Authentication of a person is the major concern in this era for security purposes. In biometric systems Signature is one of the behavioural features used for the authentication purpose. In this paper we work on the offline signature collected through different persons. Morphological operations are applied on these signature images with Hough transform to determine regular shape which assists in authentication process. The values extracted from this Hough space is used in the feed forward neural network which is trained using back-propagation algorithm. After the different training stages efficiency found above more than 95%. Application of this system will be in the security concerned fields, in the defence security, biometric authentication, as biometric computer protection or as method of the analysis of person’s behaviour changes.
An offline signature recognition and verification system based on neural networkeSAT Journals
Abstract Various techniques are already introduced for personal identification and verification based on different types of biometrics which can be physiological or behavioral. Signatures lies in the category of behavioral biometric which can distort or changed with course of time. Signatures are considered to be most promising authentication method in all legal and financial documents. It is necessary to verify signers and their respective signatures. This paper presents an Offline Signature recognition and verification system(SRVS). In this system signature database of signature images is created, followed by image preprocessing, feature extraction, neural network design and training, and classification of signature as genuine or counterfeit. Keywords: biometrics, neural network design, feature extraction, classification etc.
This slide proposed a method to authenticate a signature in off-line. Our proposed method uses "Harris Corner Detector", "Orientation Assignment" , "KNN Classifier", "Hungarian Algorithm".
INTRO:
Nowadays, person identification (recognition) and verification is very important in security and resource access control.
Biometrics is the science of automatic recognition of individual depending on their physiological and behavioral attributes.
For centuries, handwritten signatures have been an integral part of validating business transaction contracts and agreements.
Among the different forms of biometric recognition systems such as
fingerprint, iris, face, voice, palm etc., signature will be most widely used.
SIGNATURE RECOGNITION
Signature Recognition is the procedure of determining to whom a particular signature belongs to.
Depending on acquiring of signature images, there are two types of signature recognition systems:
Online Signature Recognition
Offline Signature Recognition
STEPS
IMAGE ACQUSITION
Collection of signatures from 50 persons on blank paper.
The collected signatures are scanned to get images in JPG format to create database.
PREPROCESSING
Image pre-processing is a technique to enhance raw images received from cameras/sensors placed on satellites, space probes and aircrafts or pictures taken in normal day-to-day life for various applications.
The techniques for preprocessing used are
RGB to Gray Scale Conversion
Binarization
Thinning
Bounding Box
FEATURE EXTRACTION
Features are the characters to be extracted from the processed image.
It has used two feature techniques
Global Features
Grid Features
DWT
After applying DWT to all 9 blocks, each block is divided into horizontal, vertical and diagonal components. From each components two features mainly horizontal and vertical projection positions are extracted. Total 54 (9 x 3 x 2) features are extracted.
Grid features extracted from each block are
Horizontal Projection Position
Vertical Projection Position
Algorithm for Training phase
Description: Retrieval of a signature image from a database
Input: Training sample images.
Output: Construction of Back Propagation Neural Network.
Begin
Read the training samples images
Step1: Pre-processing
Convert the image into gray scale image.
Convert the gray scale image into binary image.
Apply thinning process.
Apply bounding box.
Step 2: Features Extracted.
Step 3: Back propagation neural network training.
end // end of proposed algorithm
it's a signature verification project, where the signature is verified from our dataset and matched with the current one. If it matches the test case then the process is verified and if it doesn't then the process repeats or it depends on user, whether he/she want to continue the process or not.
Authentication of a person is the major concern in this era for security purposes. In biometric systems Signature is one of the behavioural features used for the authentication purpose. In this paper we work on the offline signature collected through different persons. Morphological operations are applied on these signature images with Hough transform to determine regular shape which assists in authentication process. The values extracted from this Hough space is used in the feed forward neural network which is trained using back-propagation algorithm. After the different training stages efficiency found above more than 95%. Application of this system will be in the security concerned fields, in the defence security, biometric authentication, as biometric computer protection or as method of the analysis of person’s behaviour changes.
