Offline Signature Recognition and Verification System using Efficient Fuzzy Kohonen Clustering Network (EFKCN) Algorithm
|
|
- Lee Neal
- 6 years ago
- Views:
Transcription
1 Available online at ScienceDirect Procedia Computer Science 116 (2017) nd International Conference on Computer Science and Computational Intelligence 2017, ICCSCI 2017, October 2017, Bali, Indonesia Offline Signature Recognition and Verification System using Efficient Fuzzy Kohonen Clustering Network (EFKCN) Algorithm Dewi Suryani, Edy Irwansyah, Ricki Chindra Computer Science Department, School of Computer Science, Bina Nusantara University, Jl. K. H. Syahdan No. 9, DKI Jakarta, 11480, Indonesia Abstract Research on offline signature recognition still has not shown satisfactory results as the results of recent research. Therefore this study aims to proposed an offline signature recognition and verification system which employed an efficient fuzzy Kohonen clustering networks (EFKCN) 1 algorithm. The proposed recognition system and signature verification system consist of five stages including data acquisition, image processing, data normalization, clustering, and evaluation. The recognition of signature patterns using the clustering method with the EFKCN algorithm shows relatively better result with 70% accuracy compared to the accuracy of previous research results 2 which is 53%, and a good signature recognition result can be developed to assist the verification system as well as the personal data verification system as made in this study The Authors. Published by Elsevier B.V. Peer-review under responsibility of the scientific committee of the 2nd International Conference on Computer Science and Computational Intelligence Keywords: Signature Recognition, Verification System, EFKCN 1. Introduction In the present, there are several ways to check the validity of one s personal data, starting from using signature to fingerprint. Signature is a sign as a symbol of the name written by the hand and by the person himself as a personal marker. Signatures are often used in data verification either in schools, banks, corporations, hospitals, government, and much more. Due to the importance of signature function, there are many parties who want to manipulate the signatures of others. Duplicate signatures can be detrimental and included in the criminal realm. Identifying signatures can be ascertained both online and offline. Online signature recognition is used by putting a signature on the pen tablet while offline signature recognition is done by using a scanner. Until now, research on offline signature recognition still has not shown satisfactory results as the results of recent research conducted by Ahmed et al. 3. In the other hand, Bezdek et al. 4, Yang et al. 1, and Irwansyah et al. 5 are developing a fuzzy Kohonen clustering networks (FKCN) 4 and an efficient fuzzy Kohonen clustering networks (EFKCN) 1 algorithms for data clustering which in its implementation Corresponding author. Tel.: ext 2188; fax: address: eirwansyah@binus.edu The Authors. Published by Elsevier B.V. Peer-review under responsibility of the scientific committee of the 2nd International Conference on Computer Science and Computational Intelligence /j.procs
2 622 Dewi Suryani et al. / Procedia Computer Science 116 (2017) can produce a correct rate up to 92.67%. In this paper, we proposed an offline signature recognition and verification system which employed the EFKCN algorithm. Like Chaudhari et al. 2, Salambue 6, and Ainun et al. 7, we also applied Hu s seven moment variant 8 as our preprocessing method. Unlike the others, we focus on EFKCN algorithm. 2. Related Work Signature is an important part of human life. Several tasks need a signature to be completed, especially for personal authentication and verification. Due to its significant function, sometimes is misused by other people. In order to prevent that problem, many researches were done in developing a system to automatically recognize the human signatures 2,3,6,7,9. Chaudhari et al. 2 are being part of it who proposed a signature recognition system by implementing fuzzy min-max algorithm 10 in a neural network framework. In their approach, the construction of the system is begun with preprocessing data and extracting its information using data acquisition and Hu s seven moment invariant. They reported a significant improvement in the accuracy which is nearly 53% and up to 92% when increasing the signatures per class. Moreover, the study of Ismail and team 9 successfully built another recognition and verification system