SlideShare ist ein Scribd-Unternehmen logo
1 von 3
Downloaden Sie, um offline zu lesen
ISSN: 2312-7694
Sawati et al. / International Journal of Computer and Communication System Engineering (IJCCSE)
66 | P a g e
© 2014, IJCCSE All Rights Reserved Vol. 1 No.02 August 2014 www.ijccse.com
Analysis of Male and Female Handwriting
Swati Srivastava
Department of Computer Science & Engineering
Dr. K.N.Modi Foundation
Modinagar, India
swati.cs1409@gmail.com
Abstract— Handwritten Signatures are the most common
biometrics used for authentication. In this paper, it has
been analyzed that the handwriting of male writers is
more consistent than that of female writers. The analysis
has been done on the handwritten signatures of male and
female writers. For database, 100 handwritten signatures
have been taken from female writers and 100 handwritten
signatures have been taken from male writers i.e. from 10
male writers and 10 female writers, 10 signatures have
been taken from each. Database has been created by
taking signatures from writers time to time by different
pens. It has been observed from experiments that intra
personal variations in male writer’s signatures are less
than that of female writer’s signatures.
Index Terms—Biometrics, Handwritten signatures, intra
personal variations
I. INTRODUCTION
In this paper, there has been made a comparison of male and
female handwritings on the basis of two criteria:
First, the signature has been verified and the FRR (False
Rejection Rate) has calculated,, which can be defined as: FRR
(False Rejection Rate): The percentage of original signatures
that are falsely rejected by the system is called the False
Rejection Rate (FRR) and is given by:
FRR =
No .of originals rejected
No .of originals tested
x 100
Verification is based on the technique [6] that verifies the
human identity by extracting the pixel oriented and component
oriented features from their handwritten signatures. The pixel
oriented features used in this system are m x n matrix
corresponding to the m x n grid over signature image, an array
of size m, where each element of an array gives the number of
black pixels in the corresponding row and an array of size n,
where each element of an array gives the number of black
pixels in the corresponding column. The component oriented
features used in the proposed system are center of gravity in x
direction, center of gravity in y direction, center of gravity
slope, normalized sum of angles of all points of the signature
content, contour area and aspect ratio. Verification phase of
the proposed system has two steps: Global Verification and
Local Verification. For global verification, pixel oriented
features are used and for local verification, component
oriented features are used. Features of test signature image are
extracted and compared with the already trained features of
the training signature image. If the signature is locally
accepted as well as globally accepted then only it can be said
that signature has accepted otherwise rejected. Fig.1 shows the
verification technique used here.
Second , the standard deviation of each feature of a signature
of a male and a female writer has calculated by following
formula:
𝑆. 𝐷. =
(𝑥𝑖 − 𝑥)2𝑛
𝑖=0
𝑛
where xi is the feature value of the ith
signature,
𝑥 is the mean of n signature values
n is total number of signatures(here n=10)
II. METHODOLOGY
For analysis, the database used consists of 100 handwritten
signatures from female writers and 100 handwritten signatures
from male writers i.e. from 10 male writers and 10 female
writers, 10 signatures have been taken from each. I have to
analyze the intrapersonal variations for each writer. This can
be done in two ways by calculating:
(i) FRR of each writer
(ii) Standard deviation for each feature of a signature of the
writer
ISSN: 2312-7694
Sawati et al. / International Journal of Computer and Communication System Engineering (IJCCSE)
67 | P a g e
© 2014, IJCCSE All Rights Reserved Vol. 1 No.02 August 2014 www.ijccse.com
For FRR, pixel oriented and component oriented features [6]
are extracted for each signature. 5 signatures of each writer are
taken as reference signatures. Extract the required features for
each signature and store the maximum and minimum values
for each feature. Remaining 5 signatures are used as test
images. Extract the features of test image and then verification
[6] is done. In table I and II, the FRR values for male and
female signatures are shown respectively. And for standard
deviation, five features have been extracted for each signature.
The features are:
F1-Center of gravity in x direction
F2-Center of gravity in y direction
