Professional Documents
Culture Documents
Offline Signature Verification and Recognition Using ANN: B.S Pawar
Offline Signature Verification and Recognition Using ANN: B.S Pawar
Abstract— Due to Compare to biometric and cryptographic forms of identification handwritten signatures are considered as
the most reliable methods of authenticating a persons identity.To improve security in different transactions like financial,
commercial and legal signature plays an important role. This paper presents a method for verifying handwritten offline
signatures by using NN, Various features are extracted and used to train the neural network.
Keywords—Dynamic Time wrapping, Hidden Markov Models, Neural Networks, Support Vector Machines, Statistical
approach, Template matching
Signature verification and recognition is an emerging The field of off-line signature verification has
area of research. In past few years, we have seen enjoyed a great deal of attention over the past few
many ambiguous large-scale efforts based on decades. In this section we present a collection of
different personal characteristics of a human being. verification systems proposed over the years.
The most common characteristics used for Although some of these systems may seem dated,
authentication include voice, lip movements, hand they represent noteworthy efforts in the field and also
geometry, face, odor, gait, iris, retina and fingerprint. provide the reader with a historical perspective
All of these psychological and behavioral regarding advances made in recent years. For a
characteristics are called biometrics. [1] comprehensive discussion regarding the current state
The signature verification and recognition has many of the art, the reader is referred to Impedovo and Pirlo
advantages over other biometric techniques. This (2008).
paper deals with method of verification of an offline Fang et al. (2001) propose a method based on the so-
signature by extracting various features [1]. The called smoothness criterion, since the authors suggest
method starts with scanning signatures into the that the cursive segments of forgeries are generally
computer and then using normalization techniques less smooth than those of genuine signatures. Two
followed by feature extraction and neural network approaches are proposed for extracting such a
training ends with implementing recognition and smoothness feature. The crossing method involves
verification techniques. comparing each stroke segment to its smoothed
Signature verification emerged in past few decades version, obtained by performing a second-order cubic
benefit the advantage of being highly accepted by spline smoothing operation. The second method
potential customers. Signature recognition has a long employs the fractal dimension of each stroke segment
history, which goes back to the appearance of the to evaluate its smoothness. The obtained smoothness
writing itself. Furthermore, the use of signature feature is then combined with various global shape
recognition as an authentication method is that most features. These include the signature aspect ratio,
of the modern portable computers and personal baseline shift of the vertical projection, the
digital assistants (PDAs) use handwritten inputs. percentage of positively slanted border pixels, as well
A signature verification system and techniques used as the percentage of vertically slanted border pixels.
to solve such problem can be divided into two types: Verification is achieved by means of an SDC based
online and offline. In an online system a signature on the Mahalanobis distance.
data can be obtained from an electronic tablet. In Majhi et al. (2006) [2] implement a novel feature
offline dynamic information about writing activity extraction method based on geometric centres.
such as speed of writing, pressure applied, no. of Features are obtained by recursively dividing a
strokes used in signatures [2]. In this sense signature signature image into sub-images along horizontal and
verification, becomes a typical pattern recognition vertical axes located on the geometric Centre of the
task knowing that variations in signature pattern are parent image. Geometric Centre’s of the final sub-
inevitable; the task of signature authentication can be images subsequently form the feature vector.
narrowed to drawing the threshold of the range of Coetzer (2005) utilizes DTW [11] in order to
genuine variation. In the offline signature verification construct a verification system aimed at detecting
techniques, images of the signatures written on a skilled and simple forgeries. Signature representation
paper are obtained using a scanner or a camera. is achieved by means of the discrete Radon transform
59
International Journal of Soft Computing and Artificial Intelligence, ISSN: 2321-404X, Volume-3, Issue-2, Nov-2015
(DRT). Experiments are performed on the For testing the system, another 320 genuine
Stellenbosch data set, collected from 22 writers, signatures and320 forgery signatures are taken from
containing 30 genuine signatures, 6 simple forgeries the same 40 persons in the training set.
and 6 skilled forgeries per writer. The author reports
EERs of approximately 18% and 4.5% when IV. SIGNATURE PROCESSING
considering skilled and simple forgeries, respectively. METHODOLOGY
Shanker and Rajagopalan (2007) [11] use a DTW
algorithm which is modified to incorporate a stability This section deals with image processing, moment
factor, in conjunction with a vertical projection invariant method and signature verification &
feature. Their signature database, collected from 100 recognition techniques using ANN. The input to the
individuals, includes 1075 genuine signatures, 300 system is categorized as online signatures and offline
simple forgeries, as well as 56 skilled forgeries. The signatures. As stated above, online signatures
authors reportedly achieve an FRR of 25% and FARs characterize dynamic features (time dependent) that
close to 0% and 20% when considering simple and contribute additional input for classification. Whereas
skilled forgeries, respectively. offline signature verification and recognition is
Guler and Meghdadi (2008) also optimize the basic relatively challenging, as it doesn’t provide time
DTW algorithm in order to detect skilled and random domain information which may help classifier to
forgeries. Each signature image is converted into a enhance recognition results. Figure 1 depicts a typical
numerical sequence, or gradient stream, of localized signature verification system that is made up by
pixel gradients based on a 4-directional axis. The data consecutive phases of data acquisition, preprocessing,
set considered is a sub-corpus of the MCYT bimodal feature extraction, training and verification.
database.
