SlideShare una empresa de Scribd logo
1 de 5
Descargar para leer sin conexión
International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064
Volume 2 Issue 8, August 2013
www.ijsr.net
Offline Signature Verification and Recognition
using Neural Network
Ankit Arora1
, Aakanksha S. Choubey2
1
M.E (CTA), CSE Department, SSGI, Bhilai, India
2
Sr. Assistant Professor, CSE Department, SSGI, Bhilai, India
Abstract: Authentication of a person is the major concern in this era for security purposes. In biometric systems Signature is one of
the behavioural features used for the authentication purpose. In this paper we work on the offline signature collected through different
persons. Morphological operations are applied on these signature images with Hough transform to determine regular shape which
assists in authentication process. The values extracted from this Hough space is used in the feed forward neural network which is
trained using back-propagation algorithm. After the different training stages efficiency found above more than 95%. Application of this
system will be in the security concerned fields, in the defence security, biometric authentication, as biometric computer protection or as
method of the analysis of person’s behaviour changes.
Keywords: Biometrics, Signature, Back propagation, Artificial Neural Network.
1. Introduction
Automatic person identification is the major challenges in
this era of automation. How-ever, this is not a new problem
for our society, and work in this field is a great task as per
security concern. With the development of Internet, the
interactions are becoming more and more automatic and thus
the problem of identity of an individual has become more
important. The traditional modes of person authentication
systems such as Possessions and Knowledge are not able to
solve this problem at the extent which required in today’s era.
Possessions include physical characteristics such as keys,
passports, and smart cards. Knowledge is a piece of
information that is memorized, such as a password and is
supposed to be kept a secret. Due to inability of traditional
techniques based authentication methods to handle the
security concerns, biometrics research have gained
significant momentum in the last decade as the security
concerns are increasing in every field. Biometrics refers to
authentication of a person using a physiological and
behavioural trait of the individual that distinguish him from
others. Handwriting is a behavioural biometric as it is
generated as the consequence of an action performed by a
person. Handwriting identification also has a long history [1].
The signature recognition is the process of writer’s verifying
by means of the samples signature that are comparing with
stored in the database records. The result of this process is
usually a number between 0 and 1, which represents a
matching ratio. The signature recognition is one of many
biometric identification techniques, which are used in
practice. In the business world we sign things such as
accounts and other official documents. Personal signature
lends itself well for biometric verification in state–of–the–art
electronic devices. Unfortunately, one drawback of signature
is that people do not always sign documents in exactly the
same manner. For example, the angle at which they sign may
be different due to seating position or due to hand placement
on the writing surface. In our approach, the signature
analysis process is composed of three stages:
 Pre–processing: where image binarization and its size
standardization are performed,
 Feature extraction: where the unique set of
characteristics of the analysed signature is gathered
using Hough transform,
 Matching: extracted features trained in this step using
Back propagation algorithm in Neural Network, then the
personal signature is compared with the pattern from the
signatures database.
2. Pre-Processing
A wide variety of devices capturing signature causes the
need to normalize an input image of signature (so called: pre-
processing). This stage is further sub-divided into following
stages [2]:
Normalization, – Image Binarization, – Data Area Cropping,
– Thinning
2.1 Normalization
Any further processing takes place; a noise reduction filter is
applied to the binary scanned image. The goal is to eliminate
single white pixels on black back ground and single black
pixels on white background und .In order to accomplish this,
we apply a 3 X 3 mask to the image with a simple decision,
basic principle is this if the no of the 8 neighbours of a pixel
that have the same colour with the central pixel is less than
two, we reverse the colour of the central pixel. Figure 1 and
Figure 2 shows this stage.
196
International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064
Volume 2 Issue 8, August 2013
www.ijsr.net
Figure 1: Original Image
Figure 2: Normalized Image
2.2 Image Binarization
It allows us to reduce the amount of image information
(removing colour and background), so the output image is
black-white. The black-white type of the image is much
more easily to further processing [2].  
Figure 3: Binarized Image
2.3 Data Area Cropping
The signature area is separated from the background by
using the well known segmentation methods of vertical and
horizontal projection. Thus, the white space surrounding the
signature is discarded [3]. Morphological operation Erosion
and Dilation applied to perform this step.
Figure 4: Erodated and Dilated Image
2.4 Thinning [4]
Size of the image is reduced. In this procedure unnecessary
signature areas are removed.
Step 1: Mark all the points of the signature that are
candidates for removing (black pixels that have at least one
white 8-neighbor and at least two black 8-neighborspixels).
Step 2: Examine one by one all of them, following the
contour lines of the signature image, and remove these as
their removal will not cause a break in the resulting pattern.
Step 3: If at least one point was deleted go again to Step 1
and repeat the process once more. Fig.2. shows an example
of this skeletonization technique. Skeletonization makes.
Figure 5: Edge detected image
3. Feature Extraction
During that step a gathering of characteristic data takes
place. The output result is a set of the unique information
about the signature. The choice of a powerful set of features
is crucial in optical recognition systems. The features used
must be suitable for the application and for the applied
classifier .Global features provide information about specific
cases concerning the structure of the signature, grid
information and texture features are intended to provide
overall signature appearance information in two different
levels of detail. For grid information features, the image is
segmented in 96 rectangular regions. Only the area (the
number of signature points) in each region is utilized in order
to form the grid information feature group. For the texture
feature group to be formed, a coarser segmentation scheme is
adopted. The signature image is segmented in only six
197
International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064
Volume 2 Issue 8, August 2013
www.ijsr.net
rectangular areas, while, for each area, information about the
transition of black and white pixels in the four deferent
directions is used.
A. Image area: The number of black (foreground) pixels in
the image. In skeletonized signature images, it
represents a measure of the density of the signature
traces.
B. Vertical center of the signature: The vertical center Cy is
given by
C. Horizontal center of the signature: The horizontal center
Cx is given by
D. Maximum vertical projection: The vertical projection of
the skeletonized signature image is calculated. The
highest value of the projection histogram is taken as the
maximum vertical projection.
E. Maximum horizontal projection: As above, the
horizontal projection histogram is calculated and the
highest value of it is considered as the maximum
horizontal projection.
F. Vertical projection peaks: The number of the local
maxima of the vertical projection histogram.
G. Horizontal projection peaks: The number of the local
maxima of the horizontal projection histogram.
H. Number of edge points: An edge point is defined as a
signature point that has only one 8-neighbor.
I. Number of cross points: Cross point is a signature point
that has at least three 8-neighbors.
J. The Hough Transform
In the last stage the Hough Transform (HT) is used [5]. This
algorithm searches a set of straight lines, which appears in
