SlideShare una empresa de Scribd logo
1 de 6
Descargar para leer sin conexión
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 443
AN OFFLINE SIGNATURE RECOGNITION AND VERIFICATION
SYSTEM BASED ON NEURAL NETWORK
Sameera Khan1
, Avinash Dhole2
1
M-Tech IV Semester, CSE, RITEE, Raipur, India
2
Associate Professor, Department of Computer Science and Engineering, RITEE, Raipur, India
Abstract
Various techniques are already introduced for personal identification and verification based on different types of biometrics
which can be physiological or behavioral. Signatures lies in the category of behavioral biometric which can distort or changed
with course of time. Signatures are considered to be most promising authentication method in all legal and financial documents.
It is necessary to verify signers and their respective signatures. This paper presents an Offline Signature recognition and
verification system(SRVS). In this system signature database of signature images is created, followed by image preprocessing,
feature extraction, neural network design and training, and classification of signature as genuine or counterfeit.
Keywords: biometrics, neural network design, feature extraction, classification etc.
--------------------------------------------------------------------***----------------------------------------------------------------------
1. INTRODUCTION
Signatures are widely accepted as a official means to verify
legal documents, financial documents and also for personal
identification. Due to the same signatures are most popular
behavioral biometric used for authentication and
verification. So it is necessary to create a robust and
efficient verifier which can help in keeping a track on
increasing frauds and crimes related to signatures. Every
individual has different signature with some unambiguous
behavioral traits. Since it is a behavioral biometric, it is
seldom identical. Signatures are sometimes nothing more
than the set of some unreadable alphabets or a pattern
consisting of lines, curves, blobs etc. That is why it is
considered as a special case of pattern matching.
Signatures are accepted as a biometric because it possess
properties like-universal use and acceptance, have some
measurable properties, unique for every individual, easy to
compare, and reliability.
There are two types of signature verification processes-
online and offline. When signatures are captured live with
the help of some digitizing devices like stylus operated
PDAs, the systems are known as online verification system
whereas if static images of signatures are used to represent
input data set, it is known as offline verification system.
Both types of the verification system consists of phases like
data acquisition, image preprocessing, feature extraction,
designing and training of the classifier and classification.
Selection of powerful feature set is a vital process. Proper
features can be used to identify different types of forgeries.
A combination of appropriate feature set and type of
classifier can yield better results.
This paper presents an offline approach for signature
recognition and verification based on radial basis function
network. A set of nine global features is used to generate
feature vector.
2. METHODOLOGY
Offline approach uses static image patterns of signatures for
generating data set. Five images are taken from each
individual for training the network.In preprocessing stage,
images are cleaned in order to get rid of any useless
information present in it. Preprocessing involves image
resizing, gray scale conversion, noise reduction,
thresholding, and skeletonization.
Some global features are extracted from the preprocessed
image in feature extraction phase. In this system nine
features are extracted. These extracted feature set is
characterized by a matrix to form a feature vector which is
the condensed depiction of the input data set. This feature
vector acts as an input to the neural network for training.
Artificial neural network used in this system is the radial
basis function network which uses supervised learning i.e.
target values are also provided to the network besides the
feature vector. Radius of the neurons is set using the value
of spread constant.
A new signature image under examination is selected and all
nine features are extracted and fed to the RBFN classifier
which classifies it as genuine or forged signature based on
the output and tolerance limit. Signatures are not always
same even when made by same signer. Due to the same
features extracted each time may vary. That is why some
tolerance limit is necessary.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 444
Fig -1: Flowchart of SRVS
