SlideShare ist ein Scribd-Unternehmen logo
1 von 26
Signature Verification using
Grid based feature extraction
                                       Aniket Sahasrabuddhe
                                                    Anurag
  D. Y. Patil College Of Engineering              Shashank
  Akurdi, Pune                             Sushant Saurav
Presentation Agenda

  Introduction
  Existingtechniques
  Proposed work
  Algorithms
  Mathematical model
  Advantages & disadvantages
  Conclusion
Introduction

  Computers     are largely used in almost each and
  every field.

  Thesecurity measures to be used must be
  cheap, reliable and un-intrusive to the
  authorized person.
Importance of Signature

  Transaction


  Individuals   less likely to object

  Biometric
Types of signature Identification

  Offline   Signature Verification
      deals with shape only

  Online    signature Verification
      deals with dynamic features like speed, pen
       pressure, directions, stroke length, and when the
       pen is lifted from the paper
Existing systems and limitations
 UsingVariable Length Segmentation and
  Hidden Markov Models
 New extreme points warping technique
 Wavelet Transform Based Global Features


  •   Percentage of error occurrence is high
  •   It has heavy computational load
  •   Optimal performance not guaranteed
Challenging tasks
  Differentiating between the parts of the signature
   that vary with each signing.

  The signature can vary substantially over an
   individual’s lifetime.
Proposed Work
    Signature Acquisition
    Signature Pre-processing
    Feature Extraction
    Signature Verification




                         Fig 1 System Architecture
Signature Acquisition

  Signature   is acquired from the user.




                 Fig.2 Sample Signatures
Signature Pre-processing

 Function of the preprocessor
 Image resizing
 Image binarizing
 Image thinning
 Image normalizing
Feature Extraction



        Fig.3 Grid over pre-processed signature image




        Fig.4 Matrix corresponding to the above grid
Signature Verification




              Fig.5 Signature Verification
Applications

  Banking,


  Passport   office,

  And  any other places which require
   identification !
Advantages

  Low   error rate.
  Forgery is detected even when the forger has
   managed to get a copy of the authentic
   signature.
  Fast and simple training.
  Cheap hardware.
  Little storage requirements.
Use Case Diagram
Class Diagram
Activity Diagram
Component Diagram
Sequence Diagram
Collaboration Diagram
State Diagram
Requirements & Technologies

 The hardware component we are using here is a scanning
 device(WEBCAM), high RAM for better results and good
 processor.

    •   Operating System: Windows XP or Higher
    •   NetBeans IDE 7.0
    •   SDK - J2SE
    •   Intel core 2 duo processor
    •   2.1 GHZ, 1 GB RAM
Conclusion
  The  pre-processed signature i.e. resized, binarized,
   thinned and rotation normalized signature is
   segmented into grid of size 10x20 cells where each
   cell is having 100 pixels.
  The system does not need any special hardware like
   tablet, fingerprint verification or iris scanning
   systems.
  It requires only low cost webcams
  The database used for the verification will not be
   large.
References
    Muhammed Nauman Sajid “Vital Sign: Personal Signature based Biometric
     Authentication System”, Bs degree thesis, Pakistan Institute of Engineering and
     Applied sciences, sept 2009.
    K. Yasuda, D. Muramatsu, and T. Matsumoto, “Visual-based online signature
     verification by pen tip tracking”, Proc. CIMCA 2008, 2008, pp. 175–180.
    D.Muramatsu, M. Kondo, M. Sasaki, S. Tachibana, and T. Matsumoto. “A
     markov chain monte carlo algorithm for bayesian dynamic signature
     verification”. IEEE Transactionson Information Forensics and Security,
     1(1):22–34, March,2006.
    Satoshi Shirato, D. Muramatsu, and T. Matsumoto, “camera-based online
     signature verification: Effects of camera positions.” World Automation
     congress2010 TSI press.
    D. Muramatsu, K. Yasuda, S. Shirato, and T. Matsumoto. “Visual-based online
     signature verification using features extracted from video”, Journal of Network
     and Computer Applications Volume 33, Issue 3, May 2010, Pages 333-341.
Cont.
    M. E. Munich and P. Perona. “Visual identification by signature tracking.”
     IEEE Trans. Pattern Analysis and MachineIntelligence, 25(2):200–217,
     February 2003.
    F.A.Afsar, M. Arif and U. Farrukh, “Wavelet Transform Based Global Features
     for Online Signature Recognition”, Proceeding of IEEE International Multi-
     topic Conference INMIC, pp. 1-6 Dec. 2005.
    Charles E. Pippin, “Dynamic Signature Verification using Local and Global
     Features”, Georgia Institute of Technology, July 2004.
    Hao Feng and Chan Choong Wah, “Online Signature Verification Using New
     Extreme Points Warping Technique”, Pattern Recognition Letters, vol. 24, pp.
     2943-2951, Dec. 2003.
    F.A. Afsar, M. Arif and U. Farrukh, “Wavelet Transform Based Global Features
     for Online Signature Recognition”, Proceeding of IEEE International Multi-
     topic Conference INMIC, pp. 1-6 Dec. 2005.
Thank You