the analyzed signature. The classical transformation
identifies straight-lines in the signature image, but it has also
been used to identifying of signature shapes. In the first step
the HT is applied, where appropriate curve-lines are found.
The analyzed signature consists of large number of straight-
lines, which were found by the HT. The Hough transform is
a feature extraction technique used in image analysis,
computer vision, and digital image processing. Hough
transform is the linear transform for detecting straight lines.
For computational reasons, it is therefore better to
parameterize the lines in the Hough transform with two other
parameters, commonly referred to as r and θ (theta). Using
this parameterization, the equation of the line can be written
as
Y=xcos(θ)+ysin(θ)
Figure 6: Hough transform image
4. Neural Network Training
Multi-layer Perceptron (MLP) neural networks are among
the most commonly used classifiers for pattern recognition
problems [6]. Despite their advantages, they suffer from
some very serious limitations that make their use, for some
problems, impossible. The first limitation is the size of the
neural network. It is very difficult, for very large neural
networks, to get trained. As the amount of the training data
increases, this difficulty becomes a serious obstacle for the
training process. The second difficulty is that the geometry,
the size of the network, the training method used and the
training parameters depend substantially on the amount of
the training data. Also, in order to specify the structure and
the size of the neural network, it is necessary to know a
priori the number of the classes that the neural network will
have to deal with. Unfortunately, when talking about a useful
SRVS, a priori knowledge about the number of signatures
and the number of the signature owners is not available. In
this work a Backward Propagation neural network is used in
order to have the final decision. The Backward Propagation
neural networks are feed-forward architectures with a hidden
non-linear layer and a linear output layer. The training of the
system includes the following two steps. We have trained the
network by randomly choosing the signature images from
our available database .We passed the extracted features into
the neural network and each time we changed the input
weights to train the network. The extracted values of each
signature images from the database of 150 images are given
to the feed forward neural network (trained using back
propagation gradient descent learning). Inferences are drawn
by three cases:
Case 1: In this case data sets used for the training and testing
are same.
Training Data set = 150 Images
Testing Data Set = 150 images
Case 2: In this case data set which is used for the training is
greater than testing data set.
Training Data set = 150 Images
Testing Data Set = 120 images
198
International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064
Volume 2 Issue 8, August 2013
www.ijsr.net
Case 3: In this case data set which is used for the training is
less than testing data set.
Training Data set = 100 Images
Testing Data Set = 120 images
In this model we use feed forward neural network with one
single layer, two hidden layers and an one output layer. We
used 35 neurons in the first hidden layer, and 25 hidden
layers in the second layer.
5. Signature Verification and Recognition
It is done on the basis of FAR and FRR.
5.1 Rejection: The legitimate user is rejected because the
system does not find the user’s current biometric data similar
enough to the master template stored in the database.
Correct rejection: The system was asked if the signature
belonged to a false owner and the response was negative
False rejection: The system was asked if the signature
belonged to the correct owner and the response was negative.
5.2 Acceptance: An imposer is accepted as a legitimate user
because the system finds the imposter’s biometric data
similar enough to master template of a legitimate user.
Correct acceptation: The system was asked if the signature
belonged to the correct owner and the response was positive.
False acceptation: The system was asked if the signature
belonged to a false owner and the response was positive into
groups and the adoption of a two-stage structure. We showed
that such a structure leads to small, easily trained classifiers
without hazarding performance by leaving out features that
may be useful to the system.
Figure 7: Signature selection
Figure 8: Preprocessed Image
Figure 9: Feature extraction
Figure 10: Neural Network training
Figure 11: Verification result
199
International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064
Volume 2 Issue 8, August 2013
www.ijsr.net
6. Experimental Result
In the investigations, characteristic features (set of sections,
projection, proportion coefficient, centre of gravity) have
been tested separately, and the influence of the each feature
has been observed. The test gave information about changes
co-efficient FAR (False Accept Rate) and FRR (False Reject
Rate). The FAR typically is stated as the ratio of the number
of false acceptances divided by the number of total
identification attempts. The FRR is stated as the ratio of the
number of false rejections divided by the number of total
identification attempt. Experimental results prove that the
back propagation network performs well in identifying
forgery. This proposed system might provide an efficient
solution to unresolved and very difficult problem in the field
of signature. A false rejection ratio of less than 0.1 and a
false acceptance ratio of 0.17 were achieved in this system.
In Different cases used parameters for neural network are
written in Table 1. Recognition and verification result are
written in Table 2 and Table 3 respectively.
Table 1: Parameters used for training in Neural Network
Parameter Set 1 Set 2 Set 3
Momemtum 0.9 0.85 0.78
Learning Rate 0.001 0.03 0.03
No. Of Hidden Layers 2 2 2
Epochs 4800 4800 3500
Nonlinear Function Logsig Logsig logsig
Training Fuction Traingdm Traingdm traingdm
Table 2: Recognition result for sample user
Reference output Sample output FRR
1 2 3
Person 1 0.9 0.899 0.854 0.865 0.00
Person 2 0.9 0.882 0.867 0.875 0.00
Person 3 0.9 0.880 0.758 0.832 0.05
Person 4 0.9 0.890 0.895 0.645 0.045
Table 3: Verification result for sample user
Reference output Sample output FRR
1 2 3
Person 1 0.4 0.283 0.022 0.017 0.00
Person 2 0.4 0.210 0.204 0.108 0.00
Person 3 0.4 0.019 0.384 0.745 0.18
Person 4 0.4 0.008 0.547 0.578 0.16
7. Conclusion
A fundamental problem in the field of off-line signature
verification is the lack of a pertinent shape factor. By using
Hough Transform regular shapes determined which
overcome problem of this pertinent shape. A major
contribution of this work is the determination of a matrices
point from Hough space transform which is used as an input
parameter for the neural network which is further trained
with back propagation algorithm. The experiments
performed with a 150 signature database and efficiency in
three different cases is found above 95% approximately.
In the future work application of the wavelet transform over
Hough space image with application of neural network will
increase efficiency and reduce both false acceptance rate and
false rejection rate. Further the fusion of handwriting
parameters with signature can make system much better.
References
[1] Ankit Arora and Aakanksha S. Choubey “Comparative
Analysis of Off-line Signature Recognition” pp 241-245
Volume 2 Issue 7 (International Journal of Science and
Research (IJSR), India ISSN: 2319-7064) July 2013.
[2] Suhail M. Odeh “Off-line signature verification and
recognition: Neural Network Approach” in IEEE 2011.
[3] G. Sachin “Automatic Person identification and
Verification using Online Handwriting”, Thesis
International Institute of Information Technology,
Hyderabad, India, March-2008.
[4] P.Porwik “The compact three stage method of the
signature recognition”, proceeding on 6th International
conference on computer Information system and
Industrial Management applications, 2007
[5] R.C. Gonzalez and R.E. Woods “Digital Image
Processing”, second edition, ISBN81-7808-629-8
[6] Pavlidis T.”A thinning algorithm for discrete binary
images. Computer graphics and image processing 1980,
13:142-157
[7] Illingworth J., Kittler J. A survey of the Hough
transforms. Computer Vision, Graphics and Image
Processing 1988; 44: 87–114
[8] http://en.wikipedia.org/wiki/Artificial_neural_network,
dated 14 march 2011
200