An offline signature recognition and verification system based on neural networkeSAT Journals
Abstract Various techniques are already introduced for personal identification and verification based on different types of biometrics which can be physiological or behavioral. Signatures lies in the category of behavioral biometric which can distort or changed with course of time. Signatures are considered to be most promising authentication method in all legal and financial documents. It is necessary to verify signers and their respective signatures. This paper presents an Offline Signature recognition and verification system(SRVS). In this system signature database of signature images is created, followed by image preprocessing, feature extraction, neural network design and training, and classification of signature as genuine or counterfeit. Keywords: biometrics, neural network design, feature extraction, classification etc.
This slide proposed a method to authenticate a signature in off-line. Our proposed method uses "Harris Corner Detector", "Orientation Assignment" , "KNN Classifier", "Hungarian Algorithm".
INTRO:
Nowadays, person identification (recognition) and verification is very important in security and resource access control.
Biometrics is the science of automatic recognition of individual depending on their physiological and behavioral attributes.
For centuries, handwritten signatures have been an integral part of validating business transaction contracts and agreements.
Among the different forms of biometric recognition systems such as
fingerprint, iris, face, voice, palm etc., signature will be most widely used.
SIGNATURE RECOGNITION
Signature Recognition is the procedure of determining to whom a particular signature belongs to.
Depending on acquiring of signature images, there are two types of signature recognition systems:
Online Signature Recognition
Offline Signature Recognition
STEPS
IMAGE ACQUSITION
Collection of signatures from 50 persons on blank paper.
The collected signatures are scanned to get images in JPG format to create database.
PREPROCESSING
Image pre-processing is a technique to enhance raw images received from cameras/sensors placed on satellites, space probes and aircrafts or pictures taken in normal day-to-day life for various applications.
The techniques for preprocessing used are
RGB to Gray Scale Conversion
Binarization
Thinning
Bounding Box
FEATURE EXTRACTION
Features are the characters to be extracted from the processed image.
It has used two feature techniques
Global Features
Grid Features
DWT
After applying DWT to all 9 blocks, each block is divided into horizontal, vertical and diagonal components. From each components two features mainly horizontal and vertical projection positions are extracted. Total 54 (9 x 3 x 2) features are extracted.
Grid features extracted from each block are
Horizontal Projection Position
Vertical Projection Position
Algorithm for Training phase
Description: Retrieval of a signature image from a database
Input: Training sample images.
Output: Construction of Back Propagation Neural Network.
Begin
Read the training samples images
Step1: Pre-processing
Convert the image into gray scale image.
Convert the gray scale image into binary image.
Apply thinning process.
Apply bounding box.
Step 2: Features Extracted.
Step 3: Back propagation neural network training.
end // end of proposed algorithm
it's a signature verification project, where the signature is verified from our dataset and matched with the current one. If it matches the test case then the process is verified and if it doesn't then the process repeats or it depends on user, whether he/she want to continue the process or not.
Handwritten Signature Verification using Artificial Neural NetworkEditor IJMTER
This paper reviews various Signature Verification approaches; various feature sets,
various online databases and types of features. Processing on an online database, post extracting a
combination of global and local features onto a signature as an image, using MultiLayer Perceptron Feed
Forward Network alongwith Back Propogation Algorithm for training is proposed to classify a genuine
and forged (random, simple and skilled) offline signatures.
Signature is commonly accepted as a means of verifying the legality of documents such as certificates, checks, drafts, letters, approvals, etc.
The pre-trained CNN model, GoogleNet is used for the experiment and the TensorFlow platform is used.
GoogleNet model consists of two parts; a classification layer and a feature extraction layer.
The parameters on the classification layer are removed and trained with the transfer values from the feature extraction layer of the model.
Problems in countering the forgery and falsification of such documents in diverse financial, legal, academic, and other commercial settings.
