SlideShare une entreprise Scribd logo
1  sur  23
Offline Signature Verification
Based on
Geometric Feature Extraction
using -Artificial Neural Network
Guided by:
Ms. Lima Sebastian
Assistant Professor
CSE Dept. AISAT
Submitted by:
Cen Paul
S7 CSE
13027323
Overview
• Introduction
• Types of Signature Forgeries
• Workflow of the System
• Experimental Results
• Conclusion
• References
2
Introduction
• For centuries, handwritten signatures have been an integral part of validating
business transactions , contracts and agreements.
• Among the different forms of biometric recognition systems such as
fingerprint, iris, face, voice, palm etc. , Handwritten signature is the most
widely used.
• In the era of advanced technology, security is the vital issue to avoid fakes
and forgeries.
• The signature verification is classified into online systems and offline
systems.
• The signature verification systems help to discriminate between the original
and fake signatures.
3
Types of Signature Forgeries
1. Random Forgery
2. Simple Forgery
3. Skilled Forgery
4
Block Diagram
Offline Signature
Verification System
5
5
Workflow of Signature Verification
1. Data Acquisition
2. Preprocessing
3. Feature Extraction
4. Verification/Comparison
Input Data
Data
Preprocessing
Feature
Extraction
Comparison/
Verification
Forged or
Genuine?
6
1. Data Acquisition
• Signatures from individual person are taken on paper and then scanned with
scanner.
• The database contains data from individuals, including genuine signatures
and forgeries signatures.
• Signatures will be stored as images.
7
2. Preprocessing [1/4]
• Preprocessing is done for noise removal.
• Preprocessing stage includes :
i. RGB to gray scale conversion
ii. Binarization
iii. Cropping
8
Preprocessing [2/4]
i. RGB to gray scale conversion
RGB image of scanned signature is converted into gray scale intensity signature
image to eliminate the hue and saturation information while retaining the
luminance.
RGB to Gray-scale Conversion
9
Preprocessing [3/4]
ii. Binarization
A gray scale signature image is converted into binary image to count the number
of black pixels which make feature extraction simpler
Binarization
1
0
Preprocessing [4/4]
iii.Cropping
Cropping the binary image using the boundary-values returned by bounding box
calculation method. This reduces the area of signature to be used for further
processing.
Cropping
11
3. Feature Extraction [1/4]
• To extract the feature of signature image using six global features.
• The extracted features of a signature image are based on geometrical
features like size and shape.
• Features used in this system :
i. Area
ii. Centroid
iii. Standard Deviation
iv. Skewness
v. Kurtosis
vi. Even-Pixels 12
Feature Extraction [2/4]
i. Area
Total number of black pixels present in the binary image.
ii. Centroid
It denotes to the center point of vertical and horizontal of the signature.
13
Feature Extraction [3/4]
iii.Standard Deviation
It measures the amount of variation or dispersion on a set of mean data
values. If deviation is closed to the mean data value then the variation is less
otherwise spread over a wider range of values.
iv.Skewness
It measure the asymmetricity of the probability distribution of a real
valued random variable having positive, negative or may have undefined
value.
14
Feature Extraction [4/4]
v. Kurtosis
Higher value of kurtosis distribution indicates thicker tails, longer and a
sharper peak whereas lower value denotes shorter, thinner tails.
In Image processing kurtosis values are illustrated in combination with
resolution and noise measurement. In which high kurtosis values gives low
noise and low resolution.
vi. Even Pixels
The positions in the image matrix. Even position refers those matrix
positions for which both the coordinates are even .
15
4. Verification
• The geometric feature are extracted and organised as an input array to the back
propagation network.
• The selected feature vectors are directed as input to the neural network.
• The trained neural network is used to verify the signature as either genuine or
forged.
• If the signature is match then it shows genuine otherwise forgery
16
Experimental Results [1/4]
A. Database
• The signature database is collected from MCYT-75 offline signature corpus
database.
• 15 genuine and 15 forgery signature samples are given for each of 75 users in
database.
• The forgery signature in the database is the mixture of random, simple and
skilled forgeries.
17
Experimental Results [2/4]
B. Performance Measures
• The performance measure of the signature verification is measured in terms of
false rejection rate (FRR) and false acceptance rate (FAR).
• False acceptance occurs when forgeries signatures are accepted as genuine
while in case of false rejection genuine signature are accepted as forgery.
18
Experimental Results [3/4]
• Accuracy of the system is the mean between percentage of genuine signatures
verified as genuine and percentage of forgery signature is verified as forgery.
19
Experimental Results [4/4]
C. Results
• Experiments were conducted on 18 different users. Each having 15 genuine
and 15 forgery signatures.
• Total number of 540 signature is taken each having dimension of 850 360
pixels.
20
CONCLUSION
• Explored the application of geometric based feature extraction on offline
signature verification.
• The performance of the proposed method is examined using Back
propagation learning technique.
• Total accuracy obtained using the proposed method comes out to be above
89.24% .
2
1
References
• Subhash Chandra , Sushila Maheskar . Offline signature verification based on
geometric feature extraction using artificial neural network .3rd Int’l Conf. on
Recent Advances in Information Technology RAIT-2016 .
• Mujahed Jarad, Nijad Al-Najdawi, and Sara Tedmori. Offline handwritten
signature verification system using a supervised neural network approach. In
Computer Science and Information Technology (CSIT), 2014 6th
International Conference on, pages 189–195. IEEE, 2014.
• R. Dubey and D. K. Agrawal, “Comparative analysis of off-line signature
recognition,” 2012 International Conference on Communication, Information
& Computing Technology (ICCICT), pp. 1–6, Oct. 2012.
22
THANKYOU !!
23

