SlideShare ist ein Scribd-Unternehmen logo
1 von 7
Downloaden Sie, um offline zu lesen
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________________
Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 170
OFFLINE SIGNATURE IDENTIFICATION USING HIGH INTENSITY
VARIATIONS AND CROSS OVER POINTS BASED FEATURE
EXTRACTION
Ravikumar B Panchal1
, Dhaval R Bhojani2
1
M.E Student, Department of Electronics and Communication Engineering, Darshan Institute of Engineering &
Technology, Rajkot, India
2
Assist. Prof and HOD, Department of Electronics and Communication Engineering, Darshan Institute of Engineering &
Technology, Rajkot, India
Abstract
Signature has its own advantage in person identification. The facts that people usually do not putting text in it; rather they draw a
pattern as their signature. Even today, numbers of transactions are increasing related to banking and businesses are being identified
via signatures. The main difficulty lies in the variations of the geometrical representation of the signature which is closely related to
the identity of human beings. Hence, development methods for genuine signature verification must be needed. When bundles of
documents, e.g. bank cheques, have to be verified in a limited time, the manual verification of account holders’ signatures is often
tedious work. So there is a need of Automatic Signature Verification and Identification systems. For that different logic should be
considered to process such signatures. The present paper is done in the field of offline signature identify by extracting some special
domain features that make a signature difficult to forge. In this paper existing signature verification systems have been thoroughly
studied and a model is designed to develop an offline signature idenfication system. Here off-line signature idenfication system that
depends on high intensity variation based features as well as cross over points based features. Main aim is to take various feature
points of a given signature and compares them with the test signatures feature points by choosing appropriate classifiers.
Keywords: signature identification, database creation, preprocessing, high intensity variations and cross over points
based features
----------------------------------------------------------------------***------------------------------------------------------------------------
1. INTRODUCTION
We all are aware about signing various documents. In our
daily life we are doing lot of signatures either it starts from
bank work or in personal documents. So it is necessary to
determine the genuineness and authentication which require
identification marks using signatures. Most signature
verification system required perfect signature that must be
done on proper fixed angle. This cannot all times possible that
it must be samely aligned. In that situations the proposed
system will reject the signature even though it will done by
genuine person. Though various techniques are available for
verification of bank cheques before Clearing, it creates
unavoidable errors. Signature verification system fall into two
categories according to the grasping of the information: On-
line methodology and Off-line methodology.
On-line methodology includes pen through which signatures
are inserted and which are further scanned by sensors. It also
includes location, velocity of pen, acceleration and pen
pressure, as functions of time. Online systems use this
information captured during acquisition. These dynamic
characteristics are specific to each individual and sufficiently
stable as well as repetitive [1].
Off-line data is a two dimensional image of the signature
which is scanned by various scanners. Off-line signature
process is complex task due to the absence of dynamic
geometry of signatures. Difficulty also comes in the fact that
due to different modern and unconventional writing styles, it
is harder to segment signature strokes. The nature as well as
the different pattern of pen may also affect the nature of the
signature obtained. Sometimes signatures of genuine person
cannot do proper way due to illness, mood, and age relaxation
or emotional behaviour. As a result large intra-personal as
well as interpersonal variations are generating. An intelligent
system has to be designed which should not only be able to
consider these factors but also detect various types of forgeries
within less amount of time. The system should neither be too
sensitive nor too coarse. It should have an acceptable trade-off
between a low false acceptance ratio as well as low false
rejection ratio. The designed system should also find such
kind of feature points that reduces less amount of storage as
well as less amount of computational time [2].
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________________
Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 171
2. TYPES OF FORGERY
The basic types of forgery include [1]:
1. Random Forgery: Random forgery is done by a
person who doesn’t know the shape and structure of the
original signature. Fig.1 (b).
2. Simple Forgery: In this type of forgery the person
concerned has a vague idea of the actual signature, but
is signing without much practice. Fig.1 (d).
3. Skilled Forgery: This type of forgery considers
appropriate knowledge about the original signature
along with sample time for proper practice. Our
proposed scheme eliminates random and simple
forgeries and also reduces skilled forgery to a great
extentFig.1(c).
Fig-1 :( a) original signature,(b)random forgery,(c)skilled
forgery,(d)simple forgery
3. RELATED WORK
A novel feature extraction scheme has been suggested for
offline signature verification [1]. This method used the concept
of feature extraction with help of identifying geometric centre
as well as Euclidean distance of different signatures. The
performance of classifier used here is faster as well better for
feature extraction. Results that are achieved by this method are
better than all existing methods. The process of Threshold
selection is done with help of standard deviation and average.
Another method for off-line signature identification and
verification is proposed based on the description of the
signature envelope and the interior stroke distribution in polar
and Cartesian coordinates [2]. In this paper, a new geometrical
feature for an offline signature verification system (ASV) is
used. The proposed features can be calculated with a fixed-
point microprocessor. Therefore, the features can be extracted
from inside a personal device such as a smart card. The system
is check out with various classifiers like SVM, HMM and
EDC for identifying forgeries.
The Improved Offline Signature Verification Scheme Using
Feature Point Extraction Method [3] is proposed for reducing
FAR compare to different proposed methods. The scheme is
based on selection of 60 feature points from the COG of the
signature and compares them with trained feature points. The
classification of the feature points depends on mean and
variance. A smaller change of a signature results in a large
change in the values of threshold distance from the COG.
Therefore in this algorithm the value of FRR is increased.
The generation of a digital skeleton is often one of the first
processing steps taken by a computer vision system when
attempting to extract features from an object in an image.
Various algorithms have been proposed to produce the
skeleton of a digital binary pattern. The Hilditch thinning
algorithm [4] is widely used as a useful method of
preprocessing in image process is proposed for speeding real-
time process. Hilditch proposed an algorithm to obtain the
skeleton of one object in an image. There are two versions for
this algorithm, one using 4×4 mask and the other one using
3×3 mask. With a 3×3 mask image, the result of process
output can be saved to a memory “table”. The output results of
all different 3×3 masks are saved to this “table” at the
beginning of starting application. When an image will be
processed, the thinning results of every 3×3 masks in the
image can be extracted by the method of “looking for table”.
Thus the thinning result is same but the process speed is high.
A method based on multi-feature and multi-stage verification
is proposed in paper [5] for Chinese signature. This paper
carries out a two-stage verification to make decision. For an
input image, extract its direction features firstly. If it is
justified as forgery, the final output decision is forgery; if it is
justified as genuine, and then extracts the dynamic features, to
carry out the second stage verification, and the decision of the
second stage is taken as the final decision.
There is another way to authenticate genuine signature by
using Cross-validated Graph Matching (OSACGM) algorithm
[6]. In this paper, OSACGM (Offline Signature Authentication
using Cross Validate Graph Matching) algorithm is proposed,
in which they use two concepts viz., Graph matching and
Cross-validation for signature verification. The signature
extraction method is used in pre-processing to obtain high
resolution of signature for smaller normalization box. The
signatures are compared by constructing a bipartite graph from
which a minimum cost complete matching is obtained and the
measure of dissimilarity i.e., the Euclidean distance is
determined.
The idea of finding the location variations of the strokes of
signature geometry for signature verification is proposed and
tested [7]. Two methods are proposed. The first method helps
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________________
Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 172
in determine the positional variation of the projection profiles
of the signature, while the second method helps in finding out
the actual positional variations of individual strokes in the 2-D
signature patterns. In both methods, the statistics on these
variations are computed. Here posional variations are finding
out by applying various signatures as a input. The genuineness
of the input is determined by judging the state of the training
sets. The decision process involves the computation of a
distance measure which takes the positional variations and the
correlation between them into account.
Another method for off-line Persian signature identification
and verification is proposed that is based on Image
Registration, DWT (Discrete Wavelet Transform) and Image
Fusion [8]. Training signatures of each person are registered to
overcome shift and scale problem. To extract features, at first,
DWT is used to access details of signature; then several
registered instances of each person signatures are fused
together to generate reference pattern of person's signatures. In
the classification phase, Euclidean distance between the test
image and each pattern is used in different sub bands.
Experimental results confirmed the effectiveness of the
proposed method.
The method for identifying genuineness of bank cheque
signatures is proposed [9]. It describes how signature is
identifies in cheques using various verification algorithm.
Here proposed algorithm can be used for an effective signature
