SlideShare a Scribd company logo
Presented By
Vijayalakshmi.S.L
Under the Guidance of
Mrs.Smita Gour
Department of Computer Science
& Engineering
Basaveshwar Engineering College
Bagalkot
Contents
 Introduction
 Literature Survey
 Problem Definition
 Proposed Methodology
 Experimentations
 Conclusion and future work
References
Introduction
 Nowadays, person identification (recognition) and verification is
very important in security and resource access control.
 Biometrics is the science of automatic recognition of individual
depending on their physiological and behavioral attributes.
 For centuries, handwritten signatures have been an integral part of
validating business transaction contracts and agreements.
 Among the different forms of biometric recognition systems such as
fingerprint, iris, face, voice, palm etc., signature will be most widely
used.
Signature Recognition
 Signature Recognition is the procedure of determining to whom a
particular signature belongs to.
 Depending on acquiring of signature images, there are two types of
signature recognition systems:
 Online Signature Recognition
 Offline Signature Recognition
Literature Survey
1. Offline Handwritten Signature Recognition(Gulzar A.
Khuwaja and Mohammad S. Laghari)
 Biometrics, which refers to identifying an individual based on
his or her physiological or behavioral characteristics, has the
capability to reliably distinguish between an authorized person
and an imposter.
 This paper presents a neural network based recognition of
offline handwritten signatures system that is trained with low-
resolution scanned signature images.
2. Off-line Signature Verification Based on Fusion of Grid
and Global Features Using Neural Networks(Shashi Kumar
D R and K B Raja)
 In this paper Off-line Signature Verification Based on Fusion of
Grid and Global Features using Neural Network(SVFGNN) is
presented.
 The global and grid features are fused to generate set of
features for the verification of signature.
3. DWT based Off-line Signature Verification using Angular
Features (Prashanth C R )
 This papers presents DWT based Off-line Signature
Verification using Angular Features (DOSVAF).
 The signature is resized and Discrete Wavelet Transform
(DWT) is applied on the blocks to extract the features.
4. Off-Line Signature Recognition Systems(V A Bharadi)
 Handwritten signature is one of the most widely used biometric
traits for authentication of person as well as document.
 In this paper we discuss issues regarding off-line signature
recognitions.
 The performance metrics of typical systems are compared
along with their feature extraction mechanisms.
5. Offline Signature Recognition and Verification Based on
Artificial Neural Network(Mohammed A. Abdala)
 In this paper, a problem for Offline Signature Recognition and
Verification is presented.
 A system is designed based on two neural networks classifier
and two powerful features (global and grid features).
 The designed system consist of three stages which is pre-
processing, feature extraction and neural network stage.
6. Signature Recognition & Verification System Using Back
Propagation Neural Network (Nilesh Y. Choudhary, Dr.
Umesh. Bhadade)
 In this paper, off-line signature recognition & verification using
back propagation neural network is proposed which is based
on steps of image processing, invariant central moment &
some global properties and back propagation neural
networks.
Problem Definition
Signature Recognition is the procedure of determining to whom a
particular signature belongs to. In this work, the global and grid
features are combined and used to differentiate among the signature
images. These combined features are given to Back Propagation
Neural Network(BPNN) to train it, so that particular signature image
is recognized.
Proposed Model
Block Diagram of Signature Recognition
Image Acquisition :
 Collection of signatures from 50 persons on blank paper.
 The collected signatures are scanned to get images in JPG
format to create database.
Pre-Processing :
Image pre-processing is a technique to enhance raw images
received from cameras/sensors placed on satellites, space
probes and aircrafts or pictures taken in normal day-to-day life
for various applications.
The techniques for preprocessing used are
 RGB to Gray Scale Conversion
 Binarization
 Thinning
 Bounding Box
 RGB to Gray-Scale Convertion
 Binarization
RGB Image
Gray-Scale Image
Gray-Scale Image Binarized Image
 Thinning
 Bounding Box
Binarized Image Thinned Image
Thinned Image Bounded Image
Feature Extraction
Features are the characters to be extracted from the processed
image.
It has used two feature techniques
 Global Features
 Grid Features
Global Features
 Height :
 Width :
 Number of Black Pixels :
 Centroid of the signature :
Width
Height
Grid Features
 The cropped image is divided into 9 rectangular segments i.e.
(3 Χ 3) blocks.
3*3 Blocks of Grid Image
DWT(Discrete Wavelet Transform)
 DWT applied on 1st block. Each block contributes
horizontal, vertical and diagonal components.
1st Block Horizontal Vertical Diagonal
 After applying DWT to all 9 blocks, each block is divided into
horizontal, vertical and diagonal components. From each
components two features mainly horizontal and vertical
projection positions are extracted. Total 54 (9 x 3 x 2) features
are extracted.
Grid features extracted from each block are
