SlideShare ist ein Scribd-Unternehmen logo
1 von 18
ON-LINE SIGNATURE VERIFICATION
Lecture by:
Marwa
OUTLINES
1.Introduction
2.Kind of imposter
3.Applications
4.Commercial systems
5.Feature Extraction
6.Enrollment
7.Similarity computation
SIGNATURE VERIFICATION
Automatic signature verification is an important
research area because of the social and legal
acceptance and widespread use of the handwritten
signature.
Another advantage of the handwritten signature as
a biometric modality is that it is easily acquired
either with an inking pen over a sheet of paper or by
electronic means with a number of existing pointer-
based devices (e.g., pen tablets, PDAs, Tablet PCs,
touch screens, etc.).
SIGNATURE VERIFICATION
Signature verification
 Behavioral biometrics
 Verify user signatures using computers or embedded
devices
 Efficient and effective method of replacing insecure
passwords, PIN numbers, keycards and ID cards
 Advantages
 Customary way of identity verification
 Even advanced PDAs focus pen-input
 People are willing to accept a signature based verification
 Easier, faster, low memory
 Disadvantages
 Dynamic Biometric, Non-repudiation
 Can be forged easily
ON-LINE SIGNATURE VERIFICATION
it can be operate in two different ways :
1.Static : in this mode , users write their signature on
paper , digitize it through an optical scanner or a
camera , and the biometric system recognize the
signature its shap . This known as “off- line”.(
geometric features shape)
2.Dynamic: in this mode , user write their signature in
a digitizing tablet which acquires the signature in real
time , dynamic recognition is known as “on-
line“.(geometric features and dynamic features).
DIFFERENCE
 Static/Offline
 Early 1970’s
 Only image of signature
 No need of special
hardware, ubiquitous use
 Large storage
 Can not trace speed, style,
pressure etc
 Easier to forge
 Around 95% accuracy
• Dynamic/Online
• Early 1990’s
• Uses shape, speed,
pressure
• Needs special digital
surface, pads and pen etc.
• Numeric data, small storage
• Can use speed, pressure,
angle of pen etc to further
exploit individuality
• Harder to forge
• Around 99% accuracy
KIND OF IMPOSTORS
two kinds of impostors are usually considered in
signature verification ;
1. casual impostors (producing random forgeries)
when no information about the target signature is
known.
2.real impostors (producing skilled forgeries)
when some information regarding the signature
being forged is used.
APPLICATIONS
The most important applications of on-line signature
biometrics are :
1 .legal (document authentication)
2. medical (record protection)
3 .Banking sectors (cheque and credit card processing).
THE MAIN APPLICATIONS
1 .Signature forensics: This is the oldest application of the
handwritten signature , commonly applied to the off-line
image of the written signature..
2. Signature authentication: This type of application
includes system login based on signature, document
encryption, web access.
3. Signature surveillance: The automatic comparison of on-
line signatures can be used to track and detect signers (e.g.,
blacklists of individuals).
4.Digital Rights Management: based on signature.
5.Biometric cryptosystems based on signature: New
developments have demonstrated the feasibility of generating
cryptographic keys based on the time functions of the on-line
signatures
COMMERCIAL SYSTEMS
The signature modality is the second behavioral trait
in commercial importance after voice biometric , the
market for signature systems is growing at a faster
rate due to the advent of touch screen portable
devices .
The architecture of on-line signature verification
FEATURE EXTRACTION
The existing methods can broadly be divided into two
classes:
1. feature-based: in which a holistic vector
representation consisting of a set of global features is
derived from the signature trajectories, e.g , signature
length ,hight
2 .function-based: in which time sequences
describing local properties of the signature are used
for recognition ,e.g., position trajectory, velocity,
acceleration, force, or pressure
ENROLLMENT
Depending on the matching strategy,enrollment can be
divided into two classes:
1 . reference-based :
the features extracted from the set of training signatures
stored as a set of template signatures
each one in the template set corresponding to one
training signature.
The matching process is then performed by comparing the
input signature to each one of the reference Templates
then combining the resulting matching scores with a score-
level fusion technique.
ENROLLMENT
2.model-based:
the set of training signatures of a given subject is used
to estimate a statistical model which describes the
behavior of that particular signer.
As in the feature extraction process, the model
complexity can also be adjusted to be user-dependent
SIMILARITY COMPUTATION
 Pre-Alignment
is a stage between the input signature and the enrolled
template/model.
In the case of reference-based enrollment, the pre-
alignment is usually conducted before feature extraction
based only on the signature shape.
Techniques following this approach include basic position
and rotation alignment, or more sophisticated
approaches based on boundary warping.
In the case of model-based enrollment, the prealignment
usually consists in the application of a common reference
system.
When no- pre alignment is used , the alignment is either
embedded in the matching procedure or a fixed frame is
used during acquisition in order to have pre-aligned
signatures.
Fig. 10.3. Example of local elastic matching of signatures based on DTW (left,
Chinese signature from SVC 2004) and regional modeling based on HMM
(right).
SIMILARITY COMPUTATION
 Matching :
In feature-based approaches with reference-based
enrollment, the matching scores are usually obtained by
using some kind of distance measure between the feature
vectors of input and template
signatures or traind classifiers ,distance measure used (e.g
Euclidean distance , weighted Euclidean distance ).
Trained classifiers include approaches like neural network
Function-based approaches can be classified into
local and regional Depending on the matching strategy .
SIGNATURE VERIFICATION
 Advantage
1.Social
2.legal acceptance
3.widespread use
4.easily acquired
5.Little time of verification
6.Cheap technology

