SlideShare a Scribd company logo
1 of 4
Download to read offline
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume 3 Issue 5, August 2019 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
@ IJTSRD | Unique Paper ID – IJTSRD27825 | Volume – 3 | Issue – 5 | July - August 2019 Page 1776
Handwritten Signature Verification System using
Sobel Operator and KNN Classifier
Soe Moe Myint, Moe Moe Myint, Aye Aye Cho
University of Computer Studies, Pathein, Myanmar
How to cite this paper: Soe Moe Myint |
Moe Moe Myint | Aye Aye Cho
"Handwritten Signature Verification
System using Sobel Operator and KNN
Classifier" Published
in International
Journal of Trend in
Scientific Research
and Development
(ijtsrd), ISSN: 2456-
6470, Volume-3 |
Issue-5, August
2019, pp.1776-1779,
https://doi.org/10.31142/ijtsrd27825
Copyright © 2019 by author(s) and
International Journal ofTrend inScientific
Research and Development Journal. This
is an Open Access article distributed
under the terms of
the Creative
Commons Attribution
License (CC BY 4.0)
(http://creativecommons.org/licenses/by
/4.0)
ABSTRACT
Signature is one of the most widely accepted personal attributes for identity
verification. Signature verification is a scheme to verify cheque for bank
security. So, this system is proposed as the off-line handwritten signature
verification system for the bank cheque image processing. In any offline
signature verification system, feature extraction stage is the most vital and
difficult stage. In this system, sobel gradient operator is used to extract
signature features. After extracting features, this system performs the
verification process by using k-nearest neighbor (KNN)classifier.This system
supports the security about the bank processing by verifying user signature
from the bank cheque.
KEYWORDS: Signature, Verification, Sobel, KNN.
1. INTRODUCTION
Today, signature verification is an important research area in the field of
personal authentication. Signature verification is useful for banking and
passport verification system. Signatureverificationsystemcanbeclassifiedinto
two categories that are on-line and offline. In an offline technique, signature is
signed on a piece of paper and scanned to computer system. In an online
technique, signature is signed on a digitizer and dynamic information like
speed, pressure is captured in addition to a static image of signature.
Automated verification of signatures becameimperativewhenitwas difficultto
distinguish genuine signatures from simulated forgeries on the basis of visual
assessment.
This led to the more reliable and efficient computer
signature verification. Due to the importance of signature,
this system is proposed as the automatic signature
verification system for bank cheques.
To verify the signature from the bank cheque, this system
uses both the feature extraction and the verification
methods. There are many feature extractionandverification
methods. Among them, the sobel edge detection operator is
used to extract features from the bank cheque. In the
verification process, this system uses thek-nearestneighbor
(KNN) classifier among other classification methods. In the
KNN classification method, the test signature is compared to
all the signatures in the reference set according to the
several dissimilarity/ distance values. So, this system is
designed to process the handwritten signatures and verify
for it correctness.
2. Related Work
In 2015, C. V. Khatode and S. S. Morade [1] proposed the
methodology for extractionofsignaturefeaturesfroma bank
cheque. This system compared the extracted features with
the stored features to analyze whether thesignatureisof the
verified person or not. If the signature matches, the whole
data of customer with whom the signature has matched is
displayed onto the screen. After matching, thechequecanbe
sent for clearance. This system is developed to avoid the
forgeries taking place in the banking environment.
In 2018, V. Tambade, P. Varma and A. Sonawale [2]
presented the bank cheque signature verification system. In
this system, an artificial neural network based on the Back-
propagation algorithm is used for recognition and
verification. This system was tested with 400 test signature
samples, which include genuine and forged signatures of
twenty individuals. This system allowed for judging
signature accuracy, and achieving more effective results.
In 2019, T. Jadhav [3] presented the handwritten signature
verification system by using local binary pattern features
and k-nearest neighbor (KNN) classifier. They intended to
give away information about the application of biometric i.e.
signature detection. This system worked in different stages
which includes pre-processing, local binary pattern (LBP)
image conversion, feature extraction, andclassification.This
system compared the output with another existing system.
3. Feature Extraction
Feature extraction is to reduce the original data set by
measuring certain properties of features that distinguish on
input pattern from another [5]. Feature extraction is
performed to collect similaruniqueproperties ofa signature.
Various methods are available for creating features fromthe
signature image. All these methods can be classified into
direct and indirect methods. Direct methods use feature
values from image pixels like grid based information, gray-
level information and pixel density. Whereas in indirect
methods, transformations likefourier,waveletandradon are
IJTSRD27825
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD27825 | Volume – 3 | Issue – 5 | July - August 2019 Page 1777
applied. In this system, direct method is used. There are
three types of features. They are shape, grid and texture
features [4].
3.1. Sobel Gradient Operator
Edge detection techniques removenoiseandineffectivedata
still preserving the important structural properties of the
image [7]. Sobel gradient operator is used for feature
extraction. The sobel operator is based on convolving the
image with a small, separable, and integer valuedfilter[6].It
works by calculating the gradient of image intensity at each
pixel within an image.
Sobel filter uses two 3 x 3 kernels. One changes in the
horizontal direction, and one changes in the vertical
direction. The two kernels are convolved with the original
image to calculate the approximations of the derivatives. Gx
and Gy are defined as two images that contain the horizontal
and vertical derivative approximations respectively. The
computations are as follows:
(1)
(2)
where A is original source image. The x coordinateis defined
as increasing in horizontal-direction and the y coordinate is
defined as increasing in vertical-direction. At each pixel in
image, the gradient approximations given by Gx and Gy are
combined to give the gradient magnitude that is as follows:
(3)
This sobel gradient operator finds thedirectionofthelargest
increase from light to dark and the rate of change in that
direction. The result shows howsmoothlytheimagechanges
at each pixel, and therefore how likely it is that pixel
represents an edge. It also shows how that edge is likely to
be oriented [6].
4. Signature Verification
After feature extraction, a signature image is represented as
a feature vector of complex valued coefficients. Two
signatures are determined whether from the same class by
comparing the similarity betweenthecorrespondingfeature
vectors. It is a trivial task for image matching. K-nearest
neighbor (KNN) classifier is useful for signatureverification.
4. 1. K-Nearest Neighbor (KNN)
K-nearest neighbor (KNN) classifiers are based on learning
by analogy. Training features are described by “n”
dimensional numeric attributes. All training images are
stored in an n-dimensional pattern space. When given an
unknown image, a k-nearest neighbor classifier searches the
pattern space for the k training images that are closest to the
unknown sample. "Closeness" is defined in terms of
Euclidean distance, where the Euclidean distance, where the
Euclidean distance between two points, X=(x1, x2,......, xn) and
Y=(y1, y2,...., yn) is



