SlideShare a Scribd company logo
1 of 3
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1437
SIGNATURE VERIFICATION USING DCT
Prathiba M K1, Sushmitha H L2, Chandan B3, Karthik B K4 and Manohar H P 5
1Professor , Dept. of Electronics and Communication Engineering, ATMECE Mysore, Karnataka, India
2,3,4,5UG Students Dept. of Electronics and Communication Engineering, ATMECE Mysore, Karnataka, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Signatures have been considered a typical form
of authentication in our society for hundreds of years.
Signature is a simple, concrete expression of the unique
variations in human hand geometry. The way a person signs
his or her name is known to be characteristic of that
individual. A signature verification system must be able to
detect forgeries, and, at the same time, reduce rejection of
genuine signatures. Signatures are subject to intra-personal
variations. Hence, a signature verification system is feasible
only if the system is insensitive to intra-personal variability,
but sensitive to interpersonal variability. Even when
insensitive to intra-personal variations, the system must
possess the discriminating power to foil skillful forgers.
Key Words: (Size 10 & Bold) signature verification,
interpersonal variability, intra-personal variability,
Discrete Cosine Transform, Feature extraction etc
(Minimum 5 to 8 key words)…
1. INTRODUCTION
Human signature is a biometric measure of person's
identification. In many sectorslikebanks,official documents,
receipts etc. handwrittensignatureareverifiedtosecure and
identify the concerned person. Each individual has his own
signature different with others but in most of the time it is
not possible to produce the replica of the signature. The
signature verification problem aims to minimize the
intrapersonal differences. Signature verification can be
categorized into following two parts: online and offline
.Online handwritten signature verification deals with
automatic conversion of characters which are written on a
special digitizer, tablet PC or PDA, Whereina sensorpicksup
the pen -tip movements as well as pen -up/pen-down
switching.
An on-line signature verification system based on local
information and a one-class classifier, i.e. the Linear
Programming Descriptor classifier (LPD), was presented by
Nanni and Lumini [1]. The authors investigated and
described how the information was extracted as time
functions of various dynamic properties of the signatures,
and then the discrete 1-D Wavelet Transform (WT) was
performed on these features. The DCT was used to reduce
the approximation coefficients vector obtained by WT to a
feature vector of a given dimension. Fabregas and Faundez-
Zanuy [2]: have presented a new system for on-line
signature verification based on DCT feature extraction with
discriminability feature selection. They performed a
complete set of simulations with the largest available online
signature database, MCYT, whichconsistsof330peoplewith
genuine and skilled forgeries performed by five other
different users.
Dimauro et.al.[3] in their study of local features stability
have introduced a warping functionthatallowsmtonpoints
to be matched. However, such an approach may not be
practical in cases of extreme values of features.
Lei and Govindaraju[4] analyzed the consistency and
discriminative power of on-line features using a distance-
based measure that is optimized for each feature of study.
They view signature verification as a one category
classification problem, and use the distances between
features to distinguish them rather than the feature values
themselves.
1.1 Motivation
Online handwrittensignatureverificationsystemisbased
on the extracting the featuresof signaturefromthesignature
pad and consider as interpersonal features that are not
statistically stable. These are used for comparison and
verifications between different signaturesandenhancingthe
interpersonal variations and classifier is used to verify
signatureand provide resultasgenuineorforgeryandalsoto
present a simple and effective approach for an online
signature verification system. Finally, complete content and
organizational editing before formatting. Please take note of
the following items when proofreading spelling and
grammar:
1.2 Discrete Cosine Transform (DCT)
Online signature verification has proved to be more
accurate than the offline signature verification. The DCT has
the ability to compactly represent an online signature
verification using a fixed number of coefficients which leads
to fast matching algorithm.
A DCT coefficient is the compression of feature data,
which reduces the elapsed time and storage space for
training and verification processes. The time for DTW and
HMM methods is very long. From these advantagesofDCT,it
motivated us to do online signature verification based on
DCT.
2. SIGNATURE VERIFICATION SYSTEM