Contenu connexe

Tendances

Image Processing Based Signature Recognition and Verification Technique Using...
Image Processing Based Signature Recognition and Verification Technique Using...Image Processing Based Signature Recognition and Verification Technique Using...
Image Processing Based Signature Recognition and Verification Technique Using...Priyanka Pradhan
 
Fraud Detection Using Signature Recognition
Fraud Detection Using Signature RecognitionFraud Detection Using Signature Recognition
Fraud Detection Using Signature RecognitionTejraj Thakor
 
Handwriting Recognition
Handwriting RecognitionHandwriting Recognition
Handwriting RecognitionBindu Karki
 
Digital image forgery detection
Digital image forgery detectionDigital image forgery detection
Digital image forgery detectionAB Rizvi
 
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHODFORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHODeditorijcres
 
High protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyHigh protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyAlfred Oboi
 
An offline signature recognition and verification system based on neural network
An offline signature recognition and verification system based on neural networkAn offline signature recognition and verification system based on neural network
An offline signature recognition and verification system based on neural networkeSAT Journals
 
Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprintAnIsh Kumar
 
Handwriting Recognition Using Deep Learning and Computer Version
Handwriting Recognition Using Deep Learning and Computer VersionHandwriting Recognition Using Deep Learning and Computer Version
Handwriting Recognition Using Deep Learning and Computer VersionNaiyan Noor
 
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...IJNSA Journal
 
3D Password Presentation
3D  Password Presentation3D  Password Presentation
3D Password PresentationSambit Mishra
 
Fingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptaFingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptascg121433
 
BIOMETRICS FINGER PRINT TECHNOLOGY
BIOMETRICS FINGER PRINT TECHNOLOGYBIOMETRICS FINGER PRINT TECHNOLOGY
BIOMETRICS FINGER PRINT TECHNOLOGYsathish sak
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationAsim Kumar Pathak
 

Tendances (20)

Image Processing Based Signature Recognition and Verification Technique Using...
Image Processing Based Signature Recognition and Verification Technique Using...Image Processing Based Signature Recognition and Verification Technique Using...
Image Processing Based Signature Recognition and Verification Technique Using...
 
Fraud Detection Using Signature Recognition
Fraud Detection Using Signature RecognitionFraud Detection Using Signature Recognition
Fraud Detection Using Signature Recognition
 
Handwriting Recognition
Handwriting RecognitionHandwriting Recognition
Handwriting Recognition
 
Digital image forgery detection
Digital image forgery detectionDigital image forgery detection
Digital image forgery detection
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHODFORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
 
High protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyHigh protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technology
 
An offline signature recognition and verification system based on neural network
An offline signature recognition and verification system based on neural networkAn offline signature recognition and verification system based on neural network
An offline signature recognition and verification system based on neural network
 
Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprint
 
Image Forgery Detection
Image Forgery DetectionImage Forgery Detection
Image Forgery Detection
 
Handwriting Recognition Using Deep Learning and Computer Version
Handwriting Recognition Using Deep Learning and Computer VersionHandwriting Recognition Using Deep Learning and Computer Version
Handwriting Recognition Using Deep Learning and Computer Version
 
FINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEMFINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEM
 
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...
 
