Stability and style-variation modeling for on-line signature verification

18
Pattern Recognition 36 (2003) 2253 – 2270 www.elsevier.com/locate/patcog Stability and style-variation modeling for on-line signature verication Kai Huang , Hong Yan School of Electrical and Information Engineering, University of Sydney, Sydney NSW 2006, Australia Received 18 July 2001; accepted 26 March 2003 Abstract Stability and style variation are important characteristics in handwriting analysis and recognition. This paper de- scribes a stability modeling technique of handwritings in the context of on-line signature verication. With this tech- nique, the stability and style-variation characteristics of the reference samples are deduced from the dynamic warping relationship between the sequences of basic handwriting strokes. Reliability measures of the extracted signature fea- tures are incorporated into the signature segmentation, model building, and verication algorithms, so that stable hand- writing features are emphasized in the signature matching process, while style variations for less stable features are intentionally tolerated. The generated signature model consists of a structure description graph of the handwriting com- ponents and their stability information. A signature is accepted by the model if it is close to a permissible path within the weighted graph. A novel feature of the technique is its ability to rene the correspondence relation of the hand- writing during model building and signature verication. This ability enables the verication and partial correction of segmentation errors to reduce the number of false rejections while maintaining the system security level and keeping the number of reference samples manageable. ? 2003 Pattern Recognition Society. Published by Elsevier Ltd. All rights reserved. Keywords: Signature verication; Stability; Signature segmentation; Structural description graph 1. Introduction Signature is a means of personal identity authentication and verication. Its use has been well established in daily activities, especially in legal and commercial environments. For electronic information exchange purposes, it is highly desirable to automate the process of accurately identifying genuine and forged signatures. For this reason, many re- search eorts have been invested over the last decade [13]. Flexible pattern matching techniques are continuously being investigated in solving the signature matching prob- lem, focusing on the temporal and spatial correlation of the signature signals. On-line acquired signature signals, Corresponding author. Tel.: +61-2-9351-48-24; fax: +61-29351-3847. E-mail address: [email protected] (K. Huang). being similar to 1-D speech signals, are distorted by local non-linear expansion and contraction in the temporal do- main. Regional correlation, skeleton tree matching [4], elas- tic matching by dynamic time warping (DTW) [4,5] and signal correlation [6,7], autoregressive modeling [8], hid- den Markov modeling (HMM) [911], and neural network techniques [1214] have been applied to this problem with varying degrees of success. Signatures are also 2-D sym- bols, and non-linear spatial distortion is signicant as well [15]. It is customary to examine the nished signature for authenticity rather than the action that produces it. Spatial domain conformance remains as a determining criteria, es- pecially in o-line situations [1618]. In addition to pattern matching, there are also issues of selecting optimal prototypes and constructing accurate signature models. This is where the analysis of pattern correlation between reference signatures, i.e. stability char- acteristics extraction, becomes valuable. The aim is to 0031-3203/03/$30.00 ? 2003 Pattern Recognition Society. Published by Elsevier Ltd. All rights reserved. doi:10.1016/S0031-3203(03)00126-2

Transcript of Stability and style-variation modeling for on-line signature verification

Page 1: Stability and style-variation modeling for on-line signature verification

Pattern Recognition 36 (2003) 2253–2270www.elsevier.com/locate/patcog

Stability and style-variation modeling for on-line signatureveri�cation

Kai Huang∗, Hong YanSchool of Electrical and Information Engineering, University of Sydney, Sydney NSW 2006, Australia

Received 18 July 2001; accepted 26 March 2003

Abstract

Stability and style variation are important characteristics in handwriting analysis and recognition. This paper de-scribes a stability modeling technique of handwritings in the context of on-line signature veri�cation. With this tech-nique, the stability and style-variation characteristics of the reference samples are deduced from the dynamic warpingrelationship between the sequences of basic handwriting strokes. Reliability measures of the extracted signature fea-tures are incorporated into the signature segmentation, model building, and veri�cation algorithms, so that stable hand-writing features are emphasized in the signature matching process, while style variations for less stable features areintentionally tolerated. The generated signature model consists of a structure description graph of the handwriting com-ponents and their stability information. A signature is accepted by the model if it is close to a permissible path withinthe weighted graph. A novel feature of the technique is its ability to re�ne the correspondence relation of the hand-writing during model building and signature veri�cation. This ability enables the veri�cation and partial correction ofsegmentation errors to reduce the number of false rejections while maintaining the system security level and keeping thenumber of reference samples manageable.? 2003 Pattern Recognition Society. Published by Elsevier Ltd. All rights reserved.

Keywords: Signature veri�cation; Stability; Signature segmentation; Structural description graph

1. Introduction

Signature is a means of personal identity authenticationand veri�cation. Its use has been well established in dailyactivities, especially in legal and commercial environments.For electronic information exchange purposes, it is highlydesirable to automate the process of accurately identifyinggenuine and forged signatures. For this reason, many re-search e�orts have been invested over the last decade [1–3].Flexible pattern matching techniques are continuously

being investigated in solving the signature matching prob-lem, focusing on the temporal and spatial correlation of thesignature signals. On-line acquired signature signals,

∗ Corresponding author. Tel.: +61-2-9351-48-24; fax:+61-29351-3847.

E-mail address: [email protected] (K. Huang).

being similar to 1-D speech signals, are distorted by localnon-linear expansion and contraction in the temporal do-main. Regional correlation, skeleton tree matching [4], elas-tic matching by dynamic time warping (DTW) [4,5] andsignal correlation [6,7], autoregressive modeling [8], hid-den Markov modeling (HMM) [9–11], and neural networktechniques [12–14] have been applied to this problem withvarying degrees of success. Signatures are also 2-D sym-bols, and non-linear spatial distortion is signi�cant as well[15]. It is customary to examine the �nished signature forauthenticity rather than the action that produces it. Spatialdomain conformance remains as a determining criteria, es-pecially in o�-line situations [16–18].In addition to pattern matching, there are also issues

of selecting optimal prototypes and constructing accuratesignature models. This is where the analysis of patterncorrelation between reference signatures, i.e. stability char-acteristics extraction, becomes valuable. The aim is to

0031-3203/03/$30.00 ? 2003 Pattern Recognition Society. Published by Elsevier Ltd. All rights reserved.doi:10.1016/S0031-3203(03)00126-2

Page 2: Stability and style-variation modeling for on-line signature verification

2254 K. Huang, H. Yan / Pattern Recognition 36 (2003) 2253–2270

command an automatic signature veri�er to scrutinize theunusual signature style variations, and be less critical onothers. The standard deviation is a convenient and genericstability indicator. An alternative stability characteristicfor on-line signature veri�cation has been proposed byDimauro et al., which makes use of the dynamic timewarping (DTW) function between the sample points of twosignature trajectories [19–21]. In their approach, a directmatching point (DMP) is used to indicate a small regionwhere no signi�cant distortion exists between the trajecto-ries. Stability indices are formulated based on the detectionof DMP, and are used to select the optimal reference sam-ples. It seems appropriate to extend their stability estimationmethod to model handwriting components and strings, i.e.the basic handwriting units as proposed by Plamondon etal. [22–24] over the years. This paper describes such anextension.In this extended technique, reliable features are identi�ed

as those patterns of the handwriting component strings whichconsistently appear in one’s signatures. Matching betweensignatures is implemented using dynamic warping appliedto the respective component strings. Since the dynamicwarping algorithm is essentially O(n2), and the number ofhandwriting components is much smaller than the numberof data samples, performing dynamic warping at the com-ponent string level is very e�cient. With this technique, thestability characteristics and style variations of the referencesignatures are deduced from the warping paths betweenthe sequences of reference components, and are utilized toweight the matching importance of each input and referencecomponent in veri�cation tests. Reliability measures ofthe extracted features are incorporated into the signaturesegmentation, model building, and veri�cation algorithms,so that stable handwriting features are emphasized, andstyle variations at less stable places are intentionally tol-erated in the matching process. Signatures are modeled byweighted structure description graph (SDG) of the hand-writing components. A signature is accepted by the modelif it is close to a permissible path within the weightedgraph.Besides incorporating stability information in the SDG

model, another novel feature of this technique is its abilityto re�ne the signature segmentation and the handwritingcomponent correspondence relation. This ability enables theveri�cation and elimination of many signature segmentationerrors, and the construction of a more accurate model. As aresult, it helps to reduce the number of false rejections whilemaintaining a high security level.The paper is organized as follows. Section 2 dis-

cusses the extraction of stability characteristics in on-linesignatures and the signature model-building process. Sec-tion 3 describes the signature veri�cation algorithm whichmakes use of the stability characteristics in the signa-ture model. The experiment result is presented in Sec-tion 4. Finally, the conclusion of this study is given inSection 5.