using principal components analysis (PCA) 11 which focuses on offline signature. They separated the process into two different tasks, i.e., the recognition that used k-nearest neighbors (k-nn) classifier and the verification that used artificial neural network (ANN). However, before both tasks running, the image preprocessing and feature extractions were applied by PCA. Their result using PCA is rising approximately 5% in false recognition rate (FRR) compared to the experiment without PCA. Furthermore, the approach of Ahmed et al. 3 concentrated in feature extraction methods for offline signature recognition and verification system. Here, they employed the projection-based of Discrete Radon Transform (DRT) as the method that consists of horizontal, vertical, and the combination of both projections. However, they need a signature preprocessing, which is done by Otsu s threshold method 12. For training the signatures data, their work implemented dynamic time warping (DWT) algorithm using Euclidean distance. By taking the advantages of the projection-based DRT, they achieved optimal performances in processing time, memory storage, and results, particularly the combination of horizontal and vertical projections. The results are measured by false rejection rate (FRR), false acceptance rate (FAR), total error rate (TER) and equal error rate (EER), i.e., 8.49, 5.60, 14.09, and 7.60 respectively, which is impressive results as a new approach. Similar to Chaudhari et al. 2 approach, Salambue 6 and Ainun et al. 7 proposed the signature recognition system which preprocessed the data using Hu s moment invariant. However, their recognition methods are different. For Salambue 6, he used the Euclidean distance algorithm as the classification and recognition method while Ainun et al. 7 utilized the radial basis function (RBF) neural network. Based on their conducted experiments, Ainun and the team gain 12% of error rate for the classification task and 20% for the recognition task. 3. Methodology Five stages of the study were carried out consisting of (1) data acquisition, (2) image processing, (3) data normalization, (4) clustering, and (5) evaluation. Data acquisition was conducted for 80 samples of signatures obtained from 8 persons with 10 different conditions in both sitting, standing, silent, and fast conditions. 50 signatures were used as training data and another 30 were used as test data. Image processing stages consist of preprocessing and feature extraction sub-stages. The preprocessing sub-stages are a series of data scan processes to Red Green Blue (RGB) format, conversion to grayscale, convert to binary image, inverted binary image, border elimination, and bounding box extraction. Grayscale image is a blend of gray color variations. From black at the lowest intensity to white at the highest intensity. To get the intensity value by using the following formula: grayscale = R G B (1) Border elimination function to make the signatures look more unified and the bounding box extract works to remove unused backgrounds, so the signature pattern looks more clear. At the feature extraction stage will be used moment
3 Dewi Suryani et al. / Procedia Computer Science 116 (2017) invariant. This method is useful for normalizing an image that changes due to scale and rotation. The respondent s signature will be normalized to: 1. Regular moment: moments obtained from boundary shapes and interior areas, converted into functions to be implemented for digital imagery. M pq = x yx p y q f (x, y) (2) 2. Center moment: centroid image is used to normalize invariant translations in the image field. X = M 10 M 00, Ȳ = M 01 M 00 (3) Furthermore, the central moment can be determined discretely as follows: M pq = x y(x X) p (Y Ȳ) q (4) 3. Normalization of the central moment: to normalize the change. n pq = µ pq µ 00 γ (5) 4. Seven non-linear function: normalize the signature of scale change, translation, and rotation. Φ 1 = n 20 + n 02 Φ 2 = (n 20 + n 02 ) n Φ 3 = (n n 12 ) 2 + (n n 21 ) 2 Φ 4 = (n 30 + n 12 ) 2 (n n 21 ) 2 Φ 5 = (3n 30 3n 12 )(n 30 + n 12 )[(n 30 + n 12 ) 2 3(n n 03 ) 2 ](n 21 n 03 )(n 21 + n 03 )x[3(n 30 + n 12 ) 2 (n 21 + n 03 ) 2 ] Φ 6 = (n 20 n 02 )[(n 30 + n 12 ) 2 (n 21 + n 03 ) 2 ]4n 11 (n 30 n 12 )(n 21 + n 03 ) Φ 7 = (3n 21 n 03 )(n 30 + n 12 )[(n 30 + n 12 ) 2 3(n 21 + n 03 ) 2 ](3n 12 n 30 )(n 21 + n 03 )x[3(n 30 + n 12 ) 2 (n 21 + n 30 ) 2 ] Obtained results: Φ 1 = ; Φ 2 = ; Φ 3 = ; Φ 4 = ; Φ 5 = ; Φ 6 = ; Φ 7 = ; The invariant moment value is then normalized using min-max normalization in order to generate values in the range of 0 to 1. Having obtained the value of normalized invariant moment, then is clustering data with FKCN algorithm. This algorithm combines the learning rate of Fuzzy C-Mean (FCM) algorithm and KCN s all vector update. FKCN algorithm works with following stages: 1. Compute the learning rate: m t = m 0 t m, m = (m 0 1)/t max (6) u ik,t = ( ( Xk V i,t 1 ) 2 ) 1 m 1 (7) X k V j,t 1 2. Determination of FKCN learning rate: α ik,t = (u ik,t ) m t (8)