Disadvantage
1.low universality : as not everyone may be able to sign .
2.low permanence : the handwritten signature tends to vary
along time .
3 .vulnerability to direct attacks using forgeries.
4.There is much precedence for using signature to authentication
document and not for security application .
Pattern recognition on line signature

Weitere ähnliche Inhalte

Was ist angesagt?

Zahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense SlidesZahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense SlidesPluribus One
 
MULTIMODAL BIOMETRIC SECURITY SYSTEM
MULTIMODAL BIOMETRIC SECURITY  SYSTEMMULTIMODAL BIOMETRIC SECURITY  SYSTEM
MULTIMODAL BIOMETRIC SECURITY SYSTEMxiaomi5
 
Using (Bio)Metrics To Predict Code Quality Online
Using (Bio)Metrics To Predict Code Quality OnlineUsing (Bio)Metrics To Predict Code Quality Online
Using (Bio)Metrics To Predict Code Quality Onlines-mueller
 
Presentation1
Presentation1Presentation1
Presentation1hawa
 
Biometric security tech
Biometric security techBiometric security tech
Biometric security techmmubashirkhan
 
Signature verification
Signature verificationSignature verification
Signature verificationNAVEEN TOKAS
 
Defending Biometric Security
Defending Biometric SecurityDefending Biometric Security
Defending Biometric SecurityNed Hayes
 
Introduction to biometric systems security
Introduction to biometric systems securityIntroduction to biometric systems security
Introduction to biometric systems securitySelf
 
Pattern recognition palm print authentication system
Pattern recognition palm print authentication systemPattern recognition palm print authentication system
Pattern recognition palm print authentication systemMazin Alwaaly
 
Biometric security system
Biometric security systemBiometric security system
Biometric security systemMithun Paul
 
Biometric Systems and Security
Biometric Systems and SecurityBiometric Systems and Security
Biometric Systems and SecurityShreyans Jain
 
Biometrics For Security Systems
Biometrics For Security SystemsBiometrics For Security Systems
Biometrics For Security SystemsSuhas Deshpande
 

Was ist angesagt? (20)

Zahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense SlidesZahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense Slides
 
MULTIMODAL BIOMETRIC SECURITY SYSTEM
MULTIMODAL BIOMETRIC SECURITY  SYSTEMMULTIMODAL BIOMETRIC SECURITY  SYSTEM
MULTIMODAL BIOMETRIC SECURITY SYSTEM
 
