SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
ISSN: 2278 – 1323
                                            International Journal of Advanced Research in Computer Engineering & Technology
                                                                                                Volume 1, Issue 4, June 2012



     Offline Handwritten Signature Verification using
                Associative Memory Net
                                 Tirtharaj Dash, Tanistha Nayak, Subhagata Chattopadhyay



   Abstract— Handwritten signature verification must be                       Adaptive Resonance Theory Net (ART) and Kohonen’s Self
accurate due to several legal issues. The verification mandates               Organizing Map (SOM) rely on unsupervised learning and
faster detection as well. Human eye often fails to differentiate              can store previously learned patterns. Associative Memory
accurately a very similar-looking forged signature from its
genuine version. The clarification is often a time-taking process.
                                                                              Net (AMN) updates its knowledge base through the concept
Therefore, such verification, from the computer science                       of supervised learning. Depending on target pattern, AMN
perspective, is a bi-objective optimization problem, where cost               can be Auto-AMN or Hetero-AMN. In the former type, target
functions are errors and computational time. This paper studies               is similar to the training pattern, while it is different in case of
application of Associative Memory Net (AMN) in correctly                      its counterpart. In this study, we have developed an
detecting forged signatures, fast. Here, the cost functions are               algorithm based on the principle of Auto-AMN. As signature
handled with detail parametric studies and parallel processing
using OpenMP. The algorithms are trained with the original or
                                                                              verification is a bi-objective optimization problem where
genuine signature and tested with a sample of twelve very                     lowest error should be expected with least time, parallel
similar-looking forged signatures. The study concludes that                   methods have been proposed. The parallel implementation
AMN detects forgery with accuracy 92.3%, which is                             distributes the computation work to multiple processors and
comparable to other methods cited in this paper.                              achieves the same result in a minimal CPU time. The
                                                                              verification is performed offline.
  Index Terms— Signature verification, Offline, Bi-objective
optimization, Associative Memory Net, OpenMP;
                                                                                                    II.   RELATED WORKS

                          I. INTRODUCTION                                        We have conducted a literature survey on various
                                                                              traditional and soft computing-based methods, used for
   In the developing countries, hand-written signature is the                 signature verification. The major sources of the literatures are
most commonly used biometric verification techniques [1].                     Google Scholar, Scopus, Science Direct, and IEEE Xplore.
Skillful copy of a signature is not so hard and if cannot be                  Relevant studies are briefly discussed below.
detected, several legal issues may surface up. Detecting such                    A method of signature verification using ART-1 was
a false but very similar looking signature is quite challenging               developed by [1] which resulted in an accuracy of 99.9% in
in machine intelligence research. To address this issue,                      case of skilled forgeries. This method was based on Training
various signature detection schemes are being proposed since                  and testing of the network.
couple of decades, which include both traditional approaches                     A Bayesian network representation has been proposed by
and soft computing techniques.                                                Xiao and Leedham, (2002). They proposed a decision tree
Neural Network (NN) learns patterns by examples or                            like network, where each node of the tree computes the
observations [1]. Learning can be ‘supervised’ or                             conditional probability as the chance of matching [2].
‘unsupervised’. Adaptive Linear Net (ADALIN), Multiple                           Displacement extraction method has been proposed for
ADALIN (MADALIN), Perceptron Network, Radial Basis                            offline signature verification. In this work, the authors have
Function Net (RBFN) etc. are some important examples of                       extracted a displacement function between a pair of
supervised learning methods. These NNs learn faster and                       signatures, original and fake. The study concludes that the
accurately, but the problem with these is that, new training is               average accuracy rate of detection is around 75% [3].
required each time it learns new input patterns and as a result,                 In the year 2005, Kholmatov and Yanikoglu presented an
                                                                              online signature recognition scheme using Dynamic Time
the previously learned patterns are lost. On the other hand,
                                                                              Warping (DTW) and three dimensional feature vectors. The
networks, such as Counter Propagation Network (CPN),
                                                                              overall accuracy rate of the method was 98.6%. The authors
                                                                              have used and [4].
                                                                                 Optimal function of features was used for online
    Manuscript received May, 2012.                                            verification [5]. In this work, the authors first choose a
     Tirtharaj Dash, Dept. of Information Technology, National Institute of
Science and Technology, Berhampur, India, Mob: 09853190787 (e-mail:           candidate function and optimized it to produce an optimal
tirtharajnist446@gmail.com).                                                  function. Basically the optimization was done using well
    Tanistha Nayak, Dept. of Information Technology, National Institute of    known Genetic Algorithm (GA). The error rate in this work
Science and Technology, Berhampur, India, Mob: 09692882373 (e-mail:           was only 0.1%.
tanisthanist213@gmail.com).
    Subhagata Chattopadhyay, Dept. of Computer Science and Engineering,          Cooperating NN was used for offline signature
National Institute of Science and Technology, Berhampur, India (e-mail:       verification. The features used in this work were geometrical
subhagatachatterjee@yahoo.com).

                                                                                                                                             370
                                                      All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                                     International Journal of Advanced Research in Computer Engineering & Technology
                                                                                         Volume 1, Issue 4, June 2012

parameters, outline and image of the signature. The accuracy     3.1. Serial Implementation of the Network
rate in this work was 96% [6].
                                                                 Our developed algorithm for the approach and the training of
   Wavelet thinning features were used for offline signature
                                                                 the AMN network is given below. It will be wise to mention
verification using Matching Algorithm. Similarity
                                                                 that training of the AMN had been done with the genuine
measurement was evaluated using Euclidean distance of all
                                                                 sample only.
found corresponding feature points. The accuracy in this case
was 81.4% [7].                                                   INITIALIZE weight (W) to 0
   Hidden Markov Model (HMM) was successfully used for           INPUT the original sign. to the first layer
signature verification. It was performed by analysis of          of AMN
alphabets within the signature. According to this model, a
signature is collection of vectors related each point in its     FOR i=1 to n
outline. The average accuracy rate was 88.9% in this case [8].   DO
   The method using distance statistics yielded an accuracy        FOR j=1 to n
of 78% for verification and 93% for signature identification       DO
[9].                                                                   Calculate the weight as
A combination of shape contexts and local features were used           Wij(new)=Wij (old) + INPUTi×TARGETj
                                                                   END //end of for loop on j
for online signature verification.
                                                                 END //end of for loop on i
   However, DTW technique was also used for elastic
matching between signatures. The proposed method
                                                                 FOR i=1 to n
suggested that by combining local features with shape            DO
contexts the performance of the algorithm could be                 FOR j=1 to n
increased. The average error rate in this work was 6.77%           DO
[10].                                                                  Calculate the net                  input   to   each
                                                                       output node as,
                    III. METHODOLOGY                                           n

