Signature Identification using Dynamic and HMM Features and KNN Classifier
|
|
- Alexina Young
- 5 years ago
- Views:
Transcription
1 2013 International Conference on Communication Systems and Network echnologies Signature Identification using Dynamic and HMM Features and KNN Classifier Ava ahmasebi 1, Hossein Pourghassem 2 Department of Electronic Engineering, Islamic Azad University, Najafabad branch Isfahan, Iran 1 ava_tahmasebi@sel.iaun.ac.ir 2 h_pourghasem@iaun.ac.ir Abstract: Dynamic feature-based signature recognition systems obtain more identification accuracy rate than static featurebased signature recognition systems. On the other hand, because of point to point comparing of captured signals, local features produce less error than general features. In this paper, a novel signature identification algorithm based on dynamic and Hidden Markov Models (HMM features and K- Nearest Neighbor (KNN classifier is proposed. In this algorithm, special point dynamic features of handwritten signatures are selected and normalized and then used as signature features. In the used HMM, different number of states in transition matrix for each signature are calculated and used as feature vector. his strategy not only reduces complexity computational but also is extracted features based on general characteristics of signature. he proposed algorithm is evaluated on the standard SVC2004 database. he obtained results are reported based on various values of parameters of the proposed algorithm and compared with presented approaches in the literature. Index erms signature identification, dynamic features, k- nearest neighbor, Hidden Markov Model features. I. INRODUCION oday, one of the conventional methods for human identificatios Signature verification. Although this strategy on biometric has middle accuracy than methods such as fingerprints, palm, gait, hand geometry and retina, but because of acceptability, particularly its cheapness and simplicity of banking business, it has many usages. Signature recognition techniques are classified based on the nature of their Database in static and dynamic groups. hese methods have beentroduced by Plamondon and Srihari [1]. In static methods Properties of the signature image data are extracted by scanning from documents [2], but special instruments, such as digital pen and tablet, are used to record the dynamic information of signatures (Fig 1. hus information such as position, velocity, pressure, Pen azimuth and Pen altitude are obtained. Features extracted from the dynamic methods can be local or general. General features applying mathematical solutions to the whole sign such as average velocity, standard deviation, and maximum pressure [2], [3], [4]. Fig 1: Dynamic signature capturing device General features are also obtained from special mathematical transformations such as discrete wavelet conversion [5] and Hough ransform [6],[7]. [9] Presents a set of geometric signature features for offline automatic signature verification based on the description of the signature envelope and the interior stroke distribution polar and Cartesian coordinates. he features have been calculated using 16 bits fixed-point arithmetic and tested with different classifiers, such as hidden Markov models, support vector machines, and Euclidean distance classifier. In [10] a method for off-line signature verification based on geometric feature extraction and neural network classificatios proposed. he role of signature shape description and shape similarity measure is discussed in the context of signature recognition and verification. Geometric features of input signature image are simultaneously examined under several scales by a neural network classifier. In this paper, we attempt to apply HMM model and KNN classifier to dynamic signature feature vectors for personal authentication. Firstly special points of signature are extracted. Dynamic features of these points such as position, normal pressure, path tangent angle, velocity, total Acceleration, Log radius of curvature, Pen azimuth and Pen altitude are used,then the feature vector for each class are applied to HMM. Given number of states, matrix of states obtained and reshaped to row vector, while reducing size of feature vector. KNN classifier is employed and the database entries are classified in the real and forged groups. he remaining sections are organized as follows. he proposed algorithm including signature verification system is introduced in Section 2. Section 3 presents KNN /13 $ IEEE DOI /CSN
2 classifier. Experimental results are shown section 4. Finally in section 5 we provide some conclusions. II. PROPOSED SIGNAURE VERIFICAION ALGORIHM Signature verification Algorithm includes these steps: signature acquisition, pre-processing, feature extraction, applying HMM too each feature vector, classification, comparison and decision process. Fig 2 shows the block diagram of proposed signature verification system. Signature of a person over time and multiple iterations is not identical. So preprocessing would provide similar conditions for accurate comparison of two signature patterns. Preprocessing includes smoothing processes and makes signals same size. Smoothing on both axes (X, Y is done separately by Gaussian filter [11]. Optional features should be separately classified and classes have been defined and possible decision boundaries clearly drawn. Biometric systems in general and the signature verification considered in this paper should be able to classify true and forged signatures. A. SPECIAL POINS SELECION In this paper, special points of signature which are the turning points of strokes are selected. Because they are the key points of signature and whose surroundings contain many dynamic and static characteristics, and have very strong discrimination. In Fig 3, P i is the point (X i,y i after the preprocessing, and A is the angel between P i i and two neighbors P i-m and P i+m. where m=1 and these three points are consecutive. he angle is obtained as follows: 1 ( PP ( PP i i m i i m A ( PP cos i i i m PP PP i i m i i m he point, which the first derivative of whose angel is smaller than zero and 0 A A i 145 are namely the special points [12]. Fig 4 shows sample signature with the marked special points. B. FEAURE EXRACION SVC2004 database [13] is one of the widely used signature database. Each signature is stored in a separate text file. In each signature file the first line stores a single integer (1 Fig 2: bock diagram of signature verification system Fig 3: Angle of special points Fig 4: Signature with the marked special points which is the total number of points in the signature. Each of the following lines corresponds to one point characterized by features listed in the following order: X-coordinate - scaled cursor position along the x-axis Y-coordinate - scaled cursor position along the y-axis ime stamp - system time at which the event was posted Button status - current button status (0 for pen-up and 1 for pen-down Azimuth - clockwise rotation of cursor about the z-axis Altitude - angle upward toward the positive z-axis Pressure - adjusted state of the normal pressure After selecting the special points, features of these points are extracted from signature files. able (1 shows features of special points which are used to verification. After normalizing features of each point of signatures, we locate them in row vectors. 202
