Review on Signature Recognition using Neural Network, SVM, Classifier Combination of HOG and LBP Features
|
|
- Gabriel Bridges
- 5 years ago
- Views:
Transcription
1 IJSTE - International Journal of Science Technology & Engineering Volume 3 Issue 01 July 2016 ISSN (online): X Review on Signature Recognition using Neural Network, SVM, Classifier Combination of HOG and LBP Features Sangeeta Er. Manpreet Kaur M. Tech Student Assistant Professor Department of Electronics & Communication Engineering Department of Electronics & Communication Engineering CGE, Landran, Mohali CEC, Landran, Mohali Abstract Signature verification systems can be categorized as offline (static) and online (dynamic). This paper presents comparison between neural network, SVM and Classifier Combination of HOG and LBP features with surf feature based recognition of offline signatures system that is trained with poor-resolution scanned signature images. The signature of a person is an important biometric attribute of a human being which can be used to authenticate person s identity. However signatures can be taken asan image and recognized using computer vision and neural network and SVM with surf feature methods. With high speed computers, there is need to develop fast and robust algorithms for signature recognition. There are various approaches to signature recognition with a lot of scope of research. The Off-line Signature Recognition and verification is implemented using Matlab where the Neural Network is trained using all the attributes of a given image. For the implementation of this work Matlab software will be used. Whereas another approach follows the process of extracting out information from the image and creating a Histogram (HOG) using the vectors. After extracting, data is classified using Support Vector Machine (SVM). Keywords: Signature verification, Neural Network, HOG, LBP and SVM I. INTRODUCTION Signature is a behavioral biometric that codes the ballistic movements of the signer for his chosen signature. Compared to observable traits such as fingerprint, face or iris, a signature typically shows higher security and time variability. It is originated from the Latin word "Signare" meaning "Sign". For a long time, signatures have been used as an important element in authentication of any person's identity, who is felicitating the document. A signature comprises of special characters and flourishes and therefore most of the signatures can be unreadable. Also variations in single individual and interpersonal differences make it necessary to analyze them as complete images and not as letters and symbols put together. Signatures find various applications in places like banks, registered places and validating documents. Therefore, it is of utmost importance that a method on Signature Verification should be formulated to avoid forgery. Depending on the signature acquisition method used, automatic signature verification systems can be classified into two groups: online and offline. A static signature image, scanned at a high resolution, is the only input to offline systems. E.g. (Verification of signatures found on bank cheques and vouchers are among important applications for offline systems). On the other hand online (dynamic) system a person's dynamic information characteristics can also be accounted. But the problem with such a system is that, in reality, most of the documents are already pre-signed, therefore it is difficult to replace the pre-existing Signatures with the online ones. Due to the above reasons Offline signature verification forms a superior and major case of concern, it is possible in some real life scenarios for an impostor to trace over a genuine offline signature and obtain a high definition forgery. The availability of the signature s trajectory makes it simple for online verification systems to align two signatures and verify differences. A number of forgery types have been defined: a skilled forgery is signed by an imposter who has had access to a genuine signature for practice, and a randomorzero-effort forgery is signed without having any information about the signature, even the name of the person whose signature is forged. The system performance is generally reported using the False Rejection Rate (FRR) of genuine signatures and the False Acceptance rate (FAR) of forgery signatures. Different measures such as the Equal Error Rate (EER), the error rate where both FAR and FRR are same, as well as the false reject rates at fixed false accept rates are also commonly reported. Distinguishing Error Rate (DER) can also be possibly used, which is the average of FAR and FRR. The Signature verification process require various steps such as 1.Calculation of various graphs such as histograms etc. or generating a skill set based on various experiments performed on a database(e.g. GDPS-160) comprising of both the users and the forgeries. A combination of a number of signatures both from the user and forgeries are stored and are used to train and test an Artificial Neural Network(ANN).2.Classifications using various methods like Support vector Machines(SVM), Least Squares-Support Vector Machines(LS-SVM), Distance Likelihood ratio Test (DLRT), Artificial Neural Network (ANN), All rights reserved by 428