F3-Center of gravity slope
F4-Normalized sum of angles of all points of the signature
image
F5-Aspect Ratio
FIG.1 BLOCK DIAGRAM OF THE TECHNIQUE USED FOR
VERIFICATION
Calculate the feature values of all signatures of each writer.
Then calculate the standard deviation of each feature of all the
signatures of each writer. Then compare the values for male
and female writers. In the table III and IV , the values are
shown for signatures of a male writer and that of a female
writer .
III. RESULTS
Table I and II gives the FRR values of a male writer and that of
a female writer. By comparing FRR values,I got the result that
FRR of male writer is less than that of female writer i.e. there
is less intra personal variations in male handwriting. Table III
and IV gives the feature values of 10 signatures of a male and a
female writer respectively. From Table V, it can be seen that
standard deviation values of feature of a male writer’s
signatures is less than that of a female writer’s. Again it is due
to less intra personal variations in male handwriting.
Verification Results of Male Signatures
TABLE I. MALE SIGNATURE VERIFICATION RESULTS
Threshold FRR(%)
65 0
70 0.51
75 4.36
80 7.92
85 10.96
90 17.23
95 19.25
100 19.24
From Table I ,it can be seen that FRR is 7.92% for a male
writer.
Verification Results of Female Signatures
TABLE II. FEMALE SIGNATURE VERIFICATION RESULTS
Threshold FRR(%)
65 0
70 3.21
75 6.24
80 9
85 13.20
90 19.52
95 24.14
100 26.78
From Table II ,it can be seen that FRR is 9% for a female
writer .
TABLE III. FEATURE VALUES OF 10 SIGNATURES OF A MALE
WRITER
Signature
No.
F1 F2 F3 F4 F5
1 103 61 2.3 3.4 1.6
2 101 58 1.7 3.7 1.9
3 98 63 2.2 4.1 1.9
4 102 54 -2.9 3.6 2.1
ISSN: 2312-7694
Sawati et al. / International Journal of Computer and Communication System Engineering (IJCCSE)
68 | P a g e
© 2014, IJCCSE All Rights Reserved Vol. 1 No.02 August 2014 www.ijccse.com
5 98 57 -8.3 4.8 2.2
6 99 53 -7.7 5.1 2.2
7 97 67 0.5 3.6 2.1
8 105 53 -2.3 3.4 2.2
9 103 54 -1.1 3.9 1.8
10 100 58 0 3.4 1.8
TABLE IV. FEATURE VALUES OF 10 SIGNATURES OF A FEMALE
WRITER
Signature
No.
F1 F2 F3 F4 F5
1 83 65 -1.3 4.5 1.8
2 92 59 7.2 4.8 1.4
3 88 48 10.2 6.5 1.2
4 90 56 9.2 4.3 1.3
5 87 57 3.4 4.5 1.5
6 83 64 6.3 4.4 1.5
7 79 56 6.7 5.2 1.4
8 92 55 9.7 4.6 1.1
9 79 56 8.5 5.6 1.3
10 77 59 12.4 4.9 1.2
TABLE V. STANDARD DEVIATIONS OF THE FEATURES OF A
MALE AND A FEMALE SIGNATURE
Feature Male Sign. Female Sign.
F1 2.6 5.5
F2 4.6 4.7
F3 3.8 3.8
F4 0.6 0.7
F5 0.2 0.3
IV. CONCLUSION
For signatures of male writers, verification technique[6] gives
FRR of 7.92% . For signatures of female writers, verification
technique [6] gives FRR of 9% .
From results it can be seen that male writers signatures are
more consistent than that of female writers i.e. false rejection
rate of male writers is less than that of female writers. Also,
standard deviation of the features of signatures of a male
writer is less than that of female writer. These both results are
due to less intra personal variations in male handwriting.
Thus, from the values of FRR and standard deviation I can
conclude that male handwriting is more consistent than female
handwriting.
REFERENCES
[1]. Meenakshi K. Kalera, Sargur Srihari and Aihua Xu,
2004,“Offline Signature Verification and Identification using
Distance Statistics,” International Journal of Pattern
Recognition and Artificial Intelligence, Vol.18, No.7, pp.1339-
1360.
[2]. Banshider Majhi, Y Santhosh Reddy, D Prasanna Babu, 2006,
“Novel Features for Offline Signature
Verification,”International Journal of
Computers,Communications & Control, Vol. I, No. 1, pp. 17-
24.
[3]. Debasish Jena, Banshidhar Majhi, Saroj kumar Panigrahy,
Sanjay Kumar Jena, ICCI 2008,“Improved Offline Signature
Verification Scheme Using Feature Point Extraction Method,”
Proc. 7th IEEE Int. Conference on Cognitive Informatics, pp.
475-480.
[4]. Mishra, Prabit Kumar and Sahoo, Mukti Ranjan, 2009,“Offline
Signature Verification Scheme”.
[5]. Swati Srivastava and Suneeta Agrawal, “Offline Signature
Verification using Grid based Feature Extraction,” 2nd IEEE
International Conference on Computer & Communication
Technology (ICCCT-2011), pp.185-190.
[6]. Swati Srivastava and Suneeta Agarwal,”Offline
Signature Verification based on Pixel oriented and Component
Oriented Feature Extraction, “International Journal of
Advanced Research In Computer Science(IJARCS),Vol.4,
No.10,2013,(ISSN No. 0976-5697).
[7]. W Abbas, N Abbas, U Majeed, “Performance
enhancement of End to End Quality of Service in
WCDMA wireless networks, Science International
Journal Vol. 26 issue 02, Pp 613-620, 2014.