Weitere ähnliche Inhalte

Was ist angesagt?

Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPTSiddharth Modi
 
Handwriting Recognition
Handwriting RecognitionHandwriting Recognition
Handwriting RecognitionBindu Karki
 
Fraud Detection Using Signature Recognition
Fraud Detection Using Signature RecognitionFraud Detection Using Signature Recognition
Fraud Detection Using Signature RecognitionTejraj Thakor
 
Final Report on Optical Character Recognition
Final Report on Optical Character Recognition Final Report on Optical Character Recognition
Final Report on Optical Character Recognition Vidyut Singhania
 
Optical character recognition IEEE Paper Study
Optical character recognition IEEE Paper StudyOptical character recognition IEEE Paper Study
Optical character recognition IEEE Paper StudyEr. Ashish Pandey
 
Optical Character Recognition (OCR) based Retrieval
Optical Character Recognition (OCR) based RetrievalOptical Character Recognition (OCR) based Retrieval
Optical Character Recognition (OCR) based RetrievalBiniam Asnake
 
project ppt.pptx
project ppt.pptxproject ppt.pptx
project ppt.pptxGYamini22
 
Machine learning Summer Training report
Machine learning Summer Training reportMachine learning Summer Training report
Machine learning Summer Training reportSubhadip Mondal
 
key distribution in network security
key distribution in network securitykey distribution in network security
key distribution in network securitybabak danyal
 
CMACs and MACS based on block ciphers, Digital signature
CMACs and MACS based on block ciphers, Digital signatureCMACs and MACS based on block ciphers, Digital signature
CMACs and MACS based on block ciphers, Digital signatureAdarsh Patel
 
Audio steganography project presentation
Audio steganography project presentationAudio steganography project presentation
Audio steganography project presentationkartikeya upadhyay
 
Signature Verification.pptx
Signature Verification.pptxSignature Verification.pptx
Signature Verification.pptxSayaliKawale2
 
Optical Character Recognition (OCR)
Optical Character Recognition (OCR)Optical Character Recognition (OCR)
Optical Character Recognition (OCR)Vidyut Singhania
 
A STUDY ON OPTICAL CHARACTER RECOGNITION TECHNIQUES
A STUDY ON OPTICAL CHARACTER RECOGNITION TECHNIQUESA STUDY ON OPTICAL CHARACTER RECOGNITION TECHNIQUES
A STUDY ON OPTICAL CHARACTER RECOGNITION TECHNIQUESijcsitcejournal
 
Transposition cipher techniques
Transposition cipher techniquesTransposition cipher techniques
Transposition cipher techniquesSHUBHA CHATURVEDI
 

Was ist angesagt? (20)

Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
Handwriting Recognition
Handwriting RecognitionHandwriting Recognition
Handwriting Recognition
 
