SlideShare a Scribd company logo
1 of 13
Download to read offline
CNN based Handwritten
Signature Recognition
Presented By:
Suresh Pokharel, IOE Pulchowk Campus
Santosh Giri, Kathford Int’l College of Engg. and Mgmt.
Prof. Dr. Subarna Shakya, IOE Pulchowk Campus
Outline
❏ Background
❏ Motivation
❏ Methodology
❏ Results
❏ Summary
❏ Limitations
❏ Future Enhancement
2
Background
● Signature is commonly accepted as a means of verifying
the legality of documents such as certificates, checks,
drafts, letters, approvals etc.
● Problems in countering the forgery and falsification of
such documents in diverse financial, legal, academic, and
other commercial settings.
3
Background
❏ Signature verification task is very critical and often
presents difficulties like high variability
(Factors: Age, behavior and environment, similarities
between signatures of different person and similarity in
duplication or forgery of one’s signature.)
4
Background
Types of Signature Verification Techniques:
❏ Online Verification
Consists of electronic signing system that uses dynamic
data features such as the speed, pressure, pen’s position,
altitude angle etc.
❏ Offline Verification
Takes use of static features of two dimensional image
pixel. 5
Motivation
● Validation of signature in legal documents are highly critical.
● Failure in the authentication may lead to serious
consequences and damages.
● New and complex forgery and fraud techniques are
emerging.
6
Methodology
Data collection and Preprocessing:
❏ Collected in hard copy
❏ Converted into an image scanner
❏ Image Preprocessing Techniques:
cropping, scaling (224px X 224px)
❏ Image Size: 40 KiloBytes (Approx.)
7
8
Methodology (Contd...)
❏ The pre-trained CNN model, GoogleNet is used for experiment and the
tensorflow platform is used.
❏ GoogleNet model consists of two parts; a classification layer and a feature
extraction layer.
❏ The parameters on the classification layer are removed and trained with the
transfer values from the feature extraction layer of the model.
9
Experiment Setup
10
Primary Data Specification:
❏ Classes: 25
❏ Samples per class: 100
❏ Training set: 65%
❏ Validation: 20%
❏ Testing: 15%
Hardware
❏ DELL: Intel i5, 1.7 GHZ
processor
❏ 7.7GiB Memory
Results
Training and Validation Accuracy graph.
11
Results
Training Results:
Training and Validation Accuracy graph.
12
Thank You
13

More Related Content

What's hot

An offline signature recognition and verification system based on neural network
An offline signature recognition and verification system based on neural networkAn offline signature recognition and verification system based on neural network
An offline signature recognition and verification system based on neural networkeSAT Journals
 
物体検知(Meta Study Group 発表資料)
物体検知(Meta Study Group 発表資料)物体検知(Meta Study Group 発表資料)
物体検知(Meta Study Group 発表資料)cvpaper. challenge
 
Deep learning for person re-identification
Deep learning for person re-identificationDeep learning for person re-identification
Deep learning for person re-identification哲东 郑
 
Relational Binarized HOG特徴量とReal AdaBoostによるバイナリ選択を用いた物体検出
Relational Binarized HOG特徴量とReal AdaBoostによるバイナリ選択を用いた物体検出Relational Binarized HOG特徴量とReal AdaBoostによるバイナリ選択を用いた物体検出
Relational Binarized HOG特徴量とReal AdaBoostによるバイナリ選択を用いた物体検出MPRG_Chubu_University
 
Defending deep learning from adversarial attacks
Defending deep learning from adversarial attacksDefending deep learning from adversarial attacks
Defending deep learning from adversarial attacksSvetlana Levitan, PhD
 
The Trouble with Cloud Forensics
The Trouble with Cloud ForensicsThe Trouble with Cloud Forensics
The Trouble with Cloud ForensicsSharique Rizvi
 
自然言語処理における深層学習を用いた予測の不確実性 - Predictive Uncertainty in NLP -
自然言語処理における深層学習を用いた予測の不確実性  - Predictive Uncertainty in NLP -自然言語処理における深層学習を用いた予測の不確実性  - Predictive Uncertainty in NLP -
自然言語処理における深層学習を用いた予測の不確実性 - Predictive Uncertainty in NLP -tmtm otm
 
