy Efficiency Enrichment Using Quorum TechniquesWireless Sensor Grids Energy Efficiency Enrichment Using Quorum Techniques
Wireless Sensor Grids Energy Efficiency Enrichment Using Quorum TechniquesIOSR Journals
 
EDGE Detection Filter for Gray Image and Observing Performances
EDGE Detection Filter for Gray Image and Observing PerformancesEDGE Detection Filter for Gray Image and Observing Performances
EDGE Detection Filter for Gray Image and Observing PerformancesIOSR Journals
 

Viewers also liked (20)

D010131824
D010131824D010131824
D010131824
 
A010620104
A010620104A010620104
A010620104
 
Count based Secured Hash Algorithm.
Count based Secured Hash Algorithm.Count based Secured Hash Algorithm.
Count based Secured Hash Algorithm.
 
Architecture and Evaluation on Cooperative Caching In Wireless P2P
Architecture and Evaluation on Cooperative Caching In Wireless  P2PArchitecture and Evaluation on Cooperative Caching In Wireless  P2P
Architecture and Evaluation on Cooperative Caching In Wireless P2P
 
Performance Analysis of Positive Output Super-Lift Re-Lift Luo Converter With...
Performance Analysis of Positive Output Super-Lift Re-Lift Luo Converter With...Performance Analysis of Positive Output Super-Lift Re-Lift Luo Converter With...
Performance Analysis of Positive Output Super-Lift Re-Lift Luo Converter With...
 
Optimal Operation of Wind-thermal generation using differential evolution
Optimal Operation of Wind-thermal generation using differential evolutionOptimal Operation of Wind-thermal generation using differential evolution
Optimal Operation of Wind-thermal generation using differential evolution
 
Handoff Management protocols MIPV6 and HMIPV6 Comparative analysis in 4G wire...
Handoff Management protocols MIPV6 and HMIPV6 Comparative analysis in 4G wire...Handoff Management protocols MIPV6 and HMIPV6 Comparative analysis in 4G wire...
Handoff Management protocols MIPV6 and HMIPV6 Comparative analysis in 4G wire...
 
N010128790
N010128790N010128790
N010128790
 
Optimal Placement of TCSC and SVC Using PSO
Optimal Placement of TCSC and SVC Using PSOOptimal Placement of TCSC and SVC Using PSO
Optimal Placement of TCSC and SVC Using PSO
 
Design and Simulation of MEMS Based Gyroscope
Design and Simulation of MEMS Based GyroscopeDesign and Simulation of MEMS Based Gyroscope
Design and Simulation of MEMS Based Gyroscope
 
I010246467
I010246467I010246467
I010246467
 
Q130303117128
Q130303117128Q130303117128
Q130303117128
 
I1303056370
I1303056370I1303056370
I1303056370
 
The effect of Encryption algorithms Delay on TCP Traffic over data networks
The effect of Encryption algorithms Delay on TCP Traffic over data networksThe effect of Encryption algorithms Delay on TCP Traffic over data networks
The effect of Encryption algorithms Delay on TCP Traffic over data networks
 
Wireless Sensor Grids Energy Efficiency Enrichment Using Quorum Techniques
Wireless Sensor Grids Energy Efficiency Enrichment Using Quorum TechniquesWireless Sensor Grids Energy Efficiency Enrichment Using Quorum Techniques
Wireless Sensor Grids Energy Efficiency Enrichment Using Quorum Techniques
 
E0152531
E0152531E0152531
E0152531
 
EDGE Detection Filter for Gray Image and Observing Performances
EDGE Detection Filter for Gray Image and Observing PerformancesEDGE Detection Filter for Gray Image and Observing Performances
EDGE Detection Filter for Gray Image and Observing Performances
 
D012222333
D012222333D012222333
D012222333
 
B013150813
B013150813B013150813
B013150813
 
N0102196100
N0102196100N0102196100
N0102196100
 

Similar to K012647982

International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...
­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...
­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...IRJET Journal
 
Tracking number plate from vehicle using
Tracking number plate from vehicle usingTracking number plate from vehicle using
Tracking number plate from vehicle usingijfcstjournal
 
Iaetsd an efficient way of detecting a numbers in car
Iaetsd an efficient way of detecting a numbers in carIaetsd an efficient way of detecting a numbers in car
Iaetsd an efficient way of detecting a numbers in carIaetsd Iaetsd
 
License Plate Recognition using Morphological Operation.
License Plate Recognition using Morphological Operation. License Plate Recognition using Morphological Operation.
License Plate Recognition using Morphological Operation. Amitava Choudhury
 
Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...eSAT Publishing House
 
Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...ijfcstjournal
 
Two Methods for Recognition of Hand Written Farsi Characters
Two Methods for Recognition of Hand Written Farsi CharactersTwo Methods for Recognition of Hand Written Farsi Characters
Two Methods for Recognition of Hand Written Farsi CharactersCSCJournals
 
14 offline signature verification based on euclidean distance using support v...
14 offline signature verification based on euclidean distance using support v...14 offline signature verification based on euclidean distance using support v...
14 offline signature verification based on euclidean distance using support v...INFOGAIN PUBLICATION
 
Mobile Based Application to Scan the Number Plate and To Verify the Owner Det...
Mobile Based Application to Scan the Number Plate and To Verify the Owner Det...Mobile Based Application to Scan the Number Plate and To Verify the Owner Det...
Mobile Based Application to Scan the Number Plate and To Verify the Owner Det...inventionjournals
 
Offline signatures matching using haar wavelet subbands
Offline signatures matching using haar wavelet subbandsOffline signatures matching using haar wavelet subbands
Offline signatures matching using haar wavelet subbandsTELKOMNIKA JOURNAL
 
Finding similarities between structured documents as a crucial stage for gene...
Finding similarities between structured documents as a crucial stage for gene...Finding similarities between structured documents as a crucial stage for gene...
Finding similarities between structured documents as a crucial stage for gene...Alexander Decker
 
Reconstructing the Path of the Object based on Time and Date OCR in Surveilla...
Reconstructing the Path of the Object based on Time and Date OCR in Surveilla...Reconstructing the Path of the Object based on Time and Date OCR in Surveilla...
Reconstructing the Path of the Object based on Time and Date OCR in Surveilla...ijtsrd
 
A Novel Framework For Numerical Character Recognition With Zoning Distance Fe...
A Novel Framework For Numerical Character Recognition With Zoning Distance Fe...A Novel Framework For Numerical Character Recognition With Zoning Distance Fe...
A Novel Framework For Numerical Character Recognition With Zoning Distance Fe...IJERD Editor
 
IRJET - Object Detection using Hausdorff Distance
IRJET -  	  Object Detection using Hausdorff DistanceIRJET -  	  Object Detection using Hausdorff Distance
IRJET - Object Detection using Hausdorff DistanceIRJET Journal
 
Paper id 25201447
Paper id 25201447Paper id 25201447
Paper id 25201447IJRAT
 
Traffic Sign Recognition using CNNs
Traffic Sign Recognition using CNNsTraffic Sign Recognition using CNNs
Traffic Sign Recognition using CNNsIRJET Journal
 

Similar to K012647982 (20)

Assignment-1-NF.docx
Assignment-1-NF.docxAssignment-1-NF.docx
Assignment-1-NF.docx
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...
­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...
­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...
 
Artificial Neural Network Based Offline Signature Recognition System Using Lo...
Artificial Neural Network Based Offline Signature Recognition System Using Lo...Artificial Neural Network Based Offline Signature Recognition System Using Lo...
Artificial Neural Network Based Offline Signature Recognition System Using Lo...
 
Tracking number plate from vehicle using
Tracking number plate from vehicle usingTracking number plate from vehicle using
Tracking number plate from vehicle using
 
Offline Signature Verification and Recognition using Neural Network
Offline Signature Verification and Recognition using Neural NetworkOffline Signature Verification and Recognition using Neural Network
Offline Signature Verification and Recognition using Neural Network
 
Iaetsd an efficient way of detecting a numbers in car
Iaetsd an efficient way of detecting a numbers in carIaetsd an efficient way of detecting a numbers in car
Iaetsd an efficient way of detecting a numbers in car
 
License Plate Recognition using Morphological Operation.
License Plate Recognition using Morphological Operation. License Plate Recognition using Morphological Operation.
License Plate Recognition using Morphological Operation.
 
Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...
 
Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...
 
Two Methods for Recognition of Hand Written Farsi Characters
Two Methods for Recognition of Hand Written Farsi CharactersTwo Methods for Recognition of Hand Written Farsi Characters
Two Methods for Recognition of Hand Written Farsi Characters
 
14 offline signature verification based on euclidean distance using support v...
14 offline signature verification based on euclidean distance using support v...14 offline signature verification based on euclidean distance using support v...
14 offline signature verification based on euclidean distance using support v...
 
Mobile Based Application to Scan the Number Plate and To Verify the Owner Det...
Mobile Based Application to Scan the Number Plate and To Verify the Owner Det...Mobile Based Application to Scan the Number Plate and To Verify the Owner Det...
Mobile Based Application to Scan the Number Plate and To Verify the Owner Det...
 
