This document proposes a grid-based feature extraction method for offline signature verification. It begins with an introduction and discusses existing techniques and their limitations. It then presents the proposed work, which involves signature acquisition, preprocessing, feature extraction by segmenting the signature image into a grid, and verification. The algorithms, mathematical model, advantages and applications are described. The document concludes that the proposed method requires only low-cost hardware and has a low error rate for signature verification.
Fraud Detection Using Signature RecognitionTejraj Thakor
The signature of person is an important bio metric of a human being which can be used to authenticate human identity. The problem arises when someone decide to imitate our signature and steal our identity.
The Image of human signature is collected by camera of mobile phone which can extract dynamic and spatial information of the signature based on Image processing techniques like Convert to gray scale, Noise Removal, Normalization, Border Elimination and Feature Extraction techniques.
The signature matching is depending on SVM. The SVM classifier is trained with sample images in database obtained from those individuals whose signatures have to be authenticated by the system. In our proposed system SQLite database as a back-end and Android platform as a front-end.
This presentation deals with the combination of Sixth Sense technology and Robotics.
The Autonomous Robots are controlled using basic Hand gestures through sixth sense technology.
This slide proposed a method to authenticate a signature in off-line. Our proposed method uses "Harris Corner Detector", "Orientation Assignment" , "KNN Classifier", "Hungarian Algorithm".
Fraud Detection Using Signature RecognitionTejraj Thakor
The signature of person is an important bio metric of a human being which can be used to authenticate human identity. The problem arises when someone decide to imitate our signature and steal our identity.
The Image of human signature is collected by camera of mobile phone which can extract dynamic and spatial information of the signature based on Image processing techniques like Convert to gray scale, Noise Removal, Normalization, Border Elimination and Feature Extraction techniques.
The signature matching is depending on SVM. The SVM classifier is trained with sample images in database obtained from those individuals whose signatures have to be authenticated by the system. In our proposed system SQLite database as a back-end and Android platform as a front-end.
This presentation deals with the combination of Sixth Sense technology and Robotics.
The Autonomous Robots are controlled using basic Hand gestures through sixth sense technology.
This slide proposed a method to authenticate a signature in off-line. Our proposed method uses "Harris Corner Detector", "Orientation Assignment" , "KNN Classifier", "Hungarian Algorithm".
Object detection is a computer technology related to computer vision and image processing that deals with detecting instances of semantic objects of a certain class (such as humans, buildings, or cars) in digital images and videos.
A Small Helping Hand from me to my Engineering collegues and my other friends in need of Object Detection
Object detection is a computer technology related to computer vision and image processing that deals with detecting instances of semantic objects of a certain class (such as humans, buildings, or cars) in digital images and videos. Well-researched domains of object detection include face detection and pedestrian detection. Object detection has applications in many areas of computer vision, including image retrieval and video surveillance.
Biometric ATM are used for wide range of applications like for Banking, Coupons & Self service ATM. Biometrics ATM offer ATM type interface along with at-least one Biometrics capture device like Fingerprint Scanner, Iris camera, Palm/Finger Vein scanner , Face recognition camera. They are often called Multi-Biometrics ATM, Wall mount Biometrics ATM, Biometrics Devices / Machine.
Most of the ATM in the past have been using ID cards to identify users but with the wide acceptance of Biometrics , a new generation of Biometrics ATM are being deployed for wide range of applications worldwide.
INTRO:
Nowadays, person identification (recognition) and verification is very important in security and resource access control.
Biometrics is the science of automatic recognition of individual depending on their physiological and behavioral attributes.
For centuries, handwritten signatures have been an integral part of validating business transaction contracts and agreements.
Among the different forms of biometric recognition systems such as
fingerprint, iris, face, voice, palm etc., signature will be most widely used.
SIGNATURE RECOGNITION
Signature Recognition is the procedure of determining to whom a particular signature belongs to.
Depending on acquiring of signature images, there are two types of signature recognition systems:
Online Signature Recognition
Offline Signature Recognition
STEPS
IMAGE ACQUSITION
Collection of signatures from 50 persons on blank paper.
The collected signatures are scanned to get images in JPG format to create database.
