SlideShare a Scribd company logo
Offline Signature Verification
Based on
Geometric Feature Extraction
using -Artificial Neural Network
Guided by:
Ms. Lima Sebastian
Assistant Professor
CSE Dept. AISAT
Submitted by:
Cen Paul
S7 CSE
13027323
Overview
• Introduction
• Types of Signature Forgeries
• Workflow of the System
• Experimental Results
• Conclusion
• References
2
Introduction
• For centuries, handwritten signatures have been an integral part of validating
business transactions , contracts and agreements.
• Among the different forms of biometric recognition systems such as
fingerprint, iris, face, voice, palm etc. , Handwritten signature is the most
widely used.
• In the era of advanced technology, security is the vital issue to avoid fakes
and forgeries.
• The signature verification is classified into online systems and offline
systems.
• The signature verification systems help to discriminate between the original
and fake signatures.
3
Types of Signature Forgeries
1. Random Forgery
2. Simple Forgery
3. Skilled Forgery
4
Block Diagram
Offline Signature
Verification System
5
5
Workflow of Signature Verification
1. Data Acquisition
2. Preprocessing
3. Feature Extraction
4. Verification/Comparison
Input Data
Data
Preprocessing
Feature
Extraction
Comparison/
Verification
Forged or
Genuine?
6
1. Data Acquisition
• Signatures from individual person are taken on paper and then scanned with
scanner.
• The database contains data from individuals, including genuine signatures
and forgeries signatures.
• Signatures will be stored as images.
7
2. Preprocessing [1/4]
• Preprocessing is done for noise removal.
• Preprocessing stage includes :
i. RGB to gray scale conversion
ii. Binarization
iii. Cropping
8
Preprocessing [2/4]
i. RGB to gray scale conversion
RGB image of scanned signature is converted into gray scale intensity signature
image to eliminate the hue and saturation information while retaining the
luminance.
RGB to Gray-scale Conversion
9
Preprocessing [3/4]
ii. Binarization
A gray scale signature image is converted into binary image to count the number
of black pixels which make feature extraction simpler
Binarization
1
0
Preprocessing [4/4]
iii.Cropping
Cropping the binary image using the boundary-values returned by bounding box
calculation method. This reduces the area of signature to be used for further
processing.
Cropping
11
3. Feature Extraction [1/4]
• To extract the feature of signature image using six global features.
• The extracted features of a signature image are based on geometrical
features like size and shape.
• Features used in this system :
i. Area
ii. Centroid
iii. Standard Deviation
iv. Skewness
v. Kurtosis
vi. Even-Pixels 12
Feature Extraction [2/4]
i. Area
Total number of black pixels present in the binary image.
ii. Centroid
It denotes to the center point of vertical and horizontal of the signature.
13
Feature Extraction [3/4]
iii.Standard Deviation
It measures the amount of variation or dispersion on a set of mean data
values. If deviation is closed to the mean data value then the variation is less
otherwise spread over a wider range of values.
iv.Skewness
It measure the asymmetricity of the probability distribution of a real
valued random variable having positive, negative or may have undefined
value.
14
Feature Extraction [4/4]
v. Kurtosis
Higher value of kurtosis distribution indicates thicker tails, longer and a
sharper peak whereas lower value denotes shorter, thinner tails.
In Image processing kurtosis values are illustrated in combination with
resolution and noise measurement. In which high kurtosis values gives low
noise and low resolution.
vi. Even Pixels
The positions in the image matrix. Even position refers those matrix
positions for which both the coordinates are even .
15
4. Verification
• The geometric feature are extracted and organised as an input array to the back
propagation network.
• The selected feature vectors are directed as input to the neural network.
• The trained neural network is used to verify the signature as either genuine or
forged.
• If the signature is match then it shows genuine otherwise forgery
16
Experimental Results [1/4]
A. Database
• The signature database is collected from MCYT-75 offline signature corpus
database.
• 15 genuine and 15 forgery signature samples are given for each of 75 users in
database.
• The forgery signature in the database is the mixture of random, simple and
skilled forgeries.
17
Experimental Results [2/4]
B. Performance Measures
• The performance measure of the signature verification is measured in terms of
false rejection rate (FRR) and false acceptance rate (FAR).
• False acceptance occurs when forgeries signatures are accepted as genuine
while in case of false rejection genuine signature are accepted as forgery.
18
Experimental Results [3/4]
• Accuracy of the system is the mean between percentage of genuine signatures
verified as genuine and percentage of forgery signature is verified as forgery.
19
Experimental Results [4/4]
C. Results
• Experiments were conducted on 18 different users. Each having 15 genuine
and 15 forgery signatures.
• Total number of 540 signature is taken each having dimension of 850 360
pixels.
20
CONCLUSION
• Explored the application of geometric based feature extraction on offline
signature verification.
• The performance of the proposed method is examined using Back
propagation learning technique.
• Total accuracy obtained using the proposed method comes out to be above
89.24% .
2
1
References
• Subhash Chandra , Sushila Maheskar . Offline signature verification based on
geometric feature extraction using artificial neural network .3rd Int’l Conf. on
Recent Advances in Information Technology RAIT-2016 .
• Mujahed Jarad, Nijad Al-Najdawi, and Sara Tedmori. Offline handwritten
signature verification system using a supervised neural network approach. In
Computer Science and Information Technology (CSIT), 2014 6th
International Conference on, pages 189–195. IEEE, 2014.
• R. Dubey and D. K. Agrawal, “Comparative analysis of off-line signature
recognition,” 2012 International Conference on Communication, Information
& Computing Technology (ICCICT), pp. 1–6, Oct. 2012.
22
THANKYOU !!
23

