SlideShare uma empresa Scribd logo
1 de 25
Topics
Definitions
Feature extraction
Signature Forgery
Signature models
Advantages and disadvantages of signature as
 biometrics
Signature
Signatures
Off-line or static signatures are scanned from paper
 documents, where they were written in conventional way.
 Off-line signature analysis can be carried out with a
 scanned image of the signature using a standard camera or
 scanner.
On-line or dynamic signatures are written with an
 electronically instrumented device and the dynamic
 information (pen tip location through time) is usually
 available at high resolution, even when the pen is not in
 contact with the paper.
PDA
Signature in Identity Documents
Digitizing Tablet
Pen-Tablet System (WACOM)
Pen-Tablet System –How It Works?
 The WACOM stylus looks and feels like a pen yet contains no
  batteries or magnets. Instead it takes advantage of electro-magnetic
  resonance technology in which radio waves are sent to the stylus and
  returned for position analysis.
 In operation, a grid of wires below the screen alternates between
  transmit and receive modes (about every 20μs):
    In transmit mode, the electro-magnetic signal stimulates oscillation in
     the coil-and capacitor resonant circuit in the pen
    In receive mode, the energy of the resonant circuit oscillation in the pen
     is detected by the antenna grid. This is then analysed to determine
     position and other information including pressure
 Since the grid provides the power to the pen through resonant
  coupling, no batteries are required. Thus there are no consumables
  that will run down and need to be replaced or that would make the
  pen top-heavy.
Automatic identification
Traditional means of automatic identification:
   Possession-based (credit card, smart card)
       Use “something that you have”
   Knowledge-based (password, PIN)
       Use “something that you know”
   Biometrics-based (biometric identifier)
       Use something that relies on “what you are”


Signature is inherently a combination of knowledge and
  biometric, the knowledge component (what is written and
  how it is written) can be chosen, and indeed changed, by
  the user
Pre-processing
            Smoothing: the input signal from a
             digitizing pen can be very jagged. The
             pen used can affect the smoothness and
             the size of the signature.
            Segmentation: determination of the
             beginning and ending of signing.
            Signature beginning: first sample
             where pressure information is not null
             (first pen-down)
            Signature ending: last pen-up. Because
             few pen-ups can be found in the
             signature, we have to establish a
             maximum pen-up duration (e.g. 3 s).
Pre-processing
Initial point
alignment: all the
signatures have to be
aligned with respect to
the initial point (e.g.
the coordinate origin)
to make information
independent from the
position on the tablet.
Pre-processing
Principal structure of signature recognition
systems
Dynamic Signature
Local and Global Features
Local features
  x, y coordinates
  Velocity (v)
  Acceleration (A)
  Azimuth
  Elevation
Local and Global Features
Global features
  Signature length, height
  Total signature time
  Total pen-down time
  Total pen-up time
  Average velocity
  Maximum velocity
  Minimum velocity
Forgery




          Genuine      Forgery signatures
          signatures
Signatures: authentic and skilled forgery
Signature Recognition Advantages
Signature is a man-made biometric where forgery
 has been studied extensively
Enrollment (training) is intuitive and fast
Signature verification in general has a fast
 response and low storage requirements
A signature verification is “independent” of the
 native language user
Very high compression rates do not affect shape
 of the signature (100-150 bytes)
Signature Recognition Disadvantages
There is much precedence for using signature to
 authenticate documents and not for security
 applications
A five-dimensional pen may be needed to arrive
 at the desired accuracy. This makes the hardware
 costly.
Some people have palsies, while others do not
 have enough fine motor coordination to write
 consistently
References
Dynamic Signatures developed by NSTC subcomittee
 on Biometrics:: www.biometrics.gov
Simina Emerich, Eugen Lupu, Corneliu Rusu, “On-
 line Signature Recognition Approach Based on
 Wavelets and Support Vector Machines”
Jinxu Guo, Jianbin Zheng, Bo Lu, “Research of Online
 Signature Recognition Based on Energy Feature”

Mais conteúdo relacionado

Mais procurados

Bio-metric Gait Recognition
Bio-metric Gait Recognition Bio-metric Gait Recognition
Bio-metric Gait Recognition Usman Siddique
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesPrabh Jeet
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognitionvarsha mohite
 
Signature verification in biometrics
Signature verification in biometricsSignature verification in biometrics
Signature verification in biometricsSwapnil Bangera
 
Handwritten character recognition using artificial neural network
Handwritten character recognition using artificial neural networkHandwritten character recognition using artificial neural network
Handwritten character recognition using artificial neural networkHarshana Madusanka Jayamaha
 