verification system in the banking industry. The proposed
methodology verifies a cheque by recognizing and analyzing
the major details in a cheque, which includes the account
holder’s signature. The results show the FAR and FRR in the
verification process and the success ratio.
In [11] the author presented new approach for signature region
of interest pre processing. He used new auto cropping
preparation on the basis of the image content, where the
intensity value of pixel is the source of cropping. This
approach provides both the possibility of improving the
performance of security systems based on signature images,
and also the ability to use only the region of interest of the
used image to suit layout design of biometric systems.
4. PROPOSED SYSTEM ARCHITECTURE
In order to design a system, which will detect the forge
signatures by comparing some special features with original
one, the following architecture has been proposed.
Original scanned
signature
Preprocessing
Noise
removing
cropping thinning Normalization
Raw data
High Intensity
based extraction
Loop based
extraction
Feature extraction
Test Signature
Preprocessing
Verify by
classifier
The design process can be categorized into three main parts:
 Preprocessing
 Features extractions from both genuine and test
signatures and
 Compare the extracted features between them.
4.1 Pre Processing
The principal objective of preprocessing is to obtain a
transformed image with enhanced quality. It includes Noise
removal, cropping, Thinning and Normalization.
4.1.1 Noise Removal
Noise removal is required to eliminate the pixels that are not
part of the signature, but contained in the image. When we
scan signature from paper then some unwanted pixels comes
with the scanned image that is not a part of the signature. So
this unwanted part must be removed before feature extraction.
4.1.2 Cropping
Cropping process removing unnecessary white back ground
from the image.so as result it reduces the size of signature.
The resultant signature only incudes the main framework of
the signature.
4.1.3 Thinning
Thinning is a morphological process necessary for the
reduction of data and computational time. To reduce all
objects in an image to lines, without changing the essential
structure of the image, use the bwmorph function. Thinning
works for objects consisting of lines (straight or curved). This
method does not work for object having shapes that encloses a
large area. Thinning is most of the time an intermediate
process, to prepare the object for further analysis. It reduces
the signature to a skeleton of unitary thickness.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________________
Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 173
4.2 Feature Extraction
Each person’s signature has different style. When someone
tries to copy other’s signatures then they basically try to
maintain the shape. But some important features can make a
signature difficult to be copied. Now this features are analyzed
and are used in this proposed method to differentiate genuine
from forge one. Here we use high intensity variation and cross
over points as a feature extraction.
4.2.1 High Intensity Variation
Person usually does signatures with reference to fix angle.
While doing signature person follow same kind of writing
technique. So as result different intensity is generated the
entire signature. Use of ball point as well as ink pan also
create large different in intensity. This feature can be extracted
easily to compare genuine and test signatures. Figure.2 and
figure.3 represents the examples which includes high intensity
variation points shown by arrow in it.
Fig-2 Fig-3
4.2.2 Cross Over Points
Each user has some monopoly in doing signature. Here each
and every time shape of some special letter is always
remaining constant. So as result it creates same cross over
points. This point is very helpful for identify authors own
signature among all. Figure 4 and figure 5 represents example
of which includes cross over points shown by arrow in it.
Fig-4 Fig-5
5. ALGORITHM FOR PRAPOSED SCHEME
Step 1: Hand written signature is scanned.
Step 2: Signature is preprocessed and converted into binary or
gray scale as per requirement, removing noise from signatures,
thinned signature and finally normalize the signature.
Step 3: thinned signature is used for feature extraction. here
special domain feature as high intensity variation points and
cross over points are extracted from genuine as well as test
signature.
Step 4: These features are compared with the features of
original one, which have already been extracted with help of
appropriate classifier.
6. IMPLEMENTATION AND RESULTS
6.1 Database Creation
During my research work we have taken total 100 signatures
from total 10 faculty members.here each faculty member have
to sign total 10 signature.here 10 signature includes 2-genuine
signature,3-training signature and remaining five signature
represents test signature.the following table represents the
total signature database overview.
Table 1 Database overview
Sr no Name of faculty Notification
No of signatures
TotalGenuine Training Test
1 Kishan K Govani KKG 3 2 5 10
2 Ashish j J Donga DA 3 2 5 10
3 Dhaval Patel DD 3 2 5 10
4 Divyang D Vyas DDV 3 2 5 10
5 Dhaval R Bhojani DRB 3 2 5 10
6 Manoj N Popat MNP 3 2 5 10
7
Mitul R
Khandhedia MRK 3 2 5 10
8 Neha Hirani NH 3 2 5 10
9 Raju J Kadivar RJK 3 2 5 10
10 Nitin Rola NR 3 2 5 10
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________________
Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 174
6.2 Noise Remove
We applied a noise removal technique, which basically based
on the size of pixel. In this algorithm some pixels, which are
not connected with rest of the signature and have less than 8
pixel values are considered as noise and removed using
MATLAB (R2012a). we choose 4 reference signatures. The
output of each signature is shown below figure 6 to figure 8
Fig- 6 (a) original sign_DA Fig-6 (b) Noise marked_DA
Fig-6(c) after Noise removed_DA
Fig- 7 (a) original sign_DD Fig-7 (b) Noise marked_DD
Fig-7(c) after Noise removed_DD
Fig-8 (a) original sign_DDV Fig-8 (b) Noise marked_DDV
Fig-8(c) after Noise removed_DDV
6.3 Thinning
To reduce all objects in an image to lines, without changing
the essential structure of the image, use the thinning algorithm.
Figure 9 to figure 12 shows the resultant thinning output of
reference signatures obtained by database respectively.
Fig-9 Thinning sign_DA
Fig-10 Thinning sign_DD
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________________
Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 175
Fig-11 Thinning sign_DDV
6.4 Feature Extraction
After getting the preprocessed signature it is then come to find
the forgery using feature extraction. Here we find out it with
help of high intensity variation points and cross over loops
from signatures. These features could be difficult to copy for a
fake person. Figure represents high intensity variation points
by blue colored “+” sign and cross over points are represented
by red circled” sign.
6.4.1 High Intensity Variation based Feature
Extraction
Fig-12 high intensity variation _DA
Fig-13 high intensity variation _DP
Fig-14 high intensity variation _DDV
6.4.2 Cross over Points based Feature Extraction
Fig-15 cross over points _DA
Fig-16 cross over points _DP
Fig-17 cross over points _DDV
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________________
Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 176
7. CONCLUSIONS
The proposed signature identification system is been based on
some special features extraction. These features included high
intensity variations and cross over points it uses a compact and
memory efficient storage of feature points, which reduces
memory overhead and results in faster comparisons of the data
to be verified. From intuition, the statistics on the positional
variations of the features or strokes of signature samples
should be useful for verification. Here in this paper we
identify the genuineness of the signatures using such kind of
features. Here verification of these signatures can be done by
choosing appropriate classification methods. Similar to other
real world problems, no single approach may solve the
signature verification problem perfectly, and practical
solutions are often derived by combining different approaches.
This technique can be added with any existing verification
system for better result.
REFERENCES
[1]. Banshidhar Majhi, Y Santhosh Reddy, D Prasanna Babu,
“Novel Features for Off-line Signature Verification”
International Journal of Computers, Communications &
Control, Vol.I, No. 1, pp. 17-24, 2006.
[2]. Migual A. Ferrer, Jesus B. Alonso and Carlos M.
Travieso, "Off-line Geometric Parameters for Automatic
Signature Verification Using Fixed-Point Arithmetic", IEEE
Tran. On Pattern Analysis and Machine Intelligence, vol.27,
no.6, June 2005.
[3]. Debasish Jena, Banshidhar Majhi, Saroj Kumar
Panigrahy, Sanjay Kumar Jena, “Improved Offline Signature
Verification Scheme Using Feature Point Extraction Method”.
[4]. Ming Yin, Seinosuke Narita, “Speedup Method for Real-
Time Thinning Algorithm” DICTA2002: Digital Image
Computing Techniques and Applications, Melbourne,
Australia, 21--22 January 2002.
[5]. Yingna Deng, Hong Zhu, Shu Li, and Tao Wang,
“Signature Verification Method Based on the Combination of
Shape and Dynamic Feature”, Department of Automation and
Information Engineering, Xi’an University of Technology,
710048 Xi’an China, 2005.
[6]. Ramachandra, A. C. Pavithra, K. and Yashasvini, K. and
Raja, K. B. and Venugopal, K. R. and Patnaik, L. M., “Cross-
validation for graph matching based Offline Signature
Verification”, In: INDICON 2008, India, pp: 17-22,2008.
[7]. Fang, B., et al, “Off-line signature verification by the
tracking of feature and stroke positions”, Pattern Recognition,
Vol. 36, pp. 91-101, 2003.
[8]. Samaneh Ghandali, Mohsen Ebrahimi Moghaddam, “Off-
Line Persian Signature Identification and Verification Based
on Image Registration and Fusion”, Journal of Multimedia,
vol. 4, no. 3, June 2009.
[9]. M.Jasmin Pemeena, Priya darsini ,K.Murugesan,
Srinivasa Rao Inbathini, A.Jabeena, and K.Sai Tej “Bank
Cheque Authentication using Signature” ,International Journal
of Advanced Research in Computer Science and Software
Engineering , Volume 3, Issue 5, May 2013.
[10]. Raman Maini & Himanshu Aggarwal, “Study and
Comparison of Various Image Edge Detection Techniques”,
International Journal of Image Processing (IJIP), Volume 3,
Issue 1, 2010.
[11]. Bassam Al-Mahadeen, Mokhled S. AlTarawneh and
Islam H. AlTarawneh “Signature Region of Interest using
Auto cropping” IJCSI International Journal of Computer
Science Issues, Vol. 7, Issue 2, No 4, March 2010.
[12]. Guangyu Zhu, Yefeng Zheng,David Doermann, Stefan
Jaeger, “Signature Detection and Matching for Document
Image Retrieval”, IEEE TRANSACTIONS ON PATTERN
ANALYSIS AND MACHINE INTELLIGENCE, VOL. 31,
NO. 11, NOVEMBER 2009.
[13]. Ravi J, Sundernag Hosamani and K B Raja “Off-line
Signature Identification Based on DWT and Spatial Domain
Features” IEEE-20180