   A step-wise method has been followed in this work. The
                                                                      Yinj=   x W
                                                                              i 1
                                                                                     i   ij

steps include:                                                     IF(Yinj>0)
   Step-1: Collection of the signature samples (Original as          Yj=+1;
well as Forgeries)                                                 ELSE
   Step-2: Feature Extraction                                        Yj=-1;
   Step-3: Implementation of AMN in ‘C’ language                        END //end of for loop on j
   Step-4: Training of the networks with genuine signatures      END //end of FOR loop on i
   Step-5: Testing of the developed AMN                          The structure of AMN and its training method is represented
                                                                 in Figure-2.
Step-1: Collection of Signature samples
Original signature is produced at first and then forged
signature samples are collected from twelve different persons
at different times (refer to Appendix-I). Each person has been
given ample time (10 days each) to enable copying the
original signature with almost no visually detectable
mistakes. All signatures are then saved into BMP files of
size: 200×63dpi with Bit depth as 4. The signature templates
are shown in Appendix-I.                                                 Figure-2 Structure of AMN and its training
                                                                 3.2. Parallel Implementation of the Networks
Step-2: Feature Extraction
A user-defined image function in C-Program is used for             We developed parallel version of all the above algorithms
extraction of pixels from the BMP files [11]. The method of      using OpenMP (www.openmp.org). By doing this, three
feature extraction is given in Figure-1.                         major things could be achieved;
                                                                    i. Reduction in computation time,
                                                                    ii. Utilization of all the processor of the system
                                                                    iii. Inherent parallelism property of NN could be used.

                                                                 The function used to calculate the time details in Sequential
                                                                 implementation is clock() and in parallel implementation is
Figure-1 Feature Extraction using our C-program                  omp_get_wtime(). The header file used in the parallel
                                                                 programming is omp.h. [12]
A sample pixel value of a signature is given in Appendix-II.
                                                                 3.3. System architecture specification
Step-3: Implementation of AMN and its Trainings


                                                                                                                          371
                                            All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                                      International Journal of Advanced Research in Computer Engineering & Technology
                                                                                          Volume 1, Issue 4, June 2012

The implementation (both Serial and parallel) are carried out                  Forged8              29.08         Reject              12.08             4.33
in a system having Intel Quad Core Processor with 4GB                          Forged9              31.02         Reject              12.69             4.54
RAM having a processor speed of 2.10GHz. The operating                         Forged10             29.09         Reject              6.304             2.00
system used is Linux (Ubuntu Version 11.10). It is                             Forged11             21.57         Accept               7.91             2.89
mentioned that the package used for parallel processing is the                 Forged12             22.09         Accept              14.52             4.83
OpenMP 3.0.
                                                                      Looking at the mismatch results of AMN from Table-1, it
Step-4: Testing of the developed AMN
                                                                   can be said that the network is performing better for all the
The developed and trained AMN network was then trained             forged signatures (Forged 1-10). But the network is rejecting
with 12 samples of Forged signatures (Refer Fig.2).                the original signature itself (See Test case-1 of Table-1). The
                                                                   network is also accepting two of the forged signatures,
4.1. Calculation of mismatch                                       Forged-11 and Forged-12. The happened due to setting of the
   The numbers of YJ which are -1 are counted (count) (see         mismatch threshold to 25%.
Section 3.1). The mismatch percentage can be calculated               However, the average time taken by the serial algorithm is
using the following Equation-1.                                    9.85 seconds where as the parallel algorithm takes only 2.98
                                                                   seconds.
Mismatch = [count/Total Number of Pixels] × 100             (1)
                                                                     C. Acceptance accuracy of each forged signature
4.2. Setting the threshold of mismatch
   Threshold is the minimum mismatch percentage after                  A plot has been given in Figure-3 to see which one of the
which the tested signature could be termed as illegal. As the      forged signatures sample is getting verified with highest
key task behind this work is to impose stricter security and       accuracy.
                                                                                   80
safety applications, we set the threshold as low as 25% to
avoid acceptance of skilled forgeries. It is important to note                     70
that, such threshold setting must be situation specific and the
choice of the administrator/user [13].                                             60

                                                                                   50
                                                                   Mismatch --->




              IV. RESULTS AND DISCUSSIONS
  The contribution of our work can be outlined as;                                 40

development of an algorithm for signature verification
                                                                                   30
scheme using AMN neural network. It is wise to note that all
the implementation is carried out using both serial and                            20
parallel processing techniques. In this paper, study on
                                                                                   10
signature area and its affect on computation time is provided.
  A. Performance of AMN Technique                                                   0
                                                                                        1   2   3      4    5     6        7      8    9      10   11     12
                                                                                                                Test cases --->
   It should be noted that the AMN network implemented
here is auto-associative. The reason is that the forged            Figure-3 Accuracy achieve by the algorithm for each forged
signature will be checked with the genuine version of itself.                             signatures
So the network becomes more complex due to increase in
pixels of the signature image. AMN is a two layer NN with          Overall accuracy can be calculated as the number of correctly
the first layer being the pixels values of the forged signatures   recognized sample test cases to the total number of test cases
and second layer contains the pixel nodes from the original        multiplied by 100. In our study, the accuracy is found to be
signature.                                                         92.3%.