4 624 Dewi Suryani et al. / Procedia Computer Science 116 (2017) Update all weight vector: v i,t = v i,t 1 + n k=1 α ik,t(x k v i,t 1 ) nj=1 α ij,t (9) 4. Compute: E t = V t V t 1 (10) 5. If E t < E, else t = t + 1 then back to first step. After obtaining cluster center data invariant moment invited using Euclidean distance by using cluster center FKCN. In this study used EFKCN which update the learning rate can be adjusted based on fuzzy membership to produce optimal learning rate 1,5. EFKCN improved learning rate: tu = fuzzy membership upper limit and td = the lower limit of fuzzy membership. (u ik,t ) m u, u ik,t > tu α ik,t = (u ik,t ) m t, td u ik,t tu (u ik,t ) m d, u ik,t td tu = 0.7; td = 0.3; mu = 0.4; md = 3; The clustering results are then evaluated by testing 30 signatures. The data in the form of a signature will be identified by the range of distance to the cluster center, if it is within the specified Euclidean minimum distance, the data will be recognized as the original signature and vice versa, if the signature is beyond the specified range, it is considered not as an original signature. After believed the test results show good results, then developed an application that can be used to verify access to personal data. 4. Experiment and Result Signature Data Training Sample signatures in the process by means of a scan so that the format of RGB, which is then converted into grayscale format with the aim to more easily converted into binary image. The converted binary image has a pixel value 0 for the black signature pattern and 1 for the white background. The binary image is then converted into an inverted binary image so that the black background has a pixel value of 1 and the object becomes white with pixel value 0. Eliminating the border is meant for a more unified signature pattern which can then be extracted bounding box so that the unnecessary background will be removed and only take the signature pattern. The extracted results data are then normalized using Hu s moment invariant so that it is invariant to scale, rotation, and transformation changes. Data moment invariant then normalized using min-max normalization. The functionality of the training feature is intended to select the signature to be tested in order to determine the signature owner (Fig. 1). For training needs, signatures are performed in a variety of conditions whether sitting, standing, and fast conditions. The facts show that signatures under different conditions affect the shape of the signature. Training conducted on 50 signatures from 10 respondents, obtained training results in the form of a cluster center for each signature owner as Fig. 2. The signature to be tested will be processed in order to find the Euclidean distance value to determine the cluster data center of the tested signature. If the Euclidean distance can be within a predetermined distance then the signature will go into the cluster. Before entering, the process must be through the combination of data first as can be seen in Fig. 3.
5 Dewi Suryani et al. / Procedia Computer Science 116 (2017) Fig. 1: Screen display data and training results where the left side is the results of the right side data Fig. 2: Signatures of 10 respondents used in the training. The label of each signature is attached on top of the image Table 1: Rule combination after normalization Data 1 with data 2. Data 2 with data 3. Data 3 with data 4. Data 1 with data 3. Data 2 with data 4. Data 3 with data 5. Data 1 with data 4. Data 2 with data 5. Data 3 with data 6. Data 1 with data 5. Data 2 with data 6. Data 3 with data 7. Data 1 with data 6. Data 2 with data 7. Data 1 with data 7. Data 4 with data 5. Data 5 with data 6. Data 6 with data 7. Data 4 with data 6. Data 5 with data 7. Data 4 with data 7. Seven data moment invariant that has been normalized with min-max normalization will be combined with the rules as described in Table 1. The combination rules are divided into six variants where the first rule is the merging of data 1 to data 7, then the data 2 collaborates with the data 3 to data 7 as the second rules, and so on.