PREPROCESSING
Image pre-processing is a technique to enhance raw images received from cameras/sensors placed on satellites, space probes and aircrafts or pictures taken in normal day-to-day life for various applications.
The techniques for preprocessing used are
RGB to Gray Scale Conversion
Binarization
Thinning
Bounding Box
FEATURE EXTRACTION
Features are the characters to be extracted from the processed image.
It has used two feature techniques
Global Features
Grid Features
DWT
After applying DWT to all 9 blocks, each block is divided into horizontal, vertical and diagonal components. From each components two features mainly horizontal and vertical projection positions are extracted. Total 54 (9 x 3 x 2) features are extracted.
Grid features extracted from each block are
Horizontal Projection Position
Vertical Projection Position
Algorithm for Training phase
Description: Retrieval of a signature image from a database
Input: Training sample images.
Output: Construction of Back Propagation Neural Network.
Begin
Read the training samples images
Step1: Pre-processing
Convert the image into gray scale image.
Convert the gray scale image into binary image.
Apply thinning process.
Apply bounding box.
Step 2: Features Extracted.
Step 3: Back propagation neural network training.
end // end of proposed algorithm
Virtual Mouse using hand gesture recognitionMuktiKalsekar
This project is to develop a Virtual Mouse using Hand Gesture Recognition. Hand gestures are the most effortless and natural way of communication. The aim is to perform various operations of the cursor. Instead of using more expensive sensors, a simple web camera can identify the gesture and perform the action. It helps the user to interact with a computer without any physical or hardware device to control mouse operation.
Object detection is a main role in image processing.the proposed methods detect various multiple object detection using image processing so provide a really to solving the security problem.
Recon Outpost system is designed to make available tools for home security and investigators that need to research surrounding ambient with video data in real time. The system can analyse and identify biometric faces in live video, and provide real time surveillance in adverse weather conditions.
Attendance Management System using Face RecognitionNanditaDutta4
The project ppt presentation is made for the academic session for the completion of the work from Bharati Vidyapeeth Deemed University(IMED) MCA department
Authentication of a person is the major concern in this era for security purposes. In biometric systems Signature is one of the behavioural features used for the authentication purpose. In this paper we work on the offline signature collected through different persons. Morphological operations are applied on these signature images with Hough transform to determine regular shape which assists in authentication process. The values extracted from this Hough space is used in the feed forward neural network which is trained using back-propagation algorithm. After the different training stages efficiency found above more than 95%. Application of this system will be in the security concerned fields, in the defence security, biometric authentication, as biometric computer protection or as method of the analysis of person’s behaviour changes.
Object detection is a computer technology related to computer vision and image processing that deals with detecting instances of semantic objects of a certain class (such as humans, buildings, or cars) in digital images and videos.
A Small Helping Hand from me to my Engineering collegues and my other friends in need of Object Detection
Object detection is a computer technology related to computer vision and image processing that deals with detecting instances of semantic objects of a certain class (such as humans, buildings, or cars) in digital images and videos. Well-researched domains of object detection include face detection and pedestrian detection. Object detection has applications in many areas of computer vision, including image retrieval and video surveillance.
Biometric ATM are used for wide range of applications like for Banking, Coupons & Self service ATM. Biometrics ATM offer ATM type interface along with at-least one Biometrics capture device like Fingerprint Scanner, Iris camera, Palm/Finger Vein scanner , Face recognition camera. They are often called Multi-Biometrics ATM, Wall mount Biometrics ATM, Biometrics Devices / Machine.
Most of the ATM in the past have been using ID cards to identify users but with the wide acceptance of Biometrics , a new generation of Biometrics ATM are being deployed for wide range of applications worldwide.
INTRO:
Nowadays, person identification (recognition) and verification is very important in security and resource access control.
Biometrics is the science of automatic recognition of individual depending on their physiological and behavioral attributes.
For centuries, handwritten signatures have been an integral part of validating business transaction contracts and agreements.
Among the different forms of biometric recognition systems such as
fingerprint, iris, face, voice, palm etc., signature will be most widely used.
SIGNATURE RECOGNITION
Signature Recognition is the procedure of determining to whom a particular signature belongs to.
