SlideShare a Scribd company logo
1 of 5
Download to read offline
Bhagyashri R Bakshi Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 3, ( Part -1) March 2015, pp.110-114
www.ijera.com 110|P a g e
Offline Signiture and Numeral Recognition in Context of Cheque
Bhagyashri Renukadas Bakshi1
, Prof. Zameer Farooqui2
1
M.E. Student, Electronics and telecommunication Department,Aditya College of Engineering , Beed, India.
2
Associate Professor & Head, Electronics and telecommunication Department,Aditya College of Engineering ,
Beed, India
Abstract
Signature is considered as one of the biometrics. Signature Verification System is required in almost all places
where it is compulsory to authenticate a person or his/her credentials to proceed further transaction especially
when it comes to bank cheques. For this purpose signature verification system must be powerful and accurate.
Till date various methods have been used to make signature verification system powerful and accurate. Research
here is related to offline signature verification. Shape Contexts have been used to verify whether 2 shapes are
similar or not. It has been used for various applications such as digit recognition, 3D Object recognition,
trademark retrieval etc. In this paper we present a modified version of shape context for signature verification on
bank cheques using K-Nearest Neighbor classifier.
Keyward: Centroid, KNN Classifier, Offline Signature Verification, Shape Context.
I. INTRODUCTION
Handwritten signature of each person is unique
hence it is used as one of the biometrics to
authenticate that person. Today various governments
and financial institutions accept signature as a legal
means of verifying identity. Any offline signature
verification system consists of five phases as Data
Acquisition, Preprocessing, Feature Extraction,
Classification and Verification. Offline signature is a
handwritten signature written on a paper which is
obtained by scanning through optical scanner. This
scanned digital image of signature needs
preprocessing to clear distortion or any noise
occurred while scanning image. Preprocessing
includes image normalization, binarization, thinning
etc. This step is important to extract features from
signature. In feature extraction a feature vector is
calculated considering different features from
signature. These features may include features from
local parts of signature features whole
signature. During classification input
signature is categorized. This input signature is then
tested with set of reference signatures that are trained
by classifier into a database. If it matches above
certain threshold then it is considered as genuine
otherwise it is forged. This basic working of
signature verification system is as in Fig. 1
II. BASIC CONCEPTS
Shape context is a feature descriptor used in object
recognition.
A. Shape matching approaches
There are 2 basic approaches for shape matching,
namely Feature based approach [1],[3],[7] which
include extraction of feature points, usually edge or
corner points, from the image and reduce the problem
to point set matching. Brightness based approach [8],
[9] make more direct use of pixel brightness and use
the image itself as a feature descriptor. Brightness
based approach is more robust but it takes huge
computation time than feature based approach.
Fig. 1 Basic Signature Verification System
B. Shape Context
Shape context have been mainly used for
matching similarities between shapes. In [2].
Introduced the shape contexts descriptor, which
describes the coarse distribution the rest of the shape
with respect to the given point on the shape. Where
shape descriptor of a given point on the shape is the
histogram of polar coordinates relative to all other
RESEARCH ARTICLE OPEN ACCESS
Bhagyashri R Bakshi Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 3, ( Part -1) March 2015, pp.110-114
www.ijera.com 111|P a g e
points. For each point pi on first shape, we want to
find the “best” matching point qj on the second
shape. Shape context descriptor as introduced in [2]
by Belongie et al. play such a role in shape matching.
The basic idea is to pick n points on the contours of a
shape. For each point pi on the shape, consider the n
− 1 vectors obtained by connecting pi to all other
points.
For the point pi, the coarse histogram of the relative
coordinates of the remaining n − 1 points, hi (k) = # q
!= pi : (q − pi) ∈ bin(k) is defined to be the shape
context of pi. The bins are normally taken to be
uniform in log-polar space. The fact that the shape
context is a rich and discriminative descriptor can be
seen in the Fig. 2 in which the shape contexts of two
different versions of the letter "A" are shown.
Fig. 2 (a) and (b) The Sample Edge Points of the Two
Shapes, (c)Diagram of Log-Polar Bins Used to
Compute The Shape Context.(d) Shape Context for
the Circle (e) Shape Context for the diamond, and (f)
Shape Context for the triangle.
As in Fig. 2 (d) and (e) are the shape contexts for
two closely related points, they are quite similar,
while the shape context in (f) is very different.
Rotation invariance can be achieved in shape
contexts. One way is to measure angles at each point
relative to the direction of the tangent at that point
(since the points are chosen on edges). This results in
a completely rotationally invariant descriptor. Scale
invariance will be obtained by normalizing all radial
distances by the mean distance α between all the
point pairs in the shape. Translational invariance
comes naturally to shape context.
In [2] shape contexts matching approach consist
of 3 stages:
1. solving the correspondence problem between 2
shapes
By shape contexts descriptor and bipartite
matching method.
2. Applying the correspondences to estimate an
aligning transform use thin plate
spline(TPS) modeling transformation and
3. Computing the distance between the two shapes
as a sum of matching errors. The distance will be
estimated as weighted sum of three terms: shape
context distance, image appearance distance, and
bending energy. It is defined as:
D=1.6Dac+Dsc+0.3Dbe
Where shape context distance is the symmetric
sum of shape context matching costs over best
matching points. Appearance cost is the sum of
squared brightness differences in Gaussian windows
around corresponding image points. And bending
energy is a measure of how much transformation is
required to bring two shapes into alignment.
III. PREPROCESSING
The preprocessing step is applied both in training
and testing phases. Signatures are scanned in gray.
The purpose in this phase is to make signatures
standard and ready for feature extraction. The
preprocessing stage includes four steps: Background
elimination, noise reduction, width normalization and
skeletonization. The preprocessing steps of an
example signature are shown in Fig. 3.
Fig 3. Preprocessing steps: (a) scanning, (b)
background elimination, (c) noise reduction, (d)
width normalization,(e) thinning applied signatures.
3.1 Background Elimination
Data area cropping must be done for extracting
features. P-tile thresholding was chosen to capture
signature from the background. After the
thresholding the pixels of the signature would be “1”
and the other pixels which belong to the back-ground
would be “0”.
3.2 Noise Reduction
A noise reduction filter is applied to the binary
image for eliminating single black pixels on white
background. 8-neighbors of a chosen pixel are
examined. If the number of black pixels is greater
than number of white pixels, the chosen pixel will be
black otherwise it will be white.
3.3 Width Normalization
Signature dimensions may have intrapersonal
and interper-sonal differences. So the image width is
adjusted to a default value and the height will change
without any change on height-to-width ratio. At the
end of width normalization width dimension is
adjusted to 100.
Bhagyashri R Bakshi Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 3, ( Part -1) March 2015, pp.110-114
www.ijera.com 112|P a g e
3.4 Thinning
The goal of thinning is to eliminate the thickness
differences of pen by making the image one pixel
thick. In this system Hilditch's Algorithm is used.
IV. FEATURE EXTRACTION
Extracted features in this phase are the inputs of
training phase. The features in this system are global
features, mask features and grid features. Global
features provide information about specific cases of
the signature shape. Mask features provide
information about directions of the lines of the
signatures. Grid features provide overall signature
appearance information.
4.1 Global Features
Signature area is the number of pixels which belong
to the signature. This feature provides information
about the signature density.
Signature height-to-width ratio is obtained by
dividing signature height to signature width.
Signature height and width can change. Height-to-
width ratios of one person’s signatures are
approximately equal.
Maximum horizontal histogram and maximum
vertical histogram: The horizontal histograms are
calculated for each row and the row which has the
highest value is taken as maximum horizontal
histogram. The vertical histograms are calculated for
each column and the column which has the highest
value is taken as maximum vertical histogram.
Horizontal and vertical center of the signature are
calculated using the formulas in Eq. 1 [10].
4.2 Mask Features
Mask features provide information about