3 ABLE 1: HE USED LOCAL FEAURES IN SIGNAURE IDENIFICAION Feature name Formula Horizontal position x t Vertical position y t Normal pressure p t Path tangent angle arctan( x / y otal velocity 2 2 v x t y t x velocity y velocity v v x y x t y otal acceleration 2 a v 2 ( v t ( Log radius of curvature log( / Pen azimuth Pen altitude z t l t v t t C. HIDDEN MARKOV MODEL: In this paper, the feature vectors obtained from previous section are applied to hidden Markov model. o fully define the topology of the HMM, one must first select the number of states, the allowed state transitions, and the probability density/mass function(s to use in modeling the hidden states emissions. raditionally the number of states is determined empirically, as the structure of the phenomenon to be modeled is usually unknown. For some state S i, the states that are allowed to directly follow it (sequentially in time denote the allowed state transitions. One may force a specific set of allowed transitions or let it be data driven. A standard topology is the left-to right model [14]. In the so-called left-to-right topology, shown Fig 5, all states except the last one may transition only to itself and its right neighbor while the last state may only transition to itself. Hence the order in the signatures database drawn from left to right; the left - right Markov model is used. III. CLASSIFICAION he k-nearest neighbors algorithm (KNN is a method for classifying objects based on closest training examples in the feature space. KNN is a type of instance-based learning, or lazy learning where the functios only approximated locally and all computatios deferred until classification. he k-nearest neighbor algorithm is amongst the simplest of all machine learning algorithms: an object is classified by a majority vote of its neighbors, with the object being assigned to the class most common amongst its k nearest neighbors.he KNN technique can also be used for estimation of a-posteriori probabilities p ( x from a set of n labeled samples as follows: k i p ( x (2 k Where k defines the samples captured in a cell of volume v placed around x and k i of which turn out to be labeled ω i [15]. hat is, the estimate of the p ( x a posteriori probability that ω i is the state of nature is merely the fraction of the samples within the cell that are labeled ω i. Consequently, for minimum error rate we select the category most frequently represented within the cell. If there are enough samples and if the cell is sufficiently small, it can be shown that this will yield performance approaching the best possible. After obtaining the m m state matrices, each matrix converted to vector with size m 2 1 and we provide training sample by collecting all the vectors of various signatures in a matrix, then KNN classificatios applied. By changing the parameter k nearest neighborhood system performance is tested. IV. EXPERIMEN RESULS his section consists of a description of the database used for verifying the developed system performance and the description of the extensive experimental setup. A. Experimental data Fig 5: Left - Right Hidden Markov Model Another advantage of this model is feature reduction. So signals with great length can be represented as smaller number of HMM parameter thus decrease complexity computational. he used database [13] contains 40 sets of the signatures collected from different people, and each set consists of 20 genuine signatures and 20 skilled forgery signatures. o have patterns of signature, a WACOM (Graphier 4 with sampling rate of 100 HZ is used. he database contains 40*40 signatures. he 1600 created spatial-temporal images is used as the input of the HMM to get the state matrices. hen we connect all the rows of each individual s to obtain features vector. During the training process we select 3 genuine signatures as the reference signatures. he rest genuine signature and skilled forgery signatures are used as test samples. 203
4 B. Verification tests After the feature vectors extracted from applying HMM, it is required to decide a number of patterns to be chosen as reference comparison to compare and classify them. Equation (3 shows the linear scaling used for normalization of the vector F. F-mean(Freference Fnormalized (3 std(f reference Mean and standard deviation (std values used for explained feature vector (F reference are calculated for each signature separately. For proposed methods omplementing and testing, database was divided into two parts so that the number of 20 signatures as reference patterns, 20 inventors of patterns for training and others have been used for testing. For forger group also 20 signatures were randomly selected for each individual signature. o classify patterns by KNN method the Euclidean distance method is used to evaluate the distance of samples. Usually, the performance of a biometric system is expressed by some parameters. A decision made by a biometric system is either a genuine individual type of decision or an impostor type of decision. For each type of decision, there are two possible outcomes, namely, true or false. herefore, there are a total of four possible outcomes: A genuine individual is accepted, a genuine individual is rejected, ampostor is rejected, and ampostor is accepted. Outcomes 1 and 3 are correct, whereas outcomes 2 and 4 are incorrect. he confidence associated with different decisions may be characterized by the genuine distribution and the impostor distribution, which are used to establish the following two error rates [16]. False acceptance rate (FAR, which is defined