This slide proposed a method to authenticate a signature in off-line. Our proposed method uses "Harris Corner Detector", "Orientation Assignment" , "KNN Classifier", "Hungarian Algorithm".
An offline signature recognition and verification system based on neural networkeSAT Journals
Abstract Various techniques are already introduced for personal identification and verification based on different types of biometrics which can be physiological or behavioral. Signatures lies in the category of behavioral biometric which can distort or changed with course of time. Signatures are considered to be most promising authentication method in all legal and financial documents. It is necessary to verify signers and their respective signatures. This paper presents an Offline Signature recognition and verification system(SRVS). In this system signature database of signature images is created, followed by image preprocessing, feature extraction, neural network design and training, and classification of signature as genuine or counterfeit. Keywords: biometrics, neural network design, feature extraction, classification etc.
Fraud Detection Using Signature RecognitionTejraj Thakor
The signature of person is an important bio metric of a human being which can be used to authenticate human identity. The problem arises when someone decide to imitate our signature and steal our identity.
The Image of human signature is collected by camera of mobile phone which can extract dynamic and spatial information of the signature based on Image processing techniques like Convert to gray scale, Noise Removal, Normalization, Border Elimination and Feature Extraction techniques.
The signature matching is depending on SVM. The SVM classifier is trained with sample images in database obtained from those individuals whose signatures have to be authenticated by the system. In our proposed system SQLite database as a back-end and Android platform as a front-end.
Authentication of a person is the major concern in this era for security purposes. In biometric systems Signature is one of the behavioural features used for the authentication purpose. In this paper we work on the offline signature collected through different persons. Morphological operations are applied on these signature images with Hough transform to determine regular shape which assists in authentication process. The values extracted from this Hough space is used in the feed forward neural network which is trained using back-propagation algorithm. After the different training stages efficiency found above more than 95%. Application of this system will be in the security concerned fields, in the defence security, biometric authentication, as biometric computer protection or as method of the analysis of person’s behaviour changes.
"Attendance Management System bridges the effective communication between students, teachers, and parents by keep them notified about their wards' attendance via Email or SMS.
A.T.S.I. offers best biometric attendance management system, face recognition attendance system, fingerprint based attendance system, and RFID based attendance system and gives flexibility to institutions to choose the suitable system for them."
An offline signature recognition and verification system based on neural networkeSAT Journals
Abstract Various techniques are already introduced for personal identification and verification based on different types of biometrics which can be physiological or behavioral. Signatures lies in the category of behavioral biometric which can distort or changed with course of time. Signatures are considered to be most promising authentication method in all legal and financial documents. It is necessary to verify signers and their respective signatures. This paper presents an Offline Signature recognition and verification system(SRVS). In this system signature database of signature images is created, followed by image preprocessing, feature extraction, neural network design and training, and classification of signature as genuine or counterfeit. Keywords: biometrics, neural network design, feature extraction, classification etc.
Fraud Detection Using Signature RecognitionTejraj Thakor
The signature of person is an important bio metric of a human being which can be used to authenticate human identity. The problem arises when someone decide to imitate our signature and steal our identity.
The Image of human signature is collected by camera of mobile phone which can extract dynamic and spatial information of the signature based on Image processing techniques like Convert to gray scale, Noise Removal, Normalization, Border Elimination and Feature Extraction techniques.
The signature matching is depending on SVM. The SVM classifier is trained with sample images in database obtained from those individuals whose signatures have to be authenticated by the system. In our proposed system SQLite database as a back-end and Android platform as a front-end.
Authentication of a person is the major concern in this era for security purposes. In biometric systems Signature is one of the behavioural features used for the authentication purpose. In this paper we work on the offline signature collected through different persons. Morphological operations are applied on these signature images with Hough transform to determine regular shape which assists in authentication process. The values extracted from this Hough space is used in the feed forward neural network which is trained using back-propagation algorithm. After the different training stages efficiency found above more than 95%. Application of this system will be in the security concerned fields, in the defence security, biometric authentication, as biometric computer protection or as method of the analysis of person’s behaviour changes.