n
1i
2)iyix()Y,X(d (4)
KNN classifier algorithm is as follows:
 Step 1: determine k
 Step 2: calculate the distance between the new input
image and all the training images
 Step 3: sort distance and determine k nearest neighbors
based on kth minimum distance
 Step 4: gather the categories of those neighbors
 Step 5: determine the categories based on majority vote
[9].
5. Proposed System Design
Figure1. Proposed System Design
Proposed system design is shown in Figure1. This system is
proposed as the handwritten signature verification system.
In this system, the user must first input bank cheque for
training or testing data. After receiving the bank cheque
image, this systemperforms thepre-processingthatincludes
cropping, resizing, color to gray, gray to black andwhite,and
noise elimination sub-processes.
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD27825 | Volume – 3 | Issue – 5 | July - August 2019 Page 1778
Then, this system uses the sobel gradient operator for
feature extraction and the k-nearest neighbor (KNN)
classifier for feature verification. Finally, this system
produces the correct or incorrect information.
5.1. Image Acquisition
Bank cheque images can be acquired through the scanneror
camera. Bank cheque is shown in Figure2.
Figure2. Input Bank Cheque
5.2. Cropping
Cropping method is to locate a rectangular box around an
object of interest and remove other objects outsidethis area.
Cropping method works by moving four vectors from four
different directions. Cropping image is shown in Figure3.
Figure3. Cropping Image
Manual cropping is achieved usingMatlabfunction(imcrop).
Auto cropping is saving more work and the cropping
rectangle is truly detecting.
5.3. Resizing
Resizing is an intrinsic change in the size of the image.
Resizing is needed to increase or decrease the total number
of pixels. Changing an image size from 1000 pixels to 500
pixels is resizing. Resizing affects not only the real sizeofthe
image but also potentially its weight. Resizing image is
shown in Figure4.
Figure4. Resizing Image
5.4. Color to Grayscale Image
The difference color may be difficult to train a system based
on recognition. The grayscale image is 0 (black) to 255
(white) each pixels. Grayscale image is shown in Figure5.
Figure5. Grayscale Image
5.5. Grayscale to Black and White Image
All grayscale images were converted to black and white
images which is represent by 1 and black by 0.Thesignature
part of the image was represented by 0 and blackparts ofthe
image by 1. Black and white image is shown in Figure6.
Figure6. Black and White Image
5.6. Noise Reduction
The noise may come from the camera or the optical device
captures the image. Most scanned image contains noise in
form of darker dots and disturbances caused by thescanning
process. Median filters method can remove from an image
without significantly reducing the sharpness of the image.
Median filters can do an excellent job of rejecting certain
types of noise. Noise filtered image is shown in Figure7.
Figure7. Noise Filtered Image
5.7. Sobel Image from Feature Extraction
Figure8. Results from Sobel Operator
After finishing pre-processing step, this system extracts
features from the noise filtered image. This system uses
sobel gradient operator to extract features. This operator
produces each gradient value as the features. Sample
gradient values are shown in Figure8. Sobel image is shown
in Figure9.
Figure9. Sobel Image
5.8. KNN Classification for Verification
By using signature testing and each training signature
features, this system classifies the testing signature that is
correct or incorrect. If the distance between testing and
training signature is “0”, the system produces the inputted
(testing) signature is correct.
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD27825 | Volume – 3 | Issue – 5 | July - August 2019 Page 1779
6. Experimental Result of the System
To measure the performance of verification process, this
system uses the false rejection rate (FRR) and false
acceptance rate (FAR). This system is tested by using 70
images from different person. The FAR and FRR results for
signature verification system are shown in Table 1.
Table1. FAR and FRR Results of the System
ID
Types
of
Person
No of
Signatures
False
Accepted
Rate
(FAR)
False
Rejection
Rate
(FRR)
1 Person 1 10 2 1
2 Person 2 10 1 2
3 Person 3 10 1 1
4 Person 4 10 2 1
5 Person 5 10 1 1
6 Person 6 10 1 2
7 Person 7 10 1 2
.
Figure10. Experimental Result of the System
7. Conclusion
This system presented the off line bank cheque handwritten
signature verification system by using edge detection
method and classification method. Signatures are accepted
as a means of a person’s identification in all legal and
commercial transaction. So, verification is very importantin
security and resource access control. Finally, the proposed
system is effective by providing both security approach for
the bank cheque and, magnitude results based feature
extraction technique for bank cheque verification.
References
[1] C. V. Khatode and S. S. Morade, "Verification of
Signatures on Bank Cheques", International Journal of
Science, Engineering and Technology Research
(IJSETR), vol. 4, no. 4, pp. 1098-1101, 2015.
[2] V. Tambade, P. Varma and A. Sonawale, "Bank Cheque
Signature Verification System",InternationalJournalof
Research in Engineering,ScienceandManagement,vol.
1, no. 9, pp. 265-267, 2018.
[3] T. Jadhav, "Handwritten Signature Verification using
Local Binary Pattern Features and KNN", International
Research Journal of Engineering and Technology
(IRJET), vol. 6, no. 4, pp. 579-586, 2019.
[4] D. Ashok Kumar and S. Dhandapani, "A Bank Cheque
Signature Verification System using FFBP Neural
Network Architecture and FeatureExtraction basedon
GLCM", International Journal of Emerging Trends &
Technology in Computer Science (IJETTCS), vol. 3, no.
3, pp. 46-52, 2014.
[5] P. A. Charde and S. D. Lokhande, "Classification using K
Nearest Neighbor for Brain Image Retrieval",
International Journal of Scientific & Engineering
Research, vol. 4, no. 8, pp. 760-765, 2013.
[6] P. P. Acharjya, R. Das and D. Ghoshal, "Study and
Comparison of Different Edge Detectors for Image
Segmentation", GlobalJournal ofComputer Scienceand
Technology Graphics & Vision, vol. 12, no. 13, 2012.
[7] A. Deepika, A. Devender and T. Rohit, "Analytical
Comparison betweenSobel and PrewittEdgeDetection
Techniques", International Journal of Scientific &
Engineering Research, vol. 7, no. 1, pp. 1482-1485,
2016.
[8] K. M. Mon, "Signature Verification for Bank Processing
System", International Journal of Science and
Engineering Applications, vol. 7, no. 11, pp. 424-428,
2018.
[9] N. P. Thair, "Survey of ClassificationTechniques inData
Mining", Proceedings of the International Multi
conference of Engineers and Computer Scientists
(IMECS), 2009.