 Horizontal Projection Position:
 Vertical Projection Position:
Total 54 features extracted by 9 blocks
Classification
 What is Neural Network..?
 Why Neural Network..?
 What is Back Propagation Neural Network(BPNN)…?
BPNN Architecture
Architecture of Back Propagation Neural Network
Training of BPNN
This involves developing a suitable neural network model
(BPNN). Then the extracted features are presented to
BPNN, which recognizes the different types of signature images.
The training takes place such that the neural network learns that
each entry in the input file has a corresponding entry in the output
file.
Run Snapshot of BPNN
Algorithm for Training phase
Description: Retrieval of a signature image from a database
Input: Training sample images.
Output: Construction of Back Propagation Neural Network.
Begin
Read the training samples images
Step1: Pre-processing
 Convert the image into gray scale image.
 Convert the gray scale image into binary image.
 Apply thinning process.
 Apply bounding box.
Step 2: Features Extracted.
Step 3: Back propagation neural network training.
end // end of proposed algorithm
Testing using Trained BPNN
In testing, input image from testing set is selected and its
features are extracted and given them to the trained model, the
trained BPNN model classifies given sample and produces
output as type of signature and corresponding pattern
Classification accuracy= Number of recognized signatures
Total number of testing signatures
Output Pattern for Recognition
Experimental Results
Experiment 1
The features extracted are listed as:
 Height of the signature
 Width of the signature
 Centroid of X-axis and Y-axis
 Number of black pixels of the signature
 The image is divided into 9 blocks and DWT is applied to each
block. Energy values of each block were extracted as a feature.
10
20
30
40
50
60
70
80
90
100
10 20 30 40 50
83.46 81 78.28 76.7 74
Performance Rate
Performance Rate
No of Persons
Performance Rate of 1st Experiment
Experiment 2
The features are extracted as listed below:
 Height of the signature
 Width of the signature
 Centroid of X-axis and Y-axis
 Number of black pixels of the signature
 The image is divided into 9 blocks and DWT is applied to each
block. From each block two features, horizontal and vertical
projection positions of horizontal, vertical and diagonal
components are extracted
10
20
30
40
50
60
70
80
90
100
10 20 30 40 50
93.33 92.91 91.38 90 89.47
Performance Rate
Performance Rate
No of Persons
Performance Rate of 2nd Experiment
No. of Persons Experiment 1 Experiment 2
10 83.46 % 93.33 %
20 81 % 92.91 %
30 78.28 % 91.38 %
40 76.7 % 90 %
50 74 % 89.47 %
Performance Rate
The performance rate of the two experiments
Conclusion
The objective of signature recognition is to recognize the signer
for the purpose of recognition. It has been observed that the
global and grid features extracted using discrete wavelet
transform are found to be efficient for offline signature
recognition. The combination of discrete wavelet transform and
back propagation neural network has given expected results. It
achieved the accuracy rate ranging from 93%-89% for enrollment
of 10 to 50 persons.
Future Work
The signature recognition can also be changed by changing the
features that can be extracted from a signature. So, the future
work of the recognition of signature can be done with the same
Neural Network methods but using different signature features
and compares the results with results of the present project.
References
 Gulzar A. Khuwaja and Mohammad S. Laghari, World Academy of
Science, Engineering and Technology , “Offline Handwritten Signature
Recognition”, 2011
 Shashi Kumar D R, K B Raja, R. K Chhotaray, Sabyasachi Pattanaik, “Off-line
Signature Verification Based on Fusion of Grid and Global Features Using
Neural Networks”, 2010
 Prashanth C R , K B Raja, Venugopal K R, L M Patnaik, “DWT based Off-line
Signature Verification using Angular Features”, 2012
 V A Bharadi, H B Kekre, “Off-Line Signature Recognition Systems”, 2010
 Mohammed A. Abdala & Noor Ayad Yousif, “Offline Signature Recognition and
Verification Based on Artificial Neural Network”, 2008
 H. Baltzakis, N. Papamarkos, “A New Signature Verification Technique Based On
A Two-Stage Neural Network Classifier”, 2001
 Khamael Abbas Al-Dulaimi, “Handwritten Signature Verification Technique
based on Extract Features”, 2011
 Hemanta Saikia, Kanak Chandra Sarma, “Approaches and Issues in Offline
Signature Verification System”, 2012
 Vu Nguyen, Michael Blumenstein, Graham Leedham, “Global Features for the
Off-Line Signature Verification Problem”, 2009
 Meenakshi S Arya, Vandana S Inamdar, “A Preliminary Study on Various Off-line
Hand Written Signature Verification Approaches”, 2010
 Javed Ahmed Mahar, Prof. Dr. Mumtaz Hussain Mahar, Muhammad Khalid
Khan, “Comparative Study of Feature Extraction Methods with K-NN for Off-
Line Signature Verification”, 2006
 Nilesh Y. Choudhary, Mrs. Rupal Patil, Dr. Umesh. Bhadade, Prof. Bhupendra M
Chaudhari,“Signature Recognition & Verification System Using Back
Propagation Neural Network”, 2013
 Manoj Kumar, “Signature Verification Using Neural Network”, 2012
 Paigwar Shikha and Shukla Shailja,“Neural Network Based Offline Signature
Recognition and Verification System”, 2013
 Srikanta Pal, Michael Blumenstein, Umapada Pal, “Off-Line Signature
Verification Systems: A Survey”, 2011
Thank You