3. DATA ACQUISITION
Data acquisition is the method of sampling signals that
figure out real world physical conditions and digitizing
resulting samples that can be easily processed. There are
two wide classifications of acquisition models:
1) Static Model: In this model features are extracted from a
earlier stored images. Image is characterized as function of x
and y.
ƒ (x, y) = 1 for each recorded coordinate else = 0;
2) Dynamic Model: In this model features are achieved
online from the individual signer. Image is represented as
function of distance, time and pressure.
ƒ (t) = { x(t), y(t), p(t)};
Given that this system is an offline signature verification
technique, it uses static model for data acquisition.the
dataset is generated by the images of signatures. These
signatures are done on a piece of paper by a signer. Each
signer is asked to give ten specimens of their signatures and
a scanned copy of these signatures is stored in an image
database. 63 points X 17 characters bounding box is used as
reference.
4. PREPROCESSING
Preprocessing is basically an image enhancement technique.
The signature images saved in a signature database are
preprocessed so as to improve the quality of dataset, to
obtain better reult and to make the classification task
simpler. Image preprocessing includes operations like gray
scale conversion, resizing, thresholding, Noise Reduction
and Skeletonization.
4.1 Grayscale Conversion
Since we are interested only in the signature pattern and not
in its color, color information is irrelevant. That is why a
color signature image is converted into grayscale image. .
Gray images are composed exclusively of shades of gray,
varied from black at the weakest intensity to white at the
strongest.
Fig -2: color and gray signature images
4.2 Noise Reduction
Due to the presence of insufficient light, dirt in camera lens,
fault in scanner or quality of paper some disturbances can
occur as noise in image signal. A filtering function is used to
eliminate the noises in the image.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 445
Fig 3: Noisy and filtered signature images
4.3 Skeletonization
It is also known as medial axis transformation. It reduces the
width of objects to single pixel. Skeletonization is done by
recursive erosion over the image until its medial axis
remains. It is also known as thinning. The outcome of
skeletoniztion is a binary image constituiting only of the
objects medial axis.
Fig 4: Original and skeletonized signature images
4.4 Thresholding
It is a segmentation technique. In Thresholding reference
value T is set which is known as threshold, any pixel having
intensity greater than T will be assigned a highest value in
the gray scale whereas any pixel having intensity value less
than T will be assigned a lowest value in the gray scale.
Thesholding gives a binary image i.e. it consists of two gray
levels.
Fig 5: Original and thresholded signature images
5. FEATURE EXTRACTION
For pattern matching process, one important aspect is
feature extraction. In this process the input data set is
represented on the basis of values of some features. These
feature values are presented in form of matrix to create a
feature vector.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 446
In this system a set of nine global features are used which
are described as follows-
 Image Area: total number of black pixels in the test
image.
 Signature pure width: maximum of exact number of
black pixels present in each horizontal scan line.
 Signature pure Height: maximum of exact number
of black pixels present in each vertical scan line.
 Aspect ratio.: Ratio of width to height component of
an image is known as aspect ratio.
Aspect Ratio= pure width/ pure Height
 Maximum Vertical Projection: sum of all the pixels
along the columns in a skeletonized image is vertical
projection. The vertical projection is define as :
V(j)=∑ I(i,j)
 Maximum Horizontal Projection: sum of all the
pixels along the row in a skeletonized image is
horizontal projection. The horizontal projection is
define as :
H(i)= ∑ I(i,j)
 Number of Edge Point (En): An edge point is
defined as a signature point that has only one 8-
connected neighbor.
 Centroid x-coordinate: Centroid can be defined as
the center of mass of any geometric object. Any
pixel location is identified by an ordered pair.
Centroid x-coordinate represents x coordinate value
of the calculated location of center of mass
 Centroid y-coordinate: Centroid y-coordinate
represents y coordinate value of the calculated
location of center of mass.
6. NETWORK DESIGN AND TRAINING
Artificial neural networks are very promising in the field of
pattern matching. In this signature verifier, radial basis