Weitere ähnliche Inhalte

Was ist angesagt?

International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Offline handwritten signature identification using adaptive window positionin...
Offline handwritten signature identification using adaptive window positionin...Offline handwritten signature identification using adaptive window positionin...
Offline handwritten signature identification using adaptive window positionin...sipij
 
OFFLINE SIGNATURE VERIFICATION SYSTEM FOR BANK CHEQUES USING ZERNIKE MOMENTS,...
OFFLINE SIGNATURE VERIFICATION SYSTEM FOR BANK CHEQUES USING ZERNIKE MOMENTS,...OFFLINE SIGNATURE VERIFICATION SYSTEM FOR BANK CHEQUES USING ZERNIKE MOMENTS,...
OFFLINE SIGNATURE VERIFICATION SYSTEM FOR BANK CHEQUES USING ZERNIKE MOMENTS,...ijaia
 
ARABIC ONLINE HANDWRITING RECOGNITION USING NEURAL NETWORK
ARABIC ONLINE HANDWRITING RECOGNITION USING NEURAL NETWORKARABIC ONLINE HANDWRITING RECOGNITION USING NEURAL NETWORK
ARABIC ONLINE HANDWRITING RECOGNITION USING NEURAL NETWORKijaia
 
Ganesan dhawanrpt
Ganesan dhawanrptGanesan dhawanrpt
Ganesan dhawanrptpramod naik
 
Fraud Detection Using Signature Recognition
Fraud Detection Using Signature RecognitionFraud Detection Using Signature Recognition
Fraud Detection Using Signature RecognitionTejraj Thakor
 
Offline Signature Verification Using Local Radon Transform and Support Vector...
Offline Signature Verification Using Local Radon Transform and Support Vector...Offline Signature Verification Using Local Radon Transform and Support Vector...
Offline Signature Verification Using Local Radon Transform and Support Vector...CSCJournals
 
An offline signature verification using pixels intensity levels
An offline signature verification using pixels intensity levelsAn offline signature verification using pixels intensity levels
An offline signature verification using pixels intensity levelsSalam Shah
 
Proposed Method for Off-line Signature Recognition and Verification using Neu...
Proposed Method for Off-line Signature Recognition and Verification using Neu...Proposed Method for Off-line Signature Recognition and Verification using Neu...
Proposed Method for Off-line Signature Recognition and Verification using Neu...Editor IJMTER
 
Text content dependent writer identification
Text content dependent writer identificationText content dependent writer identification
Text content dependent writer identificationeSAT Journals
 
Offline Handwritten Signature Identification and Verification using Multi-Res...
Offline Handwritten Signature Identification and Verification using Multi-Res...Offline Handwritten Signature Identification and Verification using Multi-Res...
Offline Handwritten Signature Identification and Verification using Multi-Res...CSCJournals
 
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...IJNSA Journal
 
Freeman Chain Code (FCC) Representation in Signature Fraud Detection Based On...
Freeman Chain Code (FCC) Representation in Signature Fraud Detection Based On...Freeman Chain Code (FCC) Representation in Signature Fraud Detection Based On...
Freeman Chain Code (FCC) Representation in Signature Fraud Detection Based On...CSCJournals
 
Effective Implementation techniques in Offline Signature Verification
Effective Implementation techniques in Offline Signature  VerificationEffective Implementation techniques in Offline Signature  Verification
Effective Implementation techniques in Offline Signature VerificationIOSR Journals
 
Automatic signature verification with chain code using weighted distance and ...
Automatic signature verification with chain code using weighted distance and ...Automatic signature verification with chain code using weighted distance and ...
Automatic signature verification with chain code using weighted distance and ...eSAT Journals
 
Signature Verification using DCT
Signature Verification using DCTSignature Verification using DCT
Signature Verification using DCTIRJET Journal
 
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...iosrjce
 

Was ist angesagt? (20)

International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Offline handwritten signature identification using adaptive window positionin...
Offline handwritten signature identification using adaptive window positionin...Offline handwritten signature identification using adaptive window positionin...
Offline handwritten signature identification using adaptive window positionin...
 
