SlideShare a Scribd company logo
Islamic University of Technology(IUT)
Department of Computer Science and Engineering(CSE)
Offline Signature Verification Using
Local Keypoint Features
Supervised By:
Dr. Hasanul kabir
Assistant professor, CSE dept.
Islamic university of technology(iut)
Presented By:
Ashikur Rahman (104401)
Golam Mostaeen (104404)
Contents
 Introduction
 Offline Signature Verification
 Research Challenges
 Thesis Objective
 Related Works
 Proposed Method
 Dataset & Implementation
 Future Works
 References
2
INTRODUCTION
A signature is a person's name written in a distinctive way as a form of identification in
authorizing a check or document or concluding a letter.
Signature forgery refers to the act of falsely replicating the signature of another person.
Signature forgery is done in order to-
 Commit frauds
 Deceive others
 Alter data etc.
One common example of signature forgery is cheque writing.
3
Offline Signature Verification
Those forgeries can be verified in two methods-
 Online Signature Verification
• Deals with dynamic features like
speed, pen pressure, directions,
stoke length and when the pen is
lifted from the paper
 Offline Signature Verification
• Uses features(static information)
from the image.
• Deals with shape only.
• Largely used for verifying bank
cheques
4
Research Challenges
 Differentiating different parts of signature
that varies with each signing-
 Signature orientation can be different-
 Input image may contain noise.
 Isolating the sector of interest from the
total input image-
Threshold value should be taken wisely so
that False accept and False Reject occur very
less.
 The nature and variety of the writing
pen
5
Thesis Objective
Our main objective of this thesis is to
develop a method that will calculate
features of a signature and verify it
comparing with sample prototype in
spite of having-
 Noise in the image
 Different orientation
 Various writing
Already we have implemented several
existing detection methods signature
verification and figured out the
limitations of the methods. Our goal is to
ensure better performance in robust
nature so that we can easily detect the
forged signature in different challenging
situations.
6
Overall Workflow of Signature Verification
All the methods of signature verification undergoes the following steps:
 Feature is extracted (Varies from methods to methods)
 Features are classified
 The system is trained
 Matching
7
Related Works
Existing methods so far we studied can be categorized by the following tree-
8
Related works(contd.)
Global & geometric Method(A. C.
Verma,D. Saha,H. Saikia,2013):
• Geometric data(aspect ratio, center of
gravity, baseline shift etc.) are
considered as feature
• Mean of each feature calculated from
the training data
• Variance is used to calculate the
Euclidian distance which is the basis
of comparison
The formula is-
Limitations:
• Cannot detect skilled forgery as the
geometric value get closer
• False accept occurs more often
Angular based model(Prashanth & Raja,
2012):
• Calculate average no. of rows and
columns for random forgery detection
• For skilled, split the image in two blocks
recursively until 128 blocks have found
on basis of geometric center
• Angle and distance for all the center
points of each block is calculated from
the point (1,1) for feature extraction.
Limitation:
• Depends on global value(angle and
distance)
9
Related works(contd.)
Grid Model(Madasu & Brian,2002):
• Image is partitioned into 8 partitions using
equal horizontal density approximation
method.
• Each Box portioned into 12 boxes (total 96
boxes)
• calculate the summation of the angles of
all points in each box taken with respect
to the bottom left corner and normalize
it for feature.
Limitations:
• Even a little change in the signature leads
to much change in the result.
Radon transform model(Kiani &
Pourreza,2011):
• Computes projection sum of the
image intensity along a radial line
oriented at a specific angle with the
formula-
Where the δ(r) is Dirac function.
• Computation of Radon Transform is its
projections across the image at arbitrary
orientations θ and offsets ρ which is
used as feature
Limitations:
• False reject rate is little high for this
method
10
Related works(contd.)
SURF model(Bay & Gool,2006):
• First, key point is detected using fast
Hessian Detector and Haar wavelet.
The formula of Hessian matrix is-
• Then SURF descriptor is extracted using
assignment orientation.
Limitations:
• The time needed to detect can be
beaten today
G-SURF model(Pal, Chanda &
Franke,2012):
• Uses Gabor filter along with SURF
algorithm
• A two dimensional Gabor Filter in