More Related Content

What's hot

Online signature recognition
Online signature recognitionOnline signature recognition
Online signature recognition
Piyush Mittal
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
Santosh Kumar
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
Ankush Kr
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
Rekha Yadav
 

What's hot (20)

ECG BIOMETRICS
ECG BIOMETRICSECG BIOMETRICS
ECG BIOMETRICS
 
Ear Biometrics
Ear BiometricsEar Biometrics
Ear Biometrics
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
Fraud Detection Using Signature Recognition
Fraud Detection Using Signature RecognitionFraud Detection Using Signature Recognition
Fraud Detection Using Signature Recognition
 
Online signature recognition
Online signature recognitionOnline signature recognition
Online signature recognition
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGY
 
Face detection presentation slide
Face detection  presentation slideFace detection  presentation slide
Face detection presentation slide
 
face recognition
face recognitionface recognition
face recognition
 
Face Mask Detection PPT.pptx
Face Mask Detection PPT.pptxFace Mask Detection PPT.pptx
Face Mask Detection PPT.pptx
 
Handwritten Signature Verification using Artificial Neural Network
Handwritten Signature Verification using Artificial Neural NetworkHandwritten Signature Verification using Artificial Neural Network
Handwritten Signature Verification using Artificial Neural Network
 
Face recognition
Face recognitionFace recognition
Face recognition
 
FACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPTFACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPT
 
Biometrics ppt
Biometrics pptBiometrics ppt
Biometrics ppt
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
 
Offline signature verification based on geometric feature extraction using ar...
Offline signature verification based on geometric feature extraction using ar...Offline signature verification based on geometric feature extraction using ar...
Offline signature verification based on geometric feature extraction using ar...
 
Offline Signature Verification and Recognition using Neural Network
Offline Signature Verification and Recognition using Neural NetworkOffline Signature Verification and Recognition using Neural Network
Offline Signature Verification and Recognition using Neural Network
 
Off-line Signature Verification
Off-line Signature VerificationOff-line Signature Verification
Off-line Signature Verification
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Fingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptaFingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand gupta
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
 

Similar to Signature recognition

Biometric Signature Recognization
 Biometric Signature Recognization Biometric Signature Recognization
Biometric Signature Recognization
Faimin Khan
 
An offline signature verification using pixels intensity levels
An offline signature verification using pixels intensity levelsAn offline signature verification using pixels intensity levels
An offline signature verification using pixels intensity levels
Salam Shah
 

Similar to Signature recognition (20)

Biometric Signature Recognization
 Biometric Signature Recognization Biometric Signature Recognization
Biometric Signature Recognization
 
An offline signature recognition and verification system based on neural network
An offline signature recognition and verification system based on neural networkAn offline signature recognition and verification system based on neural network
An offline signature recognition and verification system based on neural network
 
journal paper publication
journal paper publicationjournal paper publication
journal paper publication
 
Artificial Neural Network Based Offline Signature Recognition System Using Lo...
Artificial Neural Network Based Offline Signature Recognition System Using Lo...Artificial Neural Network Based Offline Signature Recognition System Using Lo...
Artificial Neural Network Based Offline Signature Recognition System Using Lo...
 