Handwriting Recognition Using Deep Learning and Computer Version
Handwriting Recognition Using Deep Learning and Computer VersionHandwriting Recognition Using Deep Learning and Computer Version
Handwriting Recognition Using Deep Learning and Computer VersionNaiyan Noor
 
Hand geometry recognition
Hand geometry recognitionHand geometry recognition
Hand geometry recognitionDheerendra k
 
IRIS RECOGNITION
IRIS RECOGNITION IRIS RECOGNITION
IRIS RECOGNITION Ankit Kumar
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognitionsunjaysahu
 
Minutiae-based Fingerprint Matching
Minutiae-based Fingerprint MatchingMinutiae-based Fingerprint Matching
Minutiae-based Fingerprint MatchingNikhil Hubballi
 
Multimodal Biometric Systems
Multimodal Biometric SystemsMultimodal Biometric Systems
Multimodal Biometric SystemsPiyush Mittal
 
A STUDY ON OPTICAL CHARACTER RECOGNITION TECHNIQUES
A STUDY ON OPTICAL CHARACTER RECOGNITION TECHNIQUESA STUDY ON OPTICAL CHARACTER RECOGNITION TECHNIQUES
A STUDY ON OPTICAL CHARACTER RECOGNITION TECHNIQUESijcsitcejournal
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshareprachi
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingAnkush Kr
 
Brain Fingerprinting PPT
Brain Fingerprinting PPTBrain Fingerprinting PPT
Brain Fingerprinting PPTVishnu Mysterio
 

Mais procurados (20)

Sign verification
Sign verificationSign verification
Sign verification
 
Bio-metric Gait Recognition
Bio-metric Gait Recognition Bio-metric Gait Recognition
Bio-metric Gait Recognition
 
Iris recognition
Iris recognition Iris recognition
Iris recognition
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
Signature verification in biometrics
Signature verification in biometricsSignature verification in biometrics
Signature verification in biometrics
 
Handwritten character recognition using artificial neural network
Handwritten character recognition using artificial neural networkHandwritten character recognition using artificial neural network
Handwritten character recognition using artificial neural network
 
face recognition
face recognitionface recognition
face recognition
 
Handwriting Recognition Using Deep Learning and Computer Version
Handwriting Recognition Using Deep Learning and Computer VersionHandwriting Recognition Using Deep Learning and Computer Version
Handwriting Recognition Using Deep Learning and Computer Version
 
Hand geometry recognition
Hand geometry recognitionHand geometry recognition
Hand geometry recognition
 
Biometrics
BiometricsBiometrics
Biometrics
 
IRIS RECOGNITION
IRIS RECOGNITION IRIS RECOGNITION
IRIS RECOGNITION
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognition
 
Minutiae-based Fingerprint Matching
Minutiae-based Fingerprint MatchingMinutiae-based Fingerprint Matching
Minutiae-based Fingerprint Matching
 
Multimodal Biometric Systems
Multimodal Biometric SystemsMultimodal Biometric Systems
Multimodal Biometric Systems
 
A STUDY ON OPTICAL CHARACTER RECOGNITION TECHNIQUES
A STUDY ON OPTICAL CHARACTER RECOGNITION TECHNIQUESA STUDY ON OPTICAL CHARACTER RECOGNITION TECHNIQUES
A STUDY ON OPTICAL CHARACTER RECOGNITION TECHNIQUES
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshare
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Brain Fingerprinting PPT
Brain Fingerprinting PPTBrain Fingerprinting PPT
Brain Fingerprinting PPT
 
Handwritten Character Recognition
Handwritten Character RecognitionHandwritten Character Recognition
Handwritten Character Recognition
 

Destaque

Off-line Signature Verification
Off-line Signature VerificationOff-line Signature Verification
Off-line Signature Verificationlemon_au
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final pptAnkita Vanage
 
ONLINE SIGNATURE BASED APPLICATION LOCKING SYSTEM
ONLINE SIGNATURE BASED APPLICATION LOCKING SYSTEMONLINE SIGNATURE BASED APPLICATION LOCKING SYSTEM
ONLINE SIGNATURE BASED APPLICATION LOCKING SYSTEMJournal For Research
 
Voice recognition system
Voice recognition systemVoice recognition system
Voice recognition systemavinash raibole
 
VOICE BASED SECURITY SYSTEM
VOICE BASED SECURITY SYSTEMVOICE BASED SECURITY SYSTEM
VOICE BASED SECURITY SYSTEMNikhil Ravi
 