  B. Mismatch results of AMN Network
                                                                     D. Forged Signature versus Computation time plot
   The result in Table-1 gives the performance of our
algorithm for signature verification using AMN.                        A plot is given in Figure-4 showing CPU utilization time
                                                                   for AMN to recognize each of the forged signature samples.
         Table-1 Result of execution of Test cases
 Test Case Mismatc                    Computation Time
 (Original       h         Decision         (seconds)
    vs.)        (%)                    Serial    Parallel
  Original     21.31        Accept      6.15       1.98
  Forged1      29.29        Reject       7.9       2.44
  Forged2      28.92        Reject       8.8       2.67
  Forged3      29.86        Reject     12.06       3.38
  Forged4      28.21        Reject      7.13       1.80
  Forged5      28.44        Reject     10.24       2.87
  Forged6      28.67        Reject     10.85       2.10
  Forged7      29.65        Reject     11.46       3.02

                                                                                                                                                               372
                                              All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                                                                     International Journal of Advanced Research in Computer Engineering & Technology
                                                                                                                         Volume 1, Issue 4, June 2012

                        15                                                                                                                APPENDIX-I
                                                                                           Serial
                        14
                                                                                           Parallel

                        12
Computation time --->




                        10

                         8

                         6

                         4

                         2

                         0
                          0   1   2    3   4        5        6       7       8    9   10    11        12
                                               Forged Signature samples --->

                         Figure-4 Time taken by algorithm to detect each forged
                                              signatures

  E. Comparison of our algorithm with other methods
   Table-2 shows the standing of our method in the team of
other methods proposed for signature verification.

                         Table-2 Comparative analysis of different methods of
                                           signature verification
                                                                 Yea  Accurac
                        Method
                                                                 r    y
                        ART-1[1]                                 2012 99.9%                                                             APPENDIX-II
                        Displacement Extraction Method[3] 2002 75%
                        DTW and 3D feature vector[4]             2005 98.6%                                15 15 15 15 15 15 15 15 15 15 15 15 8 7 7 0 0 0 0 0 0 0 0 0 0
                        GA and Optimal Function[5]               2004 99.9                                 0 7 15 15 15 15 15 15 15 15 15 15 15 15 15
                        Co-operative NN[6]                       1994 96%                                                               …
                        Matching Algorithm[7]                    2007 81.4%                                15 15 15 15 15 15 15 15 15 15 15 15 15 15 15 15 15 15 15 15
                        Hidden Markov Model[8]                   1994 88.9%                                8 0 0 0 0 0 7 15 15 15 15 15 15 15 15 15 15
                        Distance statistics[9]                   2004 78%
                        DTW[10]                                  2006 93.23                                                                REFERENCES
                        Associative Memory Net (this work) 2012 92.3%
                                                                                                           [1]   Dash T., Nayak T., Chattopadhyay S., Offline Verification of Hand
                                                                                                                 Written Signature Using Adaptive Resonance Theory Net (Type-1),
                                  V. CONCLUSION AND FUTURE WORK                                                  in Proc: IEEE Int. Conf. Electronics Computer Technology (ICECT)
                                                                                                                 (2012), Volume 2, pp. 205-210.
   In this paper, we proposed a neural network based
                                                                                                           [2]   Xiao X., Leedham G., Signature verification using a modified Bayesian
technique for offline hand-written signature verification. The                                                   network, Pattern Recognition (2002) Volume 35, 983-995.
method has been optimized with respect to accuracy and                                                     [3]   Mizukami Y., Yoshimura M., Miike H., Yoshimura I., An off-line
computation time. We proposed two versions of the                                                                signature verification system using an extracted displacement function,
algorithm, serial and parallel. The study revealed that our                                                      Pattern Recognition Letters (2002), Volume 23, 1569-1577.
algorithm takes an average of 9.58 seconds in serial and 2.98                                              [4]   Kholmatov A., B. Yanikoglu, Identity authentication using improved
seconds in parallel to give a detection accuracy of 92.3%.                                                       online signature verification method, Pattern Recognition Letters
                                                                                                                 (2005), Volume 26, 1400-2408.
The error threshold is set to 25% in this work to make
                                                                                                           [5]   Romo J.C.M., Silva R.A., Optimal Prototype functions of features for
decision.
                                                                                                                 online signature verification, International Journal of Pattern
   It is important to mention that in this work we have tested
                                                                                                                 Recognition and Artificial Intelligence, Volume: 18, Issue: 7(2004) pp.
our algorithms on a sample of only twelve forged signatures.                                                     1189-1206.
It will be impressive to test the algorithms with more training                                            [6]   Cardot H., Revenu M., Victorri B., Revillet M.J., A static signature
and test cases and then develop a GUI for the applications to                                                    verification system based on cooperating neural networks architecture,
make it user friendly tool.                                                                                      International Journal of Pattern Recognition and Artificial
                                                                                                                 Intelligence, Volume 8, Issue 3(1994) pp. 679-692.
                                                                                                           [7]   Fang B., You X., Chen W.S., Tang Y.Y., Matching algorithm using
                                                                                                                 wavelet thinning features for offline signature verification,
                                                                                                                 International Journal of Pattern Recognition and Artificial
                                                                                                                 Intelligence, Volume 5, Issue: 1(2007) pp. 27-38.
                                                                                                           [8]   Inglis S., Witten I.H., Compression-based Template Matching, in proc:
                                                                                                                 IEEE Data Compression Conference (1994), pp. 106-115.


