SlideShare uma empresa Scribd logo
1 de 26
Signature Verification using
Grid based feature extraction
                                       Aniket Sahasrabuddhe
                                                    Anurag
  D. Y. Patil College Of Engineering              Shashank
  Akurdi, Pune                             Sushant Saurav
Presentation Agenda

  Introduction
  Existingtechniques
  Proposed work
  Algorithms
  Mathematical model
  Advantages & disadvantages
  Conclusion
Introduction

  Computers     are largely used in almost each and
  every field.

  Thesecurity measures to be used must be
  cheap, reliable and un-intrusive to the
  authorized person.
Importance of Signature

  Transaction


  Individuals   less likely to object

  Biometric
Types of signature Identification

  Offline   Signature Verification
      deals with shape only

  Online    signature Verification
      deals with dynamic features like speed, pen
       pressure, directions, stroke length, and when the
       pen is lifted from the paper
Existing systems and limitations
 UsingVariable Length Segmentation and
  Hidden Markov Models
 New extreme points warping technique
 Wavelet Transform Based Global Features


  •   Percentage of error occurrence is high
  •   It has heavy computational load
  •   Optimal performance not guaranteed
Challenging tasks
  Differentiating between the parts of the signature
   that vary with each signing.

  The signature can vary substantially over an
   individual’s lifetime.
Proposed Work
    Signature Acquisition
    Signature Pre-processing
    Feature Extraction
    Signature Verification




                         Fig 1 System Architecture
Signature Acquisition

  Signature   is acquired from the user.




                 Fig.2 Sample Signatures
Signature Pre-processing

 Function of the preprocessor
 Image resizing
 Image binarizing
 Image thinning
 Image normalizing
Feature Extraction



        Fig.3 Grid over pre-processed signature image




        Fig.4 Matrix corresponding to the above grid
Signature Verification




              Fig.5 Signature Verification
Applications

  Banking,


  Passport   office,

  And  any other places which require
   identification !
Advantages

  Low   error rate.
  Forgery is detected even when the forger has
   managed to get a copy of the authentic
   signature.
  Fast and simple training.
  Cheap hardware.
  Little storage requirements.
Use Case Diagram
Class Diagram
Activity Diagram
Component Diagram
Sequence Diagram
Collaboration Diagram
State Diagram
Requirements & Technologies

 The hardware component we are using here is a scanning
 device(WEBCAM), high RAM for better results and good
 processor.

    •   Operating System: Windows XP or Higher
    •   NetBeans IDE 7.0
    •   SDK - J2SE
    •   Intel core 2 duo processor
    •   2.1 GHZ, 1 GB RAM
Conclusion
  The  pre-processed signature i.e. resized, binarized,
   thinned and rotation normalized signature is
   segmented into grid of size 10x20 cells where each
   cell is having 100 pixels.
  The system does not need any special hardware like
   tablet, fingerprint verification or iris scanning
   systems.
  It requires only low cost webcams
  The database used for the verification will not be
   large.
References
    Muhammed Nauman Sajid “Vital Sign: Personal Signature based Biometric
     Authentication System”, Bs degree thesis, Pakistan Institute of Engineering and
     Applied sciences, sept 2009.
    K. Yasuda, D. Muramatsu, and T. Matsumoto, “Visual-based online signature
     verification by pen tip tracking”, Proc. CIMCA 2008, 2008, pp. 175–180.
    D.Muramatsu, M. Kondo, M. Sasaki, S. Tachibana, and T. Matsumoto. “A
     markov chain monte carlo algorithm for bayesian dynamic signature
     verification”. IEEE Transactionson Information Forensics and Security,
     1(1):22–34, March,2006.
    Satoshi Shirato, D. Muramatsu, and T. Matsumoto, “camera-based online
     signature verification: Effects of camera positions.” World Automation
     congress2010 TSI press.
    D. Muramatsu, K. Yasuda, S. Shirato, and T. Matsumoto. “Visual-based online
     signature verification using features extracted from video”, Journal of Network
     and Computer Applications Volume 33, Issue 3, May 2010, Pages 333-341.
Cont.
    M. E. Munich and P. Perona. “Visual identification by signature tracking.”
     IEEE Trans. Pattern Analysis and MachineIntelligence, 25(2):200–217,
     February 2003.
    F.A.Afsar, M. Arif and U. Farrukh, “Wavelet Transform Based Global Features
     for Online Signature Recognition”, Proceeding of IEEE International Multi-
     topic Conference INMIC, pp. 1-6 Dec. 2005.
    Charles E. Pippin, “Dynamic Signature Verification using Local and Global
     Features”, Georgia Institute of Technology, July 2004.
    Hao Feng and Chan Choong Wah, “Online Signature Verification Using New
     Extreme Points Warping Technique”, Pattern Recognition Letters, vol. 24, pp.
     2943-2951, Dec. 2003.
    F.A. Afsar, M. Arif and U. Farrukh, “Wavelet Transform Based Global Features
     for Online Signature Recognition”, Proceeding of IEEE International Multi-
     topic Conference INMIC, pp. 1-6 Dec. 2005.
Thank You