spatial domain can be defined as
follows-
Limitations:
• Though it overcomes the performance
of SIFT and SURF, still need to be
upgraded
11
Related works(contd.)
Harris Corner Detection:
• This method detects corner first
recognizing the points by looking the
intensity within the small window
• Shifting the window in any direction
should yield a large change in
appearance
• Different output can be gained by
setting a desirable threshold value
Feature descriptor:
• Describe a point assigning orientation
around it
• Divides the surrounding area into 16
blocks, each blocks have a histogram
of 8 bins each
• So, each point has a (16x8) 128 long
feature vector
12
Proposed Method
 Preprocessing
• Noise removal
• Isolating area of interest
• Assignment orientation for rotation invariance
 Keypoint detection using Harris Corner Detection
 Creating Feature descriptor
• Creating 16 blocks around the keypoint
• Calculate gradient magnitude and direction
• Weigh the magnitude with Gaussian filter
• Create 8 bin histogram
• Each point have 128(16x8) bin
 Classify the descriptors using KNN classifier
 Compare the prototype with the testing signature
13
Proposed Method(Contd.)
• Further checking for skilled Forgery
A high level of skilled forgery may pass the above
test but those can be further detected using the
following tests:
 Edge thickness will be calculated to detect
overwriting
 Straightness of the edges will be checked
 Sudden blobs in the signature need to be
detected
 End point will be checked to detect sharp
finish
If a Signature Passes all those tests we consider it
as a authentic signature.
14
Dataset & Implementation
 Dataset
 We have collected our dataset from different persons. Signature s was
taken in white paper and scanned for training our system.
 Similarly we took forged and genuine version of the signatures for
testing the performance of different verification method we
implemented.
Global & Geometric Method:
After implementing this
method we compared its
performance for varying
threshold of acceptance. The
graph at the right represents
its performance.
 As the threshold is
increased FAR increases but
FRR is decreases somewhat
proportionately.
15
Implementation(Cont.)
Implementation of the proposed method
For implementation of the proposed method we followed the following steps:
1. Pre-processing:
The pre-processing involves different steps. We performed the following steps
in sequences: Cropping the area of interest, noise removal and binarisation.
2. Key point extraction:
We used Harris Corner detection to find out the key point of the supplied
signature. The following right image shows the signature after key point has been
extracted from supplied left signature.
3. Feature descriptor
For each keypoint a feature vector of length 128 has been calculated. This
vector contain the histogram of orientation around the point.
16
Future Works
• So far we have figured out several problems of existing methods of signature
detection through implementation
• Still we did not implemented our proposed method but from the implementation
& analysis of existing method we can say that it will give us better performance
• So our future work is to implement the proposed method so that it can ensure-
 more robust with rotation invariance
 robustness in noise
 robust in variant ink
with minimum complexity
17
Thank you.
Any Question ?
18
References
• A. C. Verma,D. Saha, H. Saikia; ’FORGERY DETECTION IN OFFLINE HANDWRITTENSIGNATURE
USING GLOBAL AND GEOMETRIC FEATURES’, IJCER(Vol.2, Issue 2, April 2013)
• Prashanth C R, K B Raja, Venugopal K R, L M Patnaik,’ Intra-modal Score level Fusion for Off-
line Signature Verification’, IJITEE, ISSN: 2278-3075, Vol.1, Issue 2, July 2012
• Prashanth C. R. and K. B. Raja,’ Off-line Signature Verification Based on Angular Features’
IJMO, Vol. 2, No. 4, August 2012
• M.Radmehr, S.M.Anisheh, I.Yousefian,’ Offline Signature Recognition using Radon Transform’,
WASET, Vol:6 2012-02-28
• Bay H,Tinne t.,Gool l.,’ SURF: Speeded Up Robust Features’;
• Samaneh G., Mohsen E., i Moghaddam, “Off-line Persian Signature Identification and
Verification Based on Image Registration and Fusion,” Journal of Multimedia, Vol. 4, No.
3, pp.137-144, June 2009.
• Jesus F Vargas, Miguel A Ferrer, Carlos M Travieso, and Jesus B Alonso, “Off-line
Signature Verification Based on Psuedo-Cepstral Coefficients,” International Conference
on Document Analysis and Recognition, pp. 126-130, 2009
• V A Bharadi and H B Kekre, “Off-line Signature Recognition Systems,” International
Journal of Computer Applications, Vol. 1, No. 27, pp. 61-70, 2010
19