                                                                                                                                                                                   373
                                                                                 All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                                               International Journal of Advanced Research in Computer Engineering & Technology
                                                                                                   Volume 1, Issue 4, June 2012

[9]   Kalera M.K., Srihari S., Xu A., Offline signature verification and
      identification using distance statistics, International Journal of Pattern
      Recognition and Artificial Intelligence, Volume 18, 7(2004) pp.
      1339-1360.
[10] Li B., Zhang D., Wang K., Online signature verification by combining
      shape contexts and local features, International Journal of Pattern
      Recognition and Artificial Intelligence, Volume 6, Issue 3 (2006) pp.
      407-420.
[11] Dash, T., Nayak T. A Java Based Tool for Basic Image Processing
      and Edge Detection, Journal of Global Research in Computer Science,
      Volume 3, Issue 5 (2012) pp. 57-60.
[12] Chandra R., Dagum L., Kohr D., Maydan D., McDonald J., Menon R.,
      Parallel programming in OpenMP, Morgan Kaufmann Publisher
      (2001).
[13] Chattopadhyay S., Banerjee S., Rabhi F.A, Acharya R. U. A
      Case-based Reasoning System for Complex Medical Diagnoses.
      Expert Systems: the Journal of Knowledge Engineering (2012);
      DOI: 10.1111/j.1468-0394.2012.00618.x (in press).
Tirtharaj Dash and Tanistha Nayak are the B.Tech. final year students, in
the Dept. of Information Technology at NIST, India. Soft computing, Parallel
computing, and Algorithm are their key research interests. They have
published five research papers.
Dr. Subhagata Chattopadhyay is a full professor in the Department of
Computer Science and Engineering at National Institute of Science and
Technology, Berhampur. He received his PhD in Information Technology
from IIT, Kharagpur and Postdoctoral fellowship in e-Health Information
Systems at Australian School of Business, the University of New South
Wales (UNSW) Sydney Australia. He has published over 80 research papers
in the field of Soft computing, Pattern recognition and AI.




                                                                                                                           374
                                                          All Rights Reserved © 2012 IJARCET

Weitere ähnliche Inhalte

Was ist angesagt?

Hand Written Character Recognition Using Neural Networks
Hand Written Character Recognition Using Neural Networks Hand Written Character Recognition Using Neural Networks
Hand Written Character Recognition Using Neural Networks
Chiranjeevi Adi
 
Project report - Bengali digit recongnition using SVM
Project report - Bengali digit recongnition using SVMProject report - Bengali digit recongnition using SVM
Project report - Bengali digit recongnition using SVM
Mohammad Saiful Islam
 
Devanagari Character Recognition
Devanagari Character RecognitionDevanagari Character Recognition
Devanagari Character Recognition
Pulkit Goyal
 

Was ist angesagt? (20)

IRJET- Deep Learning Techniques for Object Detection
IRJET-  	  Deep Learning Techniques for Object DetectionIRJET-  	  Deep Learning Techniques for Object Detection
IRJET- Deep Learning Techniques for Object Detection
 
Handwritten character recognition in
Handwritten character recognition inHandwritten character recognition in
Handwritten character recognition in
 
Recognition of handwritten digits using rbf neural network
Recognition of handwritten digits using rbf neural networkRecognition of handwritten digits using rbf neural network
Recognition of handwritten digits using rbf neural network
 
Off-line English Character Recognition: A Comparative Survey
Off-line English Character Recognition: A Comparative SurveyOff-line English Character Recognition: A Comparative Survey
Off-line English Character Recognition: A Comparative Survey
 
Character recognition project
Character recognition projectCharacter recognition project
Character recognition project
 
Hand Written Character Recognition Using Neural Networks
Hand Written Character Recognition Using Neural Networks Hand Written Character Recognition Using Neural Networks
Hand Written Character Recognition Using Neural Networks
 
A Novel Classification via Clustering Method for Anomaly Based Network Intrus...
A Novel Classification via Clustering Method for Anomaly Based Network Intrus...A Novel Classification via Clustering Method for Anomaly Based Network Intrus...
A Novel Classification via Clustering Method for Anomaly Based Network Intrus...
 
A Comprehensive Study On Handwritten Character Recognition System
A Comprehensive Study On Handwritten Character Recognition SystemA Comprehensive Study On Handwritten Character Recognition System
A Comprehensive Study On Handwritten Character Recognition System
 
Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...
 
Project report - Bengali digit recongnition using SVM
Project report - Bengali digit recongnition using SVMProject report - Bengali digit recongnition using SVM
Project report - Bengali digit recongnition using SVM
 
Handwriting identification using deep convolutional neural network method
Handwriting identification using deep convolutional neural network methodHandwriting identification using deep convolutional neural network method
Handwriting identification using deep convolutional neural network method
 
Handwritten digit recognition using image processing
Handwritten digit recognition using image processing Handwritten digit recognition using image processing
Handwritten digit recognition using image processing
 
Seminar5
Seminar5Seminar5
Seminar5
 
IRJET- Image to Text Conversion using Tesseract
IRJET-  	  Image to Text Conversion using TesseractIRJET-  	  Image to Text Conversion using Tesseract
IRJET- Image to Text Conversion using Tesseract
 
Representation and recognition of handwirten digits using deformable templates
Representation and recognition of handwirten digits using deformable templatesRepresentation and recognition of handwirten digits using deformable templates
Representation and recognition of handwirten digits using deformable templates
 
AN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODEL
AN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODELAN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODEL
AN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODEL
 
Yolinda chiramba Survey Paper
Yolinda chiramba Survey PaperYolinda chiramba Survey Paper
Yolinda chiramba Survey Paper
 
An offline signature recognition and verification system based on neural network
An offline signature recognition and verification system based on neural networkAn offline signature recognition and verification system based on neural network
An offline signature recognition and verification system based on neural network
 
character recognition: Scope and challenges
 character recognition: Scope and challenges character recognition: Scope and challenges
character recognition: Scope and challenges
 
Devanagari Character Recognition
Devanagari Character RecognitionDevanagari Character Recognition
Devanagari Character Recognition
 

Andere mochten auch (9)