6 626 Dewi Suryani et al. / Procedia Computer Science 116 (2017) Fig. 3: Screen display data clustering and training results Table 2: Accuracy signature testing data using EFKCN algorithm Cluster Signature of Respondent to- Accuracy Respondent (%) % % % % % % % % % % Accuracy Average 70% Signature Data Clustering The results of the training data are then used to test the results of signature identifiers by the clustering method. The result of clustering test with EFKCN algorithm is as can be seen in Table 2 as follows. The test results show that EFKCN is able to recognize the signatures as much as 70% with the other 30% leading to the signatures of other respondents. In the training and test data, there are 3 data that have low accuracy of 1, 3, and 8 person signatures respectively with 33.3% and 0% accuracy (based on Table 2). Although the signatures generated by each person are different but the value of feature extraction uses the person invariant moments of 1.3 and 8 are almost identical with others causing the classification of the signature to point to different clusters. The 1st person has similarity with the invariant moment value of the 6th and 9th persons, the 3rd person is similar to the 5th and 8th persons invariant value, and the 8th person has the same invariant moment with the 4th person. In Table 2, the accuracy of the training data is smaller than the accuracy of the test data. Where should the value of test accuracy is smaller than the value of training accuracy. This is because a person s signature may not always be exactly the same between one signature with another signature so, it does not rule out that the accuracy of the test results is greater than the accuracy of the training.
7 Dewi Suryani et al. / Procedia Computer Science 116 (2017) Signature Recognition for Personal Data Verification A signature recognition system with better accuracy than the previous research is then developed into an application for verification of personal data in order to limit access to personal data. The appearance of the created application is depicted in Fig. 4. Fig. 4: The application appearance with Otnel s signature as an example that does not match with the recognition result Testing of forged signatures in the case of this study is actually the property of Otnel s signature as the example. The signature does not match the personal data of each person. The signature shows the clusters of others. And the invariant moment obtained from the signature is much different. The comparison can be seen in the Fig. 4 and 5. Fig. 5: Moment invariant of Otnel s signature As we can see in Fig. 5, the comparison between invariant moments of the original signatures and the forged signature of Otnel respondents is as follows: Otnel: ; ; ; ; ; ; Forged Otnel: ; ; ; ; ; ;
8 628 Dewi Suryani et al. / Procedia Computer Science 116 (2017) Conclussion The same signature pattern of respondents may differ depending on the condition of the signature so as to allow an error in the recognition of the signature pattern. The recognition of signature patterns using the clustering method with the EFKCN algorithm shows relatively better results with 70% accuracy compared to the accuracy of previous research results 2 which is 53%. A good signature pattern recognition can be developed to assist the verification system as well as the personal data verification system made in this study. References 1. Yang, Y., Jia, Z., Chang, C., Qin, X., Li, T., Wang, H., et al. An efficient fuzzy kohonen clustering network algorithm. In: Fuzzy Systems and Knowledge Discovery, FSKD 08. Fifth International Conference on; vol. 1. IEEE; 2008, p Chaudhari, B.M., Barhate, A.A., Bhole, A.A.. Signature recognition using fuzzy min-max neural network. In: Communication and Energy Conservation 2009 International Conference on Control, Automation. 2009, p Ahmed, H., Shukla, S., Rai, H.M.. Static Handwritten Signature Recognition Using Discrete Random Transform and Combined Projection Based Technique. In: 2014 Fourth International Conference on Advanced Computing Communication Technologies. 