SlideShare une entreprise Scribd logo
1  sur  22
P R E S E N T E D B Y:
P R I YA N K A P R A D H A N
M . T E C H ( S E )
R O L L N O . - 1 3 0 1 4 0 9 5 0 7
Image Processing Based Signature
Recognition and Verification Technique
Using Artificial Neural Network approach
UNDER THE GUIDANCE OF:
ER. L. S. MAURYA
HOD(CS/IT)
SRMSCET,
BAREILLY.
Outline
1. Introduction
1.1 Signature Verification vs. Signature Recognition
1.2 Types of Signature Forgery
2. Problem statement/objective
3. Literature Review
4. Research Methodology
5. Proposed Model
6. Software and Tools Used
7. Expected Result
8. References
9/12/2015Priyanka Pradhan
2
Signature has been a distinguishing feature for person identification.
When a large number of documents, e.g. bank cheques, have to be authenticated
in a limited time, the manual verification of account holders’ signatures is often
unrealistic.
Signature provides secure means of authentication and authorization. So,
there is a need of Automatic Signature Verification and Identification systems.
The present dissertation work is done in the field of offline signature verification
system by extracting some special features that make a signature difficult to
forge. In this dissertation work, existing signature verification systems have been
thoroughly studied and a model is designed to develop an offline signature
verification system.
1. Introduction
9/12/2015Priyanka Pradhan
3
1.1 Signature Verification vs. Signature
Recognition
Shalini Davies
Signature Verification Signature Recognition
9/12/2015Priyanka Pradhan
4
9/12/2015Priyanka Pradhan 5
1.2 Types of Signature Forgery
9/12/2015Priyanka Pradhan
6
Forgeries can be classified into three main categories.
 Random forgery: which is written by the person who doesn’t know the shape of
original signature.
 Simple forgery: which is represented by a signature sample, written by the person who
knows the shape of original signature without much practice.
 Skilled forgery: represented by a suitable imitation of the genuine signature model
(a) Original (b)Random forgery (c)Skilled forgery
Contd….
9/12/2015Priyanka Pradhan
7
 FAR (False Acceptance Ratio): It is given by the number of fake signatures
accepted by the system with respect to the total number of comparisons made.
Calculation of these is show below.
Number of forgeries accepted
FAR =-------------------------------------- * 100
Number of forgeries tested
 FRR (False Rejection Ratio): It is the total number of genuine signatures
rejected by the system with respect to the total number of comparisons made.
Number of originals rejected
FRR = ------------------------------------- * 100
Number of originals tested
2. Problem Statement/Objective
The objectives of this dissertation are:
 To make sure that only the right people are authorized to access high-security systems
 The process of signature verification should be able to detect forgeries
 To use cascading of features for the process of feature extraction of signature from the
preprocessed scanned image of a signature that will give more accurate results
 To cascade and comparison of features
9/12/2015Priyanka Pradhan
8
3. Literature Review
9/12/2015Priyanka Pradhan
9
Base Paper
[1]Ali Karounia , Bassam Dayab, Samia Bahlakb,” Offline
signature recognition using neural networks approach”. 1877-0509,
Published by Elsevier Ltd(Dec. 2011)[8].
 In this paper, a method for Offline Verification of signatures is presented using
a set of simple shape based geometric features. The features that are used are
Area, Center of gravity, Eccentricity, Kurtosis and Skewness. Before
extracting the features, preprocessing of a scanned image is necessary to
isolate the signature part and to remove any spurious noise present.
 The system is initially trained using a database of signatures obtained from
those individuals whose signatures have to be authenticated by the system.
Contd…
9/12/2015Priyanka Pradhan
10
[2]Nancy Prof. and Gulshan Goyal ,“Signature Processing in
Handwritten Bank Cheque Images”. International Journal on
Recent and Innovation Trends in Computing and Communication
ISSN: 2321-8169 Volume: 2 Issue: 5(May 2015)[2].
 The present paper focuses on different steps including browsing a bank
cheque, pre-processing, feature extraction, recognition.
 Preprocessing stage includes image resizing, noise elimination, thinning etc.
On the other hand feature extraction is done on the basis of gray level co-
occurrence matrix .
 Feature extraction stage includes contrast, homogeneity, energy, entropy,
variance, sum average etc.
Contd…
9/12/2015Priyanka Pradhan
11
[3] Harpreet Anand and Prof. D.L Bhombe,“Enhanced Signature
Verification AndRecognition Using Matlab”, International Journal
of Innovative Research in Advanced Engineering (IJIRAE) ISSN:
2349-2163Volume 1 Issue 4 (May 2014)[3].
 In this paper offline signature verification using neural network is projected.
For authentication of signature, the proposed method is based on geometrical
and statistical feature extraction and then the entire database, features are
trained using neural network .
 The extracted features of investigation signature are compared with the
previously trained features of the reference signature.
Contd…
9/12/2015Priyanka Pradhan
12
[4]A. Vinoth, V. Sujathabai, “A Pixel Based Signature
Authentication System”, International Journal of Innovative
Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075,
Volume-2, Issue-6, May 2013[6] .
 In this paper, the off-line signatures is verified by taking a boundary of the
entire signature and do the pixel comparison.
 Signature is acquired using a scanner. Detection process is done after the data
acquisition and pre-processing. Pre processing includes noise removal, grey-
scale, manipulation, edge detection. Experimental results show that 50% of
the accurate matching with the existing one from the data base.
Contd…
9/12/2015Priyanka Pradhan
13
[5] Przemysław Kudłacik and Piotr Porwik, A new approach to
signature recognition using the fuzzy method. Published online:
The Author(s) 2012. This article is published with open access at
Springerlink.com (15 August 2012)[7].
 The paper presents a new fuzzy approach to off-line handwritten signature
recognition. The solution is based on characteristic feature extraction. After
finding signature’s center of gravity a number of lines are drawn through it at
different angles.
 Cross points of generated lines and signature sample, which are further
grouped and sorted, are treated as the set of features.
4. Research Methodology
Stage 1: The signature acquisition process is executed manually using scanner.
Stage 2: The Pre-processing phase. After signature acquisition the sampled data is preceded for the
Pre-processing phase. In pre-processing phase the images are refined by applying various operations of
Digital Image Processing. Pre-Processing phase will filter the images and convert the RGB image into
the gray image and then to Black & White image. The threshold Black & White image will execute the
Recognition process in an efficient way. Various Pre-Processing phases will be applying on the sampled
data.
(b)Preprocessed Signature
9/12/2015Priyanka Pradhan
14
(a)Original Gray Scale Image
Contd…
9/12/2015Priyanka Pradhan
15
Stage 3: After pre-processing the sampled scanned signature documents, the
segmentation techniques are applied to it. Various methods for segmentation are available,
some of them are:
 Threshold based segmentation
 Edge based segmentation
 Region based segmentation
 Clustering techniques
 Matching
Stage 4: The segmented images are then used for the feature extraction phase. Various
methods for feature extraction are available, some of them are:
 Global Transformation and Series Expansion
 Statistical Method
 Geometrical and Topological Representation
Contd…
9/12/2015Priyanka Pradhan
16
Stage 5: At final stage, the ANN (ARTIFICIAL NEURAL NETWORK) will be used for
the classification process. Various methods for classification are available, some of them
are:
 Hidden Markovs Model
 Support Vector Machine
 Artificial Neural Network
(a)Supervised Learning
(b)Unsupervised learning
Fig 4.1: Neural network system
5. Proposed Approach
9/12/2015Priyanka Pradhan
17
Fig 5.1:Proposed Model
6. Software and Tools Used
 The sampled signatures are scanned through a normal optical scanner.
 For morphological operations image processing tool in MATLAB is used.
 For training the neural network, a toolbox called nntool in MATLAB will be
used.
9/12/2015Priyanka Pradhan
18
7. Expected Results
 The motive of this dissertation is to design an offline signature recognition system.
 The motive is to verify offline scanned signature.
 The accuracy of signature recognition is targeted to > 98%.
9/12/2015Priyanka Pradhan
19
8. References
[1] Shefali Singla and Deepinder Kaur. Signature Verification Using DTI and Guided DTI
Classifiers and Digital Encryption. International Journal of Advanced Research in
Computer Science and Software Engineering. Volume 5 Issue 4 ISSN: 2277 128X (May
2015).
[2] Nancy Prof. and Gulshan Goyal . Signature Processing in Handwritten Bank Cheque
Images. International Journal on Recent and Innovation Trends in Computing and
Communication. ISSN: 2321-8169 Volume: 2 Issue: 5(May 2015).
[3] Harpreet Anand and Prof. D.L Bhombe. Enhanced Signature Verification
AndRecognition Using Matlab. International Journal of Innovative Research in Advanced
Engineering (IJIRAE). ISSN: 2349-2163 Volume 1 Issue: 4 (May 2014)
[4] Sheena, Sheena Mathew. A Study of Multimodal Biometric System. IJRET:
International Journal of Research in Engineering and Technology eISSN: 2319-1163 |
pISSN: 2321-7308. Volume: 03 Special Issue: 15 | IWCPS-2014 | (Dec-2014).
9/12/2015Priyanka Pradhan
20
Contd…
[5] Harpreet Anand and Prof. D.L Bhombe. Enhanced Signature Verification And
Recognition Using Matlab. International Journal of Innovative Dissertation in Advanced
Engineering (IJIRAE) ISSN: 2349-2163 Volume 1 Issue 4 (May 2014).
[6] A. Vinoth, V. Sujathabai. A Pixel Based Signature Authentication System.
International Journal of Innovative Technology and Exploring Engineering (IJITEE)
ISSN: 2278-3075 Volume-2 Issue-6 (May 2013).
[7] Przemysław Kudłacik and Piotr Porwik, A new approach to signature recognition
using the fuzzy method. Published online: This article is published with open access at
Springerlink.com (15 August 2012).
[8] Ali Karounia , Bassam Dayab, Samia Bahlakb. Offline signature recognition using
neural networks approach. 1877-0509 Published by Elsevier Ltd(Dec. 2011).
9/12/2015Priyanka Pradhan
21
9/12/2015Priyanka Pradhan
22

