SlideShare une entreprise Scribd logo
1  sur  40
Presented By
Vijayalakshmi.S.L
Under the Guidance of
Mrs.Smita Gour
Department of Computer Science
& Engineering
Basaveshwar Engineering College
Bagalkot
Contents
 Introduction
 Literature Survey
 Problem Definition
 Proposed Methodology
 Experimentations
 Conclusion and future work
References
Introduction
 Nowadays, person identification (recognition) and verification is
very important in security and resource access control.
 Biometrics is the science of automatic recognition of individual
depending on their physiological and behavioral attributes.
 For centuries, handwritten signatures have been an integral part of
validating business transaction contracts and agreements.
 Among the different forms of biometric recognition systems such as
fingerprint, iris, face, voice, palm etc., signature will be most widely
used.
Signature Recognition
 Signature Recognition is the procedure of determining to whom a
particular signature belongs to.
 Depending on acquiring of signature images, there are two types of
signature recognition systems:
 Online Signature Recognition
 Offline Signature Recognition
Literature Survey
1. Offline Handwritten Signature Recognition(Gulzar A.
Khuwaja and Mohammad S. Laghari)
 Biometrics, which refers to identifying an individual based on
his or her physiological or behavioral characteristics, has the
capability to reliably distinguish between an authorized person
and an imposter.
 This paper presents a neural network based recognition of
offline handwritten signatures system that is trained with low-
resolution scanned signature images.
2. Off-line Signature Verification Based on Fusion of Grid
and Global Features Using Neural Networks(Shashi Kumar
D R and K B Raja)
 In this paper Off-line Signature Verification Based on Fusion of
Grid and Global Features using Neural Network(SVFGNN) is
presented.
 The global and grid features are fused to generate set of
features for the verification of signature.
3. DWT based Off-line Signature Verification using Angular
Features (Prashanth C R )
 This papers presents DWT based Off-line Signature
Verification using Angular Features (DOSVAF).
 The signature is resized and Discrete Wavelet Transform
(DWT) is applied on the blocks to extract the features.
4. Off-Line Signature Recognition Systems(V A Bharadi)
 Handwritten signature is one of the most widely used biometric
traits for authentication of person as well as document.
 In this paper we discuss issues regarding off-line signature
recognitions.
 The performance metrics of typical systems are compared
along with their feature extraction mechanisms.
5. Offline Signature Recognition and Verification Based on
Artificial Neural Network(Mohammed A. Abdala)
 In this paper, a problem for Offline Signature Recognition and
Verification is presented.
 A system is designed based on two neural networks classifier
and two powerful features (global and grid features).
 The designed system consist of three stages which is pre-
processing, feature extraction and neural network stage.
6. Signature Recognition & Verification System Using Back
Propagation Neural Network (Nilesh Y. Choudhary, Dr.
Umesh. Bhadade)
 In this paper, off-line signature recognition & verification using
back propagation neural network is proposed which is based
on steps of image processing, invariant central moment &
some global properties and back propagation neural
networks.
Problem Definition
Signature Recognition is the procedure of determining to whom a
particular signature belongs to. In this work, the global and grid
features are combined and used to differentiate among the signature
images. These combined features are given to Back Propagation
Neural Network(BPNN) to train it, so that particular signature image
is recognized.
Proposed Model
Block Diagram of Signature Recognition
Image Acquisition :
 Collection of signatures from 50 persons on blank paper.
 The collected signatures are scanned to get images in JPG
format to create database.
Pre-Processing :
Image pre-processing is a technique to enhance raw images
received from cameras/sensors placed on satellites, space
probes and aircrafts or pictures taken in normal day-to-day life
for various applications.
The techniques for preprocessing used are
 RGB to Gray Scale Conversion
 Binarization
 Thinning
 Bounding Box
 RGB to Gray-Scale Convertion
 Binarization
RGB Image
Gray-Scale Image
Gray-Scale Image Binarized Image
 Thinning
 Bounding Box
Binarized Image Thinned Image
Thinned Image Bounded Image
Feature Extraction
Features are the characters to be extracted from the processed
image.
It has used two feature techniques
 Global Features
 Grid Features
Global Features
 Height :
 Width :
 Number of Black Pixels :
 Centroid of the signature :
Width
Height
Grid Features
 The cropped image is divided into 9 rectangular segments i.e.
(3 Χ 3) blocks.
3*3 Blocks of Grid Image
DWT(Discrete Wavelet Transform)
 DWT applied on 1st block. Each block contributes
horizontal, vertical and diagonal components.
1st Block Horizontal Vertical Diagonal
 After applying DWT to all 9 blocks, each block is divided into
horizontal, vertical and diagonal components. From each
components two features mainly horizontal and vertical
projection positions are extracted. Total 54 (9 x 3 x 2) features
are extracted.
Grid features extracted from each block are