Weitere ähnliche Inhalte

Ähnlich wie Analysis of Male and Female Handwriting

OFFLINE SIGNATURE VERIFICATION SYSTEM FOR BANK CHEQUES USING ZERNIKE MOMENTS,...
OFFLINE SIGNATURE VERIFICATION SYSTEM FOR BANK CHEQUES USING ZERNIKE MOMENTS,...OFFLINE SIGNATURE VERIFICATION SYSTEM FOR BANK CHEQUES USING ZERNIKE MOMENTS,...
OFFLINE SIGNATURE VERIFICATION SYSTEM FOR BANK CHEQUES USING ZERNIKE MOMENTS,...ijaia
 
Ganesan dhawanrpt
Ganesan dhawanrptGanesan dhawanrpt
Ganesan dhawanrptpramod naik
 
An offline signature verification using pixels intensity levels
An offline signature verification using pixels intensity levelsAn offline signature verification using pixels intensity levels
An offline signature verification using pixels intensity levelsSalam Shah
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Detection of Behavior Using Machine Learning
Detection of Behavior Using Machine LearningDetection of Behavior Using Machine Learning
Detection of Behavior Using Machine LearningIRJET Journal
 
Automatic signature verification with chain code using weighted distance and ...
Automatic signature verification with chain code using weighted distance and ...Automatic signature verification with chain code using weighted distance and ...
Automatic signature verification with chain code using weighted distance and ...eSAT Journals
 
Design and implementation of optical character recognition using template mat...
Design and implementation of optical character recognition using template mat...Design and implementation of optical character recognition using template mat...
Design and implementation of optical character recognition using template mat...eSAT Journals
 
Offline Handwritten Signature Identification and Verification using Multi-Res...
Offline Handwritten Signature Identification and Verification using Multi-Res...Offline Handwritten Signature Identification and Verification using Multi-Res...
Offline Handwritten Signature Identification and Verification using Multi-Res...CSCJournals
 
Distance Based Verification Technique for Online Signature System
Distance Based Verification Technique for Online Signature SystemDistance Based Verification Technique for Online Signature System
Distance Based Verification Technique for Online Signature SystemIRJET Journal
 
novel method of identifying fingerprint using minutiae matching in biometric ...
novel method of identifying fingerprint using minutiae matching in biometric ...novel method of identifying fingerprint using minutiae matching in biometric ...
novel method of identifying fingerprint using minutiae matching in biometric ...INFOGAIN PUBLICATION
 
