Proposed Method for Off-line Signature Recognition and Verification using Neural Network

Similar documents
Real time verification of Offline handwritten signatures using K-means clustering

A Review of Optical Character Recognition System for Recognition of Printed Text

Finger print Recognization. By M R Rahul Raj K Muralidhar A Papi Reddy

Apply Multi-Layer Perceptrons Neural Network for Off-line signature verification and recognition

Preprocessing and Segregating Offline Gujarati Handwritten Datasheet for Character Recognition

IJRASET 2015: All Rights are Reserved

Study and Analysis of various preprocessing approaches to enhance Offline Handwritten Gujarati Numerals for feature extraction

Static Signature Verification and Recognition using Neural Network Approach-A Survey

ENHANCHED PALM PRINT IMAGES FOR PERSONAL ACCURATE IDENTIFICATION

SIGNATURE VERIFICATION USING GRID BASED FEATURE EXTRACTION

Punjabi Offline Signature Verification System Using Neural Network

Vehicle License Plate Recognition System Using LoG Operator for Edge Detection and Radon Transform for Slant Correction

An Improved Bernsen Algorithm Approaches For License Plate Recognition

Implementation of License Plate Recognition System in ARM Cortex A8 Board

Offline Signature Verification for Cheque Authentication Using Different Technique

Detection and Verification of Missing Components in SMD using AOI Techniques

An Effective Method for Removing Scratches and Restoring Low -Quality QR Code Images

International Journal of Modern Trends in Engineering and Research e-issn No.: , Date: 2-4 July, 2015

Quality Control of PCB using Image Processing

Chapter 6. [6]Preprocessing

World Journal of Engineering Research and Technology WJERT

Online Signature Verification on Mobile Devices

Lane Detection in Automotive

Nikhil Gupta *1, Dr Rakesh Dhiman 2 ABSTRACT I. INTRODUCTION

An Evaluation of Automatic License Plate Recognition Vikas Kotagyale, Prof.S.D.Joshi

Image Segmentation of Historical Handwriting from Palm Leaf Manuscripts

Keyword: Morphological operation, template matching, license plate localization, character recognition.

Automatic Electricity Meter Reading Based on Image Processing

COMBINING FINGERPRINTS FOR SECURITY PURPOSE: ENROLLMENT PROCESS MISS.RATHOD LEENA ANIL

Feature Extraction Techniques for Dorsal Hand Vein Pattern

AN OPTIMIZED APPROACH FOR FAKE CURRENCY DETECTION USING DISCRETE WAVELET TRANSFORM

Libyan Licenses Plate Recognition Using Template Matching Method

Identification of Fake Currency Based on HSV Feature Extraction of Currency Note

BIOMETRICS BY- VARTIKA PAUL 4IT55

Impeding Forgers at Photo Inception

Iris Recognition-based Security System with Canny Filter

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Keywords Fuzzy Logic, ANN, Histogram Equalization, Spatial Averaging, High Boost filtering, MSE, RMSE, SNR, PSNR.

A new seal verification for Chinese color seal

Image Forgery Detection Using Svm Classifier

Touchless Fingerprint Recognization System

A NOVEL APPROACH FOR CHARACTER RECOGNITION OF VEHICLE NUMBER PLATES USING CLASSIFICATION

Palm Vein Recognition System using Directional Coding and Back-propagation Neural Network

Stamp detection in scanned documents

Note to Coin Exchanger

Lane Detection in Automotive

RESEARCH PAPER FOR ARBITRARY ORIENTED TEAM TEXT DETECTION IN VIDEO IMAGES USING CONNECTED COMPONENT ANALYSIS

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN IJSER

COMPARATIVE PERFORMANCE ANALYSIS OF HAND GESTURE RECOGNITION TECHNIQUES

Automatic License Plate Recognition System using Histogram Graph Algorithm

An Enhanced Biometric System for Personal Authentication

Information hiding in fingerprint image

Automated License Plate Recognition for Toll Booth Application

IRIS Biometric for Person Identification. By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology

Automated Number Plate Verification System based on Video Analytics

CS 365 Project Report Digital Image Forensics. Abhijit Sharang (10007) Pankaj Jindal (Y9399) Advisor: Prof. Amitabha Mukherjee

Intelligent Indian Currency Detection with Note to Coin Exchanger

International Journal of Advance Engineering and Research Development

Automatic Licenses Plate Recognition System

A New Character Segmentation Approach for Off-Line Cursive Handwritten Words

Real Time Word to Picture Translation for Chinese Restaurant Menus

Multimodal Face Recognition using Hybrid Correlation Filters

Abstract Terminologies. Ridges: Ridges are the lines that show a pattern on a fingerprint image.