3D Password Presentation
3D  Password Presentation3D  Password Presentation
3D Password Presentation
 
Fingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptaFingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand gupta
 
3d password
3d password3d password
3d password
 
Biomatric
BiomatricBiomatric
Biomatric
 
Motion Capture
Motion CaptureMotion Capture
Motion Capture
 
BIOMETRICS FINGER PRINT TECHNOLOGY
BIOMETRICS FINGER PRINT TECHNOLOGYBIOMETRICS FINGER PRINT TECHNOLOGY
BIOMETRICS FINGER PRINT TECHNOLOGY
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 

En vedette

An appraisal of offline signature verification techniques
An appraisal of offline signature verification techniquesAn appraisal of offline signature verification techniques
An appraisal of offline signature verification techniquesSalam Shah
 
A Novel Automated Approach for Offline Signature Verification Based on Shape ...
A Novel Automated Approach for Offline Signature Verification Based on Shape ...A Novel Automated Approach for Offline Signature Verification Based on Shape ...
A Novel Automated Approach for Offline Signature Verification Based on Shape ...Editor IJCATR
 
Offline Handwritten Signature Identification and Verification using Multi-Res...
Offline Handwritten Signature Identification and Verification using Multi-Res...Offline Handwritten Signature Identification and Verification using Multi-Res...
Offline Handwritten Signature Identification and Verification using Multi-Res...CSCJournals
 
Emotion based music player
Emotion based music playerEmotion based music player
Emotion based music playerNizam Muhammed
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detectionVikrant Arya
 
Features image processing and Extaction
Features image processing and ExtactionFeatures image processing and Extaction
Features image processing and ExtactionAli A Jalil
 
Feature Extraction
Feature ExtractionFeature Extraction
Feature Extractionskylian
 
Image feature extraction
Image feature extractionImage feature extraction
Image feature extractionRushin Shah
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detectionrejii
 
Gesture recognition technology
Gesture recognition technology Gesture recognition technology
Gesture recognition technology Nagamani Gurram
 
Data leakage detection Complete Seminar
Data leakage detection Complete SeminarData leakage detection Complete Seminar
Data leakage detection Complete SeminarSumit Thakur
 
Hand Written Character Recognition Using Neural Networks
Hand Written Character Recognition Using Neural Networks Hand Written Character Recognition Using Neural Networks
Hand Written Character Recognition Using Neural Networks Chiranjeevi Adi
 

En vedette (13)

An appraisal of offline signature verification techniques
An appraisal of offline signature verification techniquesAn appraisal of offline signature verification techniques
An appraisal of offline signature verification techniques
 
A Novel Automated Approach for Offline Signature Verification Based on Shape ...
A Novel Automated Approach for Offline Signature Verification Based on Shape ...A Novel Automated Approach for Offline Signature Verification Based on Shape ...
A Novel Automated Approach for Offline Signature Verification Based on Shape ...
 
Offline Handwritten Signature Identification and Verification using Multi-Res...
Offline Handwritten Signature Identification and Verification using Multi-Res...Offline Handwritten Signature Identification and Verification using Multi-Res...
Offline Handwritten Signature Identification and Verification using Multi-Res...
 
Emotion based music player
Emotion based music playerEmotion based music player
Emotion based music player
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
Features image processing and Extaction
Features image processing and ExtactionFeatures image processing and Extaction
Features image processing and Extaction
 
Feature Extraction
Feature ExtractionFeature Extraction
Feature Extraction
 
Feature Extraction
Feature ExtractionFeature Extraction
Feature Extraction
 
Image feature extraction
Image feature extractionImage feature extraction
Image feature extraction
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
Gesture recognition technology
Gesture recognition technology Gesture recognition technology
Gesture recognition technology
 
Data leakage detection Complete Seminar
Data leakage detection Complete SeminarData leakage detection Complete Seminar
Data leakage detection Complete Seminar
 
Hand Written Character Recognition Using Neural Networks
Hand Written Character Recognition Using Neural Networks Hand Written Character Recognition Using Neural Networks
Hand Written Character Recognition Using Neural Networks
 