ENHANCED SIGNATURE VERIFICATION AND RECOGNITION USING MATLAB
ENHANCED SIGNATURE VERIFICATION AND RECOGNITION USING MATLABENHANCED SIGNATURE VERIFICATION AND RECOGNITION USING MATLAB
ENHANCED SIGNATURE VERIFICATION AND RECOGNITION USING MATLABAM Publications
 
A Review on Robust identity verification using signature of a person
A Review on Robust identity verification using signature of a personA Review on Robust identity verification using signature of a person
A Review on Robust identity verification using signature of a personEditor IJMTER
 
Overlapped Fingerprint Separation for Fingerprint Authentication
Overlapped Fingerprint Separation for Fingerprint AuthenticationOverlapped Fingerprint Separation for Fingerprint Authentication
Overlapped Fingerprint Separation for Fingerprint AuthenticationIJERA Editor
 
Effective Implementation techniques in Offline Signature Verification
Effective Implementation techniques in Offline Signature  VerificationEffective Implementation techniques in Offline Signature  Verification
Effective Implementation techniques in Offline Signature VerificationIOSR Journals
 
IRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNNIRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNNIRJET Journal
 
A SURVEY ON VARIOUS APPROACHES TO FINGERPRINT MATCHING FOR PERSONAL VERIFICAT...
A SURVEY ON VARIOUS APPROACHES TO FINGERPRINT MATCHING FOR PERSONAL VERIFICAT...A SURVEY ON VARIOUS APPROACHES TO FINGERPRINT MATCHING FOR PERSONAL VERIFICAT...
A SURVEY ON VARIOUS APPROACHES TO FINGERPRINT MATCHING FOR PERSONAL VERIFICAT...IJCSES Journal
 
Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...eSAT Publishing House
 
An appraisal of offline signature verification techniques
An appraisal of offline signature verification techniquesAn appraisal of offline signature verification techniques
An appraisal of offline signature verification techniquesSalam Shah
 
Artificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification SystemArtificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification SystemIRJET Journal
 
Offline handwritten signature identification using adaptive window positionin...
Offline handwritten signature identification using adaptive window positionin...Offline handwritten signature identification using adaptive window positionin...
Offline handwritten signature identification using adaptive window positionin...sipij
 

Ähnlich wie Analysis of Male and Female Handwriting (20)

OFFLINE SIGNATURE VERIFICATION SYSTEM FOR BANK CHEQUES USING ZERNIKE MOMENTS,...
OFFLINE SIGNATURE VERIFICATION SYSTEM FOR BANK CHEQUES USING ZERNIKE MOMENTS,...OFFLINE SIGNATURE VERIFICATION SYSTEM FOR BANK CHEQUES USING ZERNIKE MOMENTS,...
OFFLINE SIGNATURE VERIFICATION SYSTEM FOR BANK CHEQUES USING ZERNIKE MOMENTS,...
 
Ganesan dhawanrpt
Ganesan dhawanrptGanesan dhawanrpt
Ganesan dhawanrpt
 
An offline signature verification using pixels intensity levels
An offline signature verification using pixels intensity levelsAn offline signature verification using pixels intensity levels
An offline signature verification using pixels intensity levels
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Detection of Behavior Using Machine Learning
Detection of Behavior Using Machine LearningDetection of Behavior Using Machine Learning
Detection of Behavior Using Machine Learning
 
Automatic signature verification with chain code using weighted distance and ...
Automatic signature verification with chain code using weighted distance and ...Automatic signature verification with chain code using weighted distance and ...
Automatic signature verification with chain code using weighted distance and ...
 
Design and implementation of optical character recognition using template mat...
Design and implementation of optical character recognition using template mat...Design and implementation of optical character recognition using template mat...
Design and implementation of optical character recognition using template mat...
 
Offline Handwritten Signature Identification and Verification using Multi-Res...
Offline Handwritten Signature Identification and Verification using Multi-Res...Offline Handwritten Signature Identification and Verification using Multi-Res...
Offline Handwritten Signature Identification and Verification using Multi-Res...
 