Contenu connexe

Tendances

Pattern recognition Hand Geometry
Pattern recognition Hand GeometryPattern recognition Hand Geometry
Pattern recognition Hand GeometryMazin Alwaaly
 
Design of Accumulator Unit
Design of Accumulator UnitDesign of Accumulator Unit
Design of Accumulator UnitHarshad Koshti
 
Predictive coding
Predictive codingPredictive coding
Predictive codingp_ayal
 
IT6005 digital image processing question bank
IT6005   digital image processing question bankIT6005   digital image processing question bank
IT6005 digital image processing question bankGayathri Krishnamoorthy
 
Error detection in Data Communication System
Error detection in Data Communication SystemError detection in Data Communication System
Error detection in Data Communication SystemIshan Sharma
 
Signature verification in biometrics
Signature verification in biometricsSignature verification in biometrics
Signature verification in biometricsSwapnil Bangera
 
Off-line Signature Verification
Off-line Signature VerificationOff-line Signature Verification
Off-line Signature Verificationlemon_au
 
Retina recognition biometrics drishtysharma
Retina recognition biometrics drishtysharmaRetina recognition biometrics drishtysharma
Retina recognition biometrics drishtysharmaDrishty Sharma
 
Spell checker using Natural language processing
Spell checker using Natural language processing Spell checker using Natural language processing
Spell checker using Natural language processing Sandeep Wakchaure
 
Sign Language Recognition based on Hands symbols Classification
Sign Language Recognition based on Hands symbols ClassificationSign Language Recognition based on Hands symbols Classification
Sign Language Recognition based on Hands symbols ClassificationTriloki Gupta
 
digital image processing
digital image processingdigital image processing
digital image processingAbinaya B
 