Biometrics Security System
Biometrics Security SystemBiometrics Security System
Biometrics Security System
 
biometrics and cyber security
biometrics and cyber securitybiometrics and cyber security
biometrics and cyber security
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Using (Bio)Metrics To Predict Code Quality Online
Using (Bio)Metrics To Predict Code Quality OnlineUsing (Bio)Metrics To Predict Code Quality Online
Using (Bio)Metrics To Predict Code Quality Online
 
Biometric Security Systems ppt
Biometric Security Systems pptBiometric Security Systems ppt
Biometric Security Systems ppt
 
Presentation1
Presentation1Presentation1
Presentation1
 
Biometric security tech
Biometric security techBiometric security tech
Biometric security tech
 
Signature verification
Signature verificationSignature verification
Signature verification
 
Defending Biometric Security
Defending Biometric SecurityDefending Biometric Security
Defending Biometric Security
 
Biometric
Biometric Biometric
Biometric
 
Biometric
Biometric Biometric
Biometric
 
Introduction to biometric systems security
Introduction to biometric systems securityIntroduction to biometric systems security
Introduction to biometric systems security
 
Biometrics ppt
Biometrics pptBiometrics ppt
Biometrics ppt
 
Pattern recognition palm print authentication system
Pattern recognition palm print authentication systemPattern recognition palm print authentication system
Pattern recognition palm print authentication system
 
Biometric security system
Biometric security systemBiometric security system
Biometric security system
 
Biometric Systems and Security
Biometric Systems and SecurityBiometric Systems and Security
Biometric Systems and Security
 
Biometrics For Security Systems
Biometrics For Security SystemsBiometrics For Security Systems
Biometrics For Security Systems
 

Ähnlich wie Pattern recognition on line signature

Artificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification SystemArtificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification SystemIRJET Journal
 
A Review on Robust identity verification using signature of a person
A Review on Robust identity verification using signature of a personA Review on Robust identity verification using signature of a person
A Review on Robust identity verification using signature of a personEditor IJMTER
 
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...IRJET Journal
 
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEMRELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEMAM Publications
 
Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Palak Pandoh
 
OSPCV: Off-line Signature Verification using Principal Component Variances
OSPCV: Off-line Signature Verification using Principal Component VariancesOSPCV: Off-line Signature Verification using Principal Component Variances
OSPCV: Off-line Signature Verification using Principal Component VariancesIOSR Journals
 
IRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNNIRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNNIRJET Journal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
IJSRED-V2I2P33
IJSRED-V2I2P33IJSRED-V2I2P33
IJSRED-V2I2P33IJSRED
 
Offline handwritten signature identification using adaptive window positionin...
Offline handwritten signature identification using adaptive window positionin...Offline handwritten signature identification using adaptive window positionin...
Offline handwritten signature identification using adaptive window positionin...sipij
 
An Investigation into Biometric Signature Capture Device Performance and User...
An Investigation into Biometric Signature Capture Device Performance and User...An Investigation into Biometric Signature Capture Device Performance and User...
An Investigation into Biometric Signature Capture Device Performance and User...International Center for Biometric Research
 
LUIS: A L IGHT W EIGHT U SER I DENTIFICATION S CHEME FOR S MARTPHONES
LUIS: A L IGHT  W EIGHT  U SER  I DENTIFICATION  S CHEME FOR  S MARTPHONES LUIS: A L IGHT  W EIGHT  U SER  I DENTIFICATION  S CHEME FOR  S MARTPHONES
LUIS: A L IGHT W EIGHT U SER I DENTIFICATION S CHEME FOR S MARTPHONES IJCI JOURNAL
 
ONLINE SIGNATURE BASED APPLICATION LOCKING SYSTEM
ONLINE SIGNATURE BASED APPLICATION LOCKING SYSTEMONLINE SIGNATURE BASED APPLICATION LOCKING SYSTEM
ONLINE SIGNATURE BASED APPLICATION LOCKING SYSTEMJournal For Research
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintSonuSawant
 
Cloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor AuthenticationCloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor AuthenticationIRJET Journal
 

Ähnlich wie Pattern recognition on line signature (20)

Artificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification SystemArtificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification System
 
A Review on Robust identity verification using signature of a person
A Review on Robust identity verification using signature of a personA Review on Robust identity verification using signature of a person
A Review on Robust identity verification using signature of a person
 
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
 
Biometric solutions-from-kaba
Biometric solutions-from-kabaBiometric solutions-from-kaba
Biometric solutions-from-kaba
 
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEMRELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
 
Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)
 
OSPCV: Off-line Signature Verification using Principal Component Variances
OSPCV: Off-line Signature Verification using Principal Component VariancesOSPCV: Off-line Signature Verification using Principal Component Variances
OSPCV: Off-line Signature Verification using Principal Component Variances
 
B017150823
B017150823B017150823
B017150823
 
IRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNNIRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNN
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
IJSRED-V2I2P33
IJSRED-V2I2P33IJSRED-V2I2P33
IJSRED-V2I2P33
 
Offline handwritten signature identification using adaptive window positionin...
Offline handwritten signature identification using adaptive window positionin...Offline handwritten signature identification using adaptive window positionin...
Offline handwritten signature identification using adaptive window positionin...
 
Implementation of Biometric Based Electoral Fraud Desisting System
Implementation of Biometric Based Electoral Fraud Desisting SystemImplementation of Biometric Based Electoral Fraud Desisting System
Implementation of Biometric Based Electoral Fraud Desisting System
 
An Investigation into Biometric Signature Capture Device Performance and User...
An Investigation into Biometric Signature Capture Device Performance and User...An Investigation into Biometric Signature Capture Device Performance and User...
An Investigation into Biometric Signature Capture Device Performance and User...
 
LUIS: A L IGHT W EIGHT U SER I DENTIFICATION S CHEME FOR S MARTPHONES
LUIS: A L IGHT  W EIGHT  U SER  I DENTIFICATION  S CHEME FOR  S MARTPHONES LUIS: A L IGHT  W EIGHT  U SER  I DENTIFICATION  S CHEME FOR  S MARTPHONES
LUIS: A L IGHT W EIGHT U SER I DENTIFICATION S CHEME FOR S MARTPHONES
 
ONLINE SIGNATURE BASED APPLICATION LOCKING SYSTEM
ONLINE SIGNATURE BASED APPLICATION LOCKING SYSTEMONLINE SIGNATURE BASED APPLICATION LOCKING SYSTEM
ONLINE SIGNATURE BASED APPLICATION LOCKING SYSTEM
 
Biometrics for e-voting
Biometrics for e-votingBiometrics for e-voting
Biometrics for e-voting
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
 
Cloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor AuthenticationCloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor Authentication
 
Security
SecuritySecurity
Security
 

Mehr von Mazin Alwaaly

Pattern recognition IRIS recognition
Pattern recognition IRIS recognitionPattern recognition IRIS recognition
Pattern recognition IRIS recognitionMazin Alwaaly
 
Pattern recognition hand vascular pattern recognition
Pattern recognition hand vascular pattern recognitionPattern recognition hand vascular pattern recognition
Pattern recognition hand vascular pattern recognitionMazin Alwaaly
 
Pattern recognition Hand Geometry
Pattern recognition Hand GeometryPattern recognition Hand Geometry
Pattern recognition Hand GeometryMazin Alwaaly
 
Pattern recognition forensic dental identification
Pattern recognition forensic dental identificationPattern recognition forensic dental identification
Pattern recognition forensic dental identificationMazin Alwaaly
 
Pattern recognition fingerprints
Pattern recognition fingerprintsPattern recognition fingerprints
Pattern recognition fingerprintsMazin Alwaaly
 
Pattern recognition facial recognition
Pattern recognition facial recognitionPattern recognition facial recognition
Pattern recognition facial recognitionMazin Alwaaly
 