directions of the lines of the signatures. The angles of
the signatures have interpersonal differences. In this
system 8 different 3x3 mask features are used. Each
mask is taken all around the signatures and the
number of 3x3 parts of the signature, which are same
with the mask, is calculated.
4.3 Grid Features
Grid features are used for finding densities of
signature parts [10]. In this system 60 grid features
are used. Signature is divided into 60 equal parts and
the image area in each di-vided part is calculated.
V. PROPOSED WORK
In this paper we propose a feature-based method
using shape context descriptor. We calculate shape
context with respect to centroid relative to n (possibly
100) sample points on the contour of the test
signature considering centroid as a reference point of
signature and then compute shape context distance
between test signature and template signatures from
the database after calculating the shape contexts of
their centroid relative to n sample points on the
contour of the signatures. This method will reduce
the number of matching candidates and processing
time.
VI. EXISTING SYSTEM AND ITS
LIMITATIONS
Existing work include shape context which
computes the radial and angular distances with
respect to all points on the shape considering one
sample point randomly as a reference point from the
set of n sample points. The basic shape context for
signature verification requires extra work for shape
alignment which is time consuming task.the shape
contexts of their centroid relative to n sample points
on the contour of the signatures. This method will
reduce the number of matching candidates and
processing time.
VII. ADVANTAGES OF PROPOSED
SYSTEM
Proposed system uses shape contexts for feature
extraction which is more robust on complex
backgrounds such as cheques. Aim of this paper is to
build accurate signature verification system for bank
cheques using shape contexts with modification of
reference point as a centroid. ThereTransformation
cost is reduced and system gives accurate results in
less time.
VIII. PROPOSED SYSTEM
ALGORITHM
1. Load scanned cheque image and crop the
signature part.
2. Apply normalization to the cropped signature as
Thinning, Binarization, rotation.
3. Apply feature extraction. That is calculate
centroid of the signature as:
Given signature shape viewed as a binary function
f(x,y)=
Where D is the domain of this binary shape. Then
Centroid C (gx,gy) of this shape given by:-
(1)
Where A is the area of the given shape,
4. Select train/template signature database.
5. Apply steps 1-3 on each signature in the
train/template database.
6. For a test signature and template signatures
centroid is considered as a reference point.
Bhagyashri R Bakshi Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 3, ( Part -1) March 2015, pp.110-114
www.ijera.com 113|P a g e
Compute shape context for each point from n
sample points (possibly 100) on the contour of
test signature and template signatures,
considering centroid as a reference point.
A. Calculation of shape context
For each point pi on the first shape (shape of test
signature), we want to find the “best” matching point
qj on the second shape (shape of template signature).
Shape context here is a set of vectors originating
from a centroid of signature to all the sample points
on the signature’s boundary. These vectors express
the configuration of the entire shape relative to the
centroid. We compute a coarse histogram hi of the
relative coordinates of around 100 boundary points
with respect to centroid as,
hi(k)=# q ≠ pi : (q-pi) ∈ bin(k) (2)
This histogram is defined to be the shape context of
pi. We use bins that are uniform in log polar space,
making descriptor more sensitive to positions of
nearby sample points than to those of points farther
away.
7. Apply same procedure as in 6 to calculate shape
contexts of template signatures from database.
8. Calculate the shape distance between each pair
of points on two shapes (test signature and
template signature) as a weighted sum of shape
context distance and image appearance distance.
B. Calculations of Shape distance
In basic shape context implementation, shape
distance is a weighted sum of shape context distance
Dsc, image appearance distance Dac and the amount
of transformation necessary to align the shapes i.e.
bending energy Dbe. In our Proposed system shape
distance between two signatures is calculated using
only shape context distance and image appearance
distance since we are calculating shape context
distance using centroid as a reference point, no
transformation is required for shape alignment.
Therefore no need to calculate bending energy. Shape
distance will be calculated as:
(3)
Where,
(4)
(5)
Where Ip and IQ are the grey-level images
corresponding to P and Q, respectively. Δ denotes
some deferential vector offset and G is a windowing
function typically chosen to be a Gaussian, thus
putting emphasis to pixels nearby.
C.K-NNClassifier
KNearestNeighborclassifierisbasedonnon-
parametricmethodusedforclassification.Itisoneofthesi
mplestmachinelearningalgorithms.Itclassifiesanobject
byamajorityvoteofitsneighbors,withtheobjectbeingass
ignedtotheclassmostcommonamongitsknearestneighb
ors(kisapositiveinteger,typicallysmall).Ifk=1,thentheo
bjectissimplyassignedtotheclassofthatsinglenearestnei
ghbor.Thetrainingphaseofthealgorithmconsistsonlyof
storingthefeaturevectorsandclasslabelsofthetrainingsa
mples.Intheclassificationphase, kisauser-
definedconstant,andanunlabeledvector(aqueryortestp
oint)isclassifiedbyassigningthelabelwhichismostfrequ
entamongthe k training samples nearest to that
querypoint.
10.Ifthe shape distancedifference <= threshold,
calculate the cost matrix for computing shape
contexts and find out minimumcost as asimilarity
measure.
D.CalculationofShapecontextcost
Considerapointpionthefirstshapeandthepointqjont
he
secondshapethenCijwilldenotethecostofmatchingthes
e two pointsgivenby,
Cij≡C(pi,qj)= (6)
Wherehi(k)andhj(k)denotetheK-
binnormalizedhistogram at piand qj, respectively.
11.Theoutputwillbeeithertestsignatureisauthenticated
andacceptedortestsignatureisnotauthenticatedand
accepted.Inthiswayifthecroppedsignaturefromthe
bankchequeisauthenticatedchequeundertestwillal
so be authenticated.
InputTestSignatureNormalization
(LoadScannedCheque
Bhagyashri R Bakshi Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 3, ( Part -1) March 2015, pp.110-114
www.ijera.com 114|P a g e
Image&CropSignature
Part)
Feature Extraction
(CalculateCentroidTemplate
relativetonSampleDatabase
PointsontheSignature
Contour)
ComputeShapeContextfor
eachofthensamplepoints
withrespectcentroid
consideringcentroid
asareferencepoint.
Computetheshape
distancebetween2signatures
as:D=Dsc +1.6Dac
IsShapedistanceNO
difference≤Threshold?
Yes
CalculateCostMatrixfor
Computingshapecontexts
&Findoutminimumcost
asasimilaritymeasure
CompareSimilarity
Measureusing
KNNClassifier
FinalSignature
Authentication
Decision
Fig. 4 SystemFlowchart
IX. CONCLUSION
In this paper we have proposed the modified
shape context for offline signature recognition. The
shape context feature proposed by Belongie et al. [2]
computes the radial and angular distances with
respect to all points on the shape. Here we have
modified this concept by calculating the distance with
respect to centroid of the shape. Shape context for n
sample boundary points is calculated considering
centroid of the signature as a reference point. K
nearest neighbor classifier is used to compare Shape
distance of test signature with template signatures.
Since there is no alignment work needed total
computation time is reduced, hence proposed work is
much promising. Proposed system will help to
prevent cheque frauds in banking sector.
REFERENCES
[1] Miguel A. Ferrer, J. Francisco Vargas,
Aythami Morales, and Aaron Ordonez,
”Robustness of Offline Signature Verification
Based on Gray Level Features”, IEEE
Transactions on Information Forensics and
Security, Vol 7,No. 3, June 2012, PP 966-977
[2] Serge Belongie, Jitendra Malik, Jan Puzicha,
“Shape Matching and Object Recognition
Using Shape Contexts”, IEEE Transactions on
Pattern Analysis and Machine Intelligence,
Vol 24, No 24, April 2002, PP 509-522
[3] Greg Mori, Serge Belongie, Jitendra
Malik,”Efficient Shape Matching Using Shape
Contexts”,Vol 27,No. 11,November 2005.
[4] Marcin Adamski, Khalid Saeed, ”Offline
Signature Verification Based on Shape
Contexts Using Shared and User-Specific
Thresholds”, Journal of Medical Informatics &
Technologies, Vol. 22, Issn 1642-6037,Year
2013, PP 195-201
[5] ADAMSKI M., SAEED K., “Offline Signature
Identification and Verification using
Noniterative Shape Context Algorithm”,
Journal of Medical Informatics and
Technologies, Vol. 13, pp. 47-58, 2009.
[6] Chien-Chou Lin,Chun-Ting Chang,”A Fast
Shape Context Matching Using Indexing”,
Fifth International Conference on Genetic and
Evolutionary Computing IEEE,pp.17-20,2011
[7] Persoon, E. and K.S. Fu,”Shape
Discrimination Using Fourier Descriptors”,
IEEE Transactions on Pattern Analysis and
Machine Intelligence, 1986, PAMI-8(3):p.388-
397
[8] Oren, M. et al., “Pedestrian Detection using
Wavelet Templates”, Proceedings of IEEE
computer society Conference on computer
vision and pattern recognition, 1997.
[9] Moghaddam, B., T. Jebara, and A. Pentland,
“Bayesian face recognition”, Pattern
Recognition, 2000, 33(11): p.1771-1782.