Ip traceback seminar full report
Ip traceback seminar full reportIp traceback seminar full report
Ip traceback seminar full reportdeepakmarndi
 
Jamming aware traffic allocation for multiple-path routing using portfolio se...
Jamming aware traffic allocation for multiple-path routing using portfolio se...Jamming aware traffic allocation for multiple-path routing using portfolio se...
Jamming aware traffic allocation for multiple-path routing using portfolio se...Saad Bare
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition TechnologyAgrani Rastogi
 
Speech recognition system seminar
Speech recognition system seminarSpeech recognition system seminar
Speech recognition system seminarDiptimaya Sarangi
 
color Image Enhancement with a Human Visual System Based Adaptive Filter
color Image Enhancement with a Human Visual System Based Adaptive Filter color Image Enhancement with a Human Visual System Based Adaptive Filter
color Image Enhancement with a Human Visual System Based Adaptive Filter anurama
 
Speech Recognition Technology
Speech Recognition TechnologySpeech Recognition Technology
Speech Recognition TechnologySeminar Links
 
Easy to swallow wireless telemetry ppt
Easy to swallow wireless telemetry pptEasy to swallow wireless telemetry ppt
Easy to swallow wireless telemetry pptSrilakshmi Iyengar
 
Speech recognition final presentation
Speech recognition final presentationSpeech recognition final presentation
Speech recognition final presentationhimanshubhatti
 

Destaque (20)

Off-line Signature Verification
Off-line Signature VerificationOff-line Signature Verification
Off-line Signature Verification
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
ONLINE SIGNATURE BASED APPLICATION LOCKING SYSTEM
ONLINE SIGNATURE BASED APPLICATION LOCKING SYSTEMONLINE SIGNATURE BASED APPLICATION LOCKING SYSTEM
ONLINE SIGNATURE BASED APPLICATION LOCKING SYSTEM
 
Programme STRP SCENE #2
Programme STRP SCENE #2Programme STRP SCENE #2
Programme STRP SCENE #2
 
Voice recognition
Voice recognitionVoice recognition
Voice recognition
 
Offline Signature Verification and Recognition using Neural Network
Offline Signature Verification and Recognition using Neural NetworkOffline Signature Verification and Recognition using Neural Network
Offline Signature Verification and Recognition using Neural Network
 
Uses of speech recognition system
Uses of speech recognition systemUses of speech recognition system
Uses of speech recognition system
 
Keystroke dynamics
Keystroke dynamicsKeystroke dynamics
Keystroke dynamics
 
Retinal Recognition
Retinal RecognitionRetinal Recognition
Retinal Recognition
 
Voice recognition system
Voice recognition systemVoice recognition system
Voice recognition system
 
VOICE BASED SECURITY SYSTEM
VOICE BASED SECURITY SYSTEMVOICE BASED SECURITY SYSTEM
VOICE BASED SECURITY SYSTEM
 
Voice Recognition
Voice RecognitionVoice Recognition
Voice Recognition
 
Ip traceback seminar full report
Ip traceback seminar full reportIp traceback seminar full report
Ip traceback seminar full report
 
Jamming aware traffic allocation for multiple-path routing using portfolio se...
Jamming aware traffic allocation for multiple-path routing using portfolio se...Jamming aware traffic allocation for multiple-path routing using portfolio se...
Jamming aware traffic allocation for multiple-path routing using portfolio se...
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Speech recognition system seminar
Speech recognition system seminarSpeech recognition system seminar
Speech recognition system seminar
 
color Image Enhancement with a Human Visual System Based Adaptive Filter
color Image Enhancement with a Human Visual System Based Adaptive Filter color Image Enhancement with a Human Visual System Based Adaptive Filter
color Image Enhancement with a Human Visual System Based Adaptive Filter
 
Speech Recognition Technology
Speech Recognition TechnologySpeech Recognition Technology
Speech Recognition Technology
 
Easy to swallow wireless telemetry ppt
Easy to swallow wireless telemetry pptEasy to swallow wireless telemetry ppt
Easy to swallow wireless telemetry ppt
 
Speech recognition final presentation
Speech recognition final presentationSpeech recognition final presentation
Speech recognition final presentation
 

Semelhante a Online signature recognition

Signature capture technical
Signature capture technicalSignature capture technical
Signature capture technicalssleandro
 
Automatic handwriting recognition
Automatic handwriting recognitionAutomatic handwriting recognition
Automatic handwriting recognitionBIJIT GHOSH
 