Online signature recognition
Online signature recognitionOnline signature recognition
Online signature recognitionPiyush Mittal
 
Lossless predictive coding in Digital Image Processing
Lossless predictive coding in Digital Image ProcessingLossless predictive coding in Digital Image Processing
Lossless predictive coding in Digital Image Processingpriyadharshini murugan
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognitionvarsha mohite
 
Point processing
Point processingPoint processing
Point processingpanupriyaa7
 
Character generation techniques
Character generation techniquesCharacter generation techniques
Character generation techniquesMani Kanth
 
SPATIAL FILTERING IN IMAGE PROCESSING
SPATIAL FILTERING IN IMAGE PROCESSINGSPATIAL FILTERING IN IMAGE PROCESSING
SPATIAL FILTERING IN IMAGE PROCESSINGmuthu181188
 

Tendances (20)

Pattern recognition Hand Geometry
Pattern recognition Hand GeometryPattern recognition Hand Geometry
Pattern recognition Hand Geometry
 
Design of Accumulator Unit
Design of Accumulator UnitDesign of Accumulator Unit
Design of Accumulator Unit
 
Predictive coding
Predictive codingPredictive coding
Predictive coding
 
Speaker Recognition
Speaker RecognitionSpeaker Recognition
Speaker Recognition
 
Offline Signature Verification and Recognition using Neural Network
Offline Signature Verification and Recognition using Neural NetworkOffline Signature Verification and Recognition using Neural Network
Offline Signature Verification and Recognition using Neural Network
 
IT6005 digital image processing question bank
IT6005   digital image processing question bankIT6005   digital image processing question bank
IT6005 digital image processing question bank
 
Error detection in Data Communication System
Error detection in Data Communication SystemError detection in Data Communication System
Error detection in Data Communication System
 
Data Redundacy
Data RedundacyData Redundacy
Data Redundacy
 
Signature verification in biometrics
Signature verification in biometricsSignature verification in biometrics
Signature verification in biometrics
 
Off-line Signature Verification
Off-line Signature VerificationOff-line Signature Verification
Off-line Signature Verification
 
Retina recognition biometrics drishtysharma
Retina recognition biometrics drishtysharmaRetina recognition biometrics drishtysharma
Retina recognition biometrics drishtysharma
 
Spell checker using Natural language processing
Spell checker using Natural language processing Spell checker using Natural language processing
Spell checker using Natural language processing
 
Sign Language Recognition based on Hands symbols Classification
Sign Language Recognition based on Hands symbols ClassificationSign Language Recognition based on Hands symbols Classification
Sign Language Recognition based on Hands symbols Classification
 
digital image processing
digital image processingdigital image processing
digital image processing
 
Online signature recognition
Online signature recognitionOnline signature recognition
Online signature recognition
 
Lossless predictive coding in Digital Image Processing
Lossless predictive coding in Digital Image ProcessingLossless predictive coding in Digital Image Processing
Lossless predictive coding in Digital Image Processing
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
Point processing
Point processingPoint processing
Point processing
 
Character generation techniques
Character generation techniquesCharacter generation techniques
Character generation techniques
 
SPATIAL FILTERING IN IMAGE PROCESSING
SPATIAL FILTERING IN IMAGE PROCESSINGSPATIAL FILTERING IN IMAGE PROCESSING
SPATIAL FILTERING IN IMAGE PROCESSING
 

En vedette

Face recognition using artificial neural network
Face recognition using artificial neural networkFace recognition using artificial neural network
Face recognition using artificial neural networkSumeet Kakani
 
Neural network & its applications
Neural network & its applications Neural network & its applications
Neural network & its applications Ahmed_hashmi
 
Signature recognition using clustering techniques dissertati
Signature recognition using clustering techniques dissertatiSignature recognition using clustering techniques dissertati
Signature recognition using clustering techniques dissertatiDr. Vinayak Bharadi
 
Face recognition using neural network
Face recognition using neural networkFace recognition using neural network
Face recognition using neural networkIndira Nayak
 
Handwritten character recognition using artificial neural network
Handwritten character recognition using artificial neural networkHandwritten character recognition using artificial neural network
Handwritten character recognition using artificial neural networkHarshana Madusanka Jayamaha
 
FACE RECOGNITION USING NEURAL NETWORK
FACE RECOGNITION USING NEURAL NETWORKFACE RECOGNITION USING NEURAL NETWORK
FACE RECOGNITION USING NEURAL NETWORKcodebangla
 
Artificial neural networks
Artificial neural networksArtificial neural networks
Artificial neural networksstellajoseph
 
Artificial neural network
Artificial neural networkArtificial neural network
Artificial neural networkDEEPASHRI HK
 
Gesture recognition using artificial neural network,a technology for identify...
Gesture recognition using artificial neural network,a technology for identify...Gesture recognition using artificial neural network,a technology for identify...
Gesture recognition using artificial neural network,a technology for identify...NidhinRaj Saikripa
 
An offline signature recognition and verification system based on neural network
An offline signature recognition and verification system based on neural networkAn offline signature recognition and verification system based on neural network
An offline signature recognition and verification system based on neural networkeSAT Journals
 
Introduction to toolbox under matlab environment
Introduction to toolbox under matlab environmentIntroduction to toolbox under matlab environment
Introduction to toolbox under matlab environmentParamjeet Singh Jamwal
 
MATLAB Environment for Neural Network Deployment
MATLAB Environment for Neural Network DeploymentMATLAB Environment for Neural Network Deployment
MATLAB Environment for Neural Network DeploymentAngelo Cardellicchio
 
مقدمة في برمجة الشبكات network programming
مقدمة في برمجة الشبكات network programmingمقدمة في برمجة الشبكات network programming
مقدمة في برمجة الشبكات network programmingEhab Saad Ahmad
 