More Related Content

What's hot

Handwritten amazigh-character-recognition-system-for-image-obtained-by-camera...
Handwritten amazigh-character-recognition-system-for-image-obtained-by-camera...Handwritten amazigh-character-recognition-system-for-image-obtained-by-camera...
Handwritten amazigh-character-recognition-system-for-image-obtained-by-camera...Youssef Rachidi
 
Hierarchical Approach for Total Variation Digital Image Inpainting
Hierarchical Approach for Total Variation Digital Image InpaintingHierarchical Approach for Total Variation Digital Image Inpainting
Hierarchical Approach for Total Variation Digital Image InpaintingIJCSEA Journal
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
Text-Image Separation in Document Images using Boundary/Perimeter Detection
Text-Image Separation in Document Images using Boundary/Perimeter DetectionText-Image Separation in Document Images using Boundary/Perimeter Detection
Text-Image Separation in Document Images using Boundary/Perimeter DetectionIDES Editor
 
Cursive Handwriting Segmentation Using Ideal Distance Approach
Cursive Handwriting Segmentation Using Ideal Distance Approach Cursive Handwriting Segmentation Using Ideal Distance Approach
Cursive Handwriting Segmentation Using Ideal Distance Approach IJECEIAES
 
Assessing Error Bound For Dominant Point Detection
Assessing Error Bound For Dominant Point DetectionAssessing Error Bound For Dominant Point Detection
Assessing Error Bound For Dominant Point DetectionCSCJournals
 
A Novel 2D Feature Extraction Method for Fingerprints Using Minutiae Points a...
A Novel 2D Feature Extraction Method for Fingerprints Using Minutiae Points a...A Novel 2D Feature Extraction Method for Fingerprints Using Minutiae Points a...
A Novel 2D Feature Extraction Method for Fingerprints Using Minutiae Points a...IJECEIAES
 
Finger Print Image Compression for Extracting Texture Features and Reconstru...
Finger Print Image Compression for Extracting Texture Features  and Reconstru...Finger Print Image Compression for Extracting Texture Features  and Reconstru...
Finger Print Image Compression for Extracting Texture Features and Reconstru...IOSR Journals
 
OBJECT SEGMENTATION USING MULTISCALE MORPHOLOGICAL OPERATIONS
OBJECT SEGMENTATION USING MULTISCALE MORPHOLOGICAL OPERATIONSOBJECT SEGMENTATION USING MULTISCALE MORPHOLOGICAL OPERATIONS
OBJECT SEGMENTATION USING MULTISCALE MORPHOLOGICAL OPERATIONSijcseit
 
Digital Image Inpainting: A Review
Digital Image Inpainting: A ReviewDigital Image Inpainting: A Review
Digital Image Inpainting: A ReviewIRJET Journal
 
A Hybrid Technique for Shape Matching Based on chain code and DFS Tree
A Hybrid Technique for Shape Matching Based on chain code and DFS TreeA Hybrid Technique for Shape Matching Based on chain code and DFS Tree
A Hybrid Technique for Shape Matching Based on chain code and DFS TreeIOSR Journals
 
Comparative study of two methods for Handwritten Devanagari Numeral Recognition
Comparative study of two methods for Handwritten Devanagari Numeral RecognitionComparative study of two methods for Handwritten Devanagari Numeral Recognition
Comparative study of two methods for Handwritten Devanagari Numeral RecognitionIOSR Journals
 
