SlideShare a Scribd company logo
TELKOMNIKA Telecommunication, Computing, Electronics and Control
Vol. 18, No. 6, December 2020, pp. 2903~2910
ISSN: 1693-6930, accredited First Grade by Kemenristekdikti, Decree No: 21/E/KPT/2018
DOI: 10.12928/TELKOMNIKA.v18i6.17069  2903
Journal homepage: http://journal.uad.ac.id/index.php/TELKOMNIKA
Offline signatures matching using haar wavelet subbands
Zinah S. Abduljabbar1
, Zainab J. Ahmed2
, Noor Khalid Ibrahim3
1,3
Department of Computer Science, College of Science, Mustansiriyah University, Iraq
2
Department of Biology Science, College of Science, University of Baghdad, Iraq
Article Info ABSTRACT
Article history:
Received Jun 26, 2020
Revised Jul 20, 2020
Accepted Aug 21, 2020
The complexity of multimedia contents is significantly increasing in the current
world. This leads to an exigent demand for developing highly effective systems to
satisfy human needs. Until today, handwritten signature considered an important
means that is used in banks and businesses to evidence identity, so there are many
works tried to develop a method for recognition purpose. This paper introduced an
efficient technique for offline signature recognition depending on extracting the
local feature by utilizing the haar wavelet subbands and energy. Three different sets
of features are utilized by partitioning the signature image into non overlapping
blocks where different block sizes are used. CEDAR signature database is used as
a dataset for testing purpose. The results achieved by this technique indicate a high
performance in signature recognition.
Keywords:
Energy
Haar wavelet
Signature recognition
This is an open access article under the CC BY-SA license.
Corresponding Author:
Zinah S. Abduljabbar,
Department of Computer Science, College of Science,
Mustansiriyah University,
Baghdad, Iraq.
Email: zinahsadeq@uomustansiriyah.edu.iq
1. INTRODUCTION
Lately a major amount of research effort is being dedicated in developing the algorithms and
techniques related to signatures field. Behavioral, physiological and psychological characteristics are used in
biometric systems for identifying the individual. Handwritten signatures are a type of the behavioral
characteristics, although with the development of other biometric characteristics but the signature remain quite
important [1]. Therefore, signature is an important guide to validate a document handwritten signature of a
person which recognized by signature verification [2]. Despite the great development in knowledge-based
systems, handwriting signatures remain of particular importance and this may be due to the fact that those
systems require user guides in the form of information, often a password and id, to verify the identity of
the individual, in addition to the above, the signature cannot be stolen or missing [3]. Methodology of signature
recognition comprises four general steps which are: data acquisition, pre-processing, feature extraction and
matching. There are two categories in handwritten signatures according to the method of data acquisition:
on-line (dynamic approach) and off-line (static approach).
Any person may use letters or symbols or a combination of both to represent the signature.
Accordingly, the signature must be treated as an image [4]. In offline mode camera and scanner are used to
obtain the images of the signatures from a paper, in such situation noisy signatures are acquired compared to
these in on-line mode [5]. Many studies have been introduced as literature. Hazem et al. [6] presented a system for
verification the off-line signature. The system comprises of four steps: preprocessing step, registration of signature,
feature extraction and verification step. Discrete wavelet transform (DWT) was used in this system to extract
 ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 6, December 2020: 2903 - 2910
2904
the feature from signature and mathematical formulae with logical operations were utilized in verification step.
The system obtained good measures for verification [6].
Doroz et al. [7] introduced a new method for verification the handwriting signatures. In this method
the signature was described by creating a complex characteristic for each signature, the created characteristics
were based on dependencies analysis between the dynamic characteristics which registered in the tables.
Complex characteristics were utilized to create vectors for describing characteristics, by using the suggested
measures, the elements of vectors were computed. Evaluated the similarity between the signatures had been
accomplished by determining the similarity of corresponding vectors of the compared signatures. 96.67% was
the results obtained by this method [7].
Malik and Arova [3] presented a method for signature recognition. Euler number was used to study
the signatures of various people. Their adopted method consists of three phases. In the first phase, two sets of
feature vectors were generated by extracting the features of training signatures dataset and features of testing
signatures. In the second phase, using Manhattan distance classifier to compare between the training signature
feature and the set of the feature of the testing signatures. The result of recognition was displayed to the user
in the last phase. The train and test data which used in dataset had a little change but the suggested method can
be extended to dataset which had a great change of the train and test data [3].
Hedjaz et al. [8] introduced an approach for recognition the offline signature. Binary statistical image
features (BSIF) and local binary patterns (LBP) were used to extract the features. Two public datasets were
used: MCYT-75 and GPD-100. By utilizing a K-nearest neighbor (KNN) classifier a performance of
recognition reaches 97.3% for MCYT-75 and 96.1% for GPDS-100 [8]. The main contribution of this paper as
follow: to introduced an efficient technique for offline signature recognition depending on extracting the local
feature by utilizing the haar wavelet subbands and energy.
2. PROPOSED SYSTEM
This work aims to develop an efficient technique for offline signature recognition depending on
extracting the local feature by utilizing the haar wavelet subbands and energy. The proposed approach is
composed of the following steps: The layout of the suggested signature system is appeared in Figure 1.
The flow of the proposed work is as follows: the system consists of three main phases: pre-processing phase,
feature extraction, binarization and matching, the details of each one is introduced in the next sections.
Figure 1. The layout of system model
2.1. Pre-processing phase
The preprocessing phase consists of some steps, due to the noise that occurs in offline signatures
mode, pre-processing is an essential point to start a real treatment phase where the importance of pre-processing
lies in getting rid of the visual and unwanted information in the signature form and establishes to prepare for
successful feature extraction.
TELKOMNIKA Telecommun Comput El Control 
Offline signatures matching using haar wavelet subbands (Zinah S. Abduljabbar)
2905
2.1.2. Load signature image stage
The pre-processing first involves loading and preparing the signature image by obtaining a gray-scale
image (GI) from a BMP image (I), loads an image into a variable of type of image. Four types of images (.gif,
.jpg, .tga, .png) images may be loaded. To load correctly, images must be located in the data directory of
the current sketch. The gray-scale image should enhance to gain the best results as clarify below:
2.1.3. Enhancement stage on signature image
Four steps are applied in order to enhance the signature image and obtain a clearer form:
− Inversion the color
As mentioned earlier, the signature image which obtained by a camera or scanner is noisier than others
image in on-line situation approach and accordingly color inversion process is utilized to allocate the required
region by specifying only the important data (signature's part) and cancelation the unwanted data surrounding
to the signature. By moving (𝑛 ∗ 𝑛) window on the gray-scale signature image and at each instance position in
the window the threshold is applied as described in (1):
𝐺𝐼̅̅̅(𝑖, 𝑗) = {
𝑚𝑒𝑎𝑛 − 𝐺𝐼(𝑖, 𝑗) 𝑖𝑓 𝐺𝐼(𝑖, 𝑗) < 𝑚𝑒𝑎𝑛
0 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
(1)
where 𝐺𝐼̅̅̅̅is the signature image after inversion it’s color.
− Removing the noise
Noise reduction is an essential step in image processing due to its importance in obtaining better
results, the block matching with three-dimensional filtering (BM3D) denoising is used in this step. Many
studies shown that the BM3D filter is very important in term of noise reduction due to its results comparing
with other filters [9, 10]. The implementation of this filter is explained in detail in [11]
− Contrast
The subjective criteria of images are important for human visualization, so an appropriate contrast in
an image is desired to make the signature more distinct from the background and other objects. Visual
properties of an image are enhanced by applying a method proposed in [12].
In this method a global mean 𝐺 𝑚𝑒𝑎𝑛 is computed by applying average filter on the whole input image
while local means𝐿 𝑚𝑒𝑎𝑛 are computed by applying the same filter on each 3 × 3 block in an image. By applying
the transformation in (2):
𝑂(𝑖, 𝑗) = 𝑁(𝑖, 𝑗) + [𝐿 𝑚𝑒𝑎𝑛 − 𝐺 𝑚𝑒𝑎𝑛] (2)
where 𝑂(𝑖, 𝑗) acts the pixels of the image after contrast process and 𝑁(𝑖, 𝑗) acts the pixels of the image after
applying BM3D filter.
− Segmentation
Focusing on the signature area in the image and neglecting the remaining unimportant parts is
the primary goal at this step. This is achieved by detecting each row and column, then removes these rows and