Distance Based Verification Technique for Online Signature System
Distance Based Verification Technique for Online Signature SystemDistance Based Verification Technique for Online Signature System
Distance Based Verification Technique for Online Signature System
 
novel method of identifying fingerprint using minutiae matching in biometric ...
novel method of identifying fingerprint using minutiae matching in biometric ...novel method of identifying fingerprint using minutiae matching in biometric ...
novel method of identifying fingerprint using minutiae matching in biometric ...
 
ENHANCED SIGNATURE VERIFICATION AND RECOGNITION USING MATLAB
ENHANCED SIGNATURE VERIFICATION AND RECOGNITION USING MATLABENHANCED SIGNATURE VERIFICATION AND RECOGNITION USING MATLAB
ENHANCED SIGNATURE VERIFICATION AND RECOGNITION USING MATLAB
 
A Review on Robust identity verification using signature of a person
A Review on Robust identity verification using signature of a personA Review on Robust identity verification using signature of a person
A Review on Robust identity verification using signature of a person
 
Overlapped Fingerprint Separation for Fingerprint Authentication
Overlapped Fingerprint Separation for Fingerprint AuthenticationOverlapped Fingerprint Separation for Fingerprint Authentication
Overlapped Fingerprint Separation for Fingerprint Authentication
 
Effective Implementation techniques in Offline Signature Verification
Effective Implementation techniques in Offline Signature  VerificationEffective Implementation techniques in Offline Signature  Verification
Effective Implementation techniques in Offline Signature Verification
 
IRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNNIRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNN
 
A SURVEY ON VARIOUS APPROACHES TO FINGERPRINT MATCHING FOR PERSONAL VERIFICAT...
A SURVEY ON VARIOUS APPROACHES TO FINGERPRINT MATCHING FOR PERSONAL VERIFICAT...A SURVEY ON VARIOUS APPROACHES TO FINGERPRINT MATCHING FOR PERSONAL VERIFICAT...
A SURVEY ON VARIOUS APPROACHES TO FINGERPRINT MATCHING FOR PERSONAL VERIFICAT...
 
Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...
 
An appraisal of offline signature verification techniques
An appraisal of offline signature verification techniquesAn appraisal of offline signature verification techniques
An appraisal of offline signature verification techniques
 
Artificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification SystemArtificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification System
 
Offline handwritten signature identification using adaptive window positionin...
Offline handwritten signature identification using adaptive window positionin...Offline handwritten signature identification using adaptive window positionin...
Offline handwritten signature identification using adaptive window positionin...
 

Mehr von International Journal of Computer and Communication System Engineering

Mehr von International Journal of Computer and Communication System Engineering (20)

Cloud Security Analysis for Health Care Systems
Cloud Security Analysis for Health Care SystemsCloud Security Analysis for Health Care Systems
Cloud Security Analysis for Health Care Systems
 
Efficient stbc for the data rate of mimo ofdma
Efficient stbc for the data rate of mimo ofdmaEfficient stbc for the data rate of mimo ofdma
Efficient stbc for the data rate of mimo ofdma
 
A novel adaptive algorithm for removal of power line interference from ecg si...
A novel adaptive algorithm for removal of power line interference from ecg si...A novel adaptive algorithm for removal of power line interference from ecg si...
A novel adaptive algorithm for removal of power line interference from ecg si...
 
Modified MD5 Algorithm for Password Encryption
Modified MD5 Algorithm for Password EncryptionModified MD5 Algorithm for Password Encryption
Modified MD5 Algorithm for Password Encryption
 
Implementing Pareto Analysis of Total Quality Management for Service Industri...
Implementing Pareto Analysis of Total Quality Management for Service Industri...Implementing Pareto Analysis of Total Quality Management for Service Industri...
Implementing Pareto Analysis of Total Quality Management for Service Industri...
 