2 Fisher's Linear Discriminant (FLD), Logistics Discriminant and Naive Bayes. According to various experimental findings results, LS-SVM performs the best among the seven classifiers, achieving the Equal Error Rate (EER) of 13%. The topologies that have been studied are as follows:- 1) Enhanced Offline Signature Recognition Using Neural Network and SVM. 2) Computer Vision & Fuzzy Logic based Offline Signature Verification and Forgery Detection. 3) Offline Signature Verification Using Classifier Combination of HOG and LBP Features. This paper is organized as follows: In section II topologies mentioned above are summarized. Section III comparison on the mentioned topologies is discussed, Section IV concludes the paper. II. DIFFERENT TOPOLOGIES There are different methods that are proposed and are been implemented for the purpose of Signature verification, some of those methods are mentioned above. Each method has its own merits and demerits; the efficiency of a method is determined by the EER. Enhanced Offline Signature Recognition Using Neural Network and SVM The method of signature verification being reviewed benefits the advantage of being highly accepted by a large number of custom customers. More than 40 different feature types have been used for signature verification. Features can be divided into two major types: local and global. Majorly, all Off-line Signature Recognition and Verification System (SRVS) systems rely on feature extraction techniques and image processing. Image Preprocessing and Features Extraction We approach the question in two steps; firstly, the scanned signature image is preprocessed to make it suitable for extracting features out of it. Then, the preprocessed image is used to extract relevant geometric parameters that can separate forged signatures from exact ones using the ANN approach. 1) Preprocessing: The signature is first captured and converted into a format that can be processed be a computer (e.g. binary). 2) Colour Inversion: By eliminating the hue and saturation information while retaining the luminance, the true color of the image is transformed into gray scale image. Neural Network: Neural network is set of interconnected neurons. It is used for universal approximation. Artificial neural networks are composed of interconnecting artificial neurons (programming constructs that mimic the properties of biological neurons). Artificial neural networks may either be used to gain an understanding of biological neural networks, a neural network for handwriting recognition is defined by a set of input neurons which may be activated by the pixels of an input image. After being weighted and transformed by a function (determined by the network's designer), the activations of these neurons are then passed on to other neurons. Fig. 1: Neural Network Architecture of artificial neural network: The basic architecture consists of three types of neuron layers: input, hidden, and output. The architecture is shown in Fig 1. In feed-forward networks, the signal flow is from input to output units, strictly in a feed-forward direction. Delta Rule The delta rule is a gradient descent learning rule for updating the weights of the artificial neurons in a single layer perceptron. It uses the back propagation rule or network in its working. All rights reserved by 429
3 Computer Vision & Fuzzy Logic based Offline Signature Verification and Forgery Detection: Computer Vision Technology Computer Vision Technology is used for automating the vision perception process. III. METHODOLOGY The proposed approach aims at developing automatic offline signature verification and forgery detection system. Fig. 2 shows the algorithm that is used in order to build the automated signature verification and forgery detection system.the proposed methodology has been divided into two parts namely: Training Testing Both the above process requires the same dataset and the same number of Signatures of both the users and the forgeries. Training Phase: In the training part of the system, the following steps are performed: 1) ImageDatabase:The images are collected for training and are stored in a database. The images are collected by scanning them from a physical paper source. 2) Pre-Processing:In this step, each of the scanned signature goes through a series of pre-processing steps which include the following: 1) Image Resize 2) Binarization 3) Thinning 4) Rotation 5) Cropping 3) Feature Extraction:After the image has gone through the pre-processing, various features are extracted from the image. The extracted features out of each image are then stored in a MATLAB file. Fig. 2: Algorithm 4) Generate Training Feature Set: In this step, once all the features calculated is saved, then the required output is generated on the basis of which the Neural Network is trained. 5) Training Using ANN: Once the feature values and output values of the images are decided, then the neural network can be trained. All rights reserved by 430
4 Testing Phase: Review on Signature Recognition using Neural Network, SVM, Classifier Combination of HOG and LBP Features This phase is used to test the implementation of the system. It consists of following steps. 1) Browse Image 2) Pre- Process 3) Feature Extraction 4) Generate Testing Feature Set 5) Signature Identification Using Trained Artificial Neural Network 6) Forgery Detection Offline Signature Verification Using Classifier Combination of HOG and LBP Features. Histogram of Oriented Graphs (HOG) is a histogram that is made by dividing an image in a number of cells, each cell will overlap the other cell partially, information or various essential features are thus extracted out of the image and HOG of that image will be constructed. Histogram of Local Binary Pattern (LBP) is another histogram that is made by processing a gray-scale image and assigning it a 0 or 1 in respect of its intensity with its neighboring pixel. IV. METHODOLOGY Preprocessing A process of normalizing the features ofthe image to obtain the global rotation, scale and translation invariance of the image due to the changing signing conditions of the signature. Grids in Cartesian and Polar Coordinates To develop a robust system that should be invariant to any change, it is very important to divide the image into a number of grids and then extracting out information from those grids. This information is then used to construct graphs based on HOG or LBP. There are two methods for dividing an image into grids. Rectangular grids Circular tessellation Fig. 3: Rectangular Grid Fig. 4: Circular Tessellation Classification: Classification is performed using classifiers such as SVM. The SVM is further subdivided into two parts: Global SVM s User Dependent SVM s All rights reserved by 431
