SlideShare une entreprise Scribd logo
1  sur  26
Signature Verification using
Grid based feature extraction
                                       Aniket Sahasrabuddhe
                                                    Anurag
  D. Y. Patil College Of Engineering              Shashank
  Akurdi, Pune                             Sushant Saurav
Presentation Agenda

  Introduction
  Existingtechniques
  Proposed work
  Algorithms
  Mathematical model
  Advantages & disadvantages
  Conclusion
Introduction

  Computers     are largely used in almost each and
  every field.

  Thesecurity measures to be used must be
  cheap, reliable and un-intrusive to the
  authorized person.
Importance of Signature

  Transaction


  Individuals   less likely to object

  Biometric
Types of signature Identification

  Offline   Signature Verification
      deals with shape only

  Online    signature Verification
      deals with dynamic features like speed, pen
       pressure, directions, stroke length, and when the
       pen is lifted from the paper
Existing systems and limitations
 UsingVariable Length Segmentation and
  Hidden Markov Models
 New extreme points warping technique
 Wavelet Transform Based Global Features


  •   Percentage of error occurrence is high
  •   It has heavy computational load
  •   Optimal performance not guaranteed
Challenging tasks
  Differentiating between the parts of the signature
   that vary with each signing.

  The signature can vary substantially over an
   individual’s lifetime.
Proposed Work
    Signature Acquisition
    Signature Pre-processing
    Feature Extraction
    Signature Verification




                         Fig 1 System Architecture
Signature Acquisition

  Signature   is acquired from the user.




                 Fig.2 Sample Signatures
Signature Pre-processing

 Function of the preprocessor
 Image resizing
 Image binarizing
 Image thinning
 Image normalizing
Feature Extraction



        Fig.3 Grid over pre-processed signature image




        Fig.4 Matrix corresponding to the above grid
Signature Verification




              Fig.5 Signature Verification
Applications

  Banking,


  Passport   office,

  And  any other places which require
   identification !
Advantages

  Low   error rate.
  Forgery is detected even when the forger has
   managed to get a copy of the authentic
   signature.
  Fast and simple training.
  Cheap hardware.
  Little storage requirements.
Use Case Diagram
Class Diagram
Activity Diagram
Component Diagram
Sequence Diagram
Collaboration Diagram
State Diagram
Requirements & Technologies

 The hardware component we are using here is a scanning
 device(WEBCAM), high RAM for better results and good
 processor.

    •   Operating System: Windows XP or Higher
    •   NetBeans IDE 7.0
    •   SDK - J2SE
    •   Intel core 2 duo processor
    •   2.1 GHZ, 1 GB RAM
Conclusion
  The  pre-processed signature i.e. resized, binarized,
   thinned and rotation normalized signature is
   segmented into grid of size 10x20 cells where each
   cell is having 100 pixels.
  The system does not need any special hardware like
   tablet, fingerprint verification or iris scanning
   systems.
  It requires only low cost webcams
  The database used for the verification will not be
   large.
References
    Muhammed Nauman Sajid “Vital Sign: Personal Signature based Biometric
     Authentication System”, Bs degree thesis, Pakistan Institute of Engineering and
     Applied sciences, sept 2009.
    K. Yasuda, D. Muramatsu, and T. Matsumoto, “Visual-based online signature
     verification by pen tip tracking”, Proc. CIMCA 2008, 2008, pp. 175–180.
    D.Muramatsu, M. Kondo, M. Sasaki, S. Tachibana, and T. Matsumoto. “A
     markov chain monte carlo algorithm for bayesian dynamic signature
     verification”. IEEE Transactionson Information Forensics and Security,
     1(1):22–34, March,2006.
    Satoshi Shirato, D. Muramatsu, and T. Matsumoto, “camera-based online
     signature verification: Effects of camera positions.” World Automation
     congress2010 TSI press.
    D. Muramatsu, K. Yasuda, S. Shirato, and T. Matsumoto. “Visual-based online
     signature verification using features extracted from video”, Journal of Network
     and Computer Applications Volume 33, Issue 3, May 2010, Pages 333-341.
Cont.
    M. E. Munich and P. Perona. “Visual identification by signature tracking.”
     IEEE Trans. Pattern Analysis and MachineIntelligence, 25(2):200–217,
     February 2003.
    F.A.Afsar, M. Arif and U. Farrukh, “Wavelet Transform Based Global Features
     for Online Signature Recognition”, Proceeding of IEEE International Multi-
     topic Conference INMIC, pp. 1-6 Dec. 2005.
    Charles E. Pippin, “Dynamic Signature Verification using Local and Global
     Features”, Georgia Institute of Technology, July 2004.
    Hao Feng and Chan Choong Wah, “Online Signature Verification Using New
     Extreme Points Warping Technique”, Pattern Recognition Letters, vol. 24, pp.
     2943-2951, Dec. 2003.
    F.A. Afsar, M. Arif and U. Farrukh, “Wavelet Transform Based Global Features
     for Online Signature Recognition”, Proceeding of IEEE International Multi-
     topic Conference INMIC, pp. 1-6 Dec. 2005.
Thank You