OFFLINE SIGNATURE VERIFICATION SYSTEM FOR BANK CHEQUES USING ZERNIKE MOMENTS,...
OFFLINE SIGNATURE VERIFICATION SYSTEM FOR BANK CHEQUES USING ZERNIKE MOMENTS,...OFFLINE SIGNATURE VERIFICATION SYSTEM FOR BANK CHEQUES USING ZERNIKE MOMENTS,...
OFFLINE SIGNATURE VERIFICATION SYSTEM FOR BANK CHEQUES USING ZERNIKE MOMENTS,...
 
ARABIC ONLINE HANDWRITING RECOGNITION USING NEURAL NETWORK
ARABIC ONLINE HANDWRITING RECOGNITION USING NEURAL NETWORKARABIC ONLINE HANDWRITING RECOGNITION USING NEURAL NETWORK
ARABIC ONLINE HANDWRITING RECOGNITION USING NEURAL NETWORK
 
Ganesan dhawanrpt
Ganesan dhawanrptGanesan dhawanrpt
Ganesan dhawanrpt
 
Fraud Detection Using Signature Recognition
Fraud Detection Using Signature RecognitionFraud Detection Using Signature Recognition
Fraud Detection Using Signature Recognition
 
Offline Signature Verification Using Local Radon Transform and Support Vector...
Offline Signature Verification Using Local Radon Transform and Support Vector...Offline Signature Verification Using Local Radon Transform and Support Vector...
Offline Signature Verification Using Local Radon Transform and Support Vector...
 
An offline signature verification using pixels intensity levels
An offline signature verification using pixels intensity levelsAn offline signature verification using pixels intensity levels
An offline signature verification using pixels intensity levels
 
Co4201605611
Co4201605611Co4201605611
Co4201605611
 
Ijetcas14 337
Ijetcas14 337Ijetcas14 337
Ijetcas14 337
 
Proposed Method for Off-line Signature Recognition and Verification using Neu...
Proposed Method for Off-line Signature Recognition and Verification using Neu...Proposed Method for Off-line Signature Recognition and Verification using Neu...
Proposed Method for Off-line Signature Recognition and Verification using Neu...
 
Text content dependent writer identification
Text content dependent writer identificationText content dependent writer identification
Text content dependent writer identification
 
Offline Handwritten Signature Identification and Verification using Multi-Res...
Offline Handwritten Signature Identification and Verification using Multi-Res...Offline Handwritten Signature Identification and Verification using Multi-Res...
Offline Handwritten Signature Identification and Verification using Multi-Res...
 
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...
 
Freeman Chain Code (FCC) Representation in Signature Fraud Detection Based On...
Freeman Chain Code (FCC) Representation in Signature Fraud Detection Based On...Freeman Chain Code (FCC) Representation in Signature Fraud Detection Based On...
Freeman Chain Code (FCC) Representation in Signature Fraud Detection Based On...
 
Artificial Neural Network Based Offline Signature Recognition System Using Lo...
Artificial Neural Network Based Offline Signature Recognition System Using Lo...Artificial Neural Network Based Offline Signature Recognition System Using Lo...
Artificial Neural Network Based Offline Signature Recognition System Using Lo...
 
Effective Implementation techniques in Offline Signature Verification
Effective Implementation techniques in Offline Signature  VerificationEffective Implementation techniques in Offline Signature  Verification
Effective Implementation techniques in Offline Signature Verification
 
Automatic signature verification with chain code using weighted distance and ...
Automatic signature verification with chain code using weighted distance and ...Automatic signature verification with chain code using weighted distance and ...
Automatic signature verification with chain code using weighted distance and ...
 
Signature Verification using DCT
Signature Verification using DCTSignature Verification using DCT
Signature Verification using DCT
 
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
 

Andere mochten auch

Optimization of energy in public buildings
Optimization of energy in public buildingsOptimization of energy in public buildings
Optimization of energy in public buildingseSAT Publishing House
 
Analysis and design of zero sewage discharge systemfor
Analysis and design of zero sewage discharge systemforAnalysis and design of zero sewage discharge systemfor
Analysis and design of zero sewage discharge systemforeSAT Publishing House
 
No sql databases new millennium database for big data, big users, cloud compu...
No sql databases new millennium database for big data, big users, cloud compu...No sql databases new millennium database for big data, big users, cloud compu...
No sql databases new millennium database for big data, big users, cloud compu...eSAT Publishing House
 
A case study on energy savings in air conditioning system by heat recovery us...
A case study on energy savings in air conditioning system by heat recovery us...A case study on energy savings in air conditioning system by heat recovery us...
A case study on energy savings in air conditioning system by heat recovery us...eSAT Publishing House
 
Optimization of friction stir welding process
Optimization of friction stir welding processOptimization of friction stir welding process
Optimization of friction stir welding processeSAT Publishing House
 
Experimental evaluation of performance of electrical
Experimental evaluation of performance of electricalExperimental evaluation of performance of electrical
Experimental evaluation of performance of electricaleSAT Publishing House
 
Securing the cloud computing systems with matrix vector and multi-key using l...
Securing the cloud computing systems with matrix vector and multi-key using l...Securing the cloud computing systems with matrix vector and multi-key using l...
Securing the cloud computing systems with matrix vector and multi-key using l...eSAT Publishing House
 
Growth and physical properties of pure and manganese doped strontium tartrate...
Growth and physical properties of pure and manganese doped strontium tartrate...Growth and physical properties of pure and manganese doped strontium tartrate...
Growth and physical properties of pure and manganese doped strontium tartrate...eSAT Publishing House
 
Moderate quality of voice transmission using 8 bit micro-controller through z...
Moderate quality of voice transmission using 8 bit micro-controller through z...Moderate quality of voice transmission using 8 bit micro-controller through z...
Moderate quality of voice transmission using 8 bit micro-controller through z...eSAT Publishing House
 
An experimental study on durability of high strength
An experimental study on durability of high strengthAn experimental study on durability of high strength
An experimental study on durability of high strengtheSAT Publishing House
 
Modelling & simulation of human powered flywheel
Modelling & simulation of human powered flywheelModelling & simulation of human powered flywheel
Modelling & simulation of human powered flywheeleSAT Publishing House
 
Assessment of ground water quality at municipal
Assessment of ground water quality at municipalAssessment of ground water quality at municipal
Assessment of ground water quality at municipaleSAT Publishing House
 
Improving the performance parameters of microstrip
Improving the performance parameters of microstripImproving the performance parameters of microstrip
Improving the performance parameters of microstripeSAT Publishing House
 