2. Stability feature extraction

2.1. Signature segmentation

Handwriting-component-based stability measurement re-quires the signature to be segmented into basic handwritingunits. In this instance, segmentation of the on-line acquiredsignature is performed according to the handwriting motionbreaks [25]. It has be observed in the literature that thevelocity and curvature changes are closely linked in hand-writing trajectories [26], and the pressure waveform variesin synchronization with handwriting motion transitions[27]. The transition points, being near the handwriting ve-locity zero-crossings, and corresponding to high magnitudelocal curvature peaks, are chosen as the segmentation points(Fig. 1) [28]. Furthermore, the patterns of these speed-upand slow-down motion transitions are habitually distinctfor each writer, and are exploited as a valuable dis-criminative feature in the on-line signature veri�cationsystem.The users of the system are constraint to sign their

signatures along predrawn horizontal baselines, similarto those on forms. Horizontal and vertical velocity pat-terns are used after small angle-range rotation correctionof the signature specimen. The rotation angle is estimatedby locating the maximum correlation between the direc-tion angle histograms of input and reference templateover a small angle range. The initial segmentation is ob-tained on an individual signature basis (Fig. 2). Over- orunder-segmentation, as well as erroneous segmentation,could be expected, due to noise in the data and imper-fections of the signature collection process. To constructa more accurate signature model using the limited num-ber of supplied reference samples, a novel segmentationre�nement technique is derived, with help from stabilitymeasurements, to enhance the signal-to-noise ratio of lo-cating the likely positions of the segmentation points. Thesegmentation problem can also be reduced by applyingmodel-guided dynamic segmentation techniques [29,30];however, it is not clear if the stability characteristics arepreserved and emphasized by a direct adoption of suchapproaches.

2.2. Stroke stability estimation

Inspired by the sample-point stability estimation tech-nique by Dimauro et al. [19–21], a method of extractingstability information on handwriting components is imple-mented. It is based on the analysis of the dynamic cou-pling between the strings of basic handwriting componentsin the reference signatures. DTW on basic component stringshas its advantages over that on sample points. It evaluatesthe shape similarity of corresponding handwriting unit aswell as the structural similarity of the signature. It preservescomponent ordering, but also allows limited segment skip-ping, which is important for modeling style variations. By

Page 3: Stability and style-variation modeling for on-line signature verification

K. Huang, H. Yan / Pattern Recognition 36 (2003) 2253–2270 2255

(a)

(b) (c)

(d) (e)

(f)

Fig. 1. Illustration of signature functional features and signature segmentation: (a) a signature sample; (b) the function x(t)—drifts horizontally;(c) the function y(t)—oscillates vertically; (d) the curvature function �(t); (e) the velocity function vy(t); and (f) the segmented signaturetrajectory. The zero-crossings of vy(t) corresponding to a large magnitude �(t) are selected as the signature trajectory segmentation pointsto obtain the basic handwriting units.

imposing intermediate structural boundaries and hence se-mantics information in the matching process, it improvesupon the sample-point dynamic warping in reducing thematching errors.For a set of genuine reference samples R={Si|i=1; : : : ; n},

the stability of a single specimen Sr ∈R is formulated withrespect to the other signatures Sv ∈R; r �= v. Assume a sig-nature is represented as a list of segmented basic handwrit-ing units, i.e.,

Sr = sr(1) + · · ·+ sr(p) + · · ·+ sr(nr);

Sv = sv(1) + · · ·+ sv(q) + · · ·+ sv(nv); (1)

where sr(p) and sv(q) are the basic units of correspond-ing signatures as identi�ed by the signature segmentationmethod, and nr and nv are the numbers of such units withinthe signatures (Fig. 2).The dynamic warping procedure generates the coupling

sequence,W (r; v)=(i1; j1); : : : ; (ik ; jk); : : : ; (iK ; jK), of lengthK , between the basic units of Sr and Sv. (ik ; jk) denotes a cou-pling between sr(ik) and sv(jk), 16 ik6 nr; 16 jk6 nv.The accumulated global distance,

D(Sr; Sv) =K∑k=1

d(sr(ik); sv(jk)); (2)

Page 4: Stability and style-variation modeling for on-line signature verification

2256 K. Huang, H. Yan / Pattern Recognition 36 (2003) 2253–2270

1 2 3 4 5 6 7 8 9 10 11 12 13 140

1 2 3 4 5 6 7 8 9 10 11 12 13 140

1 2 3 4 5 6 7 8 9 10 11 12 130

1 2 3 4 5 6 7 8 9 10 11 12 130

1 2 3 4 5 6 7 8 9 10 11 12 130 1514

a

b

c

d

e

d12

a13

b14

Fig. 2. A set of reference signatures from the database and their respective segment sequences are shown. It is used as an example in thedescription of the signature model-building algorithm. It can be observed that some segments, e.g. a13, d12, and b14, are not segmentedcompletely. These will either be corrected by the segmentation re�nement algorithm or go undetected causing matching problems.

is to be minimized by the warping algorithm, whered(sr(ik); sv(jk)) is the component stroke distance (to bede�ned in Section 3) between the basic units of Sr and Sv

(Fig. 3).The multiplicity of the coupling relation of a handwriting

component is de�ned as the number of consecutive occur-rences of the component index which appear in the warp-ing path W (r; v), where the consecutive property is impliedby the use of the DTW algorithm. Let (p; q)∈W (r; v) bean identi�ed coupling between components sr(p) and sv(q),where p and q are the indices of the matching components,respectively. The multiplicities mp and mq are given as

mp = card{(ik ; jk)∈W (r; v) | ik = p};

mq = card{(ik ; jk)∈W (r; v) | jk = q}; (3)

where card{:} gives the cardinality of a set.A direct matching segment (DMS) of the rth signature is a

pen-stroke segment which has a one-to-one coupling with apen-stroke segment of the vth signature, i.e. the multiplicitiesof the components in the coupled pair are both 1:

sr(p) is a DMS ⇔ mp = mq = 1: (4)

For each component of the rth signature, a value indi-cating the goodness of match under dynamic warping canbe assigned according to its coupling with components ofthe vth signature. A decision scheme for assigning such a

value is given as

C(Sv(sr(p))) = ( 12 )mp+mq−2; ∀p∈{1; : : : ; nr}; (5)

where mp and mq are the multiplicities of the coupling com-ponents.The index of local component stroke stability for the rth

signature with respect to the reference set R is given by thecolumnwise average, i.e., for the case Sr �∈ R,

I(sr(p)) =1n

n∑v=1

C(Sv(sr(p))); p= 1; 2; : : : ; nr ; (6)

and for Sr ∈R,

I(sr(p)) =1

n− 1n∑

v=1;v �=rC(Sv(sr(p)));

p= 1; 2; : : : ; nr ; (7)

which is the stability index formulation of the leave-one-outtraining procedure.In the example of Fig. 3, the detected DMS sequence

value of signature Sr is

{1; 1; 1; 1; 1; 1; 1; 1; 1; 1; 1; 1; 1; 1; 1};

{1; 1; 1; 1; 14 ; 14 ; 14 ; 1; 1; 1; 1; 1; 1; 12 ; 1};