IJSRED-V2I2P33
IJSRED-V2I2P33IJSRED-V2I2P33
IJSRED-V2I2P33IJSRED
 
OSPCV: Off-line Signature Verification using Principal Component Variances
OSPCV: Off-line Signature Verification using Principal Component VariancesOSPCV: Off-line Signature Verification using Principal Component Variances
OSPCV: Off-line Signature Verification using Principal Component VariancesIOSR Journals
 
Input Devices
Input DevicesInput Devices
Input DevicesPinky
 
Input and output devices
Input and output devicesInput and output devices
Input and output devicesAzam Khan
 
Artificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification SystemArtificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification SystemIRJET Journal
 
Offline Handwritten Signature Verification using Neural Network
Offline Handwritten Signature Verification using Neural NetworkOffline Handwritten Signature Verification using Neural Network
Offline Handwritten Signature Verification using Neural Networkijiert bestjournal
 
Pattern recognition on line signature
Pattern recognition on line signaturePattern recognition on line signature
Pattern recognition on line signatureMazin Alwaaly
 
an overview of computer
 an overview of computer an overview of computer
an overview of computersmartyaana
 
New Age Digital Pen Presentation 05 2009
New Age Digital Pen Presentation 05 2009New Age Digital Pen Presentation 05 2009
New Age Digital Pen Presentation 05 2009manos99
 

Semelhante a Online signature recognition (20)

Signature capture technical
Signature capture technicalSignature capture technical
Signature capture technical
 
Automatic handwriting recognition
Automatic handwriting recognitionAutomatic handwriting recognition
Automatic handwriting recognition
 
IJSRED-V2I2P33
IJSRED-V2I2P33IJSRED-V2I2P33
IJSRED-V2I2P33
 
OSPCV: Off-line Signature Verification using Principal Component Variances
OSPCV: Off-line Signature Verification using Principal Component VariancesOSPCV: Off-line Signature Verification using Principal Component Variances
OSPCV: Off-line Signature Verification using Principal Component Variances
 
B017150823
B017150823B017150823
B017150823
 
Smart quill
Smart quillSmart quill
Smart quill
 
Input Devices
Input DevicesInput Devices
Input Devices
 
Input and output devices
Input and output devicesInput and output devices
Input and output devices
 
smart card
smart cardsmart card
smart card
 
Artificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification SystemArtificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification System
 
Input devices
Input devicesInput devices
Input devices
 
Offline Handwritten Signature Verification using Neural Network
Offline Handwritten Signature Verification using Neural NetworkOffline Handwritten Signature Verification using Neural Network
Offline Handwritten Signature Verification using Neural Network
 
50120130406005
5012013040600550120130406005
50120130406005
 
Pattern recognition on line signature
Pattern recognition on line signaturePattern recognition on line signature
Pattern recognition on line signature
 
an overview of computer
 an overview of computer an overview of computer
an overview of computer
 
Card reader
Card readerCard reader
Card reader
 
New Age Digital Pen Presentation 05 2009
New Age Digital Pen Presentation 05 2009New Age Digital Pen Presentation 05 2009
New Age Digital Pen Presentation 05 2009
 
Ict info1
Ict info1Ict info1
Ict info1
 
A86eseminar on biometrics
A86eseminar on biometricsA86eseminar on biometrics
A86eseminar on biometrics
 
Smartcard
SmartcardSmartcard
Smartcard
 

Mais de Piyush Mittal

Mais de Piyush Mittal (20)

Power mock
Power mockPower mock
Power mock
 
Design pattern tutorial
Design pattern tutorialDesign pattern tutorial
Design pattern tutorial
 
Reflection
ReflectionReflection
Reflection
 
Gpu archi
Gpu archiGpu archi
Gpu archi
 
Cuda Architecture
Cuda ArchitectureCuda Architecture
Cuda Architecture
 
Intel open mp
Intel open mpIntel open mp
Intel open mp
 
Intro to parallel computing
Intro to parallel computingIntro to parallel computing
Intro to parallel computing
 
Cuda toolkit reference manual
Cuda toolkit reference manualCuda toolkit reference manual
Cuda toolkit reference manual
 
Matrix multiplication using CUDA
Matrix multiplication using CUDAMatrix multiplication using CUDA
Matrix multiplication using CUDA
 
Channel coding
Channel codingChannel coding
Channel coding
 
Basics of Coding Theory
Basics of Coding TheoryBasics of Coding Theory
Basics of Coding Theory
 