columns which don't contain the signature's information. Recently, more attention paid on the unsupervised
image co-segmentation approach, where the segments are forced to be consistent across a collection of similar
images. Many natural image collections contain similar or related objects. For instance, photo collections of a
particular theme.
2.1.4. Binarization
Image binarization is one of the basic pre-processing steps that leads to a considerable reduction in
the amount of information that is undergo to further analysis, which leads to faster implementation and this is
very useful in applications which required the recognition of the shape rather than the color analysis [13].
The most important aspect of this operation is to find the appropriate threshold value, assigning a single value
to threshold and apply this value to whole image is called global binarization technique [14]. In this work
the best threshold value is determined by test and the output of binarization operation is a signature image
contain 1's and 0's for all pixels according the following in (3):
𝑏(𝑖, 𝑗) = {
1 𝑖𝑓 𝑓(𝑖, 𝑗) ≥ 𝑡ℎ𝑟𝑒𝑠ℎ𝑜𝑙𝑑
0 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
(3)
 ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 6, December 2020: 2903 - 2910
2906
2.1.5. Morphological operation
Thinning is a type of morphological operation; the goal of thinning process is to find the skeleton of
on object. A skeleton that finds the fundamental topology and the information's shape of the required object in
a simple form is very important to hold different problems. To achieve the morphological operation,
Zhang Suen algorithm is applied because it's fastest and the implementation of this algorithm is simple; after
the binary image is used as input, decreases the pixels and represent the skeleton of the signature in one-pixel
width [15, 16].
2.2. DWT and feature extraction phase
The wavelet is an efficient multi-resolution technique for sub-band decomposition, and this is
performed by implementing a digital filtering [17-19]. The low and high pass filters are used to obtain
the approximation information and detail information respectively [17]. DWT utilizing filtering and sub-
sampling to decompose the signature image in multi scales which leads to reveals the redundancies in many
scales.
2.2.1. Haar wavelet transform
Haar wavelet transform is used to extract the local features in the signature image. One of
the important aspect of haar wavelet transform is to find corners and contours [18-21]. The reason for choosing
the haar wavelet in this work is due to its being required low computational cost, fast and each sub bands
(detail) contains a special edges type [22-26].
2.2.2. Applying DWT and find the features
Four sub-bands are generated after performing 2-D wavelet transform. the low-low sub-band denoted
(LL) containing the approximation of the enhanced input image, where the details of the same image in
different directions are contained on three sub-bands (high-pass) where (HL), (LH) and (HH) for horizantal,
vertical and diagonal direction respectively. Different block sizes are used in this work and three methods are
adopted in order to find the vector for the required features by using the (4-8) as shown in Figure 2.
𝐸𝑛𝑒𝑟𝑔𝑦 = ∑ ∑ 𝑤𝑎𝑣𝑒𝑙𝑒𝑡(𝑥, 𝑦)2𝑦𝑒−1
𝑦=𝑦𝑠
𝑥𝑒−1
𝑥=𝑥𝑠 (4)
𝑝 𝐸 = 𝐸𝑛𝑒𝑟𝑔𝑦(𝐿𝐻) + 𝐸𝑛𝑒𝑟𝑔𝑦(𝐻𝐿) + 𝐸𝑛𝑒𝑟𝑔𝑦(𝐻𝐻) (5)
𝑁𝑜𝑟𝑚 = ∑ ∑ |𝑤𝑎𝑣𝑒𝑙𝑒𝑡(𝑥, 𝑦)|0.5𝑦𝑒−1
𝑦=𝑦𝑠
𝑥𝑒−1
𝑥=𝑥𝑠 (6)
𝑃 𝑁 = 𝑁𝑜𝑟𝑚(𝐿𝐻) + 𝑁𝑜𝑟𝑚(𝐻𝐿) + 𝑁𝑜𝑟𝑚(𝐻𝐻) (7)
𝑁𝑜𝑟𝑚 = ∑ ∑ |𝑤𝑎𝑣𝑒𝑙𝑒𝑡(𝑥, 𝑦)|0.75𝑦𝑒−1
𝑦=𝑦𝑠
𝑥𝑒−1
𝑥=𝑥𝑠 (8)
2.3. Matching phase
In this phase, generation of the template from training samples and feature matching are used to obtain
the similarity degree between the training samples and entered signatures. Numerical value is the output of
matching phase, so high result indicate that the signature sample belongs to the same signature. Normalized
mean square differences (NMSD) and normalized mean absolute difference (NMAD) are used to determine
the similarity degree.
2.3.1. Generation the template
In order to generate the template a number of signature are utilized for each individual as samples for
training. The template of an individual contains all features which extracted from all the training samples. For
each person a mean feature vector and concerning standard deviation are kept in data base. The following in
(9, 10) are used to calculate the mean and standard deviation.
𝐹̅(𝑝 𝑛𝑜, 𝑓𝑛𝑜) =
1
𝑠
∑ 𝐹(𝑝 𝑛𝑜, 𝑠 𝑛𝑜, 𝑓𝑛𝑜)𝑠
𝑠 𝑛𝑜=1 (9)
𝜎(𝑝 𝑛𝑜, 𝑓𝑛𝑜) = √
1
𝑠
∑ (𝐹(𝑝 𝑛𝑜, 𝑠 𝑛𝑜, 𝑓𝑛𝑜) − 𝐹̅(𝑝 𝑛𝑜, 𝑓𝑛𝑜))2𝑠
𝑠 𝑛𝑜=1 (10)
where 𝑝 𝑛𝑜 is a person number, 𝑠 𝑛𝑜 is a sample number and 𝑓𝑛𝑜 is a feature number, F acts the features vector
and 𝑠 represent the total number of samples.
TELKOMNIKA Telecommun Comput El Control 
Offline signatures matching using haar wavelet subbands (Zinah S. Abduljabbar)
2907
Figure 2. Methods of feature extraction
2.3.2. Features matching
For the purpose of features matching, statistical analysis is used. NMSD and NMAD are adopted to
discover the nearest stored match with the given entered signature. Consequently, the output of this stage is to
determine whether the signatures samples belong to the same signature or not, in (11, 12).
𝑁𝑀𝑆𝐷 = (𝑝 𝑛𝑜, 𝑓𝑛𝑜) = ∑ (
𝐹(𝑝 𝑛𝑜,𝑠 𝑛𝑜,𝑓𝑛𝑜)−𝐹̅(𝑝 𝑛𝑜,𝑓𝑛𝑜)
𝜎(𝑝 𝑛𝑜,𝑓𝑛𝑜)
)
2
(11)
𝑁𝑀𝐴𝐷 = (𝑝 𝑛𝑜, 𝑓𝑛𝑜) = ∑ |
𝐹(𝑝 𝑛𝑜,𝑠 𝑛𝑜,𝑓𝑛𝑜)−𝐹̅(𝑝 𝑛𝑜,𝑓𝑛𝑜)
𝜎(𝑝 𝑛𝑜,𝑓𝑛𝑜)
| (12)
3. RESULTS
The performance of the techniques used in this paper was evaluated and compared to other existing
techniques. Furthermore, the performance of the efficient technique for offline signature recognition was
evaluated in terms of its recognition and compared to other feature selection techniques. Three different sets
of features are utilized by partitioning the signature image into non overlapping blocks where different block
sizes are used. CEDAR signature database is used as a dataset for testing purpose. All the experiments and
the results achieved are presented in this section.
3.1. Performance analysis
The performance of the haar wavelet subbands and energy techniques and the feature extraction
techniques was analyzed. From CEDAR database [19] the dataset is utilized in the testing process. The dataset
is consisted of 55 persons and twelve signature samples for each person, each signature image is a .bmp file
type with 24 bit/pixel. Five features (LL, HL, LH, HH and power) are utilized by applying 1-level
decomposition of haar wavelet transform. 21*23 is selected as the size of block with the methods of matching
and for one set of features, results are described in Tables 1, 2 and 3.
 ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 6, December 2020: 2903 - 2910
2908
Table 1. The rate of recognition using the energy with one set of features
Matching Methods LL LH HL HH Pow (PE)
NMAD 88.182 63.636 76.364 55.303 68.182
NMSD 97.727 90.606 93.788 81.970 90.000
Table 2. The rate of recognition using PN = 0.5 with one set of features
Matching Methods LL LH HL HH Pow (PN)
NMAD 67.424 43.788 50.000 39.697 45.000
NMSD 87.121 65.303 70.303 54.242 60.152
Table 3. The rate of recognition using PN = 0.75 with one set of features
Matching Methods LL LH HL HH Pow (PN)
NMAD 69.697 46.061 53.939 41.364 46.667
NMSD 89.394 68.788 74.242 56.364 64.697
Ten features (LL-LH, LL-HL, LL-HH, LL-pow, LH-HL, LH-HH, LH-pow, HL-HH, HL-pow and
HH-pow) are the results of combining the two features of haar wavelet transform (two sets of features).
The recognition rates are presented in Tables 4 showed the rate of recognition using the energy with two sets
of features, Table 5 showd the rate of recognition using PN = 0.5 with two sets of features 5 and 6 by using
the matching methods with block size equals to 21*23. Table 6 show the rate of recognition using PN = 0.75
with two sets of features
Table 4. The rate of recognition using the energy with two sets of features
Matching
Methods
LL-LH LL-HL LL-HH
LL-Pow
(PE)
LH-HL LH-HH
LH-Pow
(PE)
HL-HH
HL-Pow
(PE)
HH-Pow
(PE)
NMAD 82.4242 88.1818 79.2424 81.6667 83.1818 66.0606 70.7576 69.6970 75.4545 61.9697
NMSD 98.1818 97.5758 97.1212 96.3636 98.1818 93.0303 94.3939 94.0909 93.7879 88.0303
Table 5. The rate of recognition using PN = 0.5 with two sets of features
Matching
Methods
LL-LH LL-HL LL-HH
LL-Pow
(PN)
LH-HL LH-HH
LH-Pow
(PN)
HL-HH
HL-Pow
(PN)
HH-Pow
(PN)
NMAD 57.7273 60.6061 53.4848 57.1212 50.7576 43.3333 45.7576 45.4545 47.2727 42.5758
NMSD 81.8182 83.3333 78.9394 79.6970 74.0909 63.3333 66.2121 64.8485 68.3333 57.4242
Table 6. The rate of recognition using PN = 0.75 with two sets of features
Matching
Methods
LL-LH LL-HL LL-HH
LL-Pow
(PN)
LH-HL LH-HH
LH-Pow
(PN)
HL-HH
HL-Pow
(PN)
HH-Pow
(PN)
NMAD 61.0606 65.6061 56.9697 60.0000 55.4545 44.5455 47.4242 47.2727 50.4545 44.0909
NMSD 86.8182 86.9697 83.1818 84.6970 79.3939 68.0303 69.5455 70.3030 73.1818 61.2121
Also, ten features (LL-LH-HL, LL-LH-HH, LL_HL-HH, LL-LH-pow, LL-HL-pow, LL-HH-pow,
LH-HL-HH, LH-HL-pow, LH-HH-pow and HL-HH-pow) are the results of combining three features of haar
wavelet transform (three sets of features) and as previous step, by applying the matching methods with block
size equals to 21*23 the recognition rates are showed in Tables 7, 8 and 9. All the results above indicates
that the best results when using energy, so the Tables 10-12 are allocated to test different sizes for blocks
with energy. All the previous results recorded in the three tables showed that 21*23 is the best size to block.
Table 7. The rate of recognition using the energy with three sets of features
Matching
Methods
LL-
LH-HL
LL-
LH-HH
LL-
HL-HH
LL-LH-
Pow (PE)
LL-HL-
Pow (PE)
LL-HH-
Pow (PE)
LH-
HL-HH
LH-HL-
Pow (PE)
LH-HH-
Pow (PE)
HL-HH-
Pow (PE)
NMAD 86.364 77.576 82.576 80.000 83.939 76.364 75.000 78.030 67.273 69.545
NMSD 98.485 98.030 96.970 97.424 96.667 95.909 96.667 96.818 93.333 93.333
TELKOMNIKA Telecommun Comput El Control 