More Related Content

What's hot

A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniques
Subhash Basistha
 
Handwritten Signature Verification using Artificial Neural Network
Handwritten Signature Verification using Artificial Neural NetworkHandwritten Signature Verification using Artificial Neural Network
Handwritten Signature Verification using Artificial Neural Network
Editor IJMTER
 
CNN based Handwritten Signature Recognition
CNN based Handwritten Signature RecognitionCNN based Handwritten Signature Recognition
CNN based Handwritten Signature Recognition
Suresh Pokharel
 
Face recognization
Face recognizationFace recognization
Face recognization
leenak770
 
Signature verification
Signature verificationSignature verification
Signature verification
NAVEEN TOKAS
 
Sign verification
Sign verificationSign verification
Sign verification
projectseven1222
 
Bio-metric Gait Recognition
Bio-metric Gait Recognition Bio-metric Gait Recognition
Bio-metric Gait Recognition
Usman Siddique
 
Handwritten character recognition using artificial neural network
Handwritten character recognition using artificial neural networkHandwritten character recognition using artificial neural network
Handwritten character recognition using artificial neural network
Harshana Madusanka Jayamaha
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system pptsNimisha_Goel
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition pptSantosh Kumar
 
Hand geometry recognition
Hand geometry recognitionHand geometry recognition
Hand geometry recognition
Dheerendra k
 
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...
IJNSA Journal
 
Iris recognition
Iris recognitionIris recognition
Iris recognition
shyamalaramesh2
 
Online signature recognition
Online signature recognitionOnline signature recognition
Online signature recognitionPiyush Mittal
 
Multi modal biometric system
Multi modal biometric systemMulti modal biometric system
Multi modal biometric system
Aalaa Khattab
 
Biometric Systems
Biometric SystemsBiometric Systems
Biometric Systems
Sn Moddho
 
face recognition
face recognitionface recognition
face recognition
vipin varghese
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
varsha mohite
 

What's hot (20)

A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniques
 
Handwritten Signature Verification using Artificial Neural Network
Handwritten Signature Verification using Artificial Neural NetworkHandwritten Signature Verification using Artificial Neural Network
Handwritten Signature Verification using Artificial Neural Network
 
CNN based Handwritten Signature Recognition
CNN based Handwritten Signature RecognitionCNN based Handwritten Signature Recognition
CNN based Handwritten Signature Recognition
 
Face recognization
Face recognizationFace recognization
Face recognization
 
Signature verification
Signature verificationSignature verification
Signature verification
 
Sign verification
Sign verificationSign verification
Sign verification
 
Bio-metric Gait Recognition
Bio-metric Gait Recognition Bio-metric Gait Recognition
Bio-metric Gait Recognition
 
Handwritten character recognition using artificial neural network
Handwritten character recognition using artificial neural networkHandwritten character recognition using artificial neural network
Handwritten character recognition using artificial neural network
 
Biometric authentication
Biometric authenticationBiometric authentication
Biometric authentication
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system ppts
 
Iris Recognition
Iris RecognitionIris Recognition
Iris Recognition
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
 
Hand geometry recognition
Hand geometry recognitionHand geometry recognition
Hand geometry recognition
 
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...
 
