Signature Verification and Forgery Detection System: September 2003
Signature Verification and Forgery Detection System: September 2003
net/publication/4153574
CITATIONS READS
12 7,153
2 authors:
All content following this page was uploaded by Mohd Hafizuddin Mohd Yusof on 29 January 2014.
Abstruct- This paper presents an innovative approach verification systems designed up to 1993 appear in [ 1,2,
for signature verification and forgery detection based on and 33. Another survey article [4] has summarized the
fuzzy modeling. The signature images are binarized and approaches used for off-line signature verification from
resized to a fixed size window and are then thinned. The 1993-2000. We present here a review of a few papers in
thinned image is then partitioned into a fixed number of this field, which have not been covered in the survey
eight sub-images called boxes. This partition is done articles. The emphasis of these papers is mainly on
using the horizontal density approximation approach. fuzzy based techniques for off-line signature
Each sub-image is then further resized and again verification.
partitioned into twelve further sub-images using the
uniform partitioning' approach. The features of An off-line signature system consisting of signature
consideration are normalized vector angle (a) and recognition and verification is proposed in [ 5 ] . In this,
distance (y) from each box. Each feature extracted from the recognition phase is based on the multi-stage
sample signatures gives rise to fuzzy sets. Since the classifier and a combination of global and local features
choice of a proper fuzzification hnction is crucial for whereas the verification is done using fuzzy concepts.
verification, we have devised a new fuzzification HMM based approach in [6] derives dynamically and
function with structural parameters, which is able to automatically the author dependent parameters to set up
adapt to the variations in hzzy sets. This function is an optimal decision rule for off-line verification process.
employed to develop a complete forgery detection and Here the cross validation principle is used to derive not
verification system, only the best HMM models, but aho an optimal
acceptation/ rejection threshold for each author. This
Keywords threshold leads to a high discrimination between the
Signature verification, Forgery detection, Box-method, authors and impostors in the context of random
Fuzzy modeiing. forgeries.
The design of any signature verification system Automatic examination of questioned signatures did not
generally requires the solution of five sub-problem: come into being until the advent of computers in the
data acquisition, pre-processing, feature extraction, 1960s. As computer system became more powerful and
comparison process and performance evaluation [ 11. more affordable, designing an automatic forgery
Surveys of the state of the art off-line signature detection system became an active research subject.
Most of the work in off-line forgery detection, however,
10
Bach signature will have a rule so we have as many Accordingly, we have
rules as the number of features. The fuzzy set Ak is
represented by the following exponential membership
function that includes two structural parameters sk
andtk :
(2) (7)
a~ w ay hk
-=--..-.-
- as, ay a ~ ,at,
where x, is the mean 0;is the variance of k th fuzzy
set. Note that the inclusion of these parameters will
help track the variations in the handwriting of
signatures. When sk = 1 andtk = -1, the membership
function is devoid of structural parameters and hence it
is solely governed by the mean and variance+ The
justification for the modified membership function is
two-fold: (i) Easy to track variations aver mean and
variance, and (ii) no need of sophisticated learning l3J aJ dY aw,
-=-._-.-
technique. The numerator and denominator of
exponential €unction in (2) contain a constant term (i.e., at, ay hk at,
1) plus a function of parameter and the known variation
(i.e.,either change over mean or variance). This choice
is guided by the consideration of no role for parameters
if the signatures of a person don't change. But this need
not be the case for other applications. (9)
where d=Y-q, T = ( l + t k ) + t ~ ~ and
~
The strength of the rule in (1) is obtained as k denotes the rule number.
We use the gradient descent learning for the parameters
as follows
The output is expressed as
(4)
11
IV. IMPLEMENTATION AND RESULTS dJ
and -in order to update the structural parameters si
The proposed fuzzy modeling based on TS model ati
discussed above has been applied on a signature and ti ; i = 1,..,96. Using these values, we compute the
database, developed in the Graphics Visualization &
Games Development (GVGD) lab at the Multimedia membership functions for all the features. This process
is repeated for all training samples of a person. Here, we
University, Cybejaya, Malaysia.
have devised an innovative approach for the
classification of all signatures (i.e., test signatures and
The signature database consists of a total of 510
random, skilled and unskilled forgeries) of a person. In
handwritten signature images. Out of these, 255 were
order to know the extent of variation in the genuine
authentic signatures and others were forged ones. These
signatures, we determine the maximum and minimum
signatures were obtained Erom 17 volunteers with each
membership functions for each feature over all
person contributing 15 signatures as shown in Table 1.
signatures in the training set. The difference between
The signatures were collected over a period of a few
these two gives the inherent variation in the signatures
weeks to account for variations in the signature with
o f a person.