Real Time Parking Information Provider System on Android Phones
Real Time Parking Information Provider System on Android PhonesReal Time Parking Information Provider System on Android Phones
Real Time Parking Information Provider System on Android Phones
 
An Image-Based Bone fracture Detection Using AForge Library
An Image-Based Bone fracture Detection Using AForge LibraryAn Image-Based Bone fracture Detection Using AForge Library
An Image-Based Bone fracture Detection Using AForge Library
 
Compact Fractal Based UWB Band Notch Antenna
Compact Fractal Based UWB Band Notch AntennaCompact Fractal Based UWB Band Notch Antenna
Compact Fractal Based UWB Band Notch Antenna
 
Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environ...
Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environ...Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environ...
Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environ...
 
A Learning Automata Based Prediction Mechanism for Target Tracking in Wireles...
A Learning Automata Based Prediction Mechanism for Target Tracking in Wireles...A Learning Automata Based Prediction Mechanism for Target Tracking in Wireles...
A Learning Automata Based Prediction Mechanism for Target Tracking in Wireles...
 
An Approach of Improvisation in Efficiency of Apriori Algorithm
An Approach of Improvisation in Efficiency of Apriori AlgorithmAn Approach of Improvisation in Efficiency of Apriori Algorithm
An Approach of Improvisation in Efficiency of Apriori Algorithm
 
Cloud Computing for Exploring to Scope in Business
Cloud Computing for Exploring to Scope in BusinessCloud Computing for Exploring to Scope in Business
Cloud Computing for Exploring to Scope in Business
 
Mobile Effects on Human Body
Mobile Effects on Human BodyMobile Effects on Human Body
Mobile Effects on Human Body
 
Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...
Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...
Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...
 
Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2
Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2
Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2
 
CLOUD TESTING MODEL – BENEFITS, LIMITATIONS AND CHALLENGES
CLOUD TESTING MODEL – BENEFITS, LIMITATIONS AND CHALLENGESCLOUD TESTING MODEL – BENEFITS, LIMITATIONS AND CHALLENGES
CLOUD TESTING MODEL – BENEFITS, LIMITATIONS AND CHALLENGES
 
Exploratory Analysis of AI Techniques in Computer Games and Challenges faced ...
Exploratory Analysis of AI Techniques in Computer Games and Challenges faced ...Exploratory Analysis of AI Techniques in Computer Games and Challenges faced ...
Exploratory Analysis of AI Techniques in Computer Games and Challenges faced ...
 
Feasibility Study on e-Voting System
Feasibility Study on e-Voting SystemFeasibility Study on e-Voting System
Feasibility Study on e-Voting System
 
Retrieval and Statistical Analysis of Genbank Data (RASA-GD)
Retrieval and Statistical Analysis of Genbank Data (RASA-GD)Retrieval and Statistical Analysis of Genbank Data (RASA-GD)
Retrieval and Statistical Analysis of Genbank Data (RASA-GD)
 
Rp 3010 5814
Rp 3010 5814Rp 3010 5814
Rp 3010 5814
 

Kürzlich hochgeladen

Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Comparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization TechniquesComparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization Techniquesugginaramesh
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 

Kürzlich hochgeladen (20)

Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Comparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization TechniquesComparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization Techniques
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 