Pattern recognition ear as a biometric
Pattern recognition ear as a biometricPattern recognition ear as a biometric
Pattern recognition ear as a biometricMazin Alwaaly
 
Pattern recognition 3d face recognition
Pattern recognition 3d face recognitionPattern recognition 3d face recognition
Pattern recognition 3d face recognitionMazin Alwaaly
 
Multimedia multimedia over wireless and mobile networks
Multimedia multimedia over wireless and mobile networksMultimedia multimedia over wireless and mobile networks
Multimedia multimedia over wireless and mobile networksMazin Alwaaly
 
Multimedia network services and protocols for multimedia communications
Multimedia network services and protocols for multimedia communicationsMultimedia network services and protocols for multimedia communications
Multimedia network services and protocols for multimedia communicationsMazin Alwaaly
 
Multimedia content based retrieval in digital libraries
Multimedia content based retrieval in digital librariesMultimedia content based retrieval in digital libraries
Multimedia content based retrieval in digital librariesMazin Alwaaly
 
Multimedia lossy compression algorithms
Multimedia lossy compression algorithmsMultimedia lossy compression algorithms
Multimedia lossy compression algorithmsMazin Alwaaly
 
Multimedia lossless compression algorithms
Multimedia lossless compression algorithmsMultimedia lossless compression algorithms
Multimedia lossless compression algorithmsMazin Alwaaly
 
Multimedia basic video compression techniques
Multimedia basic video compression techniquesMultimedia basic video compression techniques
Multimedia basic video compression techniquesMazin Alwaaly
 
Multimedia image compression standards
Multimedia image compression standardsMultimedia image compression standards
Multimedia image compression standardsMazin Alwaaly
 
Multimedia fundamental concepts in video
Multimedia fundamental concepts in videoMultimedia fundamental concepts in video
Multimedia fundamental concepts in videoMazin Alwaaly
 
Multimedia color in image and video
Multimedia color in image and videoMultimedia color in image and video
Multimedia color in image and videoMazin Alwaaly
 
Multimedia graphics and image data representation
Multimedia graphics and image data representationMultimedia graphics and image data representation
Multimedia graphics and image data representationMazin Alwaaly
 
Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarkingMazin Alwaaly
 
Information and data security cryptanalysis method
Information and data security cryptanalysis methodInformation and data security cryptanalysis method
Information and data security cryptanalysis methodMazin Alwaaly
 

Mehr von Mazin Alwaaly (20)

Pattern recognition IRIS recognition
Pattern recognition IRIS recognitionPattern recognition IRIS recognition
Pattern recognition IRIS recognition
 
Pattern recognition hand vascular pattern recognition
Pattern recognition hand vascular pattern recognitionPattern recognition hand vascular pattern recognition
Pattern recognition hand vascular pattern recognition
 
Pattern recognition Hand Geometry
Pattern recognition Hand GeometryPattern recognition Hand Geometry
Pattern recognition Hand Geometry
 
Pattern recognition forensic dental identification
Pattern recognition forensic dental identificationPattern recognition forensic dental identification
Pattern recognition forensic dental identification
 
Pattern recognition fingerprints
Pattern recognition fingerprintsPattern recognition fingerprints
Pattern recognition fingerprints
 
Pattern recognition facial recognition
Pattern recognition facial recognitionPattern recognition facial recognition
Pattern recognition facial recognition
 
Pattern recognition ear as a biometric
Pattern recognition ear as a biometricPattern recognition ear as a biometric
Pattern recognition ear as a biometric
 
Pattern recognition 3d face recognition
Pattern recognition 3d face recognitionPattern recognition 3d face recognition
Pattern recognition 3d face recognition
 
Multimedia multimedia over wireless and mobile networks
Multimedia multimedia over wireless and mobile networksMultimedia multimedia over wireless and mobile networks
Multimedia multimedia over wireless and mobile networks
 
Multimedia network services and protocols for multimedia communications
Multimedia network services and protocols for multimedia communicationsMultimedia network services and protocols for multimedia communications
Multimedia network services and protocols for multimedia communications
 