Offline Handwritten Signature Verification using Neural Network
Offline Handwritten Signature Verification using Neural NetworkOffline Handwritten Signature Verification using Neural Network
Offline Handwritten Signature Verification using Neural Network
 
A Review on Geometrical Analysis in Character Recognition
A Review on Geometrical Analysis in Character RecognitionA Review on Geometrical Analysis in Character Recognition
A Review on Geometrical Analysis in Character Recognition
 
I017256165
I017256165I017256165
I017256165
 
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEMRELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
 
Automatic signature verification with chain code using weighted distance and ...
Automatic signature verification with chain code using weighted distance and ...Automatic signature verification with chain code using weighted distance and ...
Automatic signature verification with chain code using weighted distance and ...
 
Multimodal Biometrics at Feature Level Fusion using Texture Features
Multimodal Biometrics at Feature Level Fusion using Texture FeaturesMultimodal Biometrics at Feature Level Fusion using Texture Features
Multimodal Biometrics at Feature Level Fusion using Texture Features
 
Feature Level Fusion Based Bimodal Biometric Using Transformation Domine Tec...
Feature Level Fusion Based Bimodal Biometric Using  Transformation Domine Tec...Feature Level Fusion Based Bimodal Biometric Using  Transformation Domine Tec...
Feature Level Fusion Based Bimodal Biometric Using Transformation Domine Tec...
 
Offline Signature Recognition and It’s Forgery Detection using Machine Learni...
Offline Signature Recognition and It’s Forgery Detection using Machine Learni...Offline Signature Recognition and It’s Forgery Detection using Machine Learni...
Offline Signature Recognition and It’s Forgery Detection using Machine Learni...
 
Choudhary2015
Choudhary2015Choudhary2015
Choudhary2015
 
K012647982
K012647982K012647982
K012647982
 
A Simple Signature Recognition System
A Simple Signature Recognition System A Simple Signature Recognition System
A Simple Signature Recognition System
 
K012647982
K012647982K012647982
K012647982
 
OSPCV: Off-line Signature Verification using Principal Component Variances
OSPCV: Off-line Signature Verification using Principal Component VariancesOSPCV: Off-line Signature Verification using Principal Component Variances
OSPCV: Off-line Signature Verification using Principal Component Variances
 
B017150823
B017150823B017150823
B017150823
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
An offline signature verification using pixels intensity levels
An offline signature verification using pixels intensity levelsAn offline signature verification using pixels intensity levels
An offline signature verification using pixels intensity levels
 

Recently uploaded

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 

Recently uploaded (20)