Iris recognition
Iris recognitionIris recognition
Iris recognition
 
Online signature recognition
Online signature recognitionOnline signature recognition
Online signature recognition
 
Multi modal biometric system
Multi modal biometric systemMulti modal biometric system
Multi modal biometric system
 
Biometric Systems
Biometric SystemsBiometric Systems
Biometric Systems
 
face recognition
face recognitionface recognition
face recognition
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 

Viewers also liked

An appraisal of offline signature verification techniques
An appraisal of offline signature verification techniquesAn appraisal of offline signature verification techniques
An appraisal of offline signature verification techniques
Salam Shah
 
A Novel Automated Approach for Offline Signature Verification Based on Shape ...
A Novel Automated Approach for Offline Signature Verification Based on Shape ...A Novel Automated Approach for Offline Signature Verification Based on Shape ...
A Novel Automated Approach for Offline Signature Verification Based on Shape ...
Editor IJCATR
 
Offline Handwritten Signature Identification and Verification using Multi-Res...
Offline Handwritten Signature Identification and Verification using Multi-Res...Offline Handwritten Signature Identification and Verification using Multi-Res...
Offline Handwritten Signature Identification and Verification using Multi-Res...
CSCJournals
 
Emotion based music player
Emotion based music playerEmotion based music player
Emotion based music player
Nizam Muhammed
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
Vikrant Arya
 
Features image processing and Extaction
Features image processing and ExtactionFeatures image processing and Extaction
Features image processing and Extaction
Ali A Jalil
 
Feature Extraction
Feature ExtractionFeature Extraction
Feature Extraction
Revathi Krishnan
 
Feature Extraction
Feature ExtractionFeature Extraction
Feature Extractionskylian
 
Image feature extraction
Image feature extractionImage feature extraction
Image feature extractionRushin Shah
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
rejii
 
Gesture recognition technology
Gesture recognition technology Gesture recognition technology
Gesture recognition technology
Nagamani Gurram
 
Data leakage detection Complete Seminar
Data leakage detection Complete SeminarData leakage detection Complete Seminar
Data leakage detection Complete Seminar
Sumit Thakur
 
Hand Written Character Recognition Using Neural Networks
Hand Written Character Recognition Using Neural Networks Hand Written Character Recognition Using Neural Networks
Hand Written Character Recognition Using Neural Networks Chiranjeevi Adi
 

Viewers also liked (13)

An appraisal of offline signature verification techniques
An appraisal of offline signature verification techniquesAn appraisal of offline signature verification techniques
An appraisal of offline signature verification techniques
 
A Novel Automated Approach for Offline Signature Verification Based on Shape ...
A Novel Automated Approach for Offline Signature Verification Based on Shape ...A Novel Automated Approach for Offline Signature Verification Based on Shape ...
A Novel Automated Approach for Offline Signature Verification Based on Shape ...
 
Offline Handwritten Signature Identification and Verification using Multi-Res...
Offline Handwritten Signature Identification and Verification using Multi-Res...Offline Handwritten Signature Identification and Verification using Multi-Res...
Offline Handwritten Signature Identification and Verification using Multi-Res...
 
Emotion based music player
Emotion based music playerEmotion based music player
Emotion based music player
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
Features image processing and Extaction
Features image processing and ExtactionFeatures image processing and Extaction
Features image processing and Extaction
 
Feature Extraction
Feature ExtractionFeature Extraction
Feature Extraction
 
Feature Extraction
Feature ExtractionFeature Extraction
Feature Extraction
 
Image feature extraction
Image feature extractionImage feature extraction
Image feature extraction
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
Gesture recognition technology
Gesture recognition technology Gesture recognition technology
Gesture recognition technology
 
Data leakage detection Complete Seminar
Data leakage detection Complete SeminarData leakage detection Complete Seminar
Data leakage detection Complete Seminar
 