Fraud Detection Using Signature Recognition
Fraud Detection Using Signature RecognitionFraud Detection Using Signature Recognition
Fraud Detection Using Signature Recognition
 
ocr
ocrocr
ocr
 
Final Report on Optical Character Recognition
Final Report on Optical Character Recognition Final Report on Optical Character Recognition
Final Report on Optical Character Recognition
 
Optical character recognition IEEE Paper Study
Optical character recognition IEEE Paper StudyOptical character recognition IEEE Paper Study
Optical character recognition IEEE Paper Study
 
Optical Character Recognition (OCR) based Retrieval
Optical Character Recognition (OCR) based RetrievalOptical Character Recognition (OCR) based Retrieval
Optical Character Recognition (OCR) based Retrieval
 
project ppt.pptx
project ppt.pptxproject ppt.pptx
project ppt.pptx
 
Machine learning Summer Training report
Machine learning Summer Training reportMachine learning Summer Training report
Machine learning Summer Training report
 
Tamil OCR using Tesseract OCR Engine
Tamil OCR using Tesseract OCR EngineTamil OCR using Tesseract OCR Engine
Tamil OCR using Tesseract OCR Engine
 
key distribution in network security
key distribution in network securitykey distribution in network security
key distribution in network security
 
CMACs and MACS based on block ciphers, Digital signature
CMACs and MACS based on block ciphers, Digital signatureCMACs and MACS based on block ciphers, Digital signature
CMACs and MACS based on block ciphers, Digital signature
 
Handwritten Character Recognition
Handwritten Character RecognitionHandwritten Character Recognition
Handwritten Character Recognition
 
Audio steganography project presentation
Audio steganography project presentationAudio steganography project presentation
Audio steganography project presentation
 
Keymanagement of ipsec
Keymanagement of ipsecKeymanagement of ipsec
Keymanagement of ipsec
 
Signature Verification.pptx
Signature Verification.pptxSignature Verification.pptx
Signature Verification.pptx
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
Optical Character Recognition (OCR)
Optical Character Recognition (OCR)Optical Character Recognition (OCR)
Optical Character Recognition (OCR)
 
A STUDY ON OPTICAL CHARACTER RECOGNITION TECHNIQUES
A STUDY ON OPTICAL CHARACTER RECOGNITION TECHNIQUESA STUDY ON OPTICAL CHARACTER RECOGNITION TECHNIQUES
A STUDY ON OPTICAL CHARACTER RECOGNITION TECHNIQUES
 
Transposition cipher techniques
Transposition cipher techniquesTransposition cipher techniques
Transposition cipher techniques
 

Andere mochten auch

Signature verification in biometrics
Signature verification in biometricsSignature verification in biometrics
Signature verification in biometricsSwapnil Bangera
 
Offline signature verification based on geometric feature extraction using ar...
Offline signature verification based on geometric feature extraction using ar...Offline signature verification based on geometric feature extraction using ar...
Offline signature verification based on geometric feature extraction using ar...Cen Paul
 
Home appliances control system
Home appliances control systemHome appliances control system
Home appliances control systemSundas Kayani
 
An offline signature recognition and verification system based on neural network
An offline signature recognition and verification system based on neural networkAn offline signature recognition and verification system based on neural network
An offline signature recognition and verification system based on neural networkeSAT Journals
 
Offline Handwritten Signature Identification and Verification using Multi-Res...
Offline Handwritten Signature Identification and Verification using Multi-Res...Offline Handwritten Signature Identification and Verification using Multi-Res...
Offline Handwritten Signature Identification and Verification using Multi-Res...CSCJournals
 
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHODFORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHODeditorijcres
 
Digital image forgery detection
Digital image forgery detectionDigital image forgery detection
Digital image forgery detectionAB Rizvi
 
Full biometric eye tracking
Full biometric eye trackingFull biometric eye tracking
Full biometric eye trackingVinoth Barithi
 
Embedded System Design for Iris Recognition System.
Embedded System Design for Iris Recognition System.Embedded System Design for Iris Recognition System.
Embedded System Design for Iris Recognition System.Lakshmi Sarvani Videla
 