The proposed online handwritten signature verification
system consists the following blocks as show in Fig. 1
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1438
Fig -1: Block diagram of signature verification system
During signature acquisition phase signatures are acquired
by using Wacom tablet the 125 signatures are taken from 25
signers at least 5 samples each user. The features are
extracted from these signatures and stored in the database.
Testing phase is carried out same as training phase but in
testing phase we do feature extraction is only for specified
sample of specified user. If, the tested signature features
matches with the features of the training phase of the
respective user then the tested signature will treated as
genuine signature.
During the training and verification phase, test signature to
be compared against the claimed user’s reference set
signature. In order to match two signatures, the following
stages are applied:
A basis feature matrix is calculated from the reference
signatures of each signer.Forthis,wecalculatetheminimum,
mean, maximum and sum values for each DCT Coefficient in
the reference set. The distance between the featurematrixof
reference and test signatures computes. The matrix of the
featuredistance isalso normalizedtomaptoavaluebetween
0 and1. Genetic algorithm is used for verification process.
3. RESULTS
The signature is acquired using tablet is as shown in Fig.2
Fig -2: User signature
The user signature is varying with respect to horizontal
direction i.e. X-coordinate and the DCT of X is shown in Fig.
3.
Fig -3: Plotting of theta and its DCT of signature
The user signature is varying with respect to vertical
direction i.e. Y-coordinate and the DCT of Y is shown in Fig.
4.
Fig -4: Plotting of theta and its DCT of signature
The value of theta represents the movement of pen with
respect to X-axis and its corresponding DCT is plotted as
shown in Fig.5.
Fig -5: Plotting of theta and its DCT of signature
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1439
Genetic algorithm is used for classification of signatures,
which makes the verification performancemoreaccurate. To
evaluate the experiments, False Acceptance Rate (FAR) and
False Rejection Rate (FRR) are determined. FAR represents
the probability that a false match occurs, while FRR
represents the probability that a false rejection occurs.
Genuine and forged signatures of each user are fed to
database for comparison which provides two possible
results and are as follows.
When genuine signatureiscomparedwithgenuinesignature
of users and the result obtained is “Genuine signature” as
shown in Fig. 6.
Fig -6: output of genuine signature
Genuine signature is compared with forged signature of
users and the result obtained is “forged signature” asshown
in Fig.7.
Fig -7: output of genuine signature
3. CONCULSION
Although signature verification is not one of the safest
biometric solutions, the use of it in business practices is still
justified. Moreover, signature verification has a very
promising future. One major drawback is that humans are
not consistent when signing their signatures. In this paper, a
robust signature verification system has been proposed,
based on DCT coefficients and the Genetic Algorithm. Our
proposed method can extract basic dynamic features from
signature time signals, and compress signature data, while
keeping the rough form and basic information of signatures.
Especially in the context of skilled forgery, where inter-
personal variability in the number of features becomes
negligible, an effective analysis of features based on time
signals is essential for attainment of a suitable performance.
Ideally we need features that are stable, i.e. do not change
very much between different genuine signatures, and which
are hard to forge. For attaining this purpose, capturing
signals via a tablet digitizer and using the extracted
dynamics information has been considered, mainly in the
form of simple parameters of DCT coefficients. These
features are efficient and experimental results confirm that
the proposed method is promising. The summation
condition in the verification process guides the system
towards an accurate decision.
REFERENCES
[1] Nanni, L. and Lumini, A., “A novel local on-line signature
verification system,” Pattern Recognition Letters, 2008.,pp.
559–568.
[2] Fabregas, J. and Faundez-Zanuy,., “On-line signature
verification system with failure to enroll management,”
Pattern Recognition Letters, 2009., pp. 2117–2126.
[3] Dimauro, G., Modugno, R., Pirlo, G. and Sarcinella, L.,
“Analysis of stability in hand-written dynamic signatures,”
Proceedings of the 8th International Workshop onFrontiers
in Handwriting Recognition, IWFHR,2002, pp. 259–263
[4] H. Lei, V. Govindaraju “A comparative study on the
consistency of features in on-line signature verification”
Pattern Recognition Letters, 26 (15) (2005),pp.2483– 2489

