SlideShare a Scribd company logo
3
Most read
6
Most read
14
Most read
P R E S E N T E D B Y:
P R I YA N K A P R A D H A N
M . T E C H ( S E )
R O L L N O . - 1 3 0 1 4 0 9 5 0 7
Image Processing Based Signature
Recognition and Verification Technique
Using Artificial Neural Network approach
UNDER THE GUIDANCE OF:
ER. L. S. MAURYA
HOD(CS/IT)
SRMSCET,
BAREILLY.
Outline
1. Introduction
1.1 Signature Verification vs. Signature Recognition
1.2 Types of Signature Forgery
2. Problem statement/objective
3. Literature Review
4. Research Methodology
5. Proposed Model
6. Software and Tools Used
7. Expected Result
8. References
9/12/2015Priyanka Pradhan
2
Signature has been a distinguishing feature for person identification.
When a large number of documents, e.g. bank cheques, have to be authenticated
in a limited time, the manual verification of account holders’ signatures is often
unrealistic.
Signature provides secure means of authentication and authorization. So,
there is a need of Automatic Signature Verification and Identification systems.
The present dissertation work is done in the field of offline signature verification
system by extracting some special features that make a signature difficult to
forge. In this dissertation work, existing signature verification systems have been
thoroughly studied and a model is designed to develop an offline signature
verification system.
1. Introduction
9/12/2015Priyanka Pradhan
3
1.1 Signature Verification vs. Signature
Recognition
Shalini Davies
Signature Verification Signature Recognition
9/12/2015Priyanka Pradhan
4
9/12/2015Priyanka Pradhan 5
1.2 Types of Signature Forgery
9/12/2015Priyanka Pradhan
6
Forgeries can be classified into three main categories.
 Random forgery: which is written by the person who doesn’t know the shape of
original signature.
 Simple forgery: which is represented by a signature sample, written by the person who
knows the shape of original signature without much practice.
 Skilled forgery: represented by a suitable imitation of the genuine signature model
(a) Original (b)Random forgery (c)Skilled forgery
Contd….
9/12/2015Priyanka Pradhan
7
 FAR (False Acceptance Ratio): It is given by the number of fake signatures
accepted by the system with respect to the total number of comparisons made.
Calculation of these is show below.
Number of forgeries accepted
FAR =-------------------------------------- * 100
Number of forgeries tested
 FRR (False Rejection Ratio): It is the total number of genuine signatures
rejected by the system with respect to the total number of comparisons made.
Number of originals rejected
FRR = ------------------------------------- * 100
Number of originals tested
2. Problem Statement/Objective
The objectives of this dissertation are:
 To make sure that only the right people are authorized to access high-security systems
 The process of signature verification should be able to detect forgeries
 To use cascading of features for the process of feature extraction of signature from the
preprocessed scanned image of a signature that will give more accurate results
 To cascade and comparison of features
9/12/2015Priyanka Pradhan
8
3. Literature Review
9/12/2015Priyanka Pradhan
9
Base Paper
[1]Ali Karounia , Bassam Dayab, Samia Bahlakb,” Offline
signature recognition using neural networks approach”. 1877-0509,
Published by Elsevier Ltd(Dec. 2011)[8].
 In this paper, a method for Offline Verification of signatures is presented using
a set of simple shape based geometric features. The features that are used are
Area, Center of gravity, Eccentricity, Kurtosis and Skewness. Before
extracting the features, preprocessing of a scanned image is necessary to
isolate the signature part and to remove any spurious noise present.
 The system is initially trained using a database of signatures obtained from
those individuals whose signatures have to be authenticated by the system.
Contd…
9/12/2015Priyanka Pradhan
10
[2]Nancy Prof. and Gulshan Goyal ,“Signature Processing in
Handwritten Bank Cheque Images”. International Journal on
Recent and Innovation Trends in Computing and Communication
ISSN: 2321-8169 Volume: 2 Issue: 5(May 2015)[2].
 The present paper focuses on different steps including browsing a bank
cheque, pre-processing, feature extraction, recognition.
 Preprocessing stage includes image resizing, noise elimination, thinning etc.
On the other hand feature extraction is done on the basis of gray level co-
occurrence matrix .
 Feature extraction stage includes contrast, homogeneity, energy, entropy,
variance, sum average etc.
Contd…
9/12/2015Priyanka Pradhan
11
[3] Harpreet Anand and Prof. D.L Bhombe,“Enhanced Signature
Verification AndRecognition Using Matlab”, International Journal
of Innovative Research in Advanced Engineering (IJIRAE) ISSN:
2349-2163Volume 1 Issue 4 (May 2014)[3].
 In this paper offline signature verification using neural network is projected.
For authentication of signature, the proposed method is based on geometrical
and statistical feature extraction and then the entire database, features are
trained using neural network .
 The extracted features of investigation signature are compared with the
previously trained features of the reference signature.
Contd…
9/12/2015Priyanka Pradhan
12
[4]A. Vinoth, V. Sujathabai, “A Pixel Based Signature