5 V. COMPARISON The above three mentioned methods for offline signature verification have their own merits & demerits. Each method is compared with other methods based on the EER parameter. The Neural Network approach has the advantage of increasing the parameter value of EER. The HOG and LBP system find its importance while using both of the above mentioned extraction techniques in unison. Although this method also has a certain disadvantages. By far the best method devised (on account of the EER value) is Offline Signature Verification Using Neural Network. This method has an accuracy of 95.16% [5]. VI. CONCLUSION The above paper reviews the different methods for Offline Signature Recognition and Verification. Signatures are a very important biometric in the present era and more and more methods are being devised for the better verification of signatures to reduce any mismatch or to avoid any forgery. Signature Verification using Neural Network alone could not provide better results.the results of matching are improved as we use neural network and SVM with surf feature technique for matching. Better improved quality of signature and matching results are obtained. In the system comprising of the HOG & LBP features, the system performance is measured using the skilled forgery tests of the GPDS-160 signature dataset. It improves as both the techniques are used in unison. REFERENCES [1] Md. Iqbal Quraishi, Arindam Das and Saikat Roy (2013), "A Novel Signature Verification and uthentication System Using Image Transformation and Artificial Neural Netwrok", Narula Institute of Technology, Kolkata. [2] Othman o-khalifa, Md. Khorshed Alam and Aisha Hassan Abdalla (2013), "An Evaluation on Offline Signature Verification using Artificial Neural Network Approach", International Conference on Computing, Electrical and Electronic Engineering (ICCEEE). [3] Rameez Wajid and Atif Bin Mansoor, "Classifier Performance Evaluation For Offline Signature Verification Using Local Binary Patterns", Institute of Avionics & Aeronautics, Air University, Islamabad, Pakistan. [4] Muhammad Imran Malik, Marcus Liwicki and Andreas Dengel, "Evaluation of Local and Global Features for Offline Signature Verification", German Research Center for AI (DFKI GmbH). [5] Juan Hu and Youbin Chen (2013), "Offline Signature Verification Using Real Adaboost Classifier Combination of Pseudo-dynamic Features", 12th International Conference on Document Analysis & Recognition. [6] Vaibhav Shah, Umang Sanghavi, Udit Shah, "Off-line Signature Verification Using Curve Fitting Algorithm with Neural Networks", Dwarkadas J. Sanghvi College of Engineering, Mumbai. [7] M.Nasiri, S.Bayati and F.Safi, "A Fuzzy Approach for the Automatic Off-line Signature Verification Problem Base on Geometric Features", Azad University, Iran. [8] Surabhi Garhawal and Neeraj Shukla (2013), "A Study on Handwritten Signature Verification Approaches", International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), Volume 2, Issue 8, August [9] L B. Mahanta, Alpana Deka (2013), "A Study on Handwritten Signature", International Journal for Computer Applications ( ), Volume 79 - No. 2, October [10] Pradeep Kumar, Shekhar Singh, Ashwani Garg and Nishant Prabhat (2013), "Hand Written Signature Recognition & Verification using Neural Network", International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 3, March 2013 [11] Ishita Sharma, Sakshi Goyal and Shanu Sharma, "Sign Language Recognition System for Deaf and Dumb People", International Journal of Engineering Research & Technology (IJERT) ISSN: , Vol 2, Issue 4,April- 2013, pp [12] R. Plamondon and S.N. Srihari, "Online and Offline Handwriting Recognition: A Comprehensive Survey", IEEE Tran. on Pattern Analysis and Machine Intelligence, vol.22 no.1, pp.63-84, Jan [13] M. Blumenstein. S. Armand. and Muthukkumarasamy, Off-line Signature Verification using the Enhanced Modified Direction Feature and Neural based Classification, International Joint Conference on Neural Networks, [14] Lal Chandra, Puja Lal, Raju Gupta, Arun Tayal,Dinesh Ganotra: Improved adaptive binarization technique for document image analysis. VISAPP (1) 2007: [15] Ved Prakash Agnihotri, Offline Handwritten Devanagari Script Recognition, I.J. Information Technology and Computer Science, 2012, 8, All rights reserved by 432
Static Signature Verification and Recognition using Neural Network Approach-A Survey
Available online www.ejaet.com European Journal of Advances in Engineering and Technology, 2015, 2(4): 46-50 Review Article ISSN: 2394-658X Static Signature Verification and Recognition using Neural Network
More informationOffline Signature Verification for Cheque Authentication Using Different Technique
Offline Signature Verification for Cheque Authentication Using Different Technique Dr. Balaji Gundappa Hogade 1, Yogita Praful Gawde 2 1 Research Scholar, NMIMS, MPSTME, Associate Professor, TEC, Navi
More informationNikhil Gupta *1, Dr Rakesh Dhiman 2 ABSTRACT I. INTRODUCTION
International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 6 ISSN : 2456-3307 An Offline Handwritten Signature Verification Using
More informationReal time verification of Offline handwritten signatures using K-means clustering
Real time verification of Offline handwritten signatures using K-means clustering Alpana Deka 1, Lipi B. Mahanta 2* 1 Department of Computer Science, NERIM Group of Institutions, Guwahati, Assam, India
More informationINDIAN VEHICLE LICENSE PLATE EXTRACTION AND SEGMENTATION
International Journal of Computer Science and Communication Vol. 2, No. 2, July-December 2011, pp. 593-599 INDIAN VEHICLE LICENSE PLATE EXTRACTION AND SEGMENTATION Chetan Sharma 1 and Amandeep Kaur 2 1
More informationA Study on Handwritten Signature Verification Approaches
A Study on Handwritten Signature Verification Approaches Surabhi Garhawal, Neeraj Shukla Abstract People are comfortable with pen and papers for authentication and authorization in legal transactions.
