SlideShare a Scribd company logo
1 of 4
Download to read offline
IOSR Journal of Mechanical and Civil Engineering (IOSR-JMCE)
e-ISSN: 2278-1684,p-ISSN: 2320-334X, Volume 12, Issue 6 Ver. IV (Nov. - Dec. 2015), PP 79-82
www.iosrjournals.org
DOI: 10.9790/1684-12647982 www.iosrjournals.org 79 | Page
A Simple Signature Recognition System
Suvarnsing G. Bhable
Research Student Dept. of CS & IT Dr. B.A.M.University, Aurangabad
Abstract: The signature of a person is an important biometric characteristic of a human being which can be
used to verify human identity. Signature verification is an important research area in the field of authentication
of a person as well as documents in e-commerce and banking. Signatures are verified based on features
extracted from the signature using Invariant Central Moment and Modified Zernike moment for its invariant
feature extraction because the signatures are Hampered by the large amount of variation in size, translation
and rotation and shearing parameter. This signature recognition system is designed using MATLAB. This work
has been tested and found suitable for its purpose.
Keywords: Biometrics, Hidden Markov models (HMM), Normalized area of signature, Off-line Signature
Recognition, OCR
I. Introduction
Biometrics is technologies used for measuring and analysing a person's unique characteristics. There
are two types of biometrics: behavioral and physical. Behavioral biometrics are generally used for verification
while physical biometrics can be used for either identification or verification. Among the different forms of
biometric recognition systems such as fingerprint, iris, DNA, face, voice, vein structure palm etc.,In our society,
traditional and accepted means for a person to identify and authenticate himself either to another human being or
to a computer system is based on one or more of these three (3) general principles:
 What the person knows
 What he possesses
 What he is
The signature recognition & verification system shown in Fig. 1 is broadly divided into three subparts
a) Preprocessing,
b) Feature extraction,
c) Recognition & Verification.
The input signature is captured from the scanner or digital high pixel camera which provides the output
image in term of BMP Color image. The preprocessing algorithm provides the required data suitable for the
final processing. In the feature extraction phase the invariant central moment and Zernike moment are used to
extract the feature for the classification purpose. In classification the Back propagation Neural Network is used
to provide high accuracy and less computational complexity in training and testing phase of the system.
Fig.1: Flow Diagram of SRS (Signature Recognition System)
A Simple Signature Recognition System
DOI: 10.9790/1684-12647982 www.iosrjournals.org 80 | Page
II. Classification
Major techniques used for offline signature verification system are based on Template Matching,
Statistical Approach, Structural Analysis Approach, Spectrum Analysis Approach, Neural Network Approach
[1]
 Template Matching Approach – The template matching is the simplest and earliest but rigid
approach to pattern recognition in which instances of pre-stored patterns are sought in an image. It is
performed at the pixel level and also on higher level. This approach has a number of disadvantages due
to its rigidity. It may fail if the patterns are distorted due to the imaging process, viewpoint change etc
as in the case of signatures. It can detect casual forgeries from genuine signatures But cant verify
between the genuine signature and skilled ones. The template matching method can be categorized into
several forms such as graphics matching, stroke analysis and geometric feature extraction, depending
on different features.
 Statistical Approach – In this approach, each pattern
is represented in terms of features and is viewed as a
point in a d-dimensional space. Each pattern vector
belonging to different categories occupy compact and disjoint regions in a d-dimensional feature space.
Decision boundaries are set in feature space to separate different classes. The effectiveness of the
feature set is determined by how well patterns from different classes can be separated. Hidden Markov
Model (HMM), Bayesian these are some statistical approach commonly used in pattern recognition.
They can detect causal forgeries as well as skilled and traced forgeries from the genuine ones.
 Structural Approach - It is related to graph, string and tree matching techniques and is used in
combination with other techniques. It shows good performance detecting genuine signatures and
forgeries. Its major disadvantage is that it uses large dataset for greater accuracy.
 Spectrum Analysis Approach- In this method the first stage of the procedure is the transformation of
the data into another matrix which is a version of the trajectory matrix in Spectrum Analysis. Than a
square window is placed in all possible places of image.[2] It basically decomposes a curvature-based
signature into a multi-resolution format. This approach is used for long scripted signatures
 Neural Network Approach- The main characteristics of neural networks are that they have the ability
to learn complex nonlinear input-output relationships, use sequential training procedures, and adapt
themselves to the data. The most commonly used family of neural networks for pattern classification
tasks is the feed-forward network, which includes multilayer perceptron, Radial-Basis Function (RBF)
networks Self-Organizing Map (SOM), or Kohonen- Network.
III. Database
For training and testing of the signature recognition and verification system 500 signatures are used.
The signatures were taken from 50 persons. The templates of the signature as shown in Fig.2 for training the
system 50 person’s signatures are used. Each of these persons signed 8 original signature and The input
signature is captured from the scanner or digital high pixel camera which provides the output image in term of
BMP Colour image. The preprocessing algorithm provides the required data suitable for the final processing. In
the feature extraction phase the invariant central moment and Zernike moment are used to extract the feature for
the classification purpose. In classification the Back propagation Neural Network is used to provide high
accuracy and less computational complexity in training and testing phase of the system.
Signed 4 forgery signatures in the training set the total number of signatures is 500 (10 x 50) are used.
In order to make the system robust, signers were asked to use as much as variation in their signature size and
shape and the signatures are collected at different times without seeing other signatures they signed before.
For testing the system, another 100 genuine signatures and 100 forgery signatures are taken from the same 50
persons in the training set.
IV. Preprocessing
Signature verification system is pre-processing. The need of pre-processing is explained through
system. It can be clearly seen that while scanning a signature on white paper, residues are also scanned. This
increases in fuzziness of the pattern. Thus, in the first step such scanning noise must be eliminated. We perform
this by first converting the image to gray scale image. We then convert the image to binary image with a