Analysis and implementation of modified k medoids
Analysis and implementation of modified k medoidsAnalysis and implementation of modified k medoids
Analysis and implementation of modified k medoidseSAT Publishing House
 
Video copy detection using segmentation method and
Video copy detection using segmentation method andVideo copy detection using segmentation method and
Video copy detection using segmentation method andeSAT Publishing House
 
A design for improving the core shelf system in a core
A design for improving the core shelf system in a coreA design for improving the core shelf system in a core
A design for improving the core shelf system in a coreeSAT Publishing House
 
Smfir technology based transportation system and applicability of mppt
Smfir technology based transportation system and applicability of mpptSmfir technology based transportation system and applicability of mppt
Smfir technology based transportation system and applicability of mppteSAT Publishing House
 
Microwave dehydrator an environmental friendly step toward improving microwav...
Microwave dehydrator an environmental friendly step toward improving microwav...Microwave dehydrator an environmental friendly step toward improving microwav...
Microwave dehydrator an environmental friendly step toward improving microwav...eSAT Publishing House
 
3 d mrf based video tracking in the compressed domain
3 d mrf based video tracking in the compressed domain3 d mrf based video tracking in the compressed domain
3 d mrf based video tracking in the compressed domaineSAT Publishing House
 
The compensatation of unbalanced 3 phase currents in transmission systems on ...
The compensatation of unbalanced 3 phase currents in transmission systems on ...The compensatation of unbalanced 3 phase currents in transmission systems on ...
The compensatation of unbalanced 3 phase currents in transmission systems on ...eSAT Publishing House
 

Andere mochten auch (20)

Optimization of energy in public buildings
Optimization of energy in public buildingsOptimization of energy in public buildings
Optimization of energy in public buildings
 
Analysis and design of zero sewage discharge systemfor
Analysis and design of zero sewage discharge systemforAnalysis and design of zero sewage discharge systemfor
Analysis and design of zero sewage discharge systemfor
 
No sql databases new millennium database for big data, big users, cloud compu...
No sql databases new millennium database for big data, big users, cloud compu...No sql databases new millennium database for big data, big users, cloud compu...
No sql databases new millennium database for big data, big users, cloud compu...
 
A case study on energy savings in air conditioning system by heat recovery us...
A case study on energy savings in air conditioning system by heat recovery us...A case study on energy savings in air conditioning system by heat recovery us...
A case study on energy savings in air conditioning system by heat recovery us...
 
Optimization of friction stir welding process
Optimization of friction stir welding processOptimization of friction stir welding process
Optimization of friction stir welding process
 
Experimental evaluation of performance of electrical
Experimental evaluation of performance of electricalExperimental evaluation of performance of electrical
Experimental evaluation of performance of electrical
 
Securing the cloud computing systems with matrix vector and multi-key using l...
Securing the cloud computing systems with matrix vector and multi-key using l...Securing the cloud computing systems with matrix vector and multi-key using l...
Securing the cloud computing systems with matrix vector and multi-key using l...
 
Growth and physical properties of pure and manganese doped strontium tartrate...
Growth and physical properties of pure and manganese doped strontium tartrate...Growth and physical properties of pure and manganese doped strontium tartrate...
Growth and physical properties of pure and manganese doped strontium tartrate...
 
Moderate quality of voice transmission using 8 bit micro-controller through z...
Moderate quality of voice transmission using 8 bit micro-controller through z...Moderate quality of voice transmission using 8 bit micro-controller through z...
Moderate quality of voice transmission using 8 bit micro-controller through z...
 
An experimental study on durability of high strength
An experimental study on durability of high strengthAn experimental study on durability of high strength
An experimental study on durability of high strength
 
Modelling & simulation of human powered flywheel
Modelling & simulation of human powered flywheelModelling & simulation of human powered flywheel
Modelling & simulation of human powered flywheel
 
Assessment of ground water quality at municipal
Assessment of ground water quality at municipalAssessment of ground water quality at municipal
Assessment of ground water quality at municipal
 
Improving the performance parameters of microstrip
Improving the performance parameters of microstripImproving the performance parameters of microstrip
Improving the performance parameters of microstrip
 
Analysis and implementation of modified k medoids
Analysis and implementation of modified k medoidsAnalysis and implementation of modified k medoids
Analysis and implementation of modified k medoids
 
Video copy detection using segmentation method and
Video copy detection using segmentation method andVideo copy detection using segmentation method and
Video copy detection using segmentation method and
 
A design for improving the core shelf system in a core
A design for improving the core shelf system in a coreA design for improving the core shelf system in a core
A design for improving the core shelf system in a core
 
Smfir technology based transportation system and applicability of mppt
Smfir technology based transportation system and applicability of mpptSmfir technology based transportation system and applicability of mppt
Smfir technology based transportation system and applicability of mppt
 
Microwave dehydrator an environmental friendly step toward improving microwav...
Microwave dehydrator an environmental friendly step toward improving microwav...Microwave dehydrator an environmental friendly step toward improving microwav...
Microwave dehydrator an environmental friendly step toward improving microwav...
 
3 d mrf based video tracking in the compressed domain
3 d mrf based video tracking in the compressed domain3 d mrf based video tracking in the compressed domain
3 d mrf based video tracking in the compressed domain
 
The compensatation of unbalanced 3 phase currents in transmission systems on ...
The compensatation of unbalanced 3 phase currents in transmission systems on ...The compensatation of unbalanced 3 phase currents in transmission systems on ...
The compensatation of unbalanced 3 phase currents in transmission systems on ...
 

Ähnlich wie Offline signature identification using high intensity variations and cross over points based feature extraction

IRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNNIRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNNIRJET Journal
 
Artificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification SystemArtificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification SystemIRJET Journal
 
­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...
­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...
­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...IRJET Journal
 
IJSRED-V2I2P33
IJSRED-V2I2P33IJSRED-V2I2P33
IJSRED-V2I2P33IJSRED
 
A Fusion of Statistical Distance and Signature Length Based Approach for Offl...
A Fusion of Statistical Distance and Signature Length Based Approach for Offl...A Fusion of Statistical Distance and Signature Length Based Approach for Offl...
A Fusion of Statistical Distance and Signature Length Based Approach for Offl...IRJET Journal
 
A Novel Automated Approach for Offline Signature Verification Based on Shape ...
A Novel Automated Approach for Offline Signature Verification Based on Shape ...A Novel Automated Approach for Offline Signature Verification Based on Shape ...
A Novel Automated Approach for Offline Signature Verification Based on Shape ...Editor IJCATR
 
Design of digital signature verification algorithm using relative slope method
Design of digital signature verification algorithm using relative slope methodDesign of digital signature verification algorithm using relative slope method
Design of digital signature verification algorithm using relative slope methodeSAT Publishing House
 
Distance Based Verification Technique for Online Signature System
Distance Based Verification Technique for Online Signature SystemDistance Based Verification Technique for Online Signature System
Distance Based Verification Technique for Online Signature SystemIRJET Journal
 
A Review on Robust identity verification using signature of a person
A Review on Robust identity verification using signature of a personA Review on Robust identity verification using signature of a person
A Review on Robust identity verification using signature of a personEditor IJMTER
 
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEMRELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEMAM Publications
 