"Attendance Management System bridges the effective communication between students, teachers, and parents by keep them notified about their wards' attendance via Email or SMS.
A.T.S.I. offers best biometric attendance management system, face recognition attendance system, fingerprint based attendance system, and RFID based attendance system and gives flexibility to institutions to choose the suitable system for them."
Automatic Attendance system using Facial RecognitionNikyaa7
It is a boimetric based App,which is gradually evolving in the universal boimetric solution with a virtually zero effort from the user end when compared with other boimetric options.
This documentation provides a brief insight of face recognition based attendance system using neural networks in terms of product architecture which can be used for educational purpose.
High protection ATM system with fingerprint identification technologyAlfred Oboi
This project was carried out at the College of Engineering, Design, Art and Technology, Makerere university Kampala Uganda
The main objective of this project was to come up with a more secure ATM system that will reduce on the ATM fraud.
A CASE Lab Report - Project File on "ATM - Banking System"joyousbharat
A CASE Lab Report - Project File on "ATM - Banking System"
The software to be designed will control a simulated automated teller machine
(ATM) having a magnetic stripe reader for reading an ATM card, a keyboard and
display for interaction with the customer, a slot for depositing envelopes, a
dispenser for cash (in multiples of $20), a printer for printing customer receipts, and
a key-operated switch to allow an operator to start or stop the machine. The ATM
will communicate with the bank's computer over an appropriate communication
link. (The software on the latter is not part of the requirements for this problem.)
Automatic Attendance system using Facial RecognitionNikyaa7
It is a boimetric based App,which is gradually evolving in the universal boimetric solution with a virtually zero effort from the user end when compared with other boimetric options.
This documentation provides a brief insight of face recognition based attendance system using neural networks in terms of product architecture which can be used for educational purpose.
High protection ATM system with fingerprint identification technologyAlfred Oboi
This project was carried out at the College of Engineering, Design, Art and Technology, Makerere university Kampala Uganda
The main objective of this project was to come up with a more secure ATM system that will reduce on the ATM fraud.
A CASE Lab Report - Project File on "ATM - Banking System"joyousbharat
A CASE Lab Report - Project File on "ATM - Banking System"
The software to be designed will control a simulated automated teller machine
(ATM) having a magnetic stripe reader for reading an ATM card, a keyboard and
display for interaction with the customer, a slot for depositing envelopes, a
dispenser for cash (in multiples of $20), a printer for printing customer receipts, and
a key-operated switch to allow an operator to start or stop the machine. The ATM
will communicate with the bank's computer over an appropriate communication
link. (The software on the latter is not part of the requirements for this problem.)
Offline Handwritten Signature Identification and Verification using Multi-Res...CSCJournals
In this paper, we are proposing a new method for offline (static) handwritten signature identification and verification based on Gabor wavelet transform. The whole idea is offering a simple and robust method for extracting features based on Gabor Wavelet which the dependency of the method to the nationality of signer has been reduced to its minimal. After pre-processing stage that contains noise reduction and signature image normalisation by size and rotation, a virtual grid is placed on the signature image. Gabor wavelet coefficients with different frequencies and directions are computed on each points of this grid and then fed into a classifier. The shortest weighted distance has been used as the classifier. The weight that is used as the coefficient for computing the shortest distance is based on the distribution of instances in each of signature classes. As it was pointed out earlier, one of the advantages of this system is its capability of signature identification and verification of different nationalities; thus it has been tested on four signature dataset with different nationalities including Iranian, Turkish, South African and Spanish signatures. Experimental results and the comparison of the proposed system with other systems are consistent with desirable outcomes. Despite the use of the simplest method of classification i.e. the nearest neighbour, the proposed algorithm in comparison with other algorithms has very good capabilities. Comparing the results of our system with the accuracy of human\'s identification and verification, it shows that human identification is more accurate but our proposed system has a lower error rate in verification.