Multimedia content based retrieval in digital libraries
Multimedia content based retrieval in digital librariesMultimedia content based retrieval in digital libraries
Multimedia content based retrieval in digital libraries
 
Multimedia lossy compression algorithms
Multimedia lossy compression algorithmsMultimedia lossy compression algorithms
Multimedia lossy compression algorithms
 
Multimedia lossless compression algorithms
Multimedia lossless compression algorithmsMultimedia lossless compression algorithms
Multimedia lossless compression algorithms
 
Multimedia basic video compression techniques
Multimedia basic video compression techniquesMultimedia basic video compression techniques
Multimedia basic video compression techniques
 
Multimedia image compression standards
Multimedia image compression standardsMultimedia image compression standards
Multimedia image compression standards
 
Multimedia fundamental concepts in video
Multimedia fundamental concepts in videoMultimedia fundamental concepts in video
Multimedia fundamental concepts in video
 
Multimedia color in image and video
Multimedia color in image and videoMultimedia color in image and video
Multimedia color in image and video
 
Multimedia graphics and image data representation
Multimedia graphics and image data representationMultimedia graphics and image data representation
Multimedia graphics and image data representation
 
Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarking
 
Information and data security cryptanalysis method
Information and data security cryptanalysis methodInformation and data security cryptanalysis method
Information and data security cryptanalysis method
 

Kürzlich hochgeladen

Broad bean, Lima Bean, Jack bean, Ullucus.pptx
Broad bean, Lima Bean, Jack bean, Ullucus.pptxBroad bean, Lima Bean, Jack bean, Ullucus.pptx
Broad bean, Lima Bean, Jack bean, Ullucus.pptxjana861314
 
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Lokesh Kothari
 
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCESTERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCEPRINCE C P
 
GBSN - Microbiology (Unit 1)
GBSN - Microbiology (Unit 1)GBSN - Microbiology (Unit 1)
GBSN - Microbiology (Unit 1)Areesha Ahmad
 
Disentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTDisentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTSérgio Sacani
 
Chromatin Structure | EUCHROMATIN | HETEROCHROMATIN
Chromatin Structure | EUCHROMATIN | HETEROCHROMATINChromatin Structure | EUCHROMATIN | HETEROCHROMATIN
Chromatin Structure | EUCHROMATIN | HETEROCHROMATINsankalpkumarsahoo174
 
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...ssifa0344
 
VIRUSES structure and classification ppt by Dr.Prince C P
VIRUSES structure and classification ppt by Dr.Prince C PVIRUSES structure and classification ppt by Dr.Prince C P
VIRUSES structure and classification ppt by Dr.Prince C PPRINCE C P
 
Chemistry 4th semester series (krishna).pdf
Chemistry 4th semester series (krishna).pdfChemistry 4th semester series (krishna).pdf
Chemistry 4th semester series (krishna).pdfSumit Kumar yadav
 
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral Analysis
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral AnalysisRaman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral Analysis
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral AnalysisDiwakar Mishra
 
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...Sérgio Sacani
 
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43bNightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43bSérgio Sacani
 
Nanoparticles synthesis and characterization​ ​
Nanoparticles synthesis and characterization​  ​Nanoparticles synthesis and characterization​  ​
Nanoparticles synthesis and characterization​ ​kaibalyasahoo82800
 
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptxUnlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptxanandsmhk
 
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsHubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsSérgio Sacani
 
Hire 💕 9907093804 Hooghly Call Girls Service Call Girls Agency
Hire 💕 9907093804 Hooghly Call Girls Service Call Girls AgencyHire 💕 9907093804 Hooghly Call Girls Service Call Girls Agency
Hire 💕 9907093804 Hooghly Call Girls Service Call Girls AgencySheetal Arora
 
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptxSOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptxkessiyaTpeter
 

Kürzlich hochgeladen (20)

The Philosophy of Science
The Philosophy of ScienceThe Philosophy of Science
The Philosophy of Science
 