{1; 1; 1; 1; 1; 14 ; 14 ; 18 ; 1; 1; 1; 1; 1; 1; 1};

{1; 1; 1; 1; 1; 1; 1; 1; 1; 1; 1; 1; 12 ; 1; 1}:

Page 5: Stability and style-variation modeling for on-line signature verification

K. Huang, H. Yan / Pattern Recognition 36 (2003) 2253–2270 2257

0

0

1

1 2

2 3

3

4

4 5

5 6

6

7 8 9

7 8 9

10

10

11 12 13

11 12 13

14

0

0

1

1 2

2 3

3

4

4 5

5 6

6

7 8 9

7 8 9

10

10

11 12 13

11 12 13

14

0

0

1

1 2

2 3

3

4

4 5

5 6

6

7 8 9

7 8 9

10

10

11 12 13

11 12 13

14

b

a

a

c

a

d

a

e

0

0

1

1 2

2 3

3

4

4 5

5 6

6

7 8 9

7 8 9

10

10

11 12 13

11 12 13

14

1514

14

Fig. 3. Illustration of the handwriting stroke segment warping relation in the set of �ve reference signatures in Fig. 2. The sequence ofhandwriting components of a signature Sr denoted by a is matched against other reference signatures (b–e). These warping relations areprocessed by the subsequent segmentation re�nement and model-building steps to derive stability features within a signature.

The local stability indices of the individual componentsof Sr are

{1; 1; 1; 1; 2632 ; 2032 ; 2032 ; 2532 ; 1; 1; 1; 1; 2832 ; 2832 ; 1}:The stable-coupling chains, i.e. the strings of uninter-

rupted DMS coupling indicated by continuous strings of 1s,give useful indications of long component string stability.Stability index of pen-stroke sub-groups is generally givenas

I(sr(p); w) =1

card(V )

∑p′∈V

I(sr(p′));

p= 1; 2; : : : ; nr ; (8)

where V = {p′ : 16p′6 nr; |p′ − p|6w} and card(V )gives the number of elements in set V . By adjusting theneighborhood size w hence the neighborhood set V , thestability indices of component stroke combinations areobtained. Since the handwriting components are the basicmatching units in this case, typically, w is assigned valuesof 1, 2, and 3, to generate the corresponding levels of com-ponent sub-group stability indices. When w=1, the indicesof the immediate previous and next neighbors of a segmentin the component string are included in the evaluation ofEq. (8). The range is three consecutive components. Simi-larly, when w=2; 3, �ve and seven consecutive componentsare considered. The decision values for component indicesoutside the physical range are assumed to be 0.5, to reduceedge e�ects, for the purpose of calculating the long-rangestability values. The local stability indices for individualcomponents can be regarded as a special case for which

w = 0. This multi-level neighborhood modeling schemeencompasses the local to long-range stable stroke-segmentcoupling stability con�dences, as shown in Fig. 4. The de-tection of peak values at each level produces the locationand range of the consecutive stable components.The medium-to-large amplitude velocity variation pattern

of stable pen-movement components is very interesting. Itis characterized in the vertical or horizontal velocity tim-ing diagram as several bursts of highly active peak/troughvariations, which are also evident in carelessly signedsignatures (Fig. 5). They represent highly skilled groupsof handwriting sub-strokes which can be expected to bepresent in most, if not all, genuine signatures. The ranges ofsuch stable coupling of stroke sub-groups, referred to as thevelocity-activity groups, are recorded in the correspondingsignature model, via sub-group stability indices I(sr(p); w)being approximately equal to 1, for each level of w. Thecorresponding functional features in the detected ranges ateach level are used in verifying the existence and similarityof such activity groups in an input signature.In the following sections, the identi�ed DMS and

non-DMS couplings (Fig. 6) are utilized in the constructionand re�nement of the signature model.

2.3. Structural model building

SDG is a visually appealing scheme for organizing thecomplex statistical features and structural relations in on-lineacquired signatures. Dimauro et al. [31,32] have utilizedit to model handwriting strokes separated by pen-lifts, by

Page 6: Stability and style-variation modeling for on-line signature verification

2258 K. Huang, H. Yan / Pattern Recognition 36 (2003) 2253–2270

0.4

0.5

0.6

0.7

0.8

0.9

1

1.1

w=0w=1w=2w=3

w=0 1 1 1 1 0.75 0.5 0.5 0.75 1 1 1 1 0.75 0.75 1

w=1 0.83 1 1 0.92 0.75 0.58 0.58 0.75 0.92 1 1 0.92 0.83 0.83 0.75

w=2 0.8 0.9 0.95 0.85 0.75 0.7 0.7 0.75 0.85 0.95 0.95 0.9 0.9 0.8 0.7

w=3 0.79 0.82 0.82 0.82 0.79 0.79 0.79 0.79 0.82 0.86 0.89 0.93 0.86 0.79 0.71

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

Fig. 4. Multi-level neighborhood stability indices.

(a) (b)

Fig. 5. An illustration of the velocity variation pattern within a set of reference signatures, showing (a) horizontal velocity pattern vx(t)and (b) vertical velocity pattern vy(t). The dashed-line enclosed regions correspond roughly to the stable DMS sub-groups which arecharacteristic in the signature, referred to as the velocity-activity groups.

identifying the �nite set of pen-lift singularity positionswithin the reference samples, and using an improvedk-means clustering technique to group the handwritingstrokes into fundamental stroke component clusters viatopological features and the point-ordering information inthe signature. Similarly, SDG is used here to describe theorganization of the motion-segmented handwriting com-ponents obtained in Section 2.1, where there are typicallyseveral basic handwriting units within a single pen-liftseparated stroke. For each enrolled signature, an SDG isconstructed by identifying the �nite set of handwritingcomponent clusters from the reference samples via dynamicwarping of the component strings.The dynamic warping sequences are algorithmically

transformed into an SDG (Fig. 7). In the transformation, thecomponents in the template signature are treated as initialcluster centers. The components in the other reference

signatures under DMS coupling are grouped directly withthese centers (Fig. 7a). The non-DMS coupled componentsare extrapolated as branches from the main trunk, whichthen become separate clusters. The branch returns to themain trunk when DMS coupling resumes. The stability val-ues associated with these clusters are the ratio of the num-bers of components in the clusters over the number of totalreference signatures. The uninterrupted DMS coupling se-quences are also well presented in the SDG, as the concate-nation of consecutive main trunk components without anybranches.The internal algorithmic implementation of the SDG is

illustrated in Fig. 8. On the main trunk of the directed graphdata structure, there are a number of conceptual nodes whichseparates the handwriting components. The componentsare represented as the directed links between the nodes.Each node maintains lists of branch-in and branch-out

Page 7: Stability and style-variation modeling for on-line signature verification

K. Huang, H. Yan / Pattern Recognition 36 (2003) 2253–2270 2259

0’

0

1’

1 2

2’ 3’

3

4’

4 5

5’ 6’

6

7’ 8’ 9’

7 8 9

10’

10

11’ 12’ 13’

11 12 13

14’

14

15’

(i)

(ii) (iv)

(iii) (v)

0’

0

1’

1 2

2’ 3’

3

4’

4 5

5’ 6’

6

7’ 8’ 9’

7 8 9

10’

10

11’ 12’ 13’

11 12 13 14

14’ 15’

Fig. 6. Identi�able stability patterns within the dynamic warping output. The stable DMS-coupling patterns, i.e. the one-to-one relations, arecircled with solid lines. The non-DMS-coupling patterns, i.e. one-to-many relations, are circled with dotted lines. Non-DMS patterns mayappear in many forms. For example, in case (i), it is located in the middle of the component sequence; in cases (ii)–(iv), it spans morethan one node; and in case (v) it is located at one end.

pointers. Branches originate from the nodes where a transi-tion from DMS to non-DMS occurs, and terminate in sub-sequent nodes where DMS matching resumes. Each link orbranch has a list of attributes, which includes the starting and�nishing node numbers and the references to the originatingstroke and signature.Let Ai be any stroke-segment cluster on the SDG main

trunk of reference signature Sr . If the number of componentsin Ai is greater than one, a set of veri�cation thresholds �(Ai)will be calculated to represent the extents of the feature vari-ations within this cluster. For clusters on the SDG branches,cross-references are created via pointer links to other SDGswhere these branch clusters are on the main trunk in theirrespective SDGs.The obtained SDG is only an initial but a useful estimate

of the signature model. This is because the DTW procedureis an optimization procedure, not a clustering procedure.Errors in the matching pairs mainly exist for the non-DMScoupling regions. For example, in Fig. 7(b), 11c+12c cor-rectly matches to a13, but 12e+13e should not be matchedto a12. A segmentation veri�cation and re�nement processis necessary to rectify these errors.