A Novel Automated Approach for Offline Signature Verification Based on Shape ...Editor IJCATR
The handwritten signature has been the most natural and long lasting authentication scheme in which a person draw some
pattern of lines or writes his name in a different style. The signature recognition and verification are a behavioural biometric and is
very challenging due to the variation that can occur in person’s signature because of age, illness, and emotional state of the person. As
far as the representation of the signature is concerned a classical technique of thinning or skeleton is mostly used. In this paper, we
proposed a new methodology for signature verification that uses structural information and original strokes instead of skeleton or
thinned version to analyse the signature and verify. The approach is based on sketching a fixed size grid over the signatures and getting
2-Dimensional unique templates which are then compared and matched to verify a query signature as genuine or forged. To compute
the similarity score between two signature’s grids, we follow template matching rule and the Signature grid’s cell are mapped and
matched with respect to position. The proposed framework is fast and highly accurate with reduce false acceptance rate and false
Biometric identification with improved efficiency using sift algorithmIJARIIT
Osseo-integrated dental implants have been widely used for the rehabilitation of tooth loss. Although dental implants
are considered an available treatment in the paradigm shift from traditional dental therapies, such as fixed dental bridges and
removable dentures, the fundamental problems must be overcome prior to their clinical use in young patients who are still
undergoing jawbone growth. A bio-engineered functional bio-hybrid implant that is combined with adult-derived periodontal
tissue and attached with bone tissue can act as a substitute for cementum. This bio-hybrid implant was successfully engrafted
and it restored physiological function, including bone remodelling, regeneration and appropriate responsiveness to noxious
stimuli. Thus, this article reviews the functional bio-hybrid implant’s potential for clinical use as a next-generation dental
implant using adult-derived tissues.
Offline signature identification using high intensity variations and cross ov...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Automatic signature verification with chain code using weighted distance and ...eSAT Journals
Abstract The signature forgery can be restricted by either online or offline signature verification techniques. It verifies the signature by
performing a match with the pre-processed signature dynamically by detecting the motion of stylus during signature while on
other hand, offline verifies by performing a match using the two dimensional scanned image of the signature. This paper studies
about the various techniques available in offline signature verification along with their shadows.
Keywords: Signature Verification, Weighted Distance, High Pressure Factor, Normalization, Threshold Value
Offline Signature Verification Using Local Radon Transform and Support Vector...CSCJournals
In this paper, we propose a new method for signature verification using local Radon Transform. The proposed method uses Radon Transform locally as feature extractor and Support Vector Machine (SVM) as classifier. The main idea of our method is using Radon Transform locally for line segments detection and feature extraction, against using it globally. The advantages of the proposed method are robustness to noise, size invariance and shift invariance. Having used a dataset of 600 signatures from 20 Persian writers, and another dataset of 924 signatures from 22 English writers, our system achieves good results. The experimental results of our method are compared with two other methods. This comparison shows that our method has good performance for signature identification and verification in different cultures.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Long-term Face Tracking in the Wild using Deep LearningElaheh Rashedi
This paper investigates long-term face tracking of a specific person given his/her face image in a single frame as a query in a video stream. Through taking advantage of pre-trained deep learning models on big data, a novel system is developed for accurate video face tracking in the unconstrained environments depicting various people and objects moving in and out of the frame. In the proposed system, we present a detection-verification-tracking method (dubbed as 'DVT') which accomplishes the long-term face tracking task through the collaboration of face detection, face verification, and (short-term) face tracking. An offline trained detector based on cascaded convolutional neural networks localizes all faces appeared in the frames, and an offline trained face verifier based on deep convolutional neural networks and similarity metric learning decides if any face or which face corresponds to the queried person. An online trained tracker follows the face from frame to frame. When validated on a sitcom episode and a TV show, the DVT method outperforms tracking-learning-detection (TLD) and face-TLD in terms of recall and precision. The proposed system is also tested on many other types of videos and shows very promising results.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Scale Saliency: Applications in Visual Matching,Tracking and View-Based Objec...Jonathon Hare
Distributed Multimedia Systems 2003 / Visual Information Systems 2003, Florida International University, Miami, Florida, USA, 24 - 26 Sep 2003.