More Related Content

What's hot

IRJET- Object Detection using Hausdorff Distance
IRJET-  	  Object Detection using Hausdorff DistanceIRJET-  	  Object Detection using Hausdorff Distance
IRJET- Object Detection using Hausdorff DistanceIRJET Journal
 
An efficient method for recognizing the low quality fingerprint verification ...
An efficient method for recognizing the low quality fingerprint verification ...An efficient method for recognizing the low quality fingerprint verification ...
An efficient method for recognizing the low quality fingerprint verification ...IJCI JOURNAL
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceresearchinventy
 
IRJET- A Review on Plant Disease Detection using Image Processing
IRJET- A Review on Plant Disease Detection using Image ProcessingIRJET- A Review on Plant Disease Detection using Image Processing
IRJET- A Review on Plant Disease Detection using Image ProcessingIRJET Journal
 
IRJET- Crop Pest Detection and Classification by K-Means and EM Clustering
IRJET-  	  Crop Pest Detection and Classification by K-Means and EM ClusteringIRJET-  	  Crop Pest Detection and Classification by K-Means and EM Clustering
IRJET- Crop Pest Detection and Classification by K-Means and EM ClusteringIRJET Journal
 
Object recognition from image using grid based color moments feature extracti...
Object recognition from image using grid based color moments feature extracti...Object recognition from image using grid based color moments feature extracti...
Object recognition from image using grid based color moments feature extracti...eSAT Publishing House
 