More Related Content

What's hot

Paper id 2520141232
Paper id 2520141232Paper id 2520141232
Paper id 2520141232
IJRAT
 

What's hot (7)

Performance Analysis of DRA Based OFDM Data Transmission With Respect to Nove...
Performance Analysis of DRA Based OFDM Data Transmission With Respect to Nove...Performance Analysis of DRA Based OFDM Data Transmission With Respect to Nove...
Performance Analysis of DRA Based OFDM Data Transmission With Respect to Nove...
 
IRJET - A Survey on Recognition of Handwritten ZIP Codes in a Postal Sorting ...
IRJET - A Survey on Recognition of Handwritten ZIP Codes in a Postal Sorting ...IRJET - A Survey on Recognition of Handwritten ZIP Codes in a Postal Sorting ...
IRJET - A Survey on Recognition of Handwritten ZIP Codes in a Postal Sorting ...
 
Lossless Data Compression Using Rice Algorithm Based On Curve Fitting Technique
Lossless Data Compression Using Rice Algorithm Based On Curve Fitting TechniqueLossless Data Compression Using Rice Algorithm Based On Curve Fitting Technique
Lossless Data Compression Using Rice Algorithm Based On Curve Fitting Technique
 
Paper id 2520141232
Paper id 2520141232Paper id 2520141232
Paper id 2520141232
 
B0210714
B0210714B0210714
B0210714
 
Improving Security Features In MANET Authentication Through Scrutiny Of The C...
Improving Security Features In MANET Authentication Through Scrutiny Of The C...Improving Security Features In MANET Authentication Through Scrutiny Of The C...
Improving Security Features In MANET Authentication Through Scrutiny Of The C...
 
An Efficient Low Power Convolutional Coding with Viterbi Decoding using FSM
An Efficient Low Power Convolutional Coding with Viterbi Decoding using FSMAn Efficient Low Power Convolutional Coding with Viterbi Decoding using FSM
An Efficient Low Power Convolutional Coding with Viterbi Decoding using FSM
 

Similar to Signature Verification using DCT

Similar to Signature Verification using DCT (20)

Distance Based Verification Technique for Online Signature System
Distance Based Verification Technique for Online Signature SystemDistance Based Verification Technique for Online Signature System
Distance Based Verification Technique for Online Signature System
 
IRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNNIRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNN
 
Artificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification SystemArtificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification System
 
Offline signatures matching using haar wavelet subbands
Offline signatures matching using haar wavelet subbandsOffline signatures matching using haar wavelet subbands
Offline signatures matching using haar wavelet subbands
 
A Fusion of Statistical Distance and Signature Length Based Approach for Offl...
A Fusion of Statistical Distance and Signature Length Based Approach for Offl...A Fusion of Statistical Distance and Signature Length Based Approach for Offl...
A Fusion of Statistical Distance and Signature Length Based Approach for Offl...
 
Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
IRJET- Decentralized E-Voting System
IRJET-  	  Decentralized E-Voting SystemIRJET-  	  Decentralized E-Voting System
IRJET- Decentralized E-Voting System
 
IRJET- Advanced Character based Recognition and Phone Handling for Blind ...
IRJET-  	  Advanced Character based Recognition and Phone Handling for Blind ...IRJET-  	  Advanced Character based Recognition and Phone Handling for Blind ...
IRJET- Advanced Character based Recognition and Phone Handling for Blind ...
 
IRJET - Two Model Biometrics Authentication for Locker System
IRJET - Two Model Biometrics Authentication for Locker SystemIRJET - Two Model Biometrics Authentication for Locker System
IRJET - Two Model Biometrics Authentication for Locker System
 
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
 
IJSRED-V2I2P33
IJSRED-V2I2P33IJSRED-V2I2P33
IJSRED-V2I2P33
 
FINGERPRINT BASED SECURED VOTING
FINGERPRINT BASED SECURED VOTINGFINGERPRINT BASED SECURED VOTING
FINGERPRINT BASED SECURED VOTING
 
A Review Paper on Personal Identification with An Efficient Method Of Combina...
A Review Paper on Personal Identification with An Efficient Method Of Combina...A Review Paper on Personal Identification with An Efficient Method Of Combina...
A Review Paper on Personal Identification with An Efficient Method Of Combina...
 
Choudhary2015
Choudhary2015Choudhary2015
Choudhary2015
 
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
 
IRJET- Survey on Shoulder Surfing Resistant Pin Entry by using Base Pin a...
IRJET-  	  Survey on Shoulder Surfing Resistant Pin Entry by using Base Pin a...IRJET-  	  Survey on Shoulder Surfing Resistant Pin Entry by using Base Pin a...
IRJET- Survey on Shoulder Surfing Resistant Pin Entry by using Base Pin a...
 