as the probability of ampostor being accepted as a genuine individual. It is measured as the fraction of impostor score (matching score which involves comparing two biometric samples originating from different users exceeding the predefined threshold. False rejection rate (FRR, which is defined as the probability of a genuine individual being rejected as an impostor. It is measured as the fraction of genuine score (matching score which involves two samples of the same biometric trait of a user below the predefined threshold. FAR and FRR are dual of each other. A small FRR usually leads to a larger FAR, while a smaller FAR usually implies a larger FRR. able (2 shows result of classification derived with k = 9 and different S and the comparisons are in terms of FAR and FRR. ABLE 2: KNN CLASSIFICAION WIH DIFFEREN VALUES OF K IN KNN AND RANSIION MARIX Parameter S Parameter k FAR (% FRR (% It can obviously seen that the maximum classification accuracy obtained from S = 8. In other experiment we examined parameter of KNN. able (3 shows the classification result with S = 8 and different k that indicate acceptable results. ABLE 3: EVALUAE CLASSIFICAION PERFORMANCE BY CHANGING NUMBER OF NEIGHBORS Parameter k Parameter S FAR (% FRR (% So the best results obtained by placing simulated values S = 8 and k = 11 for the KNN classification based on HMM model. Fig 6 shows examples of signatures from the visually captured data sets for which the algorithm has a verification error rate greater than 11 percent. (a (d (g (b (e (h Fig 6: experimental samples: (a to (c are visually-acquired signatures, (d to (f are falsely rejected signatures, (g to (i are falsely accepted skilled forgery signatures (c (f (i 204
5 We compare our results with some other dynamic signature verification systems in terms of FAR and FRR which are shown able (4. ABLE 4: COMPARISON OF PROPOSED APPROACH WIH OHER PUBLISHED MEHODS Algorithm Method FAR (% FRR (% Houng Neural network et al [10] Ferrer HMM & SVM et al [9] Varagas et al [17] pseudo-cepstral coefficients & SVM Sansone et al [18] Proposed method SVM & HMM HMM & KNN From the results, it is clear that the proposed method achieves acceptable system performance when compared with similar systems. he main reason for this is that, in this approach, applying HMM to special points of signature gives us robust feature vector for classification. hus, these features have more influence on the final results. V. CONCLUSION Recent years have seen a significant increase in research activity directed at understanding all aspects of biometric information system representation and utilization for decision-making support, for use by public and security services, and for understanding the complex processes behind biometric matching and recognition. Although signature verification systems, based on general features were simpler and have less response time, but also have less accuracy. In this paper, using dynamic features of turning points of strokes, which are the key points of signature, encompass acceptable accuracy. In addition to reduce the size of calculates, efficiency of the system also improved taking Hidden Markov model, eventually KNN have good performance in our experiment and results illustrate the effectiveness of the method. [4] LL Lee,. Berger, E. Aviczer, "Reliable on-line human signature verification systems," IEEE rans. on Pattern Analysis and Machine, vol. 18, no. 6, pp , [5] H. Lei, V. Govindaraju, "A comparative study on the consistency of features in on-line signature verification," Pattern Recognition Letters, vol. 26, no. 15, pp , [6] P. Porwik, "he compact three stages method of the signature recognition," in Proc. of the 6th IEEE Int. Conference Computer Systems and Industrial Mnagment Applications, 2007, pp [7] VS. Nalwa, "Automatic On-line Signature Verification," Proceedings of the IEEE, vol. 85, no. 2, pp , [8] Kholmatov, B. YanikogluA. Kholmatov, B. Yanikoglu, "Identity authentication using improved online signature verification method," Pattern RecognitionLetters, Vol.26, No. 15, pp , [9] K. Huang, H. Yan, "Off-line signature verification based on geometric feature extraction and neural network classification," Pattern Recognition, Elsevier Science, vol. 30, no. 1, pp. 9-17, [10] M. Ferrer, J. Alonso, and C. ravieso, "Offline geometric parameters for automatic signature verification using fixedpoint arithmetic," IEEE ransactions on Pattern Analysis and Machine Intelligence, vol. 27, no. 6, pp , [11] X. Ling, Y.Wang, Z. Zhang, Y. Wang, "On-line signature verification based on Gabor features," in wireless and optical communications conference (WOCC, Shanghai, 2010, pp [12] Hai, LUAN Fang-jun LIN Lan CHENG, "he Algorithm of On-line Handwritten Signature Verification," in 2nd international congress on signal and image processing CISP' 09, ianjin, 2009, pp [13] SVC; he First International Signature Verification Competition, 2nd National Electrical Enineering Conference - February [14] L. R. Rabiner, "A tutorial on hidden markov models and selected applications in speech recognition,", 1990, p [15] RO Duda, PE Hart and DG Stork, Pattern Recognition, 2nd ed.: John Wiley, [16] Md. Maruf Monwar, Marina L. Gavrilova, "Multimodal Biometric System Using Rank-Level Fusion Approach," IEEE RANSACIONS ON SYSEMS, MAN, AND CYBERNEICS PAR B: CYBERNEICS, vol. 39, no. 4, pp , AUGUS [17] C. Sansone and M. Vento, "Signature verification: Increasing performance by a multi-stage system," Pattern analysis & Applications, no. 3, p , [18] J. Vargas, M. Ferrer, C. ravieso, and J. Alonso, "Off-line signature verification based on high pressure polar distribution," in ICFHR08., Montereal, August 2008.x REFERENCES [1] R. Pelamondon, SN. Srihari, "On-line and off-line handwriting recognition: a comprehensive survey," IEEE rans. on Pattern Analysis, vol. 22, pp , [2] DZ. Lejtman, SE.George, "On-line handwritten signature verification using wavelets and back-propagation neural networks," in Proc. on the 6th Int. Conference on Document Analysis and Recognition, 2001, pp [3] Fierrez-Aguilar, L. Nanni, J. Lopez-Penalba, J. Ortega-Garcia and D. Maltoni., "An online signature verification system based on fusion of local and global information," in Conf. on Audio-and Video-Based Biometric Person Authentication, 2005, pp
A Study on the Consistency of Features for On-line Signature Verification
A Study on the Consistency of Features for On-line Signature Verification Center for Unified Biometrics and Sensors State University of New York at Buffalo Amherst, NY 14260 {hlei,govind}@cse.buffalo.edu