A hybrid content based image retrieval system using log-gabor filter banks
A hybrid content based image retrieval system using log-gabor filter banksA hybrid content based image retrieval system using log-gabor filter banks
A hybrid content based image retrieval system using log-gabor filter banksIJECEIAES
 
IRJET- Document Layout analysis using Inverse Support Vector Machine (I-SV...
IRJET- 	  Document Layout analysis using Inverse Support Vector Machine (I-SV...IRJET- 	  Document Layout analysis using Inverse Support Vector Machine (I-SV...
IRJET- Document Layout analysis using Inverse Support Vector Machine (I-SV...IRJET Journal
 
A Survey on Tamil Handwritten Character Recognition using OCR Techniques
A Survey on Tamil Handwritten Character Recognition using OCR TechniquesA Survey on Tamil Handwritten Character Recognition using OCR Techniques
A Survey on Tamil Handwritten Character Recognition using OCR Techniquescscpconf
 
Analysis of Image Fusion Techniques for fingerprint Palmprint Multimodal Biom...
Analysis of Image Fusion Techniques for fingerprint Palmprint Multimodal Biom...Analysis of Image Fusion Techniques for fingerprint Palmprint Multimodal Biom...
Analysis of Image Fusion Techniques for fingerprint Palmprint Multimodal Biom...IJERA Editor
 
Edge Detection Using Fuzzy Logic with Varied Inputs
Edge Detection Using Fuzzy Logic with Varied InputsEdge Detection Using Fuzzy Logic with Varied Inputs
Edge Detection Using Fuzzy Logic with Varied Inputspaperpublications3
 
IRJET- Note to Coin Converter
IRJET- Note to Coin ConverterIRJET- Note to Coin Converter
IRJET- Note to Coin ConverterIRJET Journal
 
Iisrt subha guru
Iisrt subha guruIisrt subha guru
Iisrt subha guruIISRT
 
Color Particle Filter Tracking using Frame Segmentation based on JND Color an...
Color Particle Filter Tracking using Frame Segmentation based on JND Color an...Color Particle Filter Tracking using Frame Segmentation based on JND Color an...
Color Particle Filter Tracking using Frame Segmentation based on JND Color an...IOSRJVSP
 
VHDL Design for Image Segmentation using Gabor filter for Disease Detection
VHDL Design for Image Segmentation using Gabor filter for Disease DetectionVHDL Design for Image Segmentation using Gabor filter for Disease Detection
VHDL Design for Image Segmentation using Gabor filter for Disease DetectionVLSICS Design
 
Image Processing Algorithm for Fruit Identification
Image Processing Algorithm for Fruit IdentificationImage Processing Algorithm for Fruit Identification
Image Processing Algorithm for Fruit IdentificationIRJET Journal
 

What's hot (17)

IRJET- Object Detection using Hausdorff Distance
IRJET-  	  Object Detection using Hausdorff DistanceIRJET-  	  Object Detection using Hausdorff Distance
IRJET- Object Detection using Hausdorff Distance
 
An efficient method for recognizing the low quality fingerprint verification ...
An efficient method for recognizing the low quality fingerprint verification ...An efficient method for recognizing the low quality fingerprint verification ...
An efficient method for recognizing the low quality fingerprint verification ...
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
IRJET- A Review on Plant Disease Detection using Image Processing
IRJET- A Review on Plant Disease Detection using Image ProcessingIRJET- A Review on Plant Disease Detection using Image Processing
IRJET- A Review on Plant Disease Detection using Image Processing
 
IRJET- Crop Pest Detection and Classification by K-Means and EM Clustering
IRJET-  	  Crop Pest Detection and Classification by K-Means and EM ClusteringIRJET-  	  Crop Pest Detection and Classification by K-Means and EM Clustering
IRJET- Crop Pest Detection and Classification by K-Means and EM Clustering
 
Object recognition from image using grid based color moments feature extracti...
Object recognition from image using grid based color moments feature extracti...Object recognition from image using grid based color moments feature extracti...
Object recognition from image using grid based color moments feature extracti...
 
A hybrid content based image retrieval system using log-gabor filter banks
A hybrid content based image retrieval system using log-gabor filter banksA hybrid content based image retrieval system using log-gabor filter banks
A hybrid content based image retrieval system using log-gabor filter banks
 
IRJET- Document Layout analysis using Inverse Support Vector Machine (I-SV...
IRJET- 	  Document Layout analysis using Inverse Support Vector Machine (I-SV...IRJET- 	  Document Layout analysis using Inverse Support Vector Machine (I-SV...
IRJET- Document Layout analysis using Inverse Support Vector Machine (I-SV...
 