Mais conteúdo relacionado

Mais procurados

Traffic sign detection
Traffic sign detectionTraffic sign detection
Traffic sign detection
Avijit Rai
 
Biometric Signature Recognization
 Biometric Signature Recognization Biometric Signature Recognization
Biometric Signature Recognization
Faimin Khan
 
Vehicle Number Plate Recognition System
Vehicle Number Plate Recognition SystemVehicle Number Plate Recognition System
Vehicle Number Plate Recognition System
prashantdahake
 

Mais procurados (20)

Signature verification in biometrics
Signature verification in biometricsSignature verification in biometrics
Signature verification in biometrics
 
Signature verification Using SIFT Features
Signature verification Using SIFT FeaturesSignature verification Using SIFT Features
Signature verification Using SIFT Features
 
Currency recognition using image processing in MATLAB
Currency recognition using image processing in MATLABCurrency recognition using image processing in MATLAB
Currency recognition using image processing in MATLAB
 
Text Detection and Recognition
Text Detection and RecognitionText Detection and Recognition
Text Detection and Recognition
 
Currency recognition system using image processing
Currency recognition system using image processingCurrency recognition system using image processing
Currency recognition system using image processing
 
Traffic sign detection
Traffic sign detectionTraffic sign detection
Traffic sign detection
 
Biometric Signature Recognization
 Biometric Signature Recognization Biometric Signature Recognization
Biometric Signature Recognization
 
Virtual Mouse using hand gesture recognition
Virtual Mouse using hand gesture recognitionVirtual Mouse using hand gesture recognition
Virtual Mouse using hand gesture recognition
 
Handwritten Character Recognition
Handwritten Character RecognitionHandwritten Character Recognition
Handwritten Character Recognition
 
Handwritten character recognition using artificial neural network
Handwritten character recognition using artificial neural networkHandwritten character recognition using artificial neural network
Handwritten character recognition using artificial neural network
 
Project synopsis on face recognition in e attendance
Project synopsis on face recognition in e attendanceProject synopsis on face recognition in e attendance
Project synopsis on face recognition in e attendance
 
Biometric authentication
Biometric authenticationBiometric authentication
Biometric authentication
 
Offline Signature Verification and Recognition using Neural Network
Offline Signature Verification and Recognition using Neural NetworkOffline Signature Verification and Recognition using Neural Network
Offline Signature Verification and Recognition using Neural Network
 
Face Recognition Attendance System
Face Recognition Attendance System Face Recognition Attendance System
Face Recognition Attendance System
 
Fingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication SystemFingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication System
 
Offline signature verification based on geometric feature extraction using ar...
Offline signature verification based on geometric feature extraction using ar...Offline signature verification based on geometric feature extraction using ar...
Offline signature verification based on geometric feature extraction using ar...
 
Hand Gesture Recognition Using OpenCV Python
Hand Gesture Recognition Using OpenCV Python Hand Gesture Recognition Using OpenCV Python
Hand Gesture Recognition Using OpenCV Python
 
Computer Vision - Artificial Intelligence
Computer Vision - Artificial IntelligenceComputer Vision - Artificial Intelligence
Computer Vision - Artificial Intelligence
 
Credit card fraud detection through machine learning
Credit card fraud detection through machine learningCredit card fraud detection through machine learning
Credit card fraud detection through machine learning
 
Vehicle Number Plate Recognition System
Vehicle Number Plate Recognition SystemVehicle Number Plate Recognition System
Vehicle Number Plate Recognition System
 

Destaque

Hand Written Character Recognition Using Neural Networks
Hand Written Character Recognition Using Neural Networks Hand Written Character Recognition Using Neural Networks
Hand Written Character Recognition Using Neural Networks
Chiranjeevi Adi
 
Offline Handwritten Signature Identification and Verification using Multi-Res...
Offline Handwritten Signature Identification and Verification using Multi-Res...Offline Handwritten Signature Identification and Verification using Multi-Res...
Offline Handwritten Signature Identification and Verification using Multi-Res...
CSCJournals
 
Home automation
Home automationHome automation
Home automation
ahmkashwa
 
Online voting system project
Online voting system projectOnline voting system project
Online voting system project
snauriyal1994
 

Destaque (20)