Authentication System”, International Journal of Innovative
Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075,
Volume-2, Issue-6, May 2013[6] .
 In this paper, the off-line signatures is verified by taking a boundary of the
entire signature and do the pixel comparison.
 Signature is acquired using a scanner. Detection process is done after the data
acquisition and pre-processing. Pre processing includes noise removal, grey-
scale, manipulation, edge detection. Experimental results show that 50% of
the accurate matching with the existing one from the data base.
Contd…
9/12/2015Priyanka Pradhan
13
[5] Przemysław Kudłacik and Piotr Porwik, A new approach to
signature recognition using the fuzzy method. Published online:
The Author(s) 2012. This article is published with open access at
Springerlink.com (15 August 2012)[7].
 The paper presents a new fuzzy approach to off-line handwritten signature
recognition. The solution is based on characteristic feature extraction. After
finding signature’s center of gravity a number of lines are drawn through it at
different angles.
 Cross points of generated lines and signature sample, which are further
grouped and sorted, are treated as the set of features.
4. Research Methodology
Stage 1: The signature acquisition process is executed manually using scanner.
Stage 2: The Pre-processing phase. After signature acquisition the sampled data is preceded for the
Pre-processing phase. In pre-processing phase the images are refined by applying various operations of
Digital Image Processing. Pre-Processing phase will filter the images and convert the RGB image into
the gray image and then to Black & White image. The threshold Black & White image will execute the
Recognition process in an efficient way. Various Pre-Processing phases will be applying on the sampled
data.
(b)Preprocessed Signature
9/12/2015Priyanka Pradhan
14
(a)Original Gray Scale Image
Contd…
9/12/2015Priyanka Pradhan
15
Stage 3: After pre-processing the sampled scanned signature documents, the
segmentation techniques are applied to it. Various methods for segmentation are available,
some of them are:
 Threshold based segmentation
 Edge based segmentation
 Region based segmentation
 Clustering techniques
 Matching
Stage 4: The segmented images are then used for the feature extraction phase. Various
methods for feature extraction are available, some of them are:
 Global Transformation and Series Expansion
 Statistical Method
 Geometrical and Topological Representation
Contd…
9/12/2015Priyanka Pradhan
16
Stage 5: At final stage, the ANN (ARTIFICIAL NEURAL NETWORK) will be used for
the classification process. Various methods for classification are available, some of them
are:
 Hidden Markovs Model
 Support Vector Machine
 Artificial Neural Network
(a)Supervised Learning
(b)Unsupervised learning
Fig 4.1: Neural network system
5. Proposed Approach
9/12/2015Priyanka Pradhan
17
Fig 5.1:Proposed Model
6. Software and Tools Used
 The sampled signatures are scanned through a normal optical scanner.
 For morphological operations image processing tool in MATLAB is used.
 For training the neural network, a toolbox called nntool in MATLAB will be
used.
9/12/2015Priyanka Pradhan
18
7. Expected Results
 The motive of this dissertation is to design an offline signature recognition system.
 The motive is to verify offline scanned signature.
 The accuracy of signature recognition is targeted to > 98%.
9/12/2015Priyanka Pradhan
19
8. References
[1] Shefali Singla and Deepinder Kaur. Signature Verification Using DTI and Guided DTI
Classifiers and Digital Encryption. International Journal of Advanced Research in
Computer Science and Software Engineering. Volume 5 Issue 4 ISSN: 2277 128X (May
2015).
[2] Nancy Prof. and Gulshan Goyal . Signature Processing in Handwritten Bank Cheque
Images. International Journal on Recent and Innovation Trends in Computing and
Communication. ISSN: 2321-8169 Volume: 2 Issue: 5(May 2015).
[3] Harpreet Anand and Prof. D.L Bhombe. Enhanced Signature Verification
AndRecognition Using Matlab. International Journal of Innovative Research in Advanced
Engineering (IJIRAE). ISSN: 2349-2163 Volume 1 Issue: 4 (May 2014)
[4] Sheena, Sheena Mathew. A Study of Multimodal Biometric System. IJRET:
International Journal of Research in Engineering and Technology eISSN: 2319-1163 |
pISSN: 2321-7308. Volume: 03 Special Issue: 15 | IWCPS-2014 | (Dec-2014).
9/12/2015Priyanka Pradhan
20
Contd…
[5] Harpreet Anand and Prof. D.L Bhombe. Enhanced Signature Verification And
Recognition Using Matlab. International Journal of Innovative Dissertation in Advanced
Engineering (IJIRAE) ISSN: 2349-2163 Volume 1 Issue 4 (May 2014).
[6] A. Vinoth, V. Sujathabai. A Pixel Based Signature Authentication System.
International Journal of Innovative Technology and Exploring Engineering (IJITEE)
ISSN: 2278-3075 Volume-2 Issue-6 (May 2013).
[7] Przemysław Kudłacik and Piotr Porwik, A new approach to signature recognition
using the fuzzy method. Published online: This article is published with open access at
Springerlink.com (15 August 2012).
[8] Ali Karounia , Bassam Dayab, Samia Bahlakb. Offline signature recognition using
neural networks approach. 1877-0509 Published by Elsevier Ltd(Dec. 2011).
9/12/2015Priyanka Pradhan
21
9/12/2015Priyanka Pradhan
22