Depending on acquiring of signature images, there are two types of signature recognition systems:
Online Signature Recognition
Offline Signature Recognition
STEPS
IMAGE ACQUSITION
Collection of signatures from 50 persons on blank paper.
The collected signatures are scanned to get images in JPG format to create database.
PREPROCESSING
Image pre-processing is a technique to enhance raw images received from cameras/sensors placed on satellites, space probes and aircrafts or pictures taken in normal day-to-day life for various applications.
The techniques for preprocessing used are
RGB to Gray Scale Conversion
Binarization
Thinning
Bounding Box
FEATURE EXTRACTION
Features are the characters to be extracted from the processed image.
It has used two feature techniques
Global Features
Grid Features
DWT
After applying DWT to all 9 blocks, each block is divided into horizontal, vertical and diagonal components. From each components two features mainly horizontal and vertical projection positions are extracted. Total 54 (9 x 3 x 2) features are extracted.
Grid features extracted from each block are
Horizontal Projection Position
Vertical Projection Position
Algorithm for Training phase
Description: Retrieval of a signature image from a database
Input: Training sample images.
Output: Construction of Back Propagation Neural Network.
Begin
Read the training samples images
Step1: Pre-processing
Convert the image into gray scale image.
Convert the gray scale image into binary image.
Apply thinning process.
Apply bounding box.
Step 2: Features Extracted.
Step 3: Back propagation neural network training.
end // end of proposed algorithm
Virtual Mouse using hand gesture recognitionMuktiKalsekar
This project is to develop a Virtual Mouse using Hand Gesture Recognition. Hand gestures are the most effortless and natural way of communication. The aim is to perform various operations of the cursor. Instead of using more expensive sensors, a simple web camera can identify the gesture and perform the action. It helps the user to interact with a computer without any physical or hardware device to control mouse operation.
Object detection is a main role in image processing.the proposed methods detect various multiple object detection using image processing so provide a really to solving the security problem.
Recon Outpost system is designed to make available tools for home security and investigators that need to research surrounding ambient with video data in real time. The system can analyse and identify biometric faces in live video, and provide real time surveillance in adverse weather conditions.
Attendance Management System using Face RecognitionNanditaDutta4
The project ppt presentation is made for the academic session for the completion of the work from Bharati Vidyapeeth Deemed University(IMED) MCA department
Authentication of a person is the major concern in this era for security purposes. In biometric systems Signature is one of the behavioural features used for the authentication purpose. In this paper we work on the offline signature collected through different persons. Morphological operations are applied on these signature images with Hough transform to determine regular shape which assists in authentication process. The values extracted from this Hough space is used in the feed forward neural network which is trained using back-propagation algorithm. After the different training stages efficiency found above more than 95%. Application of this system will be in the security concerned fields, in the defence security, biometric authentication, as biometric computer protection or as method of the analysis of person’s behaviour changes.
An offline signature recognition and verification system based on neural networkeSAT Journals
Abstract Various techniques are already introduced for personal identification and verification based on different types of biometrics which can be physiological or behavioral. Signatures lies in the category of behavioral biometric which can distort or changed with course of time. Signatures are considered to be most promising authentication method in all legal and financial documents. It is necessary to verify signers and their respective signatures. This paper presents an Offline Signature recognition and verification system(SRVS). In this system signature database of signature images is created, followed by image preprocessing, feature extraction, neural network design and training, and classification of signature as genuine or counterfeit. Keywords: biometrics, neural network design, feature extraction, classification etc.
Offline Handwritten Signature Identification and Verification using Multi-Res...CSCJournals
In this paper, we are proposing a new method for offline (static) handwritten signature identification and verification based on Gabor wavelet transform. The whole idea is offering a simple and robust method for extracting features based on Gabor Wavelet which the dependency of the method to the nationality of signer has been reduced to its minimal. After pre-processing stage that contains noise reduction and signature image normalisation by size and rotation, a virtual grid is placed on the signature image. Gabor wavelet coefficients with different frequencies and directions are computed on each points of this grid and then fed into a classifier. The shortest weighted distance has been used as the classifier. The weight that is used as the coefficient for computing the shortest distance is based on the distribution of instances in each of signature classes. As it was pointed out earlier, one of the advantages of this system is its capability of signature identification and verification of different nationalities; thus it has been tested on four signature dataset with different nationalities including Iranian, Turkish, South African and Spanish signatures. Experimental results and the comparison of the proposed system with other systems are consistent with desirable outcomes. Despite the use of the simplest method of classification i.e. the nearest neighbour, the proposed algorithm in comparison with other algorithms has very good capabilities. Comparing the results of our system with the accuracy of human\'s identification and verification, it shows that human identification is more accurate but our proposed system has a lower error rate in verification.