 Horizontal Projection Position:
 Vertical Projection Position:
Total 54 features extracted by 9 blocks
Classification
 What is Neural Network..?
 Why Neural Network..?
 What is Back Propagation Neural Network(BPNN)…?
BPNN Architecture
Architecture of Back Propagation Neural Network
Training of BPNN
This involves developing a suitable neural network model
(BPNN). Then the extracted features are presented to
BPNN, which recognizes the different types of signature images.
The training takes place such that the neural network learns that
each entry in the input file has a corresponding entry in the output
file.
Run Snapshot of BPNN
Algorithm for Training phase
Description: Retrieval of a signature image from a database
Input: Training sample images.
Output: Construction of Back Propagation Neural Network.
Begin
Read the training samples images
Step1: Pre-processing
 Convert the image into gray scale image.
 Convert the gray scale image into binary image.
 Apply thinning process.
 Apply bounding box.
Step 2: Features Extracted.
Step 3: Back propagation neural network training.
end // end of proposed algorithm
Testing using Trained BPNN
In testing, input image from testing set is selected and its
features are extracted and given them to the trained model, the
trained BPNN model classifies given sample and produces
output as type of signature and corresponding pattern
Classification accuracy= Number of recognized signatures
Total number of testing signatures
Output Pattern for Recognition
Experimental Results
Experiment 1
The features extracted are listed as:
 Height of the signature
 Width of the signature
 Centroid of X-axis and Y-axis
 Number of black pixels of the signature
 The image is divided into 9 blocks and DWT is applied to each
block. Energy values of each block were extracted as a feature.
10
20
30
40
50
60
70
80
90
100
10 20 30 40 50
83.46 81 78.28 76.7 74
Performance Rate
Performance Rate
No of Persons
Performance Rate of 1st Experiment
Experiment 2
The features are extracted as listed below:
 Height of the signature
 Width of the signature
 Centroid of X-axis and Y-axis
 Number of black pixels of the signature
 The image is divided into 9 blocks and DWT is applied to each
block. From each block two features, horizontal and vertical
projection positions of horizontal, vertical and diagonal
components are extracted
10
20
30
40
50
60
70
80
90
100
10 20 30 40 50
93.33 92.91 91.38 90 89.47
Performance Rate
Performance Rate
No of Persons
Performance Rate of 2nd Experiment
No. of Persons Experiment 1 Experiment 2
10 83.46 % 93.33 %
20 81 % 92.91 %
30 78.28 % 91.38 %
40 76.7 % 90 %
50 74 % 89.47 %
Performance Rate
The performance rate of the two experiments
Conclusion
The objective of signature recognition is to recognize the signer
for the purpose of recognition. It has been observed that the
global and grid features extracted using discrete wavelet
transform are found to be efficient for offline signature
recognition. The combination of discrete wavelet transform and
back propagation neural network has given expected results. It
achieved the accuracy rate ranging from 93%-89% for enrollment
of 10 to 50 persons.
Future Work
The signature recognition can also be changed by changing the
features that can be extracted from a signature. So, the future
work of the recognition of signature can be done with the same
Neural Network methods but using different signature features
and compares the results with results of the present project.
References
 Gulzar A. Khuwaja and Mohammad S. Laghari, World Academy of
Science, Engineering and Technology , “Offline Handwritten Signature
Recognition”, 2011
 Shashi Kumar D R, K B Raja, R. K Chhotaray, Sabyasachi Pattanaik, “Off-line
Signature Verification Based on Fusion of Grid and Global Features Using
Neural Networks”, 2010
 Prashanth C R , K B Raja, Venugopal K R, L M Patnaik, “DWT based Off-line
Signature Verification using Angular Features”, 2012
 V A Bharadi, H B Kekre, “Off-Line Signature Recognition Systems”, 2010
 Mohammed A. Abdala & Noor Ayad Yousif, “Offline Signature Recognition and
Verification Based on Artificial Neural Network”, 2008
 H. Baltzakis, N. Papamarkos, “A New Signature Verification Technique Based On
A Two-Stage Neural Network Classifier”, 2001
 Khamael Abbas Al-Dulaimi, “Handwritten Signature Verification Technique
based on Extract Features”, 2011
 Hemanta Saikia, Kanak Chandra Sarma, “Approaches and Issues in Offline
Signature Verification System”, 2012
 Vu Nguyen, Michael Blumenstein, Graham Leedham, “Global Features for the
Off-Line Signature Verification Problem”, 2009
 Meenakshi S Arya, Vandana S Inamdar, “A Preliminary Study on Various Off-line
Hand Written Signature Verification Approaches”, 2010
 Javed Ahmed Mahar, Prof. Dr. Mumtaz Hussain Mahar, Muhammad Khalid
Khan, “Comparative Study of Feature Extraction Methods with K-NN for Off-
Line Signature Verification”, 2006
 Nilesh Y. Choudhary, Mrs. Rupal Patil, Dr. Umesh. Bhadade, Prof. Bhupendra M
Chaudhari,“Signature Recognition & Verification System Using Back
Propagation Neural Network”, 2013
 Manoj Kumar, “Signature Verification Using Neural Network”, 2012
 Paigwar Shikha and Shukla Shailja,“Neural Network Based Offline Signature
Recognition and Verification System”, 2013
 Srikanta Pal, Michael Blumenstein, Umapada Pal, “Off-Line Signature
Verification Systems: A Survey”, 2011
Thank You