Más contenido relacionado

La actualidad más candente

Signature verification
Signature verificationSignature verification
Signature verificationNAVEEN TOKAS
 
Handwriting Recognition
Handwriting RecognitionHandwriting Recognition
Handwriting RecognitionBindu Karki
 
Fraud Detection Using Signature Recognition
Fraud Detection Using Signature RecognitionFraud Detection Using Signature Recognition
Fraud Detection Using Signature RecognitionTejraj Thakor
 
FAKE CURRENCY DETECTION PDF NEW PPT.pptx
FAKE CURRENCY DETECTION PDF NEW PPT.pptxFAKE CURRENCY DETECTION PDF NEW PPT.pptx
FAKE CURRENCY DETECTION PDF NEW PPT.pptxBasavaPrabhu14
 
Handwritten digit recognition using image processing
Handwritten digit recognition using image processing Handwritten digit recognition using image processing
Handwritten digit recognition using image processing anita maharjan
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognitionvarsha mohite
 
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...IJNSA Journal
 
Hand Written Character Recognition Using Neural Networks
Hand Written Character Recognition Using Neural Networks Hand Written Character Recognition Using Neural Networks
Hand Written Character Recognition Using Neural Networks Chiranjeevi Adi
 
offline character recognition for handwritten gujarati text
offline character recognition for handwritten gujarati textoffline character recognition for handwritten gujarati text
offline character recognition for handwritten gujarati textBhumika Patel
 
Off-line Signature Verification
Off-line Signature VerificationOff-line Signature Verification
Off-line Signature Verificationlemon_au
 
Fingerprint scanner
Fingerprint scannerFingerprint scanner
Fingerprint scannerAusaf khan
 