function network is used as classifier. RBFNs are trained by
using supervised learning i.e. feature vector and the target
vectors both are needed. Sensitivity of network is set by
using spread constant value which signifies the width of
transfer function plot. Higher the value of spread lower is
the sensitivity and vice versa.
7. CLASSIFICATION
With the specified feature vector, target vector and spread
constant value a network is trained. This trained network is
now set for classification of the new signatures in one of the
input classes. A test signature is used to extract the features
and the newly extracted features are fed to the trained
network which classifies it as genuine or forge with respect
to the output value in the corresponding class and a preset
threshold value. Threshold value is used to specify tolerance
limit of the network.
8. RESULTS
In the above discussed system, an offline signature
verification system is designed using radial basis function
network. Each signer provides five specimen signatures
which are saved in the database, a set of nine global features
are extracted from this database to generate feature vector
and a network is trained using these features. Observed FAR
and FRR are . The results are shown as follows-
Fig 6: Output Screen showing classification result
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 447
Fig 7: Output Screen showing classification result of forged signature
9. CONCLUSION
This paper presents design and implementation of an
effective offline signature recognition and verification
system using radial basis function network. The false
acceptance rate (FAR) or type-I error is found to be 5% and
false rejection rate (FRR) or type-II error is found to be 7%.
REFERENCES
[1] L.Basavaraj, R.D Sudhaker Samuel: “Offline-line
Signature Verification and Recognition: An
Approach Based on Four Speed Stroke
Angle” International Journal of Recent Trends in
Engineering, Vol 2, No. 3, November 2009
[2] Vu Nguyen, Michael Blumenstein , Graham
Leedham, Global Features for the Off-Line
Signature Verification Problem 10th International
Conference on Document Analysis and Recognition,
2009.
[3] Shashi Kumar D R, K B Raja, R. K Chhotaray,
Sabyasachi Pattanaik, Off-line Signature
Verification Based on Fusion of Grid and Global
Features Using Neural Networks , International
Journal of Engineering Science and Technology
Vol. 2(12), 2010, 7035-7044
[4] Ashwini Pansare, Shalini Bhatia,Handwritten
Signature Verification using Neural Network,
International Journal of Applied Information
Systems (IJAIS) – ISSN : 2249-0868 Foundation of
Computer Science FCS, New York, USA Volume
1– No.2, January 2012
[5] Prashanth C. R. and K. B. Raja, Off-line Signature
Verification Based on Angular Features,
International Journal of Modeling and Optimization,
Vol. 2, No. 4, August 2012
[6] Julio Martínez-R.,Rogelio Alcántara-S.,On-line
signature verification based on optimal feature
representation and neural-network-driven fuzzy
reasoning
[7] Miguel A. Ferrer, Jesus B. Alonso, and Carlos M.
Travieso “Offline Geometric Parameters for
automatic Signature Verification Using Fixed-Point
Arithmetic” IEEE Transactions On Pattern Analysis
And Machine Intelligence, VOL. 27, NO. 6, JUNE
2005
[8] Manasjyoti Bhuyan, Kandarpa Kumar Sarma and
Hirendra Das,Signature Recognition and
Verification using Hybrid Features and Clustered
Artificial Neural Network(ANN)s International
Journal of Electrical and Computer Engineering 5:2
2010
[9] O.C Abikoye , M.A Mabayoje, R. Ajibade “Offline
Signature Recognition & Verification using Neural
Network” International Journal of Computer
Applications (0975 – 8887) Volume 35– No.2,
December 2011
[10] Ms.Vibha Pandey ,Ms. Sanjivani
Shantaiya,“Signature Verification Using
Morphological Features Based on Artificial Neural
Network” International Journal of Advanced
Research in Computer Science and Software
Engineering Volume 2, Issue 7, July 2012
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 448
BIOGRAPHIES
Sameera Khan is a P. G Student (M. Tech) in the
Department of Computer Science and Engineering, Raipur
Institute of Technology, Raipur(C.G). She received her
Bachelor of Engineering (CSE) in 2008 from Raipur
Institute of Technology, Raipur affilated to Pt.Ravishankar
University,Raipur (C.G).Her research interest are Image
Processing and neural network.
Avinash Dhole is an Associate Professor and Head in
Computer Science and Engineering Department, in Raipur
Institute Of Technology, Raipur, (C.G.) . His research
interests include Digital Image Processing, Compilers,
Automata Theory, Neural Network, Artificial Intelligence,
Information and Network Security

