SlideShare une entreprise Scribd logo
1  sur  40
Presented By
Vijayalakshmi.S.L
Under the Guidance of
Mrs.Smita Gour
Department of Computer Science
& Engineering
Basaveshwar Engineering College
Bagalkot
Contents
 Introduction
 Literature Survey
 Problem Definition
 Proposed Methodology
 Experimentations
 Conclusion and future work
References
Introduction
 Nowadays, person identification (recognition) and verification is
very important in security and resource access control.
 Biometrics is the science of automatic recognition of individual
depending on their physiological and behavioral attributes.
 For centuries, handwritten signatures have been an integral part of
validating business transaction contracts and agreements.
 Among the different forms of biometric recognition systems such as
fingerprint, iris, face, voice, palm etc., signature will be most widely
used.
Signature Recognition
 Signature Recognition is the procedure of determining to whom a
particular signature belongs to.
 Depending on acquiring of signature images, there are two types of
signature recognition systems:
 Online Signature Recognition
 Offline Signature Recognition
Literature Survey
1. Offline Handwritten Signature Recognition(Gulzar A.
Khuwaja and Mohammad S. Laghari)
 Biometrics, which refers to identifying an individual based on
his or her physiological or behavioral characteristics, has the
capability to reliably distinguish between an authorized person
and an imposter.
 This paper presents a neural network based recognition of
offline handwritten signatures system that is trained with low-
resolution scanned signature images.
2. Off-line Signature Verification Based on Fusion of Grid
and Global Features Using Neural Networks(Shashi Kumar
D R and K B Raja)
 In this paper Off-line Signature Verification Based on Fusion of
Grid and Global Features using Neural Network(SVFGNN) is
presented.
 The global and grid features are fused to generate set of
features for the verification of signature.
3. DWT based Off-line Signature Verification using Angular
Features (Prashanth C R )
 This papers presents DWT based Off-line Signature
Verification using Angular Features (DOSVAF).
 The signature is resized and Discrete Wavelet Transform
(DWT) is applied on the blocks to extract the features.
4. Off-Line Signature Recognition Systems(V A Bharadi)
 Handwritten signature is one of the most widely used biometric
traits for authentication of person as well as document.
 In this paper we discuss issues regarding off-line signature
recognitions.
 The performance metrics of typical systems are compared
along with their feature extraction mechanisms.
5. Offline Signature Recognition and Verification Based on
Artificial Neural Network(Mohammed A. Abdala)
 In this paper, a problem for Offline Signature Recognition and
Verification is presented.
 A system is designed based on two neural networks classifier
and two powerful features (global and grid features).
 The designed system consist of three stages which is pre-
processing, feature extraction and neural network stage.
6. Signature Recognition & Verification System Using Back
Propagation Neural Network (Nilesh Y. Choudhary, Dr.
Umesh. Bhadade)
 In this paper, off-line signature recognition & verification using
back propagation neural network is proposed which is based
on steps of image processing, invariant central moment &
some global properties and back propagation neural
networks.
Problem Definition
Signature Recognition is the procedure of determining to whom a
particular signature belongs to. In this work, the global and grid
features are combined and used to differentiate among the signature
images. These combined features are given to Back Propagation
Neural Network(BPNN) to train it, so that particular signature image
is recognized.
Proposed Model
Block Diagram of Signature Recognition
Image Acquisition :
 Collection of signatures from 50 persons on blank paper.
 The collected signatures are scanned to get images in JPG
format to create database.
Pre-Processing :
Image pre-processing is a technique to enhance raw images
received from cameras/sensors placed on satellites, space
probes and aircrafts or pictures taken in normal day-to-day life
for various applications.
The techniques for preprocessing used are
 RGB to Gray Scale Conversion
 Binarization
 Thinning
 Bounding Box
 RGB to Gray-Scale Convertion
 Binarization
RGB Image
Gray-Scale Image
Gray-Scale Image Binarized Image
 Thinning
 Bounding Box
Binarized Image Thinned Image
Thinned Image Bounded Image
Feature Extraction
Features are the characters to be extracted from the processed
image.
It has used two feature techniques
 Global Features
 Grid Features
Global Features
 Height :
 Width :
 Number of Black Pixels :
 Centroid of the signature :
Width
Height
Grid Features
 The cropped image is divided into 9 rectangular segments i.e.
(3 Χ 3) blocks.
3*3 Blocks of Grid Image
DWT(Discrete Wavelet Transform)
 DWT applied on 1st block. Each block contributes
horizontal, vertical and diagonal components.
1st Block Horizontal Vertical Diagonal
 After applying DWT to all 9 blocks, each block is divided into
horizontal, vertical and diagonal components. From each
components two features mainly horizontal and vertical
projection positions are extracted. Total 54 (9 x 3 x 2) features
are extracted.
Grid features extracted from each block are