Contenu connexe

Tendances

Fraud Detection Using Signature Recognition
Fraud Detection Using Signature RecognitionFraud Detection Using Signature Recognition
Fraud Detection Using Signature RecognitionTejraj Thakor
 
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...IJNSA Journal
 
Signature verification Using SIFT Features
Signature verification Using SIFT FeaturesSignature verification Using SIFT Features
Signature verification Using SIFT FeaturesAshikur Rahman
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition pptSantosh Kumar
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingAnkush Kr
 
Handwriting Recognition Using Deep Learning and Computer Version
Handwriting Recognition Using Deep Learning and Computer VersionHandwriting Recognition Using Deep Learning and Computer Version
Handwriting Recognition Using Deep Learning and Computer VersionNaiyan Noor
 
Optical Character Recognition( OCR )
Optical Character Recognition( OCR )Optical Character Recognition( OCR )
Optical Character Recognition( OCR )Karan Panjwani
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationAsim Kumar Pathak
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system pptsNimisha_Goel
 
Lecture 15 DCT, Walsh and Hadamard Transform
Lecture 15 DCT, Walsh and Hadamard TransformLecture 15 DCT, Walsh and Hadamard Transform
Lecture 15 DCT, Walsh and Hadamard TransformVARUN KUMAR
 
Fake Currency detction Using Image Processing
Fake Currency detction Using Image ProcessingFake Currency detction Using Image Processing
Fake Currency detction Using Image ProcessingSavitaHanchinal
 