threshold. This results in particularly clear signature pattern as seen in system. Considering that the signature is
scanned against a white background, it can be present at any side of the paper or it can be centralized.
Considering this whole image as a sample will lead to improper statistics. Hence ROI of the signature must be
A Simple Signature Recognition System
DOI: 10.9790/1684-12647982 www.iosrjournals.org 81 | Page
extracted first. Many literatures have proposed signature ROI detection using simple bounding box which is
demonstrated in system. This involves two steps: First inverting the signature so that background becomes black
and foreground is white and then obtaining a bounding box. However this traditional solution is many
limitations when it comes to detecting discontinues signature as shown in that system.
This problem is overcome by first dilating input signature with a structuring element of size 16x16 and
then applying the bounding box over it. The bounding box region is then annotated over non dilated image to
extract the exact region. Results are shown in system.
Process of binary conversion also results in disconnected lines due to conversion error. This is
overcome by first dilating and then eroding the binary image.
V. Feature Extraction
Emphasis of the proposed work is in detecting shape or boundary features. Features can be applied on
binary image or thin image or edges. We performed a test to analyse the dominance of features in all three
scenarios.
Figure 6 reveals that radon features are natural to shapes. Thus descriptors are dominant in same
dimension for both normal as well as edge detected images. However number of dominant features is low in
both cases. In order to obtain better descriptors we applied thinning with a structuring of kernel 2x2. Results are
presented in Figure 7.
Place Tables/Figures/Images in text as close to the reference as possible. It may extend across both
columns to a maximum width of 17.78 cm (7”).
Captions should be Times New Roman 9-point bold. They should be numbered, please note that the
word for Table and Figure are spelled out. Figure’s captions should be centered beneath the image or picture,
and Table captions should be centered above the table body.
Therefore it is proved that region of interest extraction must be followed by thinning process to extract
good descriptor in signature verification system. Size is another important aspect of signatures. Local feature
extraction techniques like Grid/Zone based features extractors demand that all the images be of same size. To
study the effect of resizing, we performed feature extraction from resized ROI and without resizing. It can be
clearly seen from that resizing induces interpolation losses. Hence feature descriptor changes. This leads to
misclassification and results in low accuracy. To avoid this problem descriptor must be used on the actual image
rather than resized image. However actual image size will vary from one signature to the other. Thus number of
descriptors will also vary. One of the prerequisite for any classification is that feature dimensions must be same.
Therefore it is wise to extract projection on different angles and extract statistics from them. It can be clearly
seen that the transform descriptors varies as angle of projection varies. It is quite difficult to claim the actual
projections that would result in optimized feature set. Hence we obtain Radon descriptors for 0' to 360' in steps
of 15' and extract mean and standard deviation for each projection as our Radon feature set. Once Radon
transform is extracted, we obtain Zernike moments before classifying or adding the features to database. Zernike
like Radon is a shift invariant moments obtained from polar projection of image. Zernike moments are complex.
Therefore real components from the moments are extracted as feature descriptor. Another major limitation of
using Zernike moment is that the exponent of the dimension increases as number of moments is increased. But
for modelling with HMM, dimensions must be normalized to single value domain. Hence after obtaining
Zernike moments we normalize each dimension by dividing it with the highest exponent of that dimension. Thus
all the feature values are brought in same value domain. Overall methodology is explained with a block diagram
VI. Conclusion
Signature verification and analysis are part of larger domain of work which finds application in
graphology and forensic science. In this work we have presented a Novel technique of Signature Verification by
combining Zernike moments with Radon transform values at different angle of projection from the user's
Signature pattern and then forming a statistical state machine with HMM and PLSR. Further the technique was
improved by the aid of kernel based techniques with the Help of SVM. It gives the poor performance for
signature that is not in the training phase. Generally the failure to recognize/verify a signature was due to poor
image quality and high similarity between 2 signatures. Recognition and verification ability of the system can be
increased by using additional features in the input data set.
References
[1]. M. J. Alhaddad, D. Mohamad and A. M. Ahsan, “Online Signature Verification Using Probablistic Modeling and Neural Network”,
IEEE, (2012)
[2]. S. Srivastava and S. Agarwal, “Offline signature verification using grid based feature extraction”, IEEE, (2011)
[3]. J. Coetzer, B. M. Herbst and J. A. du Preez, “Offline Signature Verification Using the Discrete Radon Transform and a Hidden
Markov Model”, EURASIP Journal on Applied Signal Processing, (2004)
[4]. Sangramsing Kayte, Suvarnsing G.Bhable and Jaypalsing Kayte, ―A Review Paper on Multimodal Biometrics System using
Fingerprint and Signature‖. IJCA Volume 128 – No.15, October 2015.
A Simple Signature Recognition System
DOI: 10.9790/1684-12647982 www.iosrjournals.org 82 | Page
[5]. Ashwini Pansare, Shalini Bhatia,Handwritten Signature Verification using Neural Network, International Journal of Applied
Information Systems (IJAIS) – ISSN : 2249-0868 Foundation of Computer Science FCS, New York, USA Volume 1– No.2,
January 2012
[6]. O.C Abikoye, M.A MabayojeR. Ajibade “Offline Signature Recognition & Verification using Neural Network” International
Journal of Computer Applications (0975 – 8887) Volume 35– No.2, December 2011
[7]. Ozgunduz, E., Karsligil, E., and Senturk, T. 2005.Off-line Signature Verification and Recognition by Support Vector Machine.
Paper presented at the European Signal processing Conference.
[8]. Jain, A., Griess, F., and Connel1, S. “Online Signature Recognition”, Pattern Recognition, vol.35,2002, pp 2963-2972.
[9]. Shashi Kumar D R, K B Raja, R. K Chhotaray, Sabyasachi Pattanaik, Off-line Signature Verification Based on Fusion of Grid and
Global Features Using Neural Networks , International Journal of Engineering Science and Technology Vol. 2(12), 2010, 7035-
7044
[10]. Julio Martínez-R.,Rogelio Alcántara-S.,On-line signature verification based on optimal feature representation and neural network-
driven fuzzy reasoning
[11]. ICAO, Development of a Logical Data Structure – LDS for Optional Capacity Expansion Technologies, International Civil Aviation
Organisation, Tech. Rep., Machine Readable Travel Documents, Revision 1.7, 2004.