More informationA Combined Method for On-Line Signature Verification
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 14, No 2 Sofia 2014 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2014-0022 A Combined Method for On-Line
More informationOn the effects of sampling rate and interpolation in HMM-based dynamic signature verification
On the effects of sampling rate and interpolation in HMM-based dynamic signature verification M. Martinez-Diaz, J. Fierrez, M. R. Freire, J. Ortega-Garcia Biometrics Recognition Group - ATVS, Esc. Politecnica
More informationNOVATEUR PUBLICATIONS INTERNATIONAL JOURNAL OF INNOVATIONS IN ENGINEERING RESEARCH AND TECHNOLOGY [IJIERT] ISSN: VOLUME 2, ISSUE 1 JAN-2015
Offline Handwritten Signature Verification using Neural Network Pallavi V. Hatkar Department of Electronics Engineering, TKIET Warana, India Prof.B.T.Salokhe Department of Electronics Engineering, TKIET
More informationOff-line Signature Verification Using Neural Network
International Journal of Scientific & Engineering Research, Volume 3, Issue 2, February-2012 1 Off-line Signature Verification Using Neural Network Ashwini Pansare, Shalini Bhatia Abstract a number of
More informationOnline Signature Verification Technique
Volume 3, Issue 1 ISSN: 2320-5288 International Journal of Engineering Technology & Management Research Journal homepage: www.ijetmr.org Online Signature Verification Technique Ankit Soni M Tech Student,
More informationOFFLINE SIGNATURE VERIFICATION USING SUPPORT LOCAL BINARY PATTERN
OFFLINE SIGNATURE VERIFICATION USING SUPPORT LOCAL BINARY PATTERN P.Vickram, Dr. A. Sri Krishna and D.Swapna Department of Computer Science & Engineering, R.V. R & J.C College of Engineering, Guntur ABSTRACT
More informationAn Application of the 2D Gaussian Filter for Enhancing Feature Extraction in Off-line Signature Verification
2011 International Conference on Document Analysis and Recognition An Application of the 2D Gaussian Filter for Enhancing Feature Extraction in Off-line Signature Verification Vu Nguyen and Michael Blumenstein
More informationOn-line Signature Verification on a Mobile Platform
On-line Signature Verification on a Mobile Platform Nesma Houmani, Sonia Garcia-Salicetti, Bernadette Dorizzi, and Mounim El-Yacoubi Institut Telecom; Telecom SudParis; Intermedia Team, 9 rue Charles Fourier,
More informationA Visualization Tool to Improve the Performance of a Classifier Based on Hidden Markov Models
A Visualization Tool to Improve the Performance of a Classifier Based on Hidden Markov Models Gleidson Pegoretti da Silva, Masaki Nakagawa Department of Computer and Information Sciences Tokyo University
More informationShape Feature Extraction for On-line Signature Evaluation
Shape Feature Extraction for On-line Signature Evaluation Jungpil Shin School of Computer Science and Engineering The University of Aizu Fukushima, Japan e-mail: jpshin@u-aizu.ac.jp Weichen Lin School
More informationIJESRT. Scientific Journal Impact Factor: (ISRA), Impact Factor: 1.852
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY INTELLEGENT APPROACH FOR OFFLINE SIGNATURE VERIFICATION USING CHAINCODE AND ENERGY FEATURE EXTRACTION ON MULTICORE PROCESSOR Raju
More informationInvariant Recognition of Hand-Drawn Pictograms Using HMMs with a Rotating Feature Extraction
Invariant Recognition of Hand-Drawn Pictograms Using HMMs with a Rotating Feature Extraction Stefan Müller, Gerhard Rigoll, Andreas Kosmala and Denis Mazurenok Department of Computer Science, Faculty of
More informationHierarchical Shape Primitive Features for Online Text-independent Writer Identification
2009 10th International Conference on Document Analysis and Recognition Hierarchical Shape Primitive Features for Online Text-independent Writer Identification Bangy Li, Zhenan Sun and Tieniu Tan Center
More informationK-Nearest Neighbor Classification Approach for Face and Fingerprint at Feature Level Fusion
K-Nearest Neighbor Classification Approach for Face and Fingerprint at Feature Level Fusion Dhriti PEC University of Technology Chandigarh India Manvjeet Kaur PEC University of Technology Chandigarh India
More informationColor-Based Classification of Natural Rock Images Using Classifier Combinations
Color-Based Classification of Natural Rock Images Using Classifier Combinations Leena Lepistö, Iivari Kunttu, and Ari Visa Tampere University of Technology, Institute of Signal Processing, P.O. Box 553,
More informationRepositorio Institucional de la Universidad Autónoma de Madrid.
Repositorio Institucional de la Universidad Autónoma de Madrid https://repositorio.uam.es Esta es la versión de autor de la comunicación de congreso publicada en: This is an author produced version of
More informationFeature-level Fusion for Effective Palmprint Authentication
Feature-level Fusion for Effective Palmprint Authentication Adams Wai-Kin Kong 1, 2 and David Zhang 1 1 Biometric Research Center, Department of Computing The Hong Kong Polytechnic University, Kowloon,
More informationPalmprint Recognition Using Transform Domain and Spatial Domain Techniques
Palmprint Recognition Using Transform Domain and Spatial Domain Techniques Jayshri P. Patil 1, Chhaya Nayak 2 1# P. G. Student, M. Tech. Computer Science and Engineering, 2* HOD, M. Tech. Computer Science
More informationHMM-Based Handwritten Amharic Word Recognition with Feature Concatenation
009 10th International Conference on Document Analysis and Recognition HMM-Based Handwritten Amharic Word Recognition with Feature Concatenation Yaregal Assabie and Josef Bigun School of Information Science,
More informationRobust biometric image watermarking for fingerprint and face template protection
Robust biometric image watermarking for fingerprint and face template protection Mayank Vatsa 1, Richa Singh 1, Afzel Noore 1a),MaxM.Houck 2, and Keith Morris 2 1 West Virginia University, Morgantown,
More informationIris Recognition for Eyelash Detection Using Gabor Filter
Iris Recognition for Eyelash Detection Using Gabor Filter Rupesh Mude 1, Meenakshi R Patel 2 Computer Science and Engineering Rungta College of Engineering and Technology, Bhilai Abstract :- Iris recognition
More informationRULE BASED SIGNATURE VERIFICATION AND FORGERY DETECTION
RULE BASED SIGNATURE VERIFICATION AND FORGERY DETECTION M. Hanmandlu Multimedia University Jalan Multimedia 63100, Cyberjaya Selangor, Malaysia E-mail:madasu.hanmandlu@mmu.edu.my M. Vamsi Krishna Dept.