More Related Content

What's hot

Project synopsis on face recognition in e attendance
Project synopsis on face recognition in e attendanceProject synopsis on face recognition in e attendance
Project synopsis on face recognition in e attendance
Nitesh Dubey
 
Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial Recognition
Nikyaa7
 
Signature verification
Signature verificationSignature verification
Signature verification
NAVEEN TOKAS
 
Face Recognition Attendance System
Face Recognition Attendance System Face Recognition Attendance System
Face Recognition Attendance System
Shreya Dandavate
 
High protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyHigh protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technology
Alfred Oboi
 
Sign verification
Sign verificationSign verification
Sign verification
projectseven1222
 
Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprint
AnIsh Kumar
 
Face recognition attendance system
Face recognition attendance systemFace recognition attendance system
Face recognition attendance system
Naomi Kulkarni
 
Automatic Attendance System using Deep Learning
Automatic Attendance System using Deep LearningAutomatic Attendance System using Deep Learning
Automatic Attendance System using Deep Learning
Sunil Aryal
 
Biometric ATM (1).pptx
Biometric ATM (1).pptxBiometric ATM (1).pptx
Biometric ATM (1).pptx
Pavani839789
 
ATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSMATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSM
Alpesh Kurhade
 
finger print based Atm software requirement story board
finger print based Atm software requirement story board finger print based Atm software requirement story board
finger print based Atm software requirement story board
Md. Sarowar Alam Saidi
 
Online signature recognition
Online signature recognitionOnline signature recognition
Online signature recognitionPiyush Mittal
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
Asif Muhammad
 
Face recognigion system ppt
Face recognigion system pptFace recognigion system ppt
Face recognigion system ppt
Ravi Kumar
 
Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detectionkalpesh1908
 
An OCR System for recognition of Urdu text in Nastaliq Font
An OCR System for recognition of Urdu text in Nastaliq FontAn OCR System for recognition of Urdu text in Nastaliq Font
An OCR System for recognition of Urdu text in Nastaliq FontDr. Syed Hassan Amin
 
Automated attendance system using Face recognition
Automated attendance system using Face recognitionAutomated attendance system using Face recognition
Automated attendance system using Face recognition
IRJET Journal
 
face recognition
face recognitionface recognition
face recognition
vipin varghese
 
A CASE Lab Report - Project File on "ATM - Banking System"
A CASE Lab Report - Project File on  "ATM - Banking System"A CASE Lab Report - Project File on  "ATM - Banking System"
A CASE Lab Report - Project File on "ATM - Banking System"
joyousbharat
 

What's hot (20)

Project synopsis on face recognition in e attendance
Project synopsis on face recognition in e attendanceProject synopsis on face recognition in e attendance
Project synopsis on face recognition in e attendance
 
Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial Recognition
 
Signature verification
Signature verificationSignature verification
Signature verification
 
Face Recognition Attendance System
Face Recognition Attendance System Face Recognition Attendance System
Face Recognition Attendance System
 
High protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyHigh protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technology
 
Sign verification
Sign verificationSign verification
Sign verification
 
Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprint
 
Face recognition attendance system
Face recognition attendance systemFace recognition attendance system
Face recognition attendance system
 
Automatic Attendance System using Deep Learning
Automatic Attendance System using Deep LearningAutomatic Attendance System using Deep Learning
Automatic Attendance System using Deep Learning
 
Biometric ATM (1).pptx
Biometric ATM (1).pptxBiometric ATM (1).pptx
Biometric ATM (1).pptx
 
ATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSMATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSM
 
finger print based Atm software requirement story board
finger print based Atm software requirement story board finger print based Atm software requirement story board
finger print based Atm software requirement story board
 
Online signature recognition
Online signature recognitionOnline signature recognition
Online signature recognition
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Face recognigion system ppt
Face recognigion system pptFace recognigion system ppt
Face recognigion system ppt
 
Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detection
 
An OCR System for recognition of Urdu text in Nastaliq Font
An OCR System for recognition of Urdu text in Nastaliq FontAn OCR System for recognition of Urdu text in Nastaliq Font
An OCR System for recognition of Urdu text in Nastaliq Font
 
Automated attendance system using Face recognition
Automated attendance system using Face recognitionAutomated attendance system using Face recognition
Automated attendance system using Face recognition
 
face recognition
face recognitionface recognition
face recognition
 
A CASE Lab Report - Project File on "ATM - Banking System"
A CASE Lab Report - Project File on  "ATM - Banking System"A CASE Lab Report - Project File on  "ATM - Banking System"
A CASE Lab Report - Project File on "ATM - Banking System"
 