More Related Content

PDF
Steganography final report
ABHIJEET KHIRE
 
PPTX
Signature recognition
Vijju Lakkundi
 
PPTX
Offline signature verification based on geometric feature extraction using ar...
Cen Paul
 
PDF
Offline Signature Verification and Recognition using Neural Network
International Journal of Science and Research (IJSR)
 
PDF
Cryptography and Network Lecture Notes
FellowBuddy.com
 
PPT
Signature verification
NAVEEN TOKAS
 
PPTX
Representation image
Zena Abo-Altaheen
 
PDF
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
iosrjce
 
Steganography final report
ABHIJEET KHIRE
 
Signature recognition
Vijju Lakkundi
 
Offline signature verification based on geometric feature extraction using ar...
Cen Paul
 
Offline Signature Verification and Recognition using Neural Network
International Journal of Science and Research (IJSR)
 
Cryptography and Network Lecture Notes
FellowBuddy.com
 
Signature verification
NAVEEN TOKAS
 
Representation image
Zena Abo-Altaheen
 
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
iosrjce
 

What's hot (20)

PPTX
PPT steganography
parvez Sharaf
 
PPT
Iss lecture 5
Ali Habeeb
 
PPTX
Halftoning in Computer Graphics
University of Potsdam
 
PPTX
Text Detection and Recognition
Badruz Nasrin Basri
 
PPT
Digital Signature Standard
Sou Jana
 
PPTX
Image Representation & Descriptors
PundrikPatel
 
PPT
Digital signature algorithm (de la cruz, genelyn).ppt 2
YooGenelyn
 
PDF
CNN based Handwritten Signature Recognition
Suresh Pokharel
 
PPTX
Cryptography - Block cipher & stream cipher
Niloy Biswas
 
PDF
Image encryption and decryption using aes algorithm
IAEME Publication
 
PPTX
Biometric Security Systems ppt
OECLIB Odisha Electronics Control Library
 
PPTX
Animation in Computer Graphics
RinkuNahar
 
PDF
Image Forgery Detection
nitishkumar883951
 
PPTX
Gesture recognition technology
Kompal Neutan
 
PPTX
Fingerprint recognition system by sagar chand gupta
scg121433
 
PPTX
Steganography
Uttam Jain
 
PPTX
Color Image Processing
kiruthiammu
 
PPTX
Biometrics iris recognition
sunjaysahu
 
PDF
FINGERPRINT BASED ATM SYSTEM
Journal For Research
 
DOCX
Hand Written Character Recognition Using Neural Networks
Chiranjeevi Adi
 
PPT steganography
parvez Sharaf
 
Iss lecture 5
Ali Habeeb
 
Halftoning in Computer Graphics
University of Potsdam
 
Text Detection and Recognition
Badruz Nasrin Basri
 
Digital Signature Standard
Sou Jana
 
Image Representation & Descriptors
PundrikPatel
 
Digital signature algorithm (de la cruz, genelyn).ppt 2
YooGenelyn
 
CNN based Handwritten Signature Recognition
Suresh Pokharel
 
Cryptography - Block cipher & stream cipher
Niloy Biswas
 
Image encryption and decryption using aes algorithm
IAEME Publication
 
Biometric Security Systems ppt
OECLIB Odisha Electronics Control Library
 
Animation in Computer Graphics
RinkuNahar
 
Image Forgery Detection
nitishkumar883951
 
Gesture recognition technology
Kompal Neutan
 
Fingerprint recognition system by sagar chand gupta
scg121433
 
Steganography
Uttam Jain
 
Color Image Processing
kiruthiammu
 
Biometrics iris recognition
sunjaysahu
 
FINGERPRINT BASED ATM SYSTEM
Journal For Research
 
Hand Written Character Recognition Using Neural Networks
Chiranjeevi Adi
 
Ad

Viewers also liked (20)