A Survey on Tamil Handwritten Character Recognition using OCR Techniques
A Survey on Tamil Handwritten Character Recognition using OCR TechniquesA Survey on Tamil Handwritten Character Recognition using OCR Techniques
A Survey on Tamil Handwritten Character Recognition using OCR Techniquescscpconf
 
Computer Graphics and Virtual Reality
Computer Graphics and Virtual RealityComputer Graphics and Virtual Reality
Computer Graphics and Virtual Realitychirag patil
 
A novel embedded hybrid thinning algorithm for
A novel embedded hybrid thinning algorithm forA novel embedded hybrid thinning algorithm for
A novel embedded hybrid thinning algorithm forprjpublications
 
SYMMETRICAL WEIGHTED SUBSPACE HOLISTIC APPROACH FOR EXPRESSION RECOGNITION
SYMMETRICAL WEIGHTED SUBSPACE HOLISTIC APPROACH FOR EXPRESSION RECOGNITIONSYMMETRICAL WEIGHTED SUBSPACE HOLISTIC APPROACH FOR EXPRESSION RECOGNITION
SYMMETRICAL WEIGHTED SUBSPACE HOLISTIC APPROACH FOR EXPRESSION RECOGNITIONijcsit
 

What's hot (19)

Handwritten amazigh-character-recognition-system-for-image-obtained-by-camera...
Handwritten amazigh-character-recognition-system-for-image-obtained-by-camera...Handwritten amazigh-character-recognition-system-for-image-obtained-by-camera...
Handwritten amazigh-character-recognition-system-for-image-obtained-by-camera...
 
Hierarchical Approach for Total Variation Digital Image Inpainting
Hierarchical Approach for Total Variation Digital Image InpaintingHierarchical Approach for Total Variation Digital Image Inpainting
Hierarchical Approach for Total Variation Digital Image Inpainting
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Text-Image Separation in Document Images using Boundary/Perimeter Detection
Text-Image Separation in Document Images using Boundary/Perimeter DetectionText-Image Separation in Document Images using Boundary/Perimeter Detection
Text-Image Separation in Document Images using Boundary/Perimeter Detection
 
Image segmentation based on color
Image segmentation based on colorImage segmentation based on color
Image segmentation based on color
 
Cursive Handwriting Segmentation Using Ideal Distance Approach
Cursive Handwriting Segmentation Using Ideal Distance Approach Cursive Handwriting Segmentation Using Ideal Distance Approach
Cursive Handwriting Segmentation Using Ideal Distance Approach
 
Assessing Error Bound For Dominant Point Detection
Assessing Error Bound For Dominant Point DetectionAssessing Error Bound For Dominant Point Detection
Assessing Error Bound For Dominant Point Detection
 
A Novel 2D Feature Extraction Method for Fingerprints Using Minutiae Points a...
A Novel 2D Feature Extraction Method for Fingerprints Using Minutiae Points a...A Novel 2D Feature Extraction Method for Fingerprints Using Minutiae Points a...
A Novel 2D Feature Extraction Method for Fingerprints Using Minutiae Points a...
 
Finger Print Image Compression for Extracting Texture Features and Reconstru...
Finger Print Image Compression for Extracting Texture Features  and Reconstru...Finger Print Image Compression for Extracting Texture Features  and Reconstru...
Finger Print Image Compression for Extracting Texture Features and Reconstru...
 
Shape Features
 Shape Features  Shape Features
Shape Features
 
OBJECT SEGMENTATION USING MULTISCALE MORPHOLOGICAL OPERATIONS
OBJECT SEGMENTATION USING MULTISCALE MORPHOLOGICAL OPERATIONSOBJECT SEGMENTATION USING MULTISCALE MORPHOLOGICAL OPERATIONS
OBJECT SEGMENTATION USING MULTISCALE MORPHOLOGICAL OPERATIONS
 
Number Plate Recognition
Number Plate RecognitionNumber Plate Recognition
Number Plate Recognition
 
Digital Image Inpainting: A Review
Digital Image Inpainting: A ReviewDigital Image Inpainting: A Review
Digital Image Inpainting: A Review
 
A Hybrid Technique for Shape Matching Based on chain code and DFS Tree
A Hybrid Technique for Shape Matching Based on chain code and DFS TreeA Hybrid Technique for Shape Matching Based on chain code and DFS Tree
A Hybrid Technique for Shape Matching Based on chain code and DFS Tree
 
Comparative study of two methods for Handwritten Devanagari Numeral Recognition
Comparative study of two methods for Handwritten Devanagari Numeral RecognitionComparative study of two methods for Handwritten Devanagari Numeral Recognition
Comparative study of two methods for Handwritten Devanagari Numeral Recognition
 
A Survey on Tamil Handwritten Character Recognition using OCR Techniques
A Survey on Tamil Handwritten Character Recognition using OCR TechniquesA Survey on Tamil Handwritten Character Recognition using OCR Techniques
A Survey on Tamil Handwritten Character Recognition using OCR Techniques
 
Computer Graphics and Virtual Reality
Computer Graphics and Virtual RealityComputer Graphics and Virtual Reality
Computer Graphics and Virtual Reality
 
A novel embedded hybrid thinning algorithm for
A novel embedded hybrid thinning algorithm forA novel embedded hybrid thinning algorithm for
A novel embedded hybrid thinning algorithm for
 
SYMMETRICAL WEIGHTED SUBSPACE HOLISTIC APPROACH FOR EXPRESSION RECOGNITION
SYMMETRICAL WEIGHTED SUBSPACE HOLISTIC APPROACH FOR EXPRESSION RECOGNITIONSYMMETRICAL WEIGHTED SUBSPACE HOLISTIC APPROACH FOR EXPRESSION RECOGNITION
SYMMETRICAL WEIGHTED SUBSPACE HOLISTIC APPROACH FOR EXPRESSION RECOGNITION
 

Viewers also liked

Bob sadino
Bob sadinoBob sadino
Bob sadinoantiurma
 
Experimental Investigation of Heat Transfer Using “Twisted Aluminium Tape”
Experimental Investigation of Heat Transfer Using “Twisted Aluminium Tape”Experimental Investigation of Heat Transfer Using “Twisted Aluminium Tape”
Experimental Investigation of Heat Transfer Using “Twisted Aluminium Tape”IJERA Editor
 
2015 Cadillac CTS Sedan eBrochure
2015 Cadillac CTS Sedan eBrochure2015 Cadillac CTS Sedan eBrochure
2015 Cadillac CTS Sedan eBrochurevisibledealer
 
Ngủ ngon, ngủ đủ giấc mang lại lợi ích lớn lao
Ngủ ngon, ngủ đủ giấc mang lại lợi ích lớn laoNgủ ngon, ngủ đủ giấc mang lại lợi ích lớn lao
Ngủ ngon, ngủ đủ giấc mang lại lợi ích lớn laoenedina675
 
Praktika 6 darina tšerdakova
Praktika 6 darina tšerdakovaPraktika 6 darina tšerdakova
Praktika 6 darina tšerdakovaDarina Cherdakova
 