Offline signatures matching using haar wavelet subbands
Offline signatures matching using haar wavelet subbandsOffline signatures matching using haar wavelet subbands
Offline signatures matching using haar wavelet subbands
 
Finding similarities between structured documents as a crucial stage for gene...
Finding similarities between structured documents as a crucial stage for gene...Finding similarities between structured documents as a crucial stage for gene...
Finding similarities between structured documents as a crucial stage for gene...
 
Reconstructing the Path of the Object based on Time and Date OCR in Surveilla...
Reconstructing the Path of the Object based on Time and Date OCR in Surveilla...Reconstructing the Path of the Object based on Time and Date OCR in Surveilla...
Reconstructing the Path of the Object based on Time and Date OCR in Surveilla...
 
A Novel Framework For Numerical Character Recognition With Zoning Distance Fe...
A Novel Framework For Numerical Character Recognition With Zoning Distance Fe...A Novel Framework For Numerical Character Recognition With Zoning Distance Fe...
A Novel Framework For Numerical Character Recognition With Zoning Distance Fe...
 
IRJET - Object Detection using Hausdorff Distance
IRJET -  	  Object Detection using Hausdorff DistanceIRJET -  	  Object Detection using Hausdorff Distance
IRJET - Object Detection using Hausdorff Distance
 
Paper id 25201447
Paper id 25201447Paper id 25201447
Paper id 25201447
 
Traffic Sign Recognition using CNNs
Traffic Sign Recognition using CNNsTraffic Sign Recognition using CNNs
Traffic Sign Recognition using CNNs
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 
C011121114
C011121114C011121114
C011121114
 

Recently uploaded

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 

Recently uploaded (20)