More informationA Fast Personal Palm print Authentication based on 3D-Multi Wavelet Transformation
A Fast Personal Palm print Authentication based on 3D-Multi Wavelet Transformation * A. H. M. Al-Helali, * W. A. Mahmmoud, and * H. A. Ali * Al- Isra Private University Email: adnan_hadi@yahoo.com Abstract:
More informationCHAPTER 1 INTRODUCTION
CHAPTER 1 INTRODUCTION 1.1 Introduction Pattern recognition is a set of mathematical, statistical and heuristic techniques used in executing `man-like' tasks on computers. Pattern recognition plays an
More informationONLINE SIGNATURE VERIFICATION TECHNIQUES
ONLINE SIGNATURE VERIFICATION TECHNIQUES A THESIS SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF Master of Technology In Telematics and Signal Processing By KIRAN KUMAR GURRALA
More informationAn Efficient on-line Signature Verification System Using Histogram Features
RESEARCH ARTICLE OPEN ACCESS An Efficient on-line Signature Verification System Using Histogram Features Mr.Abilash S 1, Mrs.M.Janani, M.E 2 ME Computer Science and Engineering,Department of CSE, Annai
More informationMultimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint
Multimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint Navdeep Bajwa M.Tech (Student) Computer Science GIMET, PTU Regional Center Amritsar, India Er. Gaurav Kumar M.Tech (Supervisor)
More informationSEGMENTATION OF CHARACTERS WITHOUT MODIFIERS FROM A PRINTED BANGLA TEXT
SEGMENTATION OF CHARACTERS WITHOUT MODIFIERS FROM A PRINTED BANGLA TEXT ABSTRACT Rupak Bhattacharyya et al. (Eds) : ACER 2013, pp. 11 24, 2013. CS & IT-CSCP 2013 Fakruddin Ali Ahmed Department of Computer
More informationBiometrics Technology: Hand Geometry
Biometrics Technology: Hand Geometry References: [H1] Gonzeilez, S., Travieso, C.M., Alonso, J.B., and M.A. Ferrer, Automatic biometric identification system by hand geometry, Proceedings of IEEE the 37th
More informationOFFLINE SIGNATURE VERIFICATION
International Journal of Electronics and Communication Engineering and Technology (IJECET) Volume 8, Issue 2, March - April 2017, pp. 120 128, Article ID: IJECET_08_02_016 Available online at http://www.iaeme.com/ijecet/issues.asp?jtype=ijecet&vtype=8&itype=2
More informationKeywords Wavelet decomposition, SIFT, Unibiometrics, Multibiometrics, Histogram Equalization.
Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure and Reliable
More informationBiometric Security System Using Palm print
ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference
More informationAccelerometer Gesture Recognition
Accelerometer Gesture Recognition Michael Xie xie@cs.stanford.edu David Pan napdivad@stanford.edu December 12, 2014 Abstract Our goal is to make gesture-based input for smartphones and smartwatches accurate
More informationOff-line signature verification: a comparison between human and machine performance
Off-line signature verification: a comparison between human and machine performance J. Coetzer B.M. Herbst J.A. du Preez Mathematical Sciences, jcoetzer@sun.ac.za Mathematical Sciences, herbst@dip.sun.ac.za
More informationOff-Line Signature Verification based on Ordered Grid Features: An Evaluation
Off-Line Signature Verification based on Ordered Grid Features: An Evaluation Konstantina Barkoula, George Economou Physics Department University of Patras Patras, Greece email: kbarkoula@gmail.com, economou@upatras.gr
More informationHistogram-based matching of GMM encoded features for online signature verification
Histogram-based matching of GMM encoded features for online signature verification Vivek Venugopal On behalf of Abhishek Sharma,Dr. Suresh Sundaram Multimedia Analytics Laboratory, Electronics and Electrical
More informationImage retrieval based on bag of images
University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2009 Image retrieval based on bag of images Jun Zhang University of Wollongong
More informationOnline Text-independent Writer Identification Based on Temporal Sequence and Shape Codes
2009 10th International Conference on Document Analysis and Recognition Online Text-independent Writer Identification Based on Temporal Sequence and Shape Codes Bangy Li and Tieniu Tan Center for Biometrics
More informationInvarianceness for Character Recognition Using Geo-Discretization Features
Computer and Information Science; Vol. 9, No. 2; 2016 ISSN 1913-8989 E-ISSN 1913-8997 Published by Canadian Center of Science and Education Invarianceness for Character Recognition Using Geo-Discretization
More informationSpatial Topology of Equitemporal Points on Signatures for Retrieval
Spatial Topology of Equitemporal Points on Signatures for Retrieval D.S. Guru, H.N. Prakash, and T.N. Vikram Dept of Studies in Computer Science,University of Mysore, Mysore - 570 006, India dsg@compsci.uni-mysore.ac.in,
More informationDYNAMIC SIGNATURE VERIFICATION FOR PORTABLE DEVICES
UNIVERSIDAD AUTÓNOMA DE MADRID ESCUELA POLITÉCNICA SUPERIOR DYNAMIC SIGNATURE VERIFICATION FOR PORTABLE DEVICES TRABAJO DE FIN DE MÁSTER Author: Marcos Martínez Díaz Ingeniero de Telecomunicación, UAM
More informationDynamic Stroke Information Analysis for Video-Based Handwritten Chinese Character Recognition