Más contenido relacionado

La actualidad más candente

Hand Written Character Recognition Using Neural Networks
Hand Written Character Recognition Using Neural Networks Hand Written Character Recognition Using Neural Networks
Hand Written Character Recognition Using Neural Networks Chiranjeevi Adi
 
Fraud Detection Using Signature Recognition
Fraud Detection Using Signature RecognitionFraud Detection Using Signature Recognition
Fraud Detection Using Signature RecognitionTejraj Thakor
 
Content Based Image Retrieval
Content Based Image Retrieval Content Based Image Retrieval
Content Based Image Retrieval Swati Chauhan
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniquesSubhash Basistha
 
Handwritten Signature Verification using Artificial Neural Network
Handwritten Signature Verification using Artificial Neural NetworkHandwritten Signature Verification using Artificial Neural Network
Handwritten Signature Verification using Artificial Neural NetworkEditor IJMTER
 
Biometric Systems and Security
Biometric Systems and SecurityBiometric Systems and Security
Biometric Systems and SecurityShreyans Jain
 
HANDWRITTEN DIGIT RECOGNITION USING k-NN CLASSIFIER
HANDWRITTEN DIGIT RECOGNITION USING k-NN CLASSIFIERHANDWRITTEN DIGIT RECOGNITION USING k-NN CLASSIFIER
HANDWRITTEN DIGIT RECOGNITION USING k-NN CLASSIFIERvineet raj
 
Handwriting Recognition Using Deep Learning and Computer Version
Handwriting Recognition Using Deep Learning and Computer VersionHandwriting Recognition Using Deep Learning and Computer Version
Handwriting Recognition Using Deep Learning and Computer VersionNaiyan Noor
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication TechniqueRekha Yadav
 
Ear recognition system
Ear recognition systemEar recognition system
Ear recognition systemPiyush Mittal
 
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...IJNSA Journal
 
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...iosrjce
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognitionsunjaysahu
 
Handwriting Recognition
Handwriting RecognitionHandwriting Recognition
Handwriting RecognitionBindu Karki
 
Biometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febBiometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febNavin Kumar
 
Digital image forgery detection
Digital image forgery detectionDigital image forgery detection
Digital image forgery detectionAB Rizvi
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password AuthenticationAbha nandan
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final pptAnkita Vanage
 

La actualidad más candente (20)

Hand Written Character Recognition Using Neural Networks
Hand Written Character Recognition Using Neural Networks Hand Written Character Recognition Using Neural Networks
Hand Written Character Recognition Using Neural Networks
 
Fraud Detection Using Signature Recognition
Fraud Detection Using Signature RecognitionFraud Detection Using Signature Recognition
Fraud Detection Using Signature Recognition
 
Content Based Image Retrieval
Content Based Image Retrieval Content Based Image Retrieval
Content Based Image Retrieval
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniques
 
Handwritten Signature Verification using Artificial Neural Network
Handwritten Signature Verification using Artificial Neural NetworkHandwritten Signature Verification using Artificial Neural Network
Handwritten Signature Verification using Artificial Neural Network
 
Biometric Systems and Security
Biometric Systems and SecurityBiometric Systems and Security
Biometric Systems and Security
 
HANDWRITTEN DIGIT RECOGNITION USING k-NN CLASSIFIER
HANDWRITTEN DIGIT RECOGNITION USING k-NN CLASSIFIERHANDWRITTEN DIGIT RECOGNITION USING k-NN CLASSIFIER
HANDWRITTEN DIGIT RECOGNITION USING k-NN CLASSIFIER
 
Handwriting Recognition Using Deep Learning and Computer Version
Handwriting Recognition Using Deep Learning and Computer VersionHandwriting Recognition Using Deep Learning and Computer Version
Handwriting Recognition Using Deep Learning and Computer Version
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
 
Ear recognition system
Ear recognition systemEar recognition system
Ear recognition system
 
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...
 
Iris recognition
Iris recognitionIris recognition
Iris recognition
 
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognition
 
Biometricsppt
BiometricspptBiometricsppt
Biometricsppt
 
Handwriting Recognition
Handwriting RecognitionHandwriting Recognition
Handwriting Recognition
 
Biometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febBiometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 feb
 
Digital image forgery detection
Digital image forgery detectionDigital image forgery detection
Digital image forgery detection
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 

Similar a An offline signature recognition and verification system based on neural network

Offline Handwritten Signature Verification using Neural Network
Offline Handwritten Signature Verification using Neural NetworkOffline Handwritten Signature Verification using Neural Network
Offline Handwritten Signature Verification using Neural Networkijiert bestjournal
 
­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...
­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...
­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...IRJET Journal
 
Character recognition for bi lingual mixed-type characters using artificial n...
Character recognition for bi lingual mixed-type characters using artificial n...Character recognition for bi lingual mixed-type characters using artificial n...
Character recognition for bi lingual mixed-type characters using artificial n...eSAT Publishing House
 
An embedded finger vein recognition system
An embedded finger vein recognition systemAn embedded finger vein recognition system
An embedded finger vein recognition systemeSAT Publishing House
 
Background differencing algorithm for moving object detection using system ge...
Background differencing algorithm for moving object detection using system ge...Background differencing algorithm for moving object detection using system ge...
Background differencing algorithm for moving object detection using system ge...eSAT Publishing House
 
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEMRELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEMAM Publications
 