PPTX
Face recognition using artificial neural network
Sumeet Kakani
 
PPTX
Neural network & its applications
Ahmed_hashmi
 
PPT
Signature recognition using clustering techniques dissertati
Dr. Vinayak Bharadi
 
PPTX
Face recognition using neural network
Indira Nayak
 
PPTX
Artificial neural network
Vajiheh Zoghiyan
 
PPTX
Handwritten character recognition using artificial neural network
Harshana Madusanka Jayamaha
 
PPTX
FACE RECOGNITION USING NEURAL NETWORK
codebangla
 
PDF
Artificial neural networks
stellajoseph
 
PPTX
Artificial neural network
DEEPASHRI HK
 
PDF
Gesture recognition using artificial neural network,a technology for identify...
NidhinRaj Saikripa
 
PDF
An offline signature recognition and verification system based on neural network
eSAT Journals
 
DOCX
Introduction to toolbox under matlab environment
Paramjeet Singh Jamwal
 
PPTX
MATLAB Environment for Neural Network Deployment
Angelo Cardellicchio
 
PPTX
مقدمة في برمجة الشبكات network programming
Ehab Saad Ahmad
 
DOCX
الملتقي الدولي الثامن Colloque 2017 urnop ria
boukhrissa Naila
 
PPTX
neural network nntool box matlab start
nabeelasd
 
PDF
Artificial Neural Networks Lect7: Neural networks based on competition
Mohammed Bennamoun
 
PPT
Sign verification
projectseven1222
 
PPT
Neural tool box
Mohan Raj
 
PPTX
Fuzzy and nn
Shimi Haridasan
 
Face recognition using artificial neural network
Sumeet Kakani
 
Neural network & its applications
Ahmed_hashmi
 
Signature recognition using clustering techniques dissertati
Dr. Vinayak Bharadi
 
Face recognition using neural network
Indira Nayak
 
Artificial neural network
Vajiheh Zoghiyan
 
Handwritten character recognition using artificial neural network
Harshana Madusanka Jayamaha
 
FACE RECOGNITION USING NEURAL NETWORK
codebangla
 
Artificial neural networks
stellajoseph
 
Artificial neural network
DEEPASHRI HK
 
Gesture recognition using artificial neural network,a technology for identify...
NidhinRaj Saikripa
 
An offline signature recognition and verification system based on neural network
eSAT Journals
 
Introduction to toolbox under matlab environment
Paramjeet Singh Jamwal
 
MATLAB Environment for Neural Network Deployment
Angelo Cardellicchio
 
مقدمة في برمجة الشبكات network programming
Ehab Saad Ahmad
 
الملتقي الدولي الثامن Colloque 2017 urnop ria
boukhrissa Naila
 
neural network nntool box matlab start
nabeelasd
 
Artificial Neural Networks Lect7: Neural networks based on competition
Mohammed Bennamoun
 
Sign verification
projectseven1222
 
Neural tool box
Mohan Raj
 
Fuzzy and nn
Shimi Haridasan
 
Ad

Similar to Image Processing Based Signature Recognition and Verification Technique Using Artificial Neural Network approach (20)

PDF
IJSRED-V2I2P33
IJSRED
 
PDF
Offline and online signature verification systems a survey
eSAT Publishing House
 
PDF
Artificial Neural Network Based Offline Signature Recognition System Using Lo...
IJEID :: International Journal of Excellence Innovation and Development
 
PDF
Proposed Method for Off-line Signature Recognition and Verification using Neu...
Editor IJMTER
 
PPTX
Biometric Signature Recognization
Faimin Khan
 
PDF
A Fusion of Statistical Distance and Signature Length Based Approach for Offl...
IRJET Journal
 
PDF
OFFLINE SIGNATURE VERIFICATION SYSTEM FOR BANK CHEQUES USING ZERNIKE MOMENTS,...
ijaia
 
PPTX
Signature Recognition Poster
Tejraj Thakor
 
PDF
Ganesan dhawanrpt
pramod naik
 
PDF
A Simple Signature Recognition System
iosrjce
 
PDF
K012647982
IOSR Journals
 
PDF
K012647982
IOSR Journals
 
PDF
Offline Handwritten Signature Verification using Neural Network
ijiert bestjournal
 
PDF
Distance Based Verification Technique for Online Signature System
IRJET Journal
 