Dynamic Stroke Information Analysis for Video-Based Handwritten Chinese Character Recognition Feng Lin and Xiaoou Tang Department of Information Engineering The Chinese University of Hong Kong Shatin,
More informationOff-line Signature Verification Using Writer-Independent Approach
Off-line Signature Verification Using Writer-Independent Approach Luiz S. Oliveira, Edson Justino, and Robert Sabourin Abstract In this work we present a strategy for off-line signature verification. It
More informationEnhanced Online Signature Verification System
Enhanced Online Signature Verification System Joslyn Fernandes 1, Nishad Bhandarkar 2 1 F/8, Malinee Apt., Mahakali Caves Road, Andheri east, Mumbai 400093. 2 303, Meena CHS. LTD., 7 bungalows, Andheri
More informationLinear Discriminant Analysis in Ottoman Alphabet Character Recognition
Linear Discriminant Analysis in Ottoman Alphabet Character Recognition ZEYNEB KURT, H. IREM TURKMEN, M. ELIF KARSLIGIL Department of Computer Engineering, Yildiz Technical University, 34349 Besiktas /
More informationBiometrics Technology: Multi-modal (Part 2)
Biometrics Technology: Multi-modal (Part 2) References: At the Level: [M7] U. Dieckmann, P. Plankensteiner and T. Wagner, "SESAM: A biometric person identification system using sensor fusion ", Pattern
More informationOffline Signature Verification using Grid based and Centroid based Approach
Offline Signature Verification using Grid based and Centroid based Approach Sayantan Roy Department of Computer Science Engineering ISM Dhanbad Jharkhand ABSTRACT Now a day s Signature verification is
More informationA Framework for Efficient Fingerprint Identification using a Minutiae Tree
A Framework for Efficient Fingerprint Identification using a Minutiae Tree Praveer Mansukhani February 22, 2008 Problem Statement Developing a real-time scalable minutiae-based indexing system using a
More informationSignature Recognition by Pixel Variance Analysis Using Multiple Morphological Dilations
Signature Recognition by Pixel Variance Analysis Using Multiple Morphological Dilations H B Kekre 1, Department of Computer Engineering, V A Bharadi 2, Department of Electronics and Telecommunication**
More informationarxiv: v1 [cs.cv] 19 Jan 2019
Writer Independent Offline Signature Recognition Using Ensemble Learning Sourya Dipta Das 1, Himanshu Ladia 2, Vaibhav Kumar 2, and Shivansh Mishra 2 1 Jadavpur University, Kolkata, India 2 Delhi Technological
More informationFine Classification of Unconstrained Handwritten Persian/Arabic Numerals by Removing Confusion amongst Similar Classes
2009 10th International Conference on Document Analysis and Recognition Fine Classification of Unconstrained Handwritten Persian/Arabic Numerals by Removing Confusion amongst Similar Classes Alireza Alaei
More informationPart-Based Skew Estimation for Mathematical Expressions
Soma Shiraishi, Yaokai Feng, and Seiichi Uchida shiraishi@human.ait.kyushu-u.ac.jp {fengyk,uchida}@ait.kyushu-u.ac.jp Abstract We propose a novel method for the skew estimation on text images containing
More informationProbabilistic Model for Dynamic Signature Verification System
Research Journal of Applied Sciences, Engineering and Technology 3(): 3-34, SSN: 4-7467 Maxwell Scientific Organization, Submitted: August 6, Accepted: September 7, Published: November 5, Probabilistic
More informationHANDWRITTEN SIGNATURE VERIFICATION USING NEURAL NETWORK & ECLUDEAN APPROACH
http:// HANDWRITTEN SIGNATURE VERIFICATION USING NEURAL NETWORK & ECLUDEAN APPROACH Shalu Saraswat 1, Prof. Sitesh Kumar Sinha 2, Prof. Mukesh Kumar 3 1,2,3 Department of Computer Science, AISECT University
More informationExploring Similarity Measures for Biometric Databases
Exploring Similarity Measures for Biometric Databases Praveer Mansukhani, Venu Govindaraju Center for Unified Biometrics and Sensors (CUBS) University at Buffalo {pdm5, govind}@buffalo.edu Abstract. Currently
More informationEnhanced Iris Recognition System an Integrated Approach to Person Identification
Enhanced Iris Recognition an Integrated Approach to Person Identification Gaganpreet Kaur Research Scholar, GNDEC, Ludhiana. Akshay Girdhar Associate Professor, GNDEC. Ludhiana. Manvjeet Kaur Lecturer,
More informationResearch on the New Image De-Noising Methodology Based on Neural Network and HMM-Hidden Markov Models
Research on the New Image De-Noising Methodology Based on Neural Network and HMM-Hidden Markov Models Wenzhun Huang 1, a and Xinxin Xie 1, b 1 School of Information Engineering, Xijing University, Xi an
More informationEUSIPCO A SPACE-VARIANT CUBIC-SPLINE INTERPOLATION
EUSIPCO 213 1569744341 A SPACE-VARIAN CUBIC-SPLINE INERPOLAION Jianxing Jiang, Shaohua Hong, Lin Wang Department of Communication Engineering, Xiamen University, Xiamen, Fujian, 3615, P.R. China. ABSRAC
More informationCursive Handwriting Recognition System Using Feature Extraction and Artificial Neural Network
Cursive Handwriting Recognition System Using Feature Extraction and Artificial Neural Network Utkarsh Dwivedi 1, Pranjal Rajput 2, Manish Kumar Sharma 3 1UG Scholar, Dept. of CSE, GCET, Greater Noida,
More informationCPSC 695. Geometric Algorithms in Biometrics. Dr. Marina L. Gavrilova