Home appliances control system
Home appliances control systemHome appliances control system
Home appliances control system
 
Hand Written Character Recognition Using Neural Networks
Hand Written Character Recognition Using Neural Networks Hand Written Character Recognition Using Neural Networks
Hand Written Character Recognition Using Neural Networks
 
An offline signature recognition and verification system based on neural network
An offline signature recognition and verification system based on neural networkAn offline signature recognition and verification system based on neural network
An offline signature recognition and verification system based on neural network
 
Offline Handwritten Signature Identification and Verification using Multi-Res...
Offline Handwritten Signature Identification and Verification using Multi-Res...Offline Handwritten Signature Identification and Verification using Multi-Res...
Offline Handwritten Signature Identification and Verification using Multi-Res...
 
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHODFORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
 
Digital image forgery detection
Digital image forgery detectionDigital image forgery detection
Digital image forgery detection
 
Image forgery and security
Image forgery and securityImage forgery and security
Image forgery and security
 
Full biometric eye tracking
Full biometric eye trackingFull biometric eye tracking
Full biometric eye tracking
 
finger prints
finger printsfinger prints
finger prints
 
Embedded System Design for Iris Recognition System.
Embedded System Design for Iris Recognition System.Embedded System Design for Iris Recognition System.
Embedded System Design for Iris Recognition System.
 
Home automation
Home automationHome automation
Home automation
 
Fingerprint based transaction system
Fingerprint based transaction systemFingerprint based transaction system
Fingerprint based transaction system
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPT
 
Biometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febBiometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 feb
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniques
 
Online voting system project
Online voting system projectOnline voting system project
Online voting system project
 
Online property management system design document
Online property management system design documentOnline property management system design document
Online property management system design document
 
Electronic banking presentation
Electronic banking presentationElectronic banking presentation
Electronic banking presentation
 
Internet Banking
Internet BankingInternet Banking
Internet Banking
 
E banking
E bankingE banking
E banking
 

Semelhante a Sign verification

Implementation of Biometric Based Electoral Fraud Desisting System
Implementation of Biometric Based Electoral Fraud Desisting SystemImplementation of Biometric Based Electoral Fraud Desisting System
Implementation of Biometric Based Electoral Fraud Desisting System
Associate Professor in VSB Coimbatore
 

Semelhante a Sign verification (20)

OSPCV: Off-line Signature Verification using Principal Component Variances
OSPCV: Off-line Signature Verification using Principal Component VariancesOSPCV: Off-line Signature Verification using Principal Component Variances
OSPCV: Off-line Signature Verification using Principal Component Variances
 
B017150823
B017150823B017150823
B017150823
 
Artificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification SystemArtificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification System
 
IRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNNIRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNN
 
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
 
IJSRED-V2I2P33
IJSRED-V2I2P33IJSRED-V2I2P33
IJSRED-V2I2P33
 
A Fusion of Statistical Distance and Signature Length Based Approach for Offl...
A Fusion of Statistical Distance and Signature Length Based Approach for Offl...A Fusion of Statistical Distance and Signature Length Based Approach for Offl...
A Fusion of Statistical Distance and Signature Length Based Approach for Offl...
 
Pattern recognition on line signature
Pattern recognition on line signaturePattern recognition on line signature
Pattern recognition on line signature
 
Distance Based Verification Technique for Online Signature System
Distance Based Verification Technique for Online Signature SystemDistance Based Verification Technique for Online Signature System
Distance Based Verification Technique for Online Signature System
 
Choudhary2015
Choudhary2015Choudhary2015
Choudhary2015
 
3 d
3 d3 d
3 d
 
High protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyHigh protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technology
 
Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...
 
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
 
FINGERPRINT BASED LOCKER WITH IMAGE CAPTURE
FINGERPRINT BASED LOCKER WITH IMAGE CAPTUREFINGERPRINT BASED LOCKER WITH IMAGE CAPTURE
FINGERPRINT BASED LOCKER WITH IMAGE CAPTURE
 
Offline Handwritten Signature Verification using Neural Network
Offline Handwritten Signature Verification using Neural NetworkOffline Handwritten Signature Verification using Neural Network
Offline Handwritten Signature Verification using Neural Network
 
Implementation of Biometric Based Electoral Fraud Desisting System
Implementation of Biometric Based Electoral Fraud Desisting SystemImplementation of Biometric Based Electoral Fraud Desisting System
Implementation of Biometric Based Electoral Fraud Desisting System
 
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Online Signature Authentication by Using Mouse Behavior
Online Signature Authentication by Using Mouse Behavior Online Signature Authentication by Using Mouse Behavior
Online Signature Authentication by Using Mouse Behavior
 

