SlideShare a Scribd company logo
1 of 5
Download to read offline
International Journal of Engineering, Business and Management (IJEBM)
ISSN: 2456-7817
[Vol-7, Issue-2, Mar-Apr, 2023]
Issue DOI: https://dx.doi.org/10.22161/ijebm.7.2
Article DOI: https://dx.doi.org/10.22161/ijebm.7.2.1
Int. j. eng. bus. manag.
www.aipublications.com Page | 1
Offline Signature Recognition and It’s Forgery Detection
using Machine Learning Technique
Malay Karmakar
Department of Computer Science, IIT Kharagpur, India
Received: 25 Jan 2023; Received in revised form: 25 Feb 2023; Accepted: 05 Mar 2023; Available online: 13 Mar 2023
©2023 The Author(s). Published by AI Publications. This is an open access article under the CC BY license
(https://creativecommons.org/licenses/by/4.0/)
Abstract— Signature verification is an important aspect in today’s World. Signature has been verified in
Banks, Government Agencies, Universities (Degree Verification) etc. Signature can involve in its shape,
size, pressure, speed and angle. From a population of Signatures an original signature can be found out
and distinguished. In this Paper for Forgery signature Detection we use two algorithm viz.Harris
Algorithm and Surf Algorithm. We have also discussed about CNN Algorithm. Moreover in this paper we
take the x-y co-ordinate of the real signature and also the x-y co-ordinate of the forged signature and
compare among the two. We have used Python Programming for plotting the graphs whereas the graph
can be plot using Matlab, R, Microsoft Excel and Python.
Keywords— Python, R, CNN Algorithm, Harris Algorithm, Surf Algorithm, Matlab, Microsoft Excel
INTRODUCTION
Biometrics can literally be defined as the biological
characteristics of aperson that can be used for
identification purposes. The development of a biometric
system has two main objectives: the identification of a
person and the verification of his identity. Generally,
applications of biometrics have been deployed for access
control and monitoring. These applications are not yet
widespread in various organizations such as banks and
financialinstitutions. Biometric systems can classifypeople
based on their physical or behavioral characteristics.
Physical characteristics refer to a person's biological
characteristics, such as finger prints, deoxyribonucleic acid
(DNA), iris, and facial features. These biological
characteristics are unique to each individual and remain
constant over a long periodoftime. Therefore, biometric
systems that rely on physical characteristics are mostly
sufficientlyaccurate and reliable for identification
purposes, including one-to-many comparisons. Behavioral
traits, on the other hand, refer to an individual's behavior,
such as signature, gait, and voice. These traits change over
time, making iteasierfor a skilled Impostertopass.
Therefore, designing an accurate biometric system based
on behavioral characteristicswillbeadifficulttask. Even as
technology advances, handwritten signatures remain the
most widely accepted form of authentication for legal
documents, financial transactions, checks, loan and
mortgage documents, insurance and compliance
documents, commercial contracts, etc. The purpose of
signature verification is to identify forged signatures to
reduce the risk of hacking and crime. Signature
verification systems should automatically differentiate
between biometric samples.
Type of Signature Forgeries:
• Unskilled/Trace-Over Forgery: It appears as a
faint indentation on a piece of paper underneath.
• Skilled Forgery: These are done by perpetrators
that has accesses to one or more samples of the
authentic signatures.
The different types of signature traits are given below:
• Shaky handwriting (static).
• Lifting Pen (Dynamic).
• Letter Proportions (static).
• Signature Dimensions (static).
• Signature Angle (static).
• Close Similarity between two or more signatures
(static).
• Speed of the signature (Dynamic).
• Pressure of the Pen (Dynamic).
Karmakar / Offline Signature Recognition and It’s Forgery Detection Using Machine Learning Technique.
Int. j. eng. bus. manag.
www.aipublications.com Page | 2
• Pressure that changed its pattern (Dynamic).
• The Pattern of Acceleration (Dynamic).
• The Smoothness of Curve (Static).
Fig A. Sample of Signatures (a) Offline Signatures. (b)
Online Signatures
What is CNN (Convolutional Neural Network) Algorithm?
A CNN Algorithm is a subset of Machine Learning
Algorithm. It is one of the various types of Artificial
Neural Networks which is used for different applications
and data types. It is a kind of network architecture for
Deep learning and is specifically used for Image
recognition. It is suitable for application involving natural
language Processing (NLP), Language translation and
speech recognition.
CNN Layers:
There are three kind of CNN Layers viz.
• Convolutional layer.
• Pooling layer.
• Fully Connected Layer.
How Convolutional Neural Networks Works:
A convolutional neural network (CNN) is an artificial
network commonly used inimage recognition and
processing. This type of network
extractsfeaturesfromimagesorotherinputdata using a series
of filters called convolutional layers. These layers are
designed to identify characteristic patterns in the input data
that are important for the task at hand. For example, in this
article, the first convolutional layer canrecognize basic
shapes and edges, while subsequent layerscanrecognize
more complex featuressuchas corners or textures. Once
featuresareidentified,a CNN uses a process called
clustering to reduce the dimensionality of the data and
extract the most important features. This is usually done
using a technique called max pooling. After the data has
been processed throughconvolution and pooling layers, it
is typically passed through one or more fully connected
layers, similar to traditional neural networks. These layers
use the extracted features to make predictions or
classifications based on the input data.
Fig B. Proposed Architecture of the CNN-AE model
Fig C. Example of Forgery Signatures.
Python Program to distinguish an original signature from a
forged One using Graph:
#real signature
X1= [0, 1, 2, 3, 4, 5]
y1= [0, 2, 4, 6, 8, 10]
#forged signature
X2= [2, 3, 4, 5, 6, 7]
y2= [2, 4, 5, 7, 10, 12]
#plotting the graph
Plt.plot (x1, y1, color=’blue’,
Label=”Real signature”)
Plt.plot (x2, y2, color=’red’,
Label=”Forged Signature”)
#adding labels
Plt.xlabel (‘x-axis’)
Plt.xlabel (‘y-axis’)
Karmakar / Offline Signature Recognition and It’s Forgery Detection Using Machine Learning Technique.
Int. j. eng. bus. manag.
www.aipublications.com Page | 3
Plt.title (‘Real vs Forged Signature’)
#showing the legend
Plt.legend ()
#displaying the graph
Plt.show ()
Steps to plot graphs using python Programming:
Plotting graphs in Python is easy and convenient with the
help of various libraries such as Matplotlib,
Seaborn,Pandas and others.Here are the steps to plot a
graph using python.
• Install the libraries:
Before plotting the graph, I need to install the
libraries such as Matplotlib,Seaborn,and
Pandasetc.I can install them using the pip
command.
• Import the libraries:
Once the libraries are installed, I need to
importthem in my program. I can do this by using
the import keyword.
• Data Preparation:
The next step is data preparation. I can use
various methods such as reading from a CSV file,
creating a data frame, etc.
• Create the graph:
Once the data is ready, I can create the graph. I
can do this by using the plot () function of the
Matplotlib library.
• Customize the graph:
I can customize the graph by adding labels,
colors, and other features. I can do this by using
the various functions of the Matplotlib library.
• Display the graph:
• Finally, I can display the graph by using Plt.show
() command.
Support Vector Machines (SVM)?
Support Vector Machines (SVM) is a popular Supervised
Machine Learning algorithm that is based on the concept
of finding a hyperplane in a high-dimensional space that
can separate the data into different classes. The goal of
SVM is to find the best hyperplane that maximizes the
distance between the closest data points of different
classes, which is called the margin. The points of data or
the data points that lie close to the hyperplane are known
as support vectors.SVM can be used both in regression and
classification problems, and it is particularly useful when
dealing with high dimensional data that cannot be easily
visualized.SVM has several advantages ,including its
ability to handle both linear and non-linear data, its
robustness to outliers, and its capacity to work on small or
large datasets.SVMs have found several applications in
various domains, including image classification, text
classification, and bioinformatics.
• Types of SVM?
1) Linear SVM
Linear SVM is used for linearly separable
data, which means if a setofdata can be
divided into two classes with a straight line,
this data is called linearly separable data and
the classifier is used as alinear SVM
classifier.
2) Non-Linear SVM.
Nonlinear SVM is used for data separated
inanonlinearway, which means if thedataset cannot be
classified using a straight line, that data is callednonlinear
data and the classifier used is called a nonlinear SVM
classifier.
Fig D.A Support Vector Machine
Fig F. SVM Algorithm can be used in Face detection,
image classification and text categorization
How does SVM Technique works?
SVMswork by mapping an input space to a higher-
dimensional feature space.It uses kernel functions to
transform input data into a high-dimensional space where
classes become separable.The hyperplane is then used to
Karmakar / Offline Signature Recognition and It’s Forgery Detection Using Machine Learning Technique.
Int. j. eng. bus. manag.
www.aipublications.com Page | 4
separate the classes in the transformed feature space.The
hyperplane with the largest margin or distance between
itself and the closest data points of thetwo classes is
chosen as the final classifier. SVM thus uses a cost
function to know about the optimal hyperplane. It tries to
minimize the error rate or the number of misclassified data
points by adjusting the hyperplane.The regularization
parameterC controls the trade-off between reachingthe
minimum error rate and maximizing the margin.
Fig G. Proposed Diagrams for Signature recognition and
forgery detection
Fig H. Plot of the Python Program using the data points
For Forgery Detection two algorithms are used a) Harris
Algorithm. B) Surf Algorithm.
Harris Algorithm:
Harris' algorithm is a popular feature extraction algorithm
used in computer vision and machine learning todetect
corners in images. It determines the verticesof an image by
analyzing the change in brightness between adjacent pixels
in different directions.
• The Harris algorithm works as follows:
1) Compute the gradient of the image in both x
and y directions.
2) Calculate the products of the gradient for
each pixels.
3) Calculate a sum of squares of products for a
window surrounding each pixel.
4) Calculate the Harris response function value
of each pixel using the determinant and trace
of the windows corresponding covariance
matrix.
5) Apply the threshold to filter out low-quality
corner points.
For Computing the corner response function R of
each pixel location using the following equation:
R= determinant (M)-k*trace^2(M).
Where M is the squared gradient Matrix, trace
(M) is the trace of M, and k is the empirically
determined constant.
Surf Algorithm:
The SURF (Speeded up Robust Features) algorithm is a
feature detection and description algorithm for object
recognition and computer vision tasks. It is used to identify
and describe localfeatures such as edges, corners and
nodes.
• The Surf Algorithm works by analyzing the
intensity, contrast, and orientation of image pixels
in small regions or patches. The algorithm scales
the image, detects the features, and then computes
the features descriptors using the sum of Haar
wavelet response in a surrounding region.
• The key advantage of the surf algorithm over
other feature detection and description algorithms
are its robustness to scale, rotation, and
illumination changes, as well as its ability to
compute features quickly.
• The Surf Algorithm is widely used in various
applications, such as image registration, object
recognition,3D reconstruction, and robotics. It is
implemented in many popular computer vision
libraries, such as Open CV and MATLAB.
Karmakar / Offline Signature Recognition and It’s Forgery Detection Using Machine Learning Technique.
Int. j. eng. bus. manag.
www.aipublications.com Page | 5
PROPOSED WORK
In this paper I have used Support Vector Machine (SVM)
Algorithm to find out the data points of the signature and
also for the forged signature. Then used the Python Code
to plot the Graph between Original Signature and Forged
Signature.
FUTURE WORK AND SUGGESTIONS
Many aspects can be considered in future work, which can
be increasing the number of reference signature Images in
case of both Offline and Online signatures. We can further
use multilingual signature datasets for a large number of
user. Also deep learning can be used for further
verification of the signatures.
REFERENCES
[1] Seungsoo Nam;Hosung Park; Changho Seo; Daeseon Choi;
Forged Signature Distinction Using Convolutional Neural
Network for Feature Extraction; Appl. Sci. 2018,8(2), 153;
23rd
January 2018.
[2] H.Srinivasan; S. N. Srihari; Matthew J.Beal; Machine
Learning for Signature Verification; Center of Excellence
for Document Analysis and Recognition (CEDAR);Buffalo
NY.
[3] Guo, J.K., Doermann, D., Rosenfield, A.: Local
correspondences for detecting random forgeries,
Proceedings of the International Conference on Document
Analysis and Recognition (1997) 319–323.
[4] Z. Hashim; H. M.Ahmed;Ahmed Hussein Alkhayyat; A
Comparative study Among Handwritten Signature
Verification Methods Using Machine Learning
Techniques;15th
October 2022.
[5] M. A. Taha and H. M. Ahmed, “Iris features extraction and
recognition based on the local binary pattern technique,” in
Proceedings of the 2021 International Conference on
Advanced Computer Applications (ACA), pp. 16–21,
Maysan, Iraq, July 2021.
[6] K. Radhika and S B. Gopika, “Online and offline signature
verification: a combined approach,” Procedia Computer
Science, vol. 46, pp. 1593–1600, 2015.
[7] A. Kumar and K. Bhatia, “A survey on offline handwritten
signature verification system using writer dependent and
independent approaches,” in Proceedings of the 2016 2nd
International Conference on Advances in Computing,
Communication, & Automation (ICACCA) (Fall), pp. 1–6,at
Bareilly, India, September 2016.
[8] Jivesh Poddar; Vinanti Parikh; Santosh Kumar Bharti;
Online Signature Recognition and Forgery Detection using
Deep Learning,6-9th
April 2022.