2.4. Segmentation veri�cation and re�nement

The non-DMS patterns as identi�ed by the analysis ofhandwriting component warping are further analyzed to-gether with their neighboring components by a segmentationveri�cation process, to decide on how the components canbe best correlated. Consider the typical non-DMS couplingexamples in Fig. 6, in which there are a few possibilities.First, it is possible that the segment may simply need to be re-peated several times as detected by the dynamic warping al-gorithm. It is also possible that over- or under-segmentation

for one of the signatures occurs. The neighboring com-ponents of the excessively segmented region need to becombined before matching to the corresponding region. Fi-nally, the regions under comparison may di�er su�cientlyso that after eliminating the possibility of shorter rangecoupling, a combined long segment in one signature hasto be matched with a combined long segment in anothersignature.Non-DMS coupling patterns can generally appear in

the forms listed in Fig. 9. Let b(y1; y2; : : : ; yn) denote allthe possible con�gurations that can be generated for theone-to-many relation b → (y1; y2; : : : ; yn). In the follow-ing, ‘→’ denotes ‘is matched to’, and ‘+’ denotes ‘isconcatenated with’. For n = 1, b(y1) is simply b → y1.For n = 2, b(y1; y2) represents the following two con-�gurations: {b → y1; b → y2}; and {b → y1 + y2}.Con�gurations for higher orders of n are generated re-cursively by expressions involving lower-order terms. Forexample, b(y1; y2; y3) is equivalent to {b→ y1; b(y2; y3)};{b → y1 + y2; b(y3)}; and {b → y1 + y2 + y3}. Thegeneral case b(y1; y2; y3; : : : ; yn) represents {b → y1,b(y2; y3; : : : ; yn)}; {b → y1 + y2; b(y3; : : : ; yn)}; : : :; and{b→ y1 + y2 + · · ·+ yn}.The rules of generating the con�gurations for case (a) of

Fig. 9 are:

• a→ u; b(y1; y2; : : : ; yn); c→ v;• a→ u+ y1; b(y2; : : : ; yn); c→ v;• a→ u+ y1; b(y2; : : : ; yn−1); c→ yn + v;• a→ u; b(y1; y2; : : : ; yn−1); c→ yn + v.

In case (b) of Fig. 9, they become:

• a→ u; b(y1; y2; : : : ; yn); c→ v;• a→ u+ y1; b(y2; : : : ; yn); c→ v;

Page 8: Stability and style-variation modeling for on-line signature verification

2260 K. Huang, H. Yan / Pattern Recognition 36 (2003) 2253–2270

a

b

c

d

e

3 14131210 11987654210

(a)

4c5d 6d 12e + 13e

11c + 12c

a

(b)

0 3 4 11 12 13 141 2 5 6 7 8 9 10

12e 13e5d

0a

0b

0c

0d

0e

1a

1b

1c

1d

1e

2a

2b

2c

2d

2e

3a

3b

3c

3d

3e

4a

4b

4d

4e

5a

5b

5e

8a

8e

7a

7e

6a

6b

6e

9a

9e

10a

10e

11a

11e

13a12a

10c9c8c7c5c 6c

11d10d9d8d7d 12d

14e

14a

13c

13d

15e

11c 12e12c 13e

4c 11c 12c

7b 8b 9b 10b 11b 12b 13b 14b

6d

start end

4c 5d 6d

(c)

Fig. 7. The SDG of a signature model. Each ellipse enclosed group is a component cluster. (a) component clusters as identi�ed by DMScouplings, (b) non-DMS components, and (c) a conceptual diagram of SDG for a reference signature.

• a→ u+ y1; b(y2; : : : ; yn; v); c→ v;• a→ u; b(y1; y2; : : : ; yn; v); c→ v.

The a→ u and c→ v couplings may not always be present.This happens when the one-to-many relation is at one endof the component string, in which case these terms are dis-carded in the list of rules. The distances at sample point

level of the possible con�gurations in these cases are eval-uated, and the likelihood of the con�gurations are rankedaccordingly. In the cluster re�nement step, the most likelycon�guration is chosen to be the correct component couplingrelation, and the model graph is adjusted accordingly so thatuncertainties in the initial SDG are removed. An exampleon model re�nement is given in Fig. 10. The algorithm of

Page 9: Stability and style-variation modeling for on-line signature verification

K. Huang, H. Yan / Pattern Recognition 36 (2003) 2253–2270 2261

node 0 node n

branch 1

branch 2

Main trunk

node 3node 1 node 2

branch attributes

start node#finish node#sig# stroke#, stroke# ...

Fig. 8. SDG in the form of a directed graph.

a b c

u vy2 y3 yn...y1

a b c

u vy2 y3 yn...y1(a) (b)

Fig. 9. General case of non-DMS coupling from component-warping. Stroke b is the non-DMS coupling under consideration. Case (a) is asimple one-to-many matching enclosed by DMS couplings at both ends and case (b) is a many-to-many matching due to an extra link betweenb and v. The solid lines indicate the actual matching pairs under dynamic warping. The dotted lines indicate other permissible matchings.

u vy1 y2

a b c a b c

u y1 y2 v11e 12e 13e 14e

11a 12a 13a 11a 12a 13a

11e 12e 13e 14e++

(i) (ii)

Fig. 10. An example of SDG model re�nement: (i) the initial modelcon�guration as dictated by dynamic warping algorithm and (ii)the updated model con�guration after applying the rules of Fig.9(a). The last rule of case (a) applies.

component stroke clustering and re�nement is summarizedbelow.Algorithm of component match re�nement

• For signature Sr ∈R, obtain the component coupling se-quences W (r; v), ∀Sv ∈R; v �= r, with dynamic warping.

• From each W (r; v), calculate the multiplicities of strokecomponents in Sr and Sv according to Eq. (3), and identifythe DMS and non-DMS in the sequence. The componentwhose multiplicity m = 1 is a DMS, otherwise it is anon-DMS.

• For each non-DMS region, perform the following seg-mentation veri�cation procedure.◦ Derive the possible segment con�gurations accordingto rule set for cases (a) and (b) in Fig. 9, and calculatetheir matching distances.

◦ Select the most likely con�guration according to theleast distance.

• Re-calculate the stability indices of the signature com-ponents, using the updated con�guration, and re-generatethe SDG model from the re�ned coupling.

After segmentation veri�cation and re�nement, the SDGmodel of Fig. 7 becomes Fig. 11. Referring to Figs. 2 and11, it can be seen that the branch 4c models the situationof missing components in signature c; and the branches5d+6d, 11c+12c and 13e+14e model the situations ofcomponent style variation or incomplete segmentation ofthe signature d and the model signature a, respectively. Inthis particular SDG model, component cluster 13a is up-dated to include the combined long components 11c+12cand 13e+14e, and it is relabeled as a probable DMS regionafter the re�nement process.

3. Signature veri�cation

The online signature veri�cation algorithm adopts amulti-stage strategy. Global features, such as the aspectratio, the signature length and time duration, average andmaximum speed, and the 2-D bitmap features, are used to�lter the random and less skillful signature forgeries [28,33].While establishing the correspondence of handwriting com-ponents by the dynamic warping procedure, the presenceand absence of the reference components are examined,i.e. a structural feature veri�cation is performed. The func-tional feature distances, between the input signature and themodel, over each matched component stroke pairs and thelong-range stable velocity-activity groups, are then accumu-lated and combined to generate an overall matching score.