Biometric Signature for Mobile Devices

International Journal of Modern Trends in Engineering and Research e-issn No.: , Date: 2-4 July, 2015

Classification of Features into Strong and Weak Features for an Intelligent Online Signature Verification System

8.2 IMAGE PROCESSING VERSUS IMAGE ANALYSIS Image processing: The collection of routines and

IMPACT OF SIGNATURE LEGIBILITY AND SIGNATURE TYPE IN OFF-LINE SIGNATURE VERIFICATION.

A comparative study of different feature sets for recognition of handwritten Arabic numerals using a Multi Layer Perceptron

Human Identification Using Foot Features

Writer identification clustering letters with unknown authors

FACE RECOGNITION USING NEURAL NETWORKS

Vein and Fingerprint Identification Multi Biometric System: A Novel Approach

A Novel Algorithm for Hand Vein Recognition Based on Wavelet Decomposition and Mean Absolute Deviation

Frequency Domain Median-like Filter for Periodic and Quasi-Periodic Noise Removal

AUTOMATIC NUMBER PLATE DETECTION USING IMAGE PROCESSING AND PAYMENT AT TOLL PLAZA

Image Enhancement using Histogram Equalization and Spatial Filtering

PLazeR. a planar laser rangefinder. Robert Ying (ry2242) Derek Xingzhou He (xh2187) Peiqian Li (pl2521) Minh Trang Nguyen (mnn2108)

Spring 2005 Group 6 Final Report EZ Park

Original and Counterfeit Money Detection Based on Edge Detection

ISSN Vol.02,Issue.17, November-2013, Pages:

Urban Feature Classification Technique from RGB Data using Sequential Methods

AUTOMATIC SEARCH AND DELIMITATION OF FRONTISPIECES IN ANCIENT SCORES

][ R G [ Q] Y =[ a b c. d e f. g h I

FPGA based Real-time Automatic Number Plate Recognition System for Modern License Plates in Sri Lanka

Number Plate Recognition System using OCR for Automatic Toll Collection

Iris Recognition using Hamming Distance and Fragile Bit Distance

Iris based Human Identification using Median and Gaussian Filter

Automation of Fingerprint Recognition Using OCT Fingerprint Images

LabVIEW based Intelligent Frontal & Non- Frontal Face Recognition System

CHAPTER 4 MINUTIAE EXTRACTION

INDIAN VEHICLE LICENSE PLATE EXTRACTION AND SEGMENTATION

Individuality of Fingerprints

Blur Estimation for Barcode Recognition in Out-of-Focus Images

Image Compression Algorithms for Fingerprint System Preeti Pathak CSE Department, Faculty of Engineering, JBKP, Faridabad, Haryana,121001, India

Research on Application of Conjoint Neural Networks in Vehicle License Plate Recognition

Recognition System for Pakistani Paper Currency

Scrabble Board Automatic Detector for Third Party Applications

Multi-Image Deblurring For Real-Time Face Recognition System

An Efficient Approach for Iris Recognition by Improving Iris Segmentation and Iris Image Compression

Transcription:

e-issn: 2349-9745 p-issn: 2393-8161 Scientific Journal Impact Factor (SJIF): 1.711 International Journal of Modern Trends in Engineering and Research www.ijmter.com Proposed Method for Off-line Signature Recognition and Verification using Neural Network Dhananjay S. Rakshe 1, Prof. D.B. Kshirsagar 2 1 Computer Department, SRES College of Engineering Kopargaon 2 Computer Department, SRES College of Engineering Kopargaon Abstract Computers have become common and are used in almost every field including financial transactions, thus providing additional security measures is necessary. According to consumer s expectations, these security measures must be cheap, reliable and un-intrusive to the authorized person. The technique which meets these requirements is handwritten signature verification. Signature verification technique has advantage over other biometric techniques: including voice, iris, fingerprint, palm etc. as it is mostly used for daily routine procedures link banking operations, document analysis, electronic funds transfer, access control and many other. Most importantly, it s easy and people are less likely to object it. Proposed technique involves using a new approach that depends on a neural network which enables the user to recognize whether a signature is original or a fraud. Scanned images are introduced into the computer, their quality is modified with the help of image enhancement and noise reduction techniques, specific features are extracted and neural network is trained, The different stages of the process includes: image pre-processing, feature extraction and pattern recognition through neural networks. Keywords-Feature Extraction; Neural Network; Signature Verification and Recognition; Image Processing; Grid Based Feature Extraction I. INTRODUCTION In the business world we sign things such as accounts and other official documents. Personal signature lends itself well for biometric verification in state-of-the-art electronic devices. Unfortunately, one drawback of signature is that people do not always sign documents in exactly the same manner. For example, the angle at which they sign may be different due to seating position or due to hand placement on the writing surface. Other affecting factors can be variety of pens, different inks used to make signature; but these things can be eliminated with the help of image enhancement and noise reduction techniques. In this era of automation, automatic person identification is a major challenge, not that it s a new problem to the society but with this significant development of internet; interactions are becoming more and more automatic and thus the problem of identity of individual has become more important. Handwritten signatures are most easy and preferable because they are used to carry out daily transactions, they are less controversial, every individual s signature is unique and people are less likely to object it. According to the studies that were done on signatures and types of signatures, forged signatures [1] fall into following three categories: Random: These signatures are not based on any knowledge of the original signature. Means the person who is trying to make a fake signature does not have any knowledge of what the original signature looks like or how it s made, forger simply tries to make one randomly and this signature can be easily identified as fake. @IJMTER-2015, All rights Reserved 323