Presentation Fingervein Authentication
Presentation Fingervein AuthenticationPresentation Fingervein Authentication
Presentation Fingervein AuthenticationANEESH SASIDHARAN
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password AuthenticationAbhijit Akotkar
 
Steganography
SteganographySteganography
SteganographyPREMKUMAR
 
graphical password authentication
graphical password authenticationgraphical password authentication
graphical password authenticationAkhil Kumar
 
FAKE CURRENCY DETECTION PDF NEW PPT.pptx
FAKE CURRENCY DETECTION PDF NEW PPT.pptxFAKE CURRENCY DETECTION PDF NEW PPT.pptx
FAKE CURRENCY DETECTION PDF NEW PPT.pptxBasavaPrabhu14
 

Tendances (20)

Fraud Detection Using Signature Recognition
Fraud Detection Using Signature RecognitionFraud Detection Using Signature Recognition
Fraud Detection Using Signature Recognition
 
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...
 
Signature verification Using SIFT Features
Signature verification Using SIFT FeaturesSignature verification Using SIFT Features
Signature verification Using SIFT Features
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Image recognition
Image recognitionImage recognition
Image recognition
 
Handwriting Recognition Using Deep Learning and Computer Version
Handwriting Recognition Using Deep Learning and Computer VersionHandwriting Recognition Using Deep Learning and Computer Version
Handwriting Recognition Using Deep Learning and Computer Version
 
Optical Character Recognition( OCR )
Optical Character Recognition( OCR )Optical Character Recognition( OCR )
Optical Character Recognition( OCR )
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Handwritten Character Recognition
Handwritten Character RecognitionHandwritten Character Recognition
Handwritten Character Recognition
 
Chapter1 2
Chapter1 2Chapter1 2
Chapter1 2
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system ppts
 
Lecture 15 DCT, Walsh and Hadamard Transform
Lecture 15 DCT, Walsh and Hadamard TransformLecture 15 DCT, Walsh and Hadamard Transform
Lecture 15 DCT, Walsh and Hadamard Transform
 
Fake Currency detction Using Image Processing
Fake Currency detction Using Image ProcessingFake Currency detction Using Image Processing
Fake Currency detction Using Image Processing
 
Presentation Fingervein Authentication
Presentation Fingervein AuthenticationPresentation Fingervein Authentication
Presentation Fingervein Authentication
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
Steganography
SteganographySteganography
Steganography
 
graphical password authentication
graphical password authenticationgraphical password authentication
graphical password authentication
 
FAKE CURRENCY DETECTION PDF NEW PPT.pptx
FAKE CURRENCY DETECTION PDF NEW PPT.pptxFAKE CURRENCY DETECTION PDF NEW PPT.pptx
FAKE CURRENCY DETECTION PDF NEW PPT.pptx
 

Similaire à Signature recognition

journal paper publication
journal paper publicationjournal paper publication
journal paper publicationrikaseorika
 
Offline Handwritten Signature Verification using Neural Network
Offline Handwritten Signature Verification using Neural NetworkOffline Handwritten Signature Verification using Neural Network
Offline Handwritten Signature Verification using Neural Networkijiert bestjournal
 
A Review on Geometrical Analysis in Character Recognition
A Review on Geometrical Analysis in Character RecognitionA Review on Geometrical Analysis in Character Recognition
A Review on Geometrical Analysis in Character Recognitioniosrjce
 
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEMRELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEMAM Publications
 
Automatic signature verification with chain code using weighted distance and ...
Automatic signature verification with chain code using weighted distance and ...Automatic signature verification with chain code using weighted distance and ...
Automatic signature verification with chain code using weighted distance and ...eSAT Journals
 
Multimodal Biometrics at Feature Level Fusion using Texture Features
Multimodal Biometrics at Feature Level Fusion using Texture FeaturesMultimodal Biometrics at Feature Level Fusion using Texture Features
Multimodal Biometrics at Feature Level Fusion using Texture FeaturesCSCJournals
 