time. ?he forgeries of these signatures were collected
over a similar time frame. The random forgeries were
We now use the inherent variation to judge the test
obtained by supplying only the names of the individuals
signatures. We will also explain its utility in the testing
to the casual forgers who did not have any access to the
phase. For a particular feature, if the membership value
actual genuine signatures. The unskilled forgeries in
lies within the range of variation, which is given by the
turn, were obtained by providing sample genuine ,
forgery I I 5
n
0.8
08-
.... ... Test (99%)
E 04-
02-
1 7 13 19 25 31 37 43 49 55 61 67 73 79 85 91
It is a well-known fact that any automatic signature Foatures
,
1 7 13 19 25 31 37 43 4B 55 61 67 73 79 85 91
dJ
With the above performance index, we compute - Features
dSi (b)
12
1 1.2 ,
M” bmrihlp Graph of Sianstursm
1
[3] R. Sabourin, R. Plamondon and G. Lorette, Off-
line identification with handwritten signature
images: Survey and Perspectives, Structured Image
Anaiysis, Springer-Verlag, New York, 1992, pp.
2 19-234.
[4] R. Plamondon and S.N. Srihari, “On-line and off-
line Handwriting Recognition: A Comprehensive
Survey”, IEEE Transactions on Pattern Analysis
I 7 13 le 25 31 37 43 49 55 61 67 73 79 85 91
Foatures and Machine Intelligence, Vol. 22, No. I, pp. 63-
x4,2000.
[5] M.A. Ismail and Samia Gad, “Off-line Arabic
Fig. 3. Membership graphs for a particular signature signature recognition and verification”, Pattern
Recognition, Vol. 33, No. 10, pp. 1727-1740, 2000.
Table 2. Results of verification [6] A. El-Yacoubi, E.J.R. Justino, R. Sabourin and F.
Bortolozzi, “Off-line signature verification using
Total Accepted Rejected HMMS and cross-validation”, Proceedings of the
I I I IEEE Workshop on Neural Networks for Signal
Genuine 1 85 I 85 (100%) 1 0 (0%) Processing, USA, 2000, pp. 859-868.
[7] C. Quek and R.W. Zhou, “Antiforgery: a novel
Skilled pseudo-outer product based fuzzy neural network
driven signature Verification system”, Pattern
Recognition Letters, Vol. 23, pp. 1795-18i6, 2002.
Unskilled
[XJ M. Hanmandlu, K.R. Murali Mohan, S.
Chakraborty, S. Goel and D. Roy Choudhury,
Random “Unconstrained handwritten character recognition
based on fuzzy logic”, Pattern Recognition, Vol.
36, NO.3, pp. 603423,2003.
[SI M. Hanmandlu, K.R. Murali Mohan, S. Chakraborty
V. CONCLUSIONS and G . Garg, “Fuzzy modeling based signature
verification system”, Proceedings of the sixth
An off-line signature verification and forgery detection International Conference on Document Analysis
system is modeled by TS model, which involves and Recognition, USA, 2001, pp. 110-1 14.
structural parameters in its exponential membership
’
[lo] M. Ammar, Y. Yoshida and T. Fukumura, “A new
function. The features consisting of angles are extracted effective approach for off-line verification of
using box approach. Each feature yields a fuzzy set signatures by using pressure features”, Proceedings
when its values are gathered from all samples because of the International Conference on Pattern
of the variations in handwritten signatures. In this recognition, 1986, pp, 566-569.
formulation, a single feature constitutes each rule. [ I I ] M. Ammar, “Progress in verification of skillfully
simulated handwritten signatures”, International
The efficacy of this system has been tested on a large Journal of Pattern Recognition and Artificial
database of signatures. The verification system is able to Intelligence, Vol. 5, pp. 337-351, 1991.
detect all types of forgeries: random, unskilled and [12] Jinhong K. Guo, D. Doermann and A. RosenfeId,
skilled with utmost precision. The choice of initial “Off-line skilled forgery detection using stroke and
parameters is important but not crucial. But, we need to sub-stroke properties”, Proceedings o f the
make a proper choice only once and it i s applicable to International Conference on Pattern Recognition,
all types of signatures. We haven’t used global learning 2000, pp. 355-358.
techniques for want of simpticity at the implementation [I31 M. Hanmandlu, K.R. Murali Mohan and Vivek
stage. Gupta, “Fuzzy logic based character recognition”,
Proceedings of the International Conference on
Image Processing, Santa Barbara, USA, pp.714-
VI. REFERENCES 717.
[14]Y. Xuhua, T. Furuhasbi, K. Obata, Y. Uchikawa,
[ 11 R. Plamondon and F. Leclerc, “Automatic signature Study on signature verification using a new
verification: the state of the art 1989-1993”, approach to genetic based machine learning.
lnternationai Journal of Pattern Recognition and Proceedings of the IEEE International Conference
Artificial Intelligence, Vol. 8, No. 3, pp. 643-660, on Systems, Man and Cybernetics, USA, 1995, pp.
1994. 4383-4386.
[2] R. Plamondon and G. Lorette, “Automatic signature
verification and writer Identification: the state of
the art”, Pattern Recognition, Vol. 22, No. 2, pp.
107-131, 1989.
13
Genuine Skillcd forgery
14