Home automation
Home automationHome automation
Home automationahmkashwa
 
Fingerprint based transaction system
Fingerprint based transaction systemFingerprint based transaction system
Fingerprint based transaction systemsagar solanky
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPTsravya raju
 
Biometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febBiometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febNavin Kumar
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniquesSubhash Basistha
 
Online voting system project
Online voting system projectOnline voting system project
Online voting system projectsnauriyal1994
 
Online property management system design document
Online property management system design documentOnline property management system design document
Online property management system design documentAbhilasha Lahigude
 
Electronic banking presentation
Electronic banking presentationElectronic banking presentation
Electronic banking presentationxabi951
 

Andere mochten auch (20)

Offline Signature Verification and Recognition using Neural Network
Offline Signature Verification and Recognition using Neural NetworkOffline Signature Verification and Recognition using Neural Network
Offline Signature Verification and Recognition using Neural Network
 
Signature verification in biometrics
Signature verification in biometricsSignature verification in biometrics
Signature verification in biometrics
 
Offline signature verification based on geometric feature extraction using ar...
Offline signature verification based on geometric feature extraction using ar...Offline signature verification based on geometric feature extraction using ar...
Offline signature verification based on geometric feature extraction using ar...
 
Home appliances control system
Home appliances control systemHome appliances control system
Home appliances control system
 
An offline signature recognition and verification system based on neural network
An offline signature recognition and verification system based on neural networkAn offline signature recognition and verification system based on neural network
An offline signature recognition and verification system based on neural network
 
Offline Handwritten Signature Identification and Verification using Multi-Res...
Offline Handwritten Signature Identification and Verification using Multi-Res...Offline Handwritten Signature Identification and Verification using Multi-Res...
Offline Handwritten Signature Identification and Verification using Multi-Res...
 
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHODFORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
 
Digital image forgery detection
Digital image forgery detectionDigital image forgery detection
Digital image forgery detection
 
Image forgery and security
Image forgery and securityImage forgery and security
Image forgery and security
 
Full biometric eye tracking
Full biometric eye trackingFull biometric eye tracking
Full biometric eye tracking
 
finger prints
finger printsfinger prints
finger prints
 
Embedded System Design for Iris Recognition System.
Embedded System Design for Iris Recognition System.Embedded System Design for Iris Recognition System.
Embedded System Design for Iris Recognition System.
 
Home automation
Home automationHome automation
Home automation
 
Fingerprint based transaction system
Fingerprint based transaction systemFingerprint based transaction system
Fingerprint based transaction system
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPT
 
Biometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febBiometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 feb
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniques
 
Online voting system project
Online voting system projectOnline voting system project
Online voting system project
 
Online property management system design document
Online property management system design documentOnline property management system design document
Online property management system design document
 
Electronic banking presentation
Electronic banking presentationElectronic banking presentation
Electronic banking presentation
 

Ähnlich wie Sign verification

OSPCV: Off-line Signature Verification using Principal Component Variances
OSPCV: Off-line Signature Verification using Principal Component VariancesOSPCV: Off-line Signature Verification using Principal Component Variances
OSPCV: Off-line Signature Verification using Principal Component VariancesIOSR Journals
 
Artificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification SystemArtificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification SystemIRJET Journal
 
IRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNNIRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNNIRJET Journal
 
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET Journal
 
IJSRED-V2I2P33
IJSRED-V2I2P33IJSRED-V2I2P33
IJSRED-V2I2P33IJSRED
 
A Fusion of Statistical Distance and Signature Length Based Approach for Offl...
A Fusion of Statistical Distance and Signature Length Based Approach for Offl...A Fusion of Statistical Distance and Signature Length Based Approach for Offl...
A Fusion of Statistical Distance and Signature Length Based Approach for Offl...IRJET Journal
 
Pattern recognition on line signature
Pattern recognition on line signaturePattern recognition on line signature
Pattern recognition on line signatureMazin Alwaaly
 
Distance Based Verification Technique for Online Signature System
Distance Based Verification Technique for Online Signature SystemDistance Based Verification Technique for Online Signature System
Distance Based Verification Technique for Online Signature SystemIRJET Journal
 
High protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyHigh protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyAlfred Oboi
 
Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...eSAT Publishing House
 
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...IRJET Journal
 
Vehicle Number Plate Recognition System
Vehicle Number Plate Recognition SystemVehicle Number Plate Recognition System
Vehicle Number Plate Recognition Systemprashantdahake
 
FINGERPRINT BASED LOCKER WITH IMAGE CAPTURE
FINGERPRINT BASED LOCKER WITH IMAGE CAPTUREFINGERPRINT BASED LOCKER WITH IMAGE CAPTURE
FINGERPRINT BASED LOCKER WITH IMAGE CAPTUREMichael George
 
Offline Handwritten Signature Verification using Neural Network
Offline Handwritten Signature Verification using Neural NetworkOffline Handwritten Signature Verification using Neural Network
Offline Handwritten Signature Verification using Neural Networkijiert bestjournal
 
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...inventionjournals
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 

Ähnlich wie Sign verification (20)

OSPCV: Off-line Signature Verification using Principal Component Variances
OSPCV: Off-line Signature Verification using Principal Component VariancesOSPCV: Off-line Signature Verification using Principal Component Variances
OSPCV: Off-line Signature Verification using Principal Component Variances
 
B017150823
B017150823B017150823
B017150823
 
Artificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification SystemArtificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification System
 
IRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNNIRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNN
 
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
 
IJSRED-V2I2P33
IJSRED-V2I2P33IJSRED-V2I2P33
IJSRED-V2I2P33
 
A Fusion of Statistical Distance and Signature Length Based Approach for Offl...
A Fusion of Statistical Distance and Signature Length Based Approach for Offl...A Fusion of Statistical Distance and Signature Length Based Approach for Offl...
A Fusion of Statistical Distance and Signature Length Based Approach for Offl...
 
Pattern recognition on line signature
Pattern recognition on line signaturePattern recognition on line signature
Pattern recognition on line signature
 
Distance Based Verification Technique for Online Signature System
Distance Based Verification Technique for Online Signature SystemDistance Based Verification Technique for Online Signature System
Distance Based Verification Technique for Online Signature System
 
Choudhary2015
Choudhary2015Choudhary2015
Choudhary2015
 
3 d
3 d3 d
3 d
 
High protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyHigh protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technology
 
Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...
 
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
 
Vehicle Number Plate Recognition System
Vehicle Number Plate Recognition SystemVehicle Number Plate Recognition System
Vehicle Number Plate Recognition System
 
FINGERPRINT BASED LOCKER WITH IMAGE CAPTURE
FINGERPRINT BASED LOCKER WITH IMAGE CAPTUREFINGERPRINT BASED LOCKER WITH IMAGE CAPTURE
FINGERPRINT BASED LOCKER WITH IMAGE CAPTURE
 
Offline Handwritten Signature Verification using Neural Network
Offline Handwritten Signature Verification using Neural NetworkOffline Handwritten Signature Verification using Neural Network
Offline Handwritten Signature Verification using Neural Network
 
Implementation of Biometric Based Electoral Fraud Desisting System
Implementation of Biometric Based Electoral Fraud Desisting SystemImplementation of Biometric Based Electoral Fraud Desisting System
Implementation of Biometric Based Electoral Fraud Desisting System
 