More informationA comparative study of different feature sets for recognition of handwritten Arabic numerals using a Multi Layer Perceptron
Proc. National Conference on Recent Trends in Intelligent Computing (2006) 86-92 A comparative study of different feature sets for recognition of handwritten Arabic numerals using a Multi Layer Perceptron
More informationPreprocessing and Segregating Offline Gujarati Handwritten Datasheet for Character Recognition
Preprocessing and Segregating Offline Gujarati Handwritten Datasheet for Character Recognition Hetal R. Thaker Atmiya Institute of Technology & science, Kalawad Road, Rajkot Gujarat, India C. K. Kumbharana,
More informationHandwritten Character Recognition using Different Kernel based SVM Classifier and MLP Neural Network (A COMPARISON)
Handwritten Character Recognition using Different Kernel based SVM Classifier and MLP Neural Network (A COMPARISON) Parveen Kumar Department of E.C.E Lecturer, NCCE Israna Nitin Sharma Department of E.C.E
More informationProposed Method for Off-line Signature Recognition and Verification using Neural Network
e-issn: 2349-9745 p-issn: 2393-8161 Scientific Journal Impact Factor (SJIF): 1.711 International Journal of Modern Trends in Engineering and Research www.ijmter.com Proposed Method for Off-line Signature
More informationA new seal verification for Chinese color seal
Edith Cowan University Research Online ECU Publications 2011 2011 A new seal verification for Chinese color seal Zhihu Huang Jinsong Leng Edith Cowan University 10.4028/www.scientific.net/AMM.58-60.2558
More informationAnalyzing features learned for Offline Signature Verification using Deep CNNs
Accepted as a conference paper for ICPR 2016 Analyzing features learned for Offline Signature Verification using Deep CNNs Luiz G. Hafemann, Robert Sabourin Lab. d imagerie, de vision et d intelligence
More informationFeature Extraction Technique Based On Circular Strip for Palmprint Recognition
Feature Extraction Technique Based On Circular Strip for Palmprint Recognition Dr.S.Valarmathy 1, R.Karthiprakash 2, C.Poonkuzhali 3 1, 2, 3 ECE Department, Bannari Amman Institute of Technology, Sathyamangalam
More informationA Review of Offline Signature Verification Techniques
J. Appl. Environ. Biol. Sci., 4(9S)342-347, 2014 2014, TextRoad Publication ISSN: 2090-4274 Journal of Applied Environmental and Biological Sciences www.textroad.com A Review of Offline Signature Verification
More informationContents 1 Introduction Optical Character Recognition Systems Soft Computing Techniques for Optical Character Recognition Systems
Contents 1 Introduction.... 1 1.1 Organization of the Monograph.... 1 1.2 Notation.... 3 1.3 State of Art.... 4 1.4 Research Issues and Challenges.... 5 1.5 Figures.... 5 1.6 MATLAB OCR Toolbox.... 5 References....
More informationFeature Extraction Techniques for Dorsal Hand Vein Pattern
Feature Extraction Techniques for Dorsal Hand Vein Pattern Pooja Ramsoful, Maleika Heenaye-Mamode Khan Department of Computer Science and Engineering University of Mauritius Mauritius pooja.ramsoful@umail.uom.ac.mu,
More informationStudy and Analysis of various preprocessing approaches to enhance Offline Handwritten Gujarati Numerals for feature extraction
International Journal of Scientific and Research Publications, Volume 4, Issue 7, July 2014 1 Study and Analysis of various preprocessing approaches to enhance Offline Handwritten Gujarati Numerals for
More informationA Study on Handwritten Signature
A Study on Handwritten Signature L B. Mahanta Institute of Adv. Study in Science and Technology Guwahati 35, P.O- Gorchuk Assam, India ABSTRACT Handwritten signature verification is a behavioral biometric.
More informationPunjabi Offline Signature Verification System Using Neural Network
International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 8958, Volume-3, Issue-2, December 2013 Punjabi Offline Signature Verification System Using Neural Network Rimpi Suman, Dinesh
More informationA Comparative Analysis Of Back Propagation And Random Forest Algorithm For Character Recognition From Handwritten Document
Journal of Computer Science and Applications. ISSN 2231-1270 Volume 7, Number 1 (2015), pp. 59-66 International Research Publication House http://www.irphouse.com A Comparative Analysis Of Back Propagation
More informationStudent Attendance Monitoring System Via Face Detection and Recognition System
IJSTE - International Journal of Science Technology & Engineering Volume 2 Issue 11 May 2016 ISSN (online): 2349-784X Student Attendance Monitoring System Via Face Detection and Recognition System Pinal
More informationA Novel Algorithm for Hand Vein Recognition Based on Wavelet Decomposition and Mean Absolute Deviation
Sensors & Transducers, Vol. 6, Issue 2, December 203, pp. 53-58 Sensors & Transducers 203 by IFSA http://www.sensorsportal.com A Novel Algorithm for Hand Vein Recognition Based on Wavelet Decomposition
More informationFigure 1. Artificial Neural Network structure. B. Spiking Neural Networks Spiking Neural networks (SNNs) fall into the third generation of neural netw
Review Analysis of Pattern Recognition by Neural Network Soni Chaturvedi A.A.Khurshid Meftah Boudjelal Electronics & Comm Engg Electronics & Comm Engg Dept. of Computer Science P.I.E.T, Nagpur RCOEM, Nagpur
More informationA Comprehensive Survey on Kannada Handwritten Character Recognition and Dataset Preparation
A Comprehensive Survey on Kannada Handwritten Character Recognition and Dataset Preparation Kiran Y. C Research Scholar, Jain University Associate Professor, Dept. of ISE Dayananda Sagar College of Engineering
More informationENHANCHED PALM PRINT IMAGES FOR PERSONAL ACCURATE IDENTIFICATION
ENHANCHED PALM PRINT IMAGES FOR PERSONAL ACCURATE IDENTIFICATION Prof. Rahul Sathawane 1, Aishwarya Shende 2, Pooja Tete 3, Naina Chandravanshi 4, Nisha Surjuse 5 1 Prof. Rahul Sathawane, Information Technology,
More informationSLIC based Hand Gesture Recognition with Artificial Neural Network
IJSTE - International Journal of Science Technology & Engineering Volume 3 Issue 03 September 2016 ISSN (online): 2349-784X SLIC based Hand Gesture Recognition with Artificial Neural Network Harpreet Kaur
More informationA SURVEY ON HAND GESTURE RECOGNITION
A SURVEY ON HAND GESTURE RECOGNITION U.K. Jaliya 1, Dr. Darshak Thakore 2, Deepali Kawdiya 3 1 Assistant Professor, Department of Computer Engineering, B.V.M, Gujarat, India 2 Assistant Professor, Department
More informationClassification of Features into Strong and Weak Features for an Intelligent Online Signature Verification System
Classification of Features into Strong and Weak Features for an Intelligent Online Signature Verification System Saad Tariq, Saqib Sarwar & Waqar Hussain Department of Electrical Engineering Air University
More informationFace Recognition Based Attendance System with Student Monitoring Using RFID Technology
Face Recognition Based Attendance System with Student Monitoring Using RFID Technology Abhishek N1, Mamatha B R2, Ranjitha M3, Shilpa Bai B4 1,2,3,4 Dept of ECE, SJBIT, Bangalore, Karnataka, India Abstract:
More informationBiometrics 2/23/17. the last category for authentication methods is. this is the realm of biometrics
CSC362, Information Security the last category for authentication methods is Something I am or do, which means some physical or behavioral characteristic that uniquely identifies the user and can be used
More informationKeyword: Morphological operation, template matching, license plate localization, character recognition.