An Enhanced Technique for Network Traffic Classification with unknown Flow De...
An Enhanced Technique for Network Traffic Classification with unknown Flow De...An Enhanced Technique for Network Traffic Classification with unknown Flow De...
An Enhanced Technique for Network Traffic Classification with unknown Flow De...
 
IRJET- Signrecrypting Proxy Re-Signature in Secure Vanet
IRJET- Signrecrypting Proxy Re-Signature in Secure VanetIRJET- Signrecrypting Proxy Re-Signature in Secure Vanet
IRJET- Signrecrypting Proxy Re-Signature in Secure Vanet
 
Traffic Sign Recognition using CNNs
Traffic Sign Recognition using CNNsTraffic Sign Recognition using CNNs
Traffic Sign Recognition using CNNs
 

More from IRJET Journal

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

一比一原版(Griffith毕业证书)格里菲斯大学毕业证成绩单学位证书
一比一原版(Griffith毕业证书)格里菲斯大学毕业证成绩单学位证书一比一原版(Griffith毕业证书)格里菲斯大学毕业证成绩单学位证书
一比一原版(Griffith毕业证书)格里菲斯大学毕业证成绩单学位证书
c3384a92eb32
 
01-vogelsanger-stanag-4178-ed-2-the-new-nato-standard-for-nitrocellulose-test...
01-vogelsanger-stanag-4178-ed-2-the-new-nato-standard-for-nitrocellulose-test...01-vogelsanger-stanag-4178-ed-2-the-new-nato-standard-for-nitrocellulose-test...
01-vogelsanger-stanag-4178-ed-2-the-new-nato-standard-for-nitrocellulose-test...
AshwaniAnuragi1
 

Recently uploaded (20)

Passive Air Cooling System and Solar Water Heater.ppt
Passive Air Cooling System and Solar Water Heater.pptPassive Air Cooling System and Solar Water Heater.ppt
Passive Air Cooling System and Solar Water Heater.ppt
 
Working Principle of Echo Sounder and Doppler Effect.pdf
Working Principle of Echo Sounder and Doppler Effect.pdfWorking Principle of Echo Sounder and Doppler Effect.pdf
Working Principle of Echo Sounder and Doppler Effect.pdf
 
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdfInstruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
 
Artificial Intelligence in due diligence
Artificial Intelligence in due diligenceArtificial Intelligence in due diligence
Artificial Intelligence in due diligence
 
5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...
 
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdfInvolute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
 
Circuit Breakers for Engineering Students
Circuit Breakers for Engineering StudentsCircuit Breakers for Engineering Students
Circuit Breakers for Engineering Students
 
Presentation on Slab, Beam, Column, and Foundation/Footing
Presentation on Slab,  Beam, Column, and Foundation/FootingPresentation on Slab,  Beam, Column, and Foundation/Footing
Presentation on Slab, Beam, Column, and Foundation/Footing
 
Diploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdfDiploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdf
 
Basics of Relay for Engineering Students
Basics of Relay for Engineering StudentsBasics of Relay for Engineering Students
Basics of Relay for Engineering Students
 
What is Coordinate Measuring Machine? CMM Types, Features, Functions
What is Coordinate Measuring Machine? CMM Types, Features, FunctionsWhat is Coordinate Measuring Machine? CMM Types, Features, Functions
What is Coordinate Measuring Machine? CMM Types, Features, Functions
 
一比一原版(Griffith毕业证书)格里菲斯大学毕业证成绩单学位证书
一比一原版(Griffith毕业证书)格里菲斯大学毕业证成绩单学位证书一比一原版(Griffith毕业证书)格里菲斯大学毕业证成绩单学位证书
一比一原版(Griffith毕业证书)格里菲斯大学毕业证成绩单学位证书
 
Path loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata ModelPath loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata Model
 
Databricks Generative AI FoundationCertified.pdf
Databricks Generative AI FoundationCertified.pdfDatabricks Generative AI FoundationCertified.pdf
Databricks Generative AI FoundationCertified.pdf
 
Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...
 