Detection and recognition of face using neural network
Detection and recognition of face using neural networkDetection and recognition of face using neural network
Detection and recognition of face using neural networkSmriti Tikoo
 
Machine Learning SPPU Unit 1
Machine Learning SPPU Unit 1Machine Learning SPPU Unit 1
Machine Learning SPPU Unit 1Amruta Aphale
 
Signature verification in biometrics
Signature verification in biometricsSignature verification in biometrics
Signature verification in biometricsSwapnil Bangera
 
Real time handwritten devanagari character recognition
Real time handwritten devanagari character recognitionReal time handwritten devanagari character recognition
Real time handwritten devanagari character recognitionYubraj Ghimire
 

La actualidad más candente (20)

Signature verification
Signature verificationSignature verification
Signature verification
 
Handwriting Recognition
Handwriting RecognitionHandwriting Recognition
Handwriting Recognition
 
Fraud Detection Using Signature Recognition
Fraud Detection Using Signature RecognitionFraud Detection Using Signature Recognition
Fraud Detection Using Signature Recognition
 
FAKE CURRENCY DETECTION PDF NEW PPT.pptx
FAKE CURRENCY DETECTION PDF NEW PPT.pptxFAKE CURRENCY DETECTION PDF NEW PPT.pptx
FAKE CURRENCY DETECTION PDF NEW PPT.pptx
 
Handwritten digit recognition using image processing
Handwritten digit recognition using image processing Handwritten digit recognition using image processing
Handwritten digit recognition using image processing
 
Image recognition
Image recognitionImage recognition
Image recognition
 
Image recognition
Image recognitionImage recognition
Image recognition
 
Handwritten Character Recognition
Handwritten Character RecognitionHandwritten Character Recognition
Handwritten Character Recognition
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...
 
Hand Written Character Recognition Using Neural Networks
Hand Written Character Recognition Using Neural Networks Hand Written Character Recognition Using Neural Networks
Hand Written Character Recognition Using Neural Networks
 
offline character recognition for handwritten gujarati text
offline character recognition for handwritten gujarati textoffline character recognition for handwritten gujarati text
offline character recognition for handwritten gujarati text
 
Off-line Signature Verification
Off-line Signature VerificationOff-line Signature Verification
Off-line Signature Verification
 
Sign verification
Sign verificationSign verification
Sign verification
 
Fingerprint scanner
Fingerprint scannerFingerprint scanner
Fingerprint scanner
 
Detection and recognition of face using neural network
Detection and recognition of face using neural networkDetection and recognition of face using neural network
Detection and recognition of face using neural network
 
Machine Learning SPPU Unit 1
Machine Learning SPPU Unit 1Machine Learning SPPU Unit 1
Machine Learning SPPU Unit 1
 
Signature verification in biometrics
Signature verification in biometricsSignature verification in biometrics
Signature verification in biometrics
 
Real time handwritten devanagari character recognition
Real time handwritten devanagari character recognitionReal time handwritten devanagari character recognition
Real time handwritten devanagari character recognition
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 

Similar a Offline Signature Verification and Recognition using Neural Network

International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
Ganesan dhawanrpt
Ganesan dhawanrptGanesan dhawanrpt
Ganesan dhawanrptpramod naik
 
A Simple Signature Recognition System
A Simple Signature Recognition System A Simple Signature Recognition System
A Simple Signature Recognition System iosrjce
 
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEMRELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEMAM Publications
 
An efficient method for recognizing the low quality fingerprint verification ...
An efficient method for recognizing the low quality fingerprint verification ...An efficient method for recognizing the low quality fingerprint verification ...
An efficient method for recognizing the low quality fingerprint verification ...IJCI JOURNAL
 
V.KARTHIKEYAN PUBLISHED ARTICLE A.A
V.KARTHIKEYAN PUBLISHED ARTICLE A.AV.KARTHIKEYAN PUBLISHED ARTICLE A.A
V.KARTHIKEYAN PUBLISHED ARTICLE A.AKARTHIKEYAN V
 
Hybrid fingerprint matching algorithm for high accuracy and reliability
Hybrid fingerprint matching algorithm for high accuracy and reliabilityHybrid fingerprint matching algorithm for high accuracy and reliability
Hybrid fingerprint matching algorithm for high accuracy and reliabilityeSAT Publishing House
 
Biometric Signature Recognization
 Biometric Signature Recognization Biometric Signature Recognization
Biometric Signature RecognizationFaimin Khan
 
Proposed Method for Off-line Signature Recognition and Verification using Neu...
Proposed Method for Off-line Signature Recognition and Verification using Neu...Proposed Method for Off-line Signature Recognition and Verification using Neu...
Proposed Method for Off-line Signature Recognition and Verification using Neu...Editor IJMTER
 
Offline Signiture and Numeral Recognition in Context of Cheque
Offline Signiture and Numeral Recognition in Context of ChequeOffline Signiture and Numeral Recognition in Context of Cheque
Offline Signiture and Numeral Recognition in Context of ChequeIJERA Editor
 
A SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITION
A SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITIONA SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITION
A SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITIONIJCIRAS Journal
 
Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...ijfcstjournal
 
Effective Implementation techniques in Offline Signature Verification
Effective Implementation techniques in Offline Signature  VerificationEffective Implementation techniques in Offline Signature  Verification
Effective Implementation techniques in Offline Signature VerificationIOSR Journals
 

Similar a Offline Signature Verification and Recognition using Neural Network (20)

International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Artificial Neural Network Based Offline Signature Recognition System Using Lo...
Artificial Neural Network Based Offline Signature Recognition System Using Lo...Artificial Neural Network Based Offline Signature Recognition System Using Lo...
Artificial Neural Network Based Offline Signature Recognition System Using Lo...
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
1834 1840
1834 18401834 1840
1834 1840
 
1834 1840
1834 18401834 1840
1834 1840
 
Ganesan dhawanrpt
Ganesan dhawanrptGanesan dhawanrpt
Ganesan dhawanrpt
 
A Simple Signature Recognition System
A Simple Signature Recognition System A Simple Signature Recognition System
A Simple Signature Recognition System
 
K012647982
K012647982K012647982
K012647982
 
K012647982
K012647982K012647982
K012647982
 
Dp34707712
Dp34707712Dp34707712
Dp34707712
 
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEMRELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
 
An efficient method for recognizing the low quality fingerprint verification ...
An efficient method for recognizing the low quality fingerprint verification ...An efficient method for recognizing the low quality fingerprint verification ...
An efficient method for recognizing the low quality fingerprint verification ...
 
V.KARTHIKEYAN PUBLISHED ARTICLE A.A
V.KARTHIKEYAN PUBLISHED ARTICLE A.AV.KARTHIKEYAN PUBLISHED ARTICLE A.A
V.KARTHIKEYAN PUBLISHED ARTICLE A.A
 
Hybrid fingerprint matching algorithm for high accuracy and reliability
Hybrid fingerprint matching algorithm for high accuracy and reliabilityHybrid fingerprint matching algorithm for high accuracy and reliability
Hybrid fingerprint matching algorithm for high accuracy and reliability
 
Biometric Signature Recognization
 Biometric Signature Recognization Biometric Signature Recognization
Biometric Signature Recognization
 
Proposed Method for Off-line Signature Recognition and Verification using Neu...
Proposed Method for Off-line Signature Recognition and Verification using Neu...Proposed Method for Off-line Signature Recognition and Verification using Neu...
Proposed Method for Off-line Signature Recognition and Verification using Neu...
 
Offline Signiture and Numeral Recognition in Context of Cheque
Offline Signiture and Numeral Recognition in Context of ChequeOffline Signiture and Numeral Recognition in Context of Cheque
Offline Signiture and Numeral Recognition in Context of Cheque
 
A SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITION
A SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITIONA SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITION
A SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITION
 
Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...
 
Effective Implementation techniques in Offline Signature Verification
Effective Implementation techniques in Offline Signature  VerificationEffective Implementation techniques in Offline Signature  Verification
Effective Implementation techniques in Offline Signature Verification
 

Más de International Journal of Science and Research (IJSR)

Más de International Journal of Science and Research (IJSR) (20)

Innovations in the Diagnosis and Treatment of Chronic Heart Failure
Innovations in the Diagnosis and Treatment of Chronic Heart FailureInnovations in the Diagnosis and Treatment of Chronic Heart Failure
Innovations in the Diagnosis and Treatment of Chronic Heart Failure
 
Design and implementation of carrier based sinusoidal pwm (bipolar) inverter
Design and implementation of carrier based sinusoidal pwm (bipolar) inverterDesign and implementation of carrier based sinusoidal pwm (bipolar) inverter
Design and implementation of carrier based sinusoidal pwm (bipolar) inverter
 
Polarization effect of antireflection coating for soi material system
Polarization effect of antireflection coating for soi material systemPolarization effect of antireflection coating for soi material system
Polarization effect of antireflection coating for soi material system
 
Image resolution enhancement via multi surface fitting
Image resolution enhancement via multi surface fittingImage resolution enhancement via multi surface fitting
Image resolution enhancement via multi surface fitting
 
Ad hoc networks technical issues on radio links security & qo s
Ad hoc networks technical issues on radio links security & qo sAd hoc networks technical issues on radio links security & qo s
Ad hoc networks technical issues on radio links security & qo s
 
Microstructure analysis of the carbon nano tubes aluminum composite with diff...
Microstructure analysis of the carbon nano tubes aluminum composite with diff...Microstructure analysis of the carbon nano tubes aluminum composite with diff...
Microstructure analysis of the carbon nano tubes aluminum composite with diff...
 
Improving the life of lm13 using stainless spray ii coating for engine applic...
Improving the life of lm13 using stainless spray ii coating for engine applic...Improving the life of lm13 using stainless spray ii coating for engine applic...
Improving the life of lm13 using stainless spray ii coating for engine applic...
 
An overview on development of aluminium metal matrix composites with hybrid r...
An overview on development of aluminium metal matrix composites with hybrid r...An overview on development of aluminium metal matrix composites with hybrid r...
An overview on development of aluminium metal matrix composites with hybrid r...
 
Pesticide mineralization in water using silver nanoparticles incorporated on ...
Pesticide mineralization in water using silver nanoparticles incorporated on ...Pesticide mineralization in water using silver nanoparticles incorporated on ...
Pesticide mineralization in water using silver nanoparticles incorporated on ...
 