PPTX
Off-line Signature Verification
lemon_au
 
PPTX
Signature verification Using SIFT Features
Ashikur Rahman
 
PDF
Artificial Intelligence Based Bank Cheque Signature Verification System
IRJET Journal
 
PDF
ylmaz2016.pdf
HouBou3
 
PDF
A Convolutional Neural Network approach for Signature verification
IRJET Journal
 
PDF
Offline signature identification using high intensity variations and cross ov...
eSAT Publishing House
 
IJSRED-V2I2P33
IJSRED
 
Offline and online signature verification systems a survey
eSAT Publishing House
 
Artificial Neural Network Based Offline Signature Recognition System Using Lo...
IJEID :: International Journal of Excellence Innovation and Development
 
Proposed Method for Off-line Signature Recognition and Verification using Neu...
Editor IJMTER
 
Biometric Signature Recognization
Faimin Khan
 
A Fusion of Statistical Distance and Signature Length Based Approach for Offl...
IRJET Journal
 
OFFLINE SIGNATURE VERIFICATION SYSTEM FOR BANK CHEQUES USING ZERNIKE MOMENTS,...
ijaia
 
Signature Recognition Poster
Tejraj Thakor
 
Ganesan dhawanrpt
pramod naik
 
A Simple Signature Recognition System
iosrjce
 
K012647982
IOSR Journals
 
K012647982
IOSR Journals
 
Offline Handwritten Signature Verification using Neural Network
ijiert bestjournal
 
Distance Based Verification Technique for Online Signature System
IRJET Journal
 
Off-line Signature Verification
lemon_au
 
Signature verification Using SIFT Features
Ashikur Rahman
 
Artificial Intelligence Based Bank Cheque Signature Verification System
IRJET Journal
 
ylmaz2016.pdf
HouBou3
 
A Convolutional Neural Network approach for Signature verification
IRJET Journal
 
Offline signature identification using high intensity variations and cross ov...
eSAT Publishing House
 

More from Priyanka Pradhan (19)

PPTX
Tomato disease detection using deep learning convolutional neural network
Priyanka Pradhan
 
PPTX
Applet
Priyanka Pradhan
 
PPTX
Servlet
Priyanka Pradhan
 
PPTX
Javascript
Priyanka Pradhan
 
PPT
programming with python ppt
Priyanka Pradhan
 
PPTX
Core Java
Priyanka Pradhan
 
PPTX
GrayBox Testing and Crud Testing By: Er. Priyanka Pradhan
Priyanka Pradhan
 
PPTX
The agile requirements refinery(SRUM) by: Priyanka Pradhan
Priyanka Pradhan
 
ODP
Social tagging and its trend
Priyanka Pradhan
 
PPTX
Behavioral pattern By:-Priyanka Pradhan
Priyanka Pradhan
 
PPTX
software product and its characteristics
Priyanka Pradhan
 
PPTX
EDI(ELECTRONIC DATA INTERCHANGE)
Priyanka Pradhan
 
PPT
collaborative tagging :-by Er. Priyanka Pradhan
Priyanka Pradhan
 
PPT
Deploying java beans in jsp
Priyanka Pradhan
 
PPTX
SOFTWARE PROCESS MONITORING AND AUDIT
Priyanka Pradhan
 
PPTX
s/w metrics monitoring and control
Priyanka Pradhan
 
Tomato disease detection using deep learning convolutional neural network
Priyanka Pradhan
 
Javascript
Priyanka Pradhan
 
programming with python ppt
Priyanka Pradhan
 
Core Java
Priyanka Pradhan
 
GrayBox Testing and Crud Testing By: Er. Priyanka Pradhan
Priyanka Pradhan
 
The agile requirements refinery(SRUM) by: Priyanka Pradhan
Priyanka Pradhan
 
Social tagging and its trend
Priyanka Pradhan
 
Behavioral pattern By:-Priyanka Pradhan
Priyanka Pradhan
 
software product and its characteristics
Priyanka Pradhan
 
EDI(ELECTRONIC DATA INTERCHANGE)
Priyanka Pradhan
 
collaborative tagging :-by Er. Priyanka Pradhan
Priyanka Pradhan
 
Deploying java beans in jsp
Priyanka Pradhan
 
SOFTWARE PROCESS MONITORING AND AUDIT
Priyanka Pradhan
 
s/w metrics monitoring and control
Priyanka Pradhan
 

Recently uploaded (20)