More Related Content

What's hot

GEOMETRIC CORRECTION FOR BRAILLE DOCUMENT IMAGES
GEOMETRIC CORRECTION FOR BRAILLE DOCUMENT IMAGESGEOMETRIC CORRECTION FOR BRAILLE DOCUMENT IMAGES
GEOMETRIC CORRECTION FOR BRAILLE DOCUMENT IMAGEScsandit
 
Smart Response Surface Models using Legacy Data for Multidisciplinary Optimiz...
Smart Response Surface Models using Legacy Data for Multidisciplinary Optimiz...Smart Response Surface Models using Legacy Data for Multidisciplinary Optimiz...
Smart Response Surface Models using Legacy Data for Multidisciplinary Optimiz...IOSRJMCE
 
IRJET- Document Layout analysis using Inverse Support Vector Machine (I-SV...
IRJET- 	  Document Layout analysis using Inverse Support Vector Machine (I-SV...IRJET- 	  Document Layout analysis using Inverse Support Vector Machine (I-SV...
IRJET- Document Layout analysis using Inverse Support Vector Machine (I-SV...IRJET Journal
 
IRJET- Optical Character Recognition using Neural Networks by Classification ...
IRJET- Optical Character Recognition using Neural Networks by Classification ...IRJET- Optical Character Recognition using Neural Networks by Classification ...
IRJET- Optical Character Recognition using Neural Networks by Classification ...IRJET Journal
 
Enhanced Morphological Contour Representation and Reconstruction using Line S...
Enhanced Morphological Contour Representation and Reconstruction using Line S...Enhanced Morphological Contour Representation and Reconstruction using Line S...
Enhanced Morphological Contour Representation and Reconstruction using Line S...CSCJournals
 
Ganesan dhawanrpt
Ganesan dhawanrptGanesan dhawanrpt
Ganesan dhawanrptpramod naik
 
A CAD ppt 25-10-19.pdf
A CAD ppt 25-10-19.pdfA CAD ppt 25-10-19.pdf
A CAD ppt 25-10-19.pdfKeerthanaP37
 
Online signature recognition using sectorization of complex walsh
Online signature recognition using sectorization of complex walshOnline signature recognition using sectorization of complex walsh
Online signature recognition using sectorization of complex walshDr. Vinayak Bharadi
 
Automatic analysis of smoothing techniques by simulation model based real tim...
Automatic analysis of smoothing techniques by simulation model based real tim...Automatic analysis of smoothing techniques by simulation model based real tim...
Automatic analysis of smoothing techniques by simulation model based real tim...ijesajournal
 
11.design and modeling of tool trajectory in c0000www.iiste.org call for pape...
11.design and modeling of tool trajectory in c0000www.iiste.org call for pape...11.design and modeling of tool trajectory in c0000www.iiste.org call for pape...
11.design and modeling of tool trajectory in c0000www.iiste.org call for pape...Alexander Decker
 