More Related Content

Similar to Offline Signature Recognition and It’s Forgery Detection using Machine Learning Technique

Deep Learning in Text Recognition and Text Detection : A Review
Deep Learning in Text Recognition and Text Detection : A ReviewDeep Learning in Text Recognition and Text Detection : A Review
Deep Learning in Text Recognition and Text Detection : A ReviewIRJET Journal
 
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...IRJET Journal
 
Nt2580 Unit 7 Chapter 12
Nt2580 Unit 7 Chapter 12Nt2580 Unit 7 Chapter 12
Nt2580 Unit 7 Chapter 12Laura Arrigo
 
Highly Secured Bio-Metric Authentication Model with Palm Print Identification
Highly Secured Bio-Metric Authentication Model with Palm Print IdentificationHighly Secured Bio-Metric Authentication Model with Palm Print Identification
Highly Secured Bio-Metric Authentication Model with Palm Print IdentificationIJERA Editor
 
Cyberbullying Detection Using Machine Learning
Cyberbullying Detection Using Machine LearningCyberbullying Detection Using Machine Learning
Cyberbullying Detection Using Machine LearningIRJET Journal
 
Cyberbullying Detection Using Machine Learning
Cyberbullying Detection Using Machine LearningCyberbullying Detection Using Machine Learning
Cyberbullying Detection Using Machine LearningIRJET Journal
 
SILINGO – SIGN LANGUAGE DETECTION/ RECOGNITION USING CONVOLUTIONAL NEURAL NET...
SILINGO – SIGN LANGUAGE DETECTION/ RECOGNITION USING CONVOLUTIONAL NEURAL NET...SILINGO – SIGN LANGUAGE DETECTION/ RECOGNITION USING CONVOLUTIONAL NEURAL NET...
SILINGO – SIGN LANGUAGE DETECTION/ RECOGNITION USING CONVOLUTIONAL NEURAL NET...IRJET Journal
 
IRJET- Sign Language Interpreter
IRJET- Sign Language InterpreterIRJET- Sign Language Interpreter
IRJET- Sign Language InterpreterIRJET Journal
 
Handwritten Digit Recognition Using CNN
Handwritten Digit Recognition Using CNNHandwritten Digit Recognition Using CNN
Handwritten Digit Recognition Using CNNIRJET Journal
 
Sign Language Detection using Action Recognition
Sign Language Detection using Action RecognitionSign Language Detection using Action Recognition
Sign Language Detection using Action RecognitionIRJET Journal
 
A Review On Recognition Of Online Handwriting In Different Scripts
A Review On Recognition Of Online Handwriting In Different ScriptsA Review On Recognition Of Online Handwriting In Different Scripts
A Review On Recognition Of Online Handwriting In Different ScriptsKarla Adamson
 
Sign Language Identification based on Hand Gestures
Sign Language Identification based on Hand GesturesSign Language Identification based on Hand Gestures
Sign Language Identification based on Hand GesturesIRJET Journal
 
IRJET- Intelligent Character Recognition of Handwritten Characters
IRJET- Intelligent Character Recognition of Handwritten CharactersIRJET- Intelligent Character Recognition of Handwritten Characters
IRJET- Intelligent Character Recognition of Handwritten CharactersIRJET Journal
 
Graphical Password Authentication using image Segmentation for Web Based Appl...
Graphical Password Authentication using image Segmentation for Web Based Appl...Graphical Password Authentication using image Segmentation for Web Based Appl...
Graphical Password Authentication using image Segmentation for Web Based Appl...ijtsrd
 
IRJET- Cheque Bounce Detection System using Image Processing
IRJET- Cheque Bounce Detection System using Image ProcessingIRJET- Cheque Bounce Detection System using Image Processing
IRJET- Cheque Bounce Detection System using Image ProcessingIRJET Journal
 
Feature Extraction and Feature Selection using Textual Analysis
Feature Extraction and Feature Selection using Textual AnalysisFeature Extraction and Feature Selection using Textual Analysis
Feature Extraction and Feature Selection using Textual Analysisvivatechijri
 
Artificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification SystemArtificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification SystemIRJET Journal
 

Similar to Offline Signature Recognition and It’s Forgery Detection using Machine Learning Technique (20)