2014, p doi: /ACCT Bezdek, J.C., Tsao, E.C.K., Pal, N.R.. Fuzzy Kohonen clustering networks. In: [1992 Proceedings] IEEE International Conference on Fuzzy Systems. 1992, p doi: /fuzzy IRWANSYAH, E., FAISAL, M., PRIMADINI, A.. Does efficient fuzzy kohonen clustering network algorithm really improves clustering data result? Journal of Theoretical & Applied Information Technology 2015;71(1). 6. Salambue, R.. Pengenalan Pola Tanda Tangan dengan Metode Momennt Invariant dan Euclidean Distance. Prosiding SEMIRATA ; 1(1). URL 7. Ainun, J., Mohammad Isa, I., Imam, M.. PENGENALAN POLA TANDA TANGAN MENGGUNAKAN METODE MOMENT INVARIANT DAN JARINGAN SYARAF RADIAL BASIS FUNCTION (RBF). Pemantapan Keprofesionalan Peneliti, Pendidik, dan Praktisi MIPA Untuk Mendukung Pembangunan Karakter Bangsa 2011;URL 8. Hu, M.K.. Visual pattern recognition by moment invariants. IRE Transactions on Information Theory 1962;8(2): doi: /TIT Ismail, I.A., Ramadan, M.A., Danf, T.E., Samak, A.H.. Automatic Signature Recognition and Verification Using Principal Components Analysis. In: Imaging and Visualisation 2008 Fifth International Conference on Computer Graphics. 2008, p doi: /cgiv Simpson, P.K.. Fuzzy min-max neural networks. I. Classification. IEEE Transactions on Neural Networks 1992;3(5): doi: / Wold, S., Esbensen, K., Geladi, P.. Principal component analysis. Chemometrics and intelligent laboratory systems 1987;2(1-3): Otsu, N.. A Threshold Selection Method from Gray-Level Histograms. IEEE Transactions on Systems, Man, and Cybernetics 1979;9(1): doi: /tsmc
Available online at ScienceDirect. Procedia Computer Science 59 (2015 )
Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 59 (2015 ) 550 558 International Conference on Computer Science and Computational Intelligence (ICCSCI 2015) The Implementation
More informationIJESRT. Scientific Journal Impact Factor: (ISRA), Impact Factor: 1.852
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY INTELLEGENT APPROACH FOR OFFLINE SIGNATURE VERIFICATION USING CHAINCODE AND ENERGY FEATURE EXTRACTION ON MULTICORE PROCESSOR Raju
More informationA Computer Vision System for Graphical Pattern Recognition and Semantic Object Detection
A Computer Vision System for Graphical Pattern Recognition and Semantic Object Detection Tudor Barbu Institute of Computer Science, Iaşi, Romania Abstract We have focused on a set of problems related to
More informationMULTI ORIENTATION PERFORMANCE OF FEATURE EXTRACTION FOR HUMAN HEAD RECOGNITION
MULTI ORIENTATION PERFORMANCE OF FEATURE EXTRACTION FOR HUMAN HEAD RECOGNITION Panca Mudjirahardjo, Rahmadwati, Nanang Sulistiyanto and R. Arief Setyawan Department of Electrical Engineering, Faculty of
More informationOCR For Handwritten Marathi Script
International Journal of Scientific & Engineering Research Volume 3, Issue 8, August-2012 1 OCR For Handwritten Marathi Script Mrs.Vinaya. S. Tapkir 1, Mrs.Sushma.D.Shelke 2 1 Maharashtra Academy Of Engineering,
More informationOffline Signature verification and recognition using ART 1
Offline Signature verification and recognition using ART 1 R. Sukanya K.Malathy M.E Infant Jesus College of Engineering And Technology Abstract: The main objective of this project is signature verification
More informationSignature Recognition by Pixel Variance Analysis Using Multiple Morphological Dilations
Signature Recognition by Pixel Variance Analysis Using Multiple Morphological Dilations H B Kekre 1, Department of Computer Engineering, V A Bharadi 2, Department of Electronics and Telecommunication**
More informationCursive Handwriting Recognition System Using Feature Extraction and Artificial Neural Network
Cursive Handwriting Recognition System Using Feature Extraction and Artificial Neural Network Utkarsh Dwivedi 1, Pranjal Rajput 2, Manish Kumar Sharma 3 1UG Scholar, Dept. of CSE, GCET, Greater Noida,
More informationKeywords Binary Linked Object, Binary silhouette, Fingertip Detection, Hand Gesture Recognition, k-nn algorithm.