Performance evaluation of different automatic seed point generation technique...
Performance evaluation of different automatic seed point generation technique...Performance evaluation of different automatic seed point generation technique...
Performance evaluation of different automatic seed point generation technique...IAEME Publication
 
Subtrative Manufacturing Report
Subtrative Manufacturing ReportSubtrative Manufacturing Report
Subtrative Manufacturing ReportJoseph Legan
 
Novel Approach to Automatically Generate Feasible Assembly Sequence
Novel Approach to Automatically Generate Feasible Assembly SequenceNovel Approach to Automatically Generate Feasible Assembly Sequence
Novel Approach to Automatically Generate Feasible Assembly Sequenceishan kossambe
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
IRJET- Note to Coin Converter
IRJET- Note to Coin ConverterIRJET- Note to Coin Converter
IRJET- Note to Coin ConverterIRJET Journal
 
Lane detection system for day vision using altera DE2
Lane detection system for day vision using altera DE2Lane detection system for day vision using altera DE2
Lane detection system for day vision using altera DE2TELKOMNIKA JOURNAL
 

What's hot (18)

GEOMETRIC CORRECTION FOR BRAILLE DOCUMENT IMAGES
GEOMETRIC CORRECTION FOR BRAILLE DOCUMENT IMAGESGEOMETRIC CORRECTION FOR BRAILLE DOCUMENT IMAGES
GEOMETRIC CORRECTION FOR BRAILLE DOCUMENT IMAGES
 
Smart Response Surface Models using Legacy Data for Multidisciplinary Optimiz...
Smart Response Surface Models using Legacy Data for Multidisciplinary Optimiz...Smart Response Surface Models using Legacy Data for Multidisciplinary Optimiz...
Smart Response Surface Models using Legacy Data for Multidisciplinary Optimiz...
 
C045061425
C045061425C045061425
C045061425
 
IRJET- Document Layout analysis using Inverse Support Vector Machine (I-SV...
IRJET- 	  Document Layout analysis using Inverse Support Vector Machine (I-SV...IRJET- 	  Document Layout analysis using Inverse Support Vector Machine (I-SV...
IRJET- Document Layout analysis using Inverse Support Vector Machine (I-SV...
 
IRJET- Optical Character Recognition using Neural Networks by Classification ...
IRJET- Optical Character Recognition using Neural Networks by Classification ...IRJET- Optical Character Recognition using Neural Networks by Classification ...
IRJET- Optical Character Recognition using Neural Networks by Classification ...
 
Enhanced Morphological Contour Representation and Reconstruction using Line S...
Enhanced Morphological Contour Representation and Reconstruction using Line S...Enhanced Morphological Contour Representation and Reconstruction using Line S...
Enhanced Morphological Contour Representation and Reconstruction using Line S...
 
Ganesan dhawanrpt
Ganesan dhawanrptGanesan dhawanrpt
Ganesan dhawanrpt
 
40120140505009
4012014050500940120140505009
40120140505009
 
A CAD ppt 25-10-19.pdf
A CAD ppt 25-10-19.pdfA CAD ppt 25-10-19.pdf
A CAD ppt 25-10-19.pdf
 
Online signature recognition using sectorization of complex walsh
Online signature recognition using sectorization of complex walshOnline signature recognition using sectorization of complex walsh
Online signature recognition using sectorization of complex walsh
 
Automatic analysis of smoothing techniques by simulation model based real tim...
Automatic analysis of smoothing techniques by simulation model based real tim...Automatic analysis of smoothing techniques by simulation model based real tim...
Automatic analysis of smoothing techniques by simulation model based real tim...
 
11.design and modeling of tool trajectory in c0000www.iiste.org call for pape...
11.design and modeling of tool trajectory in c0000www.iiste.org call for pape...11.design and modeling of tool trajectory in c0000www.iiste.org call for pape...
11.design and modeling of tool trajectory in c0000www.iiste.org call for pape...
 
Performance evaluation of different automatic seed point generation technique...
Performance evaluation of different automatic seed point generation technique...Performance evaluation of different automatic seed point generation technique...
Performance evaluation of different automatic seed point generation technique...
 
Subtrative Manufacturing Report
Subtrative Manufacturing ReportSubtrative Manufacturing Report
Subtrative Manufacturing Report
 
Novel Approach to Automatically Generate Feasible Assembly Sequence
Novel Approach to Automatically Generate Feasible Assembly SequenceNovel Approach to Automatically Generate Feasible Assembly Sequence
Novel Approach to Automatically Generate Feasible Assembly Sequence
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
IRJET- Note to Coin Converter
IRJET- Note to Coin ConverterIRJET- Note to Coin Converter
IRJET- Note to Coin Converter
 
Lane detection system for day vision using altera DE2
Lane detection system for day vision using altera DE2Lane detection system for day vision using altera DE2
Lane detection system for day vision using altera DE2
 

Viewers also liked

Viewers also liked (20)