Deep Learning in Text Recognition and Text Detection : A Review
Deep Learning in Text Recognition and Text Detection : A ReviewDeep Learning in Text Recognition and Text Detection : A Review
Deep Learning in Text Recognition and Text Detection : A Review
 
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
 
Nt2580 Unit 7 Chapter 12
Nt2580 Unit 7 Chapter 12Nt2580 Unit 7 Chapter 12
Nt2580 Unit 7 Chapter 12
 
Highly Secured Bio-Metric Authentication Model with Palm Print Identification
Highly Secured Bio-Metric Authentication Model with Palm Print IdentificationHighly Secured Bio-Metric Authentication Model with Palm Print Identification
Highly Secured Bio-Metric Authentication Model with Palm Print Identification
 
Cyberbullying Detection Using Machine Learning
Cyberbullying Detection Using Machine LearningCyberbullying Detection Using Machine Learning
Cyberbullying Detection Using Machine Learning
 
Cyberbullying Detection Using Machine Learning
Cyberbullying Detection Using Machine LearningCyberbullying Detection Using Machine Learning
Cyberbullying Detection Using Machine Learning
 
SILINGO – SIGN LANGUAGE DETECTION/ RECOGNITION USING CONVOLUTIONAL NEURAL NET...
SILINGO – SIGN LANGUAGE DETECTION/ RECOGNITION USING CONVOLUTIONAL NEURAL NET...SILINGO – SIGN LANGUAGE DETECTION/ RECOGNITION USING CONVOLUTIONAL NEURAL NET...
SILINGO – SIGN LANGUAGE DETECTION/ RECOGNITION USING CONVOLUTIONAL NEURAL NET...
 
IRJET- Sign Language Interpreter
IRJET- Sign Language InterpreterIRJET- Sign Language Interpreter
IRJET- Sign Language Interpreter
 
Handwritten Digit Recognition Using CNN
Handwritten Digit Recognition Using CNNHandwritten Digit Recognition Using CNN
Handwritten Digit Recognition Using CNN
 
Sign Language Detection using Action Recognition
Sign Language Detection using Action RecognitionSign Language Detection using Action Recognition
Sign Language Detection using Action Recognition
 
A Review On Recognition Of Online Handwriting In Different Scripts
A Review On Recognition Of Online Handwriting In Different ScriptsA Review On Recognition Of Online Handwriting In Different Scripts
A Review On Recognition Of Online Handwriting In Different Scripts
 
Matrix Mapper
Matrix MapperMatrix Mapper
Matrix Mapper
 
Sign Language Identification based on Hand Gestures
Sign Language Identification based on Hand GesturesSign Language Identification based on Hand Gestures
Sign Language Identification based on Hand Gestures
 
Signature recognition
Signature recognitionSignature recognition
Signature recognition
 
IRJET- Intelligent Character Recognition of Handwritten Characters
IRJET- Intelligent Character Recognition of Handwritten CharactersIRJET- Intelligent Character Recognition of Handwritten Characters
IRJET- Intelligent Character Recognition of Handwritten Characters
 
Graphical Password Authentication using image Segmentation for Web Based Appl...
Graphical Password Authentication using image Segmentation for Web Based Appl...Graphical Password Authentication using image Segmentation for Web Based Appl...
Graphical Password Authentication using image Segmentation for Web Based Appl...
 
Cc4301455457
Cc4301455457Cc4301455457
Cc4301455457
 
IRJET- Cheque Bounce Detection System using Image Processing
IRJET- Cheque Bounce Detection System using Image ProcessingIRJET- Cheque Bounce Detection System using Image Processing
IRJET- Cheque Bounce Detection System using Image Processing
 
Feature Extraction and Feature Selection using Textual Analysis
Feature Extraction and Feature Selection using Textual AnalysisFeature Extraction and Feature Selection using Textual Analysis
Feature Extraction and Feature Selection using Textual Analysis
 
Artificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification SystemArtificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification System
 

More from AI Publications

The Statutory Interpretation of Renewable Energy Based on Syllogism of Britis...
The Statutory Interpretation of Renewable Energy Based on Syllogism of Britis...The Statutory Interpretation of Renewable Energy Based on Syllogism of Britis...
The Statutory Interpretation of Renewable Energy Based on Syllogism of Britis...AI Publications
 
Enhancement of Aqueous Solubility of Piroxicam Using Solvent Deposition System
Enhancement of Aqueous Solubility of Piroxicam Using Solvent Deposition SystemEnhancement of Aqueous Solubility of Piroxicam Using Solvent Deposition System
Enhancement of Aqueous Solubility of Piroxicam Using Solvent Deposition SystemAI Publications
 
Analysis of Value Chain of Cow Milk: The Case of Itang Special Woreda, Gambel...
Analysis of Value Chain of Cow Milk: The Case of Itang Special Woreda, Gambel...Analysis of Value Chain of Cow Milk: The Case of Itang Special Woreda, Gambel...
Analysis of Value Chain of Cow Milk: The Case of Itang Special Woreda, Gambel...AI Publications
 
Minds and Machines: Impact of Emotional Intelligence on Investment Decisions ...
Minds and Machines: Impact of Emotional Intelligence on Investment Decisions ...Minds and Machines: Impact of Emotional Intelligence on Investment Decisions ...
Minds and Machines: Impact of Emotional Intelligence on Investment Decisions ...AI Publications
 
Lung cancer: “Epidemiology and risk factors”
Lung cancer: “Epidemiology and risk factors”Lung cancer: “Epidemiology and risk factors”
Lung cancer: “Epidemiology and risk factors”AI Publications
 
Further analysis on Organic agriculture and organic farming in case of Thaila...
Further analysis on Organic agriculture and organic farming in case of Thaila...Further analysis on Organic agriculture and organic farming in case of Thaila...
Further analysis on Organic agriculture and organic farming in case of Thaila...AI Publications
 
Current Changes in the Role of Agriculture and Agri-Farming Structures in Tha...
Current Changes in the Role of Agriculture and Agri-Farming Structures in Tha...Current Changes in the Role of Agriculture and Agri-Farming Structures in Tha...
Current Changes in the Role of Agriculture and Agri-Farming Structures in Tha...AI Publications
 