Similaire à Offline signature verification based on geometric feature extraction using artificial neural network

Ganesan dhawanrpt
Ganesan dhawanrptGanesan dhawanrpt
Ganesan dhawanrptpramod naik
 
Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...eSAT Publishing House
 
OSPCV: Off-line Signature Verification using Principal Component Variances
OSPCV: Off-line Signature Verification using Principal Component VariancesOSPCV: Off-line Signature Verification using Principal Component Variances
OSPCV: Off-line Signature Verification using Principal Component VariancesIOSR Journals
 
Handwritten Signature Verification using Artificial Neural Network
Handwritten Signature Verification using Artificial Neural NetworkHandwritten Signature Verification using Artificial Neural Network
Handwritten Signature Verification using Artificial Neural NetworkEditor IJMTER
 
Offline handwritten signature identification using adaptive window positionin...
Offline handwritten signature identification using adaptive window positionin...Offline handwritten signature identification using adaptive window positionin...
Offline handwritten signature identification using adaptive window positionin...sipij
 
A Review on Robust identity verification using signature of a person
A Review on Robust identity verification using signature of a personA Review on Robust identity verification using signature of a person
A Review on Robust identity verification using signature of a personEditor IJMTER
 
Freeman Chain Code (FCC) Representation in Signature Fraud Detection Based On...
Freeman Chain Code (FCC) Representation in Signature Fraud Detection Based On...Freeman Chain Code (FCC) Representation in Signature Fraud Detection Based On...
Freeman Chain Code (FCC) Representation in Signature Fraud Detection Based On...CSCJournals
 
Signature Verification System using CNN & SNN
Signature Verification System using CNN & SNNSignature Verification System using CNN & SNN
Signature Verification System using CNN & SNNIRJET Journal
 
ONLINE SIGNATURE BASED APPLICATION LOCKING SYSTEM
ONLINE SIGNATURE BASED APPLICATION LOCKING SYSTEMONLINE SIGNATURE BASED APPLICATION LOCKING SYSTEM
ONLINE SIGNATURE BASED APPLICATION LOCKING SYSTEMJournal For Research
 
OFFLINE SIGNATURE VERIFICATION SYSTEM FOR BANK CHEQUES USING ZERNIKE MOMENTS,...
OFFLINE SIGNATURE VERIFICATION SYSTEM FOR BANK CHEQUES USING ZERNIKE MOMENTS,...OFFLINE SIGNATURE VERIFICATION SYSTEM FOR BANK CHEQUES USING ZERNIKE MOMENTS,...
OFFLINE SIGNATURE VERIFICATION SYSTEM FOR BANK CHEQUES USING ZERNIKE MOMENTS,...ijaia
 
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEMRELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEMAM Publications
 
smart attendance system using signature verification 1.pptx
smart attendance system using signature verification 1.pptxsmart attendance system using signature verification 1.pptx
smart attendance system using signature verification 1.pptxChinmayakumarMohanty2
 
Artificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification SystemArtificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification SystemIRJET Journal
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologySARATHGOVINDKK
 
An offline signature verification using pixels intensity levels
An offline signature verification using pixels intensity levelsAn offline signature verification using pixels intensity levels
An offline signature verification using pixels intensity levelsSalam Shah
 
Offline Signature Verification Using Local Radon Transform and Support Vector...
Offline Signature Verification Using Local Radon Transform and Support Vector...Offline Signature Verification Using Local Radon Transform and Support Vector...
Offline Signature Verification Using Local Radon Transform and Support Vector...CSCJournals
 
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...IRJET Journal
 
Pattern recognition on line signature
Pattern recognition on line signaturePattern recognition on line signature
Pattern recognition on line signatureMazin Alwaaly
 
A Simple Signature Recognition System
A Simple Signature Recognition System A Simple Signature Recognition System
A Simple Signature Recognition System iosrjce
 

Similaire à Offline signature verification based on geometric feature extraction using artificial neural network (20)

Ganesan dhawanrpt
Ganesan dhawanrptGanesan dhawanrpt
Ganesan dhawanrpt
 
Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...
 