Comparative study on computers operated by eyes and brain
Comparative study on computers operated by eyes and brainComparative study on computers operated by eyes and brain
Comparative study on computers operated by eyes and brain
 
T s eliot and the concept of literary tradition and the importance of allusions
T s eliot and the concept of literary tradition and the importance of allusionsT s eliot and the concept of literary tradition and the importance of allusions
T s eliot and the concept of literary tradition and the importance of allusions
 
Effect of select yogasanas and pranayama practices on selected physiological ...
Effect of select yogasanas and pranayama practices on selected physiological ...Effect of select yogasanas and pranayama practices on selected physiological ...
Effect of select yogasanas and pranayama practices on selected physiological ...
 
Grid computing for load balancing strategies
Grid computing for load balancing strategiesGrid computing for load balancing strategies
Grid computing for load balancing strategies
 
A new algorithm to improve the sharing of bandwidth
A new algorithm to improve the sharing of bandwidthA new algorithm to improve the sharing of bandwidth
A new algorithm to improve the sharing of bandwidth
 
Main physical causes of climate change and global warming a general overview
Main physical causes of climate change and global warming   a general overviewMain physical causes of climate change and global warming   a general overview
Main physical causes of climate change and global warming a general overview
 
Performance assessment of control loops
Performance assessment of control loopsPerformance assessment of control loops
Performance assessment of control loops
 
Capital market in bangladesh an overview
Capital market in bangladesh an overviewCapital market in bangladesh an overview
Capital market in bangladesh an overview
 
Faster and resourceful multi core web crawling
Faster and resourceful multi core web crawlingFaster and resourceful multi core web crawling
Faster and resourceful multi core web crawling
 
Extended fuzzy c means clustering algorithm in segmentation of noisy images
Extended fuzzy c means clustering algorithm in segmentation of noisy imagesExtended fuzzy c means clustering algorithm in segmentation of noisy images
Extended fuzzy c means clustering algorithm in segmentation of noisy images
 
Parallel generators of pseudo random numbers with control of calculation errors
Parallel generators of pseudo random numbers with control of calculation errorsParallel generators of pseudo random numbers with control of calculation errors
Parallel generators of pseudo random numbers with control of calculation errors
 

Último

Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 

Último (20)

Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 

Offline Signature Verification and Recognition using Neural Network

  • 1. International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064 Volume 2 Issue 8, August 2013 www.ijsr.net Offline Signature Verification and Recognition using Neural Network Ankit Arora1 , Aakanksha S. Choubey2 1 M.E (CTA), CSE Department, SSGI, Bhilai, India 2 Sr. Assistant Professor, CSE Department, SSGI, Bhilai, India Abstract: Authentication of a person is the major concern in this era for security purposes. In biometric systems Signature is one of the behavioural features used for the authentication purpose. In this paper we work on the offline signature collected through different persons. Morphological operations are applied on these signature images with Hough transform to determine regular shape which assists in authentication process. The values extracted from this Hough space is used in the feed forward neural network which is trained using back-propagation algorithm. After the different training stages efficiency found above more than 95%. Application of this system will be in the security concerned fields, in the defence security, biometric authentication, as biometric computer protection or as method of the analysis of person’s behaviour changes. Keywords: Biometrics, Signature, Back propagation, Artificial Neural Network. 1. Introduction Automatic person identification is the major challenges in this era of automation. How-ever, this is not a new problem for our society, and work in this field is a great task as per security concern. With the development of Internet, the interactions are becoming more and more automatic and thus the problem of identity of an individual has become more important. The traditional modes of person authentication systems such as Possessions and Knowledge are not able to solve this problem at the extent which required in today’s era. Possessions include physical characteristics such as keys, passports, and smart cards. Knowledge is a piece of information that is memorized, such as a password and is supposed to be kept a secret. Due to inability of traditional techniques based authentication methods to handle the security concerns, biometrics research have gained significant momentum in the last decade as the security concerns are increasing in every field. Biometrics refers to authentication of a person using a physiological and behavioural trait of the individual that distinguish him from others. Handwriting is a behavioural biometric as it is generated as the consequence of an action performed by a person. Handwriting identification also has a long history [1]. The signature recognition is the process of writer’s verifying by means of the samples signature that are comparing with stored in the database records. The result of this process is usually a number between 0 and 1, which represents a matching ratio. The signature recognition is one of many biometric identification techniques, which are used in practice. In the business world we sign things such as accounts and other official documents. Personal signature lends itself well for biometric verification in state–of–the–art electronic devices. Unfortunately, one drawback of signature is that people do not always sign documents in exactly the same manner. For example, the angle at which they sign may be different due to seating position or due to hand placement on the writing surface. In our approach, the signature analysis process is composed of three stages:  Pre–processing: where image binarization and its size standardization are performed,  Feature extraction: where the unique set of characteristics of the analysed signature is gathered using Hough transform,  Matching: extracted features trained in this step using Back propagation algorithm in Neural Network, then the personal signature is compared with the pattern from the signatures database. 2. Pre-Processing A wide variety of devices capturing signature causes the need to normalize an input image of signature (so called: pre- processing). This stage is further sub-divided into following stages [2]: Normalization, – Image Binarization, – Data Area Cropping, – Thinning 2.1 Normalization Any further processing takes place; a noise reduction filter is applied to the binary scanned image. The goal is to eliminate single white pixels on black back ground and single black pixels on white background und .In order to accomplish this, we apply a 3 X 3 mask to the image with a simple decision, basic principle is this if the no of the 8 neighbours of a pixel that have the same colour with the central pixel is less than two, we reverse the colour of the central pixel. Figure 1 and Figure 2 shows this stage. 196
  • 2. International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064 Volume 2 Issue 8, August 2013 www.ijsr.net Figure 1: Original Image Figure 2: Normalized Image 2.2 Image Binarization It allows us to reduce the amount of image information (removing colour and background), so the output image is black-white. The black-white type of the image is much more easily to further processing [2].   Figure 3: Binarized Image 2.3 Data Area Cropping The signature area is separated from the background by using the well known segmentation methods of vertical and horizontal projection. Thus, the white space surrounding the signature is discarded [3]. Morphological operation Erosion and Dilation applied to perform this step. Figure 4: Erodated and Dilated Image 2.4 Thinning [4] Size of the image is reduced. In this procedure unnecessary signature areas are removed. Step 1: Mark all the points of the signature that are candidates for removing (black pixels that have at least one white 8-neighbor and at least two black 8-neighborspixels). Step 2: Examine one by one all of them, following the contour lines of the signature image, and remove these as their removal will not cause a break in the resulting pattern. Step 3: If at least one point was deleted go again to Step 1 and repeat the process once more. Fig.2. shows an example of this skeletonization technique. Skeletonization makes. Figure 5: Edge detected image 3. Feature Extraction During that step a gathering of characteristic data takes place. The output result is a set of the unique information about the signature. The choice of a powerful set of features is crucial in optical recognition systems. The features used must be suitable for the application and for the applied classifier .Global features provide information about specific cases concerning the structure of the signature, grid information and texture features are intended to provide overall signature appearance information in two different levels of detail. For grid information features, the image is segmented in 96 rectangular regions. Only the area (the number of signature points) in each region is utilized in order to form the grid information feature group. For the texture feature group to be formed, a coarser segmentation scheme is adopted. The signature image is segmented in only six 197
  • 3. International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064 Volume 2 Issue 8, August 2013 www.ijsr.net rectangular areas, while, for each area, information about the transition of black and white pixels in the four deferent directions is used. A. Image area: The number of black (foreground) pixels in the image. In skeletonized signature images, it represents a measure of the density of the signature traces. B. Vertical center of the signature: The vertical center Cy is given by C. Horizontal center of the signature: The horizontal center Cx is given by D. Maximum vertical projection: The vertical projection of the skeletonized signature image is calculated. The highest value of the projection histogram is taken as the maximum vertical projection. E. Maximum horizontal projection: As above, the horizontal projection histogram is calculated and the highest value of it is considered as the maximum horizontal projection. F. Vertical projection peaks: The number of the local maxima of the vertical projection histogram. G. Horizontal projection peaks: The number of the local maxima of the horizontal projection histogram. H. Number of edge points: An edge point is defined as a signature point that has only one 8-neighbor. I. Number of cross points: Cross point is a signature point that has at least three 8-neighbors. J. The Hough Transform In the last stage the Hough Transform (HT) is used [5]. This algorithm searches a set of straight