الملتقي الدولي الثامن Colloque 2017 urnop ria
الملتقي الدولي الثامن Colloque 2017               urnop  riaالملتقي الدولي الثامن Colloque 2017               urnop  ria
الملتقي الدولي الثامن Colloque 2017 urnop riaboukhrissa Naila
 
neural network nntool box matlab start
neural network nntool box matlab startneural network nntool box matlab start
neural network nntool box matlab startnabeelasd
 
Artificial Neural Networks Lect7: Neural networks based on competition
Artificial Neural Networks Lect7: Neural networks based on competitionArtificial Neural Networks Lect7: Neural networks based on competition
Artificial Neural Networks Lect7: Neural networks based on competitionMohammed Bennamoun
 
Neural tool box
Neural tool boxNeural tool box
Neural tool boxMohan Raj
 
Dissertation character recognition - Report
Dissertation character recognition - ReportDissertation character recognition - Report
Dissertation character recognition - Reportsachinkumar Bharadva
 

En vedette (20)

Face recognition using artificial neural network
Face recognition using artificial neural networkFace recognition using artificial neural network
Face recognition using artificial neural network
 
Neural network & its applications
Neural network & its applications Neural network & its applications
Neural network & its applications
 
Signature recognition using clustering techniques dissertati
Signature recognition using clustering techniques dissertatiSignature recognition using clustering techniques dissertati
Signature recognition using clustering techniques dissertati
 
Face recognition using neural network
Face recognition using neural networkFace recognition using neural network
Face recognition using neural network
 
Artificial neural network
Artificial neural networkArtificial neural network
Artificial neural network
 
Handwritten character recognition using artificial neural network
Handwritten character recognition using artificial neural networkHandwritten character recognition using artificial neural network
Handwritten character recognition using artificial neural network
 
FACE RECOGNITION USING NEURAL NETWORK
FACE RECOGNITION USING NEURAL NETWORKFACE RECOGNITION USING NEURAL NETWORK
FACE RECOGNITION USING NEURAL NETWORK
 
Artificial neural networks
Artificial neural networksArtificial neural networks
Artificial neural networks
 
Artificial neural network
Artificial neural networkArtificial neural network
Artificial neural network
 
Gesture recognition using artificial neural network,a technology for identify...
Gesture recognition using artificial neural network,a technology for identify...Gesture recognition using artificial neural network,a technology for identify...
Gesture recognition using artificial neural network,a technology for identify...
 
An offline signature recognition and verification system based on neural network
An offline signature recognition and verification system based on neural networkAn offline signature recognition and verification system based on neural network
An offline signature recognition and verification system based on neural network
 
Introduction to toolbox under matlab environment
Introduction to toolbox under matlab environmentIntroduction to toolbox under matlab environment
Introduction to toolbox under matlab environment
 
MATLAB Environment for Neural Network Deployment
MATLAB Environment for Neural Network DeploymentMATLAB Environment for Neural Network Deployment
MATLAB Environment for Neural Network Deployment
 
مقدمة في برمجة الشبكات network programming
مقدمة في برمجة الشبكات network programmingمقدمة في برمجة الشبكات network programming
مقدمة في برمجة الشبكات network programming
 
الملتقي الدولي الثامن Colloque 2017 urnop ria
الملتقي الدولي الثامن Colloque 2017               urnop  riaالملتقي الدولي الثامن Colloque 2017               urnop  ria
الملتقي الدولي الثامن Colloque 2017 urnop ria
 
neural network nntool box matlab start
neural network nntool box matlab startneural network nntool box matlab start
neural network nntool box matlab start
 
Artificial Neural Networks Lect7: Neural networks based on competition
Artificial Neural Networks Lect7: Neural networks based on competitionArtificial Neural Networks Lect7: Neural networks based on competition
Artificial Neural Networks Lect7: Neural networks based on competition
 
Neural tool box
Neural tool boxNeural tool box
Neural tool box
 
Fuzzy and nn
Fuzzy and nnFuzzy and nn
Fuzzy and nn
 
Dissertation character recognition - Report
Dissertation character recognition - ReportDissertation character recognition - Report
Dissertation character recognition - Report
 

Similaire à Image Processing Based Signature Recognition and Verification Technique Using Artificial Neural Network approach

ADAPTABLE FINGERPRINT MINUTIAE EXTRACTION ALGORITHM BASED-ON CROSSING NUMBER ...
ADAPTABLE FINGERPRINT MINUTIAE EXTRACTION ALGORITHM BASED-ON CROSSING NUMBER ...ADAPTABLE FINGERPRINT MINUTIAE EXTRACTION ALGORITHM BASED-ON CROSSING NUMBER ...
ADAPTABLE FINGERPRINT MINUTIAE EXTRACTION ALGORITHM BASED-ON CROSSING NUMBER ...IJCSEIT Journal
 
Signature verification based on proposed fast hyper deep neural network
Signature verification based on proposed fast hyper deep neural networkSignature verification based on proposed fast hyper deep neural network
Signature verification based on proposed fast hyper deep neural networkIAESIJAI
 
Offline handwritten signature identification using adaptive window positionin...
Offline handwritten signature identification using adaptive window positionin...Offline handwritten signature identification using adaptive window positionin...
Offline handwritten signature identification using adaptive window positionin...sipij
 
IJSRED-V2I2P33
IJSRED-V2I2P33IJSRED-V2I2P33
IJSRED-V2I2P33IJSRED
 
Freeman Chain Code (FCC) Representation in Signature Fraud Detection Based On...
Freeman Chain Code (FCC) Representation in Signature Fraud Detection Based On...Freeman Chain Code (FCC) Representation in Signature Fraud Detection Based On...
Freeman Chain Code (FCC) Representation in Signature Fraud Detection Based On...CSCJournals
 
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm An Efficient Fingerprint Identification using Neural Network and BAT Algorithm
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm IJECEIAES
 