Filters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility ApplicationsFilters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility Applications
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptx
 
Introduction-to- Metrology and Quality.pptx
Introduction-to- Metrology and Quality.pptxIntroduction-to- Metrology and Quality.pptx
Introduction-to- Metrology and Quality.pptx
 
Databricks Generative AI Fundamentals .pdf
Databricks Generative AI Fundamentals  .pdfDatabricks Generative AI Fundamentals  .pdf
Databricks Generative AI Fundamentals .pdf
 
01-vogelsanger-stanag-4178-ed-2-the-new-nato-standard-for-nitrocellulose-test...
01-vogelsanger-stanag-4178-ed-2-the-new-nato-standard-for-nitrocellulose-test...01-vogelsanger-stanag-4178-ed-2-the-new-nato-standard-for-nitrocellulose-test...
01-vogelsanger-stanag-4178-ed-2-the-new-nato-standard-for-nitrocellulose-test...
 

Signature Verification using DCT

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1437 SIGNATURE VERIFICATION USING DCT Prathiba M K1, Sushmitha H L2, Chandan B3, Karthik B K4 and Manohar H P 5 1Professor , Dept. of Electronics and Communication Engineering, ATMECE Mysore, Karnataka, India 2,3,4,5UG Students Dept. of Electronics and Communication Engineering, ATMECE Mysore, Karnataka, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Signatures have been considered a typical form of authentication in our society for hundreds of years. Signature is a simple, concrete expression of the unique variations in human hand geometry. The way a person signs his or her name is known to be characteristic of that individual. A signature verification system must be able to detect forgeries, and, at the same time, reduce rejection of genuine signatures. Signatures are subject to intra-personal variations. Hence, a signature verification system is feasible only if the system is insensitive to intra-personal variability, but sensitive to interpersonal variability. Even when insensitive to intra-personal variations, the system must possess the discriminating power to foil skillful forgers. Key Words: (Size 10 & Bold) signature verification, interpersonal variability, intra-personal variability, Discrete Cosine Transform, Feature extraction etc (Minimum 5 to 8 key words)… 1. INTRODUCTION Human signature is a biometric measure of person's identification. In many sectorslikebanks,official documents, receipts etc. handwrittensignatureareverifiedtosecure and identify the concerned person. Each individual has his own signature different with others but in most of the time it is not possible to produce the replica of the signature. The signature verification problem aims to minimize the intrapersonal differences. Signature verification can be categorized into following two parts: online and offline .Online handwritten signature verification deals with automatic conversion of characters which are written on a special digitizer, tablet PC or PDA, Whereina sensorpicksup the pen -tip movements as well as pen -up/pen-down switching. An on-line signature verification system based on local information and a one-class classifier, i.e. the Linear Programming Descriptor classifier (LPD), was presented by Nanni and Lumini [1]. The authors investigated and described how the information was extracted as time functions of various dynamic properties of the signatures, and then the discrete 1-D Wavelet Transform (WT) was performed on these features. The DCT was used to reduce the approximation coefficients vector obtained by WT to a feature vector of a given dimension. Fabregas and Faundez- Zanuy [2]: have presented a new system for on-line signature verification based on DCT feature extraction with discriminability feature selection. They performed a complete set of simulations with the largest available online signature database, MCYT, whichconsistsof330peoplewith genuine and skilled forgeries performed by five other different users. Dimauro et.al.[3] in their study of local features stability have introduced a warping functionthatallowsmtonpoints to be matched. However, such an approach may not be practical in cases of extreme values of features. Lei and Govindaraju[4] analyzed the consistency and discriminative power of on-line features using a distance- based measure that is optimized for each feature of study. They view signature verification as a one category classification problem, and use the distances between features to distinguish them rather than the feature values themselves. 1.1 Motivation Online handwrittensignatureverificationsystemisbased on the extracting the featuresof signaturefromthesignature pad and consider as interpersonal features that are not statistically stable. These are used for comparison and verifications between different signaturesandenhancingthe interpersonal variations and classifier is used to verify signatureand provide resultasgenuineorforgeryandalsoto present a simple and effective approach for an online signature verification system. Finally, complete content and organizational editing before formatting. Please take note of the following items when proofreading spelling and grammar: 1.2 Discrete Cosine Transform (DCT) Online signature verification has proved to be more accurate than the offline signature verification. The DCT has the ability to compactly represent an online signature verification using a fixed number of coefficients which leads to fast matching algorithm. A DCT coefficient is the compression of feature data, which reduces the elapsed time and storage space for training and verification processes. The time for DTW and HMM methods is very long. From these advantagesofDCT,it motivated us to do online signature verification based on DCT. 2. SIGNATURE VERIFICATION SYSTEM The proposed online handwritten signature verification system consists the following blocks as show in Fig. 1
