SlideShare a Scribd company logo
1 of 6
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 443
AN OFFLINE SIGNATURE RECOGNITION AND VERIFICATION
SYSTEM BASED ON NEURAL NETWORK
Sameera Khan1
, Avinash Dhole2
1
M-Tech IV Semester, CSE, RITEE, Raipur, India
2
Associate Professor, Department of Computer Science and Engineering, RITEE, Raipur, India
Abstract
Various techniques are already introduced for personal identification and verification based on different types of biometrics
which can be physiological or behavioral. Signatures lies in the category of behavioral biometric which can distort or changed
with course of time. Signatures are considered to be most promising authentication method in all legal and financial documents.
It is necessary to verify signers and their respective signatures. This paper presents an Offline Signature recognition and
verification system(SRVS). In this system signature database of signature images is created, followed by image preprocessing,
feature extraction, neural network design and training, and classification of signature as genuine or counterfeit.
Keywords: biometrics, neural network design, feature extraction, classification etc.
--------------------------------------------------------------------***----------------------------------------------------------------------
1. INTRODUCTION
Signatures are widely accepted as a official means to verify
legal documents, financial documents and also for personal
identification. Due to the same signatures are most popular
behavioral biometric used for authentication and
verification. So it is necessary to create a robust and
efficient verifier which can help in keeping a track on
increasing frauds and crimes related to signatures. Every
individual has different signature with some unambiguous
behavioral traits. Since it is a behavioral biometric, it is
seldom identical. Signatures are sometimes nothing more
than the set of some unreadable alphabets or a pattern
consisting of lines, curves, blobs etc. That is why it is
considered as a special case of pattern matching.
Signatures are accepted as a biometric because it possess
properties like-universal use and acceptance, have some
measurable properties, unique for every individual, easy to
compare, and reliability.
There are two types of signature verification processes-
online and offline. When signatures are captured live with
the help of some digitizing devices like stylus operated
PDAs, the systems are known as online verification system
whereas if static images of signatures are used to represent
input data set, it is known as offline verification system.
Both types of the verification system consists of phases like
data acquisition, image preprocessing, feature extraction,
designing and training of the classifier and classification.
Selection of powerful feature set is a vital process. Proper
features can be used to identify different types of forgeries.
A combination of appropriate feature set and type of
classifier can yield better results.
This paper presents an offline approach for signature
recognition and verification based on radial basis function
network. A set of nine global features is used to generate
feature vector.
2. METHODOLOGY
Offline approach uses static image patterns of signatures for
generating data set. Five images are taken from each
individual for training the network.In preprocessing stage,
images are cleaned in order to get rid of any useless
information present in it. Preprocessing involves image
resizing, gray scale conversion, noise reduction,
thresholding, and skeletonization.
Some global features are extracted from the preprocessed
image in feature extraction phase. In this system nine
features are extracted. These extracted feature set is
characterized by a matrix to form a feature vector which is
the condensed depiction of the input data set. This feature
vector acts as an input to the neural network for training.
Artificial neural network used in this system is the radial
basis function network which uses supervised learning i.e.
target values are also provided to the network besides the
feature vector. Radius of the neurons is set using the value
of spread constant.
A new signature image under examination is selected and all
nine features are extracted and fed to the RBFN classifier
which classifies it as genuine or forged signature based on
the output and tolerance limit. Signatures are not always
same even when made by same signer. Due to the same
features extracted each time may vary. That is why some
tolerance limit is necessary.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 444
Fig -1: Flowchart of SRVS
3. DATA ACQUISITION
Data acquisition is the method of sampling signals that
figure out real world physical conditions and digitizing
resulting samples that can be easily processed. There are
two wide classifications of acquisition models:
1) Static Model: In this model features are extracted from a
earlier stored images. Image is characterized as function of x
and y.
ƒ (x, y) = 1 for each recorded coordinate else = 0;
2) Dynamic Model: In this model features are achieved
online from the individual signer. Image is represented as
function of distance, time and pressure.
ƒ (t) = { x(t), y(t), p(t)};
Given that this system is an offline signature verification
technique, it uses static model for data acquisition.the
dataset is generated by the images of signatures. These
signatures are done on a piece of paper by a signer. Each
signer is asked to give ten specimens of their signatures and
a scanned copy of these signatures is stored in an image
database. 63 points X 17 characters bounding box is used as
reference.
4. PREPROCESSING
Preprocessing is basically an image enhancement technique.
The signature images saved in a signature database are
preprocessed so as to improve the quality of dataset, to
obtain better reult and to make the classification task
simpler. Image preprocessing includes operations like gray
scale conversion, resizing, thresholding, Noise Reduction
and Skeletonization.
4.1 Grayscale Conversion
Since we are interested only in the signature pattern and not
in its color, color information is irrelevant. That is why a
color signature image is converted into grayscale image. .
Gray images are composed exclusively of shades of gray,
varied from black at the weakest intensity to white at the
strongest.
Fig -2: color and gray signature images
4.2 Noise Reduction
Due to the presence of insufficient light, dirt in camera lens,
fault in scanner or quality of paper some disturbances can
occur as noise in image signal. A filtering function is used to
eliminate the noises in the image.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 445
Fig 3: Noisy and filtered signature images
4.3 Skeletonization
It is also known as medial axis transformation. It reduces the
width of objects to single pixel. Skeletonization is done by
recursive erosion over the image until its medial axis
remains. It is also known as thinning. The outcome of
skeletoniztion is a binary image constituiting only of the
objects medial axis.
Fig 4: Original and skeletonized signature images
4.4 Thresholding
It is a segmentation technique. In Thresholding reference
value T is set which is known as threshold, any pixel having
intensity greater than T will be assigned a highest value in
the gray scale whereas any pixel having intensity value less
than T will be assigned a lowest value in the gray scale.
Thesholding gives a binary image i.e. it consists of two gray
levels.
Fig 5: Original and thresholded signature images
5. FEATURE EXTRACTION
For pattern matching process, one important aspect is
feature extraction. In this process the input data set is
represented on the basis of values of some features. These
feature values are presented in form of matrix to create a
feature vector.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 446
In this system a set of nine global features are used which
are described as follows-
 Image Area: total number of black pixels in the test
image.
 Signature pure width: maximum of exact number of
black pixels present in each horizontal scan line.
 Signature pure Height: maximum of exact number
of black pixels present in each vertical scan line.
 Aspect ratio.: Ratio of width to height component of
an image is known as aspect ratio.
Aspect Ratio= pure width/ pure Height
 Maximum Vertical Projection: sum of all the pixels
along the columns in a skeletonized image is vertical
projection. The vertical projection is define as :
V(j)=∑ I(i,j)
 Maximum Horizontal Projection: sum of all the
pixels along the row in a skeletonized image is
horizontal projection. The horizontal projection is
define as :
H(i)= ∑ I(i,j)
 Number of Edge Point (En): An edge point is
defined as a signature point that has only one 8-
connected neighbor.
 Centroid x-coordinate: Centroid can be defined as
the center of mass of any geometric object. Any
pixel location is identified by an ordered pair.
Centroid x-coordinate represents x coordinate value
of the calculated location of center of mass
 Centroid y-coordinate: Centroid y-coordinate
represents y coordinate value of the calculated
location of center of mass.
6. NETWORK DESIGN AND TRAINING
Artificial neural networks are very promising in the field of
pattern matching. In this signature verifier, radial basis
function network is used as classifier. RBFNs are trained by
using supervised learning i.e. feature vector and the target
vectors both are needed. Sensitivity of network is set by
using spread constant value which signifies the width of
transfer function plot. Higher the value of spread lower is
the sensitivity and vice versa.
7. CLASSIFICATION
With the specified feature vector, target vector and spread
constant value a network is trained. This trained network is
now set for classification of the new signatures in one of the
input classes. A test signature is used to extract the features
and the newly extracted features are fed to the trained
network which classifies it as genuine or forge with respect
to the output value in the corresponding class and a preset
threshold value. Threshold value is used to specify tolerance
limit of the network.
8. RESULTS
In the above discussed system, an offline signature
verification system is designed using radial basis function
network. Each signer provides five specimen signatures
which are saved in the database, a set of nine global features
are extracted from this database to generate feature vector
and a network is trained using these features. Observed FAR
and FRR are . The results are shown as follows-
Fig 6: Output Screen showing classification result
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 447
Fig 7: Output Screen showing classification result of forged signature
9. CONCLUSION
This paper presents design and implementation of an
effective offline signature recognition and verification
system using radial basis function network. The false
acceptance rate (FAR) or type-I error is found to be 5% and
false rejection rate (FRR) or type-II error is found to be 7%.
REFERENCES
[1] L.Basavaraj, R.D Sudhaker Samuel: “Offline-line
Signature Verification and Recognition: An
Approach Based on Four Speed Stroke
Angle” International Journal of Recent Trends in
Engineering, Vol 2, No. 3, November 2009
[2] Vu Nguyen, Michael Blumenstein , Graham
Leedham, Global Features for the Off-Line
Signature Verification Problem 10th International
Conference on Document Analysis and Recognition,
2009.
[3] Shashi Kumar D R, K B Raja, R. K Chhotaray,
Sabyasachi Pattanaik, Off-line Signature
Verification Based on Fusion of Grid and Global
Features Using Neural Networks , International
Journal of Engineering Science and Technology
Vol. 2(12), 2010, 7035-7044
[4] Ashwini Pansare, Shalini Bhatia,Handwritten
Signature Verification using Neural Network,
International Journal of Applied Information
Systems (IJAIS) – ISSN : 2249-0868 Foundation of
Computer Science FCS, New York, USA Volume
1– No.2, January 2012
[5] Prashanth C. R. and K. B. Raja, Off-line Signature
Verification Based on Angular Features,
International Journal of Modeling and Optimization,
Vol. 2, No. 4, August 2012
[6] Julio Martínez-R.,Rogelio Alcántara-S.,On-line
signature verification based on optimal feature
representation and neural-network-driven fuzzy
reasoning
[7] Miguel A. Ferrer, Jesus B. Alonso, and Carlos M.
Travieso “Offline Geometric Parameters for
automatic Signature Verification Using Fixed-Point
Arithmetic” IEEE Transactions On Pattern Analysis
And Machine Intelligence, VOL. 27, NO. 6, JUNE
2005
[8] Manasjyoti Bhuyan, Kandarpa Kumar Sarma and
Hirendra Das,Signature Recognition and
Verification using Hybrid Features and Clustered
Artificial Neural Network(ANN)s International
Journal of Electrical and Computer Engineering 5:2
2010
[9] O.C Abikoye , M.A Mabayoje, R. Ajibade “Offline
Signature Recognition & Verification using Neural
Network” International Journal of Computer
Applications (0975 – 8887) Volume 35– No.2,
December 2011
[10] Ms.Vibha Pandey ,Ms. Sanjivani
Shantaiya,“Signature Verification Using
Morphological Features Based on Artificial Neural
Network” International Journal of Advanced
Research in Computer Science and Software
Engineering Volume 2, Issue 7, July 2012
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 448
BIOGRAPHIES
Sameera Khan is a P. G Student (M. Tech) in the
Department of Computer Science and Engineering, Raipur
Institute of Technology, Raipur(C.G). She received her
Bachelor of Engineering (CSE) in 2008 from Raipur
Institute of Technology, Raipur affilated to Pt.Ravishankar
University,Raipur (C.G).Her research interest are Image
Processing and neural network.
Avinash Dhole is an Associate Professor and Head in
Computer Science and Engineering Department, in Raipur
Institute Of Technology, Raipur, (C.G.) . His research
interests include Digital Image Processing, Compilers,
Automata Theory, Neural Network, Artificial Intelligence,
Information and Network Security

More Related Content

What's hot

Project Synopsis
Project SynopsisProject Synopsis
Project Synopsis
Paras Garg
 
Handwritten Text Recognition and Digital Text Conversion
Handwritten Text Recognition and Digital Text ConversionHandwritten Text Recognition and Digital Text Conversion
Handwritten Text Recognition and Digital Text Conversion
ijtsrd
 
Online signature recognition
Online signature recognitionOnline signature recognition
Online signature recognition
Piyush Mittal
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
Asim Kumar Pathak
 
Automatic handwriting recognition
Automatic handwriting recognitionAutomatic handwriting recognition
Automatic handwriting recognition
BIJIT GHOSH
 

What's hot (20)

Image processing Presentation
Image processing PresentationImage processing Presentation
Image processing Presentation
 
Signature verification in biometrics
Signature verification in biometricsSignature verification in biometrics
Signature verification in biometrics
 
Fraud Detection Using Signature Recognition
Fraud Detection Using Signature RecognitionFraud Detection Using Signature Recognition
Fraud Detection Using Signature Recognition
 
Project Synopsis
Project SynopsisProject Synopsis
Project Synopsis
 
Handwritten Text Recognition and Digital Text Conversion
Handwritten Text Recognition and Digital Text ConversionHandwritten Text Recognition and Digital Text Conversion
Handwritten Text Recognition and Digital Text Conversion
 
Fruit Disease Detection and Classification
Fruit Disease Detection and ClassificationFruit Disease Detection and Classification
Fruit Disease Detection and Classification
 
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...
 
BIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEMBIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEM
 
Signature verification
Signature verificationSignature verification
Signature verification
 
Image recognition
Image recognitionImage recognition
Image recognition
 
FAKE CURRENCY DETECTION PDF NEW PPT.pptx
FAKE CURRENCY DETECTION PDF NEW PPT.pptxFAKE CURRENCY DETECTION PDF NEW PPT.pptx
FAKE CURRENCY DETECTION PDF NEW PPT.pptx
 
Optical Character Recognition (OCR) based Retrieval
Optical Character Recognition (OCR) based RetrievalOptical Character Recognition (OCR) based Retrieval
Optical Character Recognition (OCR) based Retrieval
 
Facial recognition system
Facial recognition systemFacial recognition system
Facial recognition system
 
Iris recognition
Iris recognitionIris recognition
Iris recognition
 
Online signature recognition
Online signature recognitionOnline signature recognition
Online signature recognition
 
HANDWRITTEN DIGIT RECOGNITION USING k-NN CLASSIFIER
HANDWRITTEN DIGIT RECOGNITION USING k-NN CLASSIFIERHANDWRITTEN DIGIT RECOGNITION USING k-NN CLASSIFIER
HANDWRITTEN DIGIT RECOGNITION USING k-NN CLASSIFIER
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
 
Automatic handwriting recognition
Automatic handwriting recognitionAutomatic handwriting recognition
Automatic handwriting recognition
 
Biometric recognition using deep learning
Biometric recognition using deep learningBiometric recognition using deep learning
Biometric recognition using deep learning
 

Similar to An offline signature recognition and verification system based on neural network

Similar to An offline signature recognition and verification system based on neural network (20)

Cc4301455457
Cc4301455457Cc4301455457
Cc4301455457
 
Offline Handwritten Signature Verification using Neural Network
Offline Handwritten Signature Verification using Neural NetworkOffline Handwritten Signature Verification using Neural Network
Offline Handwritten Signature Verification using Neural Network
 
Dp34707712
Dp34707712Dp34707712
Dp34707712
 
­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...
­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...
­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...
 
Character recognition for bi lingual mixed-type characters using artificial n...
Character recognition for bi lingual mixed-type characters using artificial n...Character recognition for bi lingual mixed-type characters using artificial n...
Character recognition for bi lingual mixed-type characters using artificial n...
 
Artificial Neural Network Based Offline Signature Recognition System Using Lo...
Artificial Neural Network Based Offline Signature Recognition System Using Lo...Artificial Neural Network Based Offline Signature Recognition System Using Lo...
Artificial Neural Network Based Offline Signature Recognition System Using Lo...
 
Ijetcas14 337
Ijetcas14 337Ijetcas14 337
Ijetcas14 337
 
An embedded finger vein recognition system
An embedded finger vein recognition systemAn embedded finger vein recognition system
An embedded finger vein recognition system
 
Background differencing algorithm for moving object detection using system ge...
Background differencing algorithm for moving object detection using system ge...Background differencing algorithm for moving object detection using system ge...
Background differencing algorithm for moving object detection using system ge...
 
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEMRELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
 
Signature Verification System using CNN & SNN
Signature Verification System using CNN & SNNSignature Verification System using CNN & SNN
Signature Verification System using CNN & SNN
 
License plate recognition for toll payment application
License plate recognition for toll payment applicationLicense plate recognition for toll payment application
License plate recognition for toll payment application
 
License plate recognition for toll payment application
License plate recognition for toll payment applicationLicense plate recognition for toll payment application
License plate recognition for toll payment application
 
Brain tumor pattern recognition using correlation filter
Brain tumor pattern recognition using correlation filterBrain tumor pattern recognition using correlation filter
Brain tumor pattern recognition using correlation filter
 
A virtual analysis on various techniques using ann with
A virtual analysis on various techniques using ann withA virtual analysis on various techniques using ann with
A virtual analysis on various techniques using ann with
 
A virtual analysis on various techniques using ann with data mining
A virtual analysis on various techniques using ann with data miningA virtual analysis on various techniques using ann with data mining
A virtual analysis on various techniques using ann with data mining
 
IRJET - Simulation of Colour Image Processing Techniques on VHDL
IRJET - Simulation of Colour Image Processing Techniques on VHDLIRJET - Simulation of Colour Image Processing Techniques on VHDL
IRJET - Simulation of Colour Image Processing Techniques on VHDL
 
Automated Plant Identification with CNN
Automated Plant Identification with CNNAutomated Plant Identification with CNN
Automated Plant Identification with CNN
 
Dorsal hand vein pattern authentication by hough peaks
Dorsal hand vein pattern authentication by hough peaksDorsal hand vein pattern authentication by hough peaks
Dorsal hand vein pattern authentication by hough peaks
 
A Survey on Fingerprint Protection Techniques
A Survey on Fingerprint Protection TechniquesA Survey on Fingerprint Protection Techniques
A Survey on Fingerprint Protection Techniques
 

More from eSAT Journals

Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
eSAT Journals
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
eSAT Journals
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
eSAT Journals
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
eSAT Journals
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
eSAT Journals
 

More from eSAT Journals (20)

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniques
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
 

Recently uploaded

Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
dharasingh5698
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
 

Recently uploaded (20)

Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 

An offline signature recognition and verification system based on neural network

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 443 AN OFFLINE SIGNATURE RECOGNITION AND VERIFICATION SYSTEM BASED ON NEURAL NETWORK Sameera Khan1 , Avinash Dhole2 1 M-Tech IV Semester, CSE, RITEE, Raipur, India 2 Associate Professor, Department of Computer Science and Engineering, RITEE, Raipur, India Abstract Various techniques are already introduced for personal identification and verification based on different types of biometrics which can be physiological or behavioral. Signatures lies in the category of behavioral biometric which can distort or changed with course of time. Signatures are considered to be most promising authentication method in all legal and financial documents. It is necessary to verify signers and their respective signatures. This paper presents an Offline Signature recognition and verification system(SRVS). In this system signature database of signature images is created, followed by image preprocessing, feature extraction, neural network design and training, and classification of signature as genuine or counterfeit. Keywords: biometrics, neural network design, feature extraction, classification etc. --------------------------------------------------------------------***---------------------------------------------------------------------- 1. INTRODUCTION Signatures are widely accepted as a official means to verify legal documents, financial documents and also for personal identification. Due to the same signatures are most popular behavioral biometric used for authentication and verification. So it is necessary to create a robust and efficient verifier which can help in keeping a track on increasing frauds and crimes related to signatures. Every individual has different signature with some unambiguous behavioral traits. Since it is a behavioral biometric, it is seldom identical. Signatures are sometimes nothing more than the set of some unreadable alphabets or a pattern consisting of lines, curves, blobs etc. That is why it is considered as a special case of pattern matching. Signatures are accepted as a biometric because it possess properties like-universal use and acceptance, have some measurable properties, unique for every individual, easy to compare, and reliability. There are two types of signature verification processes- online and offline. When signatures are captured live with the help of some digitizing devices like stylus operated PDAs, the systems are known as online verification system whereas if static images of signatures are used to represent input data set, it is known as offline verification system. Both types of the verification system consists of phases like data acquisition, image preprocessing, feature extraction, designing and training of the classifier and classification. Selection of powerful feature set is a vital process. Proper features can be used to identify different types of forgeries. A combination of appropriate feature set and type of classifier can yield better results. This paper presents an offline approach for signature recognition and verification based on radial basis function network. A set of nine global features is used to generate feature vector. 2. METHODOLOGY Offline approach uses static image patterns of signatures for generating data set. Five images are taken from each individual for training the network.In preprocessing stage, images are cleaned in order to get rid of any useless information present in it. Preprocessing involves image resizing, gray scale conversion, noise reduction, thresholding, and skeletonization. Some global features are extracted from the preprocessed image in feature extraction phase. In this system nine features are extracted. These extracted feature set is characterized by a matrix to form a feature vector which is the condensed depiction of the input data set. This feature vector acts as an input to the neural network for training. Artificial neural network used in this system is the radial basis function network which uses supervised learning i.e. target values are also provided to the network besides the feature vector. Radius of the neurons is set using the value of spread constant. A new signature image under examination is selected and all nine features are extracted and fed to the RBFN classifier which classifies it as genuine or forged signature based on the output and tolerance limit. Signatures are not always same even when made by same signer. Due to the same features extracted each time may vary. That is why some tolerance limit is necessary.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 444 Fig -1: Flowchart of SRVS 3. DATA ACQUISITION Data acquisition is the method of sampling signals that figure out real world physical conditions and digitizing resulting samples that can be easily processed. There are two wide classifications of acquisition models: 1) Static Model: In this model features are extracted from a earlier stored images. Image is characterized as function of x and y. ƒ (x, y) = 1 for each recorded coordinate else = 0; 2) Dynamic Model: In this model features are achieved online from the individual signer. Image is represented as function of distance, time and pressure. ƒ (t) = { x(t), y(t), p(t)}; Given that this system is an offline signature verification technique, it uses static model for data acquisition.the dataset is generated by the images of signatures. These signatures are done on a piece of paper by a signer. Each signer is asked to give ten specimens of their signatures and a scanned copy of these signatures is stored in an image database. 63 points X 17 characters bounding box is used as reference. 4. PREPROCESSING Preprocessing is basically an image enhancement technique. The signature images saved in a signature database are preprocessed so as to improve the quality of dataset, to obtain better reult and to make the classification task simpler. Image preprocessing includes operations like gray scale conversion, resizing, thresholding, Noise Reduction and Skeletonization. 4.1 Grayscale Conversion Since we are interested only in the signature pattern and not in its color, color information is irrelevant. That is why a color signature image is converted into grayscale image. . Gray images are composed exclusively of shades of gray, varied from black at the weakest intensity to white at the strongest. Fig -2: color and gray signature images 4.2 Noise Reduction Due to the presence of insufficient light, dirt in camera lens, fault in scanner or quality of paper some disturbances can occur as noise in image signal. A filtering function is used to eliminate the noises in the image.
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 445 Fig 3: Noisy and filtered signature images 4.3 Skeletonization It is also known as medial axis transformation. It reduces the width of objects to single pixel. Skeletonization is done by recursive erosion over the image until its medial axis remains. It is also known as thinning. The outcome of skeletoniztion is a binary image constituiting only of the objects medial axis. Fig 4: Original and skeletonized signature images 4.4 Thresholding It is a segmentation technique. In Thresholding reference value T is set which is known as threshold, any pixel having intensity greater than T will be assigned a highest value in the gray scale whereas any pixel having intensity value less than T will be assigned a lowest value in the gray scale. Thesholding gives a binary image i.e. it consists of two gray levels. Fig 5: Original and thresholded signature images 5. FEATURE EXTRACTION For pattern matching process, one important aspect is feature extraction. In this process the input data set is represented on the basis of values of some features. These feature values are presented in form of matrix to create a feature vector.
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 446 In this system a set of nine global features are used which are described as follows-  Image Area: total number of black pixels in the test image.  Signature pure width: maximum of exact number of black pixels present in each horizontal scan line.  Signature pure Height: maximum of exact number of black pixels present in each vertical scan line.  Aspect ratio.: Ratio of width to height component of an image is known as aspect ratio. Aspect Ratio= pure width/ pure Height  Maximum Vertical Projection: sum of all the pixels along the columns in a skeletonized image is vertical projection. The vertical projection is define as : V(j)=∑ I(i,j)  Maximum Horizontal Projection: sum of all the pixels along the row in a skeletonized image is horizontal projection. The horizontal projection is define as : H(i)= ∑ I(i,j)  Number of Edge Point (En): An edge point is defined as a signature point that has only one 8- connected neighbor.  Centroid x-coordinate: Centroid can be defined as the center of mass of any geometric object. Any pixel location is identified by an ordered pair. Centroid x-coordinate represents x coordinate value of the calculated location of center of mass  Centroid y-coordinate: Centroid y-coordinate represents y coordinate value of the calculated location of center of mass. 6. NETWORK DESIGN AND TRAINING Artificial neural networks are very promising in the field of pattern matching. In this signature verifier, radial basis function network is used as classifier. RBFNs are trained by using supervised learning i.e. feature vector and the target vectors both are needed. Sensitivity of network is set by using spread constant value which signifies the width of transfer function plot. Higher the value of spread lower is the sensitivity and vice versa. 7. CLASSIFICATION With the specified feature vector, target vector and spread constant value a network is trained. This trained network is now set for classification of the new signatures in one of the input classes. A test signature is used to extract the features and the newly extracted features are fed to the trained network which classifies it as genuine or forge with respect to the output value in the corresponding class and a preset threshold value. Threshold value is used to specify tolerance limit of the network. 8. RESULTS In the above discussed system, an offline signature verification system is designed using radial basis function network. Each signer provides five specimen signatures which are saved in the database, a set of nine global features are extracted from this database to generate feature vector and a network is trained using these features. Observed FAR and FRR are . The results are shown as follows- Fig 6: Output Screen showing classification result
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 447 Fig 7: Output Screen showing classification result of forged signature 9. CONCLUSION This paper presents design and implementation of an effective offline signature recognition and verification system using radial basis function network. The false acceptance rate (FAR) or type-I error is found to be 5% and false rejection rate (FRR) or type-II error is found to be 7%. REFERENCES [1] L.Basavaraj, R.D Sudhaker Samuel: “Offline-line Signature Verification and Recognition: An Approach Based on Four Speed Stroke Angle” International Journal of Recent Trends in Engineering, Vol 2, No. 3, November 2009 [2] Vu Nguyen, Michael Blumenstein , Graham Leedham, Global Features for the Off-Line Signature Verification Problem 10th International Conference on Document Analysis and Recognition, 2009. [3] Shashi Kumar D R, K B Raja, R. K Chhotaray, Sabyasachi Pattanaik, Off-line Signature Verification Based on Fusion of Grid and Global Features Using Neural Networks , International Journal of Engineering Science and Technology Vol. 2(12), 2010, 7035-7044 [4] Ashwini Pansare, Shalini Bhatia,Handwritten Signature Verification using Neural Network, International Journal of Applied Information Systems (IJAIS) – ISSN : 2249-0868 Foundation of Computer Science FCS, New York, USA Volume 1– No.2, January 2012 [5] Prashanth C. R. and K. B. Raja, Off-line Signature Verification Based on Angular Features, International Journal of Modeling and Optimization, Vol. 2, No. 4, August 2012 [6] Julio Martínez-R.,Rogelio Alcántara-S.,On-line signature verification based on optimal feature representation and neural-network-driven fuzzy reasoning [7] Miguel A. Ferrer, Jesus B. Alonso, and Carlos M. Travieso “Offline Geometric Parameters for automatic Signature Verification Using Fixed-Point Arithmetic” IEEE Transactions On Pattern Analysis And Machine Intelligence, VOL. 27, NO. 6, JUNE 2005 [8] Manasjyoti Bhuyan, Kandarpa Kumar Sarma and Hirendra Das,Signature Recognition and Verification using Hybrid Features and Clustered Artificial Neural Network(ANN)s International Journal of Electrical and Computer Engineering 5:2 2010 [9] O.C Abikoye , M.A Mabayoje, R. Ajibade “Offline Signature Recognition & Verification using Neural Network” International Journal of Computer Applications (0975 – 8887) Volume 35– No.2, December 2011 [10] Ms.Vibha Pandey ,Ms. Sanjivani Shantaiya,“Signature Verification Using Morphological Features Based on Artificial Neural Network” International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 7, July 2012
  • 6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 448 BIOGRAPHIES Sameera Khan is a P. G Student (M. Tech) in the Department of Computer Science and Engineering, Raipur Institute of Technology, Raipur(C.G). She received her Bachelor of Engineering (CSE) in 2008 from Raipur Institute of Technology, Raipur affilated to Pt.Ravishankar University,Raipur (C.G).Her research interest are Image Processing and neural network. Avinash Dhole is an Associate Professor and Head in Computer Science and Engineering Department, in Raipur Institute Of Technology, Raipur, (C.G.) . His research interests include Digital Image Processing, Compilers, Automata Theory, Neural Network, Artificial Intelligence, Information and Network Security