A Comparative Study for Credit Card Fraud Detection System using Machine Lear...
A Comparative Study for Credit Card Fraud Detection System using Machine Lear...A Comparative Study for Credit Card Fraud Detection System using Machine Lear...
A Comparative Study for Credit Card Fraud Detection System using Machine Lear...IRJET Journal
 
Offline Handwritten Signature Identification and Verification using Multi-Res...
Offline Handwritten Signature Identification and Verification using Multi-Res...Offline Handwritten Signature Identification and Verification using Multi-Res...
Offline Handwritten Signature Identification and Verification using Multi-Res...CSCJournals
 
OFFLINE SIGNATURE VERIFICATION SYSTEM FOR BANK CHEQUES USING ZERNIKE MOMENTS,...
OFFLINE SIGNATURE VERIFICATION SYSTEM FOR BANK CHEQUES USING ZERNIKE MOMENTS,...OFFLINE SIGNATURE VERIFICATION SYSTEM FOR BANK CHEQUES USING ZERNIKE MOMENTS,...
OFFLINE SIGNATURE VERIFICATION SYSTEM FOR BANK CHEQUES USING ZERNIKE MOMENTS,...ijaia
 
Facial Emotion Recognition: A Survey
Facial Emotion Recognition: A SurveyFacial Emotion Recognition: A Survey
Facial Emotion Recognition: A SurveyIRJET Journal
 
Source printer identification using convolutional neural network and transfer...
Source printer identification using convolutional neural network and transfer...Source printer identification using convolutional neural network and transfer...
Source printer identification using convolutional neural network and transfer...IAESIJAI
 
IRJET- Spot Me - A Smart Attendance System based on Face Recognition
IRJET- Spot Me - A Smart Attendance System based on Face RecognitionIRJET- Spot Me - A Smart Attendance System based on Face Recognition
IRJET- Spot Me - A Smart Attendance System based on Face RecognitionIRJET Journal
 
An offline signature verification using pixels intensity levels
An offline signature verification using pixels intensity levelsAn offline signature verification using pixels intensity levels
An offline signature verification using pixels intensity levelsSalam Shah
 
A SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITION
A SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITIONA SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITION
A SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITIONIJCIRAS Journal
 
A Comparative Study on Credit Card Fraud Detection
A Comparative Study on Credit Card Fraud DetectionA Comparative Study on Credit Card Fraud Detection
A Comparative Study on Credit Card Fraud DetectionIRJET Journal
 
HandwrittenDigitRecognitionusing.pdf
HandwrittenDigitRecognitionusing.pdfHandwrittenDigitRecognitionusing.pdf
HandwrittenDigitRecognitionusing.pdfShubhamTripathi290909
 
Random Number Generator Using Seven Segment Display In Labview
Random Number Generator Using Seven Segment Display In LabviewRandom Number Generator Using Seven Segment Display In Labview
Random Number Generator Using Seven Segment Display In LabviewIJERA Editor
 
Study of Software Defect Prediction using Forward Pass RNN with Hyperbolic Ta...
Study of Software Defect Prediction using Forward Pass RNN with Hyperbolic Ta...Study of Software Defect Prediction using Forward Pass RNN with Hyperbolic Ta...
Study of Software Defect Prediction using Forward Pass RNN with Hyperbolic Ta...ijtsrd
 
Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...eSAT Publishing House
 
Bangla_handwritten_dig1] final proposal .pdf
Bangla_handwritten_dig1] final proposal .pdfBangla_handwritten_dig1] final proposal .pdf
Bangla_handwritten_dig1] final proposal .pdfKhondokerAbuNaim
 

Similaire à Image Processing Based Signature Recognition and Verification Technique Using Artificial Neural Network approach (20)

ADAPTABLE FINGERPRINT MINUTIAE EXTRACTION ALGORITHM BASED-ON CROSSING NUMBER ...
ADAPTABLE FINGERPRINT MINUTIAE EXTRACTION ALGORITHM BASED-ON CROSSING NUMBER ...ADAPTABLE FINGERPRINT MINUTIAE EXTRACTION ALGORITHM BASED-ON CROSSING NUMBER ...
ADAPTABLE FINGERPRINT MINUTIAE EXTRACTION ALGORITHM BASED-ON CROSSING NUMBER ...
 
Signature verification based on proposed fast hyper deep neural network
Signature verification based on proposed fast hyper deep neural networkSignature verification based on proposed fast hyper deep neural network
Signature verification based on proposed fast hyper deep neural network
 
Offline handwritten signature identification using adaptive window positionin...
Offline handwritten signature identification using adaptive window positionin...Offline handwritten signature identification using adaptive window positionin...
Offline handwritten signature identification using adaptive window positionin...
 
IJSRED-V2I2P33
IJSRED-V2I2P33IJSRED-V2I2P33
IJSRED-V2I2P33
 
Freeman Chain Code (FCC) Representation in Signature Fraud Detection Based On...
Freeman Chain Code (FCC) Representation in Signature Fraud Detection Based On...Freeman Chain Code (FCC) Representation in Signature Fraud Detection Based On...
Freeman Chain Code (FCC) Representation in Signature Fraud Detection Based On...
 
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm An Efficient Fingerprint Identification using Neural Network and BAT Algorithm
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm
 
A Comparative Study for Credit Card Fraud Detection System using Machine Lear...
A Comparative Study for Credit Card Fraud Detection System using Machine Lear...A Comparative Study for Credit Card Fraud Detection System using Machine Lear...
A Comparative Study for Credit Card Fraud Detection System using Machine Lear...
 
Offline Handwritten Signature Identification and Verification using Multi-Res...
Offline Handwritten Signature Identification and Verification using Multi-Res...Offline Handwritten Signature Identification and Verification using Multi-Res...
Offline Handwritten Signature Identification and Verification using Multi-Res...
 