A Survey on Tamil Handwritten Character Recognition using OCR Techniques
A Survey on Tamil Handwritten Character Recognition using OCR TechniquesA Survey on Tamil Handwritten Character Recognition using OCR Techniques
A Survey on Tamil Handwritten Character Recognition using OCR Techniques
 
Analysis of Image Fusion Techniques for fingerprint Palmprint Multimodal Biom...
Analysis of Image Fusion Techniques for fingerprint Palmprint Multimodal Biom...Analysis of Image Fusion Techniques for fingerprint Palmprint Multimodal Biom...
Analysis of Image Fusion Techniques for fingerprint Palmprint Multimodal Biom...
 
Edge Detection Using Fuzzy Logic with Varied Inputs
Edge Detection Using Fuzzy Logic with Varied InputsEdge Detection Using Fuzzy Logic with Varied Inputs
Edge Detection Using Fuzzy Logic with Varied Inputs
 
IRJET- Note to Coin Converter
IRJET- Note to Coin ConverterIRJET- Note to Coin Converter
IRJET- Note to Coin Converter
 
Iisrt subha guru
Iisrt subha guruIisrt subha guru
Iisrt subha guru
 
Color Particle Filter Tracking using Frame Segmentation based on JND Color an...
Color Particle Filter Tracking using Frame Segmentation based on JND Color an...Color Particle Filter Tracking using Frame Segmentation based on JND Color an...
Color Particle Filter Tracking using Frame Segmentation based on JND Color an...
 
1304.2109
1304.21091304.2109
1304.2109
 
VHDL Design for Image Segmentation using Gabor filter for Disease Detection
VHDL Design for Image Segmentation using Gabor filter for Disease DetectionVHDL Design for Image Segmentation using Gabor filter for Disease Detection
VHDL Design for Image Segmentation using Gabor filter for Disease Detection
 
Image Processing Algorithm for Fruit Identification
Image Processing Algorithm for Fruit IdentificationImage Processing Algorithm for Fruit Identification
Image Processing Algorithm for Fruit Identification
 

Similar to Handwritten Signature Verification System using Sobel Operator and KNN Classifier

Offline signatures matching using haar wavelet subbands
Offline signatures matching using haar wavelet subbandsOffline signatures matching using haar wavelet subbands
Offline signatures matching using haar wavelet subbandsTELKOMNIKA JOURNAL
 
Offline Handwritten Signature Verification using Neural Network
Offline Handwritten Signature Verification using Neural NetworkOffline Handwritten Signature Verification using Neural Network
Offline Handwritten Signature Verification using Neural Networkijiert bestjournal
 
Ganesan dhawanrpt
Ganesan dhawanrptGanesan dhawanrpt
Ganesan dhawanrptpramod naik
 
Distance Based Verification Technique for Online Signature System
Distance Based Verification Technique for Online Signature SystemDistance Based Verification Technique for Online Signature System
Distance Based Verification Technique for Online Signature SystemIRJET Journal
 
IRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNNIRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNNIRJET Journal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
journal paper publication
journal paper publicationjournal paper publication
journal paper publicationrikaseorika
 
Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...eSAT Publishing House
 
Automatic signature verification with chain code using weighted distance and ...
Automatic signature verification with chain code using weighted distance and ...Automatic signature verification with chain code using weighted distance and ...
Automatic signature verification with chain code using weighted distance and ...eSAT Journals
 
An offline signature recognition and verification system based on neural network
An offline signature recognition and verification system based on neural networkAn offline signature recognition and verification system based on neural network
An offline signature recognition and verification system based on neural networkeSAT Journals
 
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEMRELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEMAM Publications
 
A Novel Framework For Numerical Character Recognition With Zoning Distance Fe...
A Novel Framework For Numerical Character Recognition With Zoning Distance Fe...A Novel Framework For Numerical Character Recognition With Zoning Distance Fe...
A Novel Framework For Numerical Character Recognition With Zoning Distance Fe...IJERD Editor
 
A Simple Signature Recognition System
A Simple Signature Recognition System A Simple Signature Recognition System
A Simple Signature Recognition System iosrjce
 
14 offline signature verification based on euclidean distance using support v...
14 offline signature verification based on euclidean distance using support v...14 offline signature verification based on euclidean distance using support v...
14 offline signature verification based on euclidean distance using support v...INFOGAIN PUBLICATION
 

Similar to Handwritten Signature Verification System using Sobel Operator and KNN Classifier (20)

Offline signatures matching using haar wavelet subbands
Offline signatures matching using haar wavelet subbandsOffline signatures matching using haar wavelet subbands
Offline signatures matching using haar wavelet subbands
 
Offline Handwritten Signature Verification using Neural Network
Offline Handwritten Signature Verification using Neural NetworkOffline Handwritten Signature Verification using Neural Network
Offline Handwritten Signature Verification using Neural Network
 
Ganesan dhawanrpt
Ganesan dhawanrptGanesan dhawanrpt
Ganesan dhawanrpt
 
Distance Based Verification Technique for Online Signature System
Distance Based Verification Technique for Online Signature SystemDistance Based Verification Technique for Online Signature System
Distance Based Verification Technique for Online Signature System
 
IRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNNIRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNN
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
journal paper publication
journal paper publicationjournal paper publication
journal paper publication
 
Offline Signature Verification and Recognition using Neural Network
Offline Signature Verification and Recognition using Neural NetworkOffline Signature Verification and Recognition using Neural Network
Offline Signature Verification and Recognition using Neural Network
 
Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...
 