Signature Verification System using CNN & SNN
Signature Verification System using CNN & SNNSignature Verification System using CNN & SNN
Signature Verification System using CNN & SNNIRJET Journal
 
License plate recognition for toll payment application
License plate recognition for toll payment applicationLicense plate recognition for toll payment application
License plate recognition for toll payment applicationeSAT Publishing House
 
License plate recognition for toll payment application
License plate recognition for toll payment applicationLicense plate recognition for toll payment application
License plate recognition for toll payment applicationeSAT Journals
 
Brain tumor pattern recognition using correlation filter
Brain tumor pattern recognition using correlation filterBrain tumor pattern recognition using correlation filter
Brain tumor pattern recognition using correlation filtereSAT Publishing House
 
A virtual analysis on various techniques using ann with
A virtual analysis on various techniques using ann withA virtual analysis on various techniques using ann with
A virtual analysis on various techniques using ann witheSAT Publishing House
 
A virtual analysis on various techniques using ann with data mining
A virtual analysis on various techniques using ann with data miningA virtual analysis on various techniques using ann with data mining
A virtual analysis on various techniques using ann with data miningeSAT Journals
 
IRJET - Simulation of Colour Image Processing Techniques on VHDL
IRJET - Simulation of Colour Image Processing Techniques on VHDLIRJET - Simulation of Colour Image Processing Techniques on VHDL
IRJET - Simulation of Colour Image Processing Techniques on VHDLIRJET Journal
 
Automated Plant Identification with CNN
Automated Plant Identification with CNNAutomated Plant Identification with CNN
Automated Plant Identification with CNNIRJET Journal
 
Dorsal hand vein pattern authentication by hough peaks
Dorsal hand vein pattern authentication by hough peaksDorsal hand vein pattern authentication by hough peaks
Dorsal hand vein pattern authentication by hough peakseSAT Publishing House
 
A Survey on Fingerprint Protection Techniques
A Survey on Fingerprint Protection TechniquesA Survey on Fingerprint Protection Techniques
A Survey on Fingerprint Protection TechniquesIRJET Journal
 

Similar a An offline signature recognition and verification system based on neural network (20)

Cc4301455457
Cc4301455457Cc4301455457
Cc4301455457
 
Offline Handwritten Signature Verification using Neural Network
Offline Handwritten Signature Verification using Neural NetworkOffline Handwritten Signature Verification using Neural Network
Offline Handwritten Signature Verification using Neural Network
 
Dp34707712
Dp34707712Dp34707712
Dp34707712
 
­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...
­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...
­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...
 
Character recognition for bi lingual mixed-type characters using artificial n...
Character recognition for bi lingual mixed-type characters using artificial n...Character recognition for bi lingual mixed-type characters using artificial n...
Character recognition for bi lingual mixed-type characters using artificial n...
 
Artificial Neural Network Based Offline Signature Recognition System Using Lo...
Artificial Neural Network Based Offline Signature Recognition System Using Lo...Artificial Neural Network Based Offline Signature Recognition System Using Lo...
Artificial Neural Network Based Offline Signature Recognition System Using Lo...
 
Ijetcas14 337
Ijetcas14 337Ijetcas14 337
Ijetcas14 337
 
An embedded finger vein recognition system
An embedded finger vein recognition systemAn embedded finger vein recognition system
An embedded finger vein recognition system
 
Background differencing algorithm for moving object detection using system ge...
Background differencing algorithm for moving object detection using system ge...Background differencing algorithm for moving object detection using system ge...
Background differencing algorithm for moving object detection using system ge...
 
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEMRELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
 
Signature Verification System using CNN & SNN
Signature Verification System using CNN & SNNSignature Verification System using CNN & SNN
Signature Verification System using CNN & SNN
 
License plate recognition for toll payment application
License plate recognition for toll payment applicationLicense plate recognition for toll payment application
License plate recognition for toll payment application
 
License plate recognition for toll payment application
License plate recognition for toll payment applicationLicense plate recognition for toll payment application
License plate recognition for toll payment application
 
Brain tumor pattern recognition using correlation filter
Brain tumor pattern recognition using correlation filterBrain tumor pattern recognition using correlation filter
Brain tumor pattern recognition using correlation filter
 
A virtual analysis on various techniques using ann with
A virtual analysis on various techniques using ann withA virtual analysis on various techniques using ann with
A virtual analysis on various techniques using ann with
 