Offline signatures matching using haar wavelet subbands (Zinah S. Abduljabbar)
2909
Table 8. The rate of recognition using PN = 0.5 with three sets of features
Matching
Methods
LL-
LH-HL
LL-
LH-HH
LL-
HL-HH
LL-LH-
Pow (PN)
LL-HL-
Pow (PN)
LL-HH-
Pow (PN)
LH-
HL-HH
LH-HL-
Pow (PN)
LH-HH-
Pow (PN)
HL-HH-
Pow (PN)
NMAD 57.576 51.667 53.485 54.545 54.848 50.455 46.818 49.242 44.394 45.758
NMSD 81.212 76.970 78.333 77.879 79.091 75.152 69.545 71.515 63.939 64.091
Table 9. The rate of recognition using PN = 0.75 with three sets of features
Matching
Methods
LL-
LH-HL
LL-
LH-HH
LL-
HL-HH
LL-LH-
Pow (PN)
LL-HL-
Pow (PN)
LL-HH-
Pow (PN)
LH-
HL-HH
LH-HL-
Pow (PN)
LH-HH-
Pow (PN)
HL-HH-
Pow (PN)
NMAD 61.061 56.364 56.515 57.273 58.788 53.788 50.152 51.970 45.303 47.576
NMSD 85.758 80.606 83.030 81.818 83.636 78.939 75.152 75.606 68.182 69.091
Table 10. The rate of recognition of the one set of features with the energy
Block size LL LH HL HH Pow (PE)
Blk=5×7 73.9394 68.0303 74.5455 58.1818 67.4242
Blk=7×9 79.0909 72.4242 77.4242 61.6667 72.4242
Blk=9×11 85.3030 78.4848 80.3030 65.6061 76.9697
Blk=11×13 89.0909 82.1212 83.9394 68.4848 79.0909
Blk=13×15 92.1212 85.7576 87.2727 70.6061 81.6667
Blk=15×17 95.3030 88.7879 89.5455 74.5455 86.3636
Blk=17×19 95.3030 90.1515 90.7576 74.0909 83.6364
Blk=19×21 96.5152 93.6364 92.8788 82.4242 89.6970
Blk=21×23 97.7273 90.6061 93.7879 81.9697 90.0000
Table 11. The rate of recognition using two sets of features with the energy
Block size LL-LH LL-HL LL-HH
LL-Pow
(PE)
LH-HL LH-HH
LH-Pow
(PE)
HL-HH
HL-Pow
(PE)
HH-Pow
(PE)
Blk=5×7 77.1212 79.3939 71.8182 72.7273 82.2727 69.6970 73.4848 73.3333 74.8485 65.3030
Blk=7×9 82.5758 83.7879 76.0606 78.3333 86.9697 73.9394 78.3333 77.7273 79.8485 69.8485
Blk=9×11 87.8788 87.4242 82.8788 83.3333 89.3939 78.9394 83.0303 79.3939 81.9697 73.3333
Blk=11×13 91.6667 90.1515 85.9091 86.8182 91.2121 82.4242 85.0000 82.7273 85.6061 75.3030
Blk=13×15 94.3939 92.5758 90.0000 91.2121 94.6970 85.0000 88.9394 87.5758 89.2424 79.2424
Blk=15×17 95.9091 95.1515 93.6364 93.7879 95.9091 87.4242 91.0606 88.7879 91.5152 83.3333
Blk=17×19 96.3636 95.9091 93.3333 94.2424 95.9091 87.7273 90.3030 90.0000 91.0606 80.1515
Blk=19×21 97.7273 96.9697 95.9091 96.2121 97.4242 92.2727 93.7879 92.4242 93.4848 89.0909
Blk=21×23 98.1818 97.5758 97.1212 96.3636 98.1818 93.0303 94.3939 94.0909 93.7879 88.0303
Table 12. The rate of recognition using three sets of features with the energy
Block size
LL-LH-
HL
LL-LH-
HH
LL-HL-
HH
LL-LH-
Pow (PE)
LL-HL-
Pow (PE)
LL-HH-
Pow (PE)
LH-HL-
HH
LH-HL-
Pow (PE)
LH-HH-
Pow (PE)
HL-HH-
Pow (PE)
Blk=5×7 82.4242 75.4545 78.3333 75.6061 77.7273 71.9697 79.6970 80.4545 71.9697 73.0303
Blk=7×9 86.3636 80.1515 82.1212 81.0606 82.4242 76.6667 82.8788 84.6970 76.5152 77.8788
Blk=9×11 89.8485 85.7576 84.8485 86.0606 86.0606 82.4242 86.8182 88.0303 81.0606 80.3030
Blk=11×13 91.5152 88.6364 88.3333 88.9394 88.7879 86.0606 89.2424 89.5455 83.3333 82.7273
Blk=13×15 94.3939 92.4242 91.5152 93.0303 91.5152 89.5455 92.2727 92.4242 86.3636 86.8182
Blk=15×17 96.2121 95.0000 94.2424 95.0000 94.2424 92.7273 93.9394 94.3939 88.7879 88.6364
Blk=17×19 96.9697 94.6970 94.6970 95.1515 94.5455 91.3636 94.0909 94.3939 88.4848 89.6970
Blk=19×21 98.0303 96.9697 96.8182 97.1212 96.5152 94.6970 96.2121 96.3636 91.9697 92.1212
Blk=21×23 98.4848 98.0303 96.9697 97.4242 96.6667 95.9091 96.6667 96.8182 93.3333 93.3333
4. CONCLUSION
Offline signature verification is a task that benefits from matching both the global shape and local
details an efficient technique for offline signature recognition depending on extracting the local feature by
utilizing the haar wavelet subbands and energy was introduced, it consists of three stages. In preprocessing
stage, the signature image was enhanced by applying many operations where the features were extracted by
utilizing the haar wavelet subbands with energy in feature extraction stage. NMSD and NMAD were used in
matching phase, the results indicated a high recognition rate (98.4848) when three sets of features were used
with block size equal to 21*23. The plans for feature include: using another partitioning method like Quadtree.
Using different types and shapes for signature.
 ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 6, December 2020: 2903 - 2910
2910
ACKNOWLEDGMENT
The author’s thanks the "Department of Computer Science", "Collage of Science", "Mustansiriyah
University", for supporting this work.
REFERENCES
[1] B. M. Al-Maqaleh, A. M. Qaid Musleh “A Survey on Handwritten Signature Verification Approaches,”
Communications on Applied Electronics, vol. 4, no. 8, pp. 23-29, 2016.
[2] A. Sanmorino, S. Yazid, “A Survey for Handwritten Signature Verification,” International Conference on Uncertainty
Reasoning and Knowledge Engineering, IEEE, 2012.
[3] V. Malik, A. Arora, “Signature Recognition using Matlab,” International Journal for Research in Applied Science &
Engineering, vol. 3, no. VI, pp. 682-7, 2015.
[4] S. S. Muhamed, M. S. Al-Ani, “Signature Recognition based on Discrete Wavelet Transform,” UHD Journal of
Science and Technology, vol. 3, no. 1, pp. 19-29, 2019.
[5] P. Bhumika, S. Kumar “A Survey on Handwritten Signature Verification Techniques,” International Journal of
Advance Research in Computer Science and Management Studies, vol. 3, no. 1, 2015.
[6] H. Hiary, R. Alomari, T. Kobbaey, et al., “Off-Line Signature Verification System Based on DWT and Common
Features Extraction,” Journal of Theoretical and Applied Information Technology, vol. 51, no. 2, pp. 165-174, 2013.
[7] R. Doroz, M. Palys, T. Orczyk, H. Safaverdi, “Method of Signature Recognition with the Use of the Complex
Features,” Journal of Medical Informatics & Technologies, vol. 23, pp. 155-162, 2014.
[8] H. Hezil, R. Djemili, H. Bourouba, “Signature Recognition Using Binary Features and KNN,” International Journal
of Biometrics, vol. 10, no. 1, 2018.
[9] K. M. Aishwarya, Ajith Rao A. S., V. Singh, “A Comparative Study of Edge Detection in Noisy Images Using BM3D
Filter,” International Journal of Engineering Research & Technology, vol. 5, no. 9, pp. 142-147, 2016.
[10] M. Hasan, Mahmoud R. E-Sakka, “Improved BM3D Image Denoising Using SSIM-Optimized Wiener Filter,”
EURASIP Journal on Image and Video Processing, vol. 2018, no. 25, pp. 1-12, 2018.
[11] M. Lebrun, “An Analysis and Implementation of the BM3D Image Denoising Method,” Image Processing on Line,
vol. 2, pp. 175-213, 2012.
[12] A. Singh, S. Yadav, N. Singh, “Contrast Enhancement and Brightness Preservation Using Global-Local Image
Enhancement Techniques,” Fourth International Conference on Parallel, Distributed and Grid Computing, 2016.
[13] H. Michalak, K. Okarma, “Improvement of Image Binarization Methods Using Image Processing with Local Entropy
Filtering for Alphanumerical Character Recognition Purposes,” entropy, vol. 21, no. 6, pp. 1-18, 2019.
[14] Puneet, N. K. Garg, “Binarization Techniques used for Grey Scale Images,” International Journal of Computer
Application, vol. 71, no. 1, pp. 8-11, 2013.
[15] F. Haseena, R. Clara, “Performance Analysis of Iterative Thinning Methods Using Zhang Suen and Stentiford
Algorithm,” International Conference on Advancements in Computing Technologies, vol. 4, no. 2, 2018.
[16] D. Gupta, S. Choubey, “Discrete Wavelet Transform for Image Processing,” International Journal of Emerging
Technology and Advanced Engineering, vol. 4. no. 3, 2015.
[17] M. J. Gomez, C. Castejon, Juan C. Garcia, “Review of Recent Advances in the Application of the Wavelet Transform
to Diagnose Cracked Rotors,” Algorithms, vol. 9, no. 1, pp. 1-13, 2016.
[18] I. Sharif, S. Khare, “Comparative Analysis of Haar and Daubechies Wavelet for Hyper Spectral Image Classification” The
International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, vol. XL-8, 2014.
[19] FVC2004, “Fingerprint verification competition 2004,” 2004. [Online]. Available: http://bias.csr.unibo.it/fvc2004/
[20] Z. H. Salih, G. T. Hasan, and M. A. Mohammed, "Investigate and analyze the levels of electromagnetic radiations
emitted from underground power cables extended in modern cities," 2017 9th International Conference on
Electronics, Computers and Artificial Intelligence (ECAI), 2017.
[21] Z. H. Salih, G. T. Hasan, M. A. Mohammed, et al., "Study the Effect of Integrating the Solar Energy Source on
Stability of Electrical Distribution System," 2019 22nd International Conference on Control Systems and Computer
Science (CSCS), pp. 443-447, 2019.
[22] N. Q. Mohammed, M. S. Ahmed, M. A. Mohammed, et al., "Comparative Analysis between Solar and Wind Turbine
Energy Sources in IoT Based on Economical and Efficiency Considerations," 2019 22nd International Conference on
Control Systems and Computer Science (CSCS), pp. 448-452, 2019.
[23] M. A. Mohammed, I. A. Mohammed, R. A. Hasan, et al., "Green Energy Sources: Issues and Challenges," 2019 18th
RoEduNet Conference: Networking in Education and Research (RoEduNet), pp. 1-8, 2019.
[24] N. D. Zaki, N. Y. Hashim, Y. M. Mohialden, M. A. Mohammed, T. Sutikno, and A. H. Ali, "A real-time big data
sentiment analysis for iraqi tweets using spark streaming," Bulletin of Electrical Engineering and Informatics, vol. 9,
no. 6, pp. 1411-1419, 2020.
[25] H. R. Ibraheem, Z. F. Hussain, S. M. Ali, M. Aljanabi, M. A. Mohammed, and T. Sutikno, "A new model for large
dataset dimensionality reduction based on teaching learning-based optimization and logistic regression,"
TELKOMNIKA Telecommunication Computing Electronics and Control, vol. 18, no. 3, pp. 1688-194, 2020.
[26] O. A. Hammood, N. Nizam, M. Nafaa, and W. A. Hammood, "RESP: Relay Suitability-based Routing Protocol for
Video Streaming in Vehicular Ad Hoc Networks," International Journal of Computers, Communications & Control,
vol. 14, no. 1, pp. 21-38, 2019.