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 

Sign verification

  • 1. Signature Verification using Grid based feature extraction Aniket Sahasrabuddhe Anurag D. Y. Patil College Of Engineering Shashank Akurdi, Pune Sushant Saurav
  • 2. Presentation Agenda  Introduction  Existingtechniques  Proposed work  Algorithms  Mathematical model  Advantages & disadvantages  Conclusion
  • 3. Introduction  Computers are largely used in almost each and every field.  Thesecurity measures to be used must be cheap, reliable and un-intrusive to the authorized person.
  • 4. Importance of Signature  Transaction  Individuals less likely to object  Biometric
  • 5. Types of signature Identification  Offline Signature Verification  deals with shape only  Online signature Verification  deals with dynamic features like speed, pen pressure, directions, stroke length, and when the pen is lifted from the paper
  • 6. Existing systems and limitations  UsingVariable Length Segmentation and Hidden Markov Models  New extreme points warping technique  Wavelet Transform Based Global Features • Percentage of error occurrence is high • It has heavy computational load • Optimal performance not guaranteed
  • 7. Challenging tasks  Differentiating between the parts of the signature that vary with each signing.  The signature can vary substantially over an individual’s lifetime.
  • 8. Proposed Work  Signature Acquisition  Signature Pre-processing  Feature Extraction  Signature Verification Fig 1 System Architecture
  • 9. Signature Acquisition  Signature is acquired from the user. Fig.2 Sample Signatures
  • 10. Signature Pre-processing Function of the preprocessor Image resizing Image binarizing Image thinning Image normalizing
  • 11. Feature Extraction Fig.3 Grid over pre-processed signature image Fig.4 Matrix corresponding to the above grid
  • 12. Signature Verification Fig.5 Signature Verification
  • 13. Applications  Banking,  Passport office,  And any other places which require identification !
  • 14. Advantages  Low error rate.  Forgery is detected even when the forger has managed to get a copy of the authentic signature.  Fast and simple training.  Cheap hardware.  Little storage requirements.
  • 22. Requirements & Technologies The hardware component we are using here is a scanning device(WEBCAM), high RAM for better results and good processor. • Operating System: Windows XP or Higher • NetBeans IDE 7.0 • SDK - J2SE • Intel core 2 duo processor • 2.1 GHZ, 1 GB RAM
  • 23. Conclusion  The pre-processed signature i.e. resized, binarized, thinned and rotation normalized signature is segmented into grid of size 10x20 cells where each cell is having 100 pixels.  The system does not need any special hardware like tablet, fingerprint verification or iris scanning systems.  It requires only low cost webcams  The database used for the verification will not be large.
  • 24. References  Muhammed Nauman Sajid “Vital Sign: Personal Signature based Biometric Authentication System”, Bs degree thesis, Pakistan Institute of Engineering and Applied sciences, sept 2009.  K. Yasuda, D. Muramatsu, and T. Matsumoto, “Visual-based online signature verification by pen tip tracking”, Proc. CIMCA 2008, 2008, pp. 175–180.  D.Muramatsu, M. Kondo, M. Sasaki, S. Tachibana, and T. Matsumoto. “A markov chain monte carlo algorithm for bayesian dynamic signature verification”. IEEE Transactionson Information Forensics and Security, 1(1):22–34, March,2006.  Satoshi Shirato, D. Muramatsu, and T. Matsumoto, “camera-based online signature verification: Effects of camera positions.” World Automation congress2010 TSI press.  D. Muramatsu, K. Yasuda, S. Shirato, and T. Matsumoto. “Visual-based online signature verification using features extracted from video”, Journal of Network and Computer Applications Volume 33, Issue 3, May 2010, Pages 333-341.
  • 25. Cont.  M. E. Munich and P. Perona. “Visual identification by signature tracking.” IEEE Trans. Pattern Analysis and MachineIntelligence, 25(2):200–217, February 2003.  F.A.Afsar, M. Arif and U. Farrukh, “Wavelet Transform Based Global Features for Online Signature Recognition”, Proceeding of IEEE International Multi- topic Conference INMIC, pp. 1-6 Dec. 2005.  Charles E. Pippin, “Dynamic Signature Verification using Local and Global Features”, Georgia Institute of Technology, July 2004.  Hao Feng and Chan Choong Wah, “Online Signature Verification Using New Extreme Points Warping Technique”, Pattern Recognition Letters, vol. 24, pp. 2943-2951, Dec. 2003.  F.A. Afsar, M. Arif and U. Farrukh, “Wavelet Transform Based Global Features for Online Signature Recognition”, Proceeding of IEEE International Multi- topic Conference INMIC, pp. 1-6 Dec. 2005.