Viewers also liked

Signature verification in biometrics
Signature verification in biometricsSignature verification in biometrics
Signature verification in biometrics
Swapnil Bangera
 
Global Context Descriptors for SURF and MSER Feature Descriptors
Global Context Descriptors for SURF and MSER Feature DescriptorsGlobal Context Descriptors for SURF and MSER Feature Descriptors
Global Context Descriptors for SURF and MSER Feature Descriptors
Gail Carmichael
 
Local feature descriptors for visual recognition
Local feature descriptors for visual recognitionLocal feature descriptors for visual recognition
Local feature descriptors for visual recognition
potaters
 
Matching with Invariant Features
Matching with Invariant FeaturesMatching with Invariant Features
Matching with Invariant Featureszukun
 
Modern features-part-1-detectors
Modern features-part-1-detectorsModern features-part-1-detectors
Modern features-part-1-detectorszukun
 
Offline Handwritten Signature Identification and Verification using Multi-Res...
Offline Handwritten Signature Identification and Verification using Multi-Res...Offline Handwritten Signature Identification and Verification using Multi-Res...
Offline Handwritten Signature Identification and Verification using Multi-Res...
CSCJournals
 
Authentication using Biometrics
Authentication using BiometricsAuthentication using Biometrics
Authentication using Biometricsisha ranjan
 
SURF
SURFSURF
A Novel Automated Approach for Offline Signature Verification Based on Shape ...
A Novel Automated Approach for Offline Signature Verification Based on Shape ...A Novel Automated Approach for Offline Signature Verification Based on Shape ...
A Novel Automated Approach for Offline Signature Verification Based on Shape ...
Editor IJCATR
 
Modern features-part-2-descriptors
Modern features-part-2-descriptorsModern features-part-2-descriptors
Modern features-part-2-descriptorszukun
 
AAAI08 tutorial: visual object recognition
AAAI08 tutorial: visual object recognitionAAAI08 tutorial: visual object recognition
AAAI08 tutorial: visual object recognitionzukun
 
CSI Handwriting Analysis
CSI Handwriting AnalysisCSI Handwriting Analysis
CSI Handwriting AnalysisMrs. Henley
 
Electronic banking presentation
Electronic banking presentationElectronic banking presentation
Electronic banking presentation
xabi951
 
Internet Banking
Internet BankingInternet Banking
Internet Banking
snehateddy
 
SIFT vs other Feature Descriptor
SIFT vs other Feature DescriptorSIFT vs other Feature Descriptor
SIFT vs other Feature DescriptorNisar Ahmed Rana
 
Hand Written Character Recognition Using Neural Networks
Hand Written Character Recognition Using Neural Networks Hand Written Character Recognition Using Neural Networks
Hand Written Character Recognition Using Neural Networks Chiranjeevi Adi
 

Viewers also liked (19)

Signature verification in biometrics
Signature verification in biometricsSignature verification in biometrics
Signature verification in biometrics
 
Global Context Descriptors for SURF and MSER Feature Descriptors
Global Context Descriptors for SURF and MSER Feature DescriptorsGlobal Context Descriptors for SURF and MSER Feature Descriptors
Global Context Descriptors for SURF and MSER Feature Descriptors
 
Local feature descriptors for visual recognition
Local feature descriptors for visual recognitionLocal feature descriptors for visual recognition
Local feature descriptors for visual recognition
 
Matching with Invariant Features
Matching with Invariant FeaturesMatching with Invariant Features
Matching with Invariant Features
 
Modern features-part-1-detectors
Modern features-part-1-detectorsModern features-part-1-detectors
Modern features-part-1-detectors
 
Offline Handwritten Signature Identification and Verification using Multi-Res...
Offline Handwritten Signature Identification and Verification using Multi-Res...Offline Handwritten Signature Identification and Verification using Multi-Res...
Offline Handwritten Signature Identification and Verification using Multi-Res...
 
Authentication using Biometrics
Authentication using BiometricsAuthentication using Biometrics
Authentication using Biometrics
 
SURF
SURFSURF
SURF
 
A Novel Automated Approach for Offline Signature Verification Based on Shape ...
A Novel Automated Approach for Offline Signature Verification Based on Shape ...A Novel Automated Approach for Offline Signature Verification Based on Shape ...
A Novel Automated Approach for Offline Signature Verification Based on Shape ...
 