Page 10: Stability and style-variation modeling for on-line signature verification

2262 K. Huang, H. Yan / Pattern Recognition 36 (2003) 2253–2270

0 3 4 11 12 13 141 2 5 6 7 8 9 10

5d

4c 11c 12c

6d

start

13e

end

14e

Fig. 11. A re�ned SDG model. It shows that the concatenation of the 13th and 14th segment of signature e (13e+14e) corresponds to thetemplate segment 13a, which di�ers from the initial model shown in Fig. 7(c).

3.1. Stroke distance metrics

The functional distance of shape change between corre-sponding signature components is computed with the aid ofB-spline approximation, adopting the curve distance met-rics formulated in a previous work [34]. This approximationgives analytical solution to the �rst and second derivatives ofthe curve, and the matching distance is a shape-feature-basedone. However, because it operates only on the segmentedsignature components, the loss of dynamical handwritinginformation is also minimized.Let sr(p) be a model handwriting component curve of

n equidistance points, and sv(q) a corresponding compo-nent curve in the test pattern. sv(q) is reconstructed fromits B-spline representation to be of the same dimension n.The shape change between these curves, d(sr(p); sv(q)), isde�ned to be a measurement of the elastic deformation intransforming from sr(p) to sv(q), where the Euclidean dis-tance term Ed, the strain energy term Se, and the bendingenergy term Be are given by

Ed[l] = ‖ sr(p)[l]− sv(q)[l] ‖2;

Be[l] =∥∥∥∥d

2sr(p)[l]ds2

− d2sv(q)[l]ds2

∥∥∥∥2

;

Se[l] =∥∥∥∥ dsr(p)[l]ds

− dsv(q)[l]ds

∥∥∥∥2

; (9)

where ‖:‖ indicates the Euclidean norm of a vector.Let d[l] be the pointwise distance between corresponding

samples on sr(p) and sv(q):

d[l] =√�Ed[l] + �Se[l] + �Be[l]; (10)

where �; � and � are weighting constants denoting the con-tributions of the distance components, with � + � + � = 1.The total distance of stroke component shape variation is

d(sr(p); sv(q)) =n∑l=1

d[l]: (11)

The functional feature distances of pattern variationsabout pen-movement direction, velocity, acceleration, and

pressure and pen-tilt angles when available, between cor-responding handwriting stroke components, are computedwith the aid of DTW on the respective component pairs.

3.2. Veri�cation algorithm

The block diagram of the detailed signature veri�er isgiven in Fig. 12. For each signature category enrolled, �vereference signatures are used by default to construct the cor-responding statistical veri�cation model. In principle, theveri�cation process operates by rectifying the errors in sig-nature segmentation and re�ning the stroke-correspondencemapping in order to obtain an accurate model. An SDG isbuilt for each reference signature and the collection of allthe reference signature SDGs is the signature model. Duringmodel building, each of the reference signatures in turn isused as a test input, to generate a set of acceptance thresholdsfor each handwriting component cluster and the identi�edvelocity-activity groups within the model. In the veri�cationphase, an input signature is tested against the SDG models.Utilizing the cluster thresholds, the lists of accepted and re-jected input components, as well as the omitted referencecomponents, are generated. The �nal decision is based onthe analysis of these lists, as well as the matching resultson the functional features of long-range velocity-activitygroups.The input signature is accepted by the signature model

if there exists a path within an SDG which is su�-ciently similar to the input sequence. The test for sucha condition is implemented with a straightforward strat-egy, i.e. to generate all the permissible paths within theSDG, and comparing each path against the input se-quence. A more e�cient strategy is to perform the dy-namic warping and re�nement procedure between theSDG main trunk and the input component sequence,and then to consider localized matching with the SDGbranches for non-DMS coupled input components. Theformer strategy is described and used here for its sim-plicity. The implementation of the latter strategy is be-ing veri�ed at this stage. The accuracy of the end resulthowever is not dependent on which of the two strategiesused.

Page 11: Stability and style-variation modeling for on-line signature verification

K. Huang, H. Yan / Pattern Recognition 36 (2003) 2253–2270 2263

ref

n

ref

2re

f 1

... tst s

ig

Fina

lD

ecis

ion

Ver

ific

atio

n ph

ase

stro

ke s

eque

nce

tes

t

stro

ke s

eque

nce

2

stro

ke s

eque

nce

1

stro

ke s

eque

nce

n

1 t

est

2 t

est

... n t

est

Mat

chin

g O

utpu

tsSt

roke

seq

uenc

e D

TW

Con

stru

ctin

g SD

Gs

Tra

inin

g ph

ase

Ver

ifyi

ng S

DG

sL

ists

of

pen-

stro

kes

acce

pted

/rej

ecte

d/om

itted

DMS identification

DTW matching

Stroke matching refinement

Stability Indices Calculation

stroke segmentation

Fig. 12. The block diagram of the detailed signature veri�er of the on-line signature veri�cation system implemented.

Algorithm of model acceptance testing

• For each SDGi, i∈ [1::n] in the signature model, createan initial path pij , with j=0, and generate all permissiblepaths

• GenPath(pij; j)◦ Add links to path pij along SDGi, till the end node isreached or a node with branches is encountered.

◦ If the end node of SDGi is reached, return pij .◦ If encountering a node with branch-outs, create a tem-porary pt = pij:for each branch-out {create a new path pij+1;copy pt to pij+1;recursively call GenPath(pij+1; j + 1);}

Page 12: Stability and style-variation modeling for on-line signature verification

2264 K. Huang, H. Yan / Pattern Recognition 36 (2003) 2253–2270

• For each path pij = si1 + · · · + sir + · · · + sikr , obtain thedistance to the input signature component path t = s1 +· · ·+ st + · · ·+ skt :◦ Perform stroke-match to obtain the warping sequenceW (pij; t).

◦ Perform cluster membership test on the input compo-nents along W (pij; t).

◦ Accumulate the lists of accepted, rejected input compo-nents, and the omitted reference components.

◦ Accumulate the weighted global distance dtotal for pathpij .

• Make a �nal decision on the acceptance of input signaturet, based on a list of criteria.

The weight of each template component sir in pij is calcu-

lated by taking into account its length as well as its stabilityindex:

weight(sir) =length(sir)× I(sir)∑krl=1 length(s

il)× I(sil)

: (12)

The total weighted distance of input signature against ref-erence model is

dtotal =K∑l=0

weight(siw1 )× d(siw1 ; sw2 ); (13)

where (w1; w2) =W (pij; t)(l).The weight of each input component st is the component

length over the sum of lengths of all input components,assuming they are equally stable:

weight(st) =length(st)∑ktl=1 length(sl)

: (14)

Assume a pen-stroke component st of input signature thas a matching reference component sir of p

ij in the warp-

ing sequence W (pij; t). st is accepted by the sir cluster if the

deviations of its feature values are within the model clusterthresholds. Otherwise it is either rejected, if the referencecomponent sir is a DMS, or marked as a style variation inwhich case the deviation is accumulated in the global dis-tance. In the case that st is rejected, sir is marked as an omittedcomponent by t. Statistical data are also recorded on whetherthe uninterrupted chains of DMS in pij has been broken.Judgement of whether the input signature is acceptable to

the signature model is based on the following criteria, bycomparing to the corresponding statistics obtained from thereference signatures:

• the accumulated weights of accepted components of t bypij , Acc(p

ij; t);

• the accumulated weights of rejected components of t bypij , Rej(p

ij; t);

• the accumulated weights of omitted components of pij byt, Omt(pij; t);

• the accumulated weighted distance dtotal for each pij;• the conformance of stable DMS sequences within pij by t.