OFFLINE SIGNATURE VERIFICATION SYSTEM FOR BANK CHEQUES USING ZERNIKE MOMENTS,...
OFFLINE SIGNATURE VERIFICATION SYSTEM FOR BANK CHEQUES USING ZERNIKE MOMENTS,...OFFLINE SIGNATURE VERIFICATION SYSTEM FOR BANK CHEQUES USING ZERNIKE MOMENTS,...
OFFLINE SIGNATURE VERIFICATION SYSTEM FOR BANK CHEQUES USING ZERNIKE MOMENTS,...
 
Facial Emotion Recognition: A Survey
Facial Emotion Recognition: A SurveyFacial Emotion Recognition: A Survey
Facial Emotion Recognition: A Survey
 
Source printer identification using convolutional neural network and transfer...
Source printer identification using convolutional neural network and transfer...Source printer identification using convolutional neural network and transfer...
Source printer identification using convolutional neural network and transfer...
 
IRJET- Spot Me - A Smart Attendance System based on Face Recognition
IRJET- Spot Me - A Smart Attendance System based on Face RecognitionIRJET- Spot Me - A Smart Attendance System based on Face Recognition
IRJET- Spot Me - A Smart Attendance System based on Face Recognition
 
An offline signature verification using pixels intensity levels
An offline signature verification using pixels intensity levelsAn offline signature verification using pixels intensity levels
An offline signature verification using pixels intensity levels
 
A SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITION
A SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITIONA SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITION
A SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITION
 
A Comparative Study on Credit Card Fraud Detection
A Comparative Study on Credit Card Fraud DetectionA Comparative Study on Credit Card Fraud Detection
A Comparative Study on Credit Card Fraud Detection
 
HandwrittenDigitRecognitionusing.pdf
HandwrittenDigitRecognitionusing.pdfHandwrittenDigitRecognitionusing.pdf
HandwrittenDigitRecognitionusing.pdf
 
Random Number Generator Using Seven Segment Display In Labview
Random Number Generator Using Seven Segment Display In LabviewRandom Number Generator Using Seven Segment Display In Labview
Random Number Generator Using Seven Segment Display In Labview
 
Study of Software Defect Prediction using Forward Pass RNN with Hyperbolic Ta...
Study of Software Defect Prediction using Forward Pass RNN with Hyperbolic Ta...Study of Software Defect Prediction using Forward Pass RNN with Hyperbolic Ta...
Study of Software Defect Prediction using Forward Pass RNN with Hyperbolic Ta...
 
Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...
 
Bangla_handwritten_dig1] final proposal .pdf
Bangla_handwritten_dig1] final proposal .pdfBangla_handwritten_dig1] final proposal .pdf
Bangla_handwritten_dig1] final proposal .pdf
 

Plus de Priyanka Pradhan

Tomato disease detection using deep learning convolutional neural network
Tomato disease detection using deep learning convolutional neural networkTomato disease detection using deep learning convolutional neural network
Tomato disease detection using deep learning convolutional neural networkPriyanka Pradhan
 
programming with python ppt
programming with python pptprogramming with python ppt
programming with python pptPriyanka Pradhan
 
GrayBox Testing and Crud Testing By: Er. Priyanka Pradhan
GrayBox Testing and Crud Testing By: Er. Priyanka PradhanGrayBox Testing and Crud Testing By: Er. Priyanka Pradhan
GrayBox Testing and Crud Testing By: Er. Priyanka PradhanPriyanka Pradhan
 
The agile requirements refinery(SRUM) by: Priyanka Pradhan
The agile requirements refinery(SRUM) by: Priyanka PradhanThe agile requirements refinery(SRUM) by: Priyanka Pradhan
The agile requirements refinery(SRUM) by: Priyanka PradhanPriyanka Pradhan
 
Social tagging and its trend
Social tagging and its trendSocial tagging and its trend
Social tagging and its trendPriyanka Pradhan
 
Behavioral pattern By:-Priyanka Pradhan
Behavioral pattern By:-Priyanka PradhanBehavioral pattern By:-Priyanka Pradhan
Behavioral pattern By:-Priyanka PradhanPriyanka Pradhan
 
software product and its characteristics
software product and its characteristicssoftware product and its characteristics
software product and its characteristicsPriyanka Pradhan
 
EDI(ELECTRONIC DATA INTERCHANGE)
EDI(ELECTRONIC DATA INTERCHANGE)EDI(ELECTRONIC DATA INTERCHANGE)
EDI(ELECTRONIC DATA INTERCHANGE)Priyanka Pradhan
 
collaborative tagging :-by Er. Priyanka Pradhan
collaborative tagging :-by Er. Priyanka Pradhancollaborative tagging :-by Er. Priyanka Pradhan
collaborative tagging :-by Er. Priyanka PradhanPriyanka Pradhan
 
Deploying java beans in jsp
Deploying java beans in jspDeploying java beans in jsp
Deploying java beans in jspPriyanka Pradhan
 
SOFTWARE PROCESS MONITORING AND AUDIT
SOFTWARE PROCESS MONITORING AND AUDITSOFTWARE PROCESS MONITORING AND AUDIT
SOFTWARE PROCESS MONITORING AND AUDITPriyanka Pradhan
 
s/w metrics monitoring and control
s/w metrics monitoring and controls/w metrics monitoring and control
s/w metrics monitoring and controlPriyanka Pradhan
 

Plus de Priyanka Pradhan (19)

Tomato disease detection using deep learning convolutional neural network
Tomato disease detection using deep learning convolutional neural networkTomato disease detection using deep learning convolutional neural network
Tomato disease detection using deep learning convolutional neural network
 
Applet
AppletApplet
Applet
 
Servlet
ServletServlet
Servlet
 
Css
CssCss
Css
 
Javascript
JavascriptJavascript
Javascript
 
XML
XMLXML
XML
 
programming with python ppt
programming with python pptprogramming with python ppt
programming with python ppt
 