Modern features-part-2-descriptors
Modern features-part-2-descriptorsModern features-part-2-descriptors
Modern features-part-2-descriptors
 
AAAI08 tutorial: visual object recognition
AAAI08 tutorial: visual object recognitionAAAI08 tutorial: visual object recognition
AAAI08 tutorial: visual object recognition
 
CSI Handwriting Analysis
CSI Handwriting AnalysisCSI Handwriting Analysis
CSI Handwriting Analysis
 
PPT 7.4.2015
PPT 7.4.2015PPT 7.4.2015
PPT 7.4.2015
 
Electronic banking presentation
Electronic banking presentationElectronic banking presentation
Electronic banking presentation
 
Internet Banking
Internet BankingInternet Banking
Internet Banking
 
E banking
E bankingE banking
E banking
 
SIFT vs other Feature Descriptor
SIFT vs other Feature DescriptorSIFT vs other Feature Descriptor
SIFT vs other Feature Descriptor
 
Internet banking
Internet bankingInternet banking
Internet banking
 
Hand Written Character Recognition Using Neural Networks
Hand Written Character Recognition Using Neural Networks Hand Written Character Recognition Using Neural Networks
Hand Written Character Recognition Using Neural Networks
 

Similar to Off-line Signature Verification

Biometric identification with improved efficiency using sift algorithm
Biometric identification with improved efficiency using sift algorithmBiometric identification with improved efficiency using sift algorithm
Biometric identification with improved efficiency using sift algorithm
IJARIIT
 
Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...
eSAT Publishing House
 
Automatic signature verification with chain code using weighted distance and ...
Automatic signature verification with chain code using weighted distance and ...Automatic signature verification with chain code using weighted distance and ...
Automatic signature verification with chain code using weighted distance and ...
eSAT Journals
 
Offline Signature Verification Using Local Radon Transform and Support Vector...
Offline Signature Verification Using Local Radon Transform and Support Vector...Offline Signature Verification Using Local Radon Transform and Support Vector...
Offline Signature Verification Using Local Radon Transform and Support Vector...
CSCJournals
 
E017443136
E017443136E017443136
E017443136
IOSR Journals
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
Data quality evaluation & orbit identification from scatterometer
Data quality evaluation & orbit identification from scatterometerData quality evaluation & orbit identification from scatterometer
Data quality evaluation & orbit identification from scatterometer
Mudit Dholakia
 
Long-term Face Tracking in the Wild using Deep Learning
Long-term Face Tracking in the Wild using Deep LearningLong-term Face Tracking in the Wild using Deep Learning
Long-term Face Tracking in the Wild using Deep Learning
Elaheh Rashedi
 
An Assimilated Face Recognition System with effective Gender Recognition Rate
An Assimilated Face Recognition System with effective Gender Recognition RateAn Assimilated Face Recognition System with effective Gender Recognition Rate
An Assimilated Face Recognition System with effective Gender Recognition Rate
IRJET Journal
 
E41033336
E41033336E41033336
E41033336
IJERA Editor
 
Scale Saliency: Applications in Visual Matching,Tracking and View-Based Objec...
Scale Saliency: Applications in Visual Matching,Tracking and View-Based Objec...Scale Saliency: Applications in Visual Matching,Tracking and View-Based Objec...
Scale Saliency: Applications in Visual Matching,Tracking and View-Based Objec...
Jonathon Hare
 
Artificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification SystemArtificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification System
IRJET Journal
 
NEAL-2016 ARL Symposium Poster
NEAL-2016 ARL Symposium PosterNEAL-2016 ARL Symposium Poster
NEAL-2016 ARL Symposium PosterBarbara Jean Neal
 
OFFLINE SIGNATURE VERIFICATION SYSTEM FOR BANK CHEQUES USING ZERNIKE MOMENTS,...
OFFLINE SIGNATURE VERIFICATION SYSTEM FOR BANK CHEQUES USING ZERNIKE MOMENTS,...OFFLINE SIGNATURE VERIFICATION SYSTEM FOR BANK CHEQUES USING ZERNIKE MOMENTS,...
OFFLINE SIGNATURE VERIFICATION SYSTEM FOR BANK CHEQUES USING ZERNIKE MOMENTS,...
ijaia
 
Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2prjpublications
 
Review of three categories of fingerprint recognition
Review of three categories of fingerprint recognitionReview of three categories of fingerprint recognition
Review of three categories of fingerprint recognitionprjpublications
 
Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2
prj_publication
 
Highly Secured Bio-Metric Authentication Model with Palm Print Identification
Highly Secured Bio-Metric Authentication Model with Palm Print IdentificationHighly Secured Bio-Metric Authentication Model with Palm Print Identification
Highly Secured Bio-Metric Authentication Model with Palm Print Identification
IJERA Editor
 
Automated Laser Scanning System For Reverse Engineering And Inspection
Automated Laser Scanning System For Reverse Engineering And InspectionAutomated Laser Scanning System For Reverse Engineering And Inspection
Automated Laser Scanning System For Reverse Engineering And Inspection
Jennifer Daniel
 

Similar to Off-line Signature Verification (20)

Biometric identification with improved efficiency using sift algorithm
Biometric identification with improved efficiency using sift algorithmBiometric identification with improved efficiency using sift algorithm
Biometric identification with improved efficiency using sift algorithm
 
Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...
 
Automatic signature verification with chain code using weighted distance and ...
Automatic signature verification with chain code using weighted distance and ...Automatic signature verification with chain code using weighted distance and ...
Automatic signature verification with chain code using weighted distance and ...
 
Offline Signature Verification Using Local Radon Transform and Support Vector...
Offline Signature Verification Using Local Radon Transform and Support Vector...Offline Signature Verification Using Local Radon Transform and Support Vector...
Offline Signature Verification Using Local Radon Transform and Support Vector...
 
E017443136
E017443136E017443136
E017443136
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Data quality evaluation & orbit identification from scatterometer
Data quality evaluation & orbit identification from scatterometerData quality evaluation & orbit identification from scatterometer
Data quality evaluation & orbit identification from scatterometer
 
Long-term Face Tracking in the Wild using Deep Learning
Long-term Face Tracking in the Wild using Deep LearningLong-term Face Tracking in the Wild using Deep Learning
Long-term Face Tracking in the Wild using Deep Learning
 
23-02-03[1]
23-02-03[1]23-02-03[1]
23-02-03[1]
 
An Assimilated Face Recognition System with effective Gender Recognition Rate
An Assimilated Face Recognition System with effective Gender Recognition RateAn Assimilated Face Recognition System with effective Gender Recognition Rate
An Assimilated Face Recognition System with effective Gender Recognition Rate
 
E41033336
E41033336E41033336
E41033336
 
Scale Saliency: Applications in Visual Matching,Tracking and View-Based Objec...
Scale Saliency: Applications in Visual Matching,Tracking and View-Based Objec...Scale Saliency: Applications in Visual Matching,Tracking and View-Based Objec...
Scale Saliency: Applications in Visual Matching,Tracking and View-Based Objec...
 
Artificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification SystemArtificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification System
 
NEAL-2016 ARL Symposium Poster
NEAL-2016 ARL Symposium PosterNEAL-2016 ARL Symposium Poster
NEAL-2016 ARL Symposium Poster
 
OFFLINE SIGNATURE VERIFICATION SYSTEM FOR BANK CHEQUES USING ZERNIKE MOMENTS,...
OFFLINE SIGNATURE VERIFICATION SYSTEM FOR BANK CHEQUES USING ZERNIKE MOMENTS,...OFFLINE SIGNATURE VERIFICATION SYSTEM FOR BANK CHEQUES USING ZERNIKE MOMENTS,...
OFFLINE SIGNATURE VERIFICATION SYSTEM FOR BANK CHEQUES USING ZERNIKE MOMENTS,...
 
Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2
 
Review of three categories of fingerprint recognition
Review of three categories of fingerprint recognitionReview of three categories of fingerprint recognition
Review of three categories of fingerprint recognition
 
Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2
 
Highly Secured Bio-Metric Authentication Model with Palm Print Identification
Highly Secured Bio-Metric Authentication Model with Palm Print IdentificationHighly Secured Bio-Metric Authentication Model with Palm Print Identification
Highly Secured Bio-Metric Authentication Model with Palm Print Identification
 
Automated Laser Scanning System For Reverse Engineering And Inspection
Automated Laser Scanning System For Reverse Engineering And InspectionAutomated Laser Scanning System For Reverse Engineering And Inspection
Automated Laser Scanning System For Reverse Engineering And Inspection
 

Recently uploaded

Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Mind IT Systems
 
Graphic Design Crash Course for beginners
Graphic Design Crash Course for beginnersGraphic Design Crash Course for beginners
Graphic Design Crash Course for beginners
e20449
 
Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"
Donna Lenk
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
WSO2
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Globus
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
Ortus Solutions, Corp
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
Globus
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
Paco van Beckhoven
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
wottaspaceseo
 
A Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of PassageA Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of Passage
Philip Schwarz
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
Fermin Galan
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
rickgrimesss22
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
vrstrong314
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
XfilesPro
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Globus
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
abdulrafaychaudhry
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Shahin Sheidaei
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
Matt Welsh
 
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
Juraj Vysvader
 
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamOpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
takuyayamamoto1800
 

Recently uploaded (20)

Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
 
Graphic Design Crash Course for beginners
Graphic Design Crash Course for beginnersGraphic Design Crash Course for beginners
Graphic Design Crash Course for beginners
 
Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
 
A Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of PassageA Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of Passage
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
 
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
 
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamOpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
 

Off-line Signature Verification

  • 1. Islamic University of Technology(IUT) Department of Computer Science and Engineering(CSE) Offline Signature Verification Using Local Keypoint Features Supervised By: Dr. Hasanul kabir Assistant professor, CSE dept. Islamic university of technology(iut) Presented By: Ashikur Rahman (104401) Golam Mostaeen (104404)
  • 2. Contents  Introduction  Offline Signature Verification  Research Challenges  Thesis Objective  Related Works  Proposed Method  Dataset & Implementation  Future Works  References 2
  • 3. INTRODUCTION A signature is a person's name written in a distinctive way as a form of identification in authorizing a check or document or concluding a letter. Signature forgery refers to the act of falsely replicating the signature of another person. Signature forgery is done in order to-  Commit frauds  Deceive others  Alter data etc. One common example of signature forgery is cheque writing. 3
  • 4. Offline Signature Verification Those forgeries can be verified in two methods-  Online Signature Verification • Deals with dynamic features like speed, pen pressure, directions, stoke length and when the pen is lifted from the paper  Offline Signature Verification • Uses features(static information) from the image. • Deals with shape only. • Largely used for verifying bank cheques 4
  • 5. Research Challenges  Differentiating different parts of signature that varies with each signing-  Signature orientation can be different-  Input image may contain noise.  Isolating the sector of interest from the total input image- Threshold value should be taken wisely so that False accept and False Reject occur very less.  The nature and variety of the writing pen 5
  • 6. Thesis Objective Our main objective of this thesis is to develop a method that will calculate features of a signature and verify it comparing with sample prototype in spite of having-  Noise in the image  Different orientation  Various writing Already we have implemented several existing detection methods signature verification and figured out the limitations of the methods. Our goal is to ensure better performance in robust nature so that we can easily detect the forged signature in different challenging situations. 6
  • 7. Overall Workflow of Signature Verification All the methods of signature verification undergoes the following steps:  Feature is extracted (Varies from methods to methods)  Features are classified  The system is trained  Matching 7
  • 8. Related Works Existing methods so far we studied can be categorized by the following tree- 8
  • 9. Related works(contd.) Global & geometric Method(A. C. Verma,D. Saha,H. Saikia,2013): • Geometric data(aspect ratio, center of gravity, baseline shift etc.) are considered as feature • Mean of each feature calculated from the training data • Variance is used to calculate the Euclidian distance which is the basis of comparison The formula is- Limitations: • Cannot detect skilled forgery as the geometric value get closer • False accept occurs more often Angular based model(Prashanth & Raja, 2012): • Calculate average no. of rows and columns for random forgery detection • For skilled, split the image in two blocks recursively until 128 blocks have found on basis of geometric center • Angle and distance for all the center points of each block is calculated from the point (1,1) for feature extraction. Limitation: • Depends on global value(angle and distance) 9
  • 10. Related works(contd.) Grid Model(Madasu & Brian,2002): • Image is partitioned into 8 partitions using equal horizontal density approximation method. • Each Box portioned into 12 boxes (total 96 boxes) • calculate the summation of the angles of all points in each box taken with respect to the bottom left corner and normalize it for feature. Limitations: • Even a little change in the signature leads to much change in the result. Radon transform model(Kiani & Pourreza,2011): • Computes projection sum of the image intensity along a radial line oriented at a specific angle with the formula- Where the δ(r) is Dirac function. • Computation of Radon Transform is its projections across the image at arbitrary orientations θ and offsets ρ which is used as feature Limitations: • False reject rate is little high for this method 10