Contenu connexe

Tendances

Tendances (20)

Handwritten character recognition using artificial neural network
Handwritten character recognition using artificial neural networkHandwritten character recognition using artificial neural network
Handwritten character recognition using artificial neural network
 
Currency recognition system using image processing
Currency recognition system using image processingCurrency recognition system using image processing
Currency recognition system using image processing
 
E cash payment
E cash paymentE cash payment
E cash payment
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPT
 
Signature verification in biometrics
Signature verification in biometricsSignature verification in biometrics
Signature verification in biometrics
 
High protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyHigh protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technology
 
Credit card fraud detection pptx (1) (1)
Credit card fraud detection pptx (1) (1)Credit card fraud detection pptx (1) (1)
Credit card fraud detection pptx (1) (1)
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprint
 
Money pad ppt
Money pad pptMoney pad ppt
Money pad ppt
 
Computer science seminar topics
Computer science seminar topicsComputer science seminar topics
Computer science seminar topics
 
captcha.ppt
 captcha.ppt captcha.ppt
captcha.ppt
 
Virtual Mouse using hand gesture recognition
Virtual Mouse using hand gesture recognitionVirtual Mouse using hand gesture recognition
Virtual Mouse using hand gesture recognition
 
Fake Currency detction Using Image Processing
Fake Currency detction Using Image ProcessingFake Currency detction Using Image Processing
Fake Currency detction Using Image Processing
 
Optical character recognition IEEE Paper Study
Optical character recognition IEEE Paper StudyOptical character recognition IEEE Paper Study
Optical character recognition IEEE Paper Study
 
Hand Gesture Recognition using Image Processing
Hand Gesture Recognition using Image ProcessingHand Gesture Recognition using Image Processing
Hand Gesture Recognition using Image Processing
 
Offline signature verification based on geometric feature extraction using ar...
Offline signature verification based on geometric feature extraction using ar...Offline signature verification based on geometric feature extraction using ar...
Offline signature verification based on geometric feature extraction using ar...
 
Ppt on online voting
Ppt on online votingPpt on online voting
Ppt on online voting
 
Bio atm with-microsoft_finger_print_sdk
Bio atm with-microsoft_finger_print_sdkBio atm with-microsoft_finger_print_sdk
Bio atm with-microsoft_finger_print_sdk
 
Fingerprint Authentication for ATM
Fingerprint Authentication for ATMFingerprint Authentication for ATM
Fingerprint Authentication for ATM
 

En vedette

Offline Handwritten Signature Identification and Verification using Multi-Res...
Offline Handwritten Signature Identification and Verification using Multi-Res...Offline Handwritten Signature Identification and Verification using Multi-Res...
Offline Handwritten Signature Identification and Verification using Multi-Res...
CSCJournals
 
Home automation
Home automationHome automation
Home automation
ahmkashwa
 
Online voting system project
Online voting system projectOnline voting system project
Online voting system project
snauriyal1994
 

En vedette (20)

Off-line Signature Verification
Off-line Signature VerificationOff-line Signature Verification
Off-line Signature Verification
 
Home appliances control system
Home appliances control systemHome appliances control system
Home appliances control system
 
An offline signature recognition and verification system based on neural network
An offline signature recognition and verification system based on neural networkAn offline signature recognition and verification system based on neural network
An offline signature recognition and verification system based on neural network
 
Offline Handwritten Signature Identification and Verification using Multi-Res...
Offline Handwritten Signature Identification and Verification using Multi-Res...Offline Handwritten Signature Identification and Verification using Multi-Res...
Offline Handwritten Signature Identification and Verification using Multi-Res...
 