Volume 4, Issue 11, November 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Automatic
More informationLabVIEW based Intelligent Frontal & Non- Frontal Face Recognition System
LabVIEW based Intelligent Frontal & Non- Frontal Face Recognition System Muralindran Mariappan, Manimehala Nadarajan, and Karthigayan Muthukaruppan Abstract Face identification and tracking has taken a
More informationPalm Vein Recognition System using Directional Coding and Back-propagation Neural Network
, October 21-23, 2015, San Francisco, USA Palm Vein Recognition System using Directional Coding and Back-propagation Neural Network Mark Erwin C. Villariña and Noel B. Linsangan, Member, IAENG Abstract
More informationIris Recognition using Hamming Distance and Fragile Bit Distance
IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 06, 2015 ISSN (online): 2321-0613 Iris Recognition using Hamming Distance and Fragile Bit Distance Mr. Vivek B. Mandlik
More informationIMPLEMENTATION OF NEURAL NETWORK IN ENERGY SAVING OF INDUCTION MOTOR DRIVES WITH INDIRECT VECTOR CONTROL
IMPLEMENTATION OF NEURAL NETWORK IN ENERGY SAVING OF INDUCTION MOTOR DRIVES WITH INDIRECT VECTOR CONTROL * A. K. Sharma, ** R. A. Gupta, and *** Laxmi Srivastava * Department of Electrical Engineering,
More informationRecognition System for Pakistani Paper Currency
World Applied Sciences Journal 28 (12): 2069-2075, 2013 ISSN 1818-4952 IDOSI Publications, 2013 DOI: 10.5829/idosi.wasj.2013.28.12.300 Recognition System for Pakistani Paper Currency 1 2 Ahmed Ali and
More informationImage Forgery Detection Using Svm Classifier
Image Forgery Detection Using Svm Classifier Anita Sahani 1, K.Srilatha 2 M.E. Student [Embedded System], Dept. Of E.C.E., Sathyabama University, Chennai, India 1 Assistant Professor, Dept. Of E.C.E, Sathyabama
More informationWavelet-based Image Splicing Forgery Detection
Wavelet-based Image Splicing Forgery Detection 1 Tulsi Thakur M.Tech (CSE) Student, Department of Computer Technology, basiltulsi@gmail.com 2 Dr. Kavita Singh Head & Associate Professor, Department of
More informationFACE RECOGNITION USING NEURAL NETWORKS
Int. J. Elec&Electr.Eng&Telecoms. 2014 Vinoda Yaragatti and Bhaskar B, 2014 Research Paper ISSN 2319 2518 www.ijeetc.com Vol. 3, No. 3, July 2014 2014 IJEETC. All Rights Reserved FACE RECOGNITION USING
More informationNumber Plate Detection with a Multi-Convolutional Neural Network Approach with Optical Character Recognition for Mobile Devices
J Inf Process Syst, Vol.12, No.1, pp.100~108, March 2016 http://dx.doi.org/10.3745/jips.04.0022 ISSN 1976-913X (Print) ISSN 2092-805X (Electronic) Number Plate Detection with a Multi-Convolutional Neural
More informationApply Multi-Layer Perceptrons Neural Network for Off-line signature verification and recognition
www.ijcsi.org 261 Apply Multi-Layer Perceptrons eural etwork for Off-line signature verification and recognition Suhail Odeh and Manal Khalil Computer And Information Systems Department, Bethlehem University
More informationVehicle License Plate Recognition System Using LoG Operator for Edge Detection and Radon Transform for Slant Correction
Vehicle License Plate Recognition System Using LoG Operator for Edge Detection and Radon Transform for Slant Correction Jaya Gupta, Prof. Supriya Agrawal Computer Engineering Department, SVKM s NMIMS University
More informationAuthenticated Automated Teller Machine Using Raspberry Pi
Authenticated Automated Teller Machine Using Raspberry Pi 1 P. Jegadeeshwari, 2 K.M. Haripriya, 3 P. Kalpana, 4 K. Santhini Department of Electronics and Communication, C K college of Engineering and Technology.