lines, which appears in the analyzed signature. The classical transformation identifies straight-lines in the signature image, but it has also been used to identifying of signature shapes. In the first step the HT is applied, where appropriate curve-lines are found. The analyzed signature consists of large number of straight- lines, which were found by the HT. The Hough transform is a feature extraction technique used in image analysis, computer vision, and digital image processing. Hough transform is the linear transform for detecting straight lines. For computational reasons, it is therefore better to parameterize the lines in the Hough transform with two other parameters, commonly referred to as r and θ (theta). Using this parameterization, the equation of the line can be written as Y=xcos(θ)+ysin(θ) Figure 6: Hough transform image 4. Neural Network Training Multi-layer Perceptron (MLP) neural networks are among the most commonly used classifiers for pattern recognition problems [6]. Despite their advantages, they suffer from some very serious limitations that make their use, for some problems, impossible. The first limitation is the size of the neural network. It is very difficult, for very large neural networks, to get trained. As the amount of the training data increases, this difficulty becomes a serious obstacle for the training process. The second difficulty is that the geometry, the size of the network, the training method used and the training parameters depend substantially on the amount of the training data. Also, in order to specify the structure and the size of the neural network, it is necessary to know a priori the number of the classes that the neural network will have to deal with. Unfortunately, when talking about a useful SRVS, a priori knowledge about the number of signatures and the number of the signature owners is not available. In this work a Backward Propagation neural network is used in order to have the final decision. The Backward Propagation neural networks are feed-forward architectures with a hidden non-linear layer and a linear output layer. The training of the system includes the following two steps. We have trained the network by randomly choosing the signature images from our available database .We passed the extracted features into the neural network and each time we changed the input weights to train the network. The extracted values of each signature images from the database of 150 images are given to the feed forward neural network (trained using back propagation gradient descent learning). Inferences are drawn by three cases: Case 1: In this case data sets used for the training and testing are same. Training Data set = 150 Images Testing Data Set = 150 images Case 2: In this case data set which is used for the training is greater than testing data set. Training Data set = 150 Images Testing Data Set = 120 images 198
  • 4. International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064 Volume 2 Issue 8, August 2013 www.ijsr.net Case 3: In this case data set which is used for the training is less than testing data set. Training Data set = 100 Images Testing Data Set = 120 images In this model we use feed forward neural network with one single layer, two hidden layers and an one output layer. We used 35 neurons in the first hidden layer, and 25 hidden layers in the second layer. 5. Signature Verification and Recognition It is done on the basis of FAR and FRR. 5.1 Rejection: The legitimate user is rejected because the system does not find the user’s current biometric data similar enough to the master template stored in the database. Correct rejection: The system was asked if the signature belonged to a false owner and the response was negative False rejection: The system was asked if the signature belonged to the correct owner and the response was negative. 5.2 Acceptance: An imposer is accepted as a legitimate user because the system finds the imposter’s biometric data similar enough to master template of a legitimate user. Correct acceptation: The system was asked if the signature belonged to the correct owner and the response was positive. False acceptation: The system was asked if the signature belonged to a false owner and the response was positive into groups and the adoption of a two-stage structure. We showed that such a structure leads to small, easily trained classifiers without hazarding performance by leaving out features that may be useful to the system. Figure 7: Signature selection Figure 8: Preprocessed Image Figure 9: Feature extraction Figure 10: Neural Network training Figure 11: Verification result 199
  • 5. International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064 Volume 2 Issue 8, August 2013 www.ijsr.net 6. Experimental Result In the investigations, characteristic features (set of sections, projection, proportion coefficient, centre of gravity) have been tested separately, and the influence of the each feature has been observed. The test gave information about changes co-efficient FAR (False Accept Rate) and FRR (False Reject Rate). The FAR typically is stated as the ratio of the number of false acceptances divided by the number of total identification attempts. The FRR is stated as the ratio of the number of false rejections divided by the number of total identification attempt. Experimental results prove that the back propagation network performs well in identifying forgery. This proposed system might provide an efficient solution to unresolved and very difficult problem in the field of signature. A false rejection ratio of less than 0.1 and a false acceptance ratio of 0.17 were achieved in this system. In Different cases used parameters for neural network are written in Table 1. Recognition and verification result are written in Table 2 and Table 3 respectively. Table 1: Parameters used for training in Neural Network Parameter Set 1 Set 2 Set 3 Momemtum 0.9 0.85 0.78 Learning Rate 0.001 0.03 0.03 No. Of Hidden Layers 2 2 2 Epochs 4800 4800 3500 Nonlinear Function Logsig Logsig logsig Training Fuction Traingdm Traingdm traingdm Table 2: Recognition result for sample user Reference output Sample output FRR 1 2 3 Person 1 0.9 0.899 0.854 0.865 0.00 Person 2 0.9 0.882 0.867 0.875 0.00 Person 3 0.9 0.880 0.758 0.832 0.05 Person 4 0.9 0.890 0.895 0.645 0.045 Table 3: Verification result for sample user Reference output Sample output FRR 1 2 3 Person 1 0.4 0.283 0.022 0.017 0.00 Person 2 0.4 0.210 0.204 0.108 0.00 Person 3 0.4 0.019 0.384 0.745 0.18 Person 4 0.4 0.008 0.547 0.578 0.16 7. Conclusion A fundamental problem in the field of off-line signature verification is the lack of a pertinent shape factor. By using Hough Transform regular shapes determined which overcome problem of this pertinent shape. A major contribution of this work is the determination of a matrices point from Hough space transform which is used as an input parameter for the neural network which is further trained with back propagation algorithm. The experiments performed with a 150 signature database and efficiency in three different cases is found above 95% approximately. In the future work application of the wavelet transform over Hough space image with application of neural network will increase efficiency and reduce both false acceptance rate and false rejection rate. Further the fusion of handwriting parameters with signature can make system much better. References [1] Ankit Arora and Aakanksha S. Choubey “Comparative Analysis of Off-line Signature Recognition” pp 241-245 Volume 2 Issue 7 (International Journal of Science and Research (IJSR), India ISSN: 2319-7064) July 2013. [2] Suhail M. Odeh “Off-line signature verification and recognition: Neural Network Approach” in IEEE 2011. [3] G. Sachin “Automatic Person identification and Verification using Online Handwriting”, Thesis International Institute of Information Technology, Hyderabad, India, March-2008. [4] P.Porwik “The compact three stage method of the signature recognition”, proceeding on 6th International conference on computer Information system and Industrial Management applications, 2007 [5] R.C. Gonzalez and R.E. Woods “Digital Image Processing”, second edition, ISBN81-7808-629-8 [6] Pavlidis T.”A thinning algorithm for discrete binary images. Computer graphics and image processing 1980, 13:142-157 [7] Illingworth J., Kittler J. A survey of the Hough transforms. Computer Vision, Graphics and Image Processing 1988; 44: 87–114 [8] http://en.wikipedia.org/wiki/Artificial_neural_network, dated 14 march 2011 200