Feature Level Fusion Based Bimodal Biometric Using Transformation Domine Tec...
Feature Level Fusion Based Bimodal Biometric Using  Transformation Domine Tec...Feature Level Fusion Based Bimodal Biometric Using  Transformation Domine Tec...
Feature Level Fusion Based Bimodal Biometric Using Transformation Domine Tec...IOSR Journals
 
Offline Signature Recognition and It’s Forgery Detection using Machine Learni...
Offline Signature Recognition and It’s Forgery Detection using Machine Learni...Offline Signature Recognition and It’s Forgery Detection using Machine Learni...
Offline Signature Recognition and It’s Forgery Detection using Machine Learni...AI Publications
 
A Simple Signature Recognition System
A Simple Signature Recognition System A Simple Signature Recognition System
A Simple Signature Recognition System iosrjce
 
OSPCV: Off-line Signature Verification using Principal Component Variances
OSPCV: Off-line Signature Verification using Principal Component VariancesOSPCV: Off-line Signature Verification using Principal Component Variances
OSPCV: Off-line Signature Verification using Principal Component VariancesIOSR Journals
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
An offline signature verification using pixels intensity levels
An offline signature verification using pixels intensity levelsAn offline signature verification using pixels intensity levels
An offline signature verification using pixels intensity levelsSalam Shah
 
Highly Secured Bio-Metric Authentication Model with Palm Print Identification
Highly Secured Bio-Metric Authentication Model with Palm Print IdentificationHighly Secured Bio-Metric Authentication Model with Palm Print Identification
Highly Secured Bio-Metric Authentication Model with Palm Print IdentificationIJERA Editor
 
Signature verification based on proposed fast hyper deep neural network
Signature verification based on proposed fast hyper deep neural networkSignature verification based on proposed fast hyper deep neural network
Signature verification based on proposed fast hyper deep neural networkIAESIJAI
 

Similaire à Signature recognition (20)

journal paper publication
journal paper publicationjournal paper publication
journal paper publication
 
Artificial Neural Network Based Offline Signature Recognition System Using Lo...
Artificial Neural Network Based Offline Signature Recognition System Using Lo...Artificial Neural Network Based Offline Signature Recognition System Using Lo...
Artificial Neural Network Based Offline Signature Recognition System Using Lo...
 
Offline Handwritten Signature Verification using Neural Network
Offline Handwritten Signature Verification using Neural NetworkOffline Handwritten Signature Verification using Neural Network
Offline Handwritten Signature Verification using Neural Network
 
A Review on Geometrical Analysis in Character Recognition
A Review on Geometrical Analysis in Character RecognitionA Review on Geometrical Analysis in Character Recognition
A Review on Geometrical Analysis in Character Recognition
 
I017256165
I017256165I017256165
I017256165
 
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEMRELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
 
Automatic signature verification with chain code using weighted distance and ...
Automatic signature verification with chain code using weighted distance and ...Automatic signature verification with chain code using weighted distance and ...
Automatic signature verification with chain code using weighted distance and ...
 
Multimodal Biometrics at Feature Level Fusion using Texture Features
Multimodal Biometrics at Feature Level Fusion using Texture FeaturesMultimodal Biometrics at Feature Level Fusion using Texture Features
Multimodal Biometrics at Feature Level Fusion using Texture Features
 
Feature Level Fusion Based Bimodal Biometric Using Transformation Domine Tec...
Feature Level Fusion Based Bimodal Biometric Using  Transformation Domine Tec...Feature Level Fusion Based Bimodal Biometric Using  Transformation Domine Tec...
Feature Level Fusion Based Bimodal Biometric Using Transformation Domine Tec...
 