  • 11. Related works(contd.) SURF model(Bay & Gool,2006): • First, key point is detected using fast Hessian Detector and Haar wavelet. The formula of Hessian matrix is- • Then SURF descriptor is extracted using assignment orientation. Limitations: • The time needed to detect can be beaten today G-SURF model(Pal, Chanda & Franke,2012): • Uses Gabor filter along with SURF algorithm • A two dimensional Gabor Filter in spatial domain can be defined as follows- Limitations: • Though it overcomes the performance of SIFT and SURF, still need to be upgraded 11
  • 12. Related works(contd.) Harris Corner Detection: • This method detects corner first recognizing the points by looking the intensity within the small window • Shifting the window in any direction should yield a large change in appearance • Different output can be gained by setting a desirable threshold value Feature descriptor: • Describe a point assigning orientation around it • Divides the surrounding area into 16 blocks, each blocks have a histogram of 8 bins each • So, each point has a (16x8) 128 long feature vector 12
  • 13. Proposed Method  Preprocessing • Noise removal • Isolating area of interest • Assignment orientation for rotation invariance  Keypoint detection using Harris Corner Detection  Creating Feature descriptor • Creating 16 blocks around the keypoint • Calculate gradient magnitude and direction • Weigh the magnitude with Gaussian filter • Create 8 bin histogram • Each point have 128(16x8) bin  Classify the descriptors using KNN classifier  Compare the prototype with the testing signature 13
  • 14. Proposed Method(Contd.) • Further checking for skilled Forgery A high level of skilled forgery may pass the above test but those can be further detected using the following tests:  Edge thickness will be calculated to detect overwriting  Straightness of the edges will be checked  Sudden blobs in the signature need to be detected  End point will be checked to detect sharp finish If a Signature Passes all those tests we consider it as a authentic signature. 14
  • 15. Dataset & Implementation  Dataset  We have collected our dataset from different persons. Signature s was taken in white paper and scanned for training our system.  Similarly we took forged and genuine version of the signatures for testing the performance of different verification method we implemented. Global & Geometric Method: After implementing this method we compared its performance for varying threshold of acceptance. The graph at the right represents its performance.  As the threshold is increased FAR increases but FRR is decreases somewhat proportionately. 15
  • 16. Implementation(Cont.) Implementation of the proposed method For implementation of the proposed method we followed the following steps: 1. Pre-processing: The pre-processing involves different steps. We performed the following steps in sequences: Cropping the area of interest, noise removal and binarisation. 2. Key point extraction: We used Harris Corner detection to find out the key point of the supplied signature. The following right image shows the signature after key point has been extracted from supplied left signature. 3. Feature descriptor For each keypoint a feature vector of length 128 has been calculated. This vector contain the histogram of orientation around the point. 16
  • 17. Future Works • So far we have figured out several problems of existing methods of signature detection through implementation • Still we did not implemented our proposed method but from the implementation & analysis of existing method we can say that it will give us better performance • So our future work is to implement the proposed method so that it can ensure-  more robust with rotation invariance  robustness in noise  robust in variant ink with minimum complexity 17
  • 19. References • A. C. Verma,D. Saha, H. Saikia; ’FORGERY DETECTION IN OFFLINE HANDWRITTENSIGNATURE USING GLOBAL AND GEOMETRIC FEATURES’, IJCER(Vol.2, Issue 2, April 2013) • Prashanth C R, K B Raja, Venugopal K R, L M Patnaik,’ Intra-modal Score level Fusion for Off- line Signature Verification’, IJITEE, ISSN: 2278-3075, Vol.1, Issue 2, July 2012 • Prashanth C. R. and K. B. Raja,’ Off-line Signature Verification Based on Angular Features’ IJMO, Vol. 2, No. 4, August 2012 • M.Radmehr, S.M.Anisheh, I.Yousefian,’ Offline Signature Recognition using Radon Transform’, WASET, Vol:6 2012-02-28 • Bay H,Tinne t.,Gool l.,’ SURF: Speeded Up Robust Features’; • Samaneh G., Mohsen E., i Moghaddam, “Off-line Persian Signature Identification and Verification Based on Image Registration and Fusion,” Journal of Multimedia, Vol. 4, No. 3, pp.137-144, June 2009. • Jesus F Vargas, Miguel A Ferrer, Carlos M Travieso, and Jesus B Alonso, “Off-line Signature Verification Based on Psuedo-Cepstral Coefficients,” International Conference on Document Analysis and Recognition, pp. 126-130, 2009 • V A Bharadi and H B Kekre, “Off-line Signature Recognition Systems,” International Journal of Computer Applications, Vol. 1, No. 27, pp. 61-70, 2010 19