Handwritten Signature Verification using Artificial Neural Network
Handwritten Signature Verification using Artificial Neural NetworkHandwritten Signature Verification using Artificial Neural Network
Handwritten Signature Verification using Artificial Neural NetworkEditor IJMTER
 
Cloud Forensics
Cloud ForensicsCloud Forensics
Cloud Forensicssdavis532
 
Crowd Counting & Detection論文紹介
Crowd Counting & Detection論文紹介Crowd Counting & Detection論文紹介
Crowd Counting & Detection論文紹介Plot Hong
 
cvsaisentan20141004 kanezaki
cvsaisentan20141004 kanezakicvsaisentan20141004 kanezaki
cvsaisentan20141004 kanezakikanejaki
 
Visual Object Tracking: review
Visual Object Tracking: reviewVisual Object Tracking: review
Visual Object Tracking: reviewDmytro Mishkin
 
Pattern recognition Hand Geometry
Pattern recognition Hand GeometryPattern recognition Hand Geometry
Pattern recognition Hand GeometryMazin Alwaaly
 

What's hot (20)

Mobilenet
MobilenetMobilenet
Mobilenet
 
An offline signature recognition and verification system based on neural network
An offline signature recognition and verification system based on neural networkAn offline signature recognition and verification system based on neural network
An offline signature recognition and verification system based on neural network
 
Behavioral biometrics
Behavioral biometricsBehavioral biometrics
Behavioral biometrics
 
物体検知(Meta Study Group 発表資料)
物体検知(Meta Study Group 発表資料)物体検知(Meta Study Group 発表資料)
物体検知(Meta Study Group 発表資料)
 
Attack Vectors in Biometric Recognition Systems
Attack Vectors in Biometric Recognition SystemsAttack Vectors in Biometric Recognition Systems
Attack Vectors in Biometric Recognition Systems
 
Sign verification
Sign verificationSign verification
Sign verification
 
Deep learning for person re-identification
Deep learning for person re-identificationDeep learning for person re-identification
Deep learning for person re-identification
 
Object Recognition
Object RecognitionObject Recognition
Object Recognition
 
Relational Binarized HOG特徴量とReal AdaBoostによるバイナリ選択を用いた物体検出
Relational Binarized HOG特徴量とReal AdaBoostによるバイナリ選択を用いた物体検出Relational Binarized HOG特徴量とReal AdaBoostによるバイナリ選択を用いた物体検出
Relational Binarized HOG特徴量とReal AdaBoostによるバイナリ選択を用いた物体検出
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
Image Forgery Detection
Image Forgery DetectionImage Forgery Detection
Image Forgery Detection
 
Defending deep learning from adversarial attacks
Defending deep learning from adversarial attacksDefending deep learning from adversarial attacks
Defending deep learning from adversarial attacks
 
The Trouble with Cloud Forensics
The Trouble with Cloud ForensicsThe Trouble with Cloud Forensics
The Trouble with Cloud Forensics
 
自然言語処理における深層学習を用いた予測の不確実性 - Predictive Uncertainty in NLP -
自然言語処理における深層学習を用いた予測の不確実性  - Predictive Uncertainty in NLP -自然言語処理における深層学習を用いた予測の不確実性  - Predictive Uncertainty in NLP -
自然言語処理における深層学習を用いた予測の不確実性 - Predictive Uncertainty in NLP -
 
Handwritten Signature Verification using Artificial Neural Network
Handwritten Signature Verification using Artificial Neural NetworkHandwritten Signature Verification using Artificial Neural Network
Handwritten Signature Verification using Artificial Neural Network
 
Cloud Forensics
Cloud ForensicsCloud Forensics
Cloud Forensics
 
Crowd Counting & Detection論文紹介
Crowd Counting & Detection論文紹介Crowd Counting & Detection論文紹介
Crowd Counting & Detection論文紹介
 
cvsaisentan20141004 kanezaki
cvsaisentan20141004 kanezakicvsaisentan20141004 kanezaki
cvsaisentan20141004 kanezaki
 
Visual Object Tracking: review
Visual Object Tracking: reviewVisual Object Tracking: review
Visual Object Tracking: review
 
Pattern recognition Hand Geometry
Pattern recognition Hand GeometryPattern recognition Hand Geometry
Pattern recognition Hand Geometry
 