92 97
92 9792 97
92 97
 
13 48-1-pb
13 48-1-pb13 48-1-pb
13 48-1-pb
 
167 169
167 169167 169
167 169
 
341 345
341 345341 345
341 345
 
Pdf
PdfPdf
Pdf
 
51 54
51 5451 54
51 54
 
17 51-1-pb
17 51-1-pb17 51-1-pb
17 51-1-pb
 
346 351
346 351346 351
346 351
 
182 185
182 185182 185
182 185
 

Ähnlich wie 370 374

Exploring and comparing various machine and deep learning technique algorithm...
Exploring and comparing various machine and deep learning technique algorithm...Exploring and comparing various machine and deep learning technique algorithm...
Exploring and comparing various machine and deep learning technique algorithm...
CSITiaesprime
 
COPYRIGHTThis thesis is copyright materials protected under the .docx
COPYRIGHTThis thesis is copyright materials protected under the .docxCOPYRIGHTThis thesis is copyright materials protected under the .docx
COPYRIGHTThis thesis is copyright materials protected under the .docx
voversbyobersby
 
Signature verification based on proposed fast hyper deep neural network
Signature verification based on proposed fast hyper deep neural networkSignature verification based on proposed fast hyper deep neural network
Signature verification based on proposed fast hyper deep neural network
IAESIJAI
 
A Fast and Accurate Palmprint Identification System based on Consistency Orie...
A Fast and Accurate Palmprint Identification System based on Consistency Orie...A Fast and Accurate Palmprint Identification System based on Consistency Orie...
A Fast and Accurate Palmprint Identification System based on Consistency Orie...
IJTET Journal
 

Ähnlich wie 370 374 (20)

Exploring and comparing various machine and deep learning technique algorithm...
Exploring and comparing various machine and deep learning technique algorithm...Exploring and comparing various machine and deep learning technique algorithm...
Exploring and comparing various machine and deep learning technique algorithm...
 
IRJET- Hand Sign Recognition using Convolutional Neural Network
IRJET- Hand Sign Recognition using Convolutional Neural NetworkIRJET- Hand Sign Recognition using Convolutional Neural Network
IRJET- Hand Sign Recognition using Convolutional Neural Network
 
Handwritten Digit Recognition Using CNN
Handwritten Digit Recognition Using CNNHandwritten Digit Recognition Using CNN
Handwritten Digit Recognition Using CNN
 
COPYRIGHTThis thesis is copyright materials protected under the .docx
COPYRIGHTThis thesis is copyright materials protected under the .docxCOPYRIGHTThis thesis is copyright materials protected under the .docx
COPYRIGHTThis thesis is copyright materials protected under the .docx
 
Handwritten digit recognition using quantum convolution neural network
Handwritten digit recognition using quantum convolution neural networkHandwritten digit recognition using quantum convolution neural network
Handwritten digit recognition using quantum convolution neural network
 
Pattern Recognition using Artificial Neural Network
Pattern Recognition using Artificial Neural NetworkPattern Recognition using Artificial Neural Network
Pattern Recognition using Artificial Neural Network
 
Tifinagh handwritten character recognition using optimized convolutional neu...
Tifinagh handwritten character recognition using optimized  convolutional neu...Tifinagh handwritten character recognition using optimized  convolutional neu...
Tifinagh handwritten character recognition using optimized convolutional neu...
 
Handwritten digit and symbol recognition using CNN.pptx
Handwritten digit and symbol recognition using CNN.pptxHandwritten digit and symbol recognition using CNN.pptx
Handwritten digit and symbol recognition using CNN.pptx
 
88 92
88 9288 92
88 92
 
Signature verification based on proposed fast hyper deep neural network
Signature verification based on proposed fast hyper deep neural networkSignature verification based on proposed fast hyper deep neural network
Signature verification based on proposed fast hyper deep neural network
 
IRJET- Spot Me - A Smart Attendance System based on Face Recognition
IRJET- Spot Me - A Smart Attendance System based on Face RecognitionIRJET- Spot Me - A Smart Attendance System based on Face Recognition
IRJET- Spot Me - A Smart Attendance System based on Face Recognition
 
Palm print recognition based on harmony search algorithm
Palm print recognition based on harmony search algorithm  Palm print recognition based on harmony search algorithm
Palm print recognition based on harmony search algorithm
 
IRJET- Survey on Shoulder Surfing Resistant Pin Entry by using Base Pin a...
IRJET-  	  Survey on Shoulder Surfing Resistant Pin Entry by using Base Pin a...IRJET-  	  Survey on Shoulder Surfing Resistant Pin Entry by using Base Pin a...
IRJET- Survey on Shoulder Surfing Resistant Pin Entry by using Base Pin a...
 
Tamil Character Recognition based on Back Propagation Neural Networks
Tamil Character Recognition based on Back Propagation Neural NetworksTamil Character Recognition based on Back Propagation Neural Networks
Tamil Character Recognition based on Back Propagation Neural Networks
 
A Fast and Accurate Palmprint Identification System based on Consistency Orie...
A Fast and Accurate Palmprint Identification System based on Consistency Orie...A Fast and Accurate Palmprint Identification System based on Consistency Orie...
A Fast and Accurate Palmprint Identification System based on Consistency Orie...
 
DYNAMIC NETWORK ANOMALY INTRUSION DETECTION USING MODIFIED SOM
DYNAMIC NETWORK ANOMALY INTRUSION DETECTION USING MODIFIED SOMDYNAMIC NETWORK ANOMALY INTRUSION DETECTION USING MODIFIED SOM
DYNAMIC NETWORK ANOMALY INTRUSION DETECTION USING MODIFIED SOM
 
Automatic signature verification with chain code using weighted distance and ...
Automatic signature verification with chain code using weighted distance and ...Automatic signature verification with chain code using weighted distance and ...
Automatic signature verification with chain code using weighted distance and ...
 
A Review on Natural Scene Text Understanding for Computer Vision using Machin...
A Review on Natural Scene Text Understanding for Computer Vision using Machin...A Review on Natural Scene Text Understanding for Computer Vision using Machin...
A Review on Natural Scene Text Understanding for Computer Vision using Machin...
 