Hand Written Character Recognition Using Neural Networks
Hand Written Character Recognition Using Neural Networks Hand Written Character Recognition Using Neural Networks
Hand Written Character Recognition Using Neural Networks
 

Similar to Offline signature verification based on geometric feature extraction using artificial neural network

Ganesan dhawanrpt
Ganesan dhawanrptGanesan dhawanrpt
Ganesan dhawanrpt
pramod naik
 
Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...
eSAT Publishing House
 
OSPCV: Off-line Signature Verification using Principal Component Variances
OSPCV: Off-line Signature Verification using Principal Component VariancesOSPCV: Off-line Signature Verification using Principal Component Variances
OSPCV: Off-line Signature Verification using Principal Component Variances
IOSR Journals
 
B017150823
B017150823B017150823
B017150823
IOSR Journals
 
Offline handwritten signature identification using adaptive window positionin...
Offline handwritten signature identification using adaptive window positionin...Offline handwritten signature identification using adaptive window positionin...
Offline handwritten signature identification using adaptive window positionin...
sipij
 
A Review on Robust identity verification using signature of a person
A Review on Robust identity verification using signature of a personA Review on Robust identity verification using signature of a person
A Review on Robust identity verification using signature of a person
Editor IJMTER
 
Freeman Chain Code (FCC) Representation in Signature Fraud Detection Based On...
Freeman Chain Code (FCC) Representation in Signature Fraud Detection Based On...Freeman Chain Code (FCC) Representation in Signature Fraud Detection Based On...
Freeman Chain Code (FCC) Representation in Signature Fraud Detection Based On...
CSCJournals
 
Signature Verification System using CNN & SNN
Signature Verification System using CNN & SNNSignature Verification System using CNN & SNN
Signature Verification System using CNN & SNN
IRJET Journal
 
ONLINE SIGNATURE BASED APPLICATION LOCKING SYSTEM
ONLINE SIGNATURE BASED APPLICATION LOCKING SYSTEMONLINE SIGNATURE BASED APPLICATION LOCKING SYSTEM
ONLINE SIGNATURE BASED APPLICATION LOCKING SYSTEM
Journal For Research
 
OFFLINE SIGNATURE VERIFICATION SYSTEM FOR BANK CHEQUES USING ZERNIKE MOMENTS,...
OFFLINE SIGNATURE VERIFICATION SYSTEM FOR BANK CHEQUES USING ZERNIKE MOMENTS,...OFFLINE SIGNATURE VERIFICATION SYSTEM FOR BANK CHEQUES USING ZERNIKE MOMENTS,...
OFFLINE SIGNATURE VERIFICATION SYSTEM FOR BANK CHEQUES USING ZERNIKE MOMENTS,...
ijaia
 
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEMRELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
AM Publications
 
smart attendance system using signature verification 1.pptx
smart attendance system using signature verification 1.pptxsmart attendance system using signature verification 1.pptx
smart attendance system using signature verification 1.pptx
ChinmayakumarMohanty2
 
Artificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification SystemArtificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification System
IRJET Journal
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
SARATHGOVINDKK
 
An offline signature verification using pixels intensity levels
An offline signature verification using pixels intensity levelsAn offline signature verification using pixels intensity levels
An offline signature verification using pixels intensity levels
Salam Shah
 
Offline Signature Verification Using Local Radon Transform and Support Vector...
Offline Signature Verification Using Local Radon Transform and Support Vector...Offline Signature Verification Using Local Radon Transform and Support Vector...
Offline Signature Verification Using Local Radon Transform and Support Vector...
CSCJournals
 
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET Journal
 
Pattern recognition on line signature
Pattern recognition on line signaturePattern recognition on line signature
Pattern recognition on line signature
Mazin Alwaaly
 
K012647982
K012647982K012647982
K012647982
IOSR Journals
 
K012647982
K012647982K012647982
K012647982
IOSR Journals
 

Similar to Offline signature verification based on geometric feature extraction using artificial neural network (20)

Ganesan dhawanrpt
Ganesan dhawanrptGanesan dhawanrpt
Ganesan dhawanrpt
 
Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...
 
