Professional Documents
Culture Documents
Matching Between Important Points Using Dynamic Time Warping For Online Signature Verification
Matching Between Important Points Using Dynamic Time Warping For Online Signature Verification
Matching Between Important Points Using Dynamic Time Warping For Online Signature Verification
2
(a) corresponding points of the two signals by use of an algorithm
based on Dynamic Time Warping (DTW) method; first, a
60 n × m matrix is formed which its (i, j ) element is determined
probability of angles difference 50 by (4):
40
n 2
30 d(i,j) = ∑ ( Ak ,i − Bk , j ) (4)
k =1
20
To remove the rotation, we rotate the signature S2 by –α w k = (i(k), j(k)) max(m, n) < k < m + n − 1 (5)
using (2).
3
If x 1, i in signal A matches k > 1 points of the signal B, then presented with a numerical example. The occurrence time of
the important points of the signal A is presented in Table I and
it will repeat k-1 times and if x 2, i matches k points of the Table II shows the corresponding point of an important point
signal A, then it will be extended by the same method [7]. on a section of the matching path obtained by DTW method.
With this algorithm, two signals with the same time length TABLE I
are obtained which their corresponding points are matched to Occurrence time of the important points in signal A
each others. However, this algorithm reduces the distinction Important Points
between the genuine and forged signatures. In this paper, to 10 17 24 33 41 45
keep the distinction between original and forged signatures, a (A)
method is developed based on important points matching for
unifying the time length of the signals.
TABLE II
This is done in three steps; in the first step, from the first Representation of the corresponding point in the signal B1 on a section of
signature, zero-crossing points of the velocity signals X and Y the matching of the time axis of signals A and B
are derived as important points of the signature. In the second
step, on the matching path, the corresponding points with the A1 7 8 9 10 10 10 11 12 13
important points in the second signal are determined. Finally,
B1 7 8 9 10 11 12 13 14 15
in the third step, by use of the important points matching, the
time length of the signals will be unified.
Third Step: Unifying the time length of signals
First step: extraction of important points
For the unifying the time length of two signals, we place the
To find the important points in the velocity signals of the important points, and the points corresponding with important
first signature, their zero-crossing points will be defined points inside the array C with 2 × N dimension in which N is
according to the following (8). In other words, the equal to the number of important points. The pair of C (1, n)
zero-crossing points of the velocity signal along the direction and C (2, n) show the n-th matching. In addition to the
of X and Y are considered as the important points.
matching of the important points with the corresponding
points, we match the first and last points of two signals.
Vx ( n) × Vx ( n − 1) < 0 OR V y ( n) × V y ( n − 1) < 0 (8)
Suppose the time length of the signal A is equal to p and for
the signal B is q. To match the two signals the time axis of the
The n-th important point from the signal A is presented by signal A is kept constant and just change the time axis of the
the element e(1, n) . signal B according to (9).
Ti = α × ms _ i (12)
ms _ i =
∑ similarity
10
(c) In (12), Ti is a decision boundary for the signatures of an
i-th person and α is an experimental coefficient which is
Fig. 3. (a) Signals x of the genuine and forged signatures, (b) Unifying
the time length with DTW method, (c) Unifying the time length with
determined from the error graphs, based on the required
the proposed method security level.
Fig. 3. (b) and Fig. 3. (c) show that the proposed method, in VI. DECISION MAKING
comparison with the method described by reference [7], In the verification stage, similarity of the input with each of
increases the distinction level of the genuine and forged 5 training-step signatures is calculated and the mean value of
signatures. the 3 first higher similarities, are considered as the similarity
C. Similarity calculation index of the input signature with the training stage signatures.
This index is determined experimentally. Similarities of an
Following the unifying procedure of the time length of the
input signature with training samples assigned to the i-th
signals, corresponding to the two signatures, we place the
person are presented with score i. Procedure of signature
values of the x، y، v x and v y of one signature in the matrix g comparisons in the step of training and decision is presented in
and the corresponding signals of the another signature in the Fig. 4. (a) and Fig. 4. (b), respectively.
matrix F and then we normalized these matrices by use of (10).
5
which is called EER, is used for the evaluation of the signature
verification system. Fig. 5 shows false acceptance rate and
S2 false rejection rate with different values of α for the proposed
S1 S3 system, when applying our method on SVC2004 dataset.
45
FAR
40 FRR
35
30
S5 S4
Error rate
25
20
(a)
15
10 X: 0.93
Y: 6.33
Input 5
0
0.65 0.7 0.75 0.8 0.85 0.9 0.95 1
S2 Alfa
For evaluation of the signature verification system, two The results show that the proposed method for the unifying
types of error are defined: First type of error is represented of the time length of the signals reduces the error rate by 55%,
with FAR. It shows the verification rate of forged signature as compared to the method described by the reference [7] and
and the second type of error is represented by FRR and it it has a superior performance compared to other methods.
shows the rejection rate of the genuine signatures. These two Also the proposed signature verification system for skilled
types of errors are proportional to each other inversely; i.e. if forgery signatures is ranked 2nd in comparison with the other
the decision boundary changes somehow to FAR decreases, teams participating in the first international signature
then the value of FRR will increase. Therefore, the charts of verification competition. Furthermore, this method for the
the FAR and FRR are drawn versus the variation of the verification of the random forgery signatures yields no
decision boundary and the intersectional point of two graphs, verification error and it will be ranked first.