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHODFORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
 
Digital image forgery detection
Digital image forgery detectionDigital image forgery detection
Digital image forgery detection
 
Image forgery and security
Image forgery and securityImage forgery and security
Image forgery and security
 
Full biometric eye tracking
Full biometric eye trackingFull biometric eye tracking
Full biometric eye tracking
 
finger prints
finger printsfinger prints
finger prints
 
Embedded System Design for Iris Recognition System.
Embedded System Design for Iris Recognition System.Embedded System Design for Iris Recognition System.
Embedded System Design for Iris Recognition System.
 
Image Processing Based Signature Recognition and Verification Technique Using...
Image Processing Based Signature Recognition and Verification Technique Using...Image Processing Based Signature Recognition and Verification Technique Using...
Image Processing Based Signature Recognition and Verification Technique Using...
 
Home automation
Home automationHome automation
Home automation
 
Fingerprint based transaction system
Fingerprint based transaction systemFingerprint based transaction system
Fingerprint based transaction system
 
Biometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febBiometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 feb
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniques
 
Online voting system project
Online voting system projectOnline voting system project
Online voting system project
 
Online property management system design document
Online property management system design documentOnline property management system design document
Online property management system design document
 
Electronic banking presentation
Electronic banking presentationElectronic banking presentation
Electronic banking presentation
 
Internet Banking
Internet BankingInternet Banking
Internet Banking
 
E banking
E bankingE banking
E banking
 

Similaire à Sign verification

Vehicle Number Plate Recognition System
Vehicle Number Plate Recognition SystemVehicle Number Plate Recognition System
Vehicle Number Plate Recognition System
prashantdahake
 
Implementation of Biometric Based Electoral Fraud Desisting System
Implementation of Biometric Based Electoral Fraud Desisting SystemImplementation of Biometric Based Electoral Fraud Desisting System
Implementation of Biometric Based Electoral Fraud Desisting System
Associate Professor in VSB Coimbatore
 

Similaire à Sign verification (20)

OSPCV: Off-line Signature Verification using Principal Component Variances
OSPCV: Off-line Signature Verification using Principal Component VariancesOSPCV: Off-line Signature Verification using Principal Component Variances
OSPCV: Off-line Signature Verification using Principal Component Variances
 
B017150823
B017150823B017150823
B017150823
 
Artificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification SystemArtificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification System
 
IRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNNIRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNN
 
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
 
IJSRED-V2I2P33
IJSRED-V2I2P33IJSRED-V2I2P33
IJSRED-V2I2P33
 
A Fusion of Statistical Distance and Signature Length Based Approach for Offl...
A Fusion of Statistical Distance and Signature Length Based Approach for Offl...A Fusion of Statistical Distance and Signature Length Based Approach for Offl...
A Fusion of Statistical Distance and Signature Length Based Approach for Offl...
 
Signature Verification.pptx
Signature Verification.pptxSignature Verification.pptx
Signature Verification.pptx
 
Pattern recognition on line signature
Pattern recognition on line signaturePattern recognition on line signature
Pattern recognition on line signature
 
Distance Based Verification Technique for Online Signature System
Distance Based Verification Technique for Online Signature SystemDistance Based Verification Technique for Online Signature System
Distance Based Verification Technique for Online Signature System
 
Choudhary2015
Choudhary2015Choudhary2015
Choudhary2015
 
3 d
3 d3 d
3 d
 
Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...
 
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
 
Vehicle Number Plate Recognition System
Vehicle Number Plate Recognition SystemVehicle Number Plate Recognition System
Vehicle Number Plate Recognition System
 
FINGERPRINT BASED LOCKER WITH IMAGE CAPTURE
FINGERPRINT BASED LOCKER WITH IMAGE CAPTUREFINGERPRINT BASED LOCKER WITH IMAGE CAPTURE
FINGERPRINT BASED LOCKER WITH IMAGE CAPTURE
 
Offline Handwritten Signature Verification using Neural Network
Offline Handwritten Signature Verification using Neural NetworkOffline Handwritten Signature Verification using Neural Network
Offline Handwritten Signature Verification using Neural Network
 
Implementation of Biometric Based Electoral Fraud Desisting System
Implementation of Biometric Based Electoral Fraud Desisting SystemImplementation of Biometric Based Electoral Fraud Desisting System
Implementation of Biometric Based Electoral Fraud Desisting System
 