A virtual analysis on various techniques using ann with data mining
A virtual analysis on various techniques using ann with data miningA virtual analysis on various techniques using ann with data mining
A virtual analysis on various techniques using ann with data mining
 
IRJET - Simulation of Colour Image Processing Techniques on VHDL
IRJET - Simulation of Colour Image Processing Techniques on VHDLIRJET - Simulation of Colour Image Processing Techniques on VHDL
IRJET - Simulation of Colour Image Processing Techniques on VHDL
 
Automated Plant Identification with CNN
Automated Plant Identification with CNNAutomated Plant Identification with CNN
Automated Plant Identification with CNN
 
Dorsal hand vein pattern authentication by hough peaks
Dorsal hand vein pattern authentication by hough peaksDorsal hand vein pattern authentication by hough peaks
Dorsal hand vein pattern authentication by hough peaks
 
A Survey on Fingerprint Protection Techniques
A Survey on Fingerprint Protection TechniquesA Survey on Fingerprint Protection Techniques
A Survey on Fingerprint Protection Techniques
 

Más de eSAT Journals

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementseSAT Journals
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case studyeSAT Journals
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case studyeSAT Journals
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreeSAT Journals
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialseSAT Journals
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...eSAT Journals
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...eSAT Journals
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizereSAT Journals
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementeSAT Journals
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...eSAT Journals
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteeSAT Journals
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...eSAT Journals
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...eSAT Journals
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabseSAT Journals
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaeSAT Journals
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...eSAT Journals
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodeSAT Journals
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniqueseSAT Journals
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...eSAT Journals
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...eSAT Journals
 

Más de eSAT Journals (20)

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniques
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
 

Último

HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 

Último (20)

HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 

An offline signature recognition and verification system based on neural network

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 443 AN OFFLINE SIGNATURE RECOGNITION AND VERIFICATION SYSTEM BASED ON NEURAL NETWORK Sameera Khan1 , Avinash Dhole2 1 M-Tech IV Semester, CSE, RITEE, Raipur, India 2 Associate Professor, Department of Computer Science and Engineering, RITEE, Raipur, India Abstract Various techniques are already introduced for personal identification and verification based on different types of biometrics which can be physiological or behavioral. Signatures lies in the category of behavioral biometric which can distort or changed with course of time. Signatures are considered to be most promising authentication method in all legal and financial documents. It is necessary to verify signers and their respective signatures. This paper presents an Offline Signature recognition and verification system(SRVS). In this system signature database of signature images is created, followed by image preprocessing, feature extraction, neural network design and training, and classification of signature as genuine or counterfeit. Keywords: biometrics, neural network design, feature extraction, classification etc. --------------------------------------------------------------------***---------------------------------------------------------------------- 1. INTRODUCTION Signatures are widely accepted as a official means to verify legal documents, financial documents and also for personal identification. Due to the same signatures are most popular behavioral biometric used for authentication and verification. So it is necessary to create a robust and efficient verifier which can help in keeping a track on increasing frauds and crimes related to signatures. Every individual has different signature with some unambiguous behavioral traits. Since it is a behavioral biometric, it is seldom identical. Signatures are sometimes nothing more than the set of some unreadable alphabets or a pattern consisting of lines, curves, blobs etc. That is why it is considered as a special case of pattern matching. Signatures are accepted as a biometric because it possess properties like-universal use and acceptance, have some measurable properties, unique for every individual, easy to compare, and reliability. There are two types of signature verification processes- online and offline. When signatures are captured live with the help of some digitizing devices like stylus operated PDAs, the systems are known as online verification system whereas if static images of signatures are used to represent input data set, it is known as offline verification system. Both types of the verification system consists of phases like data acquisition, image preprocessing, feature extraction, designing and training of the classifier and classification. Selection of powerful feature set is a vital process. Proper features can be used to identify different types of forgeries. A combination of appropriate feature set and type of classifier can yield better results. This paper presents an offline approach for signature recognition and verification based on radial basis function network. A set of nine global features is used to generate feature vector. 2. METHODOLOGY Offline approach uses static image patterns of signatures for generating data set. Five images are taken from each individual for training the network.In preprocessing stage, images are cleaned in order to get rid of any useless information present in it. Preprocessing involves image resizing, gray scale conversion, noise reduction, thresholding, and skeletonization. Some global features are extracted from the preprocessed image in feature extraction phase. In this system nine features are extracted. These extracted feature set is characterized by a matrix to form a feature vector which is the condensed depiction of the input data set. This feature vector acts as an input to the neural network for training. Artificial neural network used in this system is the radial basis function network which uses supervised learning i.e. target values are also provided to the network besides the feature vector. Radius of the neurons is set using the value of spread constant. A new signature image under examination is selected and all nine features are extracted and fed to the RBFN classifier which classifies it as genuine or forged signature based on the output and tolerance limit. Signatures are not always same even when made by same signer. Due to the same features extracted each time may vary. That is why some tolerance limit is necessary.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 444 Fig -1: Flowchart of SRVS 3. DATA ACQUISITION Data acquisition is the method of sampling signals that figure out real world physical conditions and digitizing resulting samples that can be easily processed. There are two wide classifications of acquisition models: 1) Static Model: In this model features are extracted from a earlier stored images. Image is characterized as function of x and y. ƒ (x, y) = 1 for each recorded coordinate else = 0; 2) Dynamic Model: In this model features are achieved online from the individual signer. Image is represented as function of distance, time and pressure. ƒ (t) = { x(t), y(t), p(t)}; Given that this system is an offline signature verification technique, it uses static model for data acquisition.the dataset is generated by the images of signatures. These signatures are done on a piece of paper by a signer. Each signer is asked to give ten specimens of their signatures and a scanned copy of these signatures is stored in an image database. 63 points X 17 characters bounding box is used as reference. 4. PREPROCESSING Preprocessing is basically an image enhancement technique. The signature images saved in a signature database are preprocessed so as to improve the quality of dataset, to obtain better reult and to make the classification task simpler. Image preprocessing includes operations like gray scale conversion, resizing, thresholding, Noise Reduction and Skeletonization. 4.1 Grayscale Conversion Since we are interested only in the signature pattern and not in its color, color information is irrelevant. That is why a color signature image is converted into grayscale image. . Gray images are composed exclusively of shades of gray, varied from black at the weakest intensity to white at the strongest. Fig -2: color and gray signature images 4.2 Noise Reduction Due to the presence of insufficient light, dirt in camera lens, fault in scanner or quality of paper some disturbances can occur as noise in image signal. A filtering function is used to eliminate the noises in the image.