6
B. Discussion VIII. CONCLUSIONS
For signature verification systems, some of the signatures Distinction increase between genuine and forged signatures,
are verified with error. We found some reasons reported in the improves the efficacy of the signature verification system. In
following. this paper, by use of important points matching for unification
It is easy to forge some signatures that are the name of of time length of signals and the calculation of the similarity
signers or signatures that have simple shapes as shown in Fig.6 level by the application of an extended regression, the
and Fig. 7, respectively. distinction level between the genuine and forged signatures is
Some complex signatures have high intra-class changes increased significantly. By use of this developed method, the
(Fig. 8). Therefore some genuine signatures are rejected, hence EER percentage for the signatures of the SVC2004 and
the FRR value of the verification system are increased. professional forged signatures, were obtained 6.33%, while the
value of the EER for the all points matching method for
unification of the time length of the signals and also
calculation of the similarity, was reported 14.21%. The
proposed signature verification system for skilled forgery
signatures is ranked 2nd in comparison with the other teams
participating in the first international signature verification
(a) (b) (c) competition. Furthermore, this method for the verification of
the random forgery signatures yields no verification error and
it will be ranked first.
Fig. 6. signature that is the person's name
(a) Training signature,
(b) genuine signature was rejected, REFERENCES
(c) forged signature was verified
[1] G.Gupta, R.Joyce, “Using position extrema points to capture shape in
on-line handwritten signature verification” Pattern Recognition, vol.40,
pp. 2811 – 2817, 2007
[2] A.Kholmatov, B.Yanikoglu, “Identity authentication using improved
online Signature verification method” Pattern Recognition, vol.26,
pp.2400–2408, 2005
[3] M. Talal Ibrahim, M. Aurangzeb Khan, K. Saleem Alimgeer, M. Khalid
khan, I.A.Taj, L.Guan “Velocity and Pressure-based partitions of
horizontal and veritical trajectories on-line signature verification”
Pattern Recognition, vol.43, pp.2817–2832, 2010
(a) (b)
(c) [4] A. Alizadeh, T.Alizadeh, Z.Daei, “Optimal Threshold Selection for
Online Verification of Signature” IMECS international Conference of
Artificial Intelligence and Applications, Hong-Kong, vol.1, pp.98-102,
March 2010
Fig. 7. a sample of the signatures that are simple [5] J.Lee, H.Yoon, J.Sob, B.Chon, Y.K.Chong, “Using geometric extrema
(a) Training signature, for segment-to-segment characteristics comparison in online signature
(b) genuine signature was rejected, verification” Pattern Recognition, vol.37, pp.93–103, 2004
(c) forged signature was verified [6] I.Nakanishi, H.Sakamoto, Y.Itoh, Y.Fukui, “Multi-matcher online
signature verification system in DWT domain” Proc. Int. Conf. on
Acoustics, Speech, and Signal Processing, vol.2, pp. 965–968, March
2005
[7] H.Lei, S.Palla, V.Govindaraju, “ER2: An intuitive similarity measure
for on-line signature verification” IWFHR ’04: Proceedings of 9th
International Workshop on Frontiers in Handwriting Recognition
(IWFHR’04), IEEE Computer Society, pp.191-195, Tokyo, October
2004
(a) (b) (c) [8] M. Zoghi, V. Abolghasemi, “Persian Signature Verification Using
Improved Dynamic Time Warping-based Segmentation and
Multivariate Autoregressive Modeling” Proc. IEEE, 15th workshop of
Statistical Signal Processing (SSP'09), pp.329-332, 2009.
Fig. 8. The complex signature with the high intra-class changes [9] The First International Signature Verification Competition, 2004,
(a) Training signature, (SVC2004), available in http://www.cs.ust.hk/SVC2004.
(b) genuine signature was rejected, [10] M. Adamski, Kh. Saeed, “Online signature classification and its
(c) forged signature was verified verification system”, Proc. IEEE, 7-th Computer Information Systems
and Industrial Management Applications (CISIM’08), pp.189-194, June
2008.
We recommend using two signatures for verification of [11] A. Flores-Mendez, M. Bernal-Urbina, "Dynamic Signature Verification
through the Longest Common Subsequence Problem and Genetic
these types of signatures. For simple signatures, both of them Algorithms", Proc. IEEE, Evolutionary Computation Conferences
must be verified where for complex one, verification of one (CEC), Barcelona, pp. 1-6, July 2010.
signature is enough.