Similar to CNN based Handwritten Signature Recognition

anonymous and efficient authentication scheme for privacy-preserving distribu...
anonymous and efficient authentication scheme for privacy-preserving distribu...anonymous and efficient authentication scheme for privacy-preserving distribu...
anonymous and efficient authentication scheme for privacy-preserving distribu...SUBHAJIT GHOSH
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologySARATHGOVINDKK
 
Emerging technology: Delta biometrics
Emerging technology: Delta biometricsEmerging technology: Delta biometrics
Emerging technology: Delta biometricsPynshailang Nongsiej
 
SFScon 22 - Fiete Lüer - Heading towards reproducible machine learning resear...
SFScon 22 - Fiete Lüer - Heading towards reproducible machine learning resear...SFScon 22 - Fiete Lüer - Heading towards reproducible machine learning resear...
SFScon 22 - Fiete Lüer - Heading towards reproducible machine learning resear...South Tyrol Free Software Conference
 
Credit Card Fraudulent Transaction Detection Research Paper
Credit Card Fraudulent Transaction Detection Research PaperCredit Card Fraudulent Transaction Detection Research Paper
Credit Card Fraudulent Transaction Detection Research PaperGarvit Burad
 
Resume-Amarnath Chandran (1)
Resume-Amarnath Chandran (1)Resume-Amarnath Chandran (1)
Resume-Amarnath Chandran (1)Amarnath Chandran
 
CREDIT CARD FRAUD DETECTION
CREDIT CARD FRAUD DETECTION CREDIT CARD FRAUD DETECTION
CREDIT CARD FRAUD DETECTION K Srinivas Rao
 
Emergence of cloud computing and internet of things an overview
Emergence of cloud computing and internet of things   an overviewEmergence of cloud computing and internet of things   an overview
Emergence of cloud computing and internet of things an overviewSelvaraj Kesavan
 
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...IRJET Journal
 
Navigating the Complexity of Virtual Clinical Trials
Navigating the Complexity of Virtual Clinical TrialsNavigating the Complexity of Virtual Clinical Trials
Navigating the Complexity of Virtual Clinical TrialsEmily Kunka, MS, CCRP
 
ppt based upon e certificate isssue using blockchain technology
ppt based upon e certificate isssue using blockchain technologyppt based upon e certificate isssue using blockchain technology
ppt based upon e certificate isssue using blockchain technologyPrasadJagtap26
 
Survey on SkillVio: Skill Verification System Using Blockchain
Survey on SkillVio: Skill Verification System Using BlockchainSurvey on SkillVio: Skill Verification System Using Blockchain
Survey on SkillVio: Skill Verification System Using BlockchainIRJET Journal
 
Self-supervised Learning for ECG-based Emotion Recognition
Self-supervised Learning for ECG-based Emotion RecognitionSelf-supervised Learning for ECG-based Emotion Recognition
Self-supervised Learning for ECG-based Emotion RecognitionPritam Sarkar
 
Training and deploying an image classification model
Training and deploying an image classification modelTraining and deploying an image classification model
Training and deploying an image classification modelKnoldus Inc.
 

Similar to CNN based Handwritten Signature Recognition (20)

anonymous and efficient authentication scheme for privacy-preserving distribu...
anonymous and efficient authentication scheme for privacy-preserving distribu...anonymous and efficient authentication scheme for privacy-preserving distribu...
anonymous and efficient authentication scheme for privacy-preserving distribu...
 
E discovery Process Improvement
E discovery Process ImprovementE discovery Process Improvement
E discovery Process Improvement
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Emerging technology: Delta biometrics
Emerging technology: Delta biometricsEmerging technology: Delta biometrics
Emerging technology: Delta biometrics
 
SFScon 22 - Fiete Lüer - Heading towards reproducible machine learning resear...
SFScon 22 - Fiete Lüer - Heading towards reproducible machine learning resear...SFScon 22 - Fiete Lüer - Heading towards reproducible machine learning resear...
SFScon 22 - Fiete Lüer - Heading towards reproducible machine learning resear...
 