3.3. Veri�cation con�dence value generation

There are T security levels de�ned in the implementedsignature veri�cation system, where T = 10 by default. LetN be the number of veri�cation tests to be performed. Ineach veri�cation test, whether it is on global parameters orlocal component statistics, let �i be the standard deviationof the feature value computed from the reference signatures.The minimum and maximum threshold values correspondto �i and 5�i, respectively. The range of each con�rma-tion test thresholds (between minimum and maximum) isevenly divided into steps according to the number of securitylevels, with smaller threshold values corresponding to highersecurity levels. If the conformation tests are passed for allsecurity levels upto ti, but failed at the more strict level ti,where 06 ti ¡T , and only Np(ti)¡N tests are passed, thecon�dence score h is

h=(ti +

Np(ti)N

)× 100%

T: (15)

The veri�cation tests are arranged so that global parametertests are performed �rst, and if these fail, the detailed localcomponent tests are skipped by assuming they also fail. Aweighting factor may be assigned for each test, to indicateits relative importance in all the N tests. Here it is assumedthey are equally important.

4. Experiment results

4.1. Signature data

At �rst, a Summagraphics tablet is used to collect on-linesignature data. It is equipped with a 6×6-in2 opaque writingarea, a wired pen, and a pen-down/pen-up switch operatedby the pen-tip touching the writing surface. It is set at a res-olution of 500 lines/in, and a report rate of 50 coordinatepairs/s for the experiment. A Wacom Intuos 4× 5-in2 tabletwith a cordless pen is also used. It provides a higher relativeresolution of upto 2540 lines/in, a higher sampling rate ofupto 200 coordinate pairs/s, and pen-pressure informationquantized to a 10-bit dynamic range. The Intuos pen alsoreports the pen tilt angle to 1◦ relative accuracy. Both hard-ware settings are capable of capturing the pen-tip positionin the proximity of the �at tablet surface. The pen trajec-tory is displayed on a nearby computer monitor as the sig-nature signing takes place. On the monitor, pen-down tracesare displayed as solid lines, and pen-up traces as light, dot-ted lines. An IBM CrossPad tablet is also used brie�y in atrial. The data quality is comparable to that from the Wa-com tablet, and users generally �nd it more comfortable towrite on with its paper and ink interface.The signature data are collected at various stages of the ex-

periment. The total number of on-line handwriting samplescollected from various persons, including targeted forgerysignatures, is about 4600, belonging to 89 classes, with about

Page 13: Stability and style-variation modeling for on-line signature verification

K. Huang, H. Yan / Pattern Recognition 36 (2003) 2253–2270 2265

Table 1Table showing the composition of collected on-line signature/handwriting data during the experiment

Database Tablet ID range Content Total classes

DB1 Summagraphics 00–25 Practiced names 26DB1 Summagraphics 26–48 Signatures 23DB2 Wacom Intuos 49–68 Signatures (English) 20DB2 Wacom Intuos 69–84 Signatures (Chinese) 16DB2 IBM CrossPad 85–88 Signatures (English) 4

2100 belonging to the 36 classes obtained using the Wa-com Intuos tablet, 160 belonging to the 4 classes from IBMCrossPad, and the rest obtained using the Summagraph-ics tablet. Each writer contributes about 20 genuine signa-tures, and various number of targeted forgery signatures.The number of forgery signatures for each class is approxi-mately the same, which is about 30. The database is dividedinto sub-groups DB1 and DB2 as shown in Table 1, whileperforming global random forgery test analysis. Targetedforgery detection is emphasized in the tests. The �nal testresults are obtained for the complete set of data, i.e. DB1and DB2 combined.

4.2. Classi�cation using global parameters

Global parameters tests on data collected from theSummagraphics tablet (Data set DB1) and the Wacomtablet (Data set DB2) are given in Fig. 13. These testsinvolve examining the parameter features extracted withinnon-overlapping rectangular grids of the distribution ofsample points, high curvature regions, and the direction ofpen-movements, as well as the number of sub-strokes, totalsigning duration features. Generally speaking, the globaltest results of the two data sets follow similar patterns, inthat the FRR curves and the FAR curves on targeted forgerysignatures show much resemblance. The curves on randomforgery tests are di�erent, in that the FAR value for DB1 ishigher.In the current form of the algorithm, higher temporal sam-

pling rates than 50 Hz does not signi�cantly improve thesignature segmentation and matching accuracy. However,the higher spatial sampling resolution o�ered by the tabletsfor constructing DB2 does seem to make a di�erence in re-jecting random forgery signatures, in that the FAR of DB2on random forgery data is lower than that of DB1. The inclu-sion of practiced names in DB1 also contributes to a higherFAR because a practiced name is not as stable as a normalsignature.

5. Targeted forgery signature tests

The pressure information reported by the Wacom tabletproves to be valuable in preprocessing and signature

segmentation. In the preprocessing stage, most spurious andunintentional pen-down sample data can be identi�ed bytheir close to zero pressure reading and are removed. Thepressure information also gives valuable hints on wherethe handwriting motion tends to break. By combining theevidences in handwriting pressure reaching a local mini-mum with the vertical or horizontal pen-velocity reachinga zero-crossing and the curvature value approaching a localpeak, the correctness of a signature segmentation decision isimproved.Pressure information adds a new dimension to on-line

signature veri�cation. Shape, velocity, and pressure patternsare a powerful combination in detecting forgery signatures.Applying pressure information in the local elastic matchingstage works quite well for a number of signatures; however,it also increases the false rejection of others. From obser-vations, the pressure-waveforms are not always as stable asthe position- and velocity-waveforms for the data sets in thisexperiment, and because not all signature data contain pres-sure information, they are not used during detailed signaturefeature veri�cation, but are used during preprocessing andsegmentation. The writer may need a few practices to getfamiliar with the feel of the data capturing device and there-fore the �rst few samples usually exhibits inconsistency inthe handwriting waveforms. This is also reported by Brom-ley et al. [12]. For each subsequent data capture session, thewriter needs to re-adjust him- or herself from the use of nor-mal pen, especially when distracted by looking at the com-puter monitor for visual feedback. An integrated tablet andLCD display may be the answer to capture more consistenton-line signature data.The application of SDG stability modeling is e�ective in

the experiment. All the data from DB1 and DB2 are usedin the test. The �rst �ve samples of each enrolled signatureclass are used to build the reference model, and the restsignatures are used as test samples.The on-line signature veri�cation algorithm is tested on

the experimental database, using the �rst �ve reference sig-natures in each signature class to build the signature model.Varying the number of reference signatures between �ve toeight gives slight but steady performance improvements inthe error trade-o� curves. However, the more the referencesignatures used, the more strict the veri�cation thresholdsneeded. If less reference signatures are used, e.g. three, the

Page 14: Stability and style-variation modeling for on-line signature verification

2266 K. Huang, H. Yan / Pattern Recognition 36 (2003) 2253–2270

Global feature classification result on Summagraphics tablet data (common thresholds)

0

10

20

30

40

50

60

70

80

90

100

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20

Threshold level t

1.0%

60.0%

72.0%

Global parameter verificationoperating points

2.4%

43.3%

65.0%

(a)

Global feature classification result on Wacom tablet data (common thresholds)

0

10

20

30

40

50

60

70

80

90

100

1 2 3 4 5 6 7 8 9 10

Threshold level t

Err

or

Rat

e

FRR(t) Genuine Signature FAR(t) Random Forgery FAR(t) Targeted Forgery

FRR(t) Genuine Signature FAR(t) Random Forgery FAR(t) Targeted Forgery

Global parameter verificationoperating points

3.0% 1.7%

25.2%

15.0%

60.0% 65.4.0%

(b)

Err

or

rate

Fig. 13. Global parameter veri�cation results signature data captured using (a) Summagraphics tablet and (b) Wacom Intuos tablet andwireless pen.