Broad bean, Lima Bean, Jack bean, Ullucus.pptx
Broad bean, Lima Bean, Jack bean, Ullucus.pptxBroad bean, Lima Bean, Jack bean, Ullucus.pptx
Broad bean, Lima Bean, Jack bean, Ullucus.pptx
 
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
 
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCESTERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
 
CELL -Structural and Functional unit of life.pdf
CELL -Structural and Functional unit of life.pdfCELL -Structural and Functional unit of life.pdf
CELL -Structural and Functional unit of life.pdf
 
GBSN - Microbiology (Unit 1)
GBSN - Microbiology (Unit 1)GBSN - Microbiology (Unit 1)
GBSN - Microbiology (Unit 1)
 
Disentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTDisentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOST
 
Chromatin Structure | EUCHROMATIN | HETEROCHROMATIN
Chromatin Structure | EUCHROMATIN | HETEROCHROMATINChromatin Structure | EUCHROMATIN | HETEROCHROMATIN
Chromatin Structure | EUCHROMATIN | HETEROCHROMATIN
 
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...
 
VIRUSES structure and classification ppt by Dr.Prince C P
VIRUSES structure and classification ppt by Dr.Prince C PVIRUSES structure and classification ppt by Dr.Prince C P
VIRUSES structure and classification ppt by Dr.Prince C P
 
Chemistry 4th semester series (krishna).pdf
Chemistry 4th semester series (krishna).pdfChemistry 4th semester series (krishna).pdf
Chemistry 4th semester series (krishna).pdf
 
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral Analysis
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral AnalysisRaman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral Analysis
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral Analysis
 
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...
 
Engler and Prantl system of classification in plant taxonomy
Engler and Prantl system of classification in plant taxonomyEngler and Prantl system of classification in plant taxonomy
Engler and Prantl system of classification in plant taxonomy
 
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43bNightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
 
Nanoparticles synthesis and characterization​ ​
Nanoparticles synthesis and characterization​  ​Nanoparticles synthesis and characterization​  ​
Nanoparticles synthesis and characterization​ ​
 
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptxUnlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptx
 
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsHubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
 
Hire 💕 9907093804 Hooghly Call Girls Service Call Girls Agency
Hire 💕 9907093804 Hooghly Call Girls Service Call Girls AgencyHire 💕 9907093804 Hooghly Call Girls Service Call Girls Agency
Hire 💕 9907093804 Hooghly Call Girls Service Call Girls Agency
 
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptxSOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
 