Automatic signature verification with chain code using weighted distance and ...
Automatic signature verification with chain code using weighted distance and ...Automatic signature verification with chain code using weighted distance and ...
Automatic signature verification with chain code using weighted distance and ...
 
An offline signature recognition and verification system based on neural network
An offline signature recognition and verification system based on neural networkAn offline signature recognition and verification system based on neural network
An offline signature recognition and verification system based on neural network
 
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEMRELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
 
Ijetcas14 337
Ijetcas14 337Ijetcas14 337
Ijetcas14 337
 
A Novel Framework For Numerical Character Recognition With Zoning Distance Fe...
A Novel Framework For Numerical Character Recognition With Zoning Distance Fe...A Novel Framework For Numerical Character Recognition With Zoning Distance Fe...
A Novel Framework For Numerical Character Recognition With Zoning Distance Fe...
 
A Simple Signature Recognition System
A Simple Signature Recognition System A Simple Signature Recognition System
A Simple Signature Recognition System
 
K012647982
K012647982K012647982
K012647982
 
K012647982
K012647982K012647982
K012647982
 
1834 1840
1834 18401834 1840
1834 1840
 
1834 1840
1834 18401834 1840
1834 1840
 
14 offline signature verification based on euclidean distance using support v...
14 offline signature verification based on euclidean distance using support v...14 offline signature verification based on euclidean distance using support v...
14 offline signature verification based on euclidean distance using support v...
 

More from ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementationijtsrd
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospectsijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...ijtsrd
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Studyijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...ijtsrd
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadikuijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Mapijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Societyijtsrd
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...ijtsrd
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learningijtsrd
 

More from ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Recently uploaded

Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterMateoGardella
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...KokoStevan
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 

Recently uploaded (20)

Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 

Handwritten Signature Verification System using Sobel Operator and KNN Classifier