http://eprints.soton.ac.uk/258295/
In this paper, we introduce a novel technique for image matching and feature-based tracking. The technique is based on the idea of using the Scale-Saliency algorithm to pick a sparse number of ‘interesting’ or ‘salient’ features. Feature vectors for each of the salient regions are generated and used in the matching process. Due to the nature of the sparse representation of feature vectors generated by the technique, sub-image matching is also accomplished. We demonstrate the techniques robustness to geometric transformations in the query image and suggest that the technique would be suitable for view-based object recognition. We also apply the matching technique to the problem of feature tracking across multiple video frames by matching salient regions across frame pairs. We show that our tracking algorithm is able to explicitly extract the 3D motion vector of each salient region during the tracking process, using a single uncalibrated camera. We illustrate the functionality of our tracking algorithm by showing results from tracking a single salient region in near real-time with a live camera input.
OFFLINE SIGNATURE VERIFICATION SYSTEM FOR BANK CHEQUES USING ZERNIKE MOMENTS,...ijaia
Handwritten signature is the most accepted and economical means of personnel authentication. It can be
verified using online or offline schemes. This paper proposes a signature verification model by combining
Zernike moments feature with circularity and aspect ratio. Unlike characters, signatures vary each time
because of its behavioural biometric property. Signatures can be identified based on their shape. Moments
are the good translational and scale invariant shape descriptors. The amplitude and the phase of Zernike
moments, circularity and aspect ratio of the signature are the features that are extracted and combined for
the verification purpose and are fed to the Feedforward Backpropagation Neural Network. This Neural
Network classifies the signature into genuine or forged. Experimental results reveal that this methodology
of combining zernike moments along with the two mentioned geometrical properties give higher accuracy
than using them individually. The combination of these feature vector yields a mean accuracy of 95.83%.
When this approach is compared with the literature, it proves to be more effective.
Highly Secured Bio-Metric Authentication Model with Palm Print IdentificationIJERA Editor
For securing personal identifications and highly secure identification problems, biometric technologies will
provide higher security with improved accuracy. This has become an emerging technology in recent years due to
the transaction frauds, security breaches and personal identification etc. The beauty of biometric technology is it
provides a unique code for each person and it can’t be copied or forged by others. To overcome the draw backs
of finger print identification systems, here in this paper we proposed a palm print based personal identification
system, which is a most promising and emerging research area in biometric identification systems due to its
uniqueness, scalability, faster execution speed and large area for extracting the features. It provides higher
security over finger print biometric systems with its rich features like wrinkles, continuous ridges, principal
lines, minutiae points, and singular points. The main aim of proposed palm print identification system is to
implement a system with higher accuracy and increased speed in identifying the palm prints of several users.
Here, in this we presented a highly secured palm print identification system with extraction of region of interest
(ROI) with morphological operation there by applying un-decimated bi-orthogonal wavelet (UDBW) transform
to extract the low level features of registered palm prints to calculate its feature vectors (FV) then after the
comparison is done by measuring the distance between registered palm feature vector and testing palm print
feature vector. Simulation results show that the proposed biometric identification system provides more
accuracy and reliable recognition rate
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Mind IT Systems
Healthcare providers often struggle with the complexities of chronic conditions and remote patient monitoring, as each patient requires personalized care and ongoing monitoring. Off-the-shelf solutions may not meet these diverse needs, leading to inefficiencies and gaps in care. It’s here, custom healthcare software offers a tailored solution, ensuring improved care and effectiveness.