equal error rate (EER) increases towards 10%, due to themuch less accurately estimated stability information and asa result the algorithm degenerates to one without stabilityweighting.It can be seen from the error trade-o� curves that,

without SDG models, the EER is about 10% for detectingtargeted and skilled forgery signatures, while the EER underglobal parameter tests is above 30%; with the addition ofSDG model veri�cation, the EER is reduced to about 5%;and with the introduction of stroke-segmentation and modelre�nement, it is further reduced to about 4% (Fig. 14). TheEER on random forgery input is close to 0.2%, which is

mostly due to the inclusion of a number of practiced namesin DB1. This error rates are consistent with the �guresgiven in a recent survey paper by Plamondon and Srihari[3], which is between 2% and 5%. Examples of the clas-si�ed genuine and skilled forgery signatures are shown inFig. 15.The error cases are mostly due to:

• unreliable statistics of local and global features, basedon a few consecutively written, closely resembling refer-ence signatures, resulting in false rejection of subsequentgenuine input which exhibits larger variations;

Page 15: Stability and style-variation modeling for on-line signature verification

K. Huang, H. Yan / Pattern Recognition 36 (2003) 2253–2270 2267

Error trade-off curves of signature verification system

0

5

10

15

20

25

30

35

40

0 5 10 15 20 25 30 35 40

FRR (%)

FA

R (

%)

non SDG modeling

SDG modeling

SDG modeling and refinement

Global parameters

10.0%

5.0%

4.1%

Fig. 14. The error trade-o� curves of tests on targeted forgery signatures (DB1 and DB2), for the three cases of not using the SDG model,using the SDG model, and using the SDG model with stroke matching re�nement. Five reference samples per signature class are used intraining the signature models.

• excessive variation of identi�ed stable components andstrings in unseen variant signature styles, resulting in falserejection of genuine signatures;

• short and unstable reference signatures, resulting inforgery signatures being accepted.

Because of the lack of a common benchmark signaturedata set, it is di�cult to compare signature veri�cationalgorithms in a quantitative manner. Therefore, a qualita-tive comparison is made to recent results in the literature.The proposed signature veri�cation algorithm, although amatching-based technique, is in a sense similar to an HMMapproach. It combines dynamic warping and statisticalstability modeling about handwriting components, whichconceptually corresponds to the HMM’s Viterbi algorithmand the state and state-transition probability modeling. Inthe work by Dol�ng et al., an HMM-based approach isinvestigated, and the reported EER is about 1.0–1.9% [10],better than that of the proposed algorithm. However, thenumber of training signatures used is much higher, with15 training samples per class and a further �ve as a vali-dation set. At the same time, short and unreliable signatureenrollments, i.e. signatures taking less than 1:25 s to sign,are rejected to achieve the lower EER. In a recent publica-

tion, Jain et al. detailed a string-matching-based signatureveri�cation algorithm, and investigated the e�ectiveness offeature combinations. In their experiment, three to �ve ref-erence samples are used in training, which is similar to theexperiment setting in this paper. The best result is reportedto be a false rejection rate of 2.8% and a correspond-ing false acceptance rate of 1.6%. Tests on both randomand skilled forgery signatures are performed; however,the number of skilled forgery used in the tests is limited[35,7].In the proposed algorithm, the improvement brought

by the introduction of SDG models is signi�cant, dueto the identi�cation and emphasis on the matchingsof the stable handwriting components and componentstrings in a signature. The improvement by stroke seg-mentation re�nement process is observed in combina-tion with stability modeling, and its advantage is alsoevident. Because not all the segmentation errors canbe identi�ed automatically, the unidenti�ed segmenta-tion errors are labeled as style variations instead bythe algorithm. The e�ectiveness of the re�nementprocess can be improved if these errors can be correctlylocated, e.g. by supplying more representative refer-ence signatures.

Page 16: Stability and style-variation modeling for on-line signature verification

2268 K. Huang, H. Yan / Pattern Recognition 36 (2003) 2253–2270

Signature Model Accepted Rejected

Forged

Genuine

Forged

Genuine

Forged

GenuineN/A

N/A

N/A

N/A

Forged

Genuine

0.22

0.35

0.76

0.71 0.40

0.34

0.27 0.22

0.27

0.85

0.65

0.40 0.44

0.29

(barely accepted)

0.55

0.400.80 0.34

0.28

0.22 0.15

0.30

Fig. 15. Veri�cation results showing the decision output for some genuine and targeted or skilled forgery signatures.

6. Further directions

The signature modeling technique presented can be ex-tended, by implementing a strategy similar to the follow-ing, to support gradual reference model updating, in order tokeep up with handwriting variations over time. By rankingthe utilization of each SDG model in the acceptance tests,under regular usage, over a speci�ed long period of time,

a histogram of the utilization frequency of the models canbe built. The lowest ranking model is likely to be phasedout. New reference models will be constructed using recentinput signatures that have been successfully accepted. How-ever, the newly constructed models will not be directly usedin veri�cation but acts as pseudo-models for a further pe-riod of time, until it is proven that their ranks are consis-tently higher than the ones to be replaced. The optimal time

Page 17: Stability and style-variation modeling for on-line signature verification

K. Huang, H. Yan / Pattern Recognition 36 (2003) 2253–2270 2269

periods and other system update parameters are to be deter-mined experimentally in practical situations.

7. Conclusion

An SDG-based stability modeling technique has been in-troduced in this paper. It is used to improve a stroke-basedon-line signature veri�cation system developed previously.The improvements include stability considerations in theveri�cation score, signature segmentation veri�cation,and signature SDG model building. The stability featureextraction algorithm will quantify how important or howconsistent the segmentation points are. Style variations areexplicitly allowed for by following all permissible pathswithin the SDGs, and errors in signature segmentation areeliminated or partially corrected by the stroke-match re�ne-ment process. These result in a more thorough utilizationof available reference signatures. The DTW technique is anessential part of the proposed signature veri�cation method.It operates on signature components and strings to extractcomponent-level and string-level correspondence and stabil-ity information and calculates signature matching similarityaccordingly. Although the handwriting motion-based signa-ture segmentation technique is adopted here to generate thebasis signature segmentation structure, the veri�cation al-gorithm is not restricted to motion segmentation. Other seg-mentation techniques, such as segmenting the signature atperceptually important points [36], may also be applicable.

References

[1] R. Plamondon, G. Lorette, Automatic signature veri�cationand writer identi�cation: the state of the art, PatternRecognition 22 (2) (1989) 107–131.

[2] F. Leclerc, R. Plamondon, Automatic signature veri�cation:the state of the art—1989–1993, in: R. Plamondon (Ed.),Special Issue on Automatic Signature Veri�cation, Int. J.Pattern Recognition Artif. Intell. 8(3) (1994) 3–19.

[3] R. Plamondon, S.N. Srihari, On-line and o�-line handwritingrecognition: a comprehensive survey, IEEE Trans. PatternAnal. Mach. Intell. 14 (1) (2000) 3–19.

[4] M. Parizeau, R. Plamondon, A comparative analysis ofregional correlation, dynamic time warping, and skeletal treematching for signature veri�cation, IEEE Trans. Pattern Anal.Mach. Intell. 12 (7) (1990) 710–718.

[5] Y. Sato, K. Kogure, Online signature veri�cation based onshape, motion, and writing pressure, Proceedings of the SixthInternational Conference on Pattern Recognition, Munich,1982, pp. 823–826.

[6] V.S. Nalwa, Automatic on-line signature veri�cation, Proc.IEEE 85 (2) (1997) 215–239.

[7] A.K. Jain, F.D. Griess, S.D. Connell, On-line signatureveri�cation, Pattern Recognition 35 (12) (2002) 2963–2972.

[8] M.J. Paulik, N. Mohankrishnan, 1-D, sequence decompositionbased, autoregressive hidden Markov model for dynamicsignature identi�cation and veri�cation, Midwest Symp.Circuits Systems 1 (1993) 138–141.

[9] L. Yang, B.K. Widjaja, R. Prasad, Application of hiddenMarkov models for signature veri�cation, Pattern Recognition28 (2) (1995) 161–170.