 Horizontal Projection Position:
 Vertical Projection Position:
Total 54 features extracted by 9 blocks
Classification
 What is Neural Network..?
 Why Neural Network..?
 What is Back Propagation Neural Network(BPNN)…?
BPNN Architecture
Architecture of Back Propagation Neural Network
Training of BPNN
This involves developing a suitable neural network model
(BPNN). Then the extracted features are presented to
BPNN, which recognizes the different types of signature images.
The training takes place such that the neural network learns that
each entry in the input file has a corresponding entry in the output
file.
Run Snapshot of BPNN
Algorithm for Training phase
Description: Retrieval of a signature image from a database
Input: Training sample images.
Output: Construction of Back Propagation Neural Network.
Begin
Read the training samples images
Step1: Pre-processing
 Convert the image into gray scale image.
 Convert the gray scale image into binary image.
 Apply thinning process.
 Apply bounding box.
Step 2: Features Extracted.
Step 3: Back propagation neural network training.
end // end of proposed algorithm
Testing using Trained BPNN
In testing, input image from testing set is selected and its
features are extracted and given them to the trained model, the
trained BPNN model classifies given sample and produces
output as type of signature and corresponding pattern
Classification accuracy= Number of recognized signatures
Total number of testing signatures
Output Pattern for Recognition
Experimental Results
Experiment 1
The features extracted are listed as:
 Height of the signature
 Width of the signature
 Centroid of X-axis and Y-axis
 Number of black pixels of the signature
 The image is divided into 9 blocks and DWT is applied to each
block. Energy values of each block were extracted as a feature.
10
20
30
40
50
60
70
80
90
100
10 20 30 40 50
83.46 81 78.28 76.7 74
Performance Rate
Performance Rate
No of Persons
Performance Rate of 1st Experiment
Experiment 2
The features are extracted as listed below:
 Height of the signature
 Width of the signature
 Centroid of X-axis and Y-axis
 Number of black pixels of the signature
 The image is divided into 9 blocks and DWT is applied to each
block. From each block two features, horizontal and vertical
projection positions of horizontal, vertical and diagonal
components are extracted
10
20
30
40
50
60
70
80
90
100
10 20 30 40 50
93.33 92.91 91.38 90 89.47
Performance Rate
Performance Rate
No of Persons
Performance Rate of 2nd Experiment
No. of Persons Experiment 1 Experiment 2
10 83.46 % 93.33 %
20 81 % 92.91 %
30 78.28 % 91.38 %
40 76.7 % 90 %
50 74 % 89.47 %
Performance Rate
The performance rate of the two experiments
Conclusion
The objective of signature recognition is to recognize the signer
for the purpose of recognition. It has been observed that the
global and grid features extracted using discrete wavelet
transform are found to be efficient for offline signature
recognition. The combination of discrete wavelet transform and
back propagation neural network has given expected results. It
achieved the accuracy rate ranging from 93%-89% for enrollment
of 10 to 50 persons.
Future Work
The signature recognition can also be changed by changing the
features that can be extracted from a signature. So, the future
work of the recognition of signature can be done with the same
Neural Network methods but using different signature features
and compares the results with results of the present project.
References
 Gulzar A. Khuwaja and Mohammad S. Laghari, World Academy of
Science, Engineering and Technology , “Offline Handwritten Signature
Recognition”, 2011
 Shashi Kumar D R, K B Raja, R. K Chhotaray, Sabyasachi Pattanaik, “Off-line
Signature Verification Based on Fusion of Grid and Global Features Using
Neural Networks”, 2010
 Prashanth C R , K B Raja, Venugopal K R, L M Patnaik, “DWT based Off-line
Signature Verification using Angular Features”, 2012
 V A Bharadi, H B Kekre, “Off-Line Signature Recognition Systems”, 2010
 Mohammed A. Abdala & Noor Ayad Yousif, “Offline Signature Recognition and
Verification Based on Artificial Neural Network”, 2008
 H. Baltzakis, N. Papamarkos, “A New Signature Verification Technique Based On
A Two-Stage Neural Network Classifier”, 2001
 Khamael Abbas Al-Dulaimi, “Handwritten Signature Verification Technique
based on Extract Features”, 2011
 Hemanta Saikia, Kanak Chandra Sarma, “Approaches and Issues in Offline
Signature Verification System”, 2012
 Vu Nguyen, Michael Blumenstein, Graham Leedham, “Global Features for the
Off-Line Signature Verification Problem”, 2009
 Meenakshi S Arya, Vandana S Inamdar, “A Preliminary Study on Various Off-line
Hand Written Signature Verification Approaches”, 2010
 Javed Ahmed Mahar, Prof. Dr. Mumtaz Hussain Mahar, Muhammad Khalid
Khan, “Comparative Study of Feature Extraction Methods with K-NN for Off-
Line Signature Verification”, 2006
 Nilesh Y. Choudhary, Mrs. Rupal Patil, Dr. Umesh. Bhadade, Prof. Bhupendra M
Chaudhari,“Signature Recognition & Verification System Using Back
Propagation Neural Network”, 2013
 Manoj Kumar, “Signature Verification Using Neural Network”, 2012
 Paigwar Shikha and Shukla Shailja,“Neural Network Based Offline Signature
Recognition and Verification System”, 2013
 Srikanta Pal, Michael Blumenstein, Umapada Pal, “Off-Line Signature
Verification Systems: A Survey”, 2011
Thank You