Sign verification

  • 1. Signature Verification using Grid based feature extraction Aniket Sahasrabuddhe Anurag D. Y. Patil College Of Engineering Shashank Akurdi, Pune Sushant Saurav
  • 2. Presentation Agenda  Introduction  Existingtechniques  Proposed work  Algorithms  Mathematical model  Advantages & disadvantages  Conclusion
  • 3. Introduction  Computers are largely used in almost each and every field.  Thesecurity measures to be used must be cheap, reliable and un-intrusive to the authorized person.
  • 4. Importance of Signature  Transaction  Individuals less likely to object  Biometric
  • 5. Types of signature Identification  Offline Signature Verification  deals with shape only  Online signature Verification  deals with dynamic features like speed, pen pressure, directions, stroke length, and when the pen is lifted from the paper
  • 6. Existing systems and limitations  UsingVariable Length Segmentation and Hidden Markov Models  New extreme points warping technique  Wavelet Transform Based Global Features • Percentage of error occurrence is high • It has heavy computational load • Optimal performance not guaranteed
  • 7. Challenging tasks  Differentiating between the parts of the signature that vary with each signing.  The signature can vary substantially over an individual’s lifetime.
  • 8. Proposed Work  Signature Acquisition  Signature Pre-processing  Feature Extraction  Signature Verification Fig 1 System Architecture
  • 9. Signature Acquisition  Signature is acquired from the user. Fig.2 Sample Signatures
  • 10. Signature Pre-processing Function of the preprocessor Image resizing Image binarizing Image thinning Image normalizing
  • 11. Feature Extraction Fig.3 Grid over pre-processed signature image Fig.4 Matrix corresponding to the above grid
  • 12. Signature Verification Fig.5 Signature Verification
  • 13. Applications  Banking,  Passport office,  And any other places which require identification !
  • 14. Advantages  Low error rate.  Forgery is detected even when the forger has managed to get a copy of the authentic signature.  Fast and simple training.  Cheap hardware.  Little storage requirements.
  • 22. Requirements & Technologies The hardware component we are using here is a scanning device(WEBCAM), high RAM for better results and good processor. • Operating System: Windows XP or Higher • NetBeans IDE 7.0 • SDK - J2SE • Intel core 2 duo processor • 2.1 GHZ, 1 GB RAM
  • 23. Conclusion  The pre-processed signature i.e. resized, binarized, thinned and rotation normalized signature is segmented into grid of size 10x20 cells where each cell is having 100 pixels.  The system does not need any special hardware like tablet, fingerprint verification or iris scanning systems.  It requires only low cost webcams  The database used for the verification will not be large.
  • 24. References  Muhammed Nauman Sajid “Vital Sign: Personal Signature based Biometric Authentication System”, Bs degree thesis, Pakistan Institute of Engineering and Applied sciences, sept 2009.  K. Yasuda, D. Muramatsu, and T. Matsumoto, “Visual-based online signature verification by pen tip tracking”, Proc. CIMCA 2008, 2008, pp. 175–180.  D.Muramatsu, M. Kondo, M. Sasaki, S. Tachibana, and T. Matsumoto. “A markov chain monte carlo algorithm for bayesian dynamic signature verification”. IEEE Transactionson Information Forensics and Security, 1(1):22–34, March,2006.  Satoshi Shirato, D. Muramatsu, and T. Matsumoto, “camera-based online signature verification: Effects of camera positions.” World Automation congress2010 TSI press.  D. Muramatsu, K. Yasuda, S. Shirato, and T. Matsumoto. “Visual-based online signature verification using features extracted from video”, Journal of Network and Computer Applications Volume 33, Issue 3, May 2010, Pages 333-341.
  • 25. Cont.  M. E. Munich and P. Perona. “Visual identification by signature tracking.” IEEE Trans. Pattern Analysis and MachineIntelligence, 25(2):200–217, February 2003.  F.A.Afsar, M. Arif and U. Farrukh, “Wavelet Transform Based Global Features for Online Signature Recognition”, Proceeding of IEEE International Multi- topic Conference INMIC, pp. 1-6 Dec. 2005.  Charles E. Pippin, “Dynamic Signature Verification using Local and Global Features”, Georgia Institute of Technology, July 2004.  Hao Feng and Chan Choong Wah, “Online Signature Verification Using New Extreme Points Warping Technique”, Pattern Recognition Letters, vol. 24, pp. 2943-2951, Dec. 2003.  F.A. Afsar, M. Arif and U. Farrukh, “Wavelet Transform Based Global Features for Online Signature Recognition”, Proceeding of IEEE International Multi- topic Conference INMIC, pp. 1-6 Dec. 2005.