How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 

Signature recognition

  • 1. Presented By Vijayalakshmi.S.L Under the Guidance of Mrs.Smita Gour Department of Computer Science & Engineering Basaveshwar Engineering College Bagalkot
  • 2. Contents  Introduction  Literature Survey  Problem Definition  Proposed Methodology  Experimentations  Conclusion and future work References
  • 3. Introduction  Nowadays, person identification (recognition) and verification is very important in security and resource access control.  Biometrics is the science of automatic recognition of individual depending on their physiological and behavioral attributes.  For centuries, handwritten signatures have been an integral part of validating business transaction contracts and agreements.  Among the different forms of biometric recognition systems such as fingerprint, iris, face, voice, palm etc., signature will be most widely used.
  • 4. Signature Recognition  Signature Recognition is the procedure of determining to whom a particular signature belongs to.  Depending on acquiring of signature images, there are two types of signature recognition systems:  Online Signature Recognition  Offline Signature Recognition
  • 5. Literature Survey 1. Offline Handwritten Signature Recognition(Gulzar A. Khuwaja and Mohammad S. Laghari)  Biometrics, which refers to identifying an individual based on his or her physiological or behavioral characteristics, has the capability to reliably distinguish between an authorized person and an imposter.  This paper presents a neural network based recognition of offline handwritten signatures system that is trained with low- resolution scanned signature images.
  • 6. 2. Off-line Signature Verification Based on Fusion of Grid and Global Features Using Neural Networks(Shashi Kumar D R and K B Raja)  In this paper Off-line Signature Verification Based on Fusion of Grid and Global Features using Neural Network(SVFGNN) is presented.  The global and grid features are fused to generate set of features for the verification of signature.
  • 7. 3. DWT based Off-line Signature Verification using Angular Features (Prashanth C R )  This papers presents DWT based Off-line Signature Verification using Angular Features (DOSVAF).  The signature is resized and Discrete Wavelet Transform (DWT) is applied on the blocks to extract the features.
  • 8. 4. Off-Line Signature Recognition Systems(V A Bharadi)  Handwritten signature is one of the most widely used biometric traits for authentication of person as well as document.  In this paper we discuss issues regarding off-line signature recognitions.  The performance metrics of typical systems are compared along with their feature extraction mechanisms.
  • 9. 5. Offline Signature Recognition and Verification Based on Artificial Neural Network(Mohammed A. Abdala)  In this paper, a problem for Offline Signature Recognition and Verification is presented.  A system is designed based on two neural networks classifier and two powerful features (global and grid features).  The designed system consist of three stages which is pre- processing, feature extraction and neural network stage.
  • 10. 6. Signature Recognition & Verification System Using Back Propagation Neural Network (Nilesh Y. Choudhary, Dr. Umesh. Bhadade)  In this paper, off-line signature recognition & verification using back propagation neural network is proposed which is based on steps of image processing, invariant central moment & some global properties and back propagation neural networks.
  • 11. Problem Definition Signature Recognition is the procedure of determining to whom a particular signature belongs to. In this work, the global and grid features are combined and used to differentiate among the signature images. These combined features are given to Back Propagation Neural Network(BPNN) to train it, so that particular signature image is recognized.
  • 12. Proposed Model Block Diagram of Signature Recognition
  • 13. Image Acquisition :  Collection of signatures from 50 persons on blank paper.  The collected signatures are scanned to get images in JPG format to create database.
  • 14. Pre-Processing : Image pre-processing is a technique to enhance raw images received from cameras/sensors placed on satellites, space probes and aircrafts or pictures taken in normal day-to-day life for various applications. The techniques for preprocessing used are  RGB to Gray Scale Conversion  Binarization  Thinning  Bounding Box
  • 15.  RGB to Gray-Scale Convertion  Binarization RGB Image Gray-Scale Image Gray-Scale Image Binarized Image
  • 16.  Thinning  Bounding Box Binarized Image Thinned Image Thinned Image Bounded Image
  • 17. Feature Extraction Features are the characters to be extracted from the processed image. It has used two feature techniques  Global Features  Grid Features
  • 18. Global Features  Height :  Width :  Number of Black Pixels :  Centroid of the signature : Width Height
  • 19. Grid Features  The cropped image is divided into 9 rectangular segments i.e. (3 Χ 3) blocks. 3*3 Blocks of Grid Image
  • 20. DWT(Discrete Wavelet Transform)  DWT applied on 1st block. Each block contributes horizontal, vertical and diagonal components. 1st Block Horizontal Vertical Diagonal
  • 21.  After applying DWT to all 9 blocks, each block is divided into horizontal, vertical and diagonal components. From each components two features mainly horizontal and vertical projection positions are extracted. Total 54 (9 x 3 x 2) features are extracted. Grid features extracted from each block are  Horizontal Projection Position:  Vertical Projection Position:
  • 22. Total 54 features extracted by 9 blocks
  • 23. Classification  What is Neural Network..?  Why Neural Network..?  What is Back Propagation Neural Network(BPNN)…?
  • 24. BPNN Architecture Architecture of Back Propagation Neural Network
  • 25. Training of BPNN This involves developing a suitable neural network model (BPNN). Then the extracted features are presented to BPNN, which recognizes the different types of signature images. The training takes place such that the neural network learns that each entry in the input file has a corresponding entry in the output file.
  • 27. Algorithm for Training phase Description: Retrieval of a signature image from a database Input: Training sample images. Output: Construction of Back Propagation Neural Network. Begin Read the training samples images Step1: Pre-processing  Convert the image into gray scale image.  Convert the gray scale image into binary image.  Apply thinning process.  Apply bounding box.
  • 28. Step 2: Features Extracted. Step 3: Back propagation neural network training. end // end of proposed algorithm
  • 29. Testing using Trained BPNN In testing, input image from testing set is selected and its features are extracted and given them to the trained model, the trained BPNN model classifies given sample and produces output as type of signature and corresponding pattern Classification accuracy= Number of recognized signatures Total number of testing signatures
  • 30. Output Pattern for Recognition
  • 31. Experimental Results Experiment 1 The features extracted are listed as:  Height of the signature  Width of the signature  Centroid of X-axis and Y-axis  Number of black pixels of the signature  The image is divided into 9 blocks and DWT is applied to each block. Energy values of each block were extracted as a feature.
  • 32. 10 20 30 40 50 60 70 80 90 100 10 20 30 40 50 83.46 81 78.28 76.7 74 Performance Rate Performance Rate No of Persons Performance Rate of 1st Experiment
  • 33. Experiment 2 The features are extracted as listed below:  Height of the signature  Width of the signature  Centroid of X-axis and Y-axis  Number of black pixels of the signature  The image is divided into 9 blocks and DWT is applied to each block. From each block two features, horizontal and vertical projection positions of horizontal, vertical and diagonal components are extracted
  • 34. 10 20 30 40 50 60 70 80 90 100 10 20 30 40 50 93.33 92.91 91.38 90 89.47 Performance Rate Performance Rate No of Persons Performance Rate of 2nd Experiment
  • 35. No. of Persons Experiment 1 Experiment 2 10 83.46 % 93.33 % 20 81 % 92.91 % 30 78.28 % 91.38 % 40 76.7 % 90 % 50 74 % 89.47 % Performance Rate The performance rate of the two experiments
  • 36. Conclusion The objective of signature recognition is to recognize the signer for the purpose of recognition. It has been observed that the global and grid features extracted using discrete wavelet transform are found to be efficient for offline signature recognition. The combination of discrete wavelet transform and back propagation neural network has given expected results. It achieved the accuracy rate ranging from 93%-89% for enrollment of 10 to 50 persons.
  • 37. Future Work The signature recognition can also be changed by changing the features that can be extracted from a signature. So, the future work of the recognition of signature can be done with the same Neural Network methods but using different signature features and compares the results with results of the present project.
  • 38. References  Gulzar A. Khuwaja and Mohammad S. Laghari, World Academy of Science, Engineering and Technology , “Offline Handwritten Signature Recognition”, 2011  Shashi Kumar D R, K B Raja, R. K Chhotaray, Sabyasachi Pattanaik, “Off-line Signature Verification Based on Fusion of Grid and Global Features Using Neural Networks”, 2010  Prashanth C R , K B Raja, Venugopal K R, L M Patnaik, “DWT based Off-line Signature Verification using Angular Features”, 2012  V A Bharadi, H B Kekre, “Off-Line Signature Recognition Systems”, 2010  Mohammed A. Abdala & Noor Ayad Yousif, “Offline Signature Recognition and Verification Based on Artificial Neural Network”, 2008  H. Baltzakis, N. Papamarkos, “A New Signature Verification Technique Based On A Two-Stage Neural Network Classifier”, 2001  Khamael Abbas Al-Dulaimi, “Handwritten Signature Verification Technique based on Extract Features”, 2011
  • 39.  Hemanta Saikia, Kanak Chandra Sarma, “Approaches and Issues in Offline Signature Verification System”, 2012  Vu Nguyen, Michael Blumenstein, Graham Leedham, “Global Features for the Off-Line Signature Verification Problem”, 2009  Meenakshi S Arya, Vandana S Inamdar, “A Preliminary Study on Various Off-line Hand Written Signature Verification Approaches”, 2010  Javed Ahmed Mahar, Prof. Dr. Mumtaz Hussain Mahar, Muhammad Khalid Khan, “Comparative Study of Feature Extraction Methods with K-NN for Off- Line Signature Verification”, 2006  Nilesh Y. Choudhary, Mrs. Rupal Patil, Dr. Umesh. Bhadade, Prof. Bhupendra M Chaudhari,“Signature Recognition & Verification System Using Back Propagation Neural Network”, 2013  Manoj Kumar, “Signature Verification Using Neural Network”, 2012  Paigwar Shikha and Shukla Shailja,“Neural Network Based Offline Signature Recognition and Verification System”, 2013  Srikanta Pal, Michael Blumenstein, Umapada Pal, “Off-Line Signature Verification Systems: A Survey”, 2011