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 

Sign verification

  • 1. Signature Verification using Grid based feature extraction Aniket Sahasrabuddhe Anurag D. Y. Patil College Of Engineering Shashank Akurdi, Pune Sushant Saurav
  • 2. Presentation Agenda  Introduction  Existingtechniques  Proposed work  Algorithms  Mathematical model  Advantages & disadvantages  Conclusion
  • 3. Introduction  Computers are largely used in almost each and every field.  Thesecurity measures to be used must be cheap, reliable and un-intrusive to the authorized person.
  • 4. Importance of Signature  Transaction  Individuals less likely to object  Biometric
  • 5. Types of signature Identification  Offline Signature Verification  deals with shape only  Online signature Verification  deals with dynamic features like speed, pen pressure, directions, stroke length, and when the pen is lifted from the paper
  • 6. Existing systems and limitations  UsingVariable Length Segmentation and Hidden Markov Models  New extreme points warping technique  Wavelet Transform Based Global Features • Percentage of error occurrence is high • It has heavy computational load • Optimal performance not guaranteed
  • 7. Challenging tasks  Differentiating between the parts of the signature that vary with each signing.  The signature can vary substantially over an individual’s lifetime.
  • 8. Proposed Work  Signature Acquisition  Signature Pre-processing  Feature Extraction  Signature Verification Fig 1 System Architecture
  • 9. Signature Acquisition  Signature is acquired from the user. Fig.2 Sample Signatures
  • 10. Signature Pre-processing Function of the preprocessor Image resizing Image binarizing Image thinning Image normalizing
  • 11. Feature Extraction Fig.3 Grid over pre-processed signature image Fig.4 Matrix corresponding to the above grid
  • 12. Signature Verification Fig.5 Signature Verification
  • 13. Applications  Banking,  Passport office,  And any other places which require identification !
  • 14. Advantages  Low error rate.  Forgery is detected even when the forger has managed to get a copy of the authentic signature.  Fast and simple training.  Cheap hardware.  Little storage requirements.
  • 22. Requirements & Technologies The hardware component we are using here is a scanning device(WEBCAM), high RAM for better results and good processor. • Operating System: Windows XP or Higher • NetBeans IDE 7.0 • SDK - J2SE • Intel core 2 duo processor • 2.1 GHZ, 1 GB RAM
  • 23. Conclusion  The pre-processed signature i.e. resized, binarized, thinned and rotation normalized signature is segmented into grid of size 10x20 cells where each cell is having 100 pixels.  The system does not need any special hardware like tablet, fingerprint verification or iris scanning systems.  It requires only low cost webcams  The database used for the verification will not be large.
  • 24. References  Muhammed Nauman Sajid “Vital Sign: Personal Signature based Biometric Authentication System”, Bs degree thesis, Pakistan Institute of Engineering and Applied sciences, sept 2009.  K. Yasuda, D. Muramatsu, and T. Matsumoto, “Visual-based online signature verification by pen tip tracking”, Proc. CIMCA 2008, 2008, pp. 175–180.  D.Muramatsu, M. Kondo, M. Sasaki, S. Tachibana, and T. Matsumoto. “A markov chain monte carlo algorithm for bayesian dynamic signature verification”. IEEE Transactionson Information Forensics and Security, 1(1):22–34, March,2006.  Satoshi Shirato, D. Muramatsu, and T. Matsumoto, “camera-based online signature verification: Effects of camera positions.” World Automation congress2010 TSI press.  D. Muramatsu, K. Yasuda, S. Shirato, and T. Matsumoto. “Visual-based online signature verification using features extracted from video”, Journal of Network and Computer Applications Volume 33, Issue 3, May 2010, Pages 333-341.
  • 25. Cont.  M. E. Munich and P. Perona. “Visual identification by signature tracking.” IEEE Trans. Pattern Analysis and MachineIntelligence, 25(2):200–217, February 2003.  F.A.Afsar, M. Arif and U. Farrukh, “Wavelet Transform Based Global Features for Online Signature Recognition”, Proceeding of IEEE International Multi- topic Conference INMIC, pp. 1-6 Dec. 2005.  Charles E. Pippin, “Dynamic Signature Verification using Local and Global Features”, Georgia Institute of Technology, July 2004.  Hao Feng and Chan Choong Wah, “Online Signature Verification Using New Extreme Points Warping Technique”, Pattern Recognition Letters, vol. 24, pp. 2943-2951, Dec. 2003.  F.A. Afsar, M. Arif and U. Farrukh, “Wavelet Transform Based Global Features for Online Signature Recognition”, Proceeding of IEEE International Multi- topic Conference INMIC, pp. 1-6 Dec. 2005.