Parametric Studies on Detergent Using Low Cost Sorbent
Parametric Studies on Detergent Using Low Cost SorbentParametric Studies on Detergent Using Low Cost Sorbent
Parametric Studies on Detergent Using Low Cost Sorbent
 
O13030294101
O13030294101O13030294101
O13030294101
 
Q01741118123
Q01741118123Q01741118123
Q01741118123
 
E1803042328
E1803042328E1803042328
E1803042328
 
D017651519
D017651519D017651519
D017651519
 
A017330108
A017330108A017330108
A017330108
 
O017658697
O017658697O017658697
O017658697
 
D010612024
D010612024D010612024
D010612024
 
F017154347
F017154347F017154347
F017154347
 
H011117484
H011117484H011117484
H011117484
 
E010522527
E010522527E010522527
E010522527
 
G010114548
G010114548G010114548
G010114548
 
J1802026976
J1802026976J1802026976
J1802026976
 
D012441728
D012441728D012441728
D012441728
 
Enhancement of New Channel Equalizer Using Adaptive Neuro Fuzzy Inference System
Enhancement of New Channel Equalizer Using Adaptive Neuro Fuzzy Inference SystemEnhancement of New Channel Equalizer Using Adaptive Neuro Fuzzy Inference System
Enhancement of New Channel Equalizer Using Adaptive Neuro Fuzzy Inference System
 
Process Parametric Optimization of CNC Vertical Milling Machine Using Taguchi...
Process Parametric Optimization of CNC Vertical Milling Machine Using Taguchi...Process Parametric Optimization of CNC Vertical Milling Machine Using Taguchi...
Process Parametric Optimization of CNC Vertical Milling Machine Using Taguchi...
 
E012632429
E012632429E012632429
E012632429
 
D017372538
D017372538D017372538
D017372538
 
K1803036872
K1803036872K1803036872
K1803036872
 
O010329296
O010329296O010329296
O010329296
 

Similar to A Simple Signature Recognition System Using Feature Extraction

International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...
­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...
­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...IRJET Journal
 
IRJET- Optical Character Recognition using Image Processing
IRJET-  	  Optical Character Recognition using Image ProcessingIRJET-  	  Optical Character Recognition using Image Processing
IRJET- Optical Character Recognition using Image ProcessingIRJET Journal
 
A design of license plate recognition system using convolutional neural network
A design of license plate recognition system using convolutional neural networkA design of license plate recognition system using convolutional neural network
A design of license plate recognition system using convolutional neural networkIJECEIAES
 
Tracking number plate from vehicle using
Tracking number plate from vehicle usingTracking number plate from vehicle using
Tracking number plate from vehicle usingijfcstjournal
 
Iaetsd an efficient way of detecting a numbers in car
Iaetsd an efficient way of detecting a numbers in carIaetsd an efficient way of detecting a numbers in car
Iaetsd an efficient way of detecting a numbers in carIaetsd Iaetsd
 
License Plate Recognition using Morphological Operation.
License Plate Recognition using Morphological Operation. License Plate Recognition using Morphological Operation.
License Plate Recognition using Morphological Operation. Amitava Choudhury
 
Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...eSAT Publishing House
 
Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...ijfcstjournal
 
Two Methods for Recognition of Hand Written Farsi Characters
Two Methods for Recognition of Hand Written Farsi CharactersTwo Methods for Recognition of Hand Written Farsi Characters
Two Methods for Recognition of Hand Written Farsi CharactersCSCJournals
 
14 offline signature verification based on euclidean distance using support v...
14 offline signature verification based on euclidean distance using support v...14 offline signature verification based on euclidean distance using support v...
14 offline signature verification based on euclidean distance using support v...INFOGAIN PUBLICATION
 
Recognition Technology for Four Arithmetic Operations
Recognition Technology for Four Arithmetic OperationsRecognition Technology for Four Arithmetic Operations
Recognition Technology for Four Arithmetic OperationsTELKOMNIKA JOURNAL
 
Mobile Based Application to Scan the Number Plate and To Verify the Owner Det...
Mobile Based Application to Scan the Number Plate and To Verify the Owner Det...Mobile Based Application to Scan the Number Plate and To Verify the Owner Det...
Mobile Based Application to Scan the Number Plate and To Verify the Owner Det...inventionjournals
 
Bangla Optical Digits Recognition using Edge Detection Method
Bangla Optical Digits Recognition using Edge Detection MethodBangla Optical Digits Recognition using Edge Detection Method
Bangla Optical Digits Recognition using Edge Detection MethodIOSR Journals
 
Offline signatures matching using haar wavelet subbands
Offline signatures matching using haar wavelet subbandsOffline signatures matching using haar wavelet subbands
Offline signatures matching using haar wavelet subbandsTELKOMNIKA JOURNAL
 

Similar to A Simple Signature Recognition System Using Feature Extraction (20)

Assignment-1-NF.docx
Assignment-1-NF.docxAssignment-1-NF.docx
Assignment-1-NF.docx
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...
­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...
­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...
 