OSPCV: Off-line Signature Verification using Principal Component Variances
OSPCV: Off-line Signature Verification using Principal Component VariancesOSPCV: Off-line Signature Verification using Principal Component Variances
OSPCV: Off-line Signature Verification using Principal Component Variances
 
B017150823
B017150823B017150823
B017150823
 
Offline handwritten signature identification using adaptive window positionin...
Offline handwritten signature identification using adaptive window positionin...Offline handwritten signature identification using adaptive window positionin...
Offline handwritten signature identification using adaptive window positionin...
 
A Review on Robust identity verification using signature of a person
A Review on Robust identity verification using signature of a personA Review on Robust identity verification using signature of a person
A Review on Robust identity verification using signature of a person
 
Freeman Chain Code (FCC) Representation in Signature Fraud Detection Based On...
Freeman Chain Code (FCC) Representation in Signature Fraud Detection Based On...Freeman Chain Code (FCC) Representation in Signature Fraud Detection Based On...
Freeman Chain Code (FCC) Representation in Signature Fraud Detection Based On...
 
Signature Verification System using CNN & SNN
Signature Verification System using CNN & SNNSignature Verification System using CNN & SNN
Signature Verification System using CNN & SNN
 
ONLINE SIGNATURE BASED APPLICATION LOCKING SYSTEM
ONLINE SIGNATURE BASED APPLICATION LOCKING SYSTEMONLINE SIGNATURE BASED APPLICATION LOCKING SYSTEM
ONLINE SIGNATURE BASED APPLICATION LOCKING SYSTEM
 
OFFLINE SIGNATURE VERIFICATION SYSTEM FOR BANK CHEQUES USING ZERNIKE MOMENTS,...
OFFLINE SIGNATURE VERIFICATION SYSTEM FOR BANK CHEQUES USING ZERNIKE MOMENTS,...OFFLINE SIGNATURE VERIFICATION SYSTEM FOR BANK CHEQUES USING ZERNIKE MOMENTS,...
OFFLINE SIGNATURE VERIFICATION SYSTEM FOR BANK CHEQUES USING ZERNIKE MOMENTS,...
 
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEMRELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
 
smart attendance system using signature verification 1.pptx
smart attendance system using signature verification 1.pptxsmart attendance system using signature verification 1.pptx
smart attendance system using signature verification 1.pptx
 
Artificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification SystemArtificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification System
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
An offline signature verification using pixels intensity levels
An offline signature verification using pixels intensity levelsAn offline signature verification using pixels intensity levels
An offline signature verification using pixels intensity levels
 
Offline Signature Verification Using Local Radon Transform and Support Vector...
Offline Signature Verification Using Local Radon Transform and Support Vector...Offline Signature Verification Using Local Radon Transform and Support Vector...
Offline Signature Verification Using Local Radon Transform and Support Vector...
 
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
 
Pattern recognition on line signature
Pattern recognition on line signaturePattern recognition on line signature
Pattern recognition on line signature
 
K012647982
K012647982K012647982
K012647982
 
K012647982
K012647982K012647982
K012647982
 

Recently uploaded

ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
SupreethSP4
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
ongomchris
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 

Recently uploaded (20)

ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 

Offline signature verification based on geometric feature extraction using artificial neural network