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume 3 Issue 5, August 2019 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470 @ IJTSRD | Unique Paper ID – IJTSRD27825 | Volume – 3 | Issue – 5 | July - August 2019 Page 1776 Handwritten Signature Verification System using Sobel Operator and KNN Classifier Soe Moe Myint, Moe Moe Myint, Aye Aye Cho University of Computer Studies, Pathein, Myanmar How to cite this paper: Soe Moe Myint | Moe Moe Myint | Aye Aye Cho "Handwritten Signature Verification System using Sobel Operator and KNN Classifier" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456- 6470, Volume-3 | Issue-5, August 2019, pp.1776-1779, https://doi.org/10.31142/ijtsrd27825 Copyright © 2019 by author(s) and International Journal ofTrend inScientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (CC BY 4.0) (http://creativecommons.org/licenses/by /4.0) ABSTRACT Signature is one of the most widely accepted personal attributes for identity verification. Signature verification is a scheme to verify cheque for bank security. So, this system is proposed as the off-line handwritten signature verification system for the bank cheque image processing. In any offline signature verification system, feature extraction stage is the most vital and difficult stage. In this system, sobel gradient operator is used to extract signature features. After extracting features, this system performs the verification process by using k-nearest neighbor (KNN)classifier.This system supports the security about the bank processing by verifying user signature from the bank cheque. KEYWORDS: Signature, Verification, Sobel, KNN. 1. INTRODUCTION Today, signature verification is an important research area in the field of personal authentication. Signature verification is useful for banking and passport verification system. Signatureverificationsystemcanbeclassifiedinto two categories that are on-line and offline. In an offline technique, signature is signed on a piece of paper and scanned to computer system. In an online technique, signature is signed on a digitizer and dynamic information like speed, pressure is captured in addition to a static image of signature. Automated verification of signatures becameimperativewhenitwas difficultto distinguish genuine signatures from simulated forgeries on the basis of visual assessment. This led to the more reliable and efficient computer signature verification. Due to the importance of signature, this system is proposed as the automatic signature verification system for bank cheques. To verify the signature from the bank cheque, this system uses both the feature extraction and the verification methods. There are many feature extractionandverification methods. Among them, the sobel edge detection operator is used to extract features from the bank cheque. In the verification process, this system uses thek-nearestneighbor (KNN) classifier among other classification methods. In the KNN classification method, the test signature is compared to all the signatures in the reference set according to the several dissimilarity/ distance values. So, this system is designed to process the handwritten signatures and verify for it correctness. 2. Related Work In 2015, C. V. Khatode and S. S. Morade [1] proposed the methodology for extractionofsignaturefeaturesfroma bank cheque. This system compared the extracted features with the stored features to analyze whether thesignatureisof the verified person or not. If the signature matches, the whole data of customer with whom the signature has matched is displayed onto the screen. After matching, thechequecanbe sent for clearance. This system is developed to avoid the forgeries taking place in the banking environment. In 2018, V. Tambade, P. Varma and A. Sonawale [2] presented the bank cheque signature verification system. In this system, an artificial neural network based on the Back- propagation algorithm is used for recognition and verification. This system was tested with 400 test signature samples, which include genuine and forged signatures of twenty individuals. This system allowed for judging signature accuracy, and achieving more effective results. In 2019, T. Jadhav [3] presented the handwritten signature verification system by using local binary pattern features and k-nearest neighbor (KNN) classifier. They intended to give away information about the application of biometric i.e. signature detection. This system worked in different stages which includes pre-processing, local binary pattern (LBP) image conversion, feature extraction, andclassification.This system compared the output with another existing system. 3. Feature Extraction Feature extraction is to reduce the original data set by measuring certain properties of features that distinguish on input pattern from another [5]. Feature extraction is performed to collect similaruniqueproperties ofa signature. Various methods are available for creating features fromthe signature image. All these methods can be classified into direct and indirect methods. Direct methods use feature values from image pixels like grid based information, gray- level information and pixel density. Whereas in indirect methods, transformations likefourier,waveletandradon are IJTSRD27825
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD27825 | Volume – 3 | Issue – 5 | July - August 2019 Page 1777 applied. In this system, direct method is used. There are three types of features. They are shape, grid and texture features [4]. 3.1. Sobel Gradient Operator Edge detection techniques removenoiseandineffectivedata still preserving the important structural properties of the image [7]. Sobel gradient operator is used for feature extraction. The sobel operator is based on convolving the image with a small, separable, and integer valuedfilter[6].It works by calculating the gradient of image intensity at each pixel within an image. Sobel filter uses two 3 x 3 kernels. One changes in the horizontal direction, and one changes in the vertical direction. The two kernels are convolved with the original image to calculate the approximations of the derivatives. Gx and Gy are defined as two images that contain the horizontal and vertical derivative approximations respectively. The computations are as follows: (1) (2) where A is original source image. The x coordinateis defined as increasing in horizontal-direction and the y coordinate is defined as increasing in vertical-direction. At each pixel in image, the gradient approximations given by Gx and Gy are combined to give the gradient magnitude that is as follows: (3) This sobel gradient operator finds thedirectionofthelargest increase from light to dark and the rate of change in that direction. The result shows howsmoothlytheimagechanges at each pixel, and therefore how likely it is that pixel represents an edge. It also shows how that edge is likely to be oriented [6]. 4. Signature Verification After feature extraction, a signature image is represented as a feature vector of complex valued coefficients. Two signatures are determined whether from the same class by comparing the similarity betweenthecorrespondingfeature vectors. It is a trivial task for image matching. K-nearest neighbor (KNN) classifier is useful for signatureverification. 4. 