Growth, Yield and Economic Advantage of Onion (Allium cepa L.) Varieties in R...
Growth, Yield and Economic Advantage of Onion (Allium cepa L.) Varieties in R...Growth, Yield and Economic Advantage of Onion (Allium cepa L.) Varieties in R...
Growth, Yield and Economic Advantage of Onion (Allium cepa L.) Varieties in R...AI Publications
 
Evaluation of In-vitro neuroprotective effect of Ethanolic extract of Canariu...
Evaluation of In-vitro neuroprotective effect of Ethanolic extract of Canariu...Evaluation of In-vitro neuroprotective effect of Ethanolic extract of Canariu...
Evaluation of In-vitro neuroprotective effect of Ethanolic extract of Canariu...AI Publications
 
Neuroprotective Herbal Plants - A Review
Neuroprotective Herbal Plants - A ReviewNeuroprotective Herbal Plants - A Review
Neuroprotective Herbal Plants - A ReviewAI Publications
 
A phytochemical and pharmacological review on canarium solomonense
A phytochemical and pharmacological review on canarium solomonenseA phytochemical and pharmacological review on canarium solomonense
A phytochemical and pharmacological review on canarium solomonenseAI Publications
 
Influences of Digital Marketing in the Buying Decisions of College Students i...
Influences of Digital Marketing in the Buying Decisions of College Students i...Influences of Digital Marketing in the Buying Decisions of College Students i...
Influences of Digital Marketing in the Buying Decisions of College Students i...AI Publications
 
A Study on Performance of the Karnataka State Cooperative Agriculture & Rural...
A Study on Performance of the Karnataka State Cooperative Agriculture & Rural...A Study on Performance of the Karnataka State Cooperative Agriculture & Rural...
A Study on Performance of the Karnataka State Cooperative Agriculture & Rural...AI Publications
 
Imaging of breast hamartomas
Imaging of breast hamartomasImaging of breast hamartomas
Imaging of breast hamartomasAI Publications
 
A retrospective study on ovarian cancer with a median follow-up of 36 months ...
A retrospective study on ovarian cancer with a median follow-up of 36 months ...A retrospective study on ovarian cancer with a median follow-up of 36 months ...
A retrospective study on ovarian cancer with a median follow-up of 36 months ...AI Publications
 
More analysis on environment protection and sustainable agriculture - A case ...
More analysis on environment protection and sustainable agriculture - A case ...More analysis on environment protection and sustainable agriculture - A case ...
More analysis on environment protection and sustainable agriculture - A case ...AI Publications
 
Assessment of Growth and Yield Performance of Twelve Different Rice Varieties...
Assessment of Growth and Yield Performance of Twelve Different Rice Varieties...Assessment of Growth and Yield Performance of Twelve Different Rice Varieties...
Assessment of Growth and Yield Performance of Twelve Different Rice Varieties...AI Publications
 
Cultivating Proactive Cybersecurity Culture among IT Professional to Combat E...
Cultivating Proactive Cybersecurity Culture among IT Professional to Combat E...Cultivating Proactive Cybersecurity Culture among IT Professional to Combat E...
Cultivating Proactive Cybersecurity Culture among IT Professional to Combat E...AI Publications
 
The Impacts of Viral Hepatitis on Liver Enzymes and Bilrubin
The Impacts of Viral Hepatitis on Liver Enzymes and BilrubinThe Impacts of Viral Hepatitis on Liver Enzymes and Bilrubin
The Impacts of Viral Hepatitis on Liver Enzymes and BilrubinAI Publications
 
Determinants of Women Empowerment in Bishoftu Town; Oromia Regional State of ...
Determinants of Women Empowerment in Bishoftu Town; Oromia Regional State of ...Determinants of Women Empowerment in Bishoftu Town; Oromia Regional State of ...
Determinants of Women Empowerment in Bishoftu Town; Oromia Regional State of ...AI Publications
 

More from AI Publications (20)

The Statutory Interpretation of Renewable Energy Based on Syllogism of Britis...
The Statutory Interpretation of Renewable Energy Based on Syllogism of Britis...The Statutory Interpretation of Renewable Energy Based on Syllogism of Britis...
The Statutory Interpretation of Renewable Energy Based on Syllogism of Britis...
 
Enhancement of Aqueous Solubility of Piroxicam Using Solvent Deposition System
Enhancement of Aqueous Solubility of Piroxicam Using Solvent Deposition SystemEnhancement of Aqueous Solubility of Piroxicam Using Solvent Deposition System
Enhancement of Aqueous Solubility of Piroxicam Using Solvent Deposition System
 
Analysis of Value Chain of Cow Milk: The Case of Itang Special Woreda, Gambel...
Analysis of Value Chain of Cow Milk: The Case of Itang Special Woreda, Gambel...Analysis of Value Chain of Cow Milk: The Case of Itang Special Woreda, Gambel...
Analysis of Value Chain of Cow Milk: The Case of Itang Special Woreda, Gambel...
 
Minds and Machines: Impact of Emotional Intelligence on Investment Decisions ...
Minds and Machines: Impact of Emotional Intelligence on Investment Decisions ...Minds and Machines: Impact of Emotional Intelligence on Investment Decisions ...
Minds and Machines: Impact of Emotional Intelligence on Investment Decisions ...
 
Lung cancer: “Epidemiology and risk factors”
Lung cancer: “Epidemiology and risk factors”Lung cancer: “Epidemiology and risk factors”
Lung cancer: “Epidemiology and risk factors”
 
Further analysis on Organic agriculture and organic farming in case of Thaila...
Further analysis on Organic agriculture and organic farming in case of Thaila...Further analysis on Organic agriculture and organic farming in case of Thaila...
Further analysis on Organic agriculture and organic farming in case of Thaila...
 
Current Changes in the Role of Agriculture and Agri-Farming Structures in Tha...
Current Changes in the Role of Agriculture and Agri-Farming Structures in Tha...Current Changes in the Role of Agriculture and Agri-Farming Structures in Tha...
Current Changes in the Role of Agriculture and Agri-Farming Structures in Tha...
 
Growth, Yield and Economic Advantage of Onion (Allium cepa L.) Varieties in R...
Growth, Yield and Economic Advantage of Onion (Allium cepa L.) Varieties in R...Growth, Yield and Economic Advantage of Onion (Allium cepa L.) Varieties in R...
Growth, Yield and Economic Advantage of Onion (Allium cepa L.) Varieties in R...
 
Evaluation of In-vitro neuroprotective effect of Ethanolic extract of Canariu...
Evaluation of In-vitro neuroprotective effect of Ethanolic extract of Canariu...Evaluation of In-vitro neuroprotective effect of Ethanolic extract of Canariu...
Evaluation of In-vitro neuroprotective effect of Ethanolic extract of Canariu...
 
Neuroprotective Herbal Plants - A Review
Neuroprotective Herbal Plants - A ReviewNeuroprotective Herbal Plants - A Review
Neuroprotective Herbal Plants - A Review
 
A phytochemical and pharmacological review on canarium solomonense
A phytochemical and pharmacological review on canarium solomonenseA phytochemical and pharmacological review on canarium solomonense
A phytochemical and pharmacological review on canarium solomonense
 
Influences of Digital Marketing in the Buying Decisions of College Students i...
Influences of Digital Marketing in the Buying Decisions of College Students i...Influences of Digital Marketing in the Buying Decisions of College Students i...
Influences of Digital Marketing in the Buying Decisions of College Students i...
 
A Study on Performance of the Karnataka State Cooperative Agriculture & Rural...
A Study on Performance of the Karnataka State Cooperative Agriculture & Rural...A Study on Performance of the Karnataka State Cooperative Agriculture & Rural...
A Study on Performance of the Karnataka State Cooperative Agriculture & Rural...
 
Imaging of breast hamartomas
Imaging of breast hamartomasImaging of breast hamartomas
Imaging of breast hamartomas
 
A retrospective study on ovarian cancer with a median follow-up of 36 months ...
A retrospective study on ovarian cancer with a median follow-up of 36 months ...A retrospective study on ovarian cancer with a median follow-up of 36 months ...
A retrospective study on ovarian cancer with a median follow-up of 36 months ...
 
More analysis on environment protection and sustainable agriculture - A case ...
More analysis on environment protection and sustainable agriculture - A case ...More analysis on environment protection and sustainable agriculture - A case ...
More analysis on environment protection and sustainable agriculture - A case ...
 
Assessment of Growth and Yield Performance of Twelve Different Rice Varieties...
Assessment of Growth and Yield Performance of Twelve Different Rice Varieties...Assessment of Growth and Yield Performance of Twelve Different Rice Varieties...
Assessment of Growth and Yield Performance of Twelve Different Rice Varieties...
 
Cultivating Proactive Cybersecurity Culture among IT Professional to Combat E...
Cultivating Proactive Cybersecurity Culture among IT Professional to Combat E...Cultivating Proactive Cybersecurity Culture among IT Professional to Combat E...
Cultivating Proactive Cybersecurity Culture among IT Professional to Combat E...
 
The Impacts of Viral Hepatitis on Liver Enzymes and Bilrubin
The Impacts of Viral Hepatitis on Liver Enzymes and BilrubinThe Impacts of Viral Hepatitis on Liver Enzymes and Bilrubin
The Impacts of Viral Hepatitis on Liver Enzymes and Bilrubin
 
Determinants of Women Empowerment in Bishoftu Town; Oromia Regional State of ...
Determinants of Women Empowerment in Bishoftu Town; Oromia Regional State of ...Determinants of Women Empowerment in Bishoftu Town; Oromia Regional State of ...
Determinants of Women Empowerment in Bishoftu Town; Oromia Regional State of ...
 

Recently uploaded

Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditChapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditNhtLNguyn9
 
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCRalexsharmaa01
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
PB Project 1: Exploring Your Personal Brand
PB Project 1: Exploring Your Personal BrandPB Project 1: Exploring Your Personal Brand
PB Project 1: Exploring Your Personal BrandSharisaBethune
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Riya Pathan
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
Entrepreneurship lessons in Philippines
Entrepreneurship lessons in  PhilippinesEntrepreneurship lessons in  Philippines
Entrepreneurship lessons in PhilippinesDavidSamuel525586
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environmentelijahj01012
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxsaniyaimamuddin
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxappkodes
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 

Recently uploaded (20)

Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditChapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal audit
 
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
PB Project 1: Exploring Your Personal Brand
PB Project 1: Exploring Your Personal BrandPB Project 1: Exploring Your Personal Brand
PB Project 1: Exploring Your Personal Brand
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
Entrepreneurship lessons in Philippines
Entrepreneurship lessons in  PhilippinesEntrepreneurship lessons in  Philippines
Entrepreneurship lessons in Philippines
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environment
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptx
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 

Offline Signature Recognition and It’s Forgery Detection using Machine Learning Technique

  • 1. International Journal of Engineering, Business and Management (IJEBM) ISSN: 2456-7817 [Vol-7, Issue-2, Mar-Apr, 2023] Issue DOI: https://dx.doi.org/10.22161/ijebm.7.2 Article DOI: https://dx.doi.org/10.22161/ijebm.7.2.1 Int. j. eng. bus. manag. www.aipublications.com Page | 1 Offline Signature Recognition and It’s Forgery Detection using Machine Learning Technique Malay Karmakar Department of Computer Science, IIT Kharagpur, India Received: 25 Jan 2023; Received in revised form: 25 Feb 2023; Accepted: 05 Mar 2023; Available online: 13 Mar 2023 ©2023 The Author(s). Published by AI Publications. This is an open access article under the CC BY license (https://creativecommons.org/licenses/by/4.0/) Abstract— Signature verification is an important aspect in today’s World. Signature has been verified in Banks, Government Agencies, Universities (Degree Verification) etc. Signature can involve in its shape, size, pressure, speed and angle. From a population of Signatures an original signature can be found out and distinguished. In this Paper for Forgery signature Detection we use two algorithm viz.Harris Algorithm and Surf Algorithm. We have also discussed about CNN Algorithm. Moreover in this paper we take the x-y co-ordinate of the real signature and also the x-y co-ordinate of the forged signature and compare among the two. We have used Python Programming for plotting the graphs whereas the graph can be plot using Matlab, R, Microsoft Excel and Python. Keywords— Python, R, CNN Algorithm, Harris Algorithm, Surf Algorithm, Matlab, Microsoft Excel INTRODUCTION Biometrics can literally be defined as the biological characteristics of aperson that can be used for identification purposes. The development of a biometric system has two main objectives: the identification of a person and the verification of his identity. Generally, applications of biometrics have been deployed for access control and monitoring. These applications are not yet widespread in various organizations such as banks and financialinstitutions. Biometric systems can classifypeople based on their physical or behavioral characteristics. Physical characteristics refer to a person's biological characteristics, such as finger prints, deoxyribonucleic acid (DNA), iris, and facial features. These biological characteristics are unique to each individual and remain constant over a long periodoftime. Therefore, biometric systems that rely on physical characteristics are mostly sufficientlyaccurate and reliable for identification purposes, including one-to-many comparisons. Behavioral traits, on the other hand, refer to an individual's behavior, such as signature, gait, and voice. These traits change over time, making iteasierfor a skilled Impostertopass. Therefore, designing an accurate biometric system based on behavioral characteristicswillbeadifficulttask. Even as technology advances, handwritten signatures remain the most widely accepted form of authentication for legal documents, financial transactions, checks, loan and mortgage documents, insurance and compliance documents, commercial contracts, etc. The purpose of signature verification is to identify forged signatures to reduce the risk of hacking and crime. Signature verification systems should automatically differentiate between biometric samples. Type of Signature Forgeries: • Unskilled/Trace-Over Forgery: It appears as a faint indentation on a piece of paper underneath. • Skilled Forgery: These are done by perpetrators that has accesses to one or more samples of the authentic signatures. The different types of signature traits are given below: • Shaky handwriting (static). • Lifting Pen (Dynamic). • Letter Proportions (static). • Signature Dimensions (static). • Signature Angle (static). • Close Similarity between two or more signatures (static). • Speed of the signature (Dynamic). • Pressure of the Pen (Dynamic).
  • 2. Karmakar / Offline Signature Recognition and It’s Forgery Detection Using Machine Learning Technique. Int. j. eng. bus. manag. www.aipublications.com Page | 2 • Pressure that changed its pattern (Dynamic). • The Pattern of Acceleration (Dynamic). • The Smoothness of Curve (Static). Fig A. Sample of Signatures (a) Offline Signatures. (b) Online Signatures What is CNN (Convolutional Neural Network) Algorithm? A CNN Algorithm is a subset of Machine Learning Algorithm. It is one of the various types of Artificial Neural Networks which is used for different applications and data types. It is a kind of network architecture for Deep learning and is specifically used for Image recognition. It is suitable for application involving natural language Processing (NLP), Language translation and speech recognition. CNN Layers: There are three kind of CNN Layers viz. • Convolutional layer. • Pooling layer. • Fully Connected Layer. How Convolutional Neural Networks Works: A convolutional neural network (CNN) is an artificial network commonly used inimage recognition and processing. This type of network extractsfeaturesfromimagesorotherinputdata using a series of filters called convolutional layers. These layers are designed to identify characteristic patterns in the input data that are important for the task at hand. For example, in this article, the first convolutional layer canrecognize basic shapes and edges, while subsequent layerscanrecognize more complex featuressuchas corners or textures. Once featuresareidentified,a CNN uses a process called clustering to reduce the dimensionality of the data and extract the most important features. This is usually done using a technique called max pooling. After the data has been processed throughconvolution and pooling layers, it is typically passed through one or more fully connected layers, similar to traditional neural networks. These layers use the extracted features to make predictions or classifications based on the input data. Fig B. Proposed Architecture of the CNN-AE model Fig C. Example of Forgery Signatures. Python Program to distinguish an original signature from a forged One using Graph: #real signature X1= [0, 1, 2, 3, 4, 5] y1= [0, 2, 4, 6, 8, 10] #forged signature X2= [2, 3, 4, 5, 6, 7] y2= [2, 4, 5, 7, 10, 12] #plotting the graph Plt.plot (x1, y1, color=’blue’, Label=”Real signature”) Plt.plot (x2, y2, color=’red’, Label=”Forged Signature”) #adding labels Plt.xlabel (‘x-axis’) Plt.xlabel (‘y-axis’)
  • 3. Karmakar / Offline Signature Recognition and It’s Forgery Detection Using Machine Learning Technique. Int. j. eng. bus. manag. www.aipublications.com Page | 3 Plt.title (‘Real vs Forged Signature’) #showing the legend Plt.legend () #displaying the graph Plt.show () Steps to plot graphs using python Programming: Plotting graphs in Python is easy and convenient with the help of various libraries such as Matplotlib, Seaborn,Pandas and others.Here are the steps to plot a graph using python. • Install the libraries: Before plotting the graph, I need to install the libraries such as Matplotlib,Seaborn,and Pandasetc.I can install them using the pip command. • Import the libraries: Once the libraries are installed, I need to importthem in my program. I can do this by using the import keyword. • Data Preparation: The next step is data preparation. I can use various methods such as reading from a CSV file, creating a data frame, etc. • Create the graph: Once the data is ready, I can create the graph. I can do this by using the plot () function of the Matplotlib library. • Customize the graph: I can customize the graph by adding labels, colors, and other features. I can do this by using the various functions of the Matplotlib library. • Display the graph: • Finally, I can display the graph by using Plt.show () command. Support Vector Machines (SVM)? Support Vector Machines (SVM) is a popular Supervised Machine Learning algorithm that is based on the concept of finding a hyperplane in a high-dimensional space that can separate the data into different classes. The goal of SVM is to find the best hyperplane that maximizes the distance between the closest data points of different classes, which is called the margin. The points of data or the data points that lie close to the hyperplane are known as support vectors.SVM can be used both in regression and classification problems, and it is particularly useful when dealing with high dimensional data that cannot be easily visualized.SVM has several advantages ,including its ability to handle both linear and non-linear data, its robustness to outliers, and its capacity to work on small or large datasets.SVMs have found several applications in various domains, including image classification, text classification, and bioinformatics. • Types of SVM? 1) Linear SVM Linear SVM is used for linearly separable data, which means if a setofdata can be divided into two classes with a straight line, this data is called linearly separable data and the classifier is used as alinear SVM classifier. 2) Non-Linear SVM. Nonlinear SVM is used for data separated inanonlinearway, which means if thedataset cannot be classified using a straight line, that data is callednonlinear data and the classifier used is called a nonlinear SVM classifier. Fig D.A Support Vector Machine Fig F. SVM Algorithm can be used in Face detection, image classification and text categorization How does SVM Technique works? SVMswork by mapping an input space to a higher- dimensional feature space.It uses kernel functions to transform input data into a high-dimensional space where classes become separable.The hyperplane is then used to
  • 4. Karmakar / Offline Signature Recognition and It’s Forgery Detection Using Machine Learning Technique. Int. j. eng. bus. manag. www.aipublications.com Page | 4 separate the classes in the transformed feature space.The hyperplane with the largest margin or distance between itself and the closest data points of thetwo classes is chosen as the final classifier. SVM thus uses a cost function to know about the optimal hyperplane. It tries to minimize the error rate or the number of misclassified data points by adjusting the hyperplane.The regularization parameterC controls the trade-off between reachingthe minimum error rate and maximizing the margin. Fig G. Proposed Diagrams for Signature recognition and forgery detection Fig H. Plot of the Python Program using the data points For Forgery Detection two algorithms are used a) Harris Algorithm. B) Surf Algorithm. Harris Algorithm: Harris' algorithm is a popular feature extraction algorithm used in computer vision and machine learning todetect corners in images. It determines the verticesof an image by analyzing the change in brightness between adjacent pixels in different directions. • The Harris algorithm works as follows: 1) Compute the gradient of the image in both x and y directions. 2) Calculate the products of the gradient for each pixels. 3) Calculate a sum of squares of products for a window surrounding each pixel. 4) Calculate the Harris response function value of each pixel using the determinant and trace of the windows corresponding covariance matrix. 5) Apply the threshold to filter out low-quality corner points. For Computing the corner response function R of each pixel location using the following equation: R= determinant (M)-k*trace^2(M). Where M is the squared gradient Matrix, trace (M) is the trace of M, and k is the empirically determined constant. Surf Algorithm: The SURF (Speeded up Robust Features) algorithm is a feature detection and description algorithm for object recognition and computer vision tasks. It is used to identify and describe localfeatures such as edges, corners and nodes. • The Surf Algorithm works by analyzing the intensity, contrast, and orientation of image pixels in small regions or patches. The algorithm scales the image, detects the features, and then computes the features descriptors using the sum of Haar wavelet response in a surrounding region. • The key advantage of the surf algorithm over other feature detection and description algorithms are its robustness to scale, rotation, and illumination changes, as well as its ability to compute features quickly. • The Surf Algorithm is widely used in various applications, such as image registration, object recognition,3D reconstruction, and robotics. It is implemented in many popular computer vision libraries, such as Open CV and MATLAB.
  • 5. Karmakar / Offline Signature Recognition and It’s Forgery Detection Using Machine Learning Technique. Int. j. eng. bus. manag. www.aipublications.com Page | 5 PROPOSED WORK In this paper I have used Support Vector Machine (SVM) Algorithm to find out the data points of the signature and also for the forged signature. Then used the Python Code to plot the Graph between Original Signature and Forged Signature. FUTURE WORK AND SUGGESTIONS Many aspects can be considered in future work, which can be increasing the number of reference signature Images in case of both Offline and Online signatures. We can further use multilingual signature datasets for a large number of user. Also deep learning can be used for further verification of the signatures. REFERENCES [1] Seungsoo Nam;Hosung Park; Changho Seo; Daeseon Choi; Forged Signature Distinction Using Convolutional Neural Network for Feature Extraction; Appl. Sci. 2018,8(2), 153; 23rd January 2018. [2] H.Srinivasan; S. N. Srihari; Matthew J.Beal; Machine Learning for Signature Verification; Center of Excellence for Document Analysis and Recognition (CEDAR);Buffalo NY. [3] Guo, J.K., Doermann, D., Rosenfield, A.: Local correspondences for detecting random forgeries, Proceedings of the International Conference on Document Analysis and Recognition (1997) 319–323. [4] Z. Hashim; H. M.Ahmed;Ahmed Hussein Alkhayyat; A Comparative study Among Handwritten Signature Verification Methods Using Machine Learning Techniques;15th October 2022. [5] M. A. Taha and H. M. Ahmed, “Iris features extraction and recognition based on the local binary pattern technique,” in Proceedings of the 2021 International Conference on Advanced Computer Applications (ACA), pp. 16–21, Maysan, Iraq, July 2021. [6] K. Radhika and S B. Gopika, “Online and offline signature verification: a combined approach,” Procedia Computer Science, vol. 46, pp. 1593–1600, 2015. [7] A. Kumar and K. Bhatia, “A survey on offline handwritten signature verification system using writer dependent and independent approaches,” in Proceedings of the 2016 2nd International Conference on Advances in Computing, Communication, & Automation (ICACCA) (Fall), pp. 1–6,at Bareilly, India, September 2016. [8] Jivesh Poddar; Vinanti Parikh; Santosh Kumar Bharti; Online Signature Recognition and Forgery Detection using Deep Learning,6-9th April 2022.