Handwritten Signature Verification Using Neural Ne
Handwritten Signature Verification Using Neural Ne
net/publication/258650160
CITATIONS READS
48 4,711
2 authors:
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Shalini Bhatia on 16 January 2015.
44
International Journal of Applied Information Systems (IJAIS) – ISSN : 2249-0868
Foundation of Computer Science FCS, New York, USA
Volume 1– No.2, January 2012 – www.ijais.org
1.4 Statistical approach A training stage consist of four major steps 1) Retrieval of a
Using statistical knowledge, the relation, deviation, etc signature image from a database 2) Image pre-processing 3)
between two or more data items can easily be found out. To Feature extraction 4) Neural network training
find out the relation between some set of data items we A testing stage consists of five major steps 1) Retrieval of a
generally follow the concept of Correlation Coefficients. In signature to be tested from a database 2) Image pre-processing
general statistical usage refers to the departure of two 3) Feature extraction 4) Application of extracted features to a
variables from independence. To verify an entered signature trained neural network 5) Checking output generated from a
with the help of an average signature, which is obtained from neural network.
the set of, previously collected signatures, this approach
follows the concept of correlation to find out the amount of Training stage
divergence in between them.
A unique method is introduced in [9]. In this approach various Sample database
features are extracted which include global features like image
gradient, statistical features derived from distribution of pixels Testing Stage
of a signature and geometric and topographical descriptors
like local correspondence to trace of the signature. The Input signature Input signature
classification involves obtaining variations between the
signatures of the same writer and obtaining a distribution in
distance space. For any questioned signature the method
obtains a distribution which is compared with the available Pre processing Pre processing
known and a probability of similarity is obtained using a
statistical Kolmorogorv-Smirnov test. Using only 4 genuine
samples for learning, the method achieves 84% accuracy Feature extraction Feature extraction
which can be improved to 89% when the genuine signature
sample size is increased. This method does not use the set of
forgery signatures in the training/learning.
Neural network Applying extracted features
1.5 Support Vector Machine training to trained neural network
Support Vector Machines (SVMs) are machine learning
algorithms that uses a high dimensional feature space and training
estimate differences between classes of given data to
generalize unseen data. The system in [10] uses global, Verification
directional and grid features of the signature and SVM for
classification and verification. The database of 1320
signatures is used from 70 writers. 40 writers are used for
Verification Result
training with each signing 8 signatures thus a total of 320
signatures for training. For initial testing, the approach uses 8
original signatures and 8 forgeries and achieves FRR 2% and
FAR 11%. Fig 1: Block Diagram of Handwritten Signature
Verification System using NN.
45
International Journal of Applied Information Systems (IJAIS) – ISSN : 2249-0868
Foundation of Computer Science FCS, New York, USA
Volume 1– No.2, January 2012 – www.ijais.org
Fig. 2 shows one of the original signature image taken from 2.1.3 Bounding box of the signature:
a database and all the subsequent figures show the resultant In the signature image, construct a rectangle encompassing
signature image obtained after performing the steps the signature. This reduces the area of the signature to be used
mentioned in an algorithm. for further processing and saves time. Fig. 5 shows signature
enclosed in a bounding box.
2.1 Pre-processing
The pre processing step is applied both in training and testing Fig 5: Signature image with a bounding box
phases. Signatures are scanned in gray. The purpose in this
phase is to make signature standard and ready for feature 2.2 Feature Extraction
extraction. The pre-processing stage improves quality of the
image and makes it suitable for feature extraction [11]. The The choice of a powerful set of features is crucial in signature
prepossessing stage includes verification systems. The features that are extracted in this
phase are used to create a feature vector. A feature vector of
dimension 24 has been used to uniquely characterize a
2.1.1 Converting image to binary candidate signature. These features are extracted as follows:
A gray scale signature image is converted to binary to make 1) Maximum horizontal and vertical histogram
feature extraction simpler. Horizontal histogram is calculated by going through each row
of the signature image and counting number of black pixels. A
2.1.2 Image resizing row with maximum number of black pixels is recorded as
The signatures obtained from signatory are in different sizes maximum horizontal histogram. Similarly, a vertical
so, to bring them in standard size, resizing is performed, histogram is calculated by going through each column of the
which will bring the signatures to standard size 256*256 as signature image and finding a column with maximum number
shown in Fig. 3. of black pixels.
2) Center of mass
Split the signature image in two equal parts and find center of
mass for individual parts.
46
International Journal of Applied Information Systems (IJAIS) – ISSN : 2249-0868
Foundation of Computer Science FCS, New York, USA
Volume 1– No.2, January 2012 – www.ijais.org
calculate normalized area of each part. Figure (6) shows tri 3. ALGORITHM
surface feature. Table 1 gives algorithm for the handwritten signature
verification system in which neural network is used for
verifying the authenticity of signatures.
47
International Journal of Applied Information Systems (IJAIS) – ISSN : 2249-0868
Foundation of Computer Science FCS, New York, USA
Volume 1– No.2, January 2012 – www.ijais.org
0
10
48
International Journal of Applied Information Systems (IJAIS) – ISSN : 2249-0868
Foundation of Computer Science FCS, New York, USA
Volume 1– No.2, January 2012 – www.ijais.org
49