1. K-Nearest Neighbor (KNN) K-nearest neighbor (KNN) classifiers are based on learning by analogy. Training features are described by “n” dimensional numeric attributes. All training images are stored in an n-dimensional pattern space. When given an unknown image, a k-nearest neighbor classifier searches the pattern space for the k training images that are closest to the unknown sample. "Closeness" is defined in terms of Euclidean distance, where the Euclidean distance, where the Euclidean distance between two points, X=(x1, x2,......, xn) and Y=(y1, y2,...., yn) is    n 1i 2)iyix()Y,X(d (4) KNN classifier algorithm is as follows:  Step 1: determine k  Step 2: calculate the distance between the new input image and all the training images  Step 3: sort distance and determine k nearest neighbors based on kth minimum distance  Step 4: gather the categories of those neighbors  Step 5: determine the categories based on majority vote [9]. 5. Proposed System Design Figure1. Proposed System Design Proposed system design is shown in Figure1. This system is proposed as the handwritten signature verification system. In this system, the user must first input bank cheque for training or testing data. After receiving the bank cheque image, this systemperforms thepre-processingthatincludes cropping, resizing, color to gray, gray to black andwhite,and noise elimination sub-processes.
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD27825 | Volume – 3 | Issue – 5 | July - August 2019 Page 1778 Then, this system uses the sobel gradient operator for feature extraction and the k-nearest neighbor (KNN) classifier for feature verification. Finally, this system produces the correct or incorrect information. 5.1. Image Acquisition Bank cheque images can be acquired through the scanneror camera. Bank cheque is shown in Figure2. Figure2. Input Bank Cheque 5.2. Cropping Cropping method is to locate a rectangular box around an object of interest and remove other objects outsidethis area. Cropping method works by moving four vectors from four different directions. Cropping image is shown in Figure3. Figure3. Cropping Image Manual cropping is achieved usingMatlabfunction(imcrop). Auto cropping is saving more work and the cropping rectangle is truly detecting. 5.3. Resizing Resizing is an intrinsic change in the size of the image. Resizing is needed to increase or decrease the total number of pixels. Changing an image size from 1000 pixels to 500 pixels is resizing. Resizing affects not only the real sizeofthe image but also potentially its weight. Resizing image is shown in Figure4. Figure4. Resizing Image 5.4. Color to Grayscale Image The difference color may be difficult to train a system based on recognition. The grayscale image is 0 (black) to 255 (white) each pixels. Grayscale image is shown in Figure5. Figure5. Grayscale Image 5.5. Grayscale to Black and White Image All grayscale images were converted to black and white images which is represent by 1 and black by 0.Thesignature part of the image was represented by 0 and blackparts ofthe image by 1. Black and white image is shown in Figure6. Figure6. Black and White Image 5.6. Noise Reduction The noise may come from the camera or the optical device captures the image. Most scanned image contains noise in form of darker dots and disturbances caused by thescanning process. Median filters method can remove from an image without significantly reducing the sharpness of the image. Median filters can do an excellent job of rejecting certain types of noise. Noise filtered image is shown in Figure7. Figure7. Noise Filtered Image 5.7. Sobel Image from Feature Extraction Figure8. Results from Sobel Operator After finishing pre-processing step, this system extracts features from the noise filtered image. This system uses sobel gradient operator to extract features. This operator produces each gradient value as the features. Sample gradient values are shown in Figure8. Sobel image is shown in Figure9. Figure9. Sobel Image 5.8. KNN Classification for Verification By using signature testing and each training signature features, this system classifies the testing signature that is correct or incorrect. If the distance between testing and training signature is “0”, the system produces the inputted (testing) signature is correct.
  • 4. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD27825 | Volume – 3 | Issue – 5 | July - August 2019 Page 1779 6. Experimental Result of the System To measure the performance of verification process, this system uses the false rejection rate (FRR) and false acceptance rate (FAR). This system is tested by using 70 images from different person. The FAR and FRR results for signature verification system are shown in Table 1. Table1. FAR and FRR Results of the System ID Types of Person No of Signatures False Accepted Rate (FAR) False Rejection Rate (FRR) 1 Person 1 10 2 1 2 Person 2 10 1 2 3 Person 3 10 1 1 4 Person 4 10 2 1 5 Person 5 10 1 1 6 Person 6 10 1 2 7 Person 7 10 1 2 . Figure10. Experimental Result of the System 7. Conclusion This system presented the off line bank cheque handwritten signature verification system by using edge detection method and classification method. Signatures are accepted as a means of a person’s identification in all legal and commercial transaction. So, verification is very importantin security and resource access control. Finally, the proposed system is effective by providing both security approach for the bank cheque and, magnitude results based feature extraction technique for bank cheque verification. References [1] C. V. Khatode and S. S. Morade, "Verification of Signatures on Bank Cheques", International Journal of Science, Engineering and Technology Research (IJSETR), vol. 4, no. 4, pp. 1098-1101, 2015. [2] V. Tambade, P. Varma and A. Sonawale, "Bank Cheque Signature Verification System",InternationalJournalof Research in Engineering,ScienceandManagement,vol. 1, no. 9, pp. 265-267, 2018. [3] T. Jadhav, "Handwritten Signature Verification using Local Binary Pattern Features and KNN", International Research Journal of Engineering and Technology (IRJET), vol. 6, no. 4, pp. 579-586, 2019. [4] D. Ashok Kumar and S. Dhandapani, "A Bank Cheque Signature Verification System using FFBP Neural Network Architecture and FeatureExtraction basedon GLCM", International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), vol. 3, no. 3, pp. 46-52, 2014. [5] P. A. Charde and S. D. Lokhande, "Classification using K Nearest Neighbor for Brain Image Retrieval", International Journal of Scientific & Engineering Research, vol. 4, no. 8, pp. 760-765, 2013. [6] P. P. Acharjya, R. Das and D. Ghoshal, "Study and Comparison of Different Edge Detectors for Image Segmentation", GlobalJournal ofComputer Scienceand Technology Graphics & Vision, vol. 12, no. 13, 2012. [7] A. Deepika, A. Devender and T. Rohit, "Analytical Comparison betweenSobel and PrewittEdgeDetection Techniques", International Journal of Scientific & Engineering Research, vol. 7, no. 1, pp. 1482-1485, 2016. [8] K. M. Mon, "Signature Verification for Bank Processing System", International Journal of Science and Engineering Applications, vol. 7, no. 11, pp. 424-428, 2018. [9] N. P. Thair, "Survey of ClassificationTechniques inData Mining", Proceedings of the International Multi conference of Engineers and Computer Scientists (IMECS), 2009.