Performance Analysis of DRA Based OFDM Data Transmission With Respect to Nove...
Performance Analysis of DRA Based OFDM Data Transmission With Respect to Nove...Performance Analysis of DRA Based OFDM Data Transmission With Respect to Nove...
Performance Analysis of DRA Based OFDM Data Transmission With Respect to Nove...IJERA Editor
 
Persetujuan New York
Persetujuan New YorkPersetujuan New York
Persetujuan New YorkAzureapio
 
A Study on Protection of Cables by Solkor Differential Protection Relay with ...
A Study on Protection of Cables by Solkor Differential Protection Relay with ...A Study on Protection of Cables by Solkor Differential Protection Relay with ...
A Study on Protection of Cables by Solkor Differential Protection Relay with ...IJERA Editor
 
Lay’s pakistan by usman ayub
Lay’s pakistan by usman ayubLay’s pakistan by usman ayub
Lay’s pakistan by usman ayubusman03138300073
 
2015 GMC Acadia eBrochure
2015 GMC Acadia eBrochure2015 GMC Acadia eBrochure
2015 GMC Acadia eBrochurevisibledealer
 
Животный мир - Wildlife!
Животный мир - Wildlife!Животный мир - Wildlife!
Животный мир - Wildlife!Ruslan Lyashchuk
 
Πάσχα - Πρωτομαγιά - Αγ Πνεύματος 2015 στην Ελλάδα
Πάσχα - Πρωτομαγιά - Αγ Πνεύματος 2015 στην ΕλλάδαΠάσχα - Πρωτομαγιά - Αγ Πνεύματος 2015 στην Ελλάδα
Πάσχα - Πρωτομαγιά - Αγ Πνεύματος 2015 στην ΕλλάδαPyramis Travel
 
The Effect of Nima Yushij’s “Afsaneh (Myth)” Verse Collection on Modern Lyric...
The Effect of Nima Yushij’s “Afsaneh (Myth)” Verse Collection on Modern Lyric...The Effect of Nima Yushij’s “Afsaneh (Myth)” Verse Collection on Modern Lyric...
The Effect of Nima Yushij’s “Afsaneh (Myth)” Verse Collection on Modern Lyric...IJERA Editor
 
Экскурсия "Ад помніка да помніка" (г. Дзятлава, Гродзенская вобл.)
Экскурсия "Ад помніка да помніка" (г. Дзятлава, Гродзенская вобл.)Экскурсия "Ад помніка да помніка" (г. Дзятлава, Гродзенская вобл.)
Экскурсия "Ад помніка да помніка" (г. Дзятлава, Гродзенская вобл.)Nisapp
 
Лазаруване и цветница
Лазаруване и цветницаЛазаруване и цветница
Лазаруване и цветницаDaniela Popova
 
Информационные технологии в деятельности психолога практика: повышение квалиф...
Информационные технологии в деятельности психолога практика: повышение квалиф...Информационные технологии в деятельности психолога практика: повышение квалиф...
Информационные технологии в деятельности психолога практика: повышение квалиф...Ilya Perminov
 

Viewers also liked (19)

Bob sadino
Bob sadinoBob sadino
Bob sadino
 
Hemp The food
Hemp The foodHemp The food
Hemp The food
 
Experimental Investigation of Heat Transfer Using “Twisted Aluminium Tape”
Experimental Investigation of Heat Transfer Using “Twisted Aluminium Tape”Experimental Investigation of Heat Transfer Using “Twisted Aluminium Tape”
Experimental Investigation of Heat Transfer Using “Twisted Aluminium Tape”
 
img-916082552
img-916082552img-916082552
img-916082552
 
2015 Cadillac CTS Sedan eBrochure
2015 Cadillac CTS Sedan eBrochure2015 Cadillac CTS Sedan eBrochure
2015 Cadillac CTS Sedan eBrochure
 
Ngủ ngon, ngủ đủ giấc mang lại lợi ích lớn lao
Ngủ ngon, ngủ đủ giấc mang lại lợi ích lớn laoNgủ ngon, ngủ đủ giấc mang lại lợi ích lớn lao
Ngủ ngon, ngủ đủ giấc mang lại lợi ích lớn lao
 
Praktika 6 darina tšerdakova
Praktika 6 darina tšerdakovaPraktika 6 darina tšerdakova
Praktika 6 darina tšerdakova
 
Performance Analysis of DRA Based OFDM Data Transmission With Respect to Nove...
Performance Analysis of DRA Based OFDM Data Transmission With Respect to Nove...Performance Analysis of DRA Based OFDM Data Transmission With Respect to Nove...
Performance Analysis of DRA Based OFDM Data Transmission With Respect to Nove...
 
Invite Blockchain
Invite BlockchainInvite Blockchain
Invite Blockchain
 
Persetujuan New York
Persetujuan New YorkPersetujuan New York
Persetujuan New York
 
A Study on Protection of Cables by Solkor Differential Protection Relay with ...
A Study on Protection of Cables by Solkor Differential Protection Relay with ...A Study on Protection of Cables by Solkor Differential Protection Relay with ...
A Study on Protection of Cables by Solkor Differential Protection Relay with ...
 
Lay’s pakistan by usman ayub
Lay’s pakistan by usman ayubLay’s pakistan by usman ayub
Lay’s pakistan by usman ayub
 
2015 GMC Acadia eBrochure
2015 GMC Acadia eBrochure2015 GMC Acadia eBrochure
2015 GMC Acadia eBrochure
 
Животный мир - Wildlife!
Животный мир - Wildlife!Животный мир - Wildlife!
Животный мир - Wildlife!
 
Πάσχα - Πρωτομαγιά - Αγ Πνεύματος 2015 στην Ελλάδα
Πάσχα - Πρωτομαγιά - Αγ Πνεύματος 2015 στην ΕλλάδαΠάσχα - Πρωτομαγιά - Αγ Πνεύματος 2015 στην Ελλάδα
Πάσχα - Πρωτομαγιά - Αγ Πνεύματος 2015 στην Ελλάδα
 
The Effect of Nima Yushij’s “Afsaneh (Myth)” Verse Collection on Modern Lyric...
The Effect of Nima Yushij’s “Afsaneh (Myth)” Verse Collection on Modern Lyric...The Effect of Nima Yushij’s “Afsaneh (Myth)” Verse Collection on Modern Lyric...
The Effect of Nima Yushij’s “Afsaneh (Myth)” Verse Collection on Modern Lyric...
 
Экскурсия "Ад помніка да помніка" (г. Дзятлава, Гродзенская вобл.)
Экскурсия "Ад помніка да помніка" (г. Дзятлава, Гродзенская вобл.)Экскурсия "Ад помніка да помніка" (г. Дзятлава, Гродзенская вобл.)
Экскурсия "Ад помніка да помніка" (г. Дзятлава, Гродзенская вобл.)
 