Contenu connexe

Tendances

Fraud Detection Using Signature Recognition
Fraud Detection Using Signature RecognitionFraud Detection Using Signature Recognition
Fraud Detection Using Signature RecognitionTejraj Thakor
 
Off-line Signature Verification
Off-line Signature VerificationOff-line Signature Verification
Off-line Signature Verificationlemon_au
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingAnkush Kr
 
Handwritten Signature Verification using Artificial Neural Network
Handwritten Signature Verification using Artificial Neural NetworkHandwritten Signature Verification using Artificial Neural Network
Handwritten Signature Verification using Artificial Neural NetworkEditor IJMTER
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognitionsunjaysahu
 
How fingerprint technology work
How fingerprint technology workHow fingerprint technology work
How fingerprint technology workAlisha Korpal
 
Hand geometry recognition
Hand geometry recognitionHand geometry recognition
Hand geometry recognitionDheerendra k
 
Fingerprint recognition presentation
Fingerprint recognition presentationFingerprint recognition presentation
Fingerprint recognition presentationVivek Kumar
 
Face detection presentation slide
Face detection  presentation slideFace detection  presentation slide
Face detection presentation slideSanjoy Dutta
 
Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionNikyaa7
 
Counterfeit Currency Detection
Counterfeit Currency DetectionCounterfeit Currency Detection
Counterfeit Currency Detectionijtsrd
 
Presentation Fingervein Authentication
Presentation Fingervein AuthenticationPresentation Fingervein Authentication
Presentation Fingervein AuthenticationANEESH SASIDHARAN
 
Face detection ppt
Face detection pptFace detection ppt
Face detection pptPooja R
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniquesSubhash Basistha
 
Face recognition Face Identification
Face recognition Face IdentificationFace recognition Face Identification
Face recognition Face IdentificationKalyan Acharjya
 

Tendances (20)

Fraud Detection Using Signature Recognition
Fraud Detection Using Signature RecognitionFraud Detection Using Signature Recognition
Fraud Detection Using Signature Recognition
 
Off-line Signature Verification
Off-line Signature VerificationOff-line Signature Verification
Off-line Signature Verification
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Handwritten Signature Verification using Artificial Neural Network
Handwritten Signature Verification using Artificial Neural NetworkHandwritten Signature Verification using Artificial Neural Network
Handwritten Signature Verification using Artificial Neural Network
 
face recognition
face recognitionface recognition
face recognition
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognition
 
How fingerprint technology work
How fingerprint technology workHow fingerprint technology work
How fingerprint technology work
 
Hand geometry recognition
Hand geometry recognitionHand geometry recognition
Hand geometry recognition
 
Fingerprint recognition presentation
Fingerprint recognition presentationFingerprint recognition presentation
Fingerprint recognition presentation
 