More Related Content

What's hot

Successive Geometric Center Based Dynamic Signature Recognition
Successive Geometric Center Based Dynamic Signature RecognitionSuccessive Geometric Center Based Dynamic Signature Recognition
Successive Geometric Center Based Dynamic Signature Recognition
Dr. Vinayak Bharadi
 
Finger Print Image Compression for Extracting Texture Features and Reconstru...
Finger Print Image Compression for Extracting Texture Features  and Reconstru...Finger Print Image Compression for Extracting Texture Features  and Reconstru...
Finger Print Image Compression for Extracting Texture Features and Reconstru...
IOSR Journals
 
Automatic image slice marking propagation on segmentation of dental CBCT
Automatic image slice marking propagation on segmentation of dental CBCTAutomatic image slice marking propagation on segmentation of dental CBCT
Automatic image slice marking propagation on segmentation of dental CBCT
TELKOMNIKA JOURNAL
 
E1803012329
E1803012329E1803012329
E1803012329
IOSR Journals
 
A Simple Signature Recognition System
A Simple Signature Recognition System A Simple Signature Recognition System
A Simple Signature Recognition System
iosrjce
 
Modified Skip Line Encoding for Binary Image Compression
Modified Skip Line Encoding for Binary Image CompressionModified Skip Line Encoding for Binary Image Compression
Modified Skip Line Encoding for Binary Image Compression
idescitation
 
Choudhary2015
Choudhary2015Choudhary2015
Choudhary2015
Amit Kabra
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
I010244853
I010244853I010244853
I010244853
IOSR Journals
 
IRJET- A Review on Plant Disease Detection using Image Processing
IRJET- A Review on Plant Disease Detection using Image ProcessingIRJET- A Review on Plant Disease Detection using Image Processing
IRJET- A Review on Plant Disease Detection using Image Processing
IRJET Journal
 
14 offline signature verification based on euclidean distance using support v...
14 offline signature verification based on euclidean distance using support v...14 offline signature verification based on euclidean distance using support v...
14 offline signature verification based on euclidean distance using support v...
INFOGAIN PUBLICATION
 
The quality of image encryption techniques by reasoned logic
The quality of image encryption techniques by reasoned logicThe quality of image encryption techniques by reasoned logic
The quality of image encryption techniques by reasoned logic
TELKOMNIKA JOURNAL
 
IRJET- Crowd Density Estimation using Image Processing
IRJET- Crowd Density Estimation using Image ProcessingIRJET- Crowd Density Estimation using Image Processing
IRJET- Crowd Density Estimation using Image Processing
IRJET Journal
 
K1803015864
K1803015864K1803015864
K1803015864
IOSR Journals
 
1
11
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...
IJNSA Journal
 
Handwritten Signature Verification using Artificial Neural Network
Handwritten Signature Verification using Artificial Neural NetworkHandwritten Signature Verification using Artificial Neural Network
Handwritten Signature Verification using Artificial Neural Network
Editor IJMTER
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
Enhanced Image Compression Using Wavelets
Enhanced Image Compression Using WaveletsEnhanced Image Compression Using Wavelets
Enhanced Image Compression Using Wavelets
IJRES Journal
 
A Review of Optical Character Recognition System for Recognition of Printed Text
A Review of Optical Character Recognition System for Recognition of Printed TextA Review of Optical Character Recognition System for Recognition of Printed Text
A Review of Optical Character Recognition System for Recognition of Printed Text
iosrjce
 

What's hot (20)

Successive Geometric Center Based Dynamic Signature Recognition
Successive Geometric Center Based Dynamic Signature RecognitionSuccessive Geometric Center Based Dynamic Signature Recognition
Successive Geometric Center Based Dynamic Signature Recognition
 
Finger Print Image Compression for Extracting Texture Features and Reconstru...
Finger Print Image Compression for Extracting Texture Features  and Reconstru...Finger Print Image Compression for Extracting Texture Features  and Reconstru...
Finger Print Image Compression for Extracting Texture Features and Reconstru...
 
Automatic image slice marking propagation on segmentation of dental CBCT
Automatic image slice marking propagation on segmentation of dental CBCTAutomatic image slice marking propagation on segmentation of dental CBCT
Automatic image slice marking propagation on segmentation of dental CBCT
 
E1803012329
E1803012329E1803012329
E1803012329
 
A Simple Signature Recognition System
A Simple Signature Recognition System A Simple Signature Recognition System
A Simple Signature Recognition System
 
Modified Skip Line Encoding for Binary Image Compression
Modified Skip Line Encoding for Binary Image CompressionModified Skip Line Encoding for Binary Image Compression
Modified Skip Line Encoding for Binary Image Compression
 
Choudhary2015
Choudhary2015Choudhary2015
Choudhary2015
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
I010244853
I010244853I010244853
I010244853
 
IRJET- A Review on Plant Disease Detection using Image Processing
IRJET- A Review on Plant Disease Detection using Image ProcessingIRJET- A Review on Plant Disease Detection using Image Processing
IRJET- A Review on Plant Disease Detection using Image Processing
 
14 offline signature verification based on euclidean distance using support v...
14 offline signature verification based on euclidean distance using support v...14 offline signature verification based on euclidean distance using support v...
14 offline signature verification based on euclidean distance using support v...
 
The quality of image encryption techniques by reasoned logic
The quality of image encryption techniques by reasoned logicThe quality of image encryption techniques by reasoned logic
The quality of image encryption techniques by reasoned logic
 
IRJET- Crowd Density Estimation using Image Processing
IRJET- Crowd Density Estimation using Image ProcessingIRJET- Crowd Density Estimation using Image Processing
IRJET- Crowd Density Estimation using Image Processing
 
K1803015864
K1803015864K1803015864
K1803015864
 
1
11
1
 
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...
 