Лазаруване и цветница
Лазаруване и цветницаЛазаруване и цветница
Лазаруване и цветница
 
Информационные технологии в деятельности психолога практика: повышение квалиф...
Информационные технологии в деятельности психолога практика: повышение квалиф...Информационные технологии в деятельности психолога практика: повышение квалиф...
Информационные технологии в деятельности психолога практика: повышение квалиф...
 

Similar to Offline Signiture and Numeral Recognition in Context of Cheque

Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...ijfcstjournal
 
Ganesan dhawanrpt
Ganesan dhawanrptGanesan dhawanrpt
Ganesan dhawanrptpramod naik
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Signature recognition using clustering techniques dissertati
Signature recognition using clustering techniques dissertatiSignature recognition using clustering techniques dissertati
Signature recognition using clustering techniques dissertatiDr. Vinayak Bharadi
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
IRJET- Advanced Character based Recognition and Phone Handling for Blind ...
IRJET-  	  Advanced Character based Recognition and Phone Handling for Blind ...IRJET-  	  Advanced Character based Recognition and Phone Handling for Blind ...
IRJET- Advanced Character based Recognition and Phone Handling for Blind ...IRJET Journal
 
Paper id 36201507
Paper id 36201507Paper id 36201507
Paper id 36201507IJRAT
 
A Simple Signature Recognition System
A Simple Signature Recognition System A Simple Signature Recognition System
A Simple Signature Recognition System iosrjce
 
Successive Geometric Center Based Dynamic Signature Recognition
Successive Geometric Center Based Dynamic Signature RecognitionSuccessive Geometric Center Based Dynamic Signature Recognition
Successive Geometric Center Based Dynamic Signature RecognitionDr. Vinayak Bharadi
 
Handwritten Signature Verification System using Sobel Operator and KNN Classi...
Handwritten Signature Verification System using Sobel Operator and KNN Classi...Handwritten Signature Verification System using Sobel Operator and KNN Classi...
Handwritten Signature Verification System using Sobel Operator and KNN Classi...ijtsrd
 
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...iosrjce
 

Similar to Offline Signiture and Numeral Recognition in Context of Cheque (20)

Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...
 
1834 1840
1834 18401834 1840
1834 1840
 
1834 1840
1834 18401834 1840
1834 1840
 
Offline Signature Verification and Recognition using Neural Network
Offline Signature Verification and Recognition using Neural NetworkOffline Signature Verification and Recognition using Neural Network
Offline Signature Verification and Recognition using Neural Network
 
Ganesan dhawanrpt
Ganesan dhawanrptGanesan dhawanrpt
Ganesan dhawanrpt
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Signature recognition using clustering techniques dissertati
Signature recognition using clustering techniques dissertatiSignature recognition using clustering techniques dissertati
Signature recognition using clustering techniques dissertati
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
IRJET- Advanced Character based Recognition and Phone Handling for Blind ...
IRJET-  	  Advanced Character based Recognition and Phone Handling for Blind ...IRJET-  	  Advanced Character based Recognition and Phone Handling for Blind ...
IRJET- Advanced Character based Recognition and Phone Handling for Blind ...
 
Paper id 36201507
Paper id 36201507Paper id 36201507
Paper id 36201507
 
A Simple Signature Recognition System
A Simple Signature Recognition System A Simple Signature Recognition System
A Simple Signature Recognition System
 
K012647982
K012647982K012647982
K012647982
 
K012647982
K012647982K012647982
K012647982
 
Dp34707712
Dp34707712Dp34707712
Dp34707712
 
El4301832837
El4301832837El4301832837
El4301832837
 
Successive Geometric Center Based Dynamic Signature Recognition
Successive Geometric Center Based Dynamic Signature RecognitionSuccessive Geometric Center Based Dynamic Signature Recognition
Successive Geometric Center Based Dynamic Signature Recognition
 
Handwritten Signature Verification System using Sobel Operator and KNN Classi...
Handwritten Signature Verification System using Sobel Operator and KNN Classi...Handwritten Signature Verification System using Sobel Operator and KNN Classi...
Handwritten Signature Verification System using Sobel Operator and KNN Classi...
 
L017248388
L017248388L017248388
L017248388
 
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
 
E017443136
E017443136E017443136
E017443136
 

Recently uploaded

Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...Call Girls in Nagpur High Profile
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 

Recently uploaded (20)

Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 

Offline Signiture and Numeral Recognition in Context of Cheque

  • 1. Bhagyashri R Bakshi Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 5, Issue 3, ( Part -1) March 2015, pp.110-114 www.ijera.com 110|P a g e Offline Signiture and Numeral Recognition in Context of Cheque Bhagyashri Renukadas Bakshi1 , Prof. Zameer Farooqui2 1 M.E. Student, Electronics and telecommunication Department,Aditya College of Engineering , Beed, India. 2 Associate Professor & Head, Electronics and telecommunication Department,Aditya College of Engineering , Beed, India Abstract Signature is considered as one of the biometrics. Signature Verification System is required in almost all places where it is compulsory to authenticate a person or his/her credentials to proceed further transaction especially when it comes to bank cheques. For this purpose signature verification system must be powerful and accurate. Till date various methods have been used to make signature verification system powerful and accurate. Research here is related to offline signature verification. Shape Contexts have been used to verify whether 2 shapes are similar or not. It has been used for various applications such as digit recognition, 3D Object recognition, trademark retrieval etc. In this paper we present a modified version of shape context for signature verification on bank cheques using K-Nearest Neighbor classifier. Keyward: Centroid, KNN Classifier, Offline Signature Verification, Shape Context. I. INTRODUCTION Handwritten signature of each person is unique hence it is used as one of the biometrics to authenticate that person. Today various governments and financial institutions accept signature as a legal means of verifying identity. Any offline signature verification system consists of five phases as Data Acquisition, Preprocessing, Feature Extraction, Classification and Verification. Offline signature is a handwritten signature written on a paper which is obtained by scanning through optical scanner. This scanned digital image of signature needs preprocessing to clear distortion or any noise occurred while scanning image. Preprocessing includes image normalization, binarization, thinning etc. This step is important to extract features from signature. In feature extraction a feature vector is calculated considering different features from signature. These features may include features from local parts of signature features whole signature. During classification input signature is categorized. This input signature is then tested with set of reference signatures that are trained by classifier into a database. If it matches above certain threshold then it is considered as genuine otherwise it is forged. This basic working of signature verification system is as in Fig. 1 II. BASIC CONCEPTS Shape context is a feature descriptor used in object recognition. A. Shape matching approaches There are 2 basic approaches for shape matching, namely Feature based approach [1],[3],[7] which include extraction of feature points, usually edge or corner points, from the image and reduce the problem to point set matching. Brightness based approach [8], [9] make more direct use of pixel brightness and use the image itself as a feature descriptor. Brightness based approach is more robust but it takes huge computation time than feature based approach. Fig. 1 Basic Signature Verification System B. Shape Context Shape context have been mainly used for matching similarities between shapes. In [2]. Introduced the shape contexts descriptor, which describes the coarse distribution the rest of the shape with respect to the given point on the shape. Where shape descriptor of a given point on the shape is the histogram of polar coordinates relative to all other RESEARCH ARTICLE OPEN ACCESS
  • 2. Bhagyashri R Bakshi Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 5, Issue 3, ( Part -1) March 2015, pp.110-114 www.ijera.com 111|P a g e points. For each point pi on first shape, we want to find the “best” matching point qj on the second shape. Shape context descriptor as introduced in [2] by Belongie et al. play such a role in shape matching. The basic idea is to pick n points on the contours of a shape. For each point pi on the shape, consider the n − 1 vectors obtained by connecting pi to all other points. For the point pi, the coarse histogram of the relative coordinates of the remaining n − 1 points, hi (k) = # q != pi : (q − pi) ∈ bin(k) is defined to be the shape context of pi. The bins are normally taken to be uniform in log-polar space. The fact that the shape context is a rich and discriminative descriptor can be seen in the Fig. 2 in which the shape contexts of two different versions of the letter "A" are shown. Fig. 2 (a) and (b) The Sample Edge Points of the Two Shapes, (c)Diagram of Log-Polar Bins Used to Compute The Shape Context.(d) Shape Context for the Circle (e) Shape Context for the diamond, and (f) Shape Context for the triangle. As in Fig. 2 (d) and (e) are the shape contexts for two closely related points, they are quite similar, while the shape context in (f) is very different. Rotation invariance can be achieved in shape contexts. One way is to measure angles at each point relative to the direction of the tangent at that point (since the points are chosen on edges). This results in a completely rotationally invariant descriptor. Scale invariance will be obtained by normalizing all radial distances by the mean distance α between all the point pairs in the shape. Translational invariance comes naturally to shape context. In [2] shape contexts matching approach consist of 3 stages: 1. solving the correspondence problem between 2 shapes By shape contexts descriptor and bipartite matching method. 2. Applying the correspondences to estimate an aligning transform use thin plate spline(TPS) modeling transformation and 3. Computing the distance between the two shapes as a sum of matching errors. The distance will be estimated as weighted sum of three terms: shape context distance, image appearance distance, and bending energy. It is defined as: D=1.6Dac+Dsc+0.3Dbe Where shape context distance is the symmetric sum of shape context matching costs over best matching points. Appearance cost is the sum of squared brightness differences in Gaussian windows around corresponding image points. And bending energy is a measure of how much transformation is required to bring two shapes into alignment. III. PREPROCESSING The preprocessing step is applied both in training and testing phases. Signatures are scanned in gray. The purpose in this phase is to make signatures standard and ready for feature extraction. The preprocessing stage includes four steps: Background elimination, noise reduction, width normalization and skeletonization. The preprocessing steps of an example signature are shown in Fig. 3. Fig 3. Preprocessing steps: (a) scanning, (b) background elimination, (c) noise reduction, (d) width normalization,(e) thinning applied signatures. 3.1 Background Elimination Data area cropping must be done for extracting features. P-tile thresholding was chosen to capture signature from the background. After the thresholding the pixels of the signature would be “1” and the other pixels which belong to the back-ground would be “0”. 3.2 Noise Reduction A noise reduction filter is applied to the binary image for eliminating single black pixels on white background. 8-neighbors of a chosen pixel are examined. If the number of black pixels is greater than number of white pixels, the chosen pixel will be black otherwise it will be white. 3.3 Width Normalization Signature dimensions may have intrapersonal and interper-sonal differences. So the image width is adjusted to a default value and the height will change without any change on height-to-width ratio. At the end of width normalization width dimension is adjusted to 100.
  • 3. Bhagyashri R Bakshi Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 5, Issue 3, ( Part -1) March 2015, pp.110-114 www.ijera.com 112|P a g e 3.4 Thinning The goal of thinning is to eliminate the thickness differences of pen by making the image one pixel thick. In this system Hilditch's Algorithm is used. IV. FEATURE EXTRACTION Extracted features in this phase are the inputs of training phase. The features in this system are global features, mask features and grid features. Global features provide information about specific cases of the signature shape. Mask features provide information about directions of the lines of the signatures. Grid features provide overall signature appearance information. 4.1 Global Features Signature area is the number of pixels which belong to the signature. This feature provides information about the signature density. Signature height-to-width ratio is obtained by dividing signature height to signature width. Signature height and width can change. Height-to- width ratios of one person’s signatures are approximately equal. Maximum horizontal histogram and maximum vertical histogram: The horizontal histograms are calculated for each row and the row which has the highest value is taken as maximum horizontal histogram. The vertical histograms are calculated for each column and the column which has the highest value is taken as maximum vertical histogram. Horizontal and vertical center of the signature are calculated using the formulas in Eq. 1 [10]. 