IRJET- Optical Character Recognition using Image Processing
IRJET-  	  Optical Character Recognition using Image ProcessingIRJET-  	  Optical Character Recognition using Image Processing
IRJET- Optical Character Recognition using Image Processing
 
Artificial Neural Network Based Offline Signature Recognition System Using Lo...
Artificial Neural Network Based Offline Signature Recognition System Using Lo...Artificial Neural Network Based Offline Signature Recognition System Using Lo...
Artificial Neural Network Based Offline Signature Recognition System Using Lo...
 
A design of license plate recognition system using convolutional neural network
A design of license plate recognition system using convolutional neural networkA design of license plate recognition system using convolutional neural network
A design of license plate recognition system using convolutional neural network
 
Tracking number plate from vehicle using
Tracking number plate from vehicle usingTracking number plate from vehicle using
Tracking number plate from vehicle using
 
Offline Signature Verification and Recognition using Neural Network
Offline Signature Verification and Recognition using Neural NetworkOffline Signature Verification and Recognition using Neural Network
Offline Signature Verification and Recognition using Neural Network
 
Choudhary2015
Choudhary2015Choudhary2015
Choudhary2015
 
Iaetsd an efficient way of detecting a numbers in car
Iaetsd an efficient way of detecting a numbers in carIaetsd an efficient way of detecting a numbers in car
Iaetsd an efficient way of detecting a numbers in car
 
License Plate Recognition using Morphological Operation.
License Plate Recognition using Morphological Operation. License Plate Recognition using Morphological Operation.
License Plate Recognition using Morphological Operation.
 
Ijetcas14 337
Ijetcas14 337Ijetcas14 337
Ijetcas14 337
 
Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...
 
Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...
 
Two Methods for Recognition of Hand Written Farsi Characters
Two Methods for Recognition of Hand Written Farsi CharactersTwo Methods for Recognition of Hand Written Farsi Characters
Two Methods for Recognition of Hand Written Farsi Characters
 
14 offline signature verification based on euclidean distance using support v...
14 offline signature verification based on euclidean distance using support v...14 offline signature verification based on euclidean distance using support v...
14 offline signature verification based on euclidean distance using support v...
 
Recognition Technology for Four Arithmetic Operations
Recognition Technology for Four Arithmetic OperationsRecognition Technology for Four Arithmetic Operations
Recognition Technology for Four Arithmetic Operations
 
Mobile Based Application to Scan the Number Plate and To Verify the Owner Det...
Mobile Based Application to Scan the Number Plate and To Verify the Owner Det...Mobile Based Application to Scan the Number Plate and To Verify the Owner Det...
Mobile Based Application to Scan the Number Plate and To Verify the Owner Det...
 
Bangla Optical Digits Recognition using Edge Detection Method
Bangla Optical Digits Recognition using Edge Detection MethodBangla Optical Digits Recognition using Edge Detection Method
Bangla Optical Digits Recognition using Edge Detection Method
 
Offline signatures matching using haar wavelet subbands
Offline signatures matching using haar wavelet subbandsOffline signatures matching using haar wavelet subbands
Offline signatures matching using haar wavelet subbands
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 

Recently uploaded (20)