Handwritten Signature Verification using Artificial Neural Network
Handwritten Signature Verification using Artificial Neural NetworkHandwritten Signature Verification using Artificial Neural Network
Handwritten Signature Verification using Artificial Neural Network
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Enhanced Image Compression Using Wavelets
Enhanced Image Compression Using WaveletsEnhanced Image Compression Using Wavelets
Enhanced Image Compression Using Wavelets
 
A Review of Optical Character Recognition System for Recognition of Printed Text
A Review of Optical Character Recognition System for Recognition of Printed TextA Review of Optical Character Recognition System for Recognition of Printed Text
A Review of Optical Character Recognition System for Recognition of Printed Text
 

Similar to Offline signatures matching using haar wavelet subbands

Signature Verification using DCT
Signature Verification using DCTSignature Verification using DCT
Signature Verification using DCT
IRJET Journal
 
Deep hypersphere embedding for real-time face recognition
Deep hypersphere embedding for real-time face recognitionDeep hypersphere embedding for real-time face recognition
Deep hypersphere embedding for real-time face recognition
TELKOMNIKA JOURNAL
 
Traffic Sign Recognition using CNNs
Traffic Sign Recognition using CNNsTraffic Sign Recognition using CNNs
Traffic Sign Recognition using CNNs
IRJET Journal
 
Portable and Efficient Fingerprint Authentication System Based on a Microcont...
Portable and Efficient Fingerprint Authentication System Based on a Microcont...Portable and Efficient Fingerprint Authentication System Based on a Microcont...
Portable and Efficient Fingerprint Authentication System Based on a Microcont...
IJECEIAES
 
An Enhanced Authentication System Using Face and Fingerprint Technologies
An Enhanced Authentication System Using Face and Fingerprint TechnologiesAn Enhanced Authentication System Using Face and Fingerprint Technologies
An Enhanced Authentication System Using Face and Fingerprint Technologies
iosrjce
 
M017637484
M017637484M017637484
M017637484
IOSR Journals
 
Biometric Signature Recognization
 Biometric Signature Recognization Biometric Signature Recognization
Biometric Signature Recognization
Faimin Khan
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONPREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
ijcsity
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONPREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
ijcsity
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
ijcsity
 
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET Journal
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONPREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
ijcsity
 
Vein palm recognition model using fusion of features
Vein palm recognition model using fusion of featuresVein palm recognition model using fusion of features
Vein palm recognition model using fusion of features
TELKOMNIKA JOURNAL
 
K012647982
K012647982K012647982
K012647982
IOSR Journals
 
K012647982
K012647982K012647982
K012647982
IOSR Journals
 
IRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNNIRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNN
IRJET Journal
 
Offline Signature Verification and Recognition using Neural Network
Offline Signature Verification and Recognition using Neural NetworkOffline Signature Verification and Recognition using Neural Network
Offline Signature Verification and Recognition using Neural Network
International Journal of Science and Research (IJSR)
 
Gesture Recognition System
Gesture Recognition SystemGesture Recognition System
Gesture Recognition System
IRJET Journal
 
Distance Based Verification Technique for Online Signature System
Distance Based Verification Technique for Online Signature SystemDistance Based Verification Technique for Online Signature System
Distance Based Verification Technique for Online Signature System
IRJET Journal
 
A Transfer Learning Approach to Traffic Sign Recognition
A Transfer Learning Approach to Traffic Sign RecognitionA Transfer Learning Approach to Traffic Sign Recognition
A Transfer Learning Approach to Traffic Sign Recognition
IRJET Journal
 

Similar to Offline signatures matching using haar wavelet subbands (20)

Signature Verification using DCT
Signature Verification using DCTSignature Verification using DCT
Signature Verification using DCT
 
Deep hypersphere embedding for real-time face recognition
Deep hypersphere embedding for real-time face recognitionDeep hypersphere embedding for real-time face recognition
Deep hypersphere embedding for real-time face recognition
 
Traffic Sign Recognition using CNNs
Traffic Sign Recognition using CNNsTraffic Sign Recognition using CNNs
Traffic Sign Recognition using CNNs
 
Portable and Efficient Fingerprint Authentication System Based on a Microcont...
Portable and Efficient Fingerprint Authentication System Based on a Microcont...Portable and Efficient Fingerprint Authentication System Based on a Microcont...
Portable and Efficient Fingerprint Authentication System Based on a Microcont...
 
An Enhanced Authentication System Using Face and Fingerprint Technologies
An Enhanced Authentication System Using Face and Fingerprint TechnologiesAn Enhanced Authentication System Using Face and Fingerprint Technologies
An Enhanced Authentication System Using Face and Fingerprint Technologies
 
M017637484
M017637484M017637484
M017637484
 
Biometric Signature Recognization
 Biometric Signature Recognization Biometric Signature Recognization
Biometric Signature Recognization
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONPREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONPREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
 
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONPREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
 
Vein palm recognition model using fusion of features
Vein palm recognition model using fusion of featuresVein palm recognition model using fusion of features
Vein palm recognition model using fusion of features
 
K012647982
K012647982K012647982
K012647982
 
K012647982
K012647982K012647982
K012647982
 
IRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNNIRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNN
 
Offline Signature Verification and Recognition using Neural Network
Offline Signature Verification and Recognition using Neural NetworkOffline Signature Verification and Recognition using Neural Network
Offline Signature Verification and Recognition using Neural Network
 
Gesture Recognition System
Gesture Recognition SystemGesture Recognition System
Gesture Recognition System
 
Distance Based Verification Technique for Online Signature System
Distance Based Verification Technique for Online Signature SystemDistance Based Verification Technique for Online Signature System
Distance Based Verification Technique for Online Signature System
 
A Transfer Learning Approach to Traffic Sign Recognition
A Transfer Learning Approach to Traffic Sign RecognitionA Transfer Learning Approach to Traffic Sign Recognition
A Transfer Learning Approach to Traffic Sign Recognition
 

More from TELKOMNIKA JOURNAL

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...
TELKOMNIKA JOURNAL
 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...
TELKOMNIKA JOURNAL
 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...
TELKOMNIKA JOURNAL
 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
TELKOMNIKA JOURNAL
 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...
TELKOMNIKA JOURNAL
 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antenna
TELKOMNIKA JOURNAL
 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fire
TELKOMNIKA JOURNAL
 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio network
TELKOMNIKA JOURNAL
 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bands
TELKOMNIKA JOURNAL
 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...
TELKOMNIKA JOURNAL
 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertainties
TELKOMNIKA JOURNAL
 
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
TELKOMNIKA JOURNAL
 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
TELKOMNIKA JOURNAL
 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...
TELKOMNIKA JOURNAL
 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensor
TELKOMNIKA JOURNAL
 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
TELKOMNIKA JOURNAL
 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...
TELKOMNIKA JOURNAL
 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networks
TELKOMNIKA JOURNAL
 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imaging
TELKOMNIKA JOURNAL
 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
TELKOMNIKA JOURNAL
 

More from TELKOMNIKA JOURNAL (20)

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...
 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...
 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...
 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...
 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antenna
 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fire
 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio network
 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bands
 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...
 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertainties
 
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...
 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensor
 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...
 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networks
 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imaging
 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
 

Recently uploaded

bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
Divyam548318
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
University of Maribor
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
NidhalKahouli2
 
Series of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.pptSeries of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.ppt
PauloRodrigues104553
 
Low power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniquesLow power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniques
nooriasukmaningtyas
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
mamunhossenbd75
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
jpsjournal1
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
SyedAbiiAzazi1
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
wisnuprabawa3
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 

Recently uploaded (20)

bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
 
Series of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.pptSeries of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.ppt
 
Low power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniquesLow power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniques
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 