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHODeditorijcres
AKHILESH KUMAR YADAV, DEENBANDHU SINGH, VIVEK KUMAR
Department of Computer Science and Engineering
Babu Banarasi Das University, Lucknow
akhi2232232@gmail.com, deenbandhusingh85@gmail.com, vivek.kumar0091@gmail.com
ABSTRACT- Digital images can be easily modified using powerful image editing software. Determining whether a manipulation is innocent of sharpening from those which are malicious, such as removing or adding parts to an image is the topic of this paper. In this paper we focus on detection of a special type of forgery-the Copy-Move forgery, in this part of the original image is copied moved to desired location in the same image and pasted. The proposed method compress images using DWT (discrete wavelet transform) and divided into blocks and choose blocks than perform feature vector calculation and lexicographical sorting and duplicated blocks are identified after sorting. This method is good at some manipulation/attack likes scaling, rotation, Gaussian noise, smoothing, JPEG compression etc.
INDEX TERMS- Copy-Move forgery, Wavelet Transform, Lexicographical Sorting, Region Duplication Detection.
it's a signature verification project, where the signature is verified from our dataset and matched with the current one. If it matches the test case then the process is verified and if it doesn't then the process repeats or it depends on user, whether he/she want to continue the process or not.
High protection ATM system with fingerprint identification technologyAlfred Oboi
This project was carried out at the College of Engineering, Design, Art and Technology, Makerere university Kampala Uganda
The main objective of this project was to come up with a more secure ATM system that will reduce on the ATM fraud.
Offline signature identification using high intensity variations and cross ov...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
FINGERPRINT BASED LOCKER WITH IMAGE CAPTUREMichael George
As we are moving in a World of advancement, so the security is the major concern in order to keep data isolate from the unauthorised users to access. In today’s World, we need high degree security system for the protection of our document, important data, as well as memory and jewellery. This review paper presents a secure fingerprint locker which is feasible. This system is proved successful on all norms of security of lockers. There are other methods of verifying authentication through password, RFID but this method is most efficient and reliable. To provide perfect security to the lockers and to make the work easier, this project is taking help of two different technologies, i.e. Embedded System and Biometrics. Biometrics is basically the measurement and use of unique characteristics of living beings to make them distinguish from one another. And this is more reliable then passwords and tokens which can be lost or stolen by the humans. In this paper we are providing the work done on this technique.
Offline Handwritten Signature Verification using Neural Networkijiert bestjournal
The different biometric techniques have been discussed for ident ification. Such as face reading,fingerprint recognition and retina scanning and these are known as vision based i dentification. There are non vision based identifications such as signature verification and the voice recogni tion. Signature verification plays a vital role in the field of the financial,commercial and for the legal matters. Signature by any person considered as the approval for any work so the signature is the preferred authenticat ion. In this paper signature verification is done by means of image processing,geometric feature extraction and by using neural network technique.
India is one of the countries which has the electronic voting machine for parliamentary and assembly polls. But in every poll election commission is facing so much of troubles and various types of issues through the election. The most familiar issue which is faced by the election commission is, no proper acknowledgement regarding the confirmation of casting the votes, duplication or illegal casting of votes. In this project all these issues has been handled and overcome with the perfect solution. The main advantage of this project is handling of data by using biometric system such as finger print and face recognition (is done by masking technique). This is used to ensure the security to avoid fake and repeating voting. It also enhances the accuracy and speed of the process. The system performs with perfect recognition on a face and thumb impression of all the eligible voters in a constituency, which is done as pre-polled procedure. During election, thumb impression and face templates of voters is given as an input to the system. This is then compared with the already stored database and available records. If the particular pattern matches with the record then the voters are allowed to vote but incase if it doesn’t match or in case of repetition, voters vote are denied or gets rejected. The result is instant and counting is done.