Navigating the Metaverse: A Journey into Virtual Evolution"Donna Lenk
Join us for an exploration of the Metaverse's evolution, where innovation meets imagination. Discover new dimensions of virtual events, engage with thought-provoking discussions, and witness the transformative power of digital realms."
Accelerate Enterprise Software Engineering with PlatformlessWSO2
Key takeaways:
Challenges of building platforms and the benefits of platformless.
Key principles of platformless, including API-first, cloud-native middleware, platform engineering, and developer experience.
How Choreo enables the platformless experience.
How key concepts like application architecture, domain-driven design, zero trust, and cell-based architecture are inherently a part of Choreo.
Demo of an end-to-end app built and deployed on Choreo.
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Globus
The Earth System Grid Federation (ESGF) is a global network of data servers that archives and distributes the planet’s largest collection of Earth system model output for thousands of climate and environmental scientists worldwide. Many of these petabyte-scale data archives are located in proximity to large high-performance computing (HPC) or cloud computing resources, but the primary workflow for data users consists of transferring data, and applying computations on a different system. As a part of the ESGF 2.0 US project (funded by the United States Department of Energy Office of Science), we developed pre-defined data workflows, which can be run on-demand, capable of applying many data reduction and data analysis to the large ESGF data archives, transferring only the resultant analysis (ex. visualizations, smaller data files). In this talk, we will showcase a few of these workflows, highlighting how Globus Flows can be used for petabyte-scale climate analysis.
Unleash Unlimited Potential with One-Time Purchase
BoxLang is more than just a language; it's a community. By choosing a Visionary License, you're not just investing in your success, you're actively contributing to the ongoing development and support of BoxLang.
Understanding Globus Data Transfers with NetSageGlobus
NetSage is an open privacy-aware network measurement, analysis, and visualization service designed to help end-users visualize and reason about large data transfers. NetSage traditionally has used a combination of passive measurements, including SNMP and flow data, as well as active measurements, mainly perfSONAR, to provide longitudinal network performance data visualization. It has been deployed by dozens of networks world wide, and is supported domestically by the Engagement and Performance Operations Center (EPOC), NSF #2328479. We have recently expanded the NetSage data sources to include logs for Globus data transfers, following the same privacy-preserving approach as for Flow data. Using the logs for the Texas Advanced Computing Center (TACC) as an example, this talk will walk through several different example use cases that NetSage can answer, including: Who is using Globus to share data with my institution, and what kind of performance are they able to achieve? How many transfers has Globus supported for us? Which sites are we sharing the most data with, and how is that changing over time? How is my site using Globus to move data internally, and what kind of performance do we see for those transfers? What percentage of data transfers at my institution used Globus, and how did the overall data transfer performance compare to the Globus users?
Code reviews are vital for ensuring good code quality. They serve as one of our last lines of defense against bugs and subpar code reaching production.
Yet, they often turn into annoying tasks riddled with frustration, hostility, unclear feedback and lack of standards. How can we improve this crucial process?
In this session we will cover:
- The Art of Effective Code Reviews
- Streamlining the Review Process
- Elevating Reviews with Automated Tools
By the end of this presentation, you'll have the knowledge on how to organize and improve your code review proces
How Recreation Management Software Can Streamline Your Operations.pptxwottaspaceseo
Recreation management software streamlines operations by automating key tasks such as scheduling, registration, and payment processing, reducing manual workload and errors. It provides centralized management of facilities, classes, and events, ensuring efficient resource allocation and facility usage. The software offers user-friendly online portals for easy access to bookings and program information, enhancing customer experience. Real-time reporting and data analytics deliver insights into attendance and preferences, aiding in strategic decision-making. Additionally, effective communication tools keep participants and staff informed with timely updates. Overall, recreation management software enhances efficiency, improves service delivery, and boosts customer satisfaction.