OSPCV: Off-line Signature Verification using Principal Component Variances
OSPCV: Off-line Signature Verification using Principal Component VariancesOSPCV: Off-line Signature Verification using Principal Component Variances
OSPCV: Off-line Signature Verification using Principal Component Variances
 
B017150823
B017150823B017150823
B017150823
 
Handwritten Signature Verification using Artificial Neural Network
Handwritten Signature Verification using Artificial Neural NetworkHandwritten Signature Verification using Artificial Neural Network
Handwritten Signature Verification using Artificial Neural Network
 
Offline handwritten signature identification using adaptive window positionin...
Offline handwritten signature identification using adaptive window positionin...Offline handwritten signature identification using adaptive window positionin...
Offline handwritten signature identification using adaptive window positionin...
 
A Review on Robust identity verification using signature of a person
A Review on Robust identity verification using signature of a personA Review on Robust identity verification using signature of a person
A Review on Robust identity verification using signature of a person
 
Freeman Chain Code (FCC) Representation in Signature Fraud Detection Based On...
Freeman Chain Code (FCC) Representation in Signature Fraud Detection Based On...Freeman Chain Code (FCC) Representation in Signature Fraud Detection Based On...
Freeman Chain Code (FCC) Representation in Signature Fraud Detection Based On...
 
Signature Verification System using CNN & SNN
Signature Verification System using CNN & SNNSignature Verification System using CNN & SNN
Signature Verification System using CNN & SNN
 
ONLINE SIGNATURE BASED APPLICATION LOCKING SYSTEM
ONLINE SIGNATURE BASED APPLICATION LOCKING SYSTEMONLINE SIGNATURE BASED APPLICATION LOCKING SYSTEM
ONLINE SIGNATURE BASED APPLICATION LOCKING SYSTEM
 
OFFLINE SIGNATURE VERIFICATION SYSTEM FOR BANK CHEQUES USING ZERNIKE MOMENTS,...
OFFLINE SIGNATURE VERIFICATION SYSTEM FOR BANK CHEQUES USING ZERNIKE MOMENTS,...OFFLINE SIGNATURE VERIFICATION SYSTEM FOR BANK CHEQUES USING ZERNIKE MOMENTS,...
OFFLINE SIGNATURE VERIFICATION SYSTEM FOR BANK CHEQUES USING ZERNIKE MOMENTS,...
 
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEMRELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
 
smart attendance system using signature verification 1.pptx
smart attendance system using signature verification 1.pptxsmart attendance system using signature verification 1.pptx
smart attendance system using signature verification 1.pptx
 
Artificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification SystemArtificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification System
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
An offline signature verification using pixels intensity levels
An offline signature verification using pixels intensity levelsAn offline signature verification using pixels intensity levels
An offline signature verification using pixels intensity levels
 
Offline Signature Verification Using Local Radon Transform and Support Vector...
Offline Signature Verification Using Local Radon Transform and Support Vector...Offline Signature Verification Using Local Radon Transform and Support Vector...
Offline Signature Verification Using Local Radon Transform and Support Vector...
 
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
 
Pattern recognition on line signature
Pattern recognition on line signaturePattern recognition on line signature
Pattern recognition on line signature
 
A Simple Signature Recognition System
A Simple Signature Recognition System A Simple Signature Recognition System
A Simple Signature Recognition System
 

Dernier

Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 

Dernier (20)

Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 

Offline signature verification based on geometric feature extraction using artificial neural network