4.2 Mask Features Mask features provide information about directions of the lines of the signatures. The angles of the signatures have interpersonal differences. In this system 8 different 3x3 mask features are used. Each mask is taken all around the signatures and the number of 3x3 parts of the signature, which are same with the mask, is calculated. 4.3 Grid Features Grid features are used for finding densities of signature parts [10]. In this system 60 grid features are used. Signature is divided into 60 equal parts and the image area in each di-vided part is calculated. V. PROPOSED WORK In this paper we propose a feature-based method using shape context descriptor. We calculate shape context with respect to centroid relative to n (possibly 100) sample points on the contour of the test signature considering centroid as a reference point of signature and then compute shape context distance between test signature and template signatures from the database after calculating the shape contexts of their centroid relative to n sample points on the contour of the signatures. This method will reduce the number of matching candidates and processing time. VI. EXISTING SYSTEM AND ITS LIMITATIONS Existing work include shape context which computes the radial and angular distances with respect to all points on the shape considering one sample point randomly as a reference point from the set of n sample points. The basic shape context for signature verification requires extra work for shape alignment which is time consuming task.the shape contexts of their centroid relative to n sample points on the contour of the signatures. This method will reduce the number of matching candidates and processing time. VII. ADVANTAGES OF PROPOSED SYSTEM Proposed system uses shape contexts for feature extraction which is more robust on complex backgrounds such as cheques. Aim of this paper is to build accurate signature verification system for bank cheques using shape contexts with modification of reference point as a centroid. ThereTransformation cost is reduced and system gives accurate results in less time. VIII. PROPOSED SYSTEM ALGORITHM 1. Load scanned cheque image and crop the signature part. 2. Apply normalization to the cropped signature as Thinning, Binarization, rotation. 3. Apply feature extraction. That is calculate centroid of the signature as: Given signature shape viewed as a binary function f(x,y)= Where D is the domain of this binary shape. Then Centroid C (gx,gy) of this shape given by:- (1) Where A is the area of the given shape, 4. Select train/template signature database. 5. Apply steps 1-3 on each signature in the train/template database. 6. For a test signature and template signatures centroid is considered as a reference point.
  • 4. Bhagyashri R Bakshi Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 5, Issue 3, ( Part -1) March 2015, pp.110-114 www.ijera.com 113|P a g e Compute shape context for each point from n sample points (possibly 100) on the contour of test signature and template signatures, considering centroid as a reference point. A. Calculation of shape context For each point pi on the first shape (shape of test signature), we want to find the “best” matching point qj on the second shape (shape of template signature). Shape context here is a set of vectors originating from a centroid of signature to all the sample points on the signature’s boundary. These vectors express the configuration of the entire shape relative to the centroid. We compute a coarse histogram hi of the relative coordinates of around 100 boundary points with respect to centroid as, hi(k)=# q ≠ pi : (q-pi) ∈ bin(k) (2) This histogram is defined to be the shape context of pi. We use bins that are uniform in log polar space, making descriptor more sensitive to positions of nearby sample points than to those of points farther away. 7. Apply same procedure as in 6 to calculate shape contexts of template signatures from database. 8. Calculate the shape distance between each pair of points on two shapes (test signature and template signature) as a weighted sum of shape context distance and image appearance distance. B. Calculations of Shape distance In basic shape context implementation, shape distance is a weighted sum of shape context distance Dsc, image appearance distance Dac and the amount of transformation necessary to align the shapes i.e. bending energy Dbe. In our Proposed system shape distance between two signatures is calculated using only shape context distance and image appearance distance since we are calculating shape context distance using centroid as a reference point, no transformation is required for shape alignment. Therefore no need to calculate bending energy. Shape distance will be calculated as: (3) Where, (4) (5) Where Ip and IQ are the grey-level images corresponding to P and Q, respectively. Δ denotes some deferential vector offset and G is a windowing function typically chosen to be a Gaussian, thus putting emphasis to pixels nearby. C.K-NNClassifier KNearestNeighborclassifierisbasedonnon- parametricmethodusedforclassification.Itisoneofthesi mplestmachinelearningalgorithms.Itclassifiesanobject byamajorityvoteofitsneighbors,withtheobjectbeingass ignedtotheclassmostcommonamongitsknearestneighb ors(kisapositiveinteger,typicallysmall).Ifk=1,thentheo bjectissimplyassignedtotheclassofthatsinglenearestnei ghbor.Thetrainingphaseofthealgorithmconsistsonlyof storingthefeaturevectorsandclasslabelsofthetrainingsa mples.Intheclassificationphase, kisauser- definedconstant,andanunlabeledvector(aqueryortestp oint)isclassifiedbyassigningthelabelwhichismostfrequ entamongthe k training samples nearest to that querypoint. 10.Ifthe shape distancedifference <= threshold, calculate the cost matrix for computing shape contexts and find out minimumcost as asimilarity measure. D.CalculationofShapecontextcost Considerapointpionthefirstshapeandthepointqjont he secondshapethenCijwilldenotethecostofmatchingthes e two pointsgivenby, Cij≡C(pi,qj)= (6) Wherehi(k)andhj(k)denotetheK- binnormalizedhistogram at piand qj, respectively. 11.Theoutputwillbeeithertestsignatureisauthenticated andacceptedortestsignatureisnotauthenticatedand accepted.Inthiswayifthecroppedsignaturefromthe bankchequeisauthenticatedchequeundertestwillal so be authenticated. InputTestSignatureNormalization (LoadScannedCheque
  • 5. Bhagyashri R Bakshi Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 5, Issue 3, ( Part -1) March 2015, pp.110-114 www.ijera.com 114|P a g e Image&CropSignature Part) Feature Extraction (CalculateCentroidTemplate relativetonSampleDatabase PointsontheSignature Contour) ComputeShapeContextfor eachofthensamplepoints withrespectcentroid consideringcentroid asareferencepoint. Computetheshape distancebetween2signatures as:D=Dsc +1.6Dac IsShapedistanceNO difference≤Threshold? Yes CalculateCostMatrixfor Computingshapecontexts &Findoutminimumcost asasimilaritymeasure CompareSimilarity Measureusing KNNClassifier FinalSignature Authentication Decision Fig. 4 SystemFlowchart IX. CONCLUSION In this paper we have proposed the modified shape context for offline signature recognition. The shape context feature proposed by Belongie et al. [2] computes the radial and angular distances with respect to all points on the shape. Here we have modified this concept by calculating the distance with respect to centroid of the shape. Shape context for n sample boundary points is calculated considering centroid of the signature as a reference point. K nearest neighbor classifier is used to compare Shape distance of test signature with template signatures. Since there is no alignment work needed total computation time is reduced, hence proposed work is much promising. Proposed system will help to prevent cheque frauds in banking sector. REFERENCES [1] Miguel A. Ferrer, J. Francisco Vargas, Aythami Morales, and Aaron Ordonez, ”Robustness of Offline Signature Verification Based on Gray Level Features”, IEEE Transactions on Information Forensics and Security, Vol 7,No. 3, June 2012, PP 966-977 [2] Serge Belongie, Jitendra Malik, Jan Puzicha, “Shape Matching and Object Recognition Using Shape Contexts”, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol 24, No 24, April 2002, PP 509-522 [3] Greg Mori, Serge Belongie, Jitendra Malik,”Efficient Shape Matching Using Shape Contexts”,Vol 27,No. 11,November 2005. [4] Marcin Adamski, Khalid Saeed, ”Offline Signature Verification Based on Shape Contexts Using Shared and User-Specific Thresholds”, Journal of Medical Informatics & Technologies, Vol. 22, Issn 1642-6037,Year 2013, PP 195-201 [5] ADAMSKI M., SAEED K., “Offline Signature Identification and Verification using Noniterative Shape Context Algorithm”, Journal of Medical Informatics and Technologies, Vol. 13, pp. 47-58, 2009. [6] Chien-Chou Lin,Chun-Ting Chang,”A Fast Shape Context Matching Using Indexing”, Fifth International Conference on Genetic and Evolutionary Computing IEEE,pp.17-20,2011 [7] Persoon, E. and K.S. Fu,”Shape Discrimination Using Fourier Descriptors”, IEEE Transactions on Pattern Analysis and Machine Intelligence, 1986, PAMI-8(3):p.388- 397 [8] Oren, M. et al., “Pedestrian Detection using Wavelet Templates”, Proceedings of IEEE computer society Conference on computer vision and pattern recognition, 1997. [9] Moghaddam, B., T. Jebara, and A. Pentland, “Bayesian face recognition”, Pattern Recognition, 2000, 33(11): p.1771-1782.