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1438 Fig -1: Block diagram of signature verification system During signature acquisition phase signatures are acquired by using Wacom tablet the 125 signatures are taken from 25 signers at least 5 samples each user. The features are extracted from these signatures and stored in the database. Testing phase is carried out same as training phase but in testing phase we do feature extraction is only for specified sample of specified user. If, the tested signature features matches with the features of the training phase of the respective user then the tested signature will treated as genuine signature. During the training and verification phase, test signature to be compared against the claimed user’s reference set signature. In order to match two signatures, the following stages are applied: A basis feature matrix is calculated from the reference signatures of each signer.Forthis,wecalculatetheminimum, mean, maximum and sum values for each DCT Coefficient in the reference set. The distance between the featurematrixof reference and test signatures computes. The matrix of the featuredistance isalso normalizedtomaptoavaluebetween 0 and1. Genetic algorithm is used for verification process. 3. RESULTS The signature is acquired using tablet is as shown in Fig.2 Fig -2: User signature The user signature is varying with respect to horizontal direction i.e. X-coordinate and the DCT of X is shown in Fig. 3. Fig -3: Plotting of theta and its DCT of signature The user signature is varying with respect to vertical direction i.e. Y-coordinate and the DCT of Y is shown in Fig. 4. Fig -4: Plotting of theta and its DCT of signature The value of theta represents the movement of pen with respect to X-axis and its corresponding DCT is plotted as shown in Fig.5. Fig -5: Plotting of theta and its DCT of signature
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1439 Genetic algorithm is used for classification of signatures, which makes the verification performancemoreaccurate. To evaluate the experiments, False Acceptance Rate (FAR) and False Rejection Rate (FRR) are determined. FAR represents the probability that a false match occurs, while FRR represents the probability that a false rejection occurs. Genuine and forged signatures of each user are fed to database for comparison which provides two possible results and are as follows. When genuine signatureiscomparedwithgenuinesignature of users and the result obtained is “Genuine signature” as shown in Fig. 6. Fig -6: output of genuine signature Genuine signature is compared with forged signature of users and the result obtained is “forged signature” asshown in Fig.7. Fig -7: output of genuine signature 3. CONCULSION Although signature verification is not one of the safest biometric solutions, the use of it in business practices is still justified. Moreover, signature verification has a very promising future. One major drawback is that humans are not consistent when signing their signatures. In this paper, a robust signature verification system has been proposed, based on DCT coefficients and the Genetic Algorithm. Our proposed method can extract basic dynamic features from signature time signals, and compress signature data, while keeping the rough form and basic information of signatures. Especially in the context of skilled forgery, where inter- personal variability in the number of features becomes negligible, an effective analysis of features based on time signals is essential for attainment of a suitable performance. Ideally we need features that are stable, i.e. do not change very much between different genuine signatures, and which are hard to forge. For attaining this purpose, capturing signals via a tablet digitizer and using the extracted dynamics information has been considered, mainly in the form of simple parameters of DCT coefficients. These features are efficient and experimental results confirm that the proposed method is promising. The summation condition in the verification process guides the system towards an accurate decision. REFERENCES [1] Nanni, L. and Lumini, A., “A novel local on-line signature verification system,” Pattern Recognition Letters, 2008.,pp. 559–568. [2] Fabregas, J. and Faundez-Zanuy,., “On-line signature verification system with failure to enroll management,” Pattern Recognition Letters, 2009., pp. 2117–2126. [3] Dimauro, G., Modugno, R., Pirlo, G. and Sarcinella, L., “Analysis of stability in hand-written dynamic signatures,” Proceedings of the 8th International Workshop onFrontiers in Handwriting Recognition, IWFHR,2002, pp. 259–263 [4] H. Lei, V. Govindaraju “A comparative study on the consistency of features in on-line signature verification” Pattern Recognition Letters, 26 (15) (2005),pp.2483– 2489