A Literature Review on Plagiarism Detection in Computer Programming Assignments
A Literature Review on Plagiarism Detection in Computer Programming AssignmentsA Literature Review on Plagiarism Detection in Computer Programming Assignments
A Literature Review on Plagiarism Detection in Computer Programming Assignments
 
IRJET- Automated Detection of Gender from Face Images
IRJET-  	  Automated Detection of Gender from Face ImagesIRJET-  	  Automated Detection of Gender from Face Images
IRJET- Automated Detection of Gender from Face Images
 

Mehr von Editor IJARCET

Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
Editor IJARCET
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
Editor IJARCET
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
Editor IJARCET
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
Editor IJARCET
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
Editor IJARCET
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
Editor IJARCET
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
Editor IJARCET
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
Editor IJARCET
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
Editor IJARCET
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
Editor IJARCET
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
Editor IJARCET
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
Editor IJARCET
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
Editor IJARCET
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
Editor IJARCET
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
Editor IJARCET
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
Editor IJARCET
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
Editor IJARCET
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
Editor IJARCET
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
Editor IJARCET
 

Mehr von Editor IJARCET (20)

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Kürzlich hochgeladen (20)

Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 

370 374

  • 1. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 Offline Handwritten Signature Verification using Associative Memory Net Tirtharaj Dash, Tanistha Nayak, Subhagata Chattopadhyay  Abstract— Handwritten signature verification must be Adaptive Resonance Theory Net (ART) and Kohonen’s Self accurate due to several legal issues. The verification mandates Organizing Map (SOM) rely on unsupervised learning and faster detection as well. Human eye often fails to differentiate can store previously learned patterns. Associative Memory accurately a very similar-looking forged signature from its genuine version. The clarification is often a time-taking process. Net (AMN) updates its knowledge base through the concept Therefore, such verification, from the computer science of supervised learning. Depending on target pattern, AMN perspective, is a bi-objective optimization problem, where cost can be Auto-AMN or Hetero-AMN. In the former type, target functions are errors and computational time. This paper studies is similar to the training pattern, while it is different in case of application of Associative Memory Net (AMN) in correctly its counterpart. In this study, we have developed an detecting forged signatures, fast. Here, the cost functions are algorithm based on the principle of Auto-AMN. As signature handled with detail parametric studies and parallel processing using OpenMP. The algorithms are trained with the original or verification is a bi-objective optimization problem where genuine signature and tested with a sample of twelve very lowest error should be expected with least time, parallel similar-looking forged signatures. The study concludes that methods have been proposed. The parallel implementation AMN detects forgery with accuracy 92.3%, which is distributes the computation work to multiple processors and comparable to other methods cited in this paper. achieves the same result in a minimal CPU time. The verification is performed offline. Index Terms— Signature verification, Offline, Bi-objective optimization, Associative Memory Net, OpenMP; II. RELATED WORKS I. INTRODUCTION We have conducted a literature survey on various traditional and soft computing-based methods, used for In the developing countries, hand-written signature is the signature verification. The major sources of the literatures are most commonly used biometric verification techniques [1]. Google Scholar, Scopus, Science Direct, and IEEE Xplore. Skillful copy of a signature is not so hard and if cannot be Relevant studies are briefly discussed below. detected, several legal issues may surface up. Detecting such A method of signature verification using ART-1 was a false but very similar looking signature is quite challenging developed by [1] which resulted in an accuracy of 99.9% in in machine intelligence research. To address this issue, case of skilled forgeries. This method was based on Training various signature detection schemes are being proposed since and testing of the network. couple of decades, which include both traditional approaches A Bayesian network representation has been proposed by and soft computing techniques. Xiao and Leedham, (2002). They proposed a decision tree Neural Network (NN) learns patterns by examples or like network, where each node of the tree computes the observations [1]. Learning can be ‘supervised’ or conditional probability as the chance of matching [2]. ‘unsupervised’. Adaptive Linear Net (ADALIN), Multiple Displacement extraction method has been proposed for ADALIN (MADALIN), Perceptron Network, Radial Basis offline signature verification. In this work, the authors have Function Net (RBFN) etc. are some important examples of extracted a displacement function between a pair of supervised learning methods. These NNs learn faster and signatures, original and fake. The study concludes that the accurately, but the problem with these is that, new training is average accuracy rate of detection is around 75% [3]. required each time it learns new input patterns and as a result, In the year 2005, Kholmatov and Yanikoglu presented an online signature recognition scheme using Dynamic Time the previously learned patterns are lost. On the other hand, Warping (DTW) and three dimensional feature vectors. The networks, such as Counter Propagation Network (CPN), overall accuracy rate of the method was 98.6%. The authors have used and [4]. Optimal function of features was used for online Manuscript received May, 2012. verification [5]. In this work, the authors first choose a Tirtharaj Dash, Dept. of Information Technology, National Institute of Science and Technology, Berhampur, India, Mob: 09853190787 (e-mail: candidate function and optimized it to produce an optimal tirtharajnist446@gmail.com). function. Basically the optimization was done using well Tanistha Nayak, Dept. of Information Technology, National Institute of known Genetic Algorithm (GA). The error rate in this work Science and Technology, Berhampur, India, Mob: 09692882373 (e-mail: was only 0.1%. tanisthanist213@gmail.com). Subhagata Chattopadhyay, Dept. of Computer Science and Engineering, Cooperating NN was used for offline signature National Institute of Science and Technology, Berhampur, India (e-mail: verification. The features used in this work were geometrical subhagatachatterjee@yahoo.com). 370 All Rights Reserved © 2012 IJARCET