Offline Signature Recognition and It’s Forgery Detection using Machine Learni...
Offline Signature Recognition and It’s Forgery Detection using Machine Learni...Offline Signature Recognition and It’s Forgery Detection using Machine Learni...
Offline Signature Recognition and It’s Forgery Detection using Machine Learni...
 
Choudhary2015
Choudhary2015Choudhary2015
Choudhary2015
 
A Simple Signature Recognition System
A Simple Signature Recognition System A Simple Signature Recognition System
A Simple Signature Recognition System
 
K012647982
K012647982K012647982
K012647982
 
K012647982
K012647982K012647982
K012647982
 
OSPCV: Off-line Signature Verification using Principal Component Variances
OSPCV: Off-line Signature Verification using Principal Component VariancesOSPCV: Off-line Signature Verification using Principal Component Variances
OSPCV: Off-line Signature Verification using Principal Component Variances
 
B017150823
B017150823B017150823
B017150823
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
An offline signature verification using pixels intensity levels
An offline signature verification using pixels intensity levelsAn offline signature verification using pixels intensity levels
An offline signature verification using pixels intensity levels
 
Highly Secured Bio-Metric Authentication Model with Palm Print Identification
Highly Secured Bio-Metric Authentication Model with Palm Print IdentificationHighly Secured Bio-Metric Authentication Model with Palm Print Identification
Highly Secured Bio-Metric Authentication Model with Palm Print Identification
 
Signature verification based on proposed fast hyper deep neural network
Signature verification based on proposed fast hyper deep neural networkSignature verification based on proposed fast hyper deep neural network
Signature verification based on proposed fast hyper deep neural network
 