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxrickgrimesss22
Discover the essential features to incorporate in your Winzo clone app to boost business growth, enhance user engagement, and drive revenue. Learn how to create a compelling gaming experience that stands out in the competitive market.
top nidhi software solution freedownloadvrstrong314
This presentation emphasizes the importance of data security and legal compliance for Nidhi companies in India. It highlights how online Nidhi software solutions, like Vector Nidhi Software, offer advanced features tailored to these needs. Key aspects include encryption, access controls, and audit trails to ensure data security. The software complies with regulatory guidelines from the MCA and RBI and adheres to Nidhi Rules, 2014. With customizable, user-friendly interfaces and real-time features, these Nidhi software solutions enhance efficiency, support growth, and provide exceptional member services. The presentation concludes with contact information for further inquiries.
Check out the webinar slides to learn more about how XfilesPro transforms Salesforce document management by leveraging its world-class applications. For more details, please connect with sales@xfilespro.com
If you want to watch the on-demand webinar, please click here: https://www.xfilespro.com/webinars/salesforce-document-management-2-0-smarter-faster-better/
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisGlobus
JASMIN is the UK’s high-performance data analysis platform for environmental science, operated by STFC on behalf of the UK Natural Environment Research Council (NERC). In addition to its role in hosting the CEDA Archive (NERC’s long-term repository for climate, atmospheric science & Earth observation data in the UK), JASMIN provides a collaborative platform to a community of around 2,000 scientists in the UK and beyond, providing nearly 400 environmental science projects with working space, compute resources and tools to facilitate their work. High-performance data transfer into and out of JASMIN has always been a key feature, with many scientists bringing model outputs from supercomputers elsewhere in the UK, to analyse against observational or other model data in the CEDA Archive. A growing number of JASMIN users are now realising the benefits of using the Globus service to provide reliable and efficient data movement and other tasks in this and other contexts. Further use cases involve long-distance (intercontinental) transfers to and from JASMIN, and collecting results from a mobile atmospheric radar system, pushing data to JASMIN via a lightweight Globus deployment. We provide details of how Globus fits into our current infrastructure, our experience of the recent migration to GCSv5.4, and of our interest in developing use of the wider ecosystem of Globus services for the benefit of our user community.
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Shahin Sheidaei
Games are powerful teaching tools, fostering hands-on engagement and fun. But they require careful consideration to succeed. Join me to explore factors in running and selecting games, ensuring they serve as effective teaching tools. Learn to maintain focus on learning objectives while playing, and how to measure the ROI of gaming in education. Discover strategies for pitching gaming to leadership. This session offers insights, tips, and examples for coaches, team leads, and enterprise leaders seeking to teach from simple to complex concepts.
Large Language Models and the End of ProgrammingMatt Welsh
Talk by Matt Welsh at Craft Conference 2024 on the impact that Large Language Models will have on the future of software development. In this talk, I discuss the ways in which LLMs will impact the software industry, from replacing human software developers with AI, to replacing conventional software with models that perform reasoning, computation, and problem-solving.
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...Juraj Vysvader
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I didn't get rich from it but it did have 63K downloads (powered possible tens of thousands of websites).
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamtakuyayamamoto1800
In this slide, we show the simulation example and the way to compile this solver.
In this solver, the Helmholtz equation can be solved by helmholtzFoam. Also, the Helmholtz equation with uniformly dispersed bubbles can be simulated by helmholtzBubbleFoam.
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
Off-line Signature Verification
1. Islamic University of Technology(IUT)
Department of Computer Science and Engineering(CSE)
Offline Signature Verification Using
Local Keypoint Features
Supervised By:
Dr. Hasanul kabir
Assistant professor, CSE dept.
Islamic university of technology(iut)
Presented By:
Ashikur Rahman (104401)
Golam Mostaeen (104404)
2. Contents
Introduction
Offline Signature Verification
Research Challenges
Thesis Objective
Related Works
Proposed Method
Dataset & Implementation
Future Works
References
2
3. INTRODUCTION
A signature is a person's name written in a distinctive way as a form of identification in
authorizing a check or document or concluding a letter.