This presentation describes what could be the good features, and the methods to verify a person from his hand. This uses
"Raul Sanchez-Reillo, C. Sanchez-Avila, A. Gonzalez-Marcos, Biometric identification through hand geometry measurements, IEEE Transactions on PAMI 22 (2000)" as the base.
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...IJNSA Journal
One of the most important processes used by companies to safeguard the security of information and prevent it from unauthorized access or penetration is the signature process. As businesses and individuals move into the digital age, a computerized system that can discern between genuine and faked signatures is crucial for protecting people's authorization and determining what permissions they have. In this paper, we used Pre-Trained CNN for extracts features from genuine and forged signatures, and three widely used classification algorithms, SVM (Support Vector Machine), NB (Naive Bayes) and KNN (k-nearest neighbors), these algorithms are compared to calculate the run time, classification error, classification loss, and accuracy for test-set consist of signature images (genuine and forgery). Three classifiers have been applied using (UTSig) dataset; where run time, classification error, classification loss and accuracy were calculated for each classifier in the verification phase, the results showed that the SVM and KNN got the best accuracy (76.21), while the SVM got the best run time (0.13) result among other classifiers, therefore the SVM classifier got the best result among the other classifiers in terms of our measures.
Multimodal biometric systems are those that utilize more than one physical or behavioural characteristic for enrolment , verification, or identification.
An appraisal of offline signature verification techniquesSalam Shah
Biometrics is being commonly used nowadays for the identification and verification of humans everywhere in the world. In biometrics humans unique characteristics like palm, fingerprints, iris etc. are being used. Pattern Recognition and image processing are the major areas where research on signature verification is carried out. Hand written Signature of an individual is also unique and for identification of humans are being used and accepted specially in the banking and other financial transactions. The hand written signatures due to its importance are at target of fraudulence. In this paper we have surveyed different papers on techniques that are currently used for the identification and verification of Offline signatures.
A Novel Automated Approach for Offline Signature Verification Based on Shape ...Editor IJCATR
The handwritten signature has been the most natural and long lasting authentication scheme in which a person draw some
pattern of lines or writes his name in a different style. The signature recognition and verification are a behavioural biometric and is
very challenging due to the variation that can occur in person’s signature because of age, illness, and emotional state of the person. As
far as the representation of the signature is concerned a classical technique of thinning or skeleton is mostly used. In this paper, we
proposed a new methodology for signature verification that uses structural information and original strokes instead of skeleton or
thinned version to analyse the signature and verify. The approach is based on sketching a fixed size grid over the signatures and getting
2-Dimensional unique templates which are then compared and matched to verify a query signature as genuine or forged. To compute
the similarity score between two signature’s grids, we follow template matching rule and the Signature grid’s cell are mapped and
matched with respect to position. The proposed framework is fast and highly accurate with reduce false acceptance rate and false
Handwritten Signature Verification using Artificial Neural NetworkEditor IJMTER
This paper reviews various Signature Verification approaches; various feature sets,
various online databases and types of features. Processing on an online database, post extracting a
combination of global and local features onto a signature as an image, using MultiLayer Perceptron Feed
Forward Network alongwith Back Propogation Algorithm for training is proposed to classify a genuine
and forged (random, simple and skilled) offline signatures.
Signature is commonly accepted as a means of verifying the legality of documents such as certificates, checks, drafts, letters, approvals, etc.
The pre-trained CNN model, GoogleNet is used for the experiment and the TensorFlow platform is used.
GoogleNet model consists of two parts; a classification layer and a feature extraction layer.
The parameters on the classification layer are removed and trained with the transfer values from the feature extraction layer of the model.
Problems in countering the forgery and falsification of such documents in diverse financial, legal, academic, and other commercial settings.
This presentation describes what could be the good features, and the methods to verify a person from his hand. This uses
"Raul Sanchez-Reillo, C. Sanchez-Avila, A. Gonzalez-Marcos, Biometric identification through hand geometry measurements, IEEE Transactions on PAMI 22 (2000)" as the base.
