Sign verification

26
Signature Verification using Grid based feature extraction Aniket Sahasrabuddhe Anurag Shashank Sushant Saurav D. Y. Patil College Of Engineering Akurdi, Pune

description

Signature verification using grid based feature extraction.

Transcript of Sign verification

Page 1: Sign verification

Signature Verification using Grid based feature extraction

Aniket Sahasrabuddhe

Anurag

Shashank

Sushant Saurav D. Y. Patil College Of EngineeringAkurdi, Pune

Page 2: Sign verification

Presentation Agenda

IntroductionExisting techniquesProposed workAlgorithms Mathematical modelAdvantages & disadvantagesConclusion

Page 3: Sign verification

Introduction

Computers are largely used in almost each and every field.

The security measures to be used must be

cheap, reliable and un-intrusive to the authorized person.

Page 4: Sign verification

Importance of Signature

Transaction

Individuals less likely to object

Biometric

Page 5: Sign verification

Types of signature Identification

Offline Signature Verification deals with shape only

Online signature Verification deals with dynamic features like speed, pen

pressure, directions, stroke length, and when the pen is lifted from the paper

Page 6: Sign verification

Existing systems and limitations

Using Variable Length Segmentation and Hidden Markov Models

New extreme points warping techniqueWavelet Transform Based Global Features

• Percentage of error occurrence is high• It has heavy computational load• Optimal performance not guaranteed

Page 7: Sign verification

Challenging tasks

Differentiating between the parts of the signature that vary with each signing.

The signature can vary substantially over an

individual’s lifetime.

Page 8: Sign verification

Proposed Work

Signature Acquisition Signature Pre-processing Feature Extraction Signature Verification

Fig 1 System Architecture

Page 9: Sign verification

Signature Acquisition

Signature is acquired from the user.

Fig.2 Sample Signatures

Page 10: Sign verification

Signature Pre-processing

Function of the preprocessorImage resizingImage binarizingImage thinningImage normalizing

Page 11: Sign verification

Feature Extraction

Fig.3 Grid over pre-processed signature image

Fig.4 Matrix corresponding to the above grid

Page 12: Sign verification

Signature Verification

Fig.5 Signature Verification

Page 13: Sign verification

Applications

Banking,

Passport office,

And any other places which require identification !

Page 14: Sign verification

Advantages

Low error rate.Forgery is detected even when the forger has

managed to get a copy of the authentic signature.

Fast and simple training.Cheap hardware. Little storage requirements.

Page 15: Sign verification

Use Case Diagram

Page 16: Sign verification

Class Diagram

Page 17: Sign verification

Activity Diagram

Page 18: Sign verification

Component Diagram

Page 19: Sign verification

Sequence Diagram

Page 20: Sign verification

Collaboration Diagram

Page 21: Sign verification

State Diagram

Page 22: Sign verification

Requirements & Technologies

The hardware component we are using here is a scanning device(WEBCAM), high RAM for better results and good processor.

• Operating System: Windows XP or Higher• NetBeans IDE 7.0• SDK - J2SE• Intel core 2 duo processor • 2.1 GHZ, 1 GB RAM

Page 23: Sign verification

Conclusion

The pre-processed signature i.e. resized, binarized, thinned and rotation normalized signature is segmented into grid of size 10x20 cells where each cell is having 100 pixels.

The system does not need any special hardware like tablet, fingerprint verification or iris scanning systems.

It requires only low cost webcams The database used for the verification will not be

large.

Page 24: Sign verification

References

Muhammed Nauman Sajid “Vital Sign: Personal Signature based Biometric Authentication System”, Bs degree thesis, Pakistan Institute of Engineering and Applied sciences, sept 2009.

K. Yasuda, D. Muramatsu, and T. Matsumoto, “Visual-based online signature verification by pen tip tracking”, Proc. CIMCA 2008, 2008, pp. 175–180.

D.Muramatsu, M. Kondo, M. Sasaki, S. Tachibana, and T. Matsumoto. “A markov chain monte carlo algorithm for bayesian dynamic signature verification”. IEEE Transactionson Information Forensics and Security, 1(1):22–34, March,2006.

Satoshi Shirato, D. Muramatsu, and T. Matsumoto, “camera-based online signature verification: Effects of camera positions.” World Automation congress2010 TSI press.

D. Muramatsu, K. Yasuda, S. Shirato, and T. Matsumoto. “Visual-based online signature verification using features extracted from video”, Journal of Network and Computer Applications Volume 33, Issue 3, May 2010, Pages 333-341.

Page 25: Sign verification

Cont.

M. E. Munich and P. Perona. “Visual identification by signature tracking.” IEEE Trans. Pattern Analysis and MachineIntelligence, 25(2):200–217, February 2003.

F.A.Afsar, M. Arif and U. Farrukh, “Wavelet Transform Based Global Features for Online Signature Recognition”, Proceeding of IEEE International Multi-topic Conference INMIC, pp. 1-6 Dec. 2005.

Charles E. Pippin, “Dynamic Signature Verification using Local and Global Features”, Georgia Institute of Technology, July 2004.

Hao Feng and Chan Choong Wah, “Online Signature Verification Using New Extreme Points Warping Technique”, Pattern Recognition Letters, vol. 24, pp. 2943-2951, Dec. 2003.

F.A. Afsar, M. Arif and U. Farrukh, “Wavelet Transform Based Global Features for Online Signature Recognition”, Proceeding of IEEE International Multi-topic Conference INMIC, pp. 1-6 Dec. 2005.

Page 26: Sign verification

Thank You