  • 1. Offline Signature Verification Based on Geometric Feature Extraction using -Artificial Neural Network Guided by: Ms. Lima Sebastian Assistant Professor CSE Dept. AISAT Submitted by: Cen Paul S7 CSE 13027323
  • 2. Overview • Introduction • Types of Signature Forgeries • Workflow of the System • Experimental Results • Conclusion • References 2
  • 3. Introduction • For centuries, handwritten signatures have been an integral part of validating business transactions , contracts and agreements. • Among the different forms of biometric recognition systems such as fingerprint, iris, face, voice, palm etc. , Handwritten signature is the most widely used. • In the era of advanced technology, security is the vital issue to avoid fakes and forgeries. • The signature verification is classified into online systems and offline systems. • The signature verification systems help to discriminate between the original and fake signatures. 3
  • 4. Types of Signature Forgeries 1. Random Forgery 2. Simple Forgery 3. Skilled Forgery 4
  • 6. Workflow of Signature Verification 1. Data Acquisition 2. Preprocessing 3. Feature Extraction 4. Verification/Comparison Input Data Data Preprocessing Feature Extraction Comparison/ Verification Forged or Genuine? 6
  • 7. 1. Data Acquisition • Signatures from individual person are taken on paper and then scanned with scanner. • The database contains data from individuals, including genuine signatures and forgeries signatures. • Signatures will be stored as images. 7
  • 8. 2. Preprocessing [1/4] • Preprocessing is done for noise removal. • Preprocessing stage includes : i. RGB to gray scale conversion ii. Binarization iii. Cropping 8
  • 9. Preprocessing [2/4] i. RGB to gray scale conversion RGB image of scanned signature is converted into gray scale intensity signature image to eliminate the hue and saturation information while retaining the luminance. RGB to Gray-scale Conversion 9
  • 10. Preprocessing [3/4] ii. Binarization A gray scale signature image is converted into binary image to count the number of black pixels which make feature extraction simpler Binarization 1 0
  • 11. Preprocessing [4/4] iii.Cropping Cropping the binary image using the boundary-values returned by bounding box calculation method. This reduces the area of signature to be used for further processing. Cropping 11
  • 12. 3. Feature Extraction [1/4] • To extract the feature of signature image using six global features. • The extracted features of a signature image are based on geometrical features like size and shape. • Features used in this system : i. Area ii. Centroid iii. Standard Deviation iv. Skewness v. Kurtosis vi. Even-Pixels 12
  • 13. Feature Extraction [2/4] i. Area Total number of black pixels present in the binary image. ii. Centroid It denotes to the center point of vertical and horizontal of the signature. 13
  • 14. Feature Extraction [3/4] iii.Standard Deviation It measures the amount of variation or dispersion on a set of mean data values. If deviation is closed to the mean data value then the variation is less otherwise spread over a wider range of values. iv.Skewness It measure the asymmetricity of the probability distribution of a real valued random variable having positive, negative or may have undefined value. 14
  • 15. Feature Extraction [4/4] v. Kurtosis Higher value of kurtosis distribution indicates thicker tails, longer and a sharper peak whereas lower value denotes shorter, thinner tails. In Image processing kurtosis values are illustrated in combination with resolution and noise measurement. In which high kurtosis values gives low noise and low resolution. vi. Even Pixels The positions in the image matrix. Even position refers those matrix positions for which both the coordinates are even . 15
  • 16. 4. Verification • The geometric feature are extracted and organised as an input array to the back propagation network. • The selected feature vectors are directed as input to the neural network. • The trained neural network is used to verify the signature as either genuine or forged. • If the signature is match then it shows genuine otherwise forgery 16
  • 17. Experimental Results [1/4] A. Database • The signature database is collected from MCYT-75 offline signature corpus database. • 15 genuine and 15 forgery signature samples are given for each of 75 users in database. • The forgery signature in the database is the mixture of random, simple and skilled forgeries. 17
  • 18. Experimental Results [2/4] B. Performance Measures • The performance measure of the signature verification is measured in terms of false rejection rate (FRR) and false acceptance rate (FAR). • False acceptance occurs when forgeries signatures are accepted as genuine while in case of false rejection genuine signature are accepted as forgery. 18
  • 19. Experimental Results [3/4] • Accuracy of the system is the mean between percentage of genuine signatures verified as genuine and percentage of forgery signature is verified as forgery. 19
  • 20. Experimental Results [4/4] C. Results • Experiments were conducted on 18 different users. Each having 15 genuine and 15 forgery signatures. • Total number of 540 signature is taken each having dimension of 850 360 pixels. 20
  • 21. CONCLUSION • Explored the application of geometric based feature extraction on offline signature verification. • The performance of the proposed method is examined using Back propagation learning technique. • Total accuracy obtained using the proposed method comes out to be above 89.24% . 2 1
  • 22. References • Subhash Chandra , Sushila Maheskar . Offline signature verification based on geometric feature extraction using artificial neural network .3rd Int’l Conf. on Recent Advances in Information Technology RAIT-2016 . • Mujahed Jarad, Nijad Al-Najdawi, and Sara Tedmori. Offline handwritten signature verification system using a supervised neural network approach. In Computer Science and Information Technology (CSIT), 2014 6th International Conference on, pages 189–195. IEEE, 2014. • R. Dubey and D. K. Agrawal, “Comparative analysis of off-line signature recognition,” 2012 International Conference on Communication, Information & Computing Technology (ICCICT), pp. 1–6, Oct. 2012. 22