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 445 Fig 3: Noisy and filtered signature images 4.3 Skeletonization It is also known as medial axis transformation. It reduces the width of objects to single pixel. Skeletonization is done by recursive erosion over the image until its medial axis remains. It is also known as thinning. The outcome of skeletoniztion is a binary image constituiting only of the objects medial axis. Fig 4: Original and skeletonized signature images 4.4 Thresholding It is a segmentation technique. In Thresholding reference value T is set which is known as threshold, any pixel having intensity greater than T will be assigned a highest value in the gray scale whereas any pixel having intensity value less than T will be assigned a lowest value in the gray scale. Thesholding gives a binary image i.e. it consists of two gray levels. Fig 5: Original and thresholded signature images 5. FEATURE EXTRACTION For pattern matching process, one important aspect is feature extraction. In this process the input data set is represented on the basis of values of some features. These feature values are presented in form of matrix to create a feature vector.
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 446 In this system a set of nine global features are used which are described as follows-  Image Area: total number of black pixels in the test image.  Signature pure width: maximum of exact number of black pixels present in each horizontal scan line.  Signature pure Height: maximum of exact number of black pixels present in each vertical scan line.  Aspect ratio.: Ratio of width to height component of an image is known as aspect ratio. Aspect Ratio= pure width/ pure Height  Maximum Vertical Projection: sum of all the pixels along the columns in a skeletonized image is vertical projection. The vertical projection is define as : V(j)=∑ I(i,j)  Maximum Horizontal Projection: sum of all the pixels along the row in a skeletonized image is horizontal projection. The horizontal projection is define as : H(i)= ∑ I(i,j)  Number of Edge Point (En): An edge point is defined as a signature point that has only one 8- connected neighbor.  Centroid x-coordinate: Centroid can be defined as the center of mass of any geometric object. Any pixel location is identified by an ordered pair. Centroid x-coordinate represents x coordinate value of the calculated location of center of mass  Centroid y-coordinate: Centroid y-coordinate represents y coordinate value of the calculated location of center of mass. 6. NETWORK DESIGN AND TRAINING Artificial neural networks are very promising in the field of pattern matching. In this signature verifier, radial basis function network is used as classifier. RBFNs are trained by using supervised learning i.e. feature vector and the target vectors both are needed. Sensitivity of network is set by using spread constant value which signifies the width of transfer function plot. Higher the value of spread lower is the sensitivity and vice versa. 7. CLASSIFICATION With the specified feature vector, target vector and spread constant value a network is trained. This trained network is now set for classification of the new signatures in one of the input classes. A test signature is used to extract the features and the newly extracted features are fed to the trained network which classifies it as genuine or forge with respect to the output value in the corresponding class and a preset threshold value. Threshold value is used to specify tolerance limit of the network. 8. RESULTS In the above discussed system, an offline signature verification system is designed using radial basis function network. Each signer provides five specimen signatures which are saved in the database, a set of nine global features are extracted from this database to generate feature vector and a network is trained using these features. Observed FAR and FRR are . The results are shown as follows- Fig 6: Output Screen showing classification result
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 447 Fig 7: Output Screen showing classification result of forged signature 9. CONCLUSION This paper presents design and implementation of an effective offline signature recognition and verification system using radial basis function network. The false acceptance rate (FAR) or type-I error is found to be 5% and false rejection rate (FRR) or type-II error is found to be 7%. REFERENCES [1] L.Basavaraj, R.D Sudhaker Samuel: “Offline-line Signature Verification and Recognition: An Approach Based on Four Speed Stroke Angle” International Journal of Recent Trends in Engineering, Vol 2, No. 3, November 2009 [2] Vu Nguyen, Michael Blumenstein , Graham Leedham, Global Features for the Off-Line Signature Verification Problem 10th International Conference on Document Analysis and Recognition, 2009. [3] Shashi Kumar D R, K B Raja, R. K Chhotaray, Sabyasachi Pattanaik, Off-line Signature Verification Based on Fusion of Grid and Global Features Using Neural Networks , International Journal of Engineering Science and Technology Vol. 2(12), 2010, 7035-7044 [4] Ashwini Pansare, Shalini Bhatia,Handwritten Signature Verification using Neural Network, International Journal of Applied Information Systems (IJAIS) – ISSN : 2249-0868 Foundation of Computer Science FCS, New York, USA Volume 1– No.2, January 2012 [5] Prashanth C. R. and K. B. Raja, Off-line Signature Verification Based on Angular Features, International Journal of Modeling and Optimization, Vol. 2, No. 4, August 2012 [6] Julio Martínez-R.,Rogelio Alcántara-S.,On-line signature verification based on optimal feature representation and neural-network-driven fuzzy reasoning [7] Miguel A. Ferrer, Jesus B. Alonso, and Carlos M. Travieso “Offline Geometric Parameters for automatic Signature Verification Using Fixed-Point Arithmetic” IEEE Transactions On Pattern Analysis And Machine Intelligence, VOL. 27, NO. 6, JUNE 2005 [8] Manasjyoti Bhuyan, Kandarpa Kumar Sarma and Hirendra Das,Signature Recognition and Verification using Hybrid Features and Clustered Artificial Neural Network(ANN)s International Journal of Electrical and Computer Engineering 5:2 2010 [9] O.C Abikoye , M.A Mabayoje, R. Ajibade “Offline Signature Recognition & Verification using Neural Network” International Journal of Computer Applications (0975 – 8887) Volume 35– No.2, December 2011 [10] Ms.Vibha Pandey ,Ms. Sanjivani Shantaiya,“Signature Verification Using Morphological Features Based on Artificial Neural Network” International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 7, July 2012
  • 6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 448 BIOGRAPHIES Sameera Khan is a P. G Student (M. Tech) in the Department of Computer Science and Engineering, Raipur Institute of Technology, Raipur(C.G). She received her Bachelor of Engineering (CSE) in 2008 from Raipur Institute of Technology, Raipur affilated to Pt.Ravishankar University,Raipur (C.G).Her research interest are Image Processing and neural network. Avinash Dhole is an Associate Professor and Head in Computer Science and Engineering Department, in Raipur Institute Of Technology, Raipur, (C.G.) . His research interests include Digital Image Processing, Compilers, Automata Theory, Neural Network, Artificial Intelligence, Information and Network Security