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 

K012647982

  • 1. IOSR Journal of Mechanical and Civil Engineering (IOSR-JMCE) e-ISSN: 2278-1684,p-ISSN: 2320-334X, Volume 12, Issue 6 Ver. IV (Nov. - Dec. 2015), PP 79-82 www.iosrjournals.org DOI: 10.9790/1684-12647982 www.iosrjournals.org 79 | Page A Simple Signature Recognition System Suvarnsing G. Bhable Research Student Dept. of CS & IT Dr. B.A.M.University, Aurangabad Abstract: The signature of a person is an important biometric characteristic of a human being which can be used to verify human identity. Signature verification is an important research area in the field of authentication of a person as well as documents in e-commerce and banking. Signatures are verified based on features extracted from the signature using Invariant Central Moment and Modified Zernike moment for its invariant feature extraction because the signatures are Hampered by the large amount of variation in size, translation and rotation and shearing parameter. This signature recognition system is designed using MATLAB. This work has been tested and found suitable for its purpose. Keywords: Biometrics, Hidden Markov models (HMM), Normalized area of signature, Off-line Signature Recognition, OCR I. Introduction Biometrics is technologies used for measuring and analysing a person's unique characteristics. There are two types of biometrics: behavioral and physical. Behavioral biometrics are generally used for verification while physical biometrics can be used for either identification or verification. Among the different forms of biometric recognition systems such as fingerprint, iris, DNA, face, voice, vein structure palm etc.,In our society, traditional and accepted means for a person to identify and authenticate himself either to another human being or to a computer system is based on one or more of these three (3) general principles:  What the person knows  What he possesses  What he is The signature recognition & verification system shown in Fig. 1 is broadly divided into three subparts a) Preprocessing, b) Feature extraction, c) Recognition & Verification. The input signature is captured from the scanner or digital high pixel camera which provides the output image in term of BMP Color image. The preprocessing algorithm provides the required data suitable for the final processing. In the feature extraction phase the invariant central moment and Zernike moment are used to extract the feature for the classification purpose. In classification the Back propagation Neural Network is used to provide high accuracy and less computational complexity in training and testing phase of the system. Fig.1: Flow Diagram of SRS (Signature Recognition System)
  • 2. A Simple Signature Recognition System DOI: 10.9790/1684-12647982 www.iosrjournals.org 80 | Page II. Classification Major techniques used for offline signature verification system are based on Template Matching, Statistical Approach, Structural Analysis Approach, Spectrum Analysis Approach, Neural Network Approach [1]  Template Matching Approach – The template matching is the simplest and earliest but rigid approach to pattern recognition in which instances of pre-stored patterns are sought in an image. It is performed at the pixel level and also on higher level. This approach has a number of disadvantages due to its rigidity. It may fail if the patterns are distorted due to the imaging process, viewpoint change etc as in the case of signatures. It can detect casual forgeries from genuine signatures But cant verify between the genuine signature and skilled ones. The template matching method can be categorized into several forms such as graphics matching, stroke analysis and geometric feature extraction, depending on different features.  Statistical Approach – In this approach, each pattern is represented in terms of features and is viewed as a point in a d-dimensional space. Each pattern vector belonging to different categories occupy compact and disjoint regions in a d-dimensional feature space. Decision boundaries are set in feature space to separate different classes. The effectiveness of the feature set is determined by how well patterns from different classes can be separated. Hidden Markov Model (HMM), Bayesian these are some statistical approach commonly used in pattern recognition. They can detect causal forgeries as well as skilled and traced forgeries from the genuine ones.  Structural Approach - It is related to graph, string and tree matching techniques and is used in combination with other techniques. It shows good performance detecting genuine signatures and forgeries. Its major disadvantage is that it uses large dataset for greater accuracy.  Spectrum Analysis Approach- In this method the first stage of the procedure is the transformation of the data into another matrix which is a version of the trajectory matrix in Spectrum Analysis. Than a square window is placed in all possible places of image.[2] It basically decomposes a curvature-based signature into a multi-resolution format. This approach is used for long scripted signatures  Neural Network Approach- The main characteristics of neural networks are that they have the ability to learn complex nonlinear input-output relationships, use sequential training procedures, and adapt themselves to the data. The most commonly used family of neural networks for pattern classification tasks is the feed-forward network, which includes multilayer perceptron, Radial-Basis Function (RBF) networks Self-Organizing Map (SOM), or Kohonen- Network. III. Database For training and testing of the signature recognition and verification system 500 signatures are used. The signatures were taken from 50 persons. The templates of the signature as shown in Fig.2 for training the system 50 person’s signatures are used. Each of these persons signed 8 original signature and The input signature is captured from the scanner or digital high pixel camera which provides the output image in term of BMP Colour image. The preprocessing algorithm provides the required data suitable for the final processing. In the feature extraction phase the invariant central moment and Zernike moment are used to extract the feature for the classification purpose. In classification the Back propagation Neural Network is used to provide high accuracy and less computational complexity in training and testing phase of the system. Signed 4 forgery signatures in the training set the total number of signatures is 500 (10 x 50) are used. In order to make the system robust, signers were asked to use as much as variation in their signature size and shape and the signatures are collected at different times without seeing other signatures they signed before. For testing the system, another 100 genuine signatures and 100 forgery signatures are taken from the same 50 persons in the training set. IV. Preprocessing Signature verification system is pre-processing. The need of pre-processing is explained through system. It can be clearly seen that while scanning a signature on white paper, residues are also scanned. This increases in fuzziness of the pattern. Thus, in the first step such scanning noise must be eliminated. We perform this by first converting the image to gray scale image. We then convert the image to binary image with a threshold. This results in particularly clear signature pattern as seen in system. Considering that the signature is scanned against a white background, it can be present at any side of the paper or it can be centralized. Considering this whole image as a sample will lead to improper statistics. Hence ROI of the signature must be