  • 1. Offline Signature Verification Based on Geometric Feature Extraction using -Artificial Neural Network Guided by: Ms. Lima Sebastian Assistant Professor CSE Dept. AISAT Submitted by: Cen Paul S7 CSE 13027323
  • 2. Overview • Introduction • Types of Signature Forgeries • Workflow of the System • Experimental Results • Conclusion • References 2
  • 3. Introduction • For centuries, handwritten signatures have been an integral part of validating business transactions , contracts and agreements. • Among the different forms of biometric recognition systems such as fingerprint, iris, face, voice, palm etc. , Handwritten signature is the most widely used. • In the era of advanced technology, security is the vital issue to avoid fakes and forgeries. • The signature verification is classified into online systems and offline systems. • The signature verification systems help to discriminate between the original and fake signatures. 3
  • 4. Types of Signature Forgeries 1. Random Forgery 2. Simple Forgery 3. Skilled Forgery 4
  • 6. Workflow of Signature Verification 1. Data Acquisition 2. Preprocessing 3. Feature Extraction 4. Verification/Comparison Input Data Data Preprocessing Feature Extraction Comparison/ Verification Forged or Genuine? 6
  • 7. 1. Data Acquisition • Signatures from individual person are taken on paper and then scanned with scanner. • The database contains data from individuals, including genuine signatures and forgeries signatures. • Signatures will be stored as images. 7
  • 8. 2. Preprocessing [1/4] • Preprocessing is done for noise removal. • Preprocessing stage includes : i. RGB to gray scale conversion ii. Binarization iii. Cropping 8
  • 9. Preprocessing [2/4] i. RGB to gray scale conversion RGB image of scanned signature is converted into gray scale intensity signature image to eliminate the hue and saturation information while retaining the luminance. RGB to Gray-scale Conversion 9
  • 10. Preprocessing [3/4] ii. Binarization A gray scale signature image is converted into binary image to count the number of black pixels which make feature extraction simpler Binarization 1 0
  • 11. Preprocessing [4/4] iii.Cropping Cropping the binary image using the boundary-values returned by bounding box calculation method. This reduces the area of signature to be used for further processing. Cropping 11
  • 12. 3. Feature Extraction [1/4] • To extract the feature of signature image using six global features. • The extracted features of a signature image are based on geometrical features like size and shape. • Features used in this system : i. Area ii. Centroid iii. Standard Deviation iv. Skewness v. Kurtosis vi. Even-Pixels 12
  • 13. Feature Extraction [2/4] i. Area Total number of black pixels present in the binary image. ii. Centroid It denotes to the center point of vertical and horizontal of the signature. 13
  • 14. Feature Extraction [3/4] iii.Standard Deviation It measures the amount of variation or dispersion on a set of mean data values. If deviation is closed to the mean data value then the variation is less otherwise spread over a wider range of values. iv.Skewness It measure the asymmetricity of the probability distribution of a real valued random variable having positive, negative or may have undefined value. 14
  • 15. Feature Extraction [4/4] v. Kurtosis Higher value of kurtosis distribution indicates thicker tails, longer and a sharper peak whereas lower value denotes shorter, thinner tails. In Image processing kurtosis values are illustrated in combination with resolution and noise measurement. In which high kurtosis values gives low noise and low resolution. vi. Even Pixels The positions in the image matrix. Even position refers those matrix positions for which both the coordinates are even . 15
  • 16. 4. Verification • The geometric feature are extracted and organised as an input array to the back propagation network. • The selected feature vectors are directed as input to the neural network. • The trained neural network is used to verify the signature as either genuine or forged. • If the signature is match then it shows genuine otherwise forgery 16
  • 17. Experimental Results [1/4] A. Database • The signature database is collected from MCYT-75 offline signature corpus database. • 15 genuine and 15 forgery signature samples are given for each of 75 users in database. • The forgery signature in the database is the mixture of random, simple and skilled forgeries. 17
  • 18. Experimental Results [2/4] B. Performance Measures • The performance measure of the signature verification is measured in terms of false rejection rate (FRR) and false acceptance rate (FAR). • False acceptance occurs when forgeries signatures are accepted as genuine while in case of false rejection genuine signature are accepted as forgery. 18
  • 19. Experimental Results [3/4] • Accuracy of the system is the mean between percentage of genuine signatures verified as genuine and percentage of forgery signature is verified as forgery. 19
  • 20. Experimental Results [4/4] C. Results • Experiments were conducted on 18 different users. Each having 15 genuine and 15 forgery signatures. • Total number of 540 signature is taken each having dimension of 850 360 pixels. 20
  • 21. CONCLUSION • Explored the application of geometric based feature extraction on offline signature verification. • The performance of the proposed method is examined using Back propagation learning technique. • Total accuracy obtained using the proposed method comes out to be above 89.24% . 2 1
  • 22. References • Subhash Chandra , Sushila Maheskar . Offline signature verification based on geometric feature extraction using artificial neural network .3rd Int’l Conf. on Recent Advances in Information Technology RAIT-2016 . • Mujahed Jarad, Nijad Al-Najdawi, and Sara Tedmori. Offline handwritten signature verification system using a supervised neural network approach. In Computer Science and Information Technology (CSIT), 2014 6th International Conference on, pages 189–195. IEEE, 2014. • R. Dubey and D. K. Agrawal, “Comparative analysis of off-line signature recognition,” 2012 International Conference on Communication, Information & Computing Technology (ICCICT), pp. 1–6, Oct. 2012. 22