Pattern recognition on line signature

  • 2. OUTLINES 1.Introduction 2.Kind of imposter 3.Applications 4.Commercial systems 5.Feature Extraction 6.Enrollment 7.Similarity computation
  • 3. SIGNATURE VERIFICATION Automatic signature verification is an important research area because of the social and legal acceptance and widespread use of the handwritten signature. Another advantage of the handwritten signature as a biometric modality is that it is easily acquired either with an inking pen over a sheet of paper or by electronic means with a number of existing pointer- based devices (e.g., pen tablets, PDAs, Tablet PCs, touch screens, etc.).
  • 4. SIGNATURE VERIFICATION Signature verification  Behavioral biometrics  Verify user signatures using computers or embedded devices  Efficient and effective method of replacing insecure passwords, PIN numbers, keycards and ID cards  Advantages  Customary way of identity verification  Even advanced PDAs focus pen-input  People are willing to accept a signature based verification  Easier, faster, low memory  Disadvantages  Dynamic Biometric, Non-repudiation  Can be forged easily
  • 5. ON-LINE SIGNATURE VERIFICATION it can be operate in two different ways : 1.Static : in this mode , users write their signature on paper , digitize it through an optical scanner or a camera , and the biometric system recognize the signature its shap . This known as “off- line”.( geometric features shape) 2.Dynamic: in this mode , user write their signature in a digitizing tablet which acquires the signature in real time , dynamic recognition is known as “on- line“.(geometric features and dynamic features).
  • 6. DIFFERENCE  Static/Offline  Early 1970’s  Only image of signature  No need of special hardware, ubiquitous use  Large storage  Can not trace speed, style, pressure etc  Easier to forge  Around 95% accuracy • Dynamic/Online • Early 1990’s • Uses shape, speed, pressure • Needs special digital surface, pads and pen etc. • Numeric data, small storage • Can use speed, pressure, angle of pen etc to further exploit individuality • Harder to forge • Around 99% accuracy
  • 7. KIND OF IMPOSTORS two kinds of impostors are usually considered in signature verification ; 1. casual impostors (producing random forgeries) when no information about the target signature is known. 2.real impostors (producing skilled forgeries) when some information regarding the signature being forged is used.
  • 8. APPLICATIONS The most important applications of on-line signature biometrics are : 1 .legal (document authentication) 2. medical (record protection) 3 .Banking sectors (cheque and credit card processing).
  • 9. THE MAIN APPLICATIONS 1 .Signature forensics: This is the oldest application of the handwritten signature , commonly applied to the off-line image of the written signature.. 2. Signature authentication: This type of application includes system login based on signature, document encryption, web access. 3. Signature surveillance: The automatic comparison of on- line signatures can be used to track and detect signers (e.g., blacklists of individuals). 4.Digital Rights Management: based on signature. 5.Biometric cryptosystems based on signature: New developments have demonstrated the feasibility of generating cryptographic keys based on the time functions of the on-line signatures
  • 10. COMMERCIAL SYSTEMS The signature modality is the second behavioral trait in commercial importance after voice biometric , the market for signature systems is growing at a faster rate due to the advent of touch screen portable devices . The architecture of on-line signature verification
  • 11. FEATURE EXTRACTION The existing methods can broadly be divided into two classes: 1. feature-based: in which a holistic vector representation consisting of a set of global features is derived from the signature trajectories, e.g , signature length ,hight 2 .function-based: in which time sequences describing local properties of the signature are used for recognition ,e.g., position trajectory, velocity, acceleration, force, or pressure
  • 12. ENROLLMENT Depending on the matching strategy,enrollment can be divided into two classes: 1 . reference-based : the features extracted from the set of training signatures stored as a set of template signatures each one in the template set corresponding to one training signature. The matching process is then performed by comparing the input signature to each one of the reference Templates then combining the resulting matching scores with a score- level fusion technique.
  • 13. ENROLLMENT 2.model-based: the set of training signatures of a given subject is used to estimate a statistical model which describes the behavior of that particular signer. As in the feature extraction process, the model complexity can also be adjusted to be user-dependent
  • 14. SIMILARITY COMPUTATION  Pre-Alignment is a stage between the input signature and the enrolled template/model. In the case of reference-based enrollment, the pre- alignment is usually conducted before feature extraction based only on the signature shape. Techniques following this approach include basic position and rotation alignment, or more sophisticated approaches based on boundary warping. In the case of model-based enrollment, the prealignment usually consists in the application of a common reference system. When no- pre alignment is used , the alignment is either embedded in the matching procedure or a fixed frame is used during acquisition in order to have pre-aligned signatures.
  • 15. Fig. 10.3. Example of local elastic matching of signatures based on DTW (left, Chinese signature from SVC 2004) and regional modeling based on HMM (right).
  • 16. SIMILARITY COMPUTATION  Matching : In feature-based approaches with reference-based enrollment, the matching scores are usually obtained by using some kind of distance measure between the feature vectors of input and template signatures or traind classifiers ,distance measure used (e.g Euclidean distance , weighted Euclidean distance ). Trained classifiers include approaches like neural network Function-based approaches can be classified into local and regional Depending on the matching strategy .
  • 17. SIGNATURE VERIFICATION  Advantage 1.Social 2.legal acceptance 3.widespread use 4.easily acquired 5.Little time of verification 6.Cheap technology  Disadvantage 1.low universality : as not everyone may be able to sign . 2.low permanence : the handwritten signature tends to vary along time . 3 .vulnerability to direct attacks using forgeries. 4.There is much precedence for using signature to authentication document and not for security application .