More informationOriginal and Counterfeit Money Detection Based on Edge Detection
Original and Counterfeit Money Detection Based on Edge Detection Muhammad Akbar, Awaluddin, Agung Sedayu, Aditya Andika Putra 1, Setyawan Widyarto 1,2 1 Program Magister Komputer, Universitas Budi Luhur,
More informationAn Evaluation of Automatic License Plate Recognition Vikas Kotagyale, Prof.S.D.Joshi
An Evaluation of Automatic License Plate Recognition Vikas Kotagyale, Prof.S.D.Joshi Department of E&TC Engineering,PVPIT,Bavdhan,Pune ABSTRACT: In the last decades vehicle license plate recognition systems
More informationMultimodal Face Recognition using Hybrid Correlation Filters
Multimodal Face Recognition using Hybrid Correlation Filters Anamika Dubey, Abhishek Sharma Electrical Engineering Department, Indian Institute of Technology Roorkee, India {ana.iitr, abhisharayiya}@gmail.com
More informationFingerprint Feature Extraction Dileep Sharma (Assistant Professor) Electronics and communication Eternal University Baru Sahib, HP India
Volume 4, Issue 7, July 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Shaifali Dogra
More informationEfficient Methods used to Extract Color Image Features
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,
More informationAn Overview of Biometrics. Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University
An Overview of Biometrics Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University What are Biometrics? Biometrics refers to identification of humans by their characteristics or traits Physical
More informationISSN Vol.02,Issue.17, November-2013, Pages:
www.semargroups.org, www.ijsetr.com ISSN 2319-8885 Vol.02,Issue.17, November-2013, Pages:1973-1977 A Novel Multimodal Biometric Approach of Face and Ear Recognition using DWT & FFT Algorithms K. L. N.
More informationHuman Identification Using Foot Features
I.J. Engineering and Manufacturing, 2016, 4, 22-31 Published Online July 2016 in MECS (http://www.mecs-press.net) DOI: 10.5815/ijem.2016.04.03 Available online at http://www.mecs-press.net/ijem Human Identification
More informationIdentification of Fake Currency Based on HSV Feature Extraction of Currency Note
Identification of Fake Currency Based on HSV Feature Extraction of Currency Note Neetu 1, Kiran Narang 2 1 Department of Computer Science Hindu College of Engineering (HCE), Deenbandhu Chhotu Ram University
More informationImplementation of License Plate Recognition System in ARM Cortex A8 Board
www..org 9 Implementation of License Plate Recognition System in ARM Cortex A8 Board S. Uma 1, M.Sharmila 2 1 Assistant Professor, 2 Research Scholar, Department of Electrical and Electronics Engg, College
More informationFraud Detection in Examination using LBP method
Fraud Detection in Examination using LBP method Tejashwini S.G 1 Department of CSE, BITM College / VTU University, India Abstract: Impersonation of the candidate is a fundamental problem in examination
More informationPerformance Evaluation of Edge Detection Techniques for Square Pixel and Hexagon Pixel images
Performance Evaluation of Edge Detection Techniques for Square Pixel and Hexagon Pixel images Keshav Thakur 1, Er Pooja Gupta 2,Dr.Kuldip Pahwa 3, 1,M.Tech Final Year Student, Deptt. of ECE, MMU Ambala,
More informationCHAPTER-4 FRUIT QUALITY GRADATION USING SHAPE, SIZE AND DEFECT ATTRIBUTES
CHAPTER-4 FRUIT QUALITY GRADATION USING SHAPE, SIZE AND DEFECT ATTRIBUTES In addition to colour based estimation of apple quality, various models have been suggested to estimate external attribute based
More informationIMPACT OF SIGNATURE LEGIBILITY AND SIGNATURE TYPE IN OFF-LINE SIGNATURE VERIFICATION.
IMPACT OF SIGNATURE LEGIBILITY AND SIGNATURE TYPE IN OFF-LINE SIGNATURE VERIFICATION F. Alonso-Fernandez a, M.C. Fairhurst b, J. Fierrez a and J. Ortega-Garcia a. a Biometric Recognition Group - ATVS,
More informationAutomated Number Plate Recognition System Using Machine learning algorithms (Kstar)
Automated Number Plate Recognition System Using Machine learning algorithms (Kstar) Er. Dinesh Bhardwaj 1, Er. Shruti Gujral 2 1, 2 Computer Science and Engineering Department, Chandigarh University, Mohali,
More informationSCIENCE & TECHNOLOGY
Pertanika J. Sci. & Technol. 25 (S): 163-172 (2017) SCIENCE & TECHNOLOGY Journal homepage: http://www.pertanika.upm.edu.my/ Performance Comparison of Min-Max Normalisation on Frontal Face Detection Using
More informationAn Offline Handwritten Signature Verification System - A Comprehensive Review
An Offline Handwritten Signature Verification System - A Comprehensive Review Ms. Deepti Joon 1, Ms. Shaloo Kikon 2 1 M. Tech. Scholar, Dept. of ECE, P.D.M. College of Engineering, Bahadurgarh, Haryana
More informationCombined Approach for Face Detection, Eye Region Detection and Eye State Analysis- Extended Paper
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 10, Issue 9 (September 2014), PP.57-68 Combined Approach for Face Detection, Eye
More informationIJRASET 2015: All Rights are Reserved
A Novel Approach For Indian Currency Denomination Identification Abhijit Shinde 1, Priyanka Palande 2, Swati Kamble 3, Prashant Dhotre 4 1,2,3,4 Sinhgad Institute of Technology and Science, Narhe, Pune,
More informationAutomatic Ground Truth Generation of Camera Captured Documents Using Document Image Retrieval