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 

A Simple Signature Recognition System Using Feature Extraction

  • 1. IOSR Journal of Mechanical and Civil Engineering (IOSR-JMCE) e-ISSN: 2278-1684,p-ISSN: 2320-334X, Volume 12, Issue 6 Ver. IV (Nov. - Dec. 2015), PP 79-82 www.iosrjournals.org DOI: 10.9790/1684-12647982 www.iosrjournals.org 79 | Page A Simple Signature Recognition System Suvarnsing G. Bhable Research Student Dept. of CS & IT Dr. B.A.M.University, Aurangabad Abstract: The signature of a person is an important biometric characteristic of a human being which can be used to verify human identity. Signature verification is an important research area in the field of authentication of a person as well as documents in e-commerce and banking. Signatures are verified based on features extracted from the signature using Invariant Central Moment and Modified Zernike moment for its invariant feature extraction because the signatures are Hampered by the large amount of variation in size, translation and rotation and shearing parameter. This signature recognition system is designed using MATLAB. This work has been tested and found suitable for its purpose. Keywords: Biometrics, Hidden Markov models (HMM), Normalized area of signature, Off-line Signature Recognition, OCR I. Introduction Biometrics is technologies used for measuring and analysing a person's unique characteristics. There are two types of biometrics: behavioral and physical. Behavioral biometrics are generally used for verification while physical biometrics can be used for either identification or verification. Among the different forms of biometric recognition systems such as fingerprint, iris, DNA, face, voice, vein structure palm etc.,In our society, traditional and accepted means for a person to identify and authenticate himself either to another human being or to a computer system is based on one or more of these three (3) general principles:  What the person knows  What he possesses  What he is The signature recognition & verification system shown in Fig. 1 is broadly divided into three subparts a) Preprocessing, b) Feature extraction, c) Recognition & Verification. The input signature is captured from the scanner or digital high pixel camera which provides the output image in term of BMP Color image. The preprocessing algorithm provides the required data suitable for the final processing. In the feature extraction phase the invariant central moment and Zernike moment are used to extract the feature for the classification purpose. In classification the Back propagation Neural Network is used to provide high accuracy and less computational complexity in training and testing phase of the system. Fig.1: Flow Diagram of SRS (Signature Recognition System)
  • 2. A Simple Signature Recognition System DOI: 10.9790/1684-12647982 www.iosrjournals.org 80 | Page II. Classification Major techniques used for offline signature verification system are based on Template Matching, Statistical Approach, Structural Analysis Approach, Spectrum Analysis Approach, Neural Network Approach [1]  Template Matching Approach – The template matching is the simplest and earliest but rigid approach to pattern recognition in which instances of pre-stored patterns are sought in an image. It is performed at the pixel level and also on higher level. This approach has a number of disadvantages due to its rigidity. It may fail if the patterns are distorted due to the imaging process, viewpoint change etc as in the case of signatures. It can detect casual forgeries from genuine signatures But cant verify between the genuine signature and skilled ones. The template matching method can be categorized into several forms such as graphics matching, stroke analysis and geometric feature extraction, depending on different features.  Statistical Approach – In this approach, each pattern is represented in terms of features and is viewed as a point in a d-dimensional space. Each pattern vector belonging to different categories occupy compact and disjoint regions in a d-dimensional feature space. Decision boundaries are set in feature space to separate different classes. The effectiveness of the feature set is determined by how well patterns from different classes can be separated. Hidden Markov Model (HMM), Bayesian these are some statistical approach commonly used in pattern recognition. They can detect causal forgeries as well as skilled and traced forgeries from the genuine ones.  Structural Approach - It is related to graph, string and tree matching techniques and is used in combination with other techniques. It shows good performance detecting genuine signatures and forgeries. Its major disadvantage is that it uses large dataset for greater accuracy.  Spectrum Analysis Approach- In this method the first stage of the procedure is the transformation of the data into another matrix which is a version of the trajectory matrix in Spectrum Analysis. Than a square window is placed in all possible places of image.[2] It basically decomposes a curvature-based signature into a multi-resolution format. This approach is used for long scripted signatures  Neural Network Approach- The main characteristics of neural networks are that they have the ability to learn complex nonlinear input-output relationships, use sequential training procedures, and adapt themselves to the data. The most commonly used family of neural networks for pattern classification tasks is the feed-forward network, which includes multilayer perceptron, Radial-Basis Function (RBF) networks Self-Organizing Map (SOM), or Kohonen- Network. III. Database For training and testing of the signature recognition and verification system 500 signatures are used. The signatures were taken from 50 persons. The templates of the signature as shown in Fig.2 for training the system 50 person’s signatures are used. Each of these persons signed 8 original signature and The input signature is captured from the scanner or digital high pixel camera which provides the output image in term of BMP Colour image. The preprocessing algorithm provides the required data suitable for the final processing. In the feature extraction phase the invariant central moment and Zernike moment are used to extract the feature for the classification purpose. In classification the Back propagation Neural Network is used to provide high accuracy and less computational complexity in training and testing phase of the system. Signed 4 forgery signatures in the training set the total number of signatures is 500 (10 x 50) are used. In order to make the system robust, signers were asked to use as much as variation in their signature size and shape and the signatures are collected at different times without seeing other signatures they signed before. For testing the system, another 100 genuine signatures and 100 forgery signatures are taken from the same 50 persons in the training set. IV. Preprocessing Signature verification system is pre-processing. The need of pre-processing is explained through system. It can be clearly seen that while scanning a signature on white paper, residues are also scanned. This increases in fuzziness of the pattern. Thus, in the first step such scanning noise must be eliminated. We perform this by first converting the image to gray scale image. We then convert the image to binary image with a threshold. This results in particularly clear signature pattern as seen in system. Considering that the signature is scanned against a white background, it can be present at any side of the paper or it can be centralized. Considering this whole image as a sample will lead to improper statistics. Hence ROI of the signature must be