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Sign verification
1. Signature Verification using
Grid based feature extraction
Aniket Sahasrabuddhe
Anurag
D. Y. Patil College Of Engineering Shashank
Akurdi, Pune Sushant Saurav
3. Introduction
Computers are largely used in almost each and
every field.
Thesecurity measures to be used must be
cheap, reliable and un-intrusive to the
authorized person.
5. Types of signature Identification
Offline Signature Verification
deals with shape only
Online signature Verification
deals with dynamic features like speed, pen
pressure, directions, stroke length, and when the
pen is lifted from the paper
6. Existing systems and limitations
UsingVariable Length Segmentation and
Hidden Markov Models
New extreme points warping technique
Wavelet Transform Based Global Features
• Percentage of error occurrence is high
• It has heavy computational load
• Optimal performance not guaranteed
7. Challenging tasks
Differentiating between the parts of the signature
that vary with each signing.
The signature can vary substantially over an
individual’s lifetime.
8. Proposed Work
Signature Acquisition
Signature Pre-processing
Feature Extraction
Signature Verification
Fig 1 System Architecture
13. Applications
Banking,
Passport office,
And any other places which require
identification !
14. Advantages
Low error rate.
Forgery is detected even when the forger has
managed to get a copy of the authentic
signature.
Fast and simple training.
Cheap hardware.
Little storage requirements.
22. Requirements & Technologies
The hardware component we are using here is a scanning
device(WEBCAM), high RAM for better results and good
processor.
• Operating System: Windows XP or Higher
• NetBeans IDE 7.0
• SDK - J2SE
• Intel core 2 duo processor
• 2.1 GHZ, 1 GB RAM
23. Conclusion
The pre-processed signature i.e. resized, binarized,
thinned and rotation normalized signature is
segmented into grid of size 10x20 cells where each
cell is having 100 pixels.
The system does not need any special hardware like
tablet, fingerprint verification or iris scanning
systems.
It requires only low cost webcams
The database used for the verification will not be
large.
24. References
Muhammed Nauman Sajid “Vital Sign: Personal Signature based Biometric
Authentication System”, Bs degree thesis, Pakistan Institute of Engineering and
Applied sciences, sept 2009.
K. Yasuda, D. Muramatsu, and T. Matsumoto, “Visual-based online signature
verification by pen tip tracking”, Proc. CIMCA 2008, 2008, pp. 175–180.
D.Muramatsu, M. Kondo, M. Sasaki, S. Tachibana, and T. Matsumoto. “A
markov chain monte carlo algorithm for bayesian dynamic signature
verification”. IEEE Transactionson Information Forensics and Security,
1(1):22–34, March,2006.
Satoshi Shirato, D. Muramatsu, and T. Matsumoto, “camera-based online
signature verification: Effects of camera positions.” World Automation
congress2010 TSI press.
D. Muramatsu, K. Yasuda, S. Shirato, and T. Matsumoto. “Visual-based online
signature verification using features extracted from video”, Journal of Network
and Computer Applications Volume 33, Issue 3, May 2010, Pages 333-341.
25. Cont.
M. E. Munich and P. Perona. “Visual identification by signature tracking.”
IEEE Trans. Pattern Analysis and MachineIntelligence, 25(2):200–217,
February 2003.
F.A.Afsar, M. Arif and U. Farrukh, “Wavelet Transform Based Global Features
for Online Signature Recognition”, Proceeding of IEEE International Multi-
topic Conference INMIC, pp. 1-6 Dec. 2005.
Charles E. Pippin, “Dynamic Signature Verification using Local and Global
Features”, Georgia Institute of Technology, July 2004.
Hao Feng and Chan Choong Wah, “Online Signature Verification Using New
Extreme Points Warping Technique”, Pattern Recognition Letters, vol. 24, pp.
2943-2951, Dec. 2003.
F.A. Afsar, M. Arif and U. Farrukh, “Wavelet Transform Based Global Features
for Online Signature Recognition”, Proceeding of IEEE International Multi-
topic Conference INMIC, pp. 1-6 Dec. 2005.