Automatic Ground Truth Generation of Camera Captured Documents Using Document Image Retrieval Sheraz Ahmed, Koichi Kise, Masakazu Iwamura, Marcus Liwicki, and Andreas Dengel German Research Center for
More informationThe Use of Static Biometric Signature Data from Public Service Forms
The Use of Static Biometric Signature Data from Public Service Forms Emma Johnson and Richard Guest School of Engineering and Digital Arts, University of Kent, Canterbury, UK {ej45,r.m.guest}@kent.ac.uk
More informationCHAPTER 6 BACK PROPAGATED ARTIFICIAL NEURAL NETWORK TRAINED ARHF
95 CHAPTER 6 BACK PROPAGATED ARTIFICIAL NEURAL NETWORK TRAINED ARHF 6.1 INTRODUCTION An artificial neural network (ANN) is an information processing model that is inspired by biological nervous systems
More informationCOMBINING FINGERPRINTS FOR SECURITY PURPOSE: ENROLLMENT PROCESS MISS.RATHOD LEENA ANIL
COMBINING FINGERPRINTS FOR SECURITY PURPOSE: ENROLLMENT PROCESS MISS.RATHOD LEENA ANIL Department of Electronics and Telecommunication, V.V.P. Institute of Engg & Technology,Solapur University Solapur,
More informationIris based Human Identification using Median and Gaussian Filter
Iris based Human Identification using Median and Gaussian Filter Geetanjali Sharma 1 and Neerav Mehan 2 International Journal of Latest Trends in Engineering and Technology Vol.(7)Issue(3), pp. 456-461
More informationNumber Plate Recognition System using OCR for Automatic Toll Collection
IJSTE - International Journal of Science Technology & Engineering Volume 2 Issue 10 April 2016 ISSN (online): 2349-784X Number Plate Recognition System using OCR for Automatic Toll Collection Mohini S.Karande
More informationImage Recognition for PCB Soldering Platform Controlled by Embedded Microchip Based on Hopfield Neural Network
436 JOURNAL OF COMPUTERS, VOL. 5, NO. 9, SEPTEMBER Image Recognition for PCB Soldering Platform Controlled by Embedded Microchip Based on Hopfield Neural Network Chung-Chi Wu Department of Electrical Engineering,
More informationA Review of Optical Character Recognition System for Recognition of Printed Text
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 3, Ver. II (May Jun. 2015), PP 28-33 www.iosrjournals.org A Review of Optical Character Recognition
More informationA Proposal for Security Oversight at Automated Teller Machine System
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 10, Issue 6 (June 2014), PP.18-25 A Proposal for Security Oversight at Automated
More informationInformation hiding in fingerprint image
Information hiding in fingerprint image Abstract Prof. Dr. Tawfiq A. Al-Asadi a, MSC. Student Ali Abdul Azzez Mohammad Baker b a Information Technology collage, Babylon University b Department of computer
More informationImage Processing and Artificial Neural Network techniques in Identifying Defects of Textile Products
Image Processing and Artificial Neural Network techniques in Identifying Defects of Textile Products Mrs.P.Banumathi 1, Ms.T.S.Ushanandhini 2 1 Associate Professor, Department of Computer Science and Engineering,
More informationExtraction and Recognition of Text From Digital English Comic Image Using Median Filter
Extraction and Recognition of Text From Digital English Comic Image Using Median Filter S.Ranjini 1 Research Scholar,Department of Information technology Bharathiar University Coimbatore,India ranjinisengottaiyan@gmail.com
More informationAutomated Number Plate Verification System based on Video Analytics
Automated Number Plate Verification System based on Video Analytics Kumar Abhishek Gaurav 1, Viveka 2, Dr. Rajesh T.M 3, Dr. Shaila S.G 4 1,2 M. Tech, Dept. of Computer Science and Engineering, 3 Assistant
More informationCHAPTER 4 MINUTIAE EXTRACTION
67 CHAPTER 4 MINUTIAE EXTRACTION Identifying an individual is precisely based on her or his unique physiological attributes such as fingerprints, face, retina and iris or behavioral attributes such as
More informationRobust Hand Gesture Recognition for Robotic Hand Control
Robust Hand Gesture Recognition for Robotic Hand Control Ankit Chaudhary Robust Hand Gesture Recognition for Robotic Hand Control 123 Ankit Chaudhary Department of Computer Science Northwest Missouri State
More informationAn Improved Bernsen Algorithm Approaches For License Plate Recognition
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) ISSN: 78-834, ISBN: 78-8735. Volume 3, Issue 4 (Sep-Oct. 01), PP 01-05 An Improved Bernsen Algorithm Approaches For License Plate Recognition
More informationFingerprint Recognition using Minutiae Extraction
Fingerprint Recognition using Minutiae Extraction Krishna Kumar 1, Basant Kumar 2, Dharmendra Kumar 3 and Rachna Shah 4 1 M.Tech (Student), Motilal Nehru NIT Allahabad, India, krishnanitald@gmail.com 2
More informationFace Recognition: Identifying Facial Expressions Using Back Propagation
Face Recognition: Identifying Facial Expressions Using Back Propagation Manisha Agrawal 1, Tarun Goyal 2 and Harvendra Kumar 3 1 B.Tech CSE Final Year Student, SLSET, Kichha, Distt: U. S, Nagar, Uttarakhand,
More informationAn Algorithm for Fingerprint Image Postprocessing
An Algorithm for Fingerprint Image Postprocessing Marius Tico, Pauli Kuosmanen Tampere University of Technology Digital Media Institute EO.BOX 553, FIN-33101, Tampere, FINLAND tico@cs.tut.fi Abstract Most
More informationIris Recognition using Histogram Analysis