Offline Signature Verification and Recognition using Neural Network
Offline Signature Verification and Recognition using Neural NetworkOffline Signature Verification and Recognition using Neural Network
Offline Signature Verification and Recognition using Neural Network
 
Face detection presentation slide
Face detection  presentation slideFace detection  presentation slide
Face detection presentation slide
 
Iris recognition
Iris recognition Iris recognition
Iris recognition
 
Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial Recognition
 
Counterfeit Currency Detection
Counterfeit Currency DetectionCounterfeit Currency Detection
Counterfeit Currency Detection
 
Gabor Filter
Gabor FilterGabor Filter
Gabor Filter
 
Presentation Fingervein Authentication
Presentation Fingervein AuthenticationPresentation Fingervein Authentication
Presentation Fingervein Authentication
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Face detection ppt
Face detection pptFace detection ppt
Face detection ppt
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniques
 
Face recognition Face Identification
Face recognition Face IdentificationFace recognition Face Identification
Face recognition Face Identification
 

Similaire à Signature recognition

Biometric Signature Recognization
 Biometric Signature Recognization Biometric Signature Recognization
Biometric Signature RecognizationFaimin Khan
 
An offline signature recognition and verification system based on neural network
An offline signature recognition and verification system based on neural networkAn offline signature recognition and verification system based on neural network
An offline signature recognition and verification system based on neural networkeSAT Journals
 
journal paper publication
journal paper publicationjournal paper publication
journal paper publicationrikaseorika
 
Offline Handwritten Signature Verification using Neural Network
Offline Handwritten Signature Verification using Neural NetworkOffline Handwritten Signature Verification using Neural Network
Offline Handwritten Signature Verification using Neural Networkijiert bestjournal
 
A Review on Geometrical Analysis in Character Recognition
A Review on Geometrical Analysis in Character RecognitionA Review on Geometrical Analysis in Character Recognition
A Review on Geometrical Analysis in Character Recognitioniosrjce
 
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEMRELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEMAM Publications
 
Automatic signature verification with chain code using weighted distance and ...
Automatic signature verification with chain code using weighted distance and ...Automatic signature verification with chain code using weighted distance and ...
Automatic signature verification with chain code using weighted distance and ...eSAT Journals
 
Multimodal Biometrics at Feature Level Fusion using Texture Features
Multimodal Biometrics at Feature Level Fusion using Texture FeaturesMultimodal Biometrics at Feature Level Fusion using Texture Features
Multimodal Biometrics at Feature Level Fusion using Texture FeaturesCSCJournals
 
Feature Level Fusion Based Bimodal Biometric Using Transformation Domine Tec...
Feature Level Fusion Based Bimodal Biometric Using  Transformation Domine Tec...Feature Level Fusion Based Bimodal Biometric Using  Transformation Domine Tec...
Feature Level Fusion Based Bimodal Biometric Using Transformation Domine Tec...IOSR Journals
 
Offline Signature Recognition and It’s Forgery Detection using Machine Learni...
Offline Signature Recognition and It’s Forgery Detection using Machine Learni...Offline Signature Recognition and It’s Forgery Detection using Machine Learni...
Offline Signature Recognition and It’s Forgery Detection using Machine Learni...AI Publications
 
A Simple Signature Recognition System
A Simple Signature Recognition System A Simple Signature Recognition System
A Simple Signature Recognition System iosrjce
 
OSPCV: Off-line Signature Verification using Principal Component Variances
OSPCV: Off-line Signature Verification using Principal Component VariancesOSPCV: Off-line Signature Verification using Principal Component Variances
OSPCV: Off-line Signature Verification using Principal Component VariancesIOSR Journals
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
An offline signature verification using pixels intensity levels
An offline signature verification using pixels intensity levelsAn offline signature verification using pixels intensity levels
An offline signature verification using pixels intensity levelsSalam Shah
 

Similaire à Signature recognition (20)

Biometric Signature Recognization
 Biometric Signature Recognization Biometric Signature Recognization
Biometric Signature Recognization
 
An offline signature recognition and verification system based on neural network
An offline signature recognition and verification system based on neural networkAn offline signature recognition and verification system based on neural network
An offline signature recognition and verification system based on neural network
 
journal paper publication
journal paper publicationjournal paper publication
journal paper publication
 
Artificial Neural Network Based Offline Signature Recognition System Using Lo...
Artificial Neural Network Based Offline Signature Recognition System Using Lo...Artificial Neural Network Based Offline Signature Recognition System Using Lo...
Artificial Neural Network Based Offline Signature Recognition System Using Lo...
 