Armand et al. (2006) employ a novel combination of
the modified direction feature with additional
distinguishing features such as the image centroid,
surface area, length and skew. Using the
aforementioned feature set, they compare the
performance of a resilient back-propagation (RBP)
NN with that of an RBF-NN.
60
International Journal of Soft Computing and Artificial Intelligence, ISSN: 2321-404X, Volume-3, Issue-2, Nov-2015
Signature acquisition: The captured or scanned The kurtosis measurement highlights the peaks in
images containing individual’s signature are collected each segment of a signature. It also measures the
in database. existence, or the absence of tails, that are
Signature preprocessing: Is used to improve quality unconnected lines with no peaks. As you can see,
of image and to reduce noise. Following steps are kurtosis and skewness are highly interlinked.
used: transformations are used for colour to gray
scale image, resize the image, so that all images have 4. Orientation
same size& thinning the signatures [4]. Orientation defines the direction of the signature
Feature extraction: The main function of this step is lines. This feature is important because it allows us to
to generate feature which be used as comparison know how the signer wrote down the signature,
measurements. Since the issue of signature which letters came first emphasizing the direction of
verification is highly sensitive process more than one angles and peaks. The orientation feature is used to
feature/ measurement has to be generated in order to compute the optimal dominant ridge direction in each
enhance the accuracy of result. There are four main block of a signature. Orientation is acquired by
features. These are eccentricity, skewness, kurtosis applying the ratio of angle of major axis. The
and orientation. orientation of the signature can be found using the
Matlab “regionprops” function, in which the angle
1. Eccentricity between the x-axis and the major axis of the ellipse
Eccentricity is defined as the central point in an that has the same second-moments as the region.
object. In case of signature image, eccentricity is the
central point of the signature. The importance of this
feature is that we need to know the central point of an
image, this will indicate a possible imitation of the
signature, but this is not enough evidence by itself.
The central point is acquired by applying the ratio of
the major to the minor axes of an image.
2. Skewness
Skewness is a measure of symmetry, or more
precisely, the lack of symmetry. A distribution, or
data set, is symmetric if it looks the same to the left
and right of the centre point. The skewness can be Figure 3. The orientation detection
defined according to univariate dataY1, Y2…, YN.
Where Y is the mean, S is the standard deviation, and Figure 3 illustrates the axes and orientation of the
N is the number of data points. The measurement of ellipse. The left side of the figure 4 shows an image
skewness allows us to determine how bowed are the region and its corresponding ellipse. The right side
lines in each segment of the signature. The shows the same ellipse, with features indicated
percentage of this torsion is then calculated and graphically; the solid blue lines are the axes, the red
extracted. Furthermore, this percentage is compared dots are the foci, and the orientation is the angle
to that extracted from the other image. The between the horizontal dotted line and the major axis.
importance of this feature is that it measures the Processing of Signature : It consists of two main
symmetry or the lack of it, which is an important parts namely training phase & testing phase In the
aspect of a signature. Most signatures are experiment of proposed method 150 genuine
complicated, with no edges but twists, and the width signatures of 25 individuals are used to train the
and height of these twists is a very important aspect network and also some skilled forgeries are
for measurement and comparison. introduced in the training dataset
Training Phase: Recognition: As a result of all
3. Kurtosis previous processes, recognition of a signature is
Kurtosis is a measure of whether the data are peaked identified. The following are the steps detailing how
or flattened, relative to a normal distribution. That is, exactly the recognition process is designed and
data sets with high kurtosis tend to have a distinct operates:
peak near the mean, decline rather rapidly, and have The trained neural network – which has learned
heavy tails. Data sets with low kurtosis tend to have a how to work on signatures and their features
flat top near the mean rather than a sharp peak. A through training – compares the features of the
uniform distribution would be the extreme case. given signature with those of the signatures in
The Kurtosis can be defined according to univariate the database.
data Y1, Y2,…,YN. Where Y is the mean, S is the The differences between the extracted features
standard deviation, and N is the number of data from the new signature and those in the database
points. There are other definitions for excess kurtosis, are calculated. The outcome of the total of these
but here in this paper the original definition is used. differences is calculated.
61
International Journal of Soft Computing and Artificial Intelligence, ISSN: 2321-404X, Volume-3, Issue-2, Nov-2015
The tag of the signature with least differences is Training for verification is previous explained in
then returned, with a number showing the Section Signatures used for testing the verification
percentage of similarity in signatures. system are obtained the same way as in the
Based on the similarity percentage, it is decided recognition system. We tested the verification
whether the signature is original or not. software using 150 signatures; 75 imitations
If the percentage of similarity ranges between (counterfeit signatures) and 75 true signatures. The
85- 100%, the signature is considered original. program detected (classified) 3 true signatures and 3
This is based on the natural signature recognition counterfeits correctly. In other words, all counterfeit
method, which says that there are natural signatures are detected correctly. Only one signature
differences in the signature of a single person, in is classified as a counterfeit while it was not (i.e. a
the multiple tries. “false negative”). Obviously, a “false negative”
If the percentage of similarity ranges between should be more acceptable in comparison to a “false
75-85%, the signature is considered relatively positive”, because the person can always be given a
suspicious. second chance to prove that the signature is his/hers.
If the percentage of similarity is lower than 75%, On the other hand, a false positive in verification
the signature is considered highly suspicious. carries a lot of risk.
Testing the verification system Figure: 4 Display the features of two signatures
62
International Journal of Soft Computing and Artificial Intelligence, ISSN: 2321-404X, Volume-3, Issue-2, Nov-2015
REFERENCES
63