Dernier

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 

Dernier (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

Signature recognition

  • 1. Presented By Vijayalakshmi.S.L Under the Guidance of Mrs.Smita Gour Department of Computer Science & Engineering Basaveshwar Engineering College Bagalkot
  • 2. Contents  Introduction  Literature Survey  Problem Definition  Proposed Methodology  Experimentations  Conclusion and future work References
  • 3. Introduction  Nowadays, person identification (recognition) and verification is very important in security and resource access control.  Biometrics is the science of automatic recognition of individual depending on their physiological and behavioral attributes.  For centuries, handwritten signatures have been an integral part of validating business transaction contracts and agreements.  Among the different forms of biometric recognition systems such as fingerprint, iris, face, voice, palm etc., signature will be most widely used.
  • 4. Signature Recognition  Signature Recognition is the procedure of determining to whom a particular signature belongs to.  Depending on acquiring of signature images, there are two types of signature recognition systems:  Online Signature Recognition  Offline Signature Recognition
  • 5. Literature Survey 1. Offline Handwritten Signature Recognition(Gulzar A. Khuwaja and Mohammad S. Laghari)  Biometrics, which refers to identifying an individual based on his or her physiological or behavioral characteristics, has the capability to reliably distinguish between an authorized person and an imposter.  This paper presents a neural network based recognition of offline handwritten signatures system that is trained with low- resolution scanned signature images.
  • 6. 2. Off-line Signature Verification Based on Fusion of Grid and Global Features Using Neural Networks(Shashi Kumar D R and K B Raja)  In this paper Off-line Signature Verification Based on Fusion of Grid and Global Features using Neural Network(SVFGNN) is presented.  The global and grid features are fused to generate set of features for the verification of signature.
  • 7. 3. DWT based Off-line Signature Verification using Angular Features (Prashanth C R )  This papers presents DWT based Off-line Signature Verification using Angular Features (DOSVAF).  The signature is resized and Discrete Wavelet Transform (DWT) is applied on the blocks to extract the features.
  • 8. 4. Off-Line Signature Recognition Systems(V A Bharadi)  Handwritten signature is one of the most widely used biometric traits for authentication of person as well as document.  In this paper we discuss issues regarding off-line signature recognitions.  The performance metrics of typical systems are compared along with their feature extraction mechanisms.
  • 9. 5. Offline Signature Recognition and Verification Based on Artificial Neural Network(Mohammed A. Abdala)  In this paper, a problem for Offline Signature Recognition and Verification is presented.  A system is designed based on two neural networks classifier and two powerful features (global and grid features).  The designed system consist of three stages which is pre- processing, feature extraction and neural network stage.
  • 10. 6. Signature Recognition & Verification System Using Back Propagation Neural Network (Nilesh Y. Choudhary, Dr. Umesh. Bhadade)  In this paper, off-line signature recognition & verification using back propagation neural network is proposed which is based on steps of image processing, invariant central moment & some global properties and back propagation neural networks.
  • 11. Problem Definition Signature Recognition is the procedure of determining to whom a particular signature belongs to. In this work, the global and grid features are combined and used to differentiate among the signature images. These combined features are given to Back Propagation Neural Network(BPNN) to train it, so that particular signature image is recognized.
  • 12. Proposed Model Block Diagram of Signature Recognition
  • 13. Image Acquisition :  Collection of signatures from 50 persons on blank paper.  The collected signatures are scanned to get images in JPG format to create database.
  • 14. Pre-Processing : Image pre-processing is a technique to enhance raw images received from cameras/sensors placed on satellites, space probes and aircrafts or pictures taken in normal day-to-day life for various applications. The techniques for preprocessing used are  RGB to Gray Scale Conversion  Binarization  Thinning  Bounding Box
  • 15.  RGB to Gray-Scale Convertion  Binarization RGB Image Gray-Scale Image Gray-Scale Image Binarized Image
  • 16.  Thinning  Bounding Box Binarized Image Thinned Image Thinned Image Bounded Image
  • 17. Feature Extraction Features are the characters to be extracted from the processed image. It has used two feature techniques  Global Features  Grid Features
  • 18. Global Features  Height :  Width :  Number of Black Pixels :  Centroid of the signature : Width Height
  • 19. Grid Features  The cropped image is divided into 9 rectangular segments i.e. (3 Χ 3) blocks. 3*3 Blocks of Grid Image
  • 20. DWT(Discrete Wavelet Transform)  DWT applied on 1st block. Each block contributes horizontal, vertical and diagonal components. 1st Block Horizontal Vertical Diagonal
  • 21.  After applying DWT to all 9 blocks, each block is divided into horizontal, vertical and diagonal components. From each components two features mainly horizontal and vertical projection positions are extracted. Total 54 (9 x 3 x 2) features are extracted. Grid features extracted from each block are  Horizontal Projection Position:  Vertical Projection Position:
  • 22. Total 54 features extracted by 9 blocks
  • 23. Classification  What is Neural Network..?  Why Neural Network..?  What is Back Propagation Neural Network(BPNN)…?
  • 24. BPNN Architecture Architecture of Back Propagation Neural Network
  • 25. Training of BPNN This involves developing a suitable neural network model (BPNN). Then the extracted features are presented to BPNN, which recognizes the different types of signature images. The training takes place such that the neural network learns that each entry in the input file has a corresponding entry in the output file.
  • 27. Algorithm for Training phase Description: Retrieval of a signature image from a database Input: Training sample images. Output: Construction of Back Propagation Neural Network. Begin Read the training samples images Step1: Pre-processing  Convert the image into gray scale image.  Convert the gray scale image into binary image.  Apply thinning process.  Apply bounding box.
  • 28. Step 2: Features Extracted. Step 3: Back propagation neural network training. end // end of proposed algorithm
  • 29. Testing using Trained BPNN In testing, input image from testing set is selected and its features are extracted and given them to the trained model, the trained BPNN model classifies given sample and produces output as type of signature and corresponding pattern Classification accuracy= Number of recognized signatures Total number of testing signatures
  • 30. Output Pattern for Recognition
  • 31. Experimental Results Experiment 1 The features extracted are listed as:  Height of the signature  Width of the signature  Centroid of X-axis and Y-axis  Number of black pixels of the signature  The image is divided into 9 blocks and DWT is applied to each block. Energy values of each block were extracted as a feature.
  • 32. 10 20 30 40 50 60 70 80 90 100 10 20 30 40 50 83.46 81 78.28 76.7 74 Performance Rate Performance Rate No of Persons Performance Rate of 1st Experiment
  • 33. Experiment 2 The features are extracted as listed below:  Height of the signature  Width of the signature  Centroid of X-axis and Y-axis  Number of black pixels of the signature  The image is divided into 9 blocks and DWT is applied to each block. From each block two features, horizontal and vertical projection positions of horizontal, vertical and diagonal components are extracted
  • 34. 10 20 30 40 50 60 70 80 90 100 10 20 30 40 50 93.33 92.91 91.38 90 89.47 Performance Rate Performance Rate No of Persons Performance Rate of 2nd Experiment
  • 35. No. of Persons Experiment 1 Experiment 2 10 83.46 % 93.33 % 20 81 % 92.91 % 30 78.28 % 91.38 % 40 76.7 % 90 % 50 74 % 89.47 % Performance Rate The performance rate of the two experiments
  • 36. Conclusion The objective of signature recognition is to recognize the signer for the purpose of recognition. It has been observed that the global and grid features extracted using discrete wavelet transform are found to be efficient for offline signature recognition. The combination of discrete wavelet transform and back propagation neural network has given expected results. It achieved the accuracy rate ranging from 93%-89% for enrollment of 10 to 50 persons.
  • 37. Future Work The signature recognition can also be changed by changing the features that can be extracted from a signature. So, the future work of the recognition of signature can be done with the same Neural Network methods but using different signature features and compares the results with results of the present project.
  • 38. References  Gulzar A. Khuwaja and Mohammad S. Laghari, World Academy of Science, Engineering and Technology , “Offline Handwritten Signature Recognition”, 2011  Shashi Kumar D R, K B Raja, R. K Chhotaray, Sabyasachi Pattanaik, “Off-line Signature Verification Based on Fusion of Grid and Global Features Using Neural Networks”, 2010  Prashanth C R , K B Raja, Venugopal K R, L M Patnaik, “DWT based Off-line Signature Verification using Angular Features”, 2012  V A Bharadi, H B Kekre, “Off-Line Signature Recognition Systems”, 2010  Mohammed A. Abdala & Noor Ayad Yousif, “Offline Signature Recognition and Verification Based on Artificial Neural Network”, 2008  H. Baltzakis, N. Papamarkos, “A New Signature Verification Technique Based On A Two-Stage Neural Network Classifier”, 2001  Khamael Abbas Al-Dulaimi, “Handwritten Signature Verification Technique based on Extract Features”, 2011
  • 39.  Hemanta Saikia, Kanak Chandra Sarma, “Approaches and Issues in Offline Signature Verification System”, 2012  Vu Nguyen, Michael Blumenstein, Graham Leedham, “Global Features for the Off-Line Signature Verification Problem”, 2009  Meenakshi S Arya, Vandana S Inamdar, “A Preliminary Study on Various Off-line Hand Written Signature Verification Approaches”, 2010  Javed Ahmed Mahar, Prof. Dr. Mumtaz Hussain Mahar, Muhammad Khalid Khan, “Comparative Study of Feature Extraction Methods with K-NN for Off- Line Signature Verification”, 2006  Nilesh Y. Choudhary, Mrs. Rupal Patil, Dr. Umesh. Bhadade, Prof. Bhupendra M Chaudhari,“Signature Recognition & Verification System Using Back Propagation Neural Network”, 2013  Manoj Kumar, “Signature Verification Using Neural Network”, 2012  Paigwar Shikha and Shukla Shailja,“Neural Network Based Offline Signature Recognition and Verification System”, 2013  Srikanta Pal, Michael Blumenstein, Umapada Pal, “Off-Line Signature Verification Systems: A Survey”, 2011