CPSC 695 Geometric Algorithms in Biometrics Dr. Marina L. Gavrilova Biometric goals Verify users Identify users Synthesis - recently Biometric identifiers Courtesy of Bromba GmbH Classification of identifiers
More informationOff-line Character Recognition using On-line Character Writing Information
Off-line Character Recognition using On-line Character Writing Information Hiromitsu NISHIMURA and Takehiko TIMIKAWA Dept. of Information and Computer Sciences, Kanagawa Institute of Technology 1030 Shimo-ogino,
More informationSTUDY OF POSSIBILITY OF ON-PEN MATCHING FOR BIOMETRIC HANDWRITING VERIFICATION
STUDY OF POSSIBILITY OF ON-PEN MATCHING FOR BIOMETRIC HANDWRITING VERIFICATION Tobias Scheidat, Claus Vielhauer, and Jana Dittmann Faculty of Computer Science, Otto-von-Guericke University Magdeburg, Universitätsplatz
More informationAn Efficient Secure Multimodal Biometric Fusion Using Palmprint and Face Image
International Journal of Computer Science Issues, Vol. 2, 2009 ISSN (Online): 694-0784 ISSN (Print): 694-084 49 An Efficient Secure Multimodal Biometric Fusion Using Palmprint and Face Image Nageshkumar.M,
More informationAutomatic Static Signature Verification Systems: A Review
Automatic Static Signature Verification Systems: A Review 1 Vitthal K. Bhosale1 Dr. Anil R. Karwankar2 1 PG Student, Government College of Engineering, Aurangabad (M.S.), 2 Assistant Professor, Dept. Of
More informationA Non-Rigid Feature Extraction Method for Shape Recognition
A Non-Rigid Feature Extraction Method for Shape Recognition Jon Almazán, Alicia Fornés, Ernest Valveny Computer Vision Center Dept. Ciències de la Computació Universitat Autònoma de Barcelona Bellaterra,
More informationA Directional Feature with Energy based Offline Signature Verification Network
A Directional Feature with Energy based Offline Signature Verification Network Minal Tomar * and Pratibha Singh Department of Electrical & Electronics * Malwa Institute of Technology Indore (M.P.) 452016
More informationRobust Optical Character Recognition under Geometrical Transformations
www.ijocit.org & www.ijocit.ir ISSN = 2345-3877 Robust Optical Character Recognition under Geometrical Transformations Mohammad Sadegh Aliakbarian 1, Fatemeh Sadat Saleh 2, Fahimeh Sadat Saleh 3, Fatemeh
More informationLearning-Based Candidate Segmentation Scoring for Real-Time Recognition of Online Overlaid Chinese Handwriting
2013 12th International Conference on Document Analysis and Recognition Learning-Based Candidate Segmentation Scoring for Real-Time Recognition of Online Overlaid Chinese Handwriting Yan-Fei Lv 1, Lin-Lin
More informationSecurity Evaluation of Online Signature Verification System using Webcams
Security Evaluation of Online Signature Verification System using Webcams T.Venkatesh Research Scholar, K.L.University, A.P.,India Balaji.S Professor, K.L.University, A.P.,India. Chakravarthy A S N Professor,
More informationFingerprint Recognition using Texture Features
Fingerprint Recognition using Texture Features Manidipa Saha, Jyotismita Chaki, Ranjan Parekh,, School of Education Technology, Jadavpur University, Kolkata, India Abstract: This paper proposes an efficient
More informationA Novel Automated Approach for Offline Signature Verification Based on Shape Matrix
A Novel Automated Approach for Offline Signature Verification Based on Shape Matrix Sumbal Iqbal Ahmed Peshawar Pakistan Rashid Jalal Qureshi Emirates Aviation University Dubai,UAE Imran Khan Peshawar,
More informationA Survey on Feature Extraction Techniques for Palmprint Identification
International Journal Of Computational Engineering Research (ijceronline.com) Vol. 03 Issue. 12 A Survey on Feature Extraction Techniques for Palmprint Identification Sincy John 1, Kumudha Raimond 2 1
More informationFusion in Multibiometric Identification Systems: What about the Missing Data?
Fusion in Multibiometric Identification Systems: What about the Missing Data? Karthik Nandakumar 1, Anil K. Jain 2 and Arun Ross 3 1 Institute for Infocomm Research, A*STAR, Fusionopolis, Singapore, knandakumar@i2r.a-star.edu.sg
More informationCLASSIFICATION WITH RADIAL BASIS AND PROBABILISTIC NEURAL NETWORKS
CLASSIFICATION WITH RADIAL BASIS AND PROBABILISTIC NEURAL NETWORKS CHAPTER 4 CLASSIFICATION WITH RADIAL BASIS AND PROBABILISTIC NEURAL NETWORKS 4.1 Introduction Optical character recognition is one of
More informationOffline Signature Verification Using Local Interest Points and Descriptors*
Offline Signature Verification Using Local Interest Points and Descriptors* Javier Ruiz-del-Solar, Christ Devia, Patricio Loncomilla, and Felipe Concha Department of Electrical Engineering, Universidad
More informationOff-line Signature Verification Using Enhanced Modified Direction Features in Conjunction with Neural Classifiers and Support Vector Machines
Off-line Signature Verification Using Enhanced Modified Direction Features in Conjunction with Neural Classifiers and Support Vector Machines Author Nguyen, Vu, Blumenstein, Michael, Muthukkumarasamy,
More informationFootprint Recognition using Modified Sequential Haar Energy Transform (MSHET)
47 Footprint Recognition using Modified Sequential Haar Energy Transform (MSHET) V. D. Ambeth Kumar 1 M. Ramakrishnan 2 1 Research scholar in sathyabamauniversity, Chennai, Tamil Nadu- 600 119, India.