Core Java
Core JavaCore Java
Core Java
 
GrayBox Testing and Crud Testing By: Er. Priyanka Pradhan
GrayBox Testing and Crud Testing By: Er. Priyanka PradhanGrayBox Testing and Crud Testing By: Er. Priyanka Pradhan
GrayBox Testing and Crud Testing By: Er. Priyanka Pradhan
 
The agile requirements refinery(SRUM) by: Priyanka Pradhan
The agile requirements refinery(SRUM) by: Priyanka PradhanThe agile requirements refinery(SRUM) by: Priyanka Pradhan
The agile requirements refinery(SRUM) by: Priyanka Pradhan
 
Social tagging and its trend
Social tagging and its trendSocial tagging and its trend
Social tagging and its trend
 
Behavioral pattern By:-Priyanka Pradhan
Behavioral pattern By:-Priyanka PradhanBehavioral pattern By:-Priyanka Pradhan
Behavioral pattern By:-Priyanka Pradhan
 
software product and its characteristics
software product and its characteristicssoftware product and its characteristics
software product and its characteristics
 
EDI(ELECTRONIC DATA INTERCHANGE)
EDI(ELECTRONIC DATA INTERCHANGE)EDI(ELECTRONIC DATA INTERCHANGE)
EDI(ELECTRONIC DATA INTERCHANGE)
 
collaborative tagging :-by Er. Priyanka Pradhan
collaborative tagging :-by Er. Priyanka Pradhancollaborative tagging :-by Er. Priyanka Pradhan
collaborative tagging :-by Er. Priyanka Pradhan
 
Deploying java beans in jsp
Deploying java beans in jspDeploying java beans in jsp
Deploying java beans in jsp
 
SOFTWARE PROCESS MONITORING AND AUDIT
SOFTWARE PROCESS MONITORING AND AUDITSOFTWARE PROCESS MONITORING AND AUDIT
SOFTWARE PROCESS MONITORING AND AUDIT
 
Pcmm
PcmmPcmm
Pcmm
 
s/w metrics monitoring and control
s/w metrics monitoring and controls/w metrics monitoring and control
s/w metrics monitoring and control
 

Dernier

Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 

Dernier (20)

Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
Exploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the ProcessExploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the Process
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 

Image Processing Based Signature Recognition and Verification Technique Using Artificial Neural Network approach