PPTX
oapresentation.pptx
mehatdhavalrajubhai
 
PDF
Bandai Playdia The Book - David Glotz
BluePanther6
 
PDF
ShowUs: Pharo Stream Deck (ESUG 2025, Gdansk)
ESUG
 
PDF
QAware_Mario-Leander_Reimer_Architecting and Building a K8s-based AI Platform...
QAware GmbH
 
PPTX
PFAS Reporting Requirements 2026 Are You Submission Ready Certivo.pptx
Certivo Inc
 
PDF
Jenkins: An open-source automation server powering CI/CD Automation
SaikatBasu37
 
PDF
Become an Agentblazer Champion Challenge Kickoff
Dele Amefo
 
PDF
Teaching Reproducibility and Embracing Variability: From Floating-Point Exper...
University of Rennes, INSA Rennes, Inria/IRISA, CNRS
 
PPTX
AI-Ready Handoff: Auto-Summaries & Draft Emails from MQL to Slack in One Flow
bbedford2
 
PDF
lesson-2-rules-of-netiquette.pdf.bshhsjdj
jasmenrojas249
 
PDF
Multi-factor Authentication (MFA) requirement for Microsoft 365 Admin Center_...
Q-Advise
 
PDF
IEEE-CS Tech Predictions, SWEBOK and Quantum Software: Towards Q-SWEBOK
Hironori Washizaki
 
PDF
49785682629390197565_LRN3014_Migrating_the_Beast.pdf
Abilash868456
 
PDF
advancepresentationskillshdhdhhdhdhdhhfhf
jasmenrojas249
 
PDF
Micromaid: A simple Mermaid-like chart generator for Pharo
ESUG
 
PDF
Why Use Open Source Reporting Tools for Business Intelligence.pdf
Varsha Nayak
 
PPTX
Visualising Data with Scatterplots in IBM SPSS Statistics.pptx
Version 1 Analytics
 
PDF
What to consider before purchasing Microsoft 365 Business Premium_PDF.pdf
Q-Advise
 
PDF
Community & News Update Q2 Meet Up 2025
VictoriaMetrics
 
PDF
Appium Automation Testing Tutorial PDF: Learn Mobile Testing in 7 Days
jamescantor38
 
oapresentation.pptx
mehatdhavalrajubhai
 
Bandai Playdia The Book - David Glotz
BluePanther6
 
ShowUs: Pharo Stream Deck (ESUG 2025, Gdansk)
ESUG
 
QAware_Mario-Leander_Reimer_Architecting and Building a K8s-based AI Platform...
QAware GmbH
 
PFAS Reporting Requirements 2026 Are You Submission Ready Certivo.pptx
Certivo Inc
 
Jenkins: An open-source automation server powering CI/CD Automation
SaikatBasu37
 
Become an Agentblazer Champion Challenge Kickoff
Dele Amefo
 
Teaching Reproducibility and Embracing Variability: From Floating-Point Exper...
University of Rennes, INSA Rennes, Inria/IRISA, CNRS
 
AI-Ready Handoff: Auto-Summaries & Draft Emails from MQL to Slack in One Flow
bbedford2
 
lesson-2-rules-of-netiquette.pdf.bshhsjdj
jasmenrojas249
 
Multi-factor Authentication (MFA) requirement for Microsoft 365 Admin Center_...
Q-Advise
 
IEEE-CS Tech Predictions, SWEBOK and Quantum Software: Towards Q-SWEBOK
Hironori Washizaki
 
49785682629390197565_LRN3014_Migrating_the_Beast.pdf
Abilash868456
 
advancepresentationskillshdhdhhdhdhdhhfhf
jasmenrojas249
 
Micromaid: A simple Mermaid-like chart generator for Pharo
ESUG
 
Why Use Open Source Reporting Tools for Business Intelligence.pdf
Varsha Nayak
 
Visualising Data with Scatterplots in IBM SPSS Statistics.pptx
Version 1 Analytics
 
What to consider before purchasing Microsoft 365 Business Premium_PDF.pdf
Q-Advise
 
Community & News Update Q2 Meet Up 2025
VictoriaMetrics
 
Appium Automation Testing Tutorial PDF: Learn Mobile Testing in 7 Days
jamescantor38
 

Image Processing Based Signature Recognition and Verification Technique Using Artificial Neural Network approach