Simple: These signatures are based on an assumption of how the signature looks like by knowing the name of the signer. By having knowledge of the name of the signer, the possibilities are limited about how the signer would have made his sign. Most of the people simply write their name. So the chances of faking a signature are increased by some amount. Skilled: An imitation of the original signature, which means that the person knows exactly how the original signature looks like. Here, forger knows exactly how the original sign looks like. Therefore, a perfect imitation can be made if the forger is good at copying. We can tell that skilled signatures are the most difficult ones to detect as they can be very similar to the original signature and the error rate might be very small. II. SYSTEM OVERVIEW The system mainly focuses on following areas- Image Pre-processing Feature Extraction Neural Network Training Figure 1. System Overview Figure 1 shows the offline signature recognition and verification system. As illustrated in the design, Scanned signature is taken as an input (using camera or scanner) and is provided to the system for pre-processing. Image will be processed using different image enhancement and noise reduction techniques. These techniques involve converting input image into grayscale, making it blur so that to @IJMTER-2015, All rights Reserved 324

make it smoother, binarizing the image to achieve black and white image, detecting boundaries to remove unnecessary portions of image and thinning the image etc. Reason behind using these techniques is to enhance the image to a suitable form so that it can be properly used. As different people make signatures in different ways, pens and ink used to create these signatures varies too. So it becomes essential to enhance the input image first. Next step involves extracting different types of features from the input image and storing them in the database for future use. These features are used for comparison with the features that will be extracted from input signatures while authenticating them. Meanwhile, they are also used to train the neural network. After successful training of neural network, it can be used in recognition process to authenticate whether provided signature is authentic or a forgery. III. SIGNATURE RECOGNITION AND VERIFICATION 3.1. Image Pre-Processing Image pre-processing has a wide range of techniques that exists for the manipulation and modification of images. It is the first step in signature verification and recognition. A successful implementation of this step produces improved results and higher accuracy rates. Following are the reasons why image pre-processing is important: It creates a level of similarity in the general features of an image, like the size aspect. This enhances the comparison between images. Signatures vary according to the tool that was used in writing; the type of pen/pencil, the ink, the pressure of the hand of the person making the signature, and so on. In off-line signature recognition, these facts are not important, and have to be eliminated and the matching should be based on more important offline features. Noise reduction, defects removal and image enhancement. Improves the quality of image information. It eases the process of feature extraction on which the matching depends mainly. Following image pre-processing techniques can be used: RGB average: RGB average algorithm can be used to convert an image into grayscale. This method separates Red, Green and Blue values from 24 bit image and averages them i.e. grayscale component is calculated. Then it simply replaces every original pixel value with its grayscale component. Otsu (threshold): Pixel intensity ranges from 0 to 255. User defined threshold is used to compare pixels and accordingly black or white values are assigned to them and vice versa to achieve pure black and white image. Gaussian (Blur): Blurring can be used to make images smoother. This method helps when images are too sharp. We simply adjust the intensity of surrounding pixels for e.g. 25 pixels (considering window size 5*5) to make them blur. Stentiford (thinning): Thinning is the most important part and can be done successfully using Stentiford algorithm. Outputs will be as shown in figures 2, 3, 4 below- @IJMTER-2015, All rights Reserved 325