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...IJNSA Journal
One of the most important processes used by companies to safeguard the security of information and prevent it from unauthorized access or penetration is the signature process. As businesses and individuals move into the digital age, a computerized system that can discern between genuine and faked signatures is crucial for protecting people's authorization and determining what permissions they have. In this paper, we used Pre-Trained CNN for extracts features from genuine and forged signatures, and three widely used classification algorithms, SVM (Support Vector Machine), NB (Naive Bayes) and KNN (k-nearest neighbors), these algorithms are compared to calculate the run time, classification error, classification loss, and accuracy for test-set consist of signature images (genuine and forgery). Three classifiers have been applied using (UTSig) dataset; where run time, classification error, classification loss and accuracy were calculated for each classifier in the verification phase, the results showed that the SVM and KNN got the best accuracy (76.21), while the SVM got the best run time (0.13) result among other classifiers, therefore the SVM classifier got the best result among the other classifiers in terms of our measures.
Multimodal biometric systems are those that utilize more than one physical or behavioural characteristic for enrolment , verification, or identification.
An appraisal of offline signature verification techniquesSalam Shah
Biometrics is being commonly used nowadays for the identification and verification of humans everywhere in the world. In biometrics humans unique characteristics like palm, fingerprints, iris etc. are being used. Pattern Recognition and image processing are the major areas where research on signature verification is carried out. Hand written Signature of an individual is also unique and for identification of humans are being used and accepted specially in the banking and other financial transactions. The hand written signatures due to its importance are at target of fraudulence. In this paper we have surveyed different papers on techniques that are currently used for the identification and verification of Offline signatures.
A Novel Automated Approach for Offline Signature Verification Based on Shape ...Editor IJCATR
The handwritten signature has been the most natural and long lasting authentication scheme in which a person draw some
pattern of lines or writes his name in a different style. The signature recognition and verification are a behavioural biometric and is
very challenging due to the variation that can occur in person’s signature because of age, illness, and emotional state of the person. As
far as the representation of the signature is concerned a classical technique of thinning or skeleton is mostly used. In this paper, we
proposed a new methodology for signature verification that uses structural information and original strokes instead of skeleton or
thinned version to analyse the signature and verify. The approach is based on sketching a fixed size grid over the signatures and getting
2-Dimensional unique templates which are then compared and matched to verify a query signature as genuine or forged. To compute
the similarity score between two signature’s grids, we follow template matching rule and the Signature grid’s cell are mapped and
matched with respect to position. The proposed framework is fast and highly accurate with reduce false acceptance rate and false
Offline Handwritten Signature Identification and Verification using Multi-Res...CSCJournals
In this paper, we are proposing a new method for offline (static) handwritten signature identification and verification based on Gabor wavelet transform. The whole idea is offering a simple and robust method for extracting features based on Gabor Wavelet which the dependency of the method to the nationality of signer has been reduced to its minimal. After pre-processing stage that contains noise reduction and signature image normalisation by size and rotation, a virtual grid is placed on the signature image. Gabor wavelet coefficients with different frequencies and directions are computed on each points of this grid and then fed into a classifier. The shortest weighted distance has been used as the classifier. The weight that is used as the coefficient for computing the shortest distance is based on the distribution of instances in each of signature classes. As it was pointed out earlier, one of the advantages of this system is its capability of signature identification and verification of different nationalities; thus it has been tested on four signature dataset with different nationalities including Iranian, Turkish, South African and Spanish signatures. Experimental results and the comparison of the proposed system with other systems are consistent with desirable outcomes. Despite the use of the simplest method of classification i.e. the nearest neighbour, the proposed algorithm in comparison with other algorithms has very good capabilities. Comparing the results of our system with the accuracy of human\'s identification and verification, it shows that human identification is more accurate but our proposed system has a lower error rate in verification.