Offline signatures matching using haar wavelet subbands

  • 1. TELKOMNIKA Telecommunication, Computing, Electronics and Control Vol. 18, No. 6, December 2020, pp. 2903~2910 ISSN: 1693-6930, accredited First Grade by Kemenristekdikti, Decree No: 21/E/KPT/2018 DOI: 10.12928/TELKOMNIKA.v18i6.17069  2903 Journal homepage: http://journal.uad.ac.id/index.php/TELKOMNIKA Offline signatures matching using haar wavelet subbands Zinah S. Abduljabbar1 , Zainab J. Ahmed2 , Noor Khalid Ibrahim3 1,3 Department of Computer Science, College of Science, Mustansiriyah University, Iraq 2 Department of Biology Science, College of Science, University of Baghdad, Iraq Article Info ABSTRACT Article history: Received Jun 26, 2020 Revised Jul 20, 2020 Accepted Aug 21, 2020 The complexity of multimedia contents is significantly increasing in the current world. This leads to an exigent demand for developing highly effective systems to satisfy human needs. Until today, handwritten signature considered an important means that is used in banks and businesses to evidence identity, so there are many works tried to develop a method for recognition purpose. This paper introduced an efficient technique for offline signature recognition depending on extracting the local feature by utilizing the haar wavelet subbands and energy. Three different sets of features are utilized by partitioning the signature image into non overlapping blocks where different block sizes are used. CEDAR signature database is used as a dataset for testing purpose. The results achieved by this technique indicate a high performance in signature recognition. Keywords: Energy Haar wavelet Signature recognition This is an open access article under the CC BY-SA license. Corresponding Author: Zinah S. Abduljabbar, Department of Computer Science, College of Science, Mustansiriyah University, Baghdad, Iraq. Email: zinahsadeq@uomustansiriyah.edu.iq 1. INTRODUCTION Lately a major amount of research effort is being dedicated in developing the algorithms and techniques related to signatures field. Behavioral, physiological and psychological characteristics are used in biometric systems for identifying the individual. Handwritten signatures are a type of the behavioral characteristics, although with the development of other biometric characteristics but the signature remain quite important [1]. Therefore, signature is an important guide to validate a document handwritten signature of a person which recognized by signature verification [2]. Despite the great development in knowledge-based systems, handwriting signatures remain of particular importance and this may be due to the fact that those systems require user guides in the form of information, often a password and id, to verify the identity of the individual, in addition to the above, the signature cannot be stolen or missing [3]. Methodology of signature recognition comprises four general steps which are: data acquisition, pre-processing, feature extraction and matching. There are two categories in handwritten signatures according to the method of data acquisition: on-line (dynamic approach) and off-line (static approach). Any person may use letters or symbols or a combination of both to represent the signature. Accordingly, the signature must be treated as an image [4]. In offline mode camera and scanner are used to obtain the images of the signatures from a paper, in such situation noisy signatures are acquired compared to these in on-line mode [5]. Many studies have been introduced as literature. Hazem et al. [6] presented a system for verification the off-line signature. The system comprises of four steps: preprocessing step, registration of signature, feature extraction and verification step. Discrete wavelet transform (DWT) was used in this system to extract
  • 2.  ISSN: 1693-6930 TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 6, December 2020: 2903 - 2910 2904 the feature from signature and mathematical formulae with logical operations were utilized in verification step. The system obtained good measures for verification [6]. Doroz et al. [7] introduced a new method for verification the handwriting signatures. In this method the signature was described by creating a complex characteristic for each signature, the created characteristics were based on dependencies analysis between the dynamic characteristics which registered in the tables. Complex characteristics were utilized to create vectors for describing characteristics, by using the suggested measures, the elements of vectors were computed. Evaluated the similarity between the signatures had been accomplished by determining the similarity of corresponding vectors of the compared signatures. 96.67% was the results obtained by this method [7]. Malik and Arova [3] presented a method for signature recognition. Euler number was used to study the signatures of various people. Their adopted method consists of three phases. In the first phase, two sets of feature vectors were generated by extracting the features of training signatures dataset and features of testing signatures. In the second phase, using Manhattan distance classifier to compare between the training signature feature and the set of the feature of the testing signatures. The result of recognition was displayed to the user in the last phase. The train and test data which used in dataset had a little change but the suggested method can be extended to dataset which had a great change of the train and test data [3]. Hedjaz et al. [8] introduced an approach for recognition the offline signature. Binary statistical image features (BSIF) and local binary patterns (LBP) were used to extract the features. Two public datasets were used: MCYT-75 and GPD-100. By utilizing a K-nearest neighbor (KNN) classifier a performance of recognition reaches 97.3% for MCYT-75 and 96.1% for GPDS-100 [8]. The main contribution of this paper as follow: to introduced an efficient technique for offline signature recognition depending on extracting the local feature by utilizing the haar wavelet subbands and energy. 2. PROPOSED SYSTEM This work aims to develop an efficient technique for offline signature recognition depending on extracting the local feature by utilizing the haar wavelet subbands and energy. The proposed approach is composed of the following steps: The layout of the suggested signature system is appeared in Figure 1. The flow of the proposed work is as follows: the system consists of three main phases: pre-processing phase, feature extraction, binarization and matching, the details of each one is introduced in the next sections. Figure 1. The layout of system model 2.1. Pre-processing phase The preprocessing phase consists of some steps, due to the noise that occurs in offline signatures mode, pre-processing is an essential point to start a real treatment phase where the importance of pre-processing lies in getting rid of the visual and unwanted information in the signature form and establishes to prepare for successful feature extraction.
  • 3. TELKOMNIKA Telecommun Comput El Control  Offline signatures matching using haar wavelet subbands (Zinah S. Abduljabbar) 2905 2.1.2. Load signature image stage The pre-processing first involves loading and preparing the signature image by obtaining a gray-scale image (GI) from a BMP image (I), loads an image into a variable of type of image. Four types of images (.gif, .jpg, .tga, .png) images may be loaded. To load correctly, images must be located in the data directory of the current sketch. The gray-scale image should enhance to gain the best results as clarify below: 2.1.3. Enhancement stage on signature image Four steps are applied in order to enhance the signature image and obtain a clearer form: − Inversion the color As mentioned earlier, the signature image which obtained by a camera or scanner is noisier than others image in on-line situation approach and accordingly color inversion process is utilized to allocate the required region by specifying only the important data (signature's part) and cancelation the unwanted data surrounding to the signature. By moving (𝑛 ∗ 𝑛) window on the gray-scale signature image and at each instance position in the window the threshold is applied as described in (1): 𝐺𝐼̅̅̅(𝑖, 𝑗) = { 𝑚𝑒𝑎𝑛 − 𝐺𝐼(𝑖, 𝑗) 𝑖𝑓 𝐺𝐼(𝑖, 𝑗) < 𝑚𝑒𝑎𝑛 0 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒 (1) where 𝐺𝐼̅̅̅̅is the signature image after inversion it’s color. − Removing the noise Noise reduction is an essential step in image processing due to its importance in obtaining better results, the block matching with three-dimensional filtering (BM3D) denoising is used in this step. Many studies shown that the BM3D filter is very important in term of noise reduction due to its results comparing with other filters [9, 10]. The implementation of this filter is explained in detail in [11] − Contrast The subjective criteria of images are important for human visualization, so an appropriate contrast in an image is desired to make the signature more distinct from the background and other objects. Visual properties of an image are enhanced by applying a method proposed in [12]. In this method a global mean 𝐺 𝑚𝑒𝑎𝑛 is computed by applying average filter on the whole input image while local means𝐿 𝑚𝑒𝑎𝑛 are computed by applying the same filter on each 3 × 3 block in an image. By applying the transformation in (2): 𝑂(𝑖, 𝑗) = 𝑁(𝑖, 𝑗) + [𝐿 𝑚𝑒𝑎𝑛 − 𝐺 𝑚𝑒𝑎𝑛] (2) where 𝑂(𝑖, 𝑗) acts the pixels of the image after contrast process and 𝑁(𝑖, 𝑗) acts the pixels of the image after applying BM3D filter. − Segmentation Focusing on the signature area in the image and neglecting the remaining unimportant parts is the primary goal at this step. This is achieved by detecting each row and column, then removes these rows and columns which don't contain the signature's information. Recently, more attention paid on the unsupervised image co-segmentation approach, where the segments are forced to be consistent across a collection of similar images. Many natural image collections contain similar or related objects. For instance, photo collections of a particular theme. 2.1.4. Binarization Image binarization is one of the basic pre-processing steps that leads to a considerable reduction in the amount of information that is undergo to further analysis, which leads to faster implementation and this is very useful in applications which required the recognition of the shape rather than the color analysis [13]. The most important aspect of this operation is to find the appropriate threshold value, assigning a single value to threshold and apply this value to whole image is called global binarization technique [14]. In this work the best threshold value is determined by test and the output of binarization operation is a signature image contain 1's and 0's for all pixels according the following in (3): 𝑏(𝑖, 𝑗) = { 1 𝑖𝑓 𝑓(𝑖, 𝑗) ≥ 𝑡ℎ𝑟𝑒𝑠ℎ𝑜𝑙𝑑 0 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒 (3)
  • 4.  ISSN: 1693-6930 TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 6, December 2020: 2903 - 2910 2906 2.1.5. Morphological operation Thinning is a type of morphological operation; the goal of thinning process is to find the skeleton of on object. A skeleton that finds the fundamental topology and the information's shape of the required object in a simple form is very important to hold different problems. To achieve the morphological operation, Zhang Suen algorithm is applied because it's fastest and the implementation of this algorithm is simple; after the binary image is used as input, decreases the pixels and represent the skeleton of the signature in one-pixel width [15, 16]. 2.2. DWT and feature extraction phase The wavelet is an efficient multi-resolution technique for sub-band decomposition, and this is performed by implementing a digital filtering [17-19]. The low and high pass filters are used to obtain the approximation information and detail information respectively [17]. DWT utilizing filtering and sub- sampling to decompose the signature image in multi scales which leads to reveals the redundancies in many scales. 2.2.1. Haar wavelet transform Haar wavelet transform is used to extract the local features in the signature image. One of the important aspect of haar wavelet transform is to find corners and contours [18-21]. The reason for choosing the haar wavelet in this work is due to its being required low computational cost, fast and each sub bands (detail) contains a special edges type [22-26]. 2.2.2. Applying DWT and find the features Four sub-bands are generated after performing 2-D wavelet transform. the low-low sub-band denoted (LL) containing the approximation of the enhanced input image, where the details of the same image in different directions are contained on three sub-bands (high-pass) where (HL), (LH) and (HH) for horizantal, vertical and diagonal direction respectively. Different block sizes are used in this work and three methods are adopted in order to find the vector for the required features by using the (4-8) as shown in Figure 2. 𝐸𝑛𝑒𝑟𝑔𝑦 = ∑ ∑ 𝑤𝑎𝑣𝑒𝑙𝑒𝑡(𝑥, 𝑦)2𝑦𝑒−1 𝑦=𝑦𝑠 𝑥𝑒−1 𝑥=𝑥𝑠 (4) 𝑝 𝐸 = 𝐸𝑛𝑒𝑟𝑔𝑦(𝐿𝐻) + 𝐸𝑛𝑒𝑟𝑔𝑦(𝐻𝐿) + 𝐸𝑛𝑒𝑟𝑔𝑦(𝐻𝐻) (5) 𝑁𝑜𝑟𝑚 = ∑ ∑ |𝑤𝑎𝑣𝑒𝑙𝑒𝑡(𝑥, 𝑦)|0.5𝑦𝑒−1 𝑦=𝑦𝑠 𝑥𝑒−1 𝑥=𝑥𝑠 (6) 𝑃 𝑁 = 𝑁𝑜𝑟𝑚(𝐿𝐻) + 𝑁𝑜𝑟𝑚(𝐻𝐿) + 𝑁𝑜𝑟𝑚(𝐻𝐻) (7) 𝑁𝑜𝑟𝑚 = ∑ ∑ |𝑤𝑎𝑣𝑒𝑙𝑒𝑡(𝑥, 𝑦)|0.75𝑦𝑒−1 𝑦=𝑦𝑠 𝑥𝑒−1 𝑥=𝑥𝑠 (8) 2.3. Matching phase In this phase, generation of the template from training samples and feature matching are used to obtain the similarity degree between the training samples and entered signatures. Numerical value is the output of matching phase, so high result indicate that the signature sample belongs to the same signature. Normalized mean square differences (NMSD) and normalized mean absolute difference (NMAD) are used to determine the similarity degree. 2.3.1. Generation the template In order to generate the template a number of signature are utilized for each individual as samples for training. The template of an individual contains all features which extracted from all the training samples. For each person a mean feature vector and concerning standard deviation are kept in data base. The following in (9, 10) are used to calculate the mean and standard deviation. 𝐹̅(𝑝 𝑛𝑜, 𝑓𝑛𝑜) = 1 𝑠 ∑ 𝐹(𝑝 𝑛𝑜, 𝑠 𝑛𝑜, 𝑓𝑛𝑜)𝑠 𝑠 𝑛𝑜=1 (9) 𝜎(𝑝 𝑛𝑜, 𝑓𝑛𝑜) = √ 1 𝑠 ∑ (𝐹(𝑝 𝑛𝑜, 𝑠 𝑛𝑜, 𝑓𝑛𝑜) − 𝐹̅(𝑝 𝑛𝑜, 𝑓𝑛𝑜))2𝑠 𝑠 𝑛𝑜=1 (10) where 𝑝 𝑛𝑜 is a person number, 𝑠 𝑛𝑜 is a sample number and 𝑓𝑛𝑜 is a feature number, F acts the features vector and 𝑠 represent the total number of samples.
  • 5. TELKOMNIKA Telecommun Comput El Control  Offline signatures matching using haar wavelet subbands (Zinah S. Abduljabbar) 2907 Figure 2. Methods of feature extraction 2.3.2. Features matching For the purpose of features matching, statistical analysis is used. NMSD and NMAD are adopted to discover the nearest stored match with the given entered signature. Consequently, the output of this stage is to determine whether the signatures samples belong to the same signature or not, in (11, 12). 𝑁𝑀𝑆𝐷 = (𝑝 𝑛𝑜, 𝑓𝑛𝑜) = ∑ ( 𝐹(𝑝 𝑛𝑜,𝑠 𝑛𝑜,𝑓𝑛𝑜)−𝐹̅(𝑝 𝑛𝑜,𝑓𝑛𝑜) 𝜎(𝑝 𝑛𝑜,𝑓𝑛𝑜) ) 2 (11) 𝑁𝑀𝐴𝐷 = (𝑝 𝑛𝑜, 𝑓𝑛𝑜) = ∑ | 𝐹(𝑝 𝑛𝑜,𝑠 𝑛𝑜,𝑓𝑛𝑜)−𝐹̅(𝑝 𝑛𝑜,𝑓𝑛𝑜) 𝜎(𝑝 𝑛𝑜,𝑓𝑛𝑜) | (12) 3. RESULTS The performance of the techniques used in this paper was evaluated and compared to other existing techniques. Furthermore, the performance of the efficient technique for offline signature recognition was evaluated in terms of its recognition and compared to other feature selection techniques. Three different sets of features are utilized by partitioning the signature image into non overlapping blocks where different block sizes are used. CEDAR signature database is used as a dataset for testing purpose. All the experiments and the results achieved are presented in this section. 3.1. Performance analysis The performance of the haar wavelet subbands and energy techniques and the feature extraction techniques was analyzed. From CEDAR database [19] the dataset is utilized in the testing process. The dataset is consisted of 55 persons and twelve signature samples for each person, each signature image is a .bmp file type with 24 bit/pixel. Five features (LL, HL, LH, HH and power) are utilized by applying 1-level decomposition of haar wavelet transform. 21*23 is selected as the size of block with the methods of matching and for one set of features, results are described in Tables 1, 2 and 3.
  • 6.  ISSN: 1693-6930 TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 6, December 2020: 2903 - 2910 2908 Table 1. The rate of recognition using the energy with one set of features Matching Methods LL LH HL HH Pow (PE) NMAD 88.182 63.636 76.364 55.303 68.182 NMSD 97.727 90.606 93.788 81.970 90.000 Table 2. The rate of recognition using PN = 0.5 with one set of features Matching Methods LL LH HL HH Pow (PN) NMAD 67.424 43.788 50.000 39.697 45.000 NMSD 87.121 65.303 70.303 54.242 60.152 Table 3. The rate of recognition using PN = 0.75 with one set of features Matching Methods LL LH HL HH Pow (PN) NMAD 69.697 46.061 53.939 41.364 46.667 NMSD 89.394 68.788 74.242 56.364 64.697 Ten features (LL-LH, LL-HL, LL-HH, LL-pow, LH-HL, LH-HH, LH-pow, HL-HH, HL-pow and HH-pow) are the results of combining the two features of haar wavelet transform (two sets of features). The recognition rates are presented in Tables 4 showed the rate of recognition using the energy with two sets of features, Table 5 showd the rate of recognition using PN = 0.5 with two sets of features 5 and 6 by using the matching methods with block size equals to 21*23. Table 6 show the rate of recognition using PN = 0.75 with two sets of features Table 4. The rate of recognition using the energy with two sets of features Matching Methods LL-LH LL-HL LL-HH LL-Pow (PE) LH-HL LH-HH LH-Pow (PE) HL-HH HL-Pow (PE) HH-Pow (PE) NMAD 82.4242 88.1818 79.2424 81.6667 83.1818 66.0606 70.7576 69.6970 75.4545 61.9697 NMSD 98.1818 97.5758 97.1212 96.3636 98.1818 93.0303 94.3939 94.0909 93.7879 88.0303 Table 5. The rate of recognition using PN = 0.5 with two sets of features Matching Methods LL-LH LL-HL LL-HH LL-Pow (PN) LH-HL LH-HH LH-Pow (PN) HL-HH HL-Pow (PN) HH-Pow (PN) NMAD 57.7273 60.6061 53.4848 57.1212 50.7576 43.3333 45.7576 45.4545 47.2727 42.5758 NMSD 81.8182 83.3333 78.9394 79.6970 74.0909 63.3333 66.2121 64.8485 68.3333 57.4242 Table 6. The rate of recognition using PN = 0.75 with two sets of features Matching Methods LL-LH LL-HL LL-HH LL-Pow (PN) LH-HL LH-HH LH-Pow (PN) HL-HH HL-Pow (PN) HH-Pow (PN) NMAD 61.0606 65.6061 56.9697 60.0000 55.4545 44.5455 47.4242 47.2727 50.4545 44.0909 NMSD 86.8182 86.9697 83.1818 84.6970 79.3939 68.0303 69.5455 70.3030 73.1818 61.2121 Also, ten features (LL-LH-HL, LL-LH-HH, LL_HL-HH, LL-LH-pow, LL-HL-pow, LL-HH-pow, LH-HL-HH, LH-HL-pow, LH-HH-pow and HL-HH-pow) are the results of combining three features of haar wavelet transform (three sets of features) and as previous step, by applying the matching methods with block size equals to 21*23 the recognition rates are showed in Tables 7, 8 and 9. All the results above indicates that the best results when using energy, so the Tables 10-12 are allocated to test different sizes for blocks with energy. All the previous results recorded in the three tables showed that 21*23 is the best size to block. Table 7. The rate of recognition using the energy with three sets of features Matching Methods LL- LH-HL LL- LH-HH LL- HL-HH LL-LH- Pow (PE) LL-HL- Pow (PE) LL-HH- Pow (PE) LH- HL-HH LH-HL- Pow (PE) LH-HH- Pow (PE) HL-HH- Pow (PE) NMAD 86.364 77.576 82.576 80.000 83.939 76.364 75.000 78.030 67.273 69.545 NMSD 98.485 98.030 96.970 97.424 96.667 95.909 96.667 96.818 93.333 93.333