Figure 2. Blur and Grayscale Figure 3. Threshold Figure 4. Thinning 3.2 Feature Extraction Objective of this phase is to extract the features [2] of the test image that will be compared to the features of training image for verification purpose. 1) After preprocessing we have a signature of size 100x200(pixels). Then we make a grid of m x n where m<n, m<<100 and n<<200, over a pre-processed signature as shown in Figure 5. Let s say we take m=10 and n=20. Thus, a signature image is divided into 200 square cells where each cell is having 100 pixels. 2) Now we find the cells of a row of a grid that contains signature content. Signature content is calculated in terms of black pixels, therefore only those cells should be considered which are having 3 or more black pixels. Repeat the process for all rows of a grid. Thus we have all those cell positions which are part of the signature image. Now we create a matrix of size m x n corresponding to the grid of size m x n i.e. one cell of a grid corresponds to one element of a matrix. The matrix element is equal to 1 if the cell of same position in the grid is the part of signature, otherwise the matrix element will be 0. Thus, as a result of this step, we have a matrix having elements 0 or 1 accordingly as shown in Figure 6. Figure 5. Grid over image Figure 6. Corresponding matrix 3) We calculate the number of black pixels in cells of a row containing signature content. Repeat the process for all rows. Then we put the values of m rows in an array. Similarly, the same process can be applied to columns. Thus we get another array having n elements corresponding to each column. Thus we extract three features: (i) m x n matrix as described above corresponding to an m x n grid. (ii) An array of size m where first element is the number of black pixels in first row of a grid, second element is the number of black pixels in second row and so on, (iii) An array of size n where the first element is the number of black pixels in first column of the grid, second element is the number of @IJMTER-2015, All rights Reserved 326

black pixels in second column and so on. These features are further used in verification process. We have to compare these features of the test and reference signature images and then classify them as genuine or forge. 3.3 Neural Network Training a) Calculate Column Matching Score (CMS) (i) Let M1 and M2 be the matrices of reference image and test image respectively. Compare the columns of the matrix M2 with M1. Each column is having m elements. If at least β, where β 7, elements are same then that column is said to be matched and increase the column count C1 (say) by one. (ii) Let A1 and A2 be the arrays of reference image and test image respectively containing number of black pixels in each column. Compare the corresponding elements of array A2 with A1. Now check the following condition: σ Ref α < σ Test < σ Ref + α Where, σ Ref is the element of reference array A1, σ Test is the corresponding element of the test array A2 and α is the tolerable factor which is the allowed variation in number of pixels. Tolerable factor is a dynamic value as it varies for different columns depending on the signature content in that column. Tolerable factor can be calculated as: α Where, p is percentage of black pixels in a column of a grid and σ Ref is the number of black pixels in that column. Width is the distance between two points in the horizontal projection and must contain more than 3 pixels in a cell, height is the distance between two points in the vertical projection and must contain more than 3 pixels in a cell. If condition (1) satisfies then that column is acceptable and increase the counter C2 (say) by one. (iii) If C1 = n and C2 = n, then CMS is said to be 100%. Similarly for C1 = n-i and C2 n-i where i=1,..., 8, CMS will be signatures up to 60% CMS are considered for further processing. If CMS is below 60% then the test signature will be classified as forgery at this step itself. (b) Calculate Row Matching Score (RMS) If CMS 60% then only we are interested in calculating Row Matching Score (RMS). It can be obtained same as CMS. All comparisons have to be done row wise. For RMS, β 14. Calculate C1 and C2 for this case. (c) Calculate the Average of CMS and RMS (d) Threshold @IJMTER-2015, All rights Reserved 327

Here the threshold is the security level which the user wants to achieve in the target application. If the user wants 100% security then input will be 100 and if the average of the CMS and RMS is 100% then the signature will be accepted. If the user wants 95% security then input will be 95 and if the average is greater or equal to 95% then the signature will be accepted. Threshold range is from 100 to 65 i.e. lowest security level for which results can be obtained in the proposed system, is 65. If average is below 65% then that signature will be classified as forge. Since the proposed technique works for a range of security levels, it can be used in various applications in which different level of security is required for different applications. III. CONCLUSION In this paper, we have discussed an offline signature verification technique using grid based feature extraction. The preprocessed signature i.e. resized, gray scaled, binarized, and thinned signature is segmented into grid of size 10x20 cells where each cell is having 100 pixels. Matrix corresponding to grid is formed and arrays containing number of black pixels in rows and columns formed. For verification, these two features for training and test images can be compared both row wise and column wise and then the test signature can be classified accordingly. As far as database is concerned, one can simply use scanned images or camera captured images, also a freely available database at http://www.vision.caltech.edu/mariomu/research/data can be used. REFERENCES [1] Suhail M. Odeh, Manal Khalil, Off-line signature verification and recognition: Neural Network Approach, 978-1- 61284-922-5/11/$26.00 2011 IEEE. [2] Swati Srivastava, Suneeta Agarwal, Offline Signature Verification using Grid based Feature Extraction International Conference on Computer Communication Technology (ICCCT)-2011 [3] Devshri Satyarthi 1, Y.P.S. Maravi 2, Poonam Sharma 3, R.K. Gupta, Comparative Study of Offline Signature Verification Techniques, International Journal of Advancements in Research Technology, Volume 2, Issue2, February-2013 [4] Vaishali M. Deshmukh, Sachin A. Murab, Signature Recognition Verification Using ANN, International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-1, Issue-6, November 2012 @IJMTER-2015, All rights Reserved 328