OSPCV: Off-line Signature Verification using Principal Component Variances
OSPCV: Off-line Signature Verification using Principal Component VariancesOSPCV: Off-line Signature Verification using Principal Component Variances
OSPCV: Off-line Signature Verification using Principal Component VariancesIOSR Journals
 
Medical Prescription Scanner using Optical Character Recognition
Medical Prescription Scanner using Optical Character RecognitionMedical Prescription Scanner using Optical Character Recognition
Medical Prescription Scanner using Optical Character RecognitionIRJET Journal
 
Offline Handwritten Signature Verification using Neural Network
Offline Handwritten Signature Verification using Neural NetworkOffline Handwritten Signature Verification using Neural Network
Offline Handwritten Signature Verification using Neural Networkijiert bestjournal
 
A Convolutional Neural Network approach for Signature verification
A Convolutional Neural Network approach for Signature verificationA Convolutional Neural Network approach for Signature verification
A Convolutional Neural Network approach for Signature verificationIRJET Journal
 
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...IRJET Journal
 
Handwritten Signature Verification System using Sobel Operator and KNN Classi...
Handwritten Signature Verification System using Sobel Operator and KNN Classi...Handwritten Signature Verification System using Sobel Operator and KNN Classi...
Handwritten Signature Verification System using Sobel Operator and KNN Classi...ijtsrd
 

Ähnlich wie Offline signature identification using high intensity variations and cross over points based feature extraction (20)

IRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNNIRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNN
 
Artificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification SystemArtificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification System
 
­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...
­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...
­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...
 
IJSRED-V2I2P33
IJSRED-V2I2P33IJSRED-V2I2P33
IJSRED-V2I2P33
 
A Fusion of Statistical Distance and Signature Length Based Approach for Offl...
A Fusion of Statistical Distance and Signature Length Based Approach for Offl...A Fusion of Statistical Distance and Signature Length Based Approach for Offl...
A Fusion of Statistical Distance and Signature Length Based Approach for Offl...
 
A Novel Automated Approach for Offline Signature Verification Based on Shape ...
A Novel Automated Approach for Offline Signature Verification Based on Shape ...A Novel Automated Approach for Offline Signature Verification Based on Shape ...
A Novel Automated Approach for Offline Signature Verification Based on Shape ...
 
Design of digital signature verification algorithm using relative slope method
Design of digital signature verification algorithm using relative slope methodDesign of digital signature verification algorithm using relative slope method
Design of digital signature verification algorithm using relative slope method
 
K012647982
K012647982K012647982
K012647982
 
K012647982
K012647982K012647982
K012647982
 
Distance Based Verification Technique for Online Signature System
Distance Based Verification Technique for Online Signature SystemDistance Based Verification Technique for Online Signature System
Distance Based Verification Technique for Online Signature System
 
A Review on Robust identity verification using signature of a person
A Review on Robust identity verification using signature of a personA Review on Robust identity verification using signature of a person
A Review on Robust identity verification using signature of a person
 
Choudhary2015
Choudhary2015Choudhary2015
Choudhary2015
 
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEMRELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
 
OSPCV: Off-line Signature Verification using Principal Component Variances
OSPCV: Off-line Signature Verification using Principal Component VariancesOSPCV: Off-line Signature Verification using Principal Component Variances
OSPCV: Off-line Signature Verification using Principal Component Variances
 
B017150823
B017150823B017150823
B017150823
 
Medical Prescription Scanner using Optical Character Recognition
Medical Prescription Scanner using Optical Character RecognitionMedical Prescription Scanner using Optical Character Recognition
Medical Prescription Scanner using Optical Character Recognition
 
Offline Handwritten Signature Verification using Neural Network
Offline Handwritten Signature Verification using Neural NetworkOffline Handwritten Signature Verification using Neural Network
Offline Handwritten Signature Verification using Neural Network
 
A Convolutional Neural Network approach for Signature verification
A Convolutional Neural Network approach for Signature verificationA Convolutional Neural Network approach for Signature verification
A Convolutional Neural Network approach for Signature verification
 
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
 
Handwritten Signature Verification System using Sobel Operator and KNN Classi...
Handwritten Signature Verification System using Sobel Operator and KNN Classi...Handwritten Signature Verification System using Sobel Operator and KNN Classi...
Handwritten Signature Verification System using Sobel Operator and KNN Classi...
 

Mehr von eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 

Mehr von eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Kürzlich hochgeladen

UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringmulugeta48
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01KreezheaRecto
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoordharasingh5698
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 

Kürzlich hochgeladen (20)

UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 

Offline signature identification using high intensity variations and cross over points based feature extraction