Volume 7, Issue 5, May 2017 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Hand Gestures Recognition
More informationHandwritten Devanagari Character Recognition Model Using Neural Network
Handwritten Devanagari Character Recognition Model Using Neural Network Gaurav Jaiswal M.Sc. (Computer Science) Department of Computer Science Banaras Hindu University, Varanasi. India gauravjais88@gmail.com
More informationHANDWRITTEN SIGNATURE VERIFICATION USING NEURAL NETWORK & ECLUDEAN APPROACH
http:// HANDWRITTEN SIGNATURE VERIFICATION USING NEURAL NETWORK & ECLUDEAN APPROACH Shalu Saraswat 1, Prof. Sitesh Kumar Sinha 2, Prof. Mukesh Kumar 3 1,2,3 Department of Computer Science, AISECT University
More informationAutomatic Recognition and Verification of Handwritten Legal and Courtesy Amounts in English Language Present on Bank Cheques
Automatic Recognition and Verification of Handwritten Legal and Courtesy Amounts in English Language Present on Bank Cheques Ajay K. Talele Department of Electronics Dr..B.A.T.U. Lonere. Sanjay L Nalbalwar
More informationOnline Signature Verification Technique
Volume 3, Issue 1 ISSN: 2320-5288 International Journal of Engineering Technology & Management Research Journal homepage: www.ijetmr.org Online Signature Verification Technique Ankit Soni M Tech Student,
More informationOFFLINE SIGNATURE VERIFICATION
International Journal of Electronics and Communication Engineering and Technology (IJECET) Volume 8, Issue 2, March - April 2017, pp. 120 128, Article ID: IJECET_08_02_016 Available online at http://www.iaeme.com/ijecet/issues.asp?jtype=ijecet&vtype=8&itype=2
More informationPlate Recognition Using Backpropagation Neural Network and Genetic Algorithm
Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 116 (2017) 365 372 2nd International Conference on Computer Science and Computational Intelligence 2017, ICCSCI 2017, 13-14
More informationIndian Currency Recognition Based on ORB
Indian Currency Recognition Based on ORB Sonali P. Bhagat 1, Sarika B. Patil 2 P.G. Student (Digital Systems), Department of ENTC, Sinhagad College of Engineering, Pune, India 1 Assistant Professor, Department
More informationNOVATEUR PUBLICATIONS INTERNATIONAL JOURNAL OF INNOVATIONS IN ENGINEERING RESEARCH AND TECHNOLOGY [IJIERT] ISSN: VOLUME 2, ISSUE 1 JAN-2015
Offline Handwritten Signature Verification using Neural Network Pallavi V. Hatkar Department of Electronics Engineering, TKIET Warana, India Prof.B.T.Salokhe Department of Electronics Engineering, TKIET
More informationOff-line Signature Verification Using Neural Network
International Journal of Scientific & Engineering Research, Volume 3, Issue 2, February-2012 1 Off-line Signature Verification Using Neural Network Ashwini Pansare, Shalini Bhatia Abstract a number of
More informationFine Classification of Unconstrained Handwritten Persian/Arabic Numerals by Removing Confusion amongst Similar Classes
2009 10th International Conference on Document Analysis and Recognition Fine Classification of Unconstrained Handwritten Persian/Arabic Numerals by Removing Confusion amongst Similar Classes Alireza Alaei
More informationPerformance analysis of robust road sign identification
IOP Conference Series: Materials Science and Engineering OPEN ACCESS Performance analysis of robust road sign identification To cite this article: Nursabillilah M Ali et al 2013 IOP Conf. Ser.: Mater.
More informationOptical Character Recognition (OCR) for Printed Devnagari Script Using Artificial Neural Network
International Journal of Computer Science & Communication Vol. 1, No. 1, January-June 2010, pp. 91-95 Optical Character Recognition (OCR) for Printed Devnagari Script Using Artificial Neural Network Raghuraj
More informationResearch of Traffic Flow Based on SVM Method. Deng-hong YIN, Jian WANG and Bo LI *
2017 2nd International onference on Artificial Intelligence: Techniques and Applications (AITA 2017) ISBN: 978-1-60595-491-2 Research of Traffic Flow Based on SVM Method Deng-hong YIN, Jian WANG and Bo
More informationA Fast Personal Palm print Authentication based on 3D-Multi Wavelet Transformation
A Fast Personal Palm print Authentication based on 3D-Multi Wavelet Transformation * A. H. M. Al-Helali, * W. A. Mahmmoud, and * H. A. Ali * Al- Isra Private University Email: adnan_hadi@yahoo.com Abstract:
More informationEE 584 MACHINE VISION
EE 584 MACHINE VISION Binary Images Analysis Geometrical & Topological Properties Connectedness Binary Algorithms Morphology Binary Images Binary (two-valued; black/white) images gives better efficiency
More informationA Real-Time Hand Gesture Recognition for Dynamic Applications
e-issn 2455 1392 Volume 2 Issue 2, February 2016 pp. 41-45 Scientific Journal Impact Factor : 3.468 http://www.ijcter.com A Real-Time Hand Gