SlideShare a Scribd company logo
1 of 5
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 05 Issue: 02 | Feb-2016, Available @ http://www.ijret.org 45
TEXT CONTENT DEPENDENT WRITER IDENTIFICATION
Samuel A. Daramola1
, Morakinyo A. Adefunminiyi2
1
Associate Professor, Electrical and Information Engineering, Covenant University, Ota Ogun State, Nigeria.
2
PG Student, Electrical and Information Engineering, Covenant University, Ota Ogun State, Nigeria.
Abstract
Text content based personal Identification system is vital in resolving problem of identifying unknown document’s writer using a
set of handwritten samples from alleged known writers. Text written on paper document is usually captured as image by scanner
or camera for computer processing. The most challenging problem encounter in text image processing is extraction of robust
feature vector from a set of inconstant handwritten text images obtained from the same writer at different time. In this work new
feature extraction method is engaged to produce active text features for developing an effective personal identification system.
The feature formed feature vector which is fed as input data into classification algorithm based on Support Vector Machine
(SVM). Experiment was conducted to identify writers of query handwritten texts. Result show satisfactory performance of the
proposed system, it was able to identify writers of query handwritten texts.
Keywords: Handwritten Text, Feature Vector, Identification and Support Vector Machine.
--------------------------------------------------------------------***----------------------------------------------------------------------
1. INTRODUCTION
Biometric traits are classified as behavioral or physiological.
Behavioral traits like signature and handwritten text written
on paper are widely used for authentication of persons.
Handwritten text identification involves authentication of a
person using biometric features from handwritten text.
Handwritten text recognition can be done manually or
automatically. Automatic personal identification via
handwritten texts is better than manual method because
ordinarily people find it difficult to differentiate unforeseen
handwritten texts. Effectiveness of automatic personal
identification system is largely depends on it is ability to
suppress high intra variation within handwritten texts of the
same person, main causes of this variation include writing
speed, pen handling and mental ability. Personal
identification using handwritten text can be done in two
ways based on the input sensors. They are called off-line
and on-line [1][2]. Off-line identification method involves
using pen to write text on paper while on-line identification
is done by writing text expressions on digitizer. In case of
on-line method in additional to text shape, dynamic features
like speed and pressure are captured for processing [3][4].
Handwritten text recognition is relatively different from
Optical Character Recognition (OCR), the objective of
handwritten text recognition is to identify the author of a
given text while that of OCR is to recognize characters of
text written on paper and convert it to digital form without
writer identification. Therefore handwritten text recognition
uses behavioral characteristics to identify document’s writer.
Each person's handwriting is unique, characteristics of
handwriting includes size, shape, slope of characters and
regular or irregular spacing between words. A writer
identification process makes use of one-to-many search
method to decide authentic author of a written text among a
set of known writers. One major application of writer
identification system is in forensic science in which
unknown writer of a contested document is revealed
through analysis of written document such as police report,
will, diaries and written statement by suspects, examination
paper, election score sheet, money transfer form etc.
Many researchers have proposed several writer
identification methods. These methods can be classified as
text dependent or text independent writer identification. In
text dependent approach identification of writers is based on
specific targeted handwritten text [5][6]. While text
independent approach identification of document’s writer is
based on any written text [7] [8][9][10].
In [11] text dependent writer identification system based on
Support Vector Machine (SVM) was developed. Two edge
based features were extracted from handwriting text. Also
features were extracted at word and character level. Also in
[12], writer identification system was proposed; nine
geometric features were extracted from handwriting text
using subset of “IAM” dataset. Each writer’s model was
generated based on individual Hidden Markov Model
(HMM). In case of writer text dependent identification
system based on neural network that was developed in [13],
features extracted from handwritten text lines include width,
slant, and three heights of the writing zones. Whereas in
[14], codebook of connected component contours is
generated to model character allographs using a bag of
features model. On other hand, edge hinge feature from
curvature of characters using relative angle of two line
segments on a character’s contour was produced in [15],
other features like connected component contours, run
lengths and slant features were included. And in [16],
extraction of eight features from Malayalam text at character
level was carried out. The features are classified as loop
features, distance features and directional features. They are
fused together to form feature vector for writers
identification.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 05 Issue: 02 | Feb-2016, Available @ http://www.ijret.org 46
In this work, handwriting text images are not segmented to
character or word level before feature extraction. Unlike
most previous methods text segmentation preceded feature
extraction. In this work errors as result of text segmentation
are avoided by extracting robust feature vector from text
image using moving window across the text. It involves
scanning across a one pixel width text image with one pixel
overlap away from subsequent window. In each block,
geometric feature is extracted. Feature vectors generated
from this window operation were used to establish writers’
model. The output data from feature extraction stage is fed
to classification algorithm.
2. DIGITAL IMAGE PROCESSING
The personal identification system proposed in this work
firstly involves capturing of handwritten text image from
users. The next stage is the image preprocessing, it involves
preparation of image for next step which is called feature
extraction method. The training stage is carried out using
SVM to model handwritten text of each writer. The final
stage is the classification algorithm where query handwritten
texts are verified to discover the authentic writers.
2.1 Image Acquisition
Imaging of handwritten text acquired from twenty subjects
was carried out using flatbed scanner. Each user was asked
to write an expression tagged “Money transfer confirmed by
me” on a white sheet of paper. Users of varies ages group
are allowed to write on paper without any constraints.
Thereafter the handwritten texts are scanned into computer
system as gray-scale bitmap image at 300 dots per inch.
Each dot or pixel is a shade of grey that has integer value
range from 0 to 255, it means that each pixel can be
represented by eight bits. An example of gray scale
handwritten text images gotten from three different writers
is shown in fig-1.
Fig-1, Gray-level handwritten text image.
2.2 Image Preprocessing
Three major preprocessing operations are performed on the
captured gray-scale handwritten text images and thereafter
they are passed to feature extraction stage. Preprocessing
methods involve at this stage include filtering, thresholding
and thinning.
Filtering operation is achieved using smoothing filters or
sharpening filters. Smoothing filters are low pass filters that
blurring image detail by removes noise and higher
frequency components, examples of smoothing filter include
Average, Gaussian and Median filter while sharpening
filters perverse high frequency component such as fine
details, line, points and edges. Sharpening filters can be
achieved using gradient and laplacian masks. Given an
image f(x,y) and a filter mask h of size mxn. Output
smoothed image g(x,y) is obtained as result of convolution
operation between image f(x,y) and filter mask h as the
center moves to every pixel in the image as given in (1)
  

a
ak
b
bj
kyjxfkjhyxg ),(),(),( (1)
Where a=m/2 and b=n/2
Level of smoothing depends on the size of the mask
therefore different size of masks can be used to obtain
desired degree of smoothing. In this work Gaussian filter is
used for smoothing text images, for Gaussian filter, the
kernel equation is as given in (2).
(2)
Standard deviation of the Gaussian σ control the size of
filter mask and level of smoothing, for σ = 1.4, the
Gaussian mask for size 7x7 is shown in fig-2, the
normalization summation of all elements is equal to 1.
Example of smoothed handwritten text images using
Gaussian filter is shown in fig-3.
1 1 2 2 2 1 1
1 2 2 4 2 2 1
2 2 4 8 4 2 2
2 4 8 16 8 4 2
2 2 4 8 4 2 2
1 2 2 4 2 2 1
1 1 2 2 2 1 1
Fig-2, 7x7 Gaussian mask.
Fig-3, Smoothed handwritten text images
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 05 Issue: 02 | Feb-2016, Available @ http://www.ijret.org 47
Thresholding is a method of creating binary image from
gray-level image. The technique involves reduction of 8bits
information (0 - 256) gray value in each image pixel to 1bit,
that is value of 0 or 1. There are three major methods of
thresholding a gray-level image. They are called global,
Otsu and adaptive thresholding. Global thresholding is the
appropriate method to use if histogram of the gray-level
image is bi-modal, that is a partition exists between the
object pixels and background pixels on the histogram plot.
Then single threshold value can be selected within the
interval of the valleys for good segmentation.
Otsu's method also relies on image bi-modal histogram
information to perform image thresholding using class
clustering method. Threshold value that separate two
classes, that is image foreground and background is
determined based on inter and intra class variation.
Optimum thresholding value is achieved when intra-class
variance and inter-class variance attain minimal and
maximal value respectively.
Adaptive thresholding is one of the methods of converting
gray-scale image to binary image. If the image histogram is
not bimodal the best option is to use adaptive thresholding.
The image is divided into small blocks; thresholding
operation is performed on each block using single or
optimum threshold value. In this work global threshold
method is adopted. All the pixels that have gray value above
selected threshold value are set to 1 and remaining pixels are
set to zero. Examples of binary handwritten text image
obtained using single threshold value are shown in fig-4.
Fig-4, Binary handwritten text images.
Thinning is a morphological operation that acts on binary
image; it prunes pixel width of each point in the image to
one pixel width. The process reduces the number of
foreground pixels and reveals the skeleton of the image that
shows the true representation of the text image written style.
Also the process helps to speeds up subsequent operations.
Fig-5 shows example of handwritten text images that have
been thinned.
3. FEATURE EXTRACTION STAGE
The feature extraction method is developed to generate
feature vector that can effectively describe each user text
written style and shape. The thinned binary handwritten text
images are the input to the feature extraction algorithm.
The image is divided into blocks by sliding a window of
specific size over it from left to right with predefined
overlapping.
Fig-5: Thinned binary handwritten text image.
Feature is extracted at area occupy by the window, therefore
feature element is obtained from every area occupy by the
window as it move from left to right. The feature extraction
steps are stated as follows:
 Step 1: Resize and obtain bounded thinned binary
handwritten text image. Example is as shown in figure6
 Step2: Determine the size of window
 Step3: Set number of overlapping pixel.
 Step4: Slide window over the thinned binary image to
divide the image to 36 smaller blocks. Figure 7 shows
for example ten out of the thirty six blocks.
 Step5: Extract feature called mean centroid from each
block.
 Step6: Form feature vector of 36 elements, Table 1 show
example of feature vectors obtained from three different
text image samples.
Fig- 6: Bounded thinned binary text image
Figure-7: Parts of block text image.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 05 Issue: 02 | Feb-2016, Available @ http://www.ijret.org 48
Table 1. Feature vectors for three different images.
No Data 1 Data 2 Data 3
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
4.53488224
3.45168660
2.92667433
8.88962993
8.06341917
3.72129567
4.26013989
7.21623005
7.89360382
4.33285064
4.26295108
8.12868180
6.69972154
9.78906810
17.92384759
5.07721463
4.38308015
3.26426010
7.03765709
7.04935645
3.18791348
5.05271813
4.79949178
4.79155607
5.59597457
3.66391304
4.66648379
5.34633522
4.66961411
2.02494479
2.43479013
6.47949391
11.80428729
4.81542451
5.83899639
4.08391309
12.38031525
6.86022538
3.25610200
6.21064804
8.18699370
5.34424170
7.37065097
6.52470017
11.00691679
9.21598548
6.86913956
9.09138834
10.92457946
8.74400284
7.52221820
4.01696092
3.70579609
6.50076624
11.81375619
11.29388042
6.44414825
4.99686548
4.29052236
4.48467434
3.58149313
5.80491320
11.8331122
12.0999499
4.54999429
3.14113533
6.32723827
14.18773091
14.18773091
7.56849121
6.51802772
6.38929940
9.33817476
3.91014770
2.83660513
2.50587736
2.08696116
2.37960997
1.84135074
4.08325380
3.19968781
4.57277024
2.98169322
4.95866631
6.76451155
4.99804262
10.40938746
6.85775013
1.82574185
4.74704732
9.84151925
5.14524852
5.85924645
4.27633496
3.82861823
4.83982411
8.71839516
3.79316748
2.75638869
2.66570876
1.49646881
3.21111889
3.48928287
5.15260922
5.15260922
3.63902746
3.24395016
2.56322433
4. SUPPORT VECTOR MACHINE FOR
WRITER IDENTIFICATION.
Support Vector Machine (SVM) is a learning algorithm that
has the capacity to classify feature vectors into different
regions separated by optimal hyper plane using structural
risk minimization method. Decision surface that is the
optimal hyper plane represents the largest link between
negative and positive examples. SVM deals with non-
linearly separable data by project original input feature
space into a higher dimension feature space using nonlinear
kernel.
Application of SVM in resolving personal identification
problem using handwritten text images is achieved using
training and testing algorithm. The system is trained using
positive and negative text images to establish an optimal
hyper plane that increases margin between the support
vectors. The testing algorithm is used to determine classes
of query handwritten text images based on the distance of
the query feature vector from the hyper-plane.
5. EXPERIMENTAL RESULT
Experiments are conducted to establish the capability of the
proposed personal identification method to detect originator
of contested handwritten text. Training of the proposed
system is carried out using text images store in the system.
Five handwritten text images are collected from each of the
twenty people. Three images per person are passed to
training algorithm based on Support Vector Machine (SVM)
to establish each user model. Query text images are sent to
the system for confirmation, 95% of the query images are
detected correctly for the authentic handwritten text writers.
6. CONCLUSION
Personal identification system based on handwritten text
images and Support Vector Machine (SVM) has been
developed for detecting originator of queried handwritten
text. This was achieved by extracting discriminating feature
from a set of suspected text images written by known
writers. Text image is divided into smaller overlapping
blocks to obtain robust local feature using a moving
window. The experimental result obtained from the
proposed text content dependent identification system using
non-segmented character image is very encouraging.
REFERENCES
[1]. R. Plamondon and G.lorette. 1989. Automatic Signature
verification and writer Identification- The state of the art.
Pattern Recognition vol.22, no.2, pp.107-131.
[2].Daramola Samuel and Ibiyemi Samuel. 2010. Novel
Feature Extraction Technique for Off-line Signature
Verification System. International Journal of Engineering
Science and Technology vol. 2(7), pp. 3137-3143.
[3].A. Chaabouni, H. Boubaker, M. Kherallah, A.M. Alimi
and H.E. Abed. 2011. Combining of Off-line and On-line
Feature Extraction Approaches for Writer Identification. In
Proc. of the 11th
International Conference on Document
Analysis and Recognition, pp.1299-1303.
[4]. S.A Daramola and T.S Ibiyemi. 2010. Efficient On-line
Signature Verification System. International Journal of
Engineering & Technology (IJET-IJENS), vol. 10, No: 04,
pp.42-46.
[5] Constantine Anton Cosmin Ştirbu Romeo, Vasile Badea.
2010. Identify Handwriting Individually Using Feed
Forward Neural Networks. International Journal of
Intelligent Computing Research (IJICR), vol. 1, Issue 4, pp.
183-188.
[6]. Somaya Al-Maadeed. 2012. Text-Dependent Writer
Identification for Arabic Handwriting Journal of Electrical
and Computer Engineering; pp1-8.
[7]. B. Helli, M.E. Moghaddam, 2008. A text-independent
Persian writer identification system using LCS based
classifier, in: IEEE International Symposium on Signal
Processing and Information Technology, (ISSPIT). pp. 203–
206.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 05 Issue: 02 | Feb-2016, Available @ http://www.ijret.org 49
[8] B. Helli, M.E. Moghaddam. 2010. A text-independent
Persian writer identification based on Feature Relation
Graph (FRG), Pattern Recognition. Vol.43, pp.2199–2209.
[9].I. Siddiqi, N. Vincent. 2010. Text independent writer
recognition using redundant writing patterns with contour-
based orientation and curvature features. In Pattern
Recognition. vol.43, pp.3853 –3865.
[10] Golnaz Ghiasi, Reza Safabakhsh. 2013. Offline text-
independent writer identification using codebook and
efficient code extraction methods, Image Vision Computer,
vol.31, no.5, pp.379-391.
[11].Saranya K and Vijaya M S . 2013. Text Dependent
Writer Identification using Support Vector Machine.
International Journal of Computer Applications. vol.65–
No.2, pp.6-11.
[12].A. Schlapbach and H. Bunke. 2007. A writer
identification and verification system using HMM based
recognizers, Pattern analysis and applications. pp. 33-43.
[13].U. Marti, R. Messerli, H. Bunke. 2001. Writer
identification using text line based features. Proc. of 6th
International Conference on Document Analysis and
Recognition pp. 765–768.
[14].M Bulacu, L Schomaker. 2007. Text-independent
writer identification and verification using textural
alloygraph feature. Pattern Analysis and Machine
Intelligence, IEEE Transactions vol.29, Issue:4, pp.701 -
717.
[15]. L Schomaker, M Bulacu. 2004. Automatic writer
identification using connected-component contours and
edge-based features of uppercase western script . Pattern
Analysis and Machine Intelligence, IEEE Transactions
vol.26, Issue: 6, pp.787 – 798.
[16].Sreeraj M, Idicula S. 2011. Identifying Decisive
Features for Distinctive Analysis of Writings in Malayalam.
International Magazine on Advances in Computer Science
and Telecommunications. vol. 2, no. 1. pp.13-20.

More Related Content

What's hot

Handwriting Recognition Using Deep Learning and Computer Version
Handwriting Recognition Using Deep Learning and Computer VersionHandwriting Recognition Using Deep Learning and Computer Version
Handwriting Recognition Using Deep Learning and Computer Version
Naiyan Noor
 
OCR-THE 3 LAYERED APPROACH FOR CLASSIFICATION AND IDENTIFICATION OF TELUGU HA...
OCR-THE 3 LAYERED APPROACH FOR CLASSIFICATION AND IDENTIFICATION OF TELUGU HA...OCR-THE 3 LAYERED APPROACH FOR CLASSIFICATION AND IDENTIFICATION OF TELUGU HA...
OCR-THE 3 LAYERED APPROACH FOR CLASSIFICATION AND IDENTIFICATION OF TELUGU HA...
csandit
 
A Survey of Modern Character Recognition Techniques
A Survey of Modern Character Recognition TechniquesA Survey of Modern Character Recognition Techniques
A Survey of Modern Character Recognition Techniques
ijsrd.com
 
Cursive Handwriting Segmentation Using Ideal Distance Approach
Cursive Handwriting Segmentation Using Ideal Distance Approach Cursive Handwriting Segmentation Using Ideal Distance Approach
Cursive Handwriting Segmentation Using Ideal Distance Approach
IJECEIAES
 
Comparative Analysis of PSO and GA in Geom-Statistical Character Features Sel...
Comparative Analysis of PSO and GA in Geom-Statistical Character Features Sel...Comparative Analysis of PSO and GA in Geom-Statistical Character Features Sel...
Comparative Analysis of PSO and GA in Geom-Statistical Character Features Sel...
IJERA Editor
 

What's hot (19)

Handwriting Recognition Using Deep Learning and Computer Version
Handwriting Recognition Using Deep Learning and Computer VersionHandwriting Recognition Using Deep Learning and Computer Version
Handwriting Recognition Using Deep Learning and Computer Version
 
Effective Implementation techniques in Offline Signature Verification
Effective Implementation techniques in Offline Signature  VerificationEffective Implementation techniques in Offline Signature  Verification
Effective Implementation techniques in Offline Signature Verification
 
An effective approach to offline arabic handwriting recognition
An effective approach to offline arabic handwriting recognitionAn effective approach to offline arabic handwriting recognition
An effective approach to offline arabic handwriting recognition
 
AUTOMATIC TRAINING DATA SYNTHESIS FOR HANDWRITING RECOGNITION USING THE STRUC...
AUTOMATIC TRAINING DATA SYNTHESIS FOR HANDWRITING RECOGNITION USING THE STRUC...AUTOMATIC TRAINING DATA SYNTHESIS FOR HANDWRITING RECOGNITION USING THE STRUC...
AUTOMATIC TRAINING DATA SYNTHESIS FOR HANDWRITING RECOGNITION USING THE STRUC...
 
Ijartes v1-i2-001
Ijartes v1-i2-001Ijartes v1-i2-001
Ijartes v1-i2-001
 
Segmentation and recognition of handwritten gurmukhi script
Segmentation  and recognition of handwritten gurmukhi scriptSegmentation  and recognition of handwritten gurmukhi script
Segmentation and recognition of handwritten gurmukhi script
 
Handwritten Character Recognition
Handwritten Character RecognitionHandwritten Character Recognition
Handwritten Character Recognition
 
Character recognition of Devanagari characters using Artificial Neural Network
Character recognition of Devanagari characters using Artificial Neural NetworkCharacter recognition of Devanagari characters using Artificial Neural Network
Character recognition of Devanagari characters using Artificial Neural Network
 
OCR-THE 3 LAYERED APPROACH FOR CLASSIFICATION AND IDENTIFICATION OF TELUGU HA...
OCR-THE 3 LAYERED APPROACH FOR CLASSIFICATION AND IDENTIFICATION OF TELUGU HA...OCR-THE 3 LAYERED APPROACH FOR CLASSIFICATION AND IDENTIFICATION OF TELUGU HA...
OCR-THE 3 LAYERED APPROACH FOR CLASSIFICATION AND IDENTIFICATION OF TELUGU HA...
 
Artificial Neural Network For Recognition Of Handwritten Devanagari Character
Artificial Neural Network For Recognition Of Handwritten Devanagari CharacterArtificial Neural Network For Recognition Of Handwritten Devanagari Character
Artificial Neural Network For Recognition Of Handwritten Devanagari Character
 
A NEW CODING METHOD IN PATTERN RECOGNITION FINGERPRINT IMAGE USING VECTOR QUA...
A NEW CODING METHOD IN PATTERN RECOGNITION FINGERPRINT IMAGE USING VECTOR QUA...A NEW CODING METHOD IN PATTERN RECOGNITION FINGERPRINT IMAGE USING VECTOR QUA...
A NEW CODING METHOD IN PATTERN RECOGNITION FINGERPRINT IMAGE USING VECTOR QUA...
 
A Survey of Modern Character Recognition Techniques
A Survey of Modern Character Recognition TechniquesA Survey of Modern Character Recognition Techniques
A Survey of Modern Character Recognition Techniques
 
Cursive Handwriting Segmentation Using Ideal Distance Approach
Cursive Handwriting Segmentation Using Ideal Distance Approach Cursive Handwriting Segmentation Using Ideal Distance Approach
Cursive Handwriting Segmentation Using Ideal Distance Approach
 
SEGMENTATION OF CHARACTERS WITHOUT MODIFIERS FROM A PRINTED BANGLA TEXT
SEGMENTATION OF CHARACTERS WITHOUT MODIFIERS FROM A PRINTED BANGLA TEXTSEGMENTATION OF CHARACTERS WITHOUT MODIFIERS FROM A PRINTED BANGLA TEXT
SEGMENTATION OF CHARACTERS WITHOUT MODIFIERS FROM A PRINTED BANGLA TEXT
 
OPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNNOPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNN
 
Script Identification for printed document images at text-line level using DC...
Script Identification for printed document images at text-line level using DC...Script Identification for printed document images at text-line level using DC...
Script Identification for printed document images at text-line level using DC...
 
CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...
CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...
CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...
 
An offline signature recognition and verification system based on neural network
An offline signature recognition and verification system based on neural networkAn offline signature recognition and verification system based on neural network
An offline signature recognition and verification system based on neural network
 
Comparative Analysis of PSO and GA in Geom-Statistical Character Features Sel...
Comparative Analysis of PSO and GA in Geom-Statistical Character Features Sel...Comparative Analysis of PSO and GA in Geom-Statistical Character Features Sel...
Comparative Analysis of PSO and GA in Geom-Statistical Character Features Sel...
 

Similar to Text content dependent writer identification

Volume 2-issue-6-2009-2015
Volume 2-issue-6-2009-2015Volume 2-issue-6-2009-2015
Volume 2-issue-6-2009-2015
Editor IJARCET
 
Volume 2-issue-6-2009-2015
Volume 2-issue-6-2009-2015Volume 2-issue-6-2009-2015
Volume 2-issue-6-2009-2015
Editor IJARCET
 
Design of digital signature verification algorithm using relative slope method
Design of digital signature verification algorithm using relative slope methodDesign of digital signature verification algorithm using relative slope method
Design of digital signature verification algorithm using relative slope method
eSAT Publishing House
 
An offline signature verification using pixels intensity levels
An offline signature verification using pixels intensity levelsAn offline signature verification using pixels intensity levels
An offline signature verification using pixels intensity levels
Salam Shah
 

Similar to Text content dependent writer identification (20)

Automatic signature verification with chain code using weighted distance and ...
Automatic signature verification with chain code using weighted distance and ...Automatic signature verification with chain code using weighted distance and ...
Automatic signature verification with chain code using weighted distance and ...
 
Writer Identification via CNN Features and SVM
Writer Identification via CNN Features and SVMWriter Identification via CNN Features and SVM
Writer Identification via CNN Features and SVM
 
A Review on Geometrical Analysis in Character Recognition
A Review on Geometrical Analysis in Character RecognitionA Review on Geometrical Analysis in Character Recognition
A Review on Geometrical Analysis in Character Recognition
 
I017256165
I017256165I017256165
I017256165
 
Deep Learning in Text Recognition and Text Detection : A Review
Deep Learning in Text Recognition and Text Detection : A ReviewDeep Learning in Text Recognition and Text Detection : A Review
Deep Learning in Text Recognition and Text Detection : A Review
 
Optical Character Recognition from Text Image
Optical Character Recognition from Text ImageOptical Character Recognition from Text Image
Optical Character Recognition from Text Image
 
L017248388
L017248388L017248388
L017248388
 
Online Hand Written Character Recognition
Online Hand Written Character RecognitionOnline Hand Written Character Recognition
Online Hand Written Character Recognition
 
40120140501009
4012014050100940120140501009
40120140501009
 
A Review On Recognition Of Online Handwriting In Different Scripts
A Review On Recognition Of Online Handwriting In Different ScriptsA Review On Recognition Of Online Handwriting In Different Scripts
A Review On Recognition Of Online Handwriting In Different Scripts
 
C010221930
C010221930C010221930
C010221930
 
A Novel Framework For Numerical Character Recognition With Zoning Distance Fe...
A Novel Framework For Numerical Character Recognition With Zoning Distance Fe...A Novel Framework For Numerical Character Recognition With Zoning Distance Fe...
A Novel Framework For Numerical Character Recognition With Zoning Distance Fe...
 
Volume 2-issue-6-2009-2015
Volume 2-issue-6-2009-2015Volume 2-issue-6-2009-2015
Volume 2-issue-6-2009-2015
 
Volume 2-issue-6-2009-2015
Volume 2-issue-6-2009-2015Volume 2-issue-6-2009-2015
Volume 2-issue-6-2009-2015
 
Handwritten Signature Verification System using Sobel Operator and KNN Classi...
Handwritten Signature Verification System using Sobel Operator and KNN Classi...Handwritten Signature Verification System using Sobel Operator and KNN Classi...
Handwritten Signature Verification System using Sobel Operator and KNN Classi...
 
Design of digital signature verification algorithm using relative slope method
Design of digital signature verification algorithm using relative slope methodDesign of digital signature verification algorithm using relative slope method
Design of digital signature verification algorithm using relative slope method
 
Design and Implementation Recognition System for Handwritten Hindi/Marathi Do...
Design and Implementation Recognition System for Handwritten Hindi/Marathi Do...Design and Implementation Recognition System for Handwritten Hindi/Marathi Do...
Design and Implementation Recognition System for Handwritten Hindi/Marathi Do...
 
O45018291
O45018291O45018291
O45018291
 
A SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITION
A SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITIONA SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITION
A SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITION
 
An offline signature verification using pixels intensity levels
An offline signature verification using pixels intensity levelsAn offline signature verification using pixels intensity levels
An offline signature verification using pixels intensity levels
 

More from eSAT Journals

Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
eSAT Journals
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
eSAT Journals
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
eSAT Journals
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
eSAT Journals
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
eSAT Journals
 

More from eSAT Journals (20)

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniques
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
 

Recently uploaded

FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
dharasingh5698
 

Recently uploaded (20)

FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 

Text content dependent writer identification

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 05 Issue: 02 | Feb-2016, Available @ http://www.ijret.org 45 TEXT CONTENT DEPENDENT WRITER IDENTIFICATION Samuel A. Daramola1 , Morakinyo A. Adefunminiyi2 1 Associate Professor, Electrical and Information Engineering, Covenant University, Ota Ogun State, Nigeria. 2 PG Student, Electrical and Information Engineering, Covenant University, Ota Ogun State, Nigeria. Abstract Text content based personal Identification system is vital in resolving problem of identifying unknown document’s writer using a set of handwritten samples from alleged known writers. Text written on paper document is usually captured as image by scanner or camera for computer processing. The most challenging problem encounter in text image processing is extraction of robust feature vector from a set of inconstant handwritten text images obtained from the same writer at different time. In this work new feature extraction method is engaged to produce active text features for developing an effective personal identification system. The feature formed feature vector which is fed as input data into classification algorithm based on Support Vector Machine (SVM). Experiment was conducted to identify writers of query handwritten texts. Result show satisfactory performance of the proposed system, it was able to identify writers of query handwritten texts. Keywords: Handwritten Text, Feature Vector, Identification and Support Vector Machine. --------------------------------------------------------------------***---------------------------------------------------------------------- 1. INTRODUCTION Biometric traits are classified as behavioral or physiological. Behavioral traits like signature and handwritten text written on paper are widely used for authentication of persons. Handwritten text identification involves authentication of a person using biometric features from handwritten text. Handwritten text recognition can be done manually or automatically. Automatic personal identification via handwritten texts is better than manual method because ordinarily people find it difficult to differentiate unforeseen handwritten texts. Effectiveness of automatic personal identification system is largely depends on it is ability to suppress high intra variation within handwritten texts of the same person, main causes of this variation include writing speed, pen handling and mental ability. Personal identification using handwritten text can be done in two ways based on the input sensors. They are called off-line and on-line [1][2]. Off-line identification method involves using pen to write text on paper while on-line identification is done by writing text expressions on digitizer. In case of on-line method in additional to text shape, dynamic features like speed and pressure are captured for processing [3][4]. Handwritten text recognition is relatively different from Optical Character Recognition (OCR), the objective of handwritten text recognition is to identify the author of a given text while that of OCR is to recognize characters of text written on paper and convert it to digital form without writer identification. Therefore handwritten text recognition uses behavioral characteristics to identify document’s writer. Each person's handwriting is unique, characteristics of handwriting includes size, shape, slope of characters and regular or irregular spacing between words. A writer identification process makes use of one-to-many search method to decide authentic author of a written text among a set of known writers. One major application of writer identification system is in forensic science in which unknown writer of a contested document is revealed through analysis of written document such as police report, will, diaries and written statement by suspects, examination paper, election score sheet, money transfer form etc. Many researchers have proposed several writer identification methods. These methods can be classified as text dependent or text independent writer identification. In text dependent approach identification of writers is based on specific targeted handwritten text [5][6]. While text independent approach identification of document’s writer is based on any written text [7] [8][9][10]. In [11] text dependent writer identification system based on Support Vector Machine (SVM) was developed. Two edge based features were extracted from handwriting text. Also features were extracted at word and character level. Also in [12], writer identification system was proposed; nine geometric features were extracted from handwriting text using subset of “IAM” dataset. Each writer’s model was generated based on individual Hidden Markov Model (HMM). In case of writer text dependent identification system based on neural network that was developed in [13], features extracted from handwritten text lines include width, slant, and three heights of the writing zones. Whereas in [14], codebook of connected component contours is generated to model character allographs using a bag of features model. On other hand, edge hinge feature from curvature of characters using relative angle of two line segments on a character’s contour was produced in [15], other features like connected component contours, run lengths and slant features were included. And in [16], extraction of eight features from Malayalam text at character level was carried out. The features are classified as loop features, distance features and directional features. They are fused together to form feature vector for writers identification.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 05 Issue: 02 | Feb-2016, Available @ http://www.ijret.org 46 In this work, handwriting text images are not segmented to character or word level before feature extraction. Unlike most previous methods text segmentation preceded feature extraction. In this work errors as result of text segmentation are avoided by extracting robust feature vector from text image using moving window across the text. It involves scanning across a one pixel width text image with one pixel overlap away from subsequent window. In each block, geometric feature is extracted. Feature vectors generated from this window operation were used to establish writers’ model. The output data from feature extraction stage is fed to classification algorithm. 2. DIGITAL IMAGE PROCESSING The personal identification system proposed in this work firstly involves capturing of handwritten text image from users. The next stage is the image preprocessing, it involves preparation of image for next step which is called feature extraction method. The training stage is carried out using SVM to model handwritten text of each writer. The final stage is the classification algorithm where query handwritten texts are verified to discover the authentic writers. 2.1 Image Acquisition Imaging of handwritten text acquired from twenty subjects was carried out using flatbed scanner. Each user was asked to write an expression tagged “Money transfer confirmed by me” on a white sheet of paper. Users of varies ages group are allowed to write on paper without any constraints. Thereafter the handwritten texts are scanned into computer system as gray-scale bitmap image at 300 dots per inch. Each dot or pixel is a shade of grey that has integer value range from 0 to 255, it means that each pixel can be represented by eight bits. An example of gray scale handwritten text images gotten from three different writers is shown in fig-1. Fig-1, Gray-level handwritten text image. 2.2 Image Preprocessing Three major preprocessing operations are performed on the captured gray-scale handwritten text images and thereafter they are passed to feature extraction stage. Preprocessing methods involve at this stage include filtering, thresholding and thinning. Filtering operation is achieved using smoothing filters or sharpening filters. Smoothing filters are low pass filters that blurring image detail by removes noise and higher frequency components, examples of smoothing filter include Average, Gaussian and Median filter while sharpening filters perverse high frequency component such as fine details, line, points and edges. Sharpening filters can be achieved using gradient and laplacian masks. Given an image f(x,y) and a filter mask h of size mxn. Output smoothed image g(x,y) is obtained as result of convolution operation between image f(x,y) and filter mask h as the center moves to every pixel in the image as given in (1)     a ak b bj kyjxfkjhyxg ),(),(),( (1) Where a=m/2 and b=n/2 Level of smoothing depends on the size of the mask therefore different size of masks can be used to obtain desired degree of smoothing. In this work Gaussian filter is used for smoothing text images, for Gaussian filter, the kernel equation is as given in (2). (2) Standard deviation of the Gaussian σ control the size of filter mask and level of smoothing, for σ = 1.4, the Gaussian mask for size 7x7 is shown in fig-2, the normalization summation of all elements is equal to 1. Example of smoothed handwritten text images using Gaussian filter is shown in fig-3. 1 1 2 2 2 1 1 1 2 2 4 2 2 1 2 2 4 8 4 2 2 2 4 8 16 8 4 2 2 2 4 8 4 2 2 1 2 2 4 2 2 1 1 1 2 2 2 1 1 Fig-2, 7x7 Gaussian mask. Fig-3, Smoothed handwritten text images
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 05 Issue: 02 | Feb-2016, Available @ http://www.ijret.org 47 Thresholding is a method of creating binary image from gray-level image. The technique involves reduction of 8bits information (0 - 256) gray value in each image pixel to 1bit, that is value of 0 or 1. There are three major methods of thresholding a gray-level image. They are called global, Otsu and adaptive thresholding. Global thresholding is the appropriate method to use if histogram of the gray-level image is bi-modal, that is a partition exists between the object pixels and background pixels on the histogram plot. Then single threshold value can be selected within the interval of the valleys for good segmentation. Otsu's method also relies on image bi-modal histogram information to perform image thresholding using class clustering method. Threshold value that separate two classes, that is image foreground and background is determined based on inter and intra class variation. Optimum thresholding value is achieved when intra-class variance and inter-class variance attain minimal and maximal value respectively. Adaptive thresholding is one of the methods of converting gray-scale image to binary image. If the image histogram is not bimodal the best option is to use adaptive thresholding. The image is divided into small blocks; thresholding operation is performed on each block using single or optimum threshold value. In this work global threshold method is adopted. All the pixels that have gray value above selected threshold value are set to 1 and remaining pixels are set to zero. Examples of binary handwritten text image obtained using single threshold value are shown in fig-4. Fig-4, Binary handwritten text images. Thinning is a morphological operation that acts on binary image; it prunes pixel width of each point in the image to one pixel width. The process reduces the number of foreground pixels and reveals the skeleton of the image that shows the true representation of the text image written style. Also the process helps to speeds up subsequent operations. Fig-5 shows example of handwritten text images that have been thinned. 3. FEATURE EXTRACTION STAGE The feature extraction method is developed to generate feature vector that can effectively describe each user text written style and shape. The thinned binary handwritten text images are the input to the feature extraction algorithm. The image is divided into blocks by sliding a window of specific size over it from left to right with predefined overlapping. Fig-5: Thinned binary handwritten text image. Feature is extracted at area occupy by the window, therefore feature element is obtained from every area occupy by the window as it move from left to right. The feature extraction steps are stated as follows:  Step 1: Resize and obtain bounded thinned binary handwritten text image. Example is as shown in figure6  Step2: Determine the size of window  Step3: Set number of overlapping pixel.  Step4: Slide window over the thinned binary image to divide the image to 36 smaller blocks. Figure 7 shows for example ten out of the thirty six blocks.  Step5: Extract feature called mean centroid from each block.  Step6: Form feature vector of 36 elements, Table 1 show example of feature vectors obtained from three different text image samples. Fig- 6: Bounded thinned binary text image Figure-7: Parts of block text image.
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 05 Issue: 02 | Feb-2016, Available @ http://www.ijret.org 48 Table 1. Feature vectors for three different images. No Data 1 Data 2 Data 3 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 4.53488224 3.45168660 2.92667433 8.88962993 8.06341917 3.72129567 4.26013989 7.21623005 7.89360382 4.33285064 4.26295108 8.12868180 6.69972154 9.78906810 17.92384759 5.07721463 4.38308015 3.26426010 7.03765709 7.04935645 3.18791348 5.05271813 4.79949178 4.79155607 5.59597457 3.66391304 4.66648379 5.34633522 4.66961411 2.02494479 2.43479013 6.47949391 11.80428729 4.81542451 5.83899639 4.08391309 12.38031525 6.86022538 3.25610200 6.21064804 8.18699370 5.34424170 7.37065097 6.52470017 11.00691679 9.21598548 6.86913956 9.09138834 10.92457946 8.74400284 7.52221820 4.01696092 3.70579609 6.50076624 11.81375619 11.29388042 6.44414825 4.99686548 4.29052236 4.48467434 3.58149313 5.80491320 11.8331122 12.0999499 4.54999429 3.14113533 6.32723827 14.18773091 14.18773091 7.56849121 6.51802772 6.38929940 9.33817476 3.91014770 2.83660513 2.50587736 2.08696116 2.37960997 1.84135074 4.08325380 3.19968781 4.57277024 2.98169322 4.95866631 6.76451155 4.99804262 10.40938746 6.85775013 1.82574185 4.74704732 9.84151925 5.14524852 5.85924645 4.27633496 3.82861823 4.83982411 8.71839516 3.79316748 2.75638869 2.66570876 1.49646881 3.21111889 3.48928287 5.15260922 5.15260922 3.63902746 3.24395016 2.56322433 4. SUPPORT VECTOR MACHINE FOR WRITER IDENTIFICATION. Support Vector Machine (SVM) is a learning algorithm that has the capacity to classify feature vectors into different regions separated by optimal hyper plane using structural risk minimization method. Decision surface that is the optimal hyper plane represents the largest link between negative and positive examples. SVM deals with non- linearly separable data by project original input feature space into a higher dimension feature space using nonlinear kernel. Application of SVM in resolving personal identification problem using handwritten text images is achieved using training and testing algorithm. The system is trained using positive and negative text images to establish an optimal hyper plane that increases margin between the support vectors. The testing algorithm is used to determine classes of query handwritten text images based on the distance of the query feature vector from the hyper-plane. 5. EXPERIMENTAL RESULT Experiments are conducted to establish the capability of the proposed personal identification method to detect originator of contested handwritten text. Training of the proposed system is carried out using text images store in the system. Five handwritten text images are collected from each of the twenty people. Three images per person are passed to training algorithm based on Support Vector Machine (SVM) to establish each user model. Query text images are sent to the system for confirmation, 95% of the query images are detected correctly for the authentic handwritten text writers. 6. CONCLUSION Personal identification system based on handwritten text images and Support Vector Machine (SVM) has been developed for detecting originator of queried handwritten text. This was achieved by extracting discriminating feature from a set of suspected text images written by known writers. Text image is divided into smaller overlapping blocks to obtain robust local feature using a moving window. The experimental result obtained from the proposed text content dependent identification system using non-segmented character image is very encouraging. REFERENCES [1]. R. Plamondon and G.lorette. 1989. Automatic Signature verification and writer Identification- The state of the art. Pattern Recognition vol.22, no.2, pp.107-131. [2].Daramola Samuel and Ibiyemi Samuel. 2010. Novel Feature Extraction Technique for Off-line Signature Verification System. International Journal of Engineering Science and Technology vol. 2(7), pp. 3137-3143. [3].A. Chaabouni, H. Boubaker, M. Kherallah, A.M. Alimi and H.E. Abed. 2011. Combining of Off-line and On-line Feature Extraction Approaches for Writer Identification. In Proc. of the 11th International Conference on Document Analysis and Recognition, pp.1299-1303. [4]. S.A Daramola and T.S Ibiyemi. 2010. Efficient On-line Signature Verification System. International Journal of Engineering & Technology (IJET-IJENS), vol. 10, No: 04, pp.42-46. [5] Constantine Anton Cosmin Ştirbu Romeo, Vasile Badea. 2010. Identify Handwriting Individually Using Feed Forward Neural Networks. International Journal of Intelligent Computing Research (IJICR), vol. 1, Issue 4, pp. 183-188. [6]. Somaya Al-Maadeed. 2012. Text-Dependent Writer Identification for Arabic Handwriting Journal of Electrical and Computer Engineering; pp1-8. [7]. B. Helli, M.E. Moghaddam, 2008. A text-independent Persian writer identification system using LCS based classifier, in: IEEE International Symposium on Signal Processing and Information Technology, (ISSPIT). pp. 203– 206.
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 05 Issue: 02 | Feb-2016, Available @ http://www.ijret.org 49 [8] B. Helli, M.E. Moghaddam. 2010. A text-independent Persian writer identification based on Feature Relation Graph (FRG), Pattern Recognition. Vol.43, pp.2199–2209. [9].I. Siddiqi, N. Vincent. 2010. Text independent writer recognition using redundant writing patterns with contour- based orientation and curvature features. In Pattern Recognition. vol.43, pp.3853 –3865. [10] Golnaz Ghiasi, Reza Safabakhsh. 2013. Offline text- independent writer identification using codebook and efficient code extraction methods, Image Vision Computer, vol.31, no.5, pp.379-391. [11].Saranya K and Vijaya M S . 2013. Text Dependent Writer Identification using Support Vector Machine. International Journal of Computer Applications. vol.65– No.2, pp.6-11. [12].A. Schlapbach and H. Bunke. 2007. A writer identification and verification system using HMM based recognizers, Pattern analysis and applications. pp. 33-43. [13].U. Marti, R. Messerli, H. Bunke. 2001. Writer identification using text line based features. Proc. of 6th International Conference on Document Analysis and Recognition pp. 765–768. [14].M Bulacu, L Schomaker. 2007. Text-independent writer identification and verification using textural alloygraph feature. Pattern Analysis and Machine Intelligence, IEEE Transactions vol.29, Issue:4, pp.701 - 717. [15]. L Schomaker, M Bulacu. 2004. Automatic writer identification using connected-component contours and edge-based features of uppercase western script . Pattern Analysis and Machine Intelligence, IEEE Transactions vol.26, Issue: 6, pp.787 – 798. [16].Sreeraj M, Idicula S. 2011. Identifying Decisive Features for Distinctive Analysis of Writings in Malayalam. International Magazine on Advances in Computer Science and Telecommunications. vol. 2, no. 1. pp.13-20.