More information6. Multimodal Biometrics
6. Multimodal Biometrics Multimodal biometrics is based on combination of more than one type of biometric modalities or traits. The most compelling reason to combine different modalities is to improve
More informationSegmentation of Kannada Handwritten Characters and Recognition Using Twelve Directional Feature Extraction Techniques
Segmentation of Kannada Handwritten Characters and Recognition Using Twelve Directional Feature Extraction Techniques 1 Lohitha B.J, 2 Y.C Kiran 1 M.Tech. Student Dept. of ISE, Dayananda Sagar College
More informationOff-line Signature Verification Using Contour Features
Off-line Signature Verification Using Contour Features Almudena Gilperez, Fernando Alonso-Fernandez, Susana Pecharroman, Julian Fierrez, Javier Ortega-Garcia Biometric Recognition Group - ATVS Escuela
More informationChain Code Histogram based approach
An attempt at visualizing the Fourth Dimension Take a point, stretch it into a line, curl it into a circle, twist it into a sphere, and punch through the sphere Albert Einstein Chain Code Histogram based
More informationOnline Signature Verification: A Review
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 19, Issue 2, Ver. III (Mar.-Apr. 2017), PP 33-37 www.iosrjournals.org Online Signature Verification: A Review
More informationEvent Based Offline Signature Modeling Using Grid Source Probabilistic Coding
Event Based Offline Signature Modeling Using Grid Source Probabilistic Coding Konstantina Barkoula 1, Elias Zois 2, Evangelos Zervas 2, and George Economou 1 1 Physics Dept., University of Patras, Patras,
More informationOff-line Signature Verification using the Enhanced Modified Direction Feature and Neural-based Classification
Off-line Signature Verification using the Enhanced Modified Direction Feature and Neural-based Classification Author Armand, Stephane, Blumenstein, Michael, Muthukkumarasamy, Vallipuram Published 2006
More informationSystem Identification Approach in Signature verification
State University of New York at Buffalo Department of Mechanical and Aerospace Engineering MAE566 System Identification Spring Semester 27 Final Project Report System Identification Approach in Signature
More informationRetrieval of Offline Handwritten Signatures
Retrieval of Offline Handwritten Signatures H.N. Prakash Department of Studies in Computer Science, University of Mysore, Manasagangothri, Mysore-57 6, India D. S. Guru Department of Studies in Computer
More informationNOVEL HYBRID GENETIC ALGORITHM WITH HMM BASED IRIS RECOGNITION
NOVEL HYBRID GENETIC ALGORITHM WITH HMM BASED IRIS RECOGNITION * Prof. Dr. Ban Ahmed Mitras ** Ammar Saad Abdul-Jabbar * Dept. of Operation Research & Intelligent Techniques ** Dept. of Mathematics. College
More informationRobust Lossless Image Watermarking in Integer Wavelet Domain using SVD
Robust Lossless Image Watermarking in Integer Domain using SVD 1 A. Kala 1 PG scholar, Department of CSE, Sri Venkateswara College of Engineering, Chennai 1 akala@svce.ac.in 2 K. haiyalnayaki 2 Associate
More informationApproach to Increase Accuracy of Multimodal Biometric System for Feature Level Fusion
Approach to Increase Accuracy of Multimodal Biometric System for Feature Level Fusion Er. Munish Kumar, Er. Prabhjit Singh M-Tech(Scholar) Global Institute of Management and Emerging Technology Assistant
More informationOff-line Bangla Signature Verification
2012 10th IAPR International Workshop on Document Analysis Systems Off-line Bangla Signature Verification Srikanta Pal University, Gold Coast srikanta.pal@griffithuni. edu.au Vu Nguyen University, Gold
More informationBIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition
BIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition Hiren D. Joshi Phd, Dept. of Computer Science Rollwala Computer Centre
More informationFace Recognition by Combining Kernel Associative Memory and Gabor Transforms
Face Recognition by Combining Kernel Associative Memory and Gabor Transforms Author Zhang, Bai-ling, Leung, Clement, Gao, Yongsheng Published 2006 Conference Title ICPR2006: 18th International Conference
More informationFinger Print Enhancement Using Minutiae Based Algorithm
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 8, August 2014,
More informationCHAPTER 5 PALMPRINT RECOGNITION WITH ENHANCEMENT
145 CHAPTER 5 PALMPRINT RECOGNITION WITH ENHANCEMENT 5.1 INTRODUCTION This chapter discusses the application of enhancement technique in palmprint recognition system. Section 5.2 describes image sharpening
More informationRecognition of online captured, handwritten Tamil words on Android
Recognition of online captured, handwritten Tamil words on Android A G Ramakrishnan and Bhargava Urala K Medical Intelligence and Language Engineering (MILE) Laboratory, Dept. of Electrical Engineering,
More informationThe Method of User s Identification Using the Fusion of Wavelet Transform and Hidden Markov Models
The Method of User s Identification Using the Fusion of Wavelet Transform and Hidden Markov Models Janusz Bobulski Czȩstochowa University of Technology, Institute of Computer and Information Sciences,
More informationHead Frontal-View Identification Using Extended LLE
Head Frontal-View Identification Using Extended LLE Chao Wang Center for Spoken Language Understanding, Oregon Health and Science University Abstract Automatic head frontal-view identification is challenging
More informationFingerprint Indexing using Minutiae and Pore Features
Fingerprint Indexing using Minutiae and Pore Features R. Singh 1, M. Vatsa 1, and A. Noore 2 1 IIIT Delhi, India, {rsingh, mayank}iiitd.ac.in 2 West Virginia University, Morgantown, USA, afzel.noore@mail.wvu.edu
More informationOutline. Incorporating Biometric Quality In Multi-Biometrics FUSION. Results. Motivation. Image Quality: The FVC Experience
Incorporating Biometric Quality In Multi-Biometrics FUSION QUALITY Julian Fierrez-Aguilar, Javier Ortega-Garcia Biometrics Research Lab. - ATVS Universidad Autónoma de Madrid, SPAIN Loris Nanni, Raffaele
More information