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________________ Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 170 OFFLINE SIGNATURE IDENTIFICATION USING HIGH INTENSITY VARIATIONS AND CROSS OVER POINTS BASED FEATURE EXTRACTION Ravikumar B Panchal1 , Dhaval R Bhojani2 1 M.E Student, Department of Electronics and Communication Engineering, Darshan Institute of Engineering & Technology, Rajkot, India 2 Assist. Prof and HOD, Department of Electronics and Communication Engineering, Darshan Institute of Engineering & Technology, Rajkot, India Abstract Signature has its own advantage in person identification. The facts that people usually do not putting text in it; rather they draw a pattern as their signature. Even today, numbers of transactions are increasing related to banking and businesses are being identified via signatures. The main difficulty lies in the variations of the geometrical representation of the signature which is closely related to the identity of human beings. Hence, development methods for genuine signature verification must be needed. When bundles of documents, e.g. bank cheques, have to be verified in a limited time, the manual verification of account holders’ signatures is often tedious work. So there is a need of Automatic Signature Verification and Identification systems. For that different logic should be considered to process such signatures. The present paper is done in the field of offline signature identify by extracting some special domain features that make a signature difficult to forge. In this paper existing signature verification systems have been thoroughly studied and a model is designed to develop an offline signature idenfication system. Here off-line signature idenfication system that depends on high intensity variation based features as well as cross over points based features. Main aim is to take various feature points of a given signature and compares them with the test signatures feature points by choosing appropriate classifiers. Keywords: signature identification, database creation, preprocessing, high intensity variations and cross over points based features ----------------------------------------------------------------------***------------------------------------------------------------------------ 1. INTRODUCTION We all are aware about signing various documents. In our daily life we are doing lot of signatures either it starts from bank work or in personal documents. So it is necessary to determine the genuineness and authentication which require identification marks using signatures. Most signature verification system required perfect signature that must be done on proper fixed angle. This cannot all times possible that it must be samely aligned. In that situations the proposed system will reject the signature even though it will done by genuine person. Though various techniques are available for verification of bank cheques before Clearing, it creates unavoidable errors. Signature verification system fall into two categories according to the grasping of the information: On- line methodology and Off-line methodology. On-line methodology includes pen through which signatures are inserted and which are further scanned by sensors. It also includes location, velocity of pen, acceleration and pen pressure, as functions of time. Online systems use this information captured during acquisition. These dynamic characteristics are specific to each individual and sufficiently stable as well as repetitive [1]. Off-line data is a two dimensional image of the signature which is scanned by various scanners. Off-line signature process is complex task due to the absence of dynamic geometry of signatures. Difficulty also comes in the fact that due to different modern and unconventional writing styles, it is harder to segment signature strokes. The nature as well as the different pattern of pen may also affect the nature of the signature obtained. Sometimes signatures of genuine person cannot do proper way due to illness, mood, and age relaxation or emotional behaviour. As a result large intra-personal as well as interpersonal variations are generating. An intelligent system has to be designed which should not only be able to consider these factors but also detect various types of forgeries within less amount of time. The system should neither be too sensitive nor too coarse. It should have an acceptable trade-off between a low false acceptance ratio as well as low false rejection ratio. The designed system should also find such kind of feature points that reduces less amount of storage as well as less amount of computational time [2].
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________________ Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 171 2. TYPES OF FORGERY The basic types of forgery include [1]: 1. Random Forgery: Random forgery is done by a person who doesn’t know the shape and structure of the original signature. Fig.1 (b). 2. Simple Forgery: In this type of forgery the person concerned has a vague idea of the actual signature, but is signing without much practice. Fig.1 (d). 3. Skilled Forgery: This type of forgery considers appropriate knowledge about the original signature along with sample time for proper practice. Our proposed scheme eliminates random and simple forgeries and also reduces skilled forgery to a great extentFig.1(c). Fig-1 :( a) original signature,(b)random forgery,(c)skilled forgery,(d)simple forgery 3. RELATED WORK A novel feature extraction scheme has been suggested for offline signature verification [1]. This method used the concept of feature extraction with help of identifying geometric centre as well as Euclidean distance of different signatures. The performance of classifier used here is faster as well better for feature extraction. Results that are achieved by this method are better than all existing methods. The process of Threshold selection is done with help of standard deviation and average. Another method for off-line signature identification and verification is proposed based on the description of the signature envelope and the interior stroke distribution in polar and Cartesian coordinates [2]. In this paper, a new geometrical feature for an offline signature verification system (ASV) is used. The proposed features can be calculated with a fixed- point microprocessor. Therefore, the features can be extracted from inside a personal device such as a smart card. The system is check out with various classifiers like SVM, HMM and EDC for identifying forgeries. The Improved Offline Signature Verification Scheme Using Feature Point Extraction Method [3] is proposed for reducing FAR compare to different proposed methods. The scheme is based on selection of 60 feature points from the COG of the signature and compares them with trained feature points. The classification of the feature points depends on mean and variance. A smaller change of a signature results in a large change in the values of threshold distance from the COG. Therefore in this algorithm the value of FRR is increased. The generation of a digital skeleton is often one of the first processing steps taken by a computer vision system when attempting to extract features from an object in an image. Various algorithms have been proposed to produce the skeleton of a digital binary pattern. The Hilditch thinning algorithm [4] is widely used as a useful method of preprocessing in image process is proposed for speeding real- time process. Hilditch proposed an algorithm to obtain the skeleton of one object in an image. There are two versions for this algorithm, one using 4×4 mask and the other one using 3×3 mask. With a 3×3 mask image, the result of process output can be saved to a memory “table”. The output results of all different 3×3 masks are saved to this “table” at the beginning of starting application. When an image will be processed, the thinning results of every 3×3 masks in the image can be extracted by the method of “looking for table”. Thus the thinning result is same but the process speed is high. A method based on multi-feature and multi-stage verification is proposed in paper [5] for Chinese signature. This paper carries out a two-stage verification to make decision. For an input image, extract its direction features firstly. If it is justified as forgery, the final output decision is forgery; if it is justified as genuine, and then extracts the dynamic features, to carry out the second stage verification, and the decision of the second stage is taken as the final decision. There is another way to authenticate genuine signature by using Cross-validated Graph Matching (OSACGM) algorithm [6]. In this paper, OSACGM (Offline Signature Authentication using Cross Validate Graph Matching) algorithm is proposed, in which they use two concepts viz., Graph matching and Cross-validation for signature verification. The signature extraction method is used in pre-processing to obtain high resolution of signature for smaller normalization box. The signatures are compared by constructing a bipartite graph from which a minimum cost complete matching is obtained and the measure of dissimilarity i.e., the Euclidean distance is determined. The idea of finding the location variations of the strokes of signature geometry for signature verification is proposed and tested [7]. Two methods are proposed. The first method helps
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________________ Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 172 in determine the positional variation of the projection profiles of the signature, while the second method helps in finding out the actual positional variations of individual strokes in the 2-D signature patterns. In both methods, the statistics on these variations are computed. Here posional variations are finding out by applying various signatures as a input. The genuineness of the input is determined by judging the state of the training sets. The decision process involves the computation of a distance measure which takes the positional variations and the correlation between them into account. Another method for off-line Persian signature identification and verification is proposed that is based on Image Registration, DWT (Discrete Wavelet Transform) and Image Fusion [8]. Training signatures of each person are registered to overcome shift and scale problem. To extract features, at first, DWT is used to access details of signature; then several registered instances of each person signatures are fused together to generate reference pattern of person's signatures. In the classification phase, Euclidean distance between the test image and each pattern is used in different sub bands. Experimental results confirmed the effectiveness of the proposed method. The method for identifying genuineness of bank cheque signatures is proposed [9]. It describes how signature is identifies in cheques using various verification algorithm. Here proposed algorithm can be used for an effective signature verification system in the banking industry. The proposed methodology verifies a cheque by recognizing and analyzing the major details in a cheque, which includes the account holder’s signature. The results show the FAR and FRR in the verification process and the success ratio. In [11] the author presented new approach for signature region of interest pre processing. He used new auto cropping preparation on the basis of the image content, where the intensity value of pixel is the source of cropping. This approach provides both the possibility of improving the performance of security systems based on signature images, and also the ability to use only the region of interest of the used image to suit layout design of biometric systems. 4. PROPOSED SYSTEM ARCHITECTURE In order to design a system, which will detect the forge signatures by comparing some special features with original one, the following architecture has been proposed. Original scanned signature Preprocessing Noise removing cropping thinning Normalization Raw data High Intensity based extraction Loop based extraction Feature extraction Test Signature Preprocessing Verify by classifier The design process can be categorized into three main parts:  Preprocessing  Features extractions from both genuine and test signatures and  Compare the extracted features between them. 4.1 Pre Processing The principal objective of preprocessing is to obtain a transformed image with enhanced quality. It includes Noise removal, cropping, Thinning and Normalization. 4.1.1 Noise Removal Noise removal is required to eliminate the pixels that are not part of the signature, but contained in the image. When we scan signature from paper then some unwanted pixels comes with the scanned image that is not a part of the signature. So this unwanted part must be removed before feature extraction. 4.1.2 Cropping Cropping process removing unnecessary white back ground from the image.so as result it reduces the size of signature. The resultant signature only incudes the main framework of the signature. 4.1.3 Thinning Thinning is a morphological process necessary for the reduction of data and computational time. To reduce all objects in an image to lines, without changing the essential structure of the image, use the bwmorph function. Thinning works for objects consisting of lines (straight or curved). This method does not work for object having shapes that encloses a large area. Thinning is most of the time an intermediate process, to prepare the object for further analysis. It reduces the signature to a skeleton of unitary thickness.
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________________ Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 173 4.2 Feature Extraction Each person’s signature has different style. When someone tries to copy other’s signatures then they basically try to maintain the shape. But some important features can make a signature difficult to be copied. Now this features are analyzed and are used in this proposed method to differentiate genuine from forge one. Here we use high intensity variation and cross over points as a feature extraction. 4.2.1 High Intensity Variation Person usually does signatures with reference to fix angle. While doing signature person follow same kind of writing technique. So as result different intensity is generated the entire signature. Use of ball point as well as ink pan also create large different in intensity. This feature can be extracted easily to compare genuine and test signatures. Figure.2 and figure.3 represents the examples which includes high intensity variation points shown by arrow in it. Fig-2 Fig-3 4.2.2 Cross Over Points Each user has some monopoly in doing signature. Here each and every time shape of some special letter is always remaining constant. So as result it creates same cross over points. This point is very helpful for identify authors own signature among all. Figure 4 and figure 5 represents example of which includes cross over points shown by arrow in it. Fig-4 Fig-5 5. ALGORITHM FOR PRAPOSED SCHEME Step 1: Hand written signature is scanned. Step 2: Signature is preprocessed and converted into binary or gray scale as per requirement, removing noise from signatures, thinned signature and finally normalize the signature. Step 3: thinned signature is used for feature extraction. here special domain feature as high intensity variation points and cross over points are extracted from genuine as well as test signature. Step 4: These features are compared with the features of original one, which have already been extracted with help of appropriate classifier. 6. IMPLEMENTATION AND RESULTS 6.1 Database Creation During my research work we have taken total 100 signatures from total 10 faculty members.here each faculty member have to sign total 10 signature.here 10 signature includes 2-genuine signature,3-training signature and remaining five signature represents test signature.the following table represents the total signature database overview. Table 1 Database overview Sr no Name of faculty Notification No of signatures TotalGenuine Training Test 1 Kishan K Govani KKG 3 2 5 10 2 Ashish j J Donga DA 3 2 5 10 3 Dhaval Patel DD 3 2 5 10 4 Divyang D Vyas DDV 3 2 5 10 5 Dhaval R Bhojani DRB 3 2 5 10 6 Manoj N Popat MNP 3 2 5 10 7 Mitul R Khandhedia MRK 3 2 5 10 8 Neha Hirani NH 3 2 5 10 9 Raju J Kadivar RJK 3 2 5 10 10 Nitin Rola NR 3 2 5 10
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________________ Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 174 6.2 Noise Remove We applied a noise removal technique, which basically based on the size of pixel. In this algorithm some pixels, which are not connected with rest of the signature and have less than 8 pixel values are considered as noise and removed using MATLAB (R2012a). we choose 4 reference signatures. The output of each signature is shown below figure 6 to figure 8 Fig- 6 (a) original sign_DA Fig-6 (b) Noise marked_DA Fig-6(c) after Noise removed_DA Fig- 7 (a) original sign_DD Fig-7 (b) Noise marked_DD Fig-7(c) after Noise removed_DD Fig-8 (a) original sign_DDV Fig-8 (b) Noise marked_DDV Fig-8(c) after Noise removed_DDV 6.3 Thinning To reduce all objects in an image to lines, without changing the essential structure of the image, use the thinning algorithm. Figure 9 to figure 12 shows the resultant thinning output of reference signatures obtained by database respectively. Fig-9 Thinning sign_DA Fig-10 Thinning sign_DD
  • 6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________________ Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 175 Fig-11 Thinning sign_DDV 6.4 Feature Extraction After getting the preprocessed signature it is then come to find the forgery using feature extraction. Here we find out it with help of high intensity variation points and cross over loops from signatures. These features could be difficult to copy for a fake person. Figure represents high intensity variation points by blue colored “+” sign and cross over points are represented by red circled” sign. 6.4.1 High Intensity Variation based Feature Extraction Fig-12 high intensity variation _DA Fig-13 high intensity variation _DP Fig-14 high intensity variation _DDV 6.4.2 Cross over Points based Feature Extraction Fig-15 cross over points _DA Fig-16 cross over points _DP Fig-17 cross over points _DDV
  • 7. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________________ Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 176 7. CONCLUSIONS The proposed signature identification system is been based on some special features extraction. These features included high intensity variations and cross over points it uses a compact and memory efficient storage of feature points, which reduces memory overhead and results in faster comparisons of the data to be verified. From intuition, the statistics on the positional variations of the features or strokes of signature samples should be useful for verification. Here in this paper we identify the genuineness of the signatures using such kind of features. Here verification of these signatures can be done by choosing appropriate classification methods. Similar to other real world problems, no single approach may solve the signature verification problem perfectly, and practical solutions are often derived by combining different approaches. This technique can be added with any existing verification system for better result. REFERENCES [1]. Banshidhar Majhi, Y Santhosh Reddy, D Prasanna Babu, “Novel Features for Off-line Signature Verification” International Journal of Computers, Communications & Control, Vol.I, No. 1, pp. 17-24, 2006. [2]. Migual A. Ferrer, Jesus B. Alonso and Carlos M. Travieso, "Off-line Geometric Parameters for Automatic Signature Verification Using Fixed-Point Arithmetic", IEEE Tran. On Pattern Analysis and Machine Intelligence, vol.27, no.6, June 2005. [3]. Debasish Jena, Banshidhar Majhi, Saroj Kumar Panigrahy, Sanjay Kumar Jena, “Improved Offline Signature Verification Scheme Using Feature Point Extraction Method”. [4]. Ming Yin, Seinosuke Narita, “Speedup Method for Real- Time Thinning Algorithm” DICTA2002: Digital Image Computing Techniques and Applications, Melbourne, Australia, 21--22 January 2002. [5]. Yingna Deng, Hong Zhu, Shu Li, and Tao Wang, “Signature Verification Method Based on the Combination of Shape and Dynamic Feature”, Department of Automation and Information Engineering, Xi’an University of Technology, 710048 Xi’an China, 2005. [6]. Ramachandra, A. C. Pavithra, K. and Yashasvini, K. and Raja, K. B. and Venugopal, K. R. and Patnaik, L. M., “Cross- validation for graph matching based Offline Signature Verification”, In: INDICON 2008, India, pp: 17-22,2008. [7]. Fang, B., et al, “Off-line signature verification by the tracking of feature and stroke positions”, Pattern Recognition, Vol. 36, pp. 91-101, 2003. [8]. Samaneh Ghandali, Mohsen Ebrahimi Moghaddam, “Off- Line Persian Signature Identification and Verification Based on Image Registration and Fusion”, Journal of Multimedia, vol. 4, no. 3, June 2009. [9]. M.Jasmin Pemeena, Priya darsini ,K.Murugesan, Srinivasa Rao Inbathini, A.Jabeena, and K.Sai Tej “Bank Cheque Authentication using Signature” ,International Journal of Advanced Research in Computer Science and Software Engineering , Volume 3, Issue 5, May 2013. [10]. Raman Maini & Himanshu Aggarwal, “Study and Comparison of Various Image Edge Detection Techniques”, International Journal of Image Processing (IJIP), Volume 3, Issue 1, 2010. [11]. Bassam Al-Mahadeen, Mokhled S. AlTarawneh and Islam H. AlTarawneh “Signature Region of Interest using Auto cropping” IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 2, No 4, March 2010. [12]. Guangyu Zhu, Yefeng Zheng,David Doermann, Stefan Jaeger, “Signature Detection and Matching for Document Image Retrieval”, IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 31, NO. 11, NOVEMBER 2009. [13]. Ravi J, Sundernag Hosamani and K B Raja “Off-line Signature Identification Based on DWT and Spatial Domain Features” IEEE-20180