Credit Card Fraudulent Transaction Detection Research Paper
Credit Card Fraudulent Transaction Detection Research PaperCredit Card Fraudulent Transaction Detection Research Paper
Credit Card Fraudulent Transaction Detection Research Paper
 
Resume-Amarnath Chandran (1)
Resume-Amarnath Chandran (1)Resume-Amarnath Chandran (1)
Resume-Amarnath Chandran (1)
 
Pavan kumar k
Pavan kumar kPavan kumar k
Pavan kumar k
 
CREDIT CARD FRAUD DETECTION
CREDIT CARD FRAUD DETECTION CREDIT CARD FRAUD DETECTION
CREDIT CARD FRAUD DETECTION
 
Emergence of cloud computing and internet of things an overview
Emergence of cloud computing and internet of things   an overviewEmergence of cloud computing and internet of things   an overview
Emergence of cloud computing and internet of things an overview
 
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
 
Navigating the Complexity of Virtual Clinical Trials
Navigating the Complexity of Virtual Clinical TrialsNavigating the Complexity of Virtual Clinical Trials
Navigating the Complexity of Virtual Clinical Trials
 
ppt based upon e certificate isssue using blockchain technology
ppt based upon e certificate isssue using blockchain technologyppt based upon e certificate isssue using blockchain technology
ppt based upon e certificate isssue using blockchain technology
 
Indhu G_M&AT
Indhu G_M&ATIndhu G_M&AT
Indhu G_M&AT
 
Survey on SkillVio: Skill Verification System Using Blockchain
Survey on SkillVio: Skill Verification System Using BlockchainSurvey on SkillVio: Skill Verification System Using Blockchain
Survey on SkillVio: Skill Verification System Using Blockchain
 
Self-supervised Learning for ECG-based Emotion Recognition
Self-supervised Learning for ECG-based Emotion RecognitionSelf-supervised Learning for ECG-based Emotion Recognition
Self-supervised Learning for ECG-based Emotion Recognition
 
KoryTWright Resume
KoryTWright ResumeKoryTWright Resume
KoryTWright Resume
 
Gopi manohar Resume
Gopi manohar ResumeGopi manohar Resume
Gopi manohar Resume
 
RanjanKumarPusty__Resume
RanjanKumarPusty__ResumeRanjanKumarPusty__Resume
RanjanKumarPusty__Resume
 
Training and deploying an image classification model
Training and deploying an image classification modelTraining and deploying an image classification model
Training and deploying an image classification model
 

More from Suresh Pokharel

Sequential and Parallel Searching Algorithms
Sequential and Parallel Searching AlgorithmsSequential and Parallel Searching Algorithms
Sequential and Parallel Searching AlgorithmsSuresh Pokharel
 
Information System Architecture
Information System ArchitectureInformation System Architecture
Information System ArchitectureSuresh Pokharel
 
Application of Knowledge Engineering in Legal Data : A case study of the info...
Application of Knowledge Engineering in Legal Data : A case study of the info...Application of Knowledge Engineering in Legal Data : A case study of the info...
Application of Knowledge Engineering in Legal Data : A case study of the info...Suresh Pokharel
 
Comparison of ANN Algorithm for Water Quality Prediction of River Ganga
Comparison of ANN Algorithm for Water Quality Prediction of River GangaComparison of ANN Algorithm for Water Quality Prediction of River Ganga
Comparison of ANN Algorithm for Water Quality Prediction of River GangaSuresh Pokharel
 
Study of Vitellogenin Motif
Study of Vitellogenin MotifStudy of Vitellogenin Motif
Study of Vitellogenin MotifSuresh Pokharel
 
Task programming in cloud computing
Task programming in cloud computingTask programming in cloud computing
Task programming in cloud computingSuresh Pokharel
 
Gene Identification in Alzheimer Disease Using Bioinformatics Analysis
Gene Identification in Alzheimer Disease Using Bioinformatics AnalysisGene Identification in Alzheimer Disease Using Bioinformatics Analysis
Gene Identification in Alzheimer Disease Using Bioinformatics AnalysisSuresh Pokharel
 
Conditional Random Fields
Conditional Random FieldsConditional Random Fields
Conditional Random FieldsSuresh Pokharel
 
Principal component analysis and lda
Principal component analysis and ldaPrincipal component analysis and lda
Principal component analysis and ldaSuresh Pokharel
 

More from Suresh Pokharel (10)

Sequential and Parallel Searching Algorithms
Sequential and Parallel Searching AlgorithmsSequential and Parallel Searching Algorithms
Sequential and Parallel Searching Algorithms
 
Information System Architecture
Information System ArchitectureInformation System Architecture
Information System Architecture
 
Application of Knowledge Engineering in Legal Data : A case study of the info...
Application of Knowledge Engineering in Legal Data : A case study of the info...Application of Knowledge Engineering in Legal Data : A case study of the info...
Application of Knowledge Engineering in Legal Data : A case study of the info...
 
Case Based Reasoning
Case Based ReasoningCase Based Reasoning
Case Based Reasoning
 
Comparison of ANN Algorithm for Water Quality Prediction of River Ganga
Comparison of ANN Algorithm for Water Quality Prediction of River GangaComparison of ANN Algorithm for Water Quality Prediction of River Ganga
Comparison of ANN Algorithm for Water Quality Prediction of River Ganga
 
Study of Vitellogenin Motif
Study of Vitellogenin MotifStudy of Vitellogenin Motif
Study of Vitellogenin Motif
 
Task programming in cloud computing
Task programming in cloud computingTask programming in cloud computing
Task programming in cloud computing
 
Gene Identification in Alzheimer Disease Using Bioinformatics Analysis
Gene Identification in Alzheimer Disease Using Bioinformatics AnalysisGene Identification in Alzheimer Disease Using Bioinformatics Analysis
Gene Identification in Alzheimer Disease Using Bioinformatics Analysis
 
Conditional Random Fields
Conditional Random FieldsConditional Random Fields
Conditional Random Fields
 
Principal component analysis and lda
Principal component analysis and ldaPrincipal component analysis and lda
Principal component analysis and lda
 

Recently uploaded

Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 

Recently uploaded (20)

Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 

CNN based Handwritten Signature Recognition

  • 1. CNN based Handwritten Signature Recognition Presented By: Suresh Pokharel, IOE Pulchowk Campus Santosh Giri, Kathford Int’l College of Engg. and Mgmt. Prof. Dr. Subarna Shakya, IOE Pulchowk Campus
  • 2. Outline ❏ Background ❏ Motivation ❏ Methodology ❏ Results ❏ Summary ❏ Limitations ❏ Future Enhancement 2
  • 3. Background ● Signature is commonly accepted as a means of verifying the legality of documents such as certificates, checks, drafts, letters, approvals etc. ● Problems in countering the forgery and falsification of such documents in diverse financial, legal, academic, and other commercial settings. 3
  • 4. Background ❏ Signature verification task is very critical and often presents difficulties like high variability (Factors: Age, behavior and environment, similarities between signatures of different person and similarity in duplication or forgery of one’s signature.) 4
  • 5. Background Types of Signature Verification Techniques: ❏ Online Verification Consists of electronic signing system that uses dynamic data features such as the speed, pressure, pen’s position, altitude angle etc. ❏ Offline Verification Takes use of static features of two dimensional image pixel. 5
  • 6. Motivation ● Validation of signature in legal documents are highly critical. ● Failure in the authentication may lead to serious consequences and damages. ● New and complex forgery and fraud techniques are emerging. 6
  • 7. Methodology Data collection and Preprocessing: ❏ Collected in hard copy ❏ Converted into an image scanner ❏ Image Preprocessing Techniques: cropping, scaling (224px X 224px) ❏ Image Size: 40 KiloBytes (Approx.) 7
  • 8. 8
  • 9. Methodology (Contd...) ❏ The pre-trained CNN model, GoogleNet is used for experiment and the tensorflow platform is used. ❏ GoogleNet model consists of two parts; a classification layer and a feature extraction layer. ❏ The parameters on the classification layer are removed and trained with the transfer values from the feature extraction layer of the model. 9
  • 10. Experiment Setup 10 Primary Data Specification: ❏ Classes: 25 ❏ Samples per class: 100 ❏ Training set: 65% ❏ Validation: 20% ❏ Testing: 15% Hardware ❏ DELL: Intel i5, 1.7 GHZ processor ❏ 7.7GiB Memory
  • 11. Results Training and Validation Accuracy graph. 11
  • 12. Results Training Results: Training and Validation Accuracy graph. 12