  • 2. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 parameters, outline and image of the signature. The accuracy 3.1. Serial Implementation of the Network rate in this work was 96% [6]. Our developed algorithm for the approach and the training of Wavelet thinning features were used for offline signature the AMN network is given below. It will be wise to mention verification using Matching Algorithm. Similarity that training of the AMN had been done with the genuine measurement was evaluated using Euclidean distance of all sample only. found corresponding feature points. The accuracy in this case was 81.4% [7]. INITIALIZE weight (W) to 0 Hidden Markov Model (HMM) was successfully used for INPUT the original sign. to the first layer signature verification. It was performed by analysis of of AMN alphabets within the signature. According to this model, a signature is collection of vectors related each point in its FOR i=1 to n outline. The average accuracy rate was 88.9% in this case [8]. DO The method using distance statistics yielded an accuracy FOR j=1 to n of 78% for verification and 93% for signature identification DO [9]. Calculate the weight as A combination of shape contexts and local features were used Wij(new)=Wij (old) + INPUTi×TARGETj END //end of for loop on j for online signature verification. END //end of for loop on i However, DTW technique was also used for elastic matching between signatures. The proposed method FOR i=1 to n suggested that by combining local features with shape DO contexts the performance of the algorithm could be FOR j=1 to n increased. The average error rate in this work was 6.77% DO [10]. Calculate the net input to each output node as, III. METHODOLOGY n A step-wise method has been followed in this work. The Yinj= x W i 1 i ij steps include: IF(Yinj>0) Step-1: Collection of the signature samples (Original as Yj=+1; well as Forgeries) ELSE Step-2: Feature Extraction Yj=-1; Step-3: Implementation of AMN in ‘C’ language END //end of for loop on j Step-4: Training of the networks with genuine signatures END //end of FOR loop on i Step-5: Testing of the developed AMN The structure of AMN and its training method is represented in Figure-2. Step-1: Collection of Signature samples Original signature is produced at first and then forged signature samples are collected from twelve different persons at different times (refer to Appendix-I). Each person has been given ample time (10 days each) to enable copying the original signature with almost no visually detectable mistakes. All signatures are then saved into BMP files of size: 200×63dpi with Bit depth as 4. The signature templates are shown in Appendix-I. Figure-2 Structure of AMN and its training 3.2. Parallel Implementation of the Networks Step-2: Feature Extraction A user-defined image function in C-Program is used for We developed parallel version of all the above algorithms extraction of pixels from the BMP files [11]. The method of using OpenMP (www.openmp.org). By doing this, three feature extraction is given in Figure-1. major things could be achieved; i. Reduction in computation time, ii. Utilization of all the processor of the system iii. Inherent parallelism property of NN could be used. The function used to calculate the time details in Sequential implementation is clock() and in parallel implementation is Figure-1 Feature Extraction using our C-program omp_get_wtime(). The header file used in the parallel programming is omp.h. [12] A sample pixel value of a signature is given in Appendix-II. 3.3. System architecture specification Step-3: Implementation of AMN and its Trainings 371 All Rights Reserved © 2012 IJARCET
  • 3. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 The implementation (both Serial and parallel) are carried out Forged8 29.08 Reject 12.08 4.33 in a system having Intel Quad Core Processor with 4GB Forged9 31.02 Reject 12.69 4.54 RAM having a processor speed of 2.10GHz. The operating Forged10 29.09 Reject 6.304 2.00 system used is Linux (Ubuntu Version 11.10). It is Forged11 21.57 Accept 7.91 2.89 mentioned that the package used for parallel processing is the Forged12 22.09 Accept 14.52 4.83 OpenMP 3.0. Looking at the mismatch results of AMN from Table-1, it Step-4: Testing of the developed AMN can be said that the network is performing better for all the The developed and trained AMN network was then trained forged signatures (Forged 1-10). But the network is rejecting with 12 samples of Forged signatures (Refer Fig.2). the original signature itself (See Test case-1 of Table-1). The network is also accepting two of the forged signatures, 4.1. Calculation of mismatch Forged-11 and Forged-12. The happened due to setting of the The numbers of YJ which are -1 are counted (count) (see mismatch threshold to 25%. Section 3.1). The mismatch percentage can be calculated However, the average time taken by the serial algorithm is using the following Equation-1. 9.85 seconds where as the parallel algorithm takes only 2.98 seconds. Mismatch = [count/Total Number of Pixels] × 100 (1) C. Acceptance accuracy of each forged signature 4.2. Setting the threshold of mismatch Threshold is the minimum mismatch percentage after A plot has been given in Figure-3 to see which one of the which the tested signature could be termed as illegal. As the forged signatures sample is getting verified with highest key task behind this work is to impose stricter security and accuracy. 80 safety applications, we set the threshold as low as 25% to avoid acceptance of skilled forgeries. It is important to note 70 that, such threshold setting must be situation specific and the choice of the administrator/user [13]. 