Iris Recognition using Histogram Analysis Robert W. Ives, Anthony J. Guidry and Delores M. Etter Electrical Engineering Department, U.S. Naval Academy Annapolis, MD 21402-5025 Abstract- Iris recognition
More informationArtificial Neural Networks. Artificial Intelligence Santa Clara, 2016
Artificial Neural Networks Artificial Intelligence Santa Clara, 2016 Simulate the functioning of the brain Can simulate actual neurons: Computational neuroscience Can introduce simplified neurons: Neural
More informationInternational Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN IJSER
International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December-2016 192 A Novel Approach For Face Liveness Detection To Avoid Face Spoofing Attacks Meenakshi Research Scholar,
More informationComparative Study of Neural Networks for Face Recognition
65 Comparative Study of Neural Networks for Face Recognition 1 Er. Harpreet Singh Dalla, 2 Mr. Deepak Aggarwal 1 I/C Academics, Patiala Institute of Engg. & Tech. For Women, Patiala, Punjab, India 2 A.P.,Baba
More informationMICROCHIP PATTERN RECOGNITION BASED ON OPTICAL CORRELATOR
38 Acta Electrotechnica et Informatica, Vol. 17, No. 2, 2017, 38 42, DOI: 10.15546/aeei-2017-0014 MICROCHIP PATTERN RECOGNITION BASED ON OPTICAL CORRELATOR Dávid SOLUS, Ľuboš OVSENÍK, Ján TURÁN Department
More informationPOWER TRANSFORMER PROTECTION USING ANN, FUZZY SYSTEM AND CLARKE S TRANSFORM
POWER TRANSFORMER PROTECTION USING ANN, FUZZY SYSTEM AND CLARKE S TRANSFORM 1 VIJAY KUMAR SAHU, 2 ANIL P. VAIDYA 1,2 Pg Student, Professor E-mail: 1 vijay25051991@gmail.com, 2 anil.vaidya@walchandsangli.ac.in
More informationStudent: Nizar Cherkaoui. Advisor: Dr. Chia-Ling Tsai (Computer Science Dept.) Advisor: Dr. Eric Muller (Biology Dept.)
Student: Nizar Cherkaoui Advisor: Dr. Chia-Ling Tsai (Computer Science Dept.) Advisor: Dr. Eric Muller (Biology Dept.) Outline Introduction Foreground Extraction Blob Segmentation and Labeling Classification
More informationRecognition Offline Handwritten Hindi Digits Using Multilayer Perceptron Neural Networks
Recognition Offline Handwritten Hindi Digits Using Multilayer Perceptron Neural Networks NIDAL F. SHILBAYEH* MUSBAH M. AQEL** AND REMAH ALKHATEEB*** *Department of Computer Science, University of Tabuk,
More informationStudy Impact of Architectural Style and Partial View on Landmark Recognition
Study Impact of Architectural Style and Partial View on Landmark Recognition Ying Chen smileyc@stanford.edu 1. Introduction Landmark recognition in image processing is one of the important object recognition
More informationLocalization of License Plates from Surveillance Camera Images: A Color Feature Based ANN Approach
Localization of License Plates from Surveillance Camera Images: A Color Feature Based ANN Approach Satadal Saha Sr. Lecturer MCKV Institute of Engg. Liluah Subhadip Basu Sr. Lecturer Jadavpur University
More informationAutomatic Licenses Plate Recognition System
Automatic Licenses Plate Recognition System Garima R. Yadav Dept. of Electronics & Comm. Engineering Marathwada Institute of Technology, Aurangabad (Maharashtra), India yadavgarima08@gmail.com Prof. H.K.
More informationAn Appraisal of Off-line Signature Verification Techniques
I.J. Modern Education and Computer Science, 2015, 4, 67-75 Published Online April 2015 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijmecs.2015.04.08 An Appraisal of Off-line Signature Verification
More informationRegion Based Satellite Image Segmentation Using JSEG Algorithm
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.1012
More informationNeuro-Fuzzy based First Responder for Image forgery Identification
ORIENTAL JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY An International Open Free Access, Peer Reviewed Research Journal Published By: Oriental Scientific Publishing Co., India. www.computerscijournal.org ISSN:
More informationResearch Article Hand Posture Recognition Human Computer Interface
Research Journal of Applied Sciences, Engineering and Technology 7(4): 735-739, 2014 DOI:10.19026/rjaset.7.310 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitted: March
More informationAN OPTIMIZED APPROACH FOR FAKE CURRENCY DETECTION USING DISCRETE WAVELET TRANSFORM
AN OPTIMIZED APPROACH FOR FAKE CURRENCY DETECTION USING DISCRETE WAVELET TRANSFORM T.Manikyala Rao 1, Dr. Ch. Srinivasa Rao 2 Research Scholar, Department of Electronics and Communication Engineering,
More informationOnline Signature Verification on Mobile Devices
IJSTE - International Journal of Science Technology & Engineering Volume 2 Issue 10 April 2016 ISSN (online): 2349-784X Online Signature Verification on Mobile Devices Miss. Hude. Kalyani. A. Miss. Khande
More informationA Multilayer Artificial Neural Network for Target Identification Using Radar Information
Available online at www.ijiems.com A Multilayer Artificial Neural Network for Target Identification Using Radar Information James Rodrigeres 1, Joy Fundil 1, International Hellenic University, School of
More informationAn Efficient Color Image Segmentation using Edge Detection and Thresholding Methods
19 An Efficient Color Image Segmentation using Edge Detection and Thresholding Methods T.Arunachalam* Post Graduate Student, P.G. Dept. of Computer Science, Govt Arts College, Melur - 625 106 Email-Arunac682@gmail.com
More information