[10] J.G.A. Dol�ng, E.H.L. Aarts, J.J.G.M. Van Oosterhout,On-line signature veri�cation with Hidden Markov models,Proceedings of the 14th International Conference on PatternRecognition, Brisbane, 1998, pp. 1309–1312.

[11] G. Rigoll, A. Kosmala, A systematic comparison betweenon-line and o�-line methods for signature veri�cation withhidden Markov models, Proceedings of the 14th InternationalConference on Pattern Recognition, Brisbane, Australia,August 16–20, 1998, pp. 1755–1757.

[12] J. Bromley, J.W. Bentz, L. Bottou, I. Guyon, Y. LeCun,C. Moore, E. Sackinger, R. Shah, Signature veri�cationusing a “siamese” time delay neural network, Int. J. PatternRecognition Artif. Intell. 8 (3) (1994) 669–687.

[13] Quen-Zong Wu, Suh-Yin Lee, I-Chang Jou, On-line signatureveri�cation using LPC Cepstrum and neural network, IEEETrans. Systems Man Cybernet. 27 (1) (1997) 148–153.

[14] Wan-Suck Lee, N. Mohankrishnan, M.J. Paulik, Improvedsegmentation through dynamic time warping for signatureveri�cation using a neural network classi�er, Proceedings ofthe 1998 IEEE ICIP, Part 2 (of 3), Chicago, Illinois, USA,Oct 4–7, 1998, pp. 929–933.

[15] K. Huang, H. Yan, Identifying and verifying handwrittensignature images utilizing neural networks, Proceedings ofICONIP’96, Hong Kong, September 1996, pp. 1400–1404.

[16] N.A. Murshed, R. Sabourin, F. Bortolozzi, A cognitiveapproach to o�-line signature veri�cation, Int. J. PatternRecognition Artif. Intell. 11 (5) (1997) 801–825.

[17] Xuhong Xiao, G. Leedham, Signature veri�cation using amodi�ed Bayesian network, Pattern Recognition 35 (5) (2002)983–995.

[18] K. Huang, H. Yan, O�-line signature veri�cation usingstructural feature correspondence, Pattern Recognition 35 (11)(2002) 2467–2477.

[19] G. Dimauro, S. Impedovo, G. Pirlo, A new methodology forthe measurement of local stability in dynamical signatures,Proceedings of IWFHR-IV, Taipei, 1994, pp. 135–144.

[20] V. Di Lecce, G. Dimauro, A. Guerriero, S. Impedovo, G. Pirlo,A. Salzo, L. Sarcinella, Selection of reference signatures forautomatic signature veri�cation, Proceedings of ICDAR’99,Fifth International Conference on Document Analysis andRecognition, Bangalore, India, September 20–22, 1999, pp.597–600.

[21] G. Dimauro, S. Impedovo, R. Modugno, G. Pirlo, Analysisof stability in hand-written dynamic signatures, Proceedingsof the Eighth International Workshop on Frontiers inHandwriting Recognition (IWFHR’02), Ontario, Canada,August 6–8, 2002, pp. 259–263.

[22] R. Plamondon, F.J. Maarse, An evaluation of motor modelsof handwriting, IEEE Trans. Systems Man Cybernet. 19 (5)(1989) 1060–1072.

[23] R. Plamondon, A model-based segmentation framework forcomputer processing of handwriting, Proceedings of the 11thInternational Conference on Pattern Recognition, The Hague,The Netherlands, 1992, pp. 303–307.

[24] R. Plamondon, P. Yergeau, J.J. Brault, A multi-level signatureveri�cation system, in: S. Impedovo, J.C. Simon (Eds.), FromPixels to Features III: Frontiers in Handwriting Recognition,Elsevier Science, New York, 1992, pp. 363–370.

Page 18: Stability and style-variation modeling for on-line signature verification

2270 K. Huang, H. Yan / Pattern Recognition 36 (2003) 2253–2270

[25] R. Plamondon, The design of an on-line signature veri�cationsystem: from theory to practice, in: R. Plamondon (Ed.),Special Issue on Automatic Signature Veri�cation, Int. J.Pattern Recognition Artif. Intell. 8(3) (1994) 795–811.

[26] P. Morasso, F.A. Mussa Ivaldi, Trajectory formation andhandwriting: a computational model, Biol. Cybern. 45 (1982)131–142.

[27] L.R.B. Schomaker, R. Plamondon, The relation between axialpen force and pen-point kinematics in handwriting, Biol.Cybern. 63 (1990) 277–289.

[28] K. Huang, H. Yan, On-line signature veri�cation based ondynamic segmentation and global and local matching, Opt.Eng. 34 (12) (1995) 3480–3487.

[29] G. Dimauro, S. Impedovo, G. Pirlo, A signature veri�cationsystem based on a dynamic segmentation technique,Proceedings of the Third International Workshop onFrontiers in Handwriting Recognition, Bu�alo, USA, 1993,pp. 262–271.

[30] Taik H. Rhee, Sung J. Cho, Jin H. Kim, On-linesignature veri�cation using model-guided segmentationand discriminative feature selection for skilled forgeries,Proceedings of ICDAR’01, Sixth International Conference on

Document Analysis and Recognition, Seattle, Washington,USA, September 10–13, 2001, pp. 645–649.

[31] G. Dimauro, S. Impedovo, G. Pirlo, A stroke-orientedapproach to signature veri�cation, in: S. Impedovo, J.C. Simon(Eds.), From Pixels to Features III: Frontiers in HandwritingRecognition, Elsevier Science, New York, 1992, pp. 371–384.

[32] G. Dimauro, S. Impedovo, G. Pirlo, Component-orientedalgorithms for signature veri�cation, Int. J. PatternRecognition Artif. Intell. 8 (3) (1994) 771–793.

[33] K. Huang, H. Yan, O�-line signature veri�cation based ongeometric feature extraction and neural network classi�cation,Pattern Recognition 30 (1) (1997) 9–17.

[34] K. Huang, H. Yan, Signature veri�cation using fractaltransformation, Proceedings of the 15th IAPR InternationalConference on Pattern Recognition, Barcelona, 2000, pp. 855–858.

[35] F.D. Griess, On-line signature veri�cation, Masters ThesisMSU-CSE-00-15, Computer Sciences Department, MichiganState University, May 2000.

[36] J.-J. Brault, R. Plamondon, Segmenting handwritten signatureat their perceptually important points, IEEE Trans. PatternAnal. Mach. Intell. 15 (9) (1993) 953–957.

About the Author—KAI HUANG received his B.Sc. and B.E. degree in 1991 and 1993, respectively, from the University of Sydney. Heis currently a Ph.D. candidate in the School of Electrical and Information Engineering at the same university. His research interests includepattern recognition, signal and image processing, and automatic handwritten signature veri�cation.

About the Author—HONG YAN received a B.E. degree from Nanking Institute of Posts and Telecommunications in 1982, an M.S.E.degree from the University of Michigan in 1984, and a Ph.D. degree from Yale University in 1989, all in electrical engineering.In 1982 and 1983 he worked on signal detection and estimation as a graduate student and research assistant at Tsinghua University.From 1986 to 1989 he was a research scientist at General Network Corporation, New Haven, CT, USA, where he worked on design andoptimization of computer and telecommunications networks. He joined the University of Sydney in 1989 and became Professor of ImagingScience in the School of Electrical and Information Engineering in 1997. He is currently Professor of Computer Engineering at the CityUniversity of Hong Kong.

His research interests include bioinformatics, computer animation, signal and image processing, pattern recognition, neural and fuzzyalgorithms. He is author or co-author of one book and over 200 refereed technical papers in these areas. Professor Yan is a fellow of theInternational Association for Pattern Recognition (IAPR), a fellow of the Institution of Engineers, Australia (IEAust), a senior member ofthe Institute of Electrical and Electronic Engineers (IEEE), and a member of the International Society for Optical Engineers (SPIE), theInternational Neural Network Society (INNS), and the International Society for Magnetic Resonance in Medicine (ISMRM).