  • 1. P R E S E N T E D B Y: P R I YA N K A P R A D H A N M . T E C H ( S E ) R O L L N O . - 1 3 0 1 4 0 9 5 0 7 Image Processing Based Signature Recognition and Verification Technique Using Artificial Neural Network approach UNDER THE GUIDANCE OF: ER. L. S. MAURYA HOD(CS/IT) SRMSCET, BAREILLY.
  • 2. Outline 1. Introduction 1.1 Signature Verification vs. Signature Recognition 1.2 Types of Signature Forgery 2. Problem statement/objective 3. Literature Review 4. Research Methodology 5. Proposed Model 6. Software and Tools Used 7. Expected Result 8. References 9/12/2015Priyanka Pradhan 2
  • 3. Signature has been a distinguishing feature for person identification. When a large number of documents, e.g. bank cheques, have to be authenticated in a limited time, the manual verification of account holders’ signatures is often unrealistic. Signature provides secure means of authentication and authorization. So, there is a need of Automatic Signature Verification and Identification systems. The present dissertation work is done in the field of offline signature verification system by extracting some special features that make a signature difficult to forge. In this dissertation work, existing signature verification systems have been thoroughly studied and a model is designed to develop an offline signature verification system. 1. Introduction 9/12/2015Priyanka Pradhan 3
  • 4. 1.1 Signature Verification vs. Signature Recognition Shalini Davies Signature Verification Signature Recognition 9/12/2015Priyanka Pradhan 4
  • 6. 1.2 Types of Signature Forgery 9/12/2015Priyanka Pradhan 6 Forgeries can be classified into three main categories.  Random forgery: which is written by the person who doesn’t know the shape of original signature.  Simple forgery: which is represented by a signature sample, written by the person who knows the shape of original signature without much practice.  Skilled forgery: represented by a suitable imitation of the genuine signature model (a) Original (b)Random forgery (c)Skilled forgery
  • 7. Contd…. 9/12/2015Priyanka Pradhan 7  FAR (False Acceptance Ratio): It is given by the number of fake signatures accepted by the system with respect to the total number of comparisons made. Calculation of these is show below. Number of forgeries accepted FAR =-------------------------------------- * 100 Number of forgeries tested  FRR (False Rejection Ratio): It is the total number of genuine signatures rejected by the system with respect to the total number of comparisons made. Number of originals rejected FRR = ------------------------------------- * 100 Number of originals tested
  • 8. 2. Problem Statement/Objective The objectives of this dissertation are:  To make sure that only the right people are authorized to access high-security systems  The process of signature verification should be able to detect forgeries  To use cascading of features for the process of feature extraction of signature from the preprocessed scanned image of a signature that will give more accurate results  To cascade and comparison of features 9/12/2015Priyanka Pradhan 8
  • 9. 3. Literature Review 9/12/2015Priyanka Pradhan 9 Base Paper [1]Ali Karounia , Bassam Dayab, Samia Bahlakb,” Offline signature recognition using neural networks approach”. 1877-0509, Published by Elsevier Ltd(Dec. 2011)[8].  In this paper, a method for Offline Verification of signatures is presented using a set of simple shape based geometric features. The features that are used are Area, Center of gravity, Eccentricity, Kurtosis and Skewness. Before extracting the features, preprocessing of a scanned image is necessary to isolate the signature part and to remove any spurious noise present.  The system is initially trained using a database of signatures obtained from those individuals whose signatures have to be authenticated by the system.
  • 10. Contd… 9/12/2015Priyanka Pradhan 10 [2]Nancy Prof. and Gulshan Goyal ,“Signature Processing in Handwritten Bank Cheque Images”. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 2 Issue: 5(May 2015)[2].  The present paper focuses on different steps including browsing a bank cheque, pre-processing, feature extraction, recognition.  Preprocessing stage includes image resizing, noise elimination, thinning etc. On the other hand feature extraction is done on the basis of gray level co- occurrence matrix .  Feature extraction stage includes contrast, homogeneity, energy, entropy, variance, sum average etc.
  • 11. Contd… 9/12/2015Priyanka Pradhan 11 [3] Harpreet Anand and Prof. D.L Bhombe,“Enhanced Signature Verification AndRecognition Using Matlab”, International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163Volume 1 Issue 4 (May 2014)[3].  In this paper offline signature verification using neural network is projected. For authentication of signature, the proposed method is based on geometrical and statistical feature extraction and then the entire database, features are trained using neural network .  The extracted features of investigation signature are compared with the previously trained features of the reference signature.