Java cheat sheet
Java cheat sheetJava cheat sheet
Java cheat sheet
 
Google app engine cheat sheet
Google app engine cheat sheetGoogle app engine cheat sheet
Google app engine cheat sheet
 
Git cheat sheet
Git cheat sheetGit cheat sheet
Git cheat sheet
 
Vi cheat sheet
Vi cheat sheetVi cheat sheet
Vi cheat sheet
 
Css cheat sheet
Css cheat sheetCss cheat sheet
Css cheat sheet
 
Cpp cheat sheet
Cpp cheat sheetCpp cheat sheet
Cpp cheat sheet
 
Ubuntu cheat sheet
Ubuntu cheat sheetUbuntu cheat sheet
Ubuntu cheat sheet
 
Php cheat sheet
Php cheat sheetPhp cheat sheet
Php cheat sheet
 
oracle 9i cheat sheet
oracle 9i cheat sheetoracle 9i cheat sheet
oracle 9i cheat sheet
 

Online signature recognition

  • 1.
  • 2. Topics Definitions Feature extraction Signature Forgery Signature models Advantages and disadvantages of signature as biometrics
  • 4. Signatures Off-line or static signatures are scanned from paper documents, where they were written in conventional way. Off-line signature analysis can be carried out with a scanned image of the signature using a standard camera or scanner. On-line or dynamic signatures are written with an electronically instrumented device and the dynamic information (pen tip location through time) is usually available at high resolution, even when the pen is not in contact with the paper.
  • 5. PDA
  • 7.
  • 10. Pen-Tablet System –How It Works?  The WACOM stylus looks and feels like a pen yet contains no batteries or magnets. Instead it takes advantage of electro-magnetic resonance technology in which radio waves are sent to the stylus and returned for position analysis.  In operation, a grid of wires below the screen alternates between transmit and receive modes (about every 20μs):  In transmit mode, the electro-magnetic signal stimulates oscillation in the coil-and capacitor resonant circuit in the pen  In receive mode, the energy of the resonant circuit oscillation in the pen is detected by the antenna grid. This is then analysed to determine position and other information including pressure  Since the grid provides the power to the pen through resonant coupling, no batteries are required. Thus there are no consumables that will run down and need to be replaced or that would make the pen top-heavy.
  • 11. Automatic identification Traditional means of automatic identification:  Possession-based (credit card, smart card)  Use “something that you have”  Knowledge-based (password, PIN)  Use “something that you know”  Biometrics-based (biometric identifier)  Use something that relies on “what you are” Signature is inherently a combination of knowledge and biometric, the knowledge component (what is written and how it is written) can be chosen, and indeed changed, by the user
  • 12. Pre-processing  Smoothing: the input signal from a digitizing pen can be very jagged. The pen used can affect the smoothness and the size of the signature.  Segmentation: determination of the beginning and ending of signing.  Signature beginning: first sample where pressure information is not null (first pen-down)  Signature ending: last pen-up. Because few pen-ups can be found in the signature, we have to establish a maximum pen-up duration (e.g. 3 s).
  • 13. Pre-processing Initial point alignment: all the signatures have to be aligned with respect to the initial point (e.g. the coordinate origin) to make information independent from the position on the tablet.
  • 15. Principal structure of signature recognition systems
  • 17.
  • 18. Local and Global Features Local features x, y coordinates Velocity (v) Acceleration (A) Azimuth Elevation
  • 19. Local and Global Features Global features Signature length, height Total signature time Total pen-down time Total pen-up time Average velocity Maximum velocity Minimum velocity
  • 20. Forgery Genuine Forgery signatures signatures
  • 21. Signatures: authentic and skilled forgery
  • 22.
  • 23. Signature Recognition Advantages Signature is a man-made biometric where forgery has been studied extensively Enrollment (training) is intuitive and fast Signature verification in general has a fast response and low storage requirements A signature verification is “independent” of the native language user Very high compression rates do not affect shape of the signature (100-150 bytes)
  • 24. Signature Recognition Disadvantages There is much precedence for using signature to authenticate documents and not for security applications A five-dimensional pen may be needed to arrive at the desired accuracy. This makes the hardware costly. Some people have palsies, while others do not have enough fine motor coordination to write consistently
  • 25. References Dynamic Signatures developed by NSTC subcomittee on Biometrics:: www.biometrics.gov Simina Emerich, Eugen Lupu, Corneliu Rusu, “On- line Signature Recognition Approach Based on Wavelets and Support Vector Machines” Jinxu Guo, Jianbin Zheng, Bo Lu, “Research of Online Signature Recognition Based on Energy Feature”