Offline Handwritten Signature Verification using Neural Network
Offline Handwritten Signature Verification using Neural NetworkOffline Handwritten Signature Verification using Neural Network
Offline Handwritten Signature Verification using Neural Network
 
I017256165
I017256165I017256165
I017256165
 
A Review on Geometrical Analysis in Character Recognition
A Review on Geometrical Analysis in Character RecognitionA Review on Geometrical Analysis in Character Recognition
A Review on Geometrical Analysis in Character Recognition
 
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEMRELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
 
Automatic signature verification with chain code using weighted distance and ...
Automatic signature verification with chain code using weighted distance and ...Automatic signature verification with chain code using weighted distance and ...
Automatic signature verification with chain code using weighted distance and ...
 
Multimodal Biometrics at Feature Level Fusion using Texture Features
Multimodal Biometrics at Feature Level Fusion using Texture FeaturesMultimodal Biometrics at Feature Level Fusion using Texture Features
Multimodal Biometrics at Feature Level Fusion using Texture Features
 
Feature Level Fusion Based Bimodal Biometric Using Transformation Domine Tec...
Feature Level Fusion Based Bimodal Biometric Using  Transformation Domine Tec...Feature Level Fusion Based Bimodal Biometric Using  Transformation Domine Tec...
Feature Level Fusion Based Bimodal Biometric Using Transformation Domine Tec...
 
Offline Signature Recognition and It’s Forgery Detection using Machine Learni...
Offline Signature Recognition and It’s Forgery Detection using Machine Learni...Offline Signature Recognition and It’s Forgery Detection using Machine Learni...
Offline Signature Recognition and It’s Forgery Detection using Machine Learni...
 
Choudhary2015
Choudhary2015Choudhary2015
Choudhary2015
 
A Simple Signature Recognition System
A Simple Signature Recognition System A Simple Signature Recognition System
A Simple Signature Recognition System
 
K012647982
K012647982K012647982
K012647982
 
K012647982
K012647982K012647982
K012647982
 
OSPCV: Off-line Signature Verification using Principal Component Variances
OSPCV: Off-line Signature Verification using Principal Component VariancesOSPCV: Off-line Signature Verification using Principal Component Variances
OSPCV: Off-line Signature Verification using Principal Component Variances
 
B017150823
B017150823B017150823
B017150823
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
An offline signature verification using pixels intensity levels
An offline signature verification using pixels intensity levelsAn offline signature verification using pixels intensity levels
An offline signature verification using pixels intensity levels
 

Dernier

Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Dernier (20)

Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Signature recognition

  • 1. Presented By Vijayalakshmi.S.L Under the Guidance of Mrs.Smita Gour Department of Computer Science & Engineering Basaveshwar Engineering College Bagalkot
  • 2. Contents  Introduction  Literature Survey  Problem Definition  Proposed Methodology  Experimentations  Conclusion and future work References
  • 3. Introduction  Nowadays, person identification (recognition) and verification is very important in security and resource access control.  Biometrics is the science of automatic recognition of individual depending on their physiological and behavioral attributes.  For centuries, handwritten signatures have been an integral part of validating business transaction contracts and agreements.  Among the different forms of biometric recognition systems such as fingerprint, iris, face, voice, palm etc., signature will be most widely used.
  • 4. Signature Recognition  Signature Recognition is the procedure of determining to whom a particular signature belongs to.  Depending on acquiring of signature images, there are two types of signature recognition systems:  Online Signature Recognition  Offline Signature Recognition
  • 5. Literature Survey 1. Offline Handwritten Signature Recognition(Gulzar A. Khuwaja and Mohammad S. Laghari)  Biometrics, which refers to identifying an individual based on his or her physiological or behavioral characteristics, has the capability to reliably distinguish between an authorized person and an imposter.  This paper presents a neural network based recognition of offline handwritten signatures system that is trained with low- resolution scanned signature images.
  • 6. 2. Off-line Signature Verification Based on Fusion of Grid and Global Features Using Neural Networks(Shashi Kumar D R and K B Raja)  In this paper Off-line Signature Verification Based on Fusion of Grid and Global Features using Neural Network(SVFGNN) is presented.  The global and grid features are fused to generate set of features for the verification of signature.
  • 7. 3. DWT based Off-line Signature Verification using Angular Features (Prashanth C R )  This papers presents DWT based Off-line Signature Verification using Angular Features (DOSVAF).  The signature is resized and Discrete Wavelet Transform (DWT) is applied on the blocks to extract the features.
  • 8. 4. Off-Line Signature Recognition Systems(V A Bharadi)  Handwritten signature is one of the most widely used biometric traits for authentication of person as well as document.  In this paper we discuss issues regarding off-line signature recognitions.  The performance metrics of typical systems are compared along with their feature extraction mechanisms.
  • 9. 5. Offline Signature Recognition and Verification Based on Artificial Neural Network(Mohammed A. Abdala)  In this paper, a problem for Offline Signature Recognition and Verification is presented.  A system is designed based on two neural networks classifier and two powerful features (global and grid features).  The designed system consist of three stages which is pre- processing, feature extraction and neural network stage.
  • 10. 6. Signature Recognition & Verification System Using Back Propagation Neural Network (Nilesh Y. Choudhary, Dr. Umesh. Bhadade)  In this paper, off-line signature recognition & verification using back propagation neural network is proposed which is based on steps of image processing, invariant central moment & some global properties and back propagation neural networks.
  • 11. Problem Definition Signature Recognition is the procedure of determining to whom a particular signature belongs to. In this work, the global and grid features are combined and used to differentiate among the signature images. These combined features are given to Back Propagation Neural Network(BPNN) to train it, so that particular signature image is recognized.
  • 12. Proposed Model Block Diagram of Signature Recognition
  • 13. Image Acquisition :  Collection of signatures from 50 persons on blank paper.  The collected signatures are scanned to get images in JPG format to create database.
  • 14. Pre-Processing : Image pre-processing is a technique to enhance raw images received from cameras/sensors placed on satellites, space probes and aircrafts or pictures taken in normal day-to-day life for various applications. The techniques for preprocessing used are  RGB to Gray Scale Conversion  Binarization  Thinning  Bounding Box
  • 15.  RGB to Gray-Scale Convertion  Binarization RGB Image Gray-Scale Image Gray-Scale Image Binarized Image
  • 16.  Thinning  Bounding Box Binarized Image Thinned Image Thinned Image Bounded Image
  • 17. Feature Extraction Features are the characters to be extracted from the processed image. It has used two feature techniques  Global Features  Grid Features
  • 18. Global Features  Height :  Width :  Number of Black Pixels :  Centroid of the signature : Width Height
  • 19. Grid Features  The cropped image is divided into 9 rectangular segments i.e. (3 Χ 3) blocks. 3*3 Blocks of Grid Image
  • 20. DWT(Discrete Wavelet Transform)  DWT applied on 1st block. Each block contributes horizontal, vertical and diagonal components. 1st Block Horizontal Vertical Diagonal
  • 21.  After applying DWT to all 9 blocks, each block is divided into horizontal, vertical and diagonal components. From each components two features mainly horizontal and vertical projection positions are extracted. Total 54 (9 x 3 x 2) features are extracted. Grid features extracted from each block are  Horizontal Projection Position:  Vertical Projection Position:
  • 22. Total 54 features extracted by 9 blocks
  • 23. Classification  What is Neural Network..?  Why Neural Network..?  What is Back Propagation Neural Network(BPNN)…?
  • 24. BPNN Architecture Architecture of Back Propagation Neural Network
  • 25. Training of BPNN This involves developing a suitable neural network model (BPNN). Then the extracted features are presented to BPNN, which recognizes the different types of signature images. The training takes place such that the neural network learns that each entry in the input file has a corresponding entry in the output file.
  • 27. Algorithm for Training phase Description: Retrieval of a signature image from a database Input: Training sample images. Output: Construction of Back Propagation Neural Network. Begin Read the training samples images Step1: Pre-processing  Convert the image into gray scale image.  Convert the gray scale image into binary image.  Apply thinning process.  Apply bounding box.
  • 28. Step 2: Features Extracted. Step 3: Back propagation neural network training. end // end of proposed algorithm
  • 29. Testing using Trained BPNN In testing, input image from testing set is selected and its features are extracted and given them to the trained model, the trained BPNN model classifies given sample and produces output as type of signature and corresponding pattern Classification accuracy= Number of recognized signatures Total number of testing signatures
  • 30. Output Pattern for Recognition
  • 31. Experimental Results Experiment 1 The features extracted are listed as:  Height of the signature  Width of the signature  Centroid of X-axis and Y-axis  Number of black pixels of the signature  The image is divided into 9 blocks and DWT is applied to each block. Energy values of each block were extracted as a feature.
  • 32. 10 20 30 40 50 60 70 80 90 100 10 20 30 40 50 83.46 81 78.28 76.7 74 Performance Rate Performance Rate No of Persons Performance Rate of 1st Experiment
  • 33. Experiment 2 The features are extracted as listed below:  Height of the signature  Width of the signature  Centroid of X-axis and Y-axis  Number of black pixels of the signature  The image is divided into 9 blocks and DWT is applied to each block. From each block two features, horizontal and vertical projection positions of horizontal, vertical and diagonal components are extracted
  • 34. 10 20 30 40 50 60 70 80 90 100 10 20 30 40 50 93.33 92.91 91.38 90 89.47 Performance Rate Performance Rate No of Persons Performance Rate of 2nd Experiment
  • 35. No. of Persons Experiment 1 Experiment 2 10 83.46 % 93.33 % 20 81 % 92.91 % 30 78.28 % 91.38 % 40 76.7 % 90 % 50 74 % 89.47 % Performance Rate The performance rate of the two experiments
  • 36. Conclusion The objective of signature recognition is to recognize the signer for the purpose of recognition. It has been observed that the global and grid features extracted using discrete wavelet transform are found to be efficient for offline signature recognition. The combination of discrete wavelet transform and back propagation neural network has given expected results. It achieved the accuracy rate ranging from 93%-89% for enrollment of 10 to 50 persons.
  • 37. Future Work The signature recognition can also be changed by changing the features that can be extracted from a signature. So, the future work of the recognition of signature can be done with the same Neural Network methods but using different signature features and compares the results with results of the present project.
  • 38. References  Gulzar A. Khuwaja and Mohammad S. Laghari, World Academy of Science, Engineering and Technology , “Offline Handwritten Signature Recognition”, 2011  Shashi Kumar D R, K B Raja, R. K Chhotaray, Sabyasachi Pattanaik, “Off-line Signature Verification Based on Fusion of Grid and Global Features Using Neural Networks”, 2010  Prashanth C R , K B Raja, Venugopal K R, L M Patnaik, “DWT based Off-line Signature Verification using Angular Features”, 2012  V A Bharadi, H B Kekre, “Off-Line Signature Recognition Systems”, 2010  Mohammed A. Abdala & Noor Ayad Yousif, “Offline Signature Recognition and Verification Based on Artificial Neural Network”, 2008  H. Baltzakis, N. Papamarkos, “A New Signature Verification Technique Based On A Two-Stage Neural Network Classifier”, 2001  Khamael Abbas Al-Dulaimi, “Handwritten Signature Verification Technique based on Extract Features”, 2011
  • 39.  Hemanta Saikia, Kanak Chandra Sarma, “Approaches and Issues in Offline Signature Verification System”, 2012  Vu Nguyen, Michael Blumenstein, Graham Leedham, “Global Features for the Off-Line Signature Verification Problem”, 2009  Meenakshi S Arya, Vandana S Inamdar, “A Preliminary Study on Various Off-line Hand Written Signature Verification Approaches”, 2010  Javed Ahmed Mahar, Prof. Dr. Mumtaz Hussain Mahar, Muhammad Khalid Khan, “Comparative Study of Feature Extraction Methods with K-NN for Off- Line Signature Verification”, 2006  Nilesh Y. Choudhary, Mrs. Rupal Patil, Dr. Umesh. Bhadade, Prof. Bhupendra M Chaudhari,“Signature Recognition & Verification System Using Back Propagation Neural Network”, 2013  Manoj Kumar, “Signature Verification Using Neural Network”, 2012  Paigwar Shikha and Shukla Shailja,“Neural Network Based Offline Signature Recognition and Verification System”, 2013  Srikanta Pal, Michael Blumenstein, Umapada Pal, “Off-Line Signature Verification Systems: A Survey”, 2011