Offline signature identification using high intensity variations and cross ov...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Offline handwritten signature identification using adaptive window positionin...sipij
The paper presents to address this challenge, we have proposed the use of Adaptive Window Positioning
technique which focuses on not just the meaning of the handwritten signature but also on the individuality
of the writer. This innovative technique divides the handwritten signature into 13 small windows of size nxn
(13x13). This size should be large enough to contain ample information about the style of the author and
small enough to ensure a good identification performance. The process was tested with a GPDS dataset
containing 4870 signature samples from 90 different writers by comparing the robust features of the test
signature with that of the user’s signature using an appropriate classifier. Experimental results reveal that
adaptive window positioning technique proved to be the efficient and reliable method for accurate
signature feature extraction for the identification of offline handwritten signatures .The contribution of this
technique can be used to detect signatures signed under emotional duress
A Review on Robust identity verification using signature of a personEditor IJMTER
Signature is behavioural type biometrics characteristics of human. Signature has been a
distinguishing feature for person identification. In these days increasing number of transactions,
especially related to financial and business are being authorized via signatures. Two types of
verification methods are: Offline signature verification and online signature verification. In this paper
we review various components of offline signature reorganization and verification system, feature
extraction techniques and available techniques.
Freeman Chain Code (FCC) Representation in Signature Fraud Detection Based On...CSCJournals
This paper presents a signature verification system that used Freeman Chain Code (FCC) as directional feature and data representation. There are 47 features were extracted from the signature images from six global features. Before extracting the features, the raw images were undergoing pre-processing stages which were binarization, noise removal by using media filter, cropping and thinning to produce Thinned Binary Image (TBI). Euclidean distance is measured and matched between nearest neighbours to find the result. MCYT-SignatureOff-75 database was used. Based on our experiment, the lowest FRR achieved is 6.67% and lowest FAR is 12.44% with only 1.12 second computational time from nearest neighbour classifier. The results are compared with Artificial Neural Network (ANN) classifier.
Data security and privacy are crucial issues to be addressed for assuring a successful deployment of biometrics-based recognition systems in real life applications. In this paper, we present a highly efficient and secured authentication scheme by online verification of signature. This authentication scheme is very simple and can be used for securing the applications and various elements which can be accessed and interfaced by touch panel’s inputs. This authentication scheme is very simple and can be used for securing the applications and various elements which can be accessed and interfaced by touch panel’s inputs.
OFFLINE SIGNATURE VERIFICATION SYSTEM FOR BANK CHEQUES USING ZERNIKE MOMENTS,...ijaia
Handwritten signature is the most accepted and economical means of personnel authentication. It can be
verified using online or offline schemes. This paper proposes a signature verification model by combining
Zernike moments feature with circularity and aspect ratio. Unlike characters, signatures vary each time
because of its behavioural biometric property. Signatures can be identified based on their shape. Moments
are the good translational and scale invariant shape descriptors. The amplitude and the phase of Zernike
moments, circularity and aspect ratio of the signature are the features that are extracted and combined for
the verification purpose and are fed to the Feedforward Backpropagation Neural Network. This Neural
Network classifies the signature into genuine or forged. Experimental results reveal that this methodology
of combining zernike moments along with the two mentioned geometrical properties give higher accuracy
than using them individually. The combination of these feature vector yields a mean accuracy of 95.83%.
When this approach is compared with the literature, it proves to be more effective.
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEMAM Publications
Signature verification is amongst the first few biometrics to be used for verification and one of the natural
ways of authenticating a person’s identity. The user introduces into the computer the scanned images of the signature,
then after image enhancement and reduction of noise of the image. Followed by feature extraction and neural network
training images of signature are verified. Yet now thousands of financial and business transactions are being
authorized via signatures. Therefore an automatic signature verification system is needed. This paper represents a brief
review on various approaches based on different datasets, features and training techniques used for verification.