  • 7. TELKOMNIKA Telecommun Comput El Control  Offline signatures matching using haar wavelet subbands (Zinah S. Abduljabbar) 2909 Table 8. The rate of recognition using PN = 0.5 with three sets of features Matching Methods LL- LH-HL LL- LH-HH LL- HL-HH LL-LH- Pow (PN) LL-HL- Pow (PN) LL-HH- Pow (PN) LH- HL-HH LH-HL- Pow (PN) LH-HH- Pow (PN) HL-HH- Pow (PN) NMAD 57.576 51.667 53.485 54.545 54.848 50.455 46.818 49.242 44.394 45.758 NMSD 81.212 76.970 78.333 77.879 79.091 75.152 69.545 71.515 63.939 64.091 Table 9. The rate of recognition using PN = 0.75 with three sets of features Matching Methods LL- LH-HL LL- LH-HH LL- HL-HH LL-LH- Pow (PN) LL-HL- Pow (PN) LL-HH- Pow (PN) LH- HL-HH LH-HL- Pow (PN) LH-HH- Pow (PN) HL-HH- Pow (PN) NMAD 61.061 56.364 56.515 57.273 58.788 53.788 50.152 51.970 45.303 47.576 NMSD 85.758 80.606 83.030 81.818 83.636 78.939 75.152 75.606 68.182 69.091 Table 10. The rate of recognition of the one set of features with the energy Block size LL LH HL HH Pow (PE) Blk=5×7 73.9394 68.0303 74.5455 58.1818 67.4242 Blk=7×9 79.0909 72.4242 77.4242 61.6667 72.4242 Blk=9×11 85.3030 78.4848 80.3030 65.6061 76.9697 Blk=11×13 89.0909 82.1212 83.9394 68.4848 79.0909 Blk=13×15 92.1212 85.7576 87.2727 70.6061 81.6667 Blk=15×17 95.3030 88.7879 89.5455 74.5455 86.3636 Blk=17×19 95.3030 90.1515 90.7576 74.0909 83.6364 Blk=19×21 96.5152 93.6364 92.8788 82.4242 89.6970 Blk=21×23 97.7273 90.6061 93.7879 81.9697 90.0000 Table 11. The rate of recognition using two sets of features with the energy Block size LL-LH LL-HL LL-HH LL-Pow (PE) LH-HL LH-HH LH-Pow (PE) HL-HH HL-Pow (PE) HH-Pow (PE) Blk=5×7 77.1212 79.3939 71.8182 72.7273 82.2727 69.6970 73.4848 73.3333 74.8485 65.3030 Blk=7×9 82.5758 83.7879 76.0606 78.3333 86.9697 73.9394 78.3333 77.7273 79.8485 69.8485 Blk=9×11 87.8788 87.4242 82.8788 83.3333 89.3939 78.9394 83.0303 79.3939 81.9697 73.3333 Blk=11×13 91.6667 90.1515 85.9091 86.8182 91.2121 82.4242 85.0000 82.7273 85.6061 75.3030 Blk=13×15 94.3939 92.5758 90.0000 91.2121 94.6970 85.0000 88.9394 87.5758 89.2424 79.2424 Blk=15×17 95.9091 95.1515 93.6364 93.7879 95.9091 87.4242 91.0606 88.7879 91.5152 83.3333 Blk=17×19 96.3636 95.9091 93.3333 94.2424 95.9091 87.7273 90.3030 90.0000 91.0606 80.1515 Blk=19×21 97.7273 96.9697 95.9091 96.2121 97.4242 92.2727 93.7879 92.4242 93.4848 89.0909 Blk=21×23 98.1818 97.5758 97.1212 96.3636 98.1818 93.0303 94.3939 94.0909 93.7879 88.0303 Table 12. The rate of recognition using three sets of features with the energy Block size LL-LH- HL LL-LH- HH LL-HL- HH LL-LH- Pow (PE) LL-HL- Pow (PE) LL-HH- Pow (PE) LH-HL- HH LH-HL- Pow (PE) LH-HH- Pow (PE) HL-HH- Pow (PE) Blk=5×7 82.4242 75.4545 78.3333 75.6061 77.7273 71.9697 79.6970 80.4545 71.9697 73.0303 Blk=7×9 86.3636 80.1515 82.1212 81.0606 82.4242 76.6667 82.8788 84.6970 76.5152 77.8788 Blk=9×11 89.8485 85.7576 84.8485 86.0606 86.0606 82.4242 86.8182 88.0303 81.0606 80.3030 Blk=11×13 91.5152 88.6364 88.3333 88.9394 88.7879 86.0606 89.2424 89.5455 83.3333 82.7273 Blk=13×15 94.3939 92.4242 91.5152 93.0303 91.5152 89.5455 92.2727 92.4242 86.3636 86.8182 Blk=15×17 96.2121 95.0000 94.2424 95.0000 94.2424 92.7273 93.9394 94.3939 88.7879 88.6364 Blk=17×19 96.9697 94.6970 94.6970 95.1515 94.5455 91.3636 94.0909 94.3939 88.4848 89.6970 Blk=19×21 98.0303 96.9697 96.8182 97.1212 96.5152 94.6970 96.2121 96.3636 91.9697 92.1212 Blk=21×23 98.4848 98.0303 96.9697 97.4242 96.6667 95.9091 96.6667 96.8182 93.3333 93.3333 4. CONCLUSION Offline signature verification is a task that benefits from matching both the global shape and local details an efficient technique for offline signature recognition depending on extracting the local feature by utilizing the haar wavelet subbands and energy was introduced, it consists of three stages. In preprocessing stage, the signature image was enhanced by applying many operations where the features were extracted by utilizing the haar wavelet subbands with energy in feature extraction stage. NMSD and NMAD were used in matching phase, the results indicated a high recognition rate (98.4848) when three sets of features were used with block size equal to 21*23. The plans for feature include: using another partitioning method like Quadtree. Using different types and shapes for signature.
  • 8.  ISSN: 1693-6930 TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 6, December 2020: 2903 - 2910 2910 ACKNOWLEDGMENT The author’s thanks the "Department of Computer Science", "Collage of Science", "Mustansiriyah University", for supporting this work. REFERENCES [1] B. M. Al-Maqaleh, A. M. Qaid Musleh “A Survey on Handwritten Signature Verification Approaches,” Communications on Applied Electronics, vol. 4, no. 8, pp. 23-29, 2016. [2] A. Sanmorino, S. Yazid, “A Survey for Handwritten Signature Verification,” International Conference on Uncertainty Reasoning and Knowledge Engineering, IEEE, 2012. [3] V. Malik, A. Arora, “Signature Recognition using Matlab,” International Journal for Research in Applied Science & Engineering, vol. 3, no. VI, pp. 682-7, 2015. [4] S. S. Muhamed, M. S. Al-Ani, “Signature Recognition based on Discrete Wavelet Transform,” UHD Journal of Science and Technology, vol. 3, no. 1, pp. 19-29, 2019. [5] P. Bhumika, S. Kumar “A Survey on Handwritten Signature Verification Techniques,” International Journal of Advance Research in Computer Science and Management Studies, vol. 3, no. 1, 2015. [6] H. Hiary, R. Alomari, T. Kobbaey, et al., “Off-Line Signature Verification System Based on DWT and Common Features Extraction,” Journal of Theoretical and Applied Information Technology, vol. 51, no. 2, pp. 165-174, 2013. [7] R. Doroz, M. Palys, T. Orczyk, H. Safaverdi, “Method of Signature Recognition with the Use of the Complex Features,” Journal of Medical Informatics & Technologies, vol. 23, pp. 155-162, 2014. [8] H. Hezil, R. Djemili, H. Bourouba, “Signature Recognition Using Binary Features and KNN,” International Journal of Biometrics, vol. 10, no. 1, 2018. [9] K. M. Aishwarya, Ajith Rao A. S., V. Singh, “A Comparative Study of Edge Detection in Noisy Images Using BM3D Filter,” International Journal of Engineering Research & Technology, vol. 5, no. 9, pp. 142-147, 2016. [10] M. Hasan, Mahmoud R. E-Sakka, “Improved BM3D Image Denoising Using SSIM-Optimized Wiener Filter,” EURASIP Journal on Image and Video Processing, vol. 2018, no. 25, pp. 1-12, 2018. [11] M. Lebrun, “An Analysis and Implementation of the BM3D Image Denoising Method,” Image Processing on Line, vol. 2, pp. 175-213, 2012. [12] A. Singh, S. Yadav, N. Singh, “Contrast Enhancement and Brightness Preservation Using Global-Local Image Enhancement Techniques,” Fourth International Conference on Parallel, Distributed and Grid Computing, 2016. [13] H. Michalak, K. Okarma, “Improvement of Image Binarization Methods Using Image Processing with Local Entropy Filtering for Alphanumerical Character Recognition Purposes,” entropy, vol. 21, no. 6, pp. 1-18, 2019. [14] Puneet, N. K. Garg, “Binarization Techniques used for Grey Scale Images,” International Journal of Computer Application, vol. 71, no. 1, pp. 8-11, 2013. [15] F. Haseena, R. Clara, “Performance Analysis of Iterative Thinning Methods Using Zhang Suen and Stentiford Algorithm,” International Conference on Advancements in Computing Technologies, vol. 4, no. 2, 2018. [16] D. Gupta, S. Choubey, “Discrete Wavelet Transform for Image Processing,” International Journal of Emerging Technology and Advanced Engineering, vol. 4. no. 3, 2015. [17] M. J. Gomez, C. Castejon, Juan C. Garcia, “Review of Recent Advances in the Application of the Wavelet Transform to Diagnose Cracked Rotors,” Algorithms, vol. 9, no. 1, pp. 1-13, 2016. [18] I. Sharif, S. Khare, “Comparative Analysis of Haar and Daubechies Wavelet for Hyper Spectral Image Classification” The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, vol. XL-8, 2014. [19] FVC2004, “Fingerprint verification competition 2004,” 2004. [Online]. Available: http://bias.csr.unibo.it/fvc2004/ [20] Z. H. Salih, G. T. Hasan, and M. A. Mohammed, "Investigate and analyze the levels of electromagnetic radiations emitted from underground power cables extended in modern cities," 2017 9th International Conference on Electronics, Computers and Artificial Intelligence (ECAI), 2017. [21] Z. H. Salih, G. T. Hasan, M. A. Mohammed, et al., "Study the Effect of Integrating the Solar Energy Source on Stability of Electrical Distribution System," 2019 22nd International Conference on Control Systems and Computer Science (CSCS), pp. 443-447, 2019. [22] N. Q. Mohammed, M. S. Ahmed, M. A. Mohammed, et al., "Comparative Analysis between Solar and Wind Turbine Energy Sources in IoT Based on Economical and Efficiency Considerations," 2019 22nd International Conference on Control Systems and Computer Science (CSCS), pp. 448-452, 2019. [23] M. A. Mohammed, I. A. Mohammed, R. A. Hasan, et al., "Green Energy Sources: Issues and Challenges," 2019 18th RoEduNet Conference: Networking in Education and Research (RoEduNet), pp. 1-8, 2019. [24] N. D. Zaki, N. Y. Hashim, Y. M. Mohialden, M. A. Mohammed, T. Sutikno, and A. H. Ali, "A real-time big data sentiment analysis for iraqi tweets using spark streaming," Bulletin of Electrical Engineering and Informatics, vol. 9, no. 6, pp. 1411-1419, 2020. [25] H. R. Ibraheem, Z. F. Hussain, S. M. Ali, M. Aljanabi, M. A. Mohammed, and T. Sutikno, "A new model for large dataset dimensionality reduction based on teaching learning-based optimization and logistic regression," TELKOMNIKA Telecommunication Computing Electronics and Control, vol. 18, no. 3, pp. 1688-194, 2020. [26] O. A. Hammood, N. Nizam, M. Nafaa, and W. A. Hammood, "RESP: Relay Suitability-based Routing Protocol for Video Streaming in Vehicular Ad Hoc Networks," International Journal of Computers, Communications & Control, vol. 14, no. 1, pp. 21-38, 2019.