  • 1. P R E S E N T E D B Y: P R I YA N K A P R A D H A N M . T E C H ( S E ) R O L L N O . - 1 3 0 1 4 0 9 5 0 7 Image Processing Based Signature Recognition and Verification Technique Using Artificial Neural Network approach UNDER THE GUIDANCE OF: ER. L. S. MAURYA HOD(CS/IT) SRMSCET, BAREILLY.
  • 2. Outline 1. Introduction 1.1 Signature Verification vs. Signature Recognition 1.2 Types of Signature Forgery 2. Problem statement/objective 3. Literature Review 4. Research Methodology 5. Proposed Model 6. Software and Tools Used 7. Expected Result 8. References 9/12/2015Priyanka Pradhan 2
  • 3. Signature has been a distinguishing feature for person identification. When a large number of documents, e.g. bank cheques, have to be authenticated in a limited time, the manual verification of account holders’ signatures is often unrealistic. Signature provides secure means of authentication and authorization. So, there is a need of Automatic Signature Verification and Identification systems. The present dissertation work is done in the field of offline signature verification system by extracting some special features that make a signature difficult to forge. In this dissertation work, existing signature verification systems have been thoroughly studied and a model is designed to develop an offline signature verification system. 1. Introduction 9/12/2015Priyanka Pradhan 3
  • 4. 1.1 Signature Verification vs. Signature Recognition Shalini Davies Signature Verification Signature Recognition 9/12/2015Priyanka Pradhan 4
  • 6. 1.2 Types of Signature Forgery 9/12/2015Priyanka Pradhan 6 Forgeries can be classified into three main categories.  Random forgery: which is written by the person who doesn’t know the shape of original signature.  Simple forgery: which is represented by a signature sample, written by the person who knows the shape of original signature without much practice.  Skilled forgery: represented by a suitable imitation of the genuine signature model (a) Original (b)Random forgery (c)Skilled forgery
  • 7. Contd…. 9/12/2015Priyanka Pradhan 7  FAR (False Acceptance Ratio): It is given by the number of fake signatures accepted by the system with respect to the total number of comparisons made. Calculation of these is show below. Number of forgeries accepted FAR =-------------------------------------- * 100 Number of forgeries tested  FRR (False Rejection Ratio): It is the total number of genuine signatures rejected by the system with respect to the total number of comparisons made. Number of originals rejected FRR = ------------------------------------- * 100 Number of originals tested
  • 8. 2. Problem Statement/Objective The objectives of this dissertation are:  To make sure that only the right people are authorized to access high-security systems  The process of signature verification should be able to detect forgeries  To use cascading of features for the process of feature extraction of signature from the preprocessed scanned image of a signature that will give more accurate results  To cascade and comparison of features 9/12/2015Priyanka Pradhan 8
  • 9. 3. Literature Review 9/12/2015Priyanka Pradhan 9 Base Paper [1]Ali Karounia , Bassam Dayab, Samia Bahlakb,” Offline signature recognition using neural networks approach”. 1877-0509, Published by Elsevier Ltd(Dec. 2011)[8].  In this paper, a method for Offline Verification of signatures is presented using a set of simple shape based geometric features. The features that are used are Area, Center of gravity, Eccentricity, Kurtosis and Skewness. Before extracting the features, preprocessing of a scanned image is necessary to isolate the signature part and to remove any spurious noise present.  The system is initially trained using a database of signatures obtained from those individuals whose signatures have to be authenticated by the system.
  • 10. Contd… 9/12/2015Priyanka Pradhan 10 [2]Nancy Prof. and Gulshan Goyal ,“Signature Processing in Handwritten Bank Cheque Images”. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 2 Issue: 5(May 2015)[2].  The present paper focuses on different steps including browsing a bank cheque, pre-processing, feature extraction, recognition.  Preprocessing stage includes image resizing, noise elimination, thinning etc. On the other hand feature extraction is done on the basis of gray level co- occurrence matrix .  Feature extraction stage includes contrast, homogeneity, energy, entropy, variance, sum average etc.
  • 11. Contd… 9/12/2015Priyanka Pradhan 11 [3] Harpreet Anand and Prof. D.L Bhombe,“Enhanced Signature Verification AndRecognition Using Matlab”, International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163Volume 1 Issue 4 (May 2014)[3].  In this paper offline signature verification using neural network is projected. For authentication of signature, the proposed method is based on geometrical and statistical feature extraction and then the entire database, features are trained using neural network .  The extracted features of investigation signature are compared with the previously trained features of the reference signature.
  • 12. Contd… 9/12/2015Priyanka Pradhan 12 [4]A. Vinoth, V. Sujathabai, “A Pixel Based Signature Authentication System”, International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-2, Issue-6, May 2013[6] .  In this paper, the off-line signatures is verified by taking a boundary of the entire signature and do the pixel comparison.  Signature is acquired using a scanner. Detection process is done after the data acquisition and pre-processing. Pre processing includes noise removal, grey- scale, manipulation, edge detection. Experimental results show that 50% of the accurate matching with the existing one from the data base.
  • 13. Contd… 9/12/2015Priyanka Pradhan 13 [5] Przemysław Kudłacik and Piotr Porwik, A new approach to signature recognition using the fuzzy method. Published online: The Author(s) 2012. This article is published with open access at Springerlink.com (15 August 2012)[7].  The paper presents a new fuzzy approach to off-line handwritten signature recognition. The solution is based on characteristic feature extraction. After finding signature’s center of gravity a number of lines are drawn through it at different angles.  Cross points of generated lines and signature sample, which are further grouped and sorted, are treated as the set of features.
  • 14. 4. Research Methodology Stage 1: The signature acquisition process is executed manually using scanner. Stage 2: The Pre-processing phase. After signature acquisition the sampled data is preceded for the Pre-processing phase. In pre-processing phase the images are refined by applying various operations of Digital Image Processing. Pre-Processing phase will filter the images and convert the RGB image into the gray image and then to Black & White image. The threshold Black & White image will execute the Recognition process in an efficient way. Various Pre-Processing phases will be applying on the sampled data. (b)Preprocessed Signature 9/12/2015Priyanka Pradhan 14 (a)Original Gray Scale Image
  • 15. Contd… 9/12/2015Priyanka Pradhan 15 Stage 3: After pre-processing the sampled scanned signature documents, the segmentation techniques are applied to it. Various methods for segmentation are available, some of them are:  Threshold based segmentation  Edge based segmentation  Region based segmentation  Clustering techniques  Matching Stage 4: The segmented images are then used for the feature extraction phase. Various methods for feature extraction are available, some of them are:  Global Transformation and Series Expansion  Statistical Method  Geometrical and Topological Representation
  • 16. Contd… 9/12/2015Priyanka Pradhan 16 Stage 5: At final stage, the ANN (ARTIFICIAL NEURAL NETWORK) will be used for the classification process. Various methods for classification are available, some of them are:  Hidden Markovs Model  Support Vector Machine  Artificial Neural Network (a)Supervised Learning (b)Unsupervised learning Fig 4.1: Neural network system
  • 17. 5. Proposed Approach 9/12/2015Priyanka Pradhan 17 Fig 5.1:Proposed Model
  • 18. 6. Software and Tools Used  The sampled signatures are scanned through a normal optical scanner.  For morphological operations image processing tool in MATLAB is used.  For training the neural network, a toolbox called nntool in MATLAB will be used. 9/12/2015Priyanka Pradhan 18
  • 19. 7. Expected Results  The motive of this dissertation is to design an offline signature recognition system.  The motive is to verify offline scanned signature.  The accuracy of signature recognition is targeted to > 98%. 9/12/2015Priyanka Pradhan 19
  • 20. 8. References [1] Shefali Singla and Deepinder Kaur. Signature Verification Using DTI and Guided DTI Classifiers and Digital Encryption. International Journal of Advanced Research in Computer Science and Software Engineering. Volume 5 Issue 4 ISSN: 2277 128X (May 2015). [2] Nancy Prof. and Gulshan Goyal . Signature Processing in Handwritten Bank Cheque Images. International Journal on Recent and Innovation Trends in Computing and Communication. ISSN: 2321-8169 Volume: 2 Issue: 5(May 2015). [3] Harpreet Anand and Prof. D.L Bhombe. Enhanced Signature Verification AndRecognition Using Matlab. International Journal of Innovative Research in Advanced Engineering (IJIRAE). ISSN: 2349-2163 Volume 1 Issue: 4 (May 2014) [4] Sheena, Sheena Mathew. A Study of Multimodal Biometric System. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308. Volume: 03 Special Issue: 15 | IWCPS-2014 | (Dec-2014). 9/12/2015Priyanka Pradhan 20
  • 21. Contd… [5] Harpreet Anand and Prof. D.L Bhombe. Enhanced Signature Verification And Recognition Using Matlab. International Journal of Innovative Dissertation in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Volume 1 Issue 4 (May 2014). [6] A. Vinoth, V. Sujathabai. A Pixel Based Signature Authentication System. International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075 Volume-2 Issue-6 (May 2013). [7] Przemysław Kudłacik and Piotr Porwik, A new approach to signature recognition using the fuzzy method. Published online: This article is published with open access at Springerlink.com (15 August 2012). [8] Ali Karounia , Bassam Dayab, Samia Bahlakb. Offline signature recognition using neural networks approach. 1877-0509 Published by Elsevier Ltd(Dec. 2011). 9/12/2015Priyanka Pradhan 21

Notes de l'éditeur

  1. the classifiers are used for mapping the features of training set to a group of feature vector of training set. There are various approaches which can be used for the classification phase