An offline signature verification using pixels intensity levelsSalam Shah
Offline signature recognition has great importance in our day to day activities. Researchers are trying to use them as biometric identification in various areas like banks, security systems and for other identification purposes. Fingerprints, iris, thumb impression and face detection based biometrics are successfully used for identification of individuals because of their static nature. However, people’s signatures show variability that makes it difficult to recognize the original signatures correctly and to use them as biometrics. The handwritten signatures have importance in banks for cheque, credit card processing, legal and financial transactions, and the signatures are the main target of fraudulence. To deal with complex signatures, there should be a robust signature verification method in places such as banks that can correctly classify the signatures into genuine or forgery to avoid financial frauds. This paper, presents a pixels intensity level based offline signature verification model for the correct classification of signatures. To achieve the target, three statistical classifiers; Decision Tree (J48), probability based Naïve Bayes (NB tree) and Euclidean distance based k-Nearest Neighbor (IBk), are used.
For comparison of the accuracy rates of offline signatures with online signatures, three classifiers were applied on online signature database and achieved a 99.90% accuracy rate with decision tree (J48), 99.82% with Naïve Bayes Tree and 98.11% with K-Nearest Neighbor (with 10 fold cross validation). The results of offline signatures were 64.97% accuracy rate with decision tree (J48), 76.16% with Naïve Bayes Tree and 91.91% with k-Nearest Neighbor (IBk) (without forgeries). The accuracy rate dropped with the inclusion of forgery signatures as, 55.63% accuracy rate with decision tree (J48), 67.02% with Naïve Bayes Tree and 88.12% (with forgeries).
Offline Signature Verification Using Local Radon Transform and Support Vector...CSCJournals
In this paper, we propose a new method for signature verification using local Radon Transform. The proposed method uses Radon Transform locally as feature extractor and Support Vector Machine (SVM) as classifier. The main idea of our method is using Radon Transform locally for line segments detection and feature extraction, against using it globally. The advantages of the proposed method are robustness to noise, size invariance and shift invariance. Having used a dataset of 600 signatures from 20 Persian writers, and another dataset of 924 signatures from 22 English writers, our system achieves good results. The experimental results of our method are compared with two other methods. This comparison shows that our method has good performance for signature identification and verification in different cultures.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
ML for identifying fraud using open blockchain data.pptx
Offline signature verification based on geometric feature extraction using artificial neural network
1. Offline Signature Verification
Based on
Geometric Feature Extraction
using -Artificial Neural Network
Guided by:
Ms. Lima Sebastian
Assistant Professor
CSE Dept. AISAT
Submitted by:
Cen Paul
S7 CSE
13027323
2. Overview
• Introduction
• Types of Signature Forgeries
• Workflow of the System
• Experimental Results
• Conclusion
• References
2
3. Introduction
• For centuries, handwritten signatures have been an integral part of validating
business transactions , contracts and agreements.
• Among the different forms of biometric recognition systems such as
fingerprint, iris, face, voice, palm etc. , Handwritten signature is the most
widely used.
• In the era of advanced technology, security is the vital issue to avoid fakes
and forgeries.
• The signature verification is classified into online systems and offline
systems.
• The signature verification systems help to discriminate between the original
and fake signatures.
3
4. Types of Signature Forgeries
1. Random Forgery
2. Simple Forgery
3. Skilled Forgery
4
6. Workflow of Signature Verification
1. Data Acquisition
2. Preprocessing
3. Feature Extraction
4. Verification/Comparison
Input Data
Data
Preprocessing
Feature
Extraction
Comparison/
Verification
Forged or
Genuine?
6
7. 1. Data Acquisition
• Signatures from individual person are taken on paper and then scanned with
scanner.
• The database contains data from individuals, including genuine signatures
and forgeries signatures.
• Signatures will be stored as images.
7
8. 2. Preprocessing [1/4]
• Preprocessing is done for noise removal.
• Preprocessing stage includes :
i. RGB to gray scale conversion
ii. Binarization
iii. Cropping
8
9. Preprocessing [2/4]
i. RGB to gray scale conversion
RGB image of scanned signature is converted into gray scale intensity signature
image to eliminate the hue and saturation information while retaining the
luminance.