  • 12. Contd… 9/12/2015Priyanka Pradhan 12 [4]A. Vinoth, V. Sujathabai, “A Pixel Based Signature Authentication System”, International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-2, Issue-6, May 2013[6] .  In this paper, the off-line signatures is verified by taking a boundary of the entire signature and do the pixel comparison.  Signature is acquired using a scanner. Detection process is done after the data acquisition and pre-processing. Pre processing includes noise removal, grey- scale, manipulation, edge detection. Experimental results show that 50% of the accurate matching with the existing one from the data base.
  • 13. Contd… 9/12/2015Priyanka Pradhan 13 [5] Przemysław Kudłacik and Piotr Porwik, A new approach to signature recognition using the fuzzy method. Published online: The Author(s) 2012. This article is published with open access at Springerlink.com (15 August 2012)[7].  The paper presents a new fuzzy approach to off-line handwritten signature recognition. The solution is based on characteristic feature extraction. After finding signature’s center of gravity a number of lines are drawn through it at different angles.  Cross points of generated lines and signature sample, which are further grouped and sorted, are treated as the set of features.
  • 14. 4. Research Methodology Stage 1: The signature acquisition process is executed manually using scanner. Stage 2: The Pre-processing phase. After signature acquisition the sampled data is preceded for the Pre-processing phase. In pre-processing phase the images are refined by applying various operations of Digital Image Processing. Pre-Processing phase will filter the images and convert the RGB image into the gray image and then to Black & White image. The threshold Black & White image will execute the Recognition process in an efficient way. Various Pre-Processing phases will be applying on the sampled data. (b)Preprocessed Signature 9/12/2015Priyanka Pradhan 14 (a)Original Gray Scale Image
  • 15. Contd… 9/12/2015Priyanka Pradhan 15 Stage 3: After pre-processing the sampled scanned signature documents, the segmentation techniques are applied to it. Various methods for segmentation are available, some of them are:  Threshold based segmentation  Edge based segmentation  Region based segmentation  Clustering techniques  Matching Stage 4: The segmented images are then used for the feature extraction phase. Various methods for feature extraction are available, some of them are:  Global Transformation and Series Expansion  Statistical Method  Geometrical and Topological Representation
  • 16. Contd… 9/12/2015Priyanka Pradhan 16 Stage 5: At final stage, the ANN (ARTIFICIAL NEURAL NETWORK) will be used for the classification process. Various methods for classification are available, some of them are:  Hidden Markovs Model  Support Vector Machine  Artificial Neural Network (a)Supervised Learning (b)Unsupervised learning Fig 4.1: Neural network system
  • 17. 5. Proposed Approach 9/12/2015Priyanka Pradhan 17 Fig 5.1:Proposed Model
  • 18. 6. Software and Tools Used  The sampled signatures are scanned through a normal optical scanner.  For morphological operations image processing tool in MATLAB is used.  For training the neural network, a toolbox called nntool in MATLAB will be used. 9/12/2015Priyanka Pradhan 18
  • 19. 7. Expected Results  The motive of this dissertation is to design an offline signature recognition system.  The motive is to verify offline scanned signature.  The accuracy of signature recognition is targeted to > 98%. 9/12/2015Priyanka Pradhan 19
  • 20. 8. References [1] Shefali Singla and Deepinder Kaur. Signature Verification Using DTI and Guided DTI Classifiers and Digital Encryption. International Journal of Advanced Research in Computer Science and Software Engineering. Volume 5 Issue 4 ISSN: 2277 128X (May 2015). [2] Nancy Prof. and Gulshan Goyal . Signature Processing in Handwritten Bank Cheque Images. International Journal on Recent and Innovation Trends in Computing and Communication. ISSN: 2321-8169 Volume: 2 Issue: 5(May 2015). [3] Harpreet Anand and Prof. D.L Bhombe. Enhanced Signature Verification AndRecognition Using Matlab. International Journal of Innovative Research in Advanced Engineering (IJIRAE). ISSN: 2349-2163 Volume 1 Issue: 4 (May 2014) [4] Sheena, Sheena Mathew. A Study of Multimodal Biometric System. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308. Volume: 03 Special Issue: 15 | IWCPS-2014 | (Dec-2014). 9/12/2015Priyanka Pradhan 20
  • 21. Contd… [5] Harpreet Anand and Prof. D.L Bhombe. Enhanced Signature Verification And Recognition Using Matlab. International Journal of Innovative Dissertation in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Volume 1 Issue 4 (May 2014). [6] A. Vinoth, V. Sujathabai. A Pixel Based Signature Authentication System. International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075 Volume-2 Issue-6 (May 2013). [7] Przemysław Kudłacik and Piotr Porwik, A new approach to signature recognition using the fuzzy method. Published online: This article is published with open access at Springerlink.com (15 August 2012). [8] Ali Karounia , Bassam Dayab, Samia Bahlakb. Offline signature recognition using neural networks approach. 1877-0509 Published by Elsevier Ltd(Dec. 2011). 9/12/2015Priyanka Pradhan 21

Editor's Notes

  • #19: the classifiers are used for mapping the features of training set to a group of feature vector of training set. There are various approaches which can be used for the classification phase