  • 3. A Simple Signature Recognition System DOI: 10.9790/1684-12647982 www.iosrjournals.org 81 | Page extracted first. Many literatures have proposed signature ROI detection using simple bounding box which is demonstrated in system. This involves two steps: First inverting the signature so that background becomes black and foreground is white and then obtaining a bounding box. However this traditional solution is many limitations when it comes to detecting discontinues signature as shown in that system. This problem is overcome by first dilating input signature with a structuring element of size 16x16 and then applying the bounding box over it. The bounding box region is then annotated over non dilated image to extract the exact region. Results are shown in system. Process of binary conversion also results in disconnected lines due to conversion error. This is overcome by first dilating and then eroding the binary image. V. Feature Extraction Emphasis of the proposed work is in detecting shape or boundary features. Features can be applied on binary image or thin image or edges. We performed a test to analyse the dominance of features in all three scenarios. Figure 6 reveals that radon features are natural to shapes. Thus descriptors are dominant in same dimension for both normal as well as edge detected images. However number of dominant features is low in both cases. In order to obtain better descriptors we applied thinning with a structuring of kernel 2x2. Results are presented in Figure 7. Place Tables/Figures/Images in text as close to the reference as possible. It may extend across both columns to a maximum width of 17.78 cm (7”). Captions should be Times New Roman 9-point bold. They should be numbered, please note that the word for Table and Figure are spelled out. Figure’s captions should be centered beneath the image or picture, and Table captions should be centered above the table body. Therefore it is proved that region of interest extraction must be followed by thinning process to extract good descriptor in signature verification system. Size is another important aspect of signatures. Local feature extraction techniques like Grid/Zone based features extractors demand that all the images be of same size. To study the effect of resizing, we performed feature extraction from resized ROI and without resizing. It can be clearly seen from that resizing induces interpolation losses. Hence feature descriptor changes. This leads to misclassification and results in low accuracy. To avoid this problem descriptor must be used on the actual image rather than resized image. However actual image size will vary from one signature to the other. Thus number of descriptors will also vary. One of the prerequisite for any classification is that feature dimensions must be same. Therefore it is wise to extract projection on different angles and extract statistics from them. It can be clearly seen that the transform descriptors varies as angle of projection varies. It is quite difficult to claim the actual projections that would result in optimized feature set. Hence we obtain Radon descriptors for 0' to 360' in steps of 15' and extract mean and standard deviation for each projection as our Radon feature set. Once Radon transform is extracted, we obtain Zernike moments before classifying or adding the features to database. Zernike like Radon is a shift invariant moments obtained from polar projection of image. Zernike moments are complex. Therefore real components from the moments are extracted as feature descriptor. Another major limitation of using Zernike moment is that the exponent of the dimension increases as number of moments is increased. But for modelling with HMM, dimensions must be normalized to single value domain. Hence after obtaining Zernike moments we normalize each dimension by dividing it with the highest exponent of that dimension. Thus all the feature values are brought in same value domain. Overall methodology is explained with a block diagram VI. Conclusion Signature verification and analysis are part of larger domain of work which finds application in graphology and forensic science. In this work we have presented a Novel technique of Signature Verification by combining Zernike moments with Radon transform values at different angle of projection from the user's Signature pattern and then forming a statistical state machine with HMM and PLSR. Further the technique was improved by the aid of kernel based techniques with the Help of SVM. It gives the poor performance for signature that is not in the training phase. Generally the failure to recognize/verify a signature was due to poor image quality and high similarity between 2 signatures. Recognition and verification ability of the system can be increased by using additional features in the input data set. References [1]. M. J. Alhaddad, D. Mohamad and A. M. Ahsan, “Online Signature Verification Using Probablistic Modeling and Neural Network”, IEEE, (2012) [2]. S. Srivastava and S. Agarwal, “Offline signature verification using grid based feature extraction”, IEEE, (2011) [3]. J. Coetzer, B. M. Herbst and J. A. du Preez, “Offline Signature Verification Using the Discrete Radon Transform and a Hidden Markov Model”, EURASIP Journal on Applied Signal Processing, (2004) [4]. Sangramsing Kayte, Suvarnsing G.Bhable and Jaypalsing Kayte, ―A Review Paper on Multimodal Biometrics System using Fingerprint and Signature‖. IJCA Volume 128 – No.15, October 2015.
  • 4. A Simple Signature Recognition System DOI: 10.9790/1684-12647982 www.iosrjournals.org 82 | Page [5]. Ashwini Pansare, Shalini Bhatia,Handwritten Signature Verification using Neural Network, International Journal of Applied Information Systems (IJAIS) – ISSN : 2249-0868 Foundation of Computer Science FCS, New York, USA Volume 1– No.2, January 2012 [6]. O.C Abikoye, M.A MabayojeR. Ajibade “Offline Signature Recognition & Verification using Neural Network” International Journal of Computer Applications (0975 – 8887) Volume 35– No.2, December 2011 [7]. Ozgunduz, E., Karsligil, E., and Senturk, T. 2005.Off-line Signature Verification and Recognition by Support Vector Machine. Paper presented at the European Signal processing Conference. [8]. Jain, A., Griess, F., and Connel1, S. “Online Signature Recognition”, Pattern Recognition, vol.35,2002, pp 2963-2972. [9]. Shashi Kumar D R, K B Raja, R. K Chhotaray, Sabyasachi Pattanaik, Off-line Signature Verification Based on Fusion of Grid and Global Features Using Neural Networks , International Journal of Engineering Science and Technology Vol. 2(12), 2010, 7035- 7044 [10]. Julio Martínez-R.,Rogelio Alcántara-S.,On-line signature verification based on optimal feature representation and neural network- driven fuzzy reasoning [11]. ICAO, Development of a Logical Data Structure – LDS for Optional Capacity Expansion Technologies, International Civil Aviation Organisation, Tech. Rep., Machine Readable Travel Documents, Revision 1.7, 2004.