RGB to Gray-scale Conversion
9
10. Preprocessing [3/4]
ii. Binarization
A gray scale signature image is converted into binary image to count the number
of black pixels which make feature extraction simpler
Binarization
1
0
11. Preprocessing [4/4]
iii.Cropping
Cropping the binary image using the boundary-values returned by bounding box
calculation method. This reduces the area of signature to be used for further
processing.
Cropping
11
12. 3. Feature Extraction [1/4]
• To extract the feature of signature image using six global features.
• The extracted features of a signature image are based on geometrical
features like size and shape.
• Features used in this system :
i. Area
ii. Centroid
iii. Standard Deviation
iv. Skewness
v. Kurtosis
vi. Even-Pixels 12
13. Feature Extraction [2/4]
i. Area
Total number of black pixels present in the binary image.
ii. Centroid
It denotes to the center point of vertical and horizontal of the signature.
13
14. Feature Extraction [3/4]
iii.Standard Deviation
It measures the amount of variation or dispersion on a set of mean data
values. If deviation is closed to the mean data value then the variation is less
otherwise spread over a wider range of values.
iv.Skewness
It measure the asymmetricity of the probability distribution of a real
valued random variable having positive, negative or may have undefined
value.
14
15. Feature Extraction [4/4]
v. Kurtosis
Higher value of kurtosis distribution indicates thicker tails, longer and a
sharper peak whereas lower value denotes shorter, thinner tails.
In Image processing kurtosis values are illustrated in combination with
resolution and noise measurement. In which high kurtosis values gives low
noise and low resolution.
vi. Even Pixels
The positions in the image matrix. Even position refers those matrix
positions for which both the coordinates are even .
15
16. 4. Verification
• The geometric feature are extracted and organised as an input array to the back
propagation network.
• The selected feature vectors are directed as input to the neural network.
• The trained neural network is used to verify the signature as either genuine or
forged.
• If the signature is match then it shows genuine otherwise forgery
16
17. Experimental Results [1/4]
A. Database
• The signature database is collected from MCYT-75 offline signature corpus
database.
• 15 genuine and 15 forgery signature samples are given for each of 75 users in
database.
• The forgery signature in the database is the mixture of random, simple and
skilled forgeries.
17
18. Experimental Results [2/4]
B. Performance Measures
• The performance measure of the signature verification is measured in terms of
false rejection rate (FRR) and false acceptance rate (FAR).
• False acceptance occurs when forgeries signatures are accepted as genuine
while in case of false rejection genuine signature are accepted as forgery.
18
19. Experimental Results [3/4]
• Accuracy of the system is the mean between percentage of genuine signatures
verified as genuine and percentage of forgery signature is verified as forgery.
19
20. Experimental Results [4/4]
C. Results
• Experiments were conducted on 18 different users. Each having 15 genuine
and 15 forgery signatures.
• Total number of 540 signature is taken each having dimension of 850 360
pixels.
20
21. CONCLUSION
• Explored the application of geometric based feature extraction on offline
signature verification.
• The performance of the proposed method is examined using Back
propagation learning technique.
• Total accuracy obtained using the proposed method comes out to be above
89.24% .
2
1
22. References
• Subhash Chandra , Sushila Maheskar . Offline signature verification based on
geometric feature extraction using artificial neural network .3rd Int’l Conf. on
Recent Advances in Information Technology RAIT-2016 .
• Mujahed Jarad, Nijad Al-Najdawi, and Sara Tedmori. Offline handwritten
signature verification system using a supervised neural network approach. In
Computer Science and Information Technology (CSIT), 2014 6th
International Conference on, pages 189–195. IEEE, 2014.
• R. Dubey and D. K. Agrawal, “Comparative analysis of off-line signature
recognition,” 2012 International Conference on Communication, Information
& Computing Technology (ICCICT), pp. 1–6, Oct. 2012.
22