Signature forgery refers to the act of falsely replicating the signature of another person.
Signature forgery is done in order to-
Commit frauds
Deceive others
Alter data etc.
One common example of signature forgery is cheque writing.
3
4. Offline Signature Verification
Those forgeries can be verified in two methods-
Online Signature Verification
• Deals with dynamic features like
speed, pen pressure, directions,
stoke length and when the pen is
lifted from the paper
Offline Signature Verification
• Uses features(static information)
from the image.
• Deals with shape only.
• Largely used for verifying bank
cheques
4
5. Research Challenges
Differentiating different parts of signature
that varies with each signing-
Signature orientation can be different-
Input image may contain noise.
Isolating the sector of interest from the
total input image-
Threshold value should be taken wisely so
that False accept and False Reject occur very
less.
The nature and variety of the writing
pen
5
6. Thesis Objective
Our main objective of this thesis is to
develop a method that will calculate
features of a signature and verify it
comparing with sample prototype in
spite of having-
Noise in the image
Different orientation
Various writing
Already we have implemented several
existing detection methods signature
verification and figured out the
limitations of the methods. Our goal is to
ensure better performance in robust
nature so that we can easily detect the
forged signature in different challenging
situations.
6
7. Overall Workflow of Signature Verification
All the methods of signature verification undergoes the following steps:
Feature is extracted (Varies from methods to methods)
Features are classified
The system is trained
Matching
7
9. Related works(contd.)
Global & geometric Method(A. C.
Verma,D. Saha,H. Saikia,2013):
• Geometric data(aspect ratio, center of
gravity, baseline shift etc.) are
considered as feature
• Mean of each feature calculated from
the training data
• Variance is used to calculate the
Euclidian distance which is the basis
of comparison
The formula is-
Limitations:
• Cannot detect skilled forgery as the
geometric value get closer
• False accept occurs more often
Angular based model(Prashanth & Raja,
2012):
• Calculate average no. of rows and
columns for random forgery detection
• For skilled, split the image in two blocks
recursively until 128 blocks have found
on basis of geometric center
• Angle and distance for all the center
points of each block is calculated from
the point (1,1) for feature extraction.
Limitation:
• Depends on global value(angle and
distance)
9
10. Related works(contd.)
Grid Model(Madasu & Brian,2002):
• Image is partitioned into 8 partitions using
equal horizontal density approximation
method.
• Each Box portioned into 12 boxes (total 96
boxes)
• calculate the summation of the angles of
all points in each box taken with respect
to the bottom left corner and normalize
it for feature.
Limitations:
• Even a little change in the signature leads
to much change in the result.
Radon transform model(Kiani &
Pourreza,2011):
• Computes projection sum of the
image intensity along a radial line
oriented at a specific angle with the
formula-
Where the δ(r) is Dirac function.
• Computation of Radon Transform is its
projections across the image at arbitrary
orientations θ and offsets ρ which is
used as feature
Limitations:
• False reject rate is little high for this
method
10
11. Related works(contd.)
SURF model(Bay & Gool,2006):
• First, key point is detected using fast
Hessian Detector and Haar wavelet.
The formula of Hessian matrix is-
• Then SURF descriptor is extracted using
assignment orientation.
Limitations:
• The time needed to detect can be
beaten today
G-SURF model(Pal, Chanda &
Franke,2012):
• Uses Gabor filter along with SURF
algorithm
• A two dimensional Gabor Filter in
spatial domain can be defined as
follows-
Limitations:
• Though it overcomes the performance
of SIFT and SURF, still need to be
upgraded
11
12. Related works(contd.)
Harris Corner Detection:
• This method detects corner first
recognizing the points by looking the
intensity within the small window
• Shifting the window in any direction
should yield a large change in
appearance
• Different output can be gained by
setting a desirable threshold value
Feature descriptor:
• Describe a point assigning orientation
around it
• Divides the surrounding area into 16
blocks, each blocks have a histogram
of 8 bins each
• So, each point has a (16x8) 128 long
feature vector
12
13. Proposed Method
Preprocessing
• Noise removal
• Isolating area of interest
• Assignment orientation for rotation invariance
Keypoint detection using Harris Corner Detection
Creating Feature descriptor
• Creating 16 blocks around the keypoint
• Calculate gradient magnitude and direction
• Weigh the magnitude with Gaussian filter
• Create 8 bin histogram
• Each point have 128(16x8) bin
Classify the descriptors using KNN classifier
Compare the prototype with the testing signature
13
14. Proposed Method(Contd.)
• Further checking for skilled Forgery
A high level of skilled forgery may pass the above
test but those can be further detected using the
following tests:
Edge thickness will be calculated to detect
overwriting
Straightness of the edges will be checked
Sudden blobs in the signature need to be
detected
End point will be checked to detect sharp
finish
If a Signature Passes all those tests we consider it
as a authentic signature.
14
15. Dataset & Implementation
Dataset
We have collected our dataset from different persons. Signature s was
taken in white paper and scanned for training our system.
Similarly we took forged and genuine version of the signatures for
testing the performance of different verification method we
implemented.
Global & Geometric Method:
After implementing this
method we compared its
performance for varying
threshold of acceptance. The
graph at the right represents
its performance.
As the threshold is
increased FAR increases but
FRR is decreases somewhat
proportionately.
15
16. Implementation(Cont.)
Implementation of the proposed method
For implementation of the proposed method we followed the following steps:
1. Pre-processing:
The pre-processing involves different steps. We performed the following steps
in sequences: Cropping the area of interest, noise removal and binarisation.
2. Key point extraction:
We used Harris Corner detection to find out the key point of the supplied
signature. The following right image shows the signature after key point has been
extracted from supplied left signature.
3. Feature descriptor
For each keypoint a feature vector of length 128 has been calculated. This
vector contain the histogram of orientation around the point.
16
17. Future Works
• So far we have figured out several problems of existing methods of signature
detection through implementation
• Still we did not implemented our proposed method but from the implementation
& analysis of existing method we can say that it will give us better performance
• So our future work is to implement the proposed method so that it can ensure-
more robust with rotation invariance
robustness in noise
robust in variant ink
with minimum complexity
17
19. References
• A. C. Verma,D. Saha, H. Saikia; ’FORGERY DETECTION IN OFFLINE HANDWRITTENSIGNATURE
USING GLOBAL AND GEOMETRIC FEATURES’, IJCER(Vol.2, Issue 2, April 2013)
• Prashanth C R, K B Raja, Venugopal K R, L M Patnaik,’ Intra-modal Score level Fusion for Off-
line Signature Verification’, IJITEE, ISSN: 2278-3075, Vol.1, Issue 2, July 2012
• Prashanth C. R. and K. B. Raja,’ Off-line Signature Verification Based on Angular Features’
IJMO, Vol. 2, No. 4, August 2012
• M.Radmehr, S.M.Anisheh, I.Yousefian,’ Offline Signature Recognition using Radon Transform’,
WASET, Vol:6 2012-02-28
• Bay H,Tinne t.,Gool l.,’ SURF: Speeded Up Robust Features’;
• Samaneh G., Mohsen E., i Moghaddam, “Off-line Persian Signature Identification and
Verification Based on Image Registration and Fusion,” Journal of Multimedia, Vol. 4, No.
3, pp.137-144, June 2009.
• Jesus F Vargas, Miguel A Ferrer, Carlos M Travieso, and Jesus B Alonso, “Off-line
Signature Verification Based on Psuedo-Cepstral Coefficients,” International Conference
on Document Analysis and Recognition, pp. 126-130, 2009
• V A Bharadi and H B Kekre, “Off-line Signature Recognition Systems,” International
Journal of Computer Applications, Vol. 1, No. 27, pp. 61-70, 2010
19