  • 3. A Simple Signature Recognition System DOI: 10.9790/1684-12647982 www.iosrjournals.org 81 | Page extracted first. Many literatures have proposed signature ROI detection using simple bounding box which is demonstrated in system. This involves two steps: First inverting the signature so that background becomes black and foreground is white and then obtaining a bounding box. However this traditional solution is many limitations when it comes to detecting discontinues signature as shown in that system. This problem is overcome by first dilating input signature with a structuring element of size 16x16 and then applying the bounding box over it. The bounding box region is then annotated over non dilated image to extract the exact region. Results are shown in system. Process of binary conversion also results in disconnected lines due to conversion error. This is overcome by first dilating and then eroding the binary image. V. Feature Extraction Emphasis of the proposed work is in detecting shape or boundary features. Features can be applied on binary image or thin image or edges. We performed a test to analyse the dominance of features in all three scenarios. Figure 6 reveals that radon features are natural to shapes. Thus descriptors are dominant in same dimension for both normal as well as edge detected images. However number of dominant features is low in both cases. In order to obtain better descriptors we applied thinning with a structuring of kernel 2x2. Results are presented in Figure 7. Place Tables/Figures/Images in text as close to the reference as possible. It may extend across both columns to a maximum width of 17.78 cm (7”). Captions should be Times New Roman 9-point bold. They should be numbered, please note that the word for Table and Figure are spelled out. Figure’s captions should be centered beneath the image or picture, and Table captions should be centered above the table body. Therefore it is proved that region of interest extraction must be followed by thinning process to extract good descriptor in signature verification system. Size is another important aspect of signatures. Local feature extraction techniques like Grid/Zone based features extractors demand that all the images be of same size. To study the effect of resizing, we performed feature extraction from resized ROI and without resizing. It can be clearly seen from that resizing induces interpolation losses. Hence feature descriptor changes. This leads to misclassification and results in low accuracy. To avoid this problem descriptor must be used on the actual image rather than resized image. However actual image size will vary from one signature to the other. Thus number of descriptors will also vary. One of the prerequisite for any classification is that feature dimensions must be same. Therefore it is wise to extract projection on different angles and extract statistics from them. It can be clearly seen that the transform descriptors varies as angle of projection varies. It is quite difficult to claim the actual projections that would result in optimized feature set. Hence we obtain Radon descriptors for 0' to 360' in steps of 15' and extract mean and standard deviation for each projection as our Radon feature set. Once Radon transform is extracted, we obtain Zernike moments before classifying or adding the features to database. Zernike like Radon is a shift invariant moments obtained from polar projection of image. Zernike moments are complex. Therefore real components from the moments are extracted as feature descriptor. Another major limitation of using Zernike moment is that the exponent of the dimension increases as number of moments is increased. But for modelling with HMM, dimensions must be normalized to single value domain. Hence after obtaining Zernike moments we normalize each dimension by dividing it with the highest exponent of that dimension. Thus all the feature values are brought in same value domain. Overall methodology is explained with a block diagram VI. Conclusion Signature verification and analysis are part of larger domain of work which finds application in graphology and forensic science. In this work we have presented a Novel technique of Signature Verification by combining Zernike moments with Radon transform values at different angle of projection from the user's Signature pattern and then forming a statistical state machine with HMM and PLSR. Further the technique was improved by the aid of kernel based techniques with the Help of SVM. It gives the poor performance for signature that is not in the training phase. Generally the failure to recognize/verify a signature was due to poor image quality and high similarity between 2 signatures. Recognition and verification ability of the system can be increased by using additional features in the input data set. References [1]. M. J. Alhaddad, D. Mohamad and A. M. Ahsan, “Online Signature Verification Using Probablistic Modeling and Neural Network”, IEEE, (2012) [2]. S. Srivastava and S. Agarwal, “Offline signature verification using grid based feature extraction”, IEEE, (2011) [3]. J. Coetzer, B. M. Herbst and J. A. du Preez, “Offline Signature Verification Using the Discrete Radon Transform and a Hidden Markov Model”, EURASIP Journal on Applied Signal Processing, (2004) [4]. Sangramsing Kayte, Suvarnsing G.Bhable and Jaypalsing Kayte, ―A Review Paper on Multimodal Biometrics System using Fingerprint and Signature‖. IJCA Volume 128 – No.15, October 2015.
  • 4. A Simple Signature Recognition System DOI: 10.9790/1684-12647982 www.iosrjournals.org 82 | Page [5]. Ashwini Pansare, Shalini Bhatia,Handwritten Signature Verification using Neural Network, International Journal of Applied Information Systems (IJAIS) – ISSN : 2249-0868 Foundation of Computer Science FCS, New York, USA Volume 1– No.2, January 2012 [6]. O.C Abikoye, M.A MabayojeR. Ajibade “Offline Signature Recognition & Verification using Neural Network” International Journal of Computer Applications (0975 – 8887) Volume 35– No.2, December 2011 [7]. Ozgunduz, E., Karsligil, E., and Senturk, T. 2005.Off-line Signature Verification and Recognition by Support Vector Machine. Paper presented at the European Signal processing Conference. [8]. Jain, A., Griess, F., and Connel1, S. “Online Signature Recognition”, Pattern Recognition, vol.35,2002, pp 2963-2972. [9]. Shashi Kumar D R, K B Raja, R. K Chhotaray, Sabyasachi Pattanaik, Off-line Signature Verification Based on Fusion of Grid and Global Features Using Neural Networks , International Journal of Engineering Science and Technology Vol. 2(12), 2010, 7035- 7044 [10]. Julio Martínez-R.,Rogelio Alcántara-S.,On-line signature verification based on optimal feature representation and neural network- driven fuzzy reasoning [11]. ICAO, Development of a Logical Data Structure – LDS for Optional Capacity Expansion Technologies, International Civil Aviation Organisation, Tech. Rep., Machine Readable Travel Documents, Revision 1.7, 2004.