60 50 Mismatch ---> IV. RESULTS AND DISCUSSIONS The contribution of our work can be outlined as; 40 development of an algorithm for signature verification 30 scheme using AMN neural network. It is wise to note that all the implementation is carried out using both serial and 20 parallel processing techniques. In this paper, study on 10 signature area and its affect on computation time is provided. A. Performance of AMN Technique 0 1 2 3 4 5 6 7 8 9 10 11 12 Test cases ---> It should be noted that the AMN network implemented here is auto-associative. The reason is that the forged Figure-3 Accuracy achieve by the algorithm for each forged signature will be checked with the genuine version of itself. signatures So the network becomes more complex due to increase in pixels of the signature image. AMN is a two layer NN with Overall accuracy can be calculated as the number of correctly the first layer being the pixels values of the forged signatures recognized sample test cases to the total number of test cases and second layer contains the pixel nodes from the original multiplied by 100. In our study, the accuracy is found to be signature. 92.3%. B. Mismatch results of AMN Network D. Forged Signature versus Computation time plot The result in Table-1 gives the performance of our algorithm for signature verification using AMN. A plot is given in Figure-4 showing CPU utilization time for AMN to recognize each of the forged signature samples. Table-1 Result of execution of Test cases Test Case Mismatc Computation Time (Original h Decision (seconds) vs.) (%) Serial Parallel Original 21.31 Accept 6.15 1.98 Forged1 29.29 Reject 7.9 2.44 Forged2 28.92 Reject 8.8 2.67 Forged3 29.86 Reject 12.06 3.38 Forged4 28.21 Reject 7.13 1.80 Forged5 28.44 Reject 10.24 2.87 Forged6 28.67 Reject 10.85 2.10 Forged7 29.65 Reject 11.46 3.02 372 All Rights Reserved © 2012 IJARCET
  • 4. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 15 APPENDIX-I Serial 14 Parallel 12 Computation time ---> 10 8 6 4 2 0 0 1 2 3 4 5 6 7 8 9 10 11 12 Forged Signature samples ---> Figure-4 Time taken by algorithm to detect each forged signatures E. Comparison of our algorithm with other methods Table-2 shows the standing of our method in the team of other methods proposed for signature verification. Table-2 Comparative analysis of different methods of signature verification Yea Accurac Method r y ART-1[1] 2012 99.9% APPENDIX-II Displacement Extraction Method[3] 2002 75% DTW and 3D feature vector[4] 2005 98.6% 15 15 15 15 15 15 15 15 15 15 15 15 8 7 7 0 0 0 0 0 0 0 0 0 0 GA and Optimal Function[5] 2004 99.9 0 7 15 15 15 15 15 15 15 15 15 15 15 15 15 Co-operative NN[6] 1994 96% … Matching Algorithm[7] 2007 81.4% 15 15 15 15 15 15 15 15 15 15 15 15 15 15 15 15 15 15 15 15 Hidden Markov Model[8] 1994 88.9% 8 0 0 0 0 0 7 15 15 15 15 15 15 15 15 15 15 Distance statistics[9] 2004 78% DTW[10] 2006 93.23 REFERENCES Associative Memory Net (this work) 2012 92.3% [1] Dash T., Nayak T., Chattopadhyay S., Offline Verification of Hand Written Signature Using Adaptive Resonance Theory Net (Type-1), V. CONCLUSION AND FUTURE WORK in Proc: IEEE Int. Conf. Electronics Computer Technology (ICECT) (2012), Volume 2, pp. 205-210. In this paper, we proposed a neural network based [2] Xiao X., Leedham G., Signature verification using a modified Bayesian technique for offline hand-written signature verification. The network, Pattern Recognition (2002) Volume 35, 983-995. method has been optimized with respect to accuracy and [3] Mizukami Y., Yoshimura M., Miike H., Yoshimura I., An off-line computation time. We proposed two versions of the signature verification system using an extracted displacement function, algorithm, serial and parallel. The study revealed that our Pattern Recognition Letters (2002), Volume 23, 1569-1577. algorithm takes an average of 9.58 seconds in serial and 2.98 [4] Kholmatov A., B. Yanikoglu, Identity authentication using improved seconds in parallel to give a detection accuracy of 92.3%. online signature verification method, Pattern Recognition Letters (2005), Volume 26, 1400-2408. The error threshold is set to 25% in this work to make [5] Romo J.C.M., Silva R.A., Optimal Prototype functions of features for decision. online signature verification, International Journal of Pattern It is important to mention that in this work we have tested Recognition and Artificial Intelligence, Volume: 18, Issue: 7(2004) pp. our algorithms on a sample of only twelve forged signatures. 1189-1206. It will be impressive to test the algorithms with more training [6] Cardot H., Revenu M., Victorri B., Revillet M.J., A static signature and test cases and then develop a GUI for the applications to verification system based on cooperating neural networks architecture, make it user friendly tool. International Journal of Pattern Recognition and Artificial Intelligence, Volume 8, Issue 3(1994) pp. 679-692. [7] Fang B., You X., Chen W.S., Tang Y.Y., Matching algorithm using wavelet thinning features for offline signature verification, International Journal of Pattern Recognition and Artificial Intelligence, Volume 5, Issue: 1(2007) pp. 27-38. [8] Inglis S., Witten I.H., Compression-based Template Matching, in proc: IEEE Data Compression Conference (1994), pp. 106-115. 373 All Rights Reserved © 2012 IJARCET
  • 5. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 [9] Kalera M.K., Srihari S., Xu A., Offline signature verification and identification using distance statistics, International Journal of Pattern Recognition and Artificial Intelligence, Volume 18, 7(2004) pp. 1339-1360. [10] Li B., Zhang D., Wang K., Online signature verification by combining shape contexts and local features, International Journal of Pattern Recognition and Artificial Intelligence, Volume 6, Issue 3 (2006) pp. 407-420. [11] Dash, T., Nayak T. A Java Based Tool for Basic Image Processing and Edge Detection, Journal of Global Research in Computer Science, Volume 3, Issue 5 (2012) pp. 57-60. [12] Chandra R., Dagum L., Kohr D., Maydan D., McDonald J., Menon R., Parallel programming in OpenMP, Morgan Kaufmann Publisher (2001). [13] Chattopadhyay S., Banerjee S., Rabhi F.A, Acharya R. U. A Case-based Reasoning System for Complex Medical Diagnoses. Expert Systems: the Journal of Knowledge Engineering (2012); DOI: 10.1111/j.1468-0394.2012.00618.x (in press). Tirtharaj Dash and Tanistha Nayak are the B.Tech. final year students, in the Dept. of Information Technology at NIST, India. Soft computing, Parallel computing, and Algorithm are their key research interests. They have published five research papers. Dr. Subhagata Chattopadhyay is a full professor in the Department of Computer Science and Engineering at National Institute of Science and Technology, Berhampur. He received his PhD in Information Technology from IIT, Kharagpur and Postdoctoral fellowship in e-Health Information Systems at Australian School of Business, the University of New South Wales (UNSW) Sydney Australia. He has published over 80 research papers in the field of Soft computing, Pattern recognition and AI. 374 All Rights Reserved © 2012 IJARCET