Analysis of Male and Female Handwriting

  • 1. ISSN: 2312-7694 Sawati et al. / International Journal of Computer and Communication System Engineering (IJCCSE) 66 | P a g e © 2014, IJCCSE All Rights Reserved Vol. 1 No.02 August 2014 www.ijccse.com Analysis of Male and Female Handwriting Swati Srivastava Department of Computer Science & Engineering Dr. K.N.Modi Foundation Modinagar, India swati.cs1409@gmail.com Abstract— Handwritten Signatures are the most common biometrics used for authentication. In this paper, it has been analyzed that the handwriting of male writers is more consistent than that of female writers. The analysis has been done on the handwritten signatures of male and female writers. For database, 100 handwritten signatures have been taken from female writers and 100 handwritten signatures have been taken from male writers i.e. from 10 male writers and 10 female writers, 10 signatures have been taken from each. Database has been created by taking signatures from writers time to time by different pens. It has been observed from experiments that intra personal variations in male writer’s signatures are less than that of female writer’s signatures. Index Terms—Biometrics, Handwritten signatures, intra personal variations I. INTRODUCTION In this paper, there has been made a comparison of male and female handwritings on the basis of two criteria: First, the signature has been verified and the FRR (False Rejection Rate) has calculated,, which can be defined as: FRR (False Rejection Rate): The percentage of original signatures that are falsely rejected by the system is called the False Rejection Rate (FRR) and is given by: FRR = No .of originals rejected No .of originals tested x 100 Verification is based on the technique [6] that verifies the human identity by extracting the pixel oriented and component oriented features from their handwritten signatures. The pixel oriented features used in this system are m x n matrix corresponding to the m x n grid over signature image, an array of size m, where each element of an array gives the number of black pixels in the corresponding row and an array of size n, where each element of an array gives the number of black pixels in the corresponding column. The component oriented features used in the proposed system are center of gravity in x direction, center of gravity in y direction, center of gravity slope, normalized sum of angles of all points of the signature content, contour area and aspect ratio. Verification phase of the proposed system has two steps: Global Verification and Local Verification. For global verification, pixel oriented features are used and for local verification, component oriented features are used. Features of test signature image are extracted and compared with the already trained features of the training signature image. If the signature is locally accepted as well as globally accepted then only it can be said that signature has accepted otherwise rejected. Fig.1 shows the verification technique used here. Second , the standard deviation of each feature of a signature of a male and a female writer has calculated by following formula: 𝑆. 𝐷. = (𝑥𝑖 − 𝑥)2𝑛 𝑖=0 𝑛 where xi is the feature value of the ith signature, 𝑥 is the mean of n signature values n is total number of signatures(here n=10) II. METHODOLOGY For analysis, the database used consists of 100 handwritten signatures from female writers and 100 handwritten signatures from male writers i.e. from 10 male writers and 10 female writers, 10 signatures have been taken from each. I have to analyze the intrapersonal variations for each writer. This can be done in two ways by calculating: (i) FRR of each writer (ii) Standard deviation for each feature of a signature of the writer
  • 2. ISSN: 2312-7694 Sawati et al. / International Journal of Computer and Communication System Engineering (IJCCSE) 67 | P a g e © 2014, IJCCSE All Rights Reserved Vol. 1 No.02 August 2014 www.ijccse.com For FRR, pixel oriented and component oriented features [6] are extracted for each signature. 5 signatures of each writer are taken as reference signatures. Extract the required features for each signature and store the maximum and minimum values for each feature. Remaining 5 signatures are used as test images. Extract the features of test image and then verification [6] is done. In table I and II, the FRR values for male and female signatures are shown respectively. And for standard deviation, five features have been extracted for each signature. The features are: F1-Center of gravity in x direction F2-Center of gravity in y direction F3-Center of gravity slope F4-Normalized sum of angles of all points of the signature image F5-Aspect Ratio FIG.1 BLOCK DIAGRAM OF THE TECHNIQUE USED FOR VERIFICATION Calculate the feature values of all signatures of each writer. Then calculate the standard deviation of each feature of all the signatures of each writer. Then compare the values for male and female writers. In the table III and IV , the values are shown for signatures of a male writer and that of a female writer . III. RESULTS Table I and II gives the FRR values of a male writer and that of a female writer. By comparing FRR values,I got the result that FRR of male writer is less than that of female writer i.e. there is less intra personal variations in male handwriting. Table III and IV gives the feature values of 10 signatures of a male and a female writer respectively. From Table V, it can be seen that standard deviation values of feature of a male writer’s signatures is less than that of a female writer’s. Again it is due to less intra personal variations in male handwriting. Verification Results of Male Signatures TABLE I. MALE SIGNATURE VERIFICATION RESULTS Threshold FRR(%) 65 0 70 0.51 75 4.36 80 7.92 85 10.96 90 17.23 95 19.25 100 19.24 From Table I ,it can be seen that FRR is 7.92% for a male writer. Verification Results of Female Signatures TABLE II. FEMALE SIGNATURE VERIFICATION RESULTS Threshold FRR(%) 65 0 70 3.21 75 6.24 80 9 85 13.20 90 19.52 95 24.14 100 26.78 From Table II ,it can be seen that FRR is 9% for a female writer . TABLE III. FEATURE VALUES OF 10 SIGNATURES OF A MALE WRITER Signature No. F1 F2 F3 F4 F5 1 103 61 2.3 3.4 1.6 2 101 58 1.7 3.7 1.9 3 98 63 2.2 4.1 1.9 4 102 54 -2.9 3.6 2.1
  • 3. ISSN: 2312-7694 Sawati et al. / International Journal of Computer and Communication System Engineering (IJCCSE) 68 | P a g e © 2014, IJCCSE All Rights Reserved Vol. 1 No.02 August 2014 www.ijccse.com 5 98 57 -8.3 4.8 2.2 6 99 53 -7.7 5.1 2.2 7 97 67 0.5 3.6 2.1 8 105 53 -2.3 3.4 2.2 9 103 54 -1.1 3.9 1.8 10 100 58 0 3.4 1.8 TABLE IV. FEATURE VALUES OF 10 SIGNATURES OF A FEMALE WRITER Signature No. F1 F2 F3 F4 F5 1 83 65 -1.3 4.5 1.8 2 92 59 7.2 4.8 1.4 3 88 48 10.2 6.5 1.2 4 90 56 9.2 4.3 1.3 5 87 57 3.4 4.5 1.5 6 83 64 6.3 4.4 1.5 7 79 56 6.7 5.2 1.4 8 92 55 9.7 4.6 1.1 9 79 56 8.5 5.6 1.3 10 77 59 12.4 4.9 1.2 TABLE V. STANDARD DEVIATIONS OF THE FEATURES OF A MALE AND A FEMALE SIGNATURE Feature Male Sign. Female Sign. F1 2.6 5.5 F2 4.6 4.7 F3 3.8 3.8 F4 0.6 0.7 F5 0.2 0.3 IV. CONCLUSION For signatures of male writers, verification technique[6] gives FRR of 7.92% . For signatures of female writers, verification technique [6] gives FRR of 9% . From results it can be seen that male writers signatures are more consistent than that of female writers i.e. false rejection rate of male writers is less than that of female writers. Also, standard deviation of the features of signatures of a male writer is less than that of female writer. These both results are due to less intra personal variations in male handwriting. Thus, from the values of FRR and standard deviation I can conclude that male handwriting is more consistent than female handwriting. REFERENCES [1]. Meenakshi K. Kalera, Sargur Srihari and Aihua Xu, 2004,“Offline Signature Verification and Identification using Distance Statistics,” International Journal of Pattern Recognition and Artificial Intelligence, Vol.18, No.7, pp.1339- 1360. [2]. Banshider Majhi, Y Santhosh Reddy, D Prasanna Babu, 2006, “Novel Features for Offline Signature Verification,”International Journal of Computers,Communications & Control, Vol. I, No. 1, pp. 17- 24. [3]. Debasish Jena, Banshidhar Majhi, Saroj kumar Panigrahy, Sanjay Kumar Jena, ICCI 2008,“Improved Offline Signature Verification Scheme Using Feature Point Extraction Method,” Proc. 7th IEEE Int. Conference on Cognitive Informatics, pp. 475-480. [4]. Mishra, Prabit Kumar and Sahoo, Mukti Ranjan, 2009,“Offline Signature Verification Scheme”. [5]. Swati Srivastava and Suneeta Agrawal, “Offline Signature Verification using Grid based Feature Extraction,” 2nd IEEE International Conference on Computer & Communication Technology (ICCCT-2011), pp.185-190. [6]. Swati Srivastava and Suneeta Agarwal,”Offline Signature Verification based on Pixel oriented and Component Oriented Feature Extraction, “International Journal of Advanced Research In Computer Science(IJARCS),Vol.4, No.10,2013,(ISSN No. 0976-5697). [7]. W Abbas, N Abbas, U Majeed, “Performance enhancement of End to End Quality of Service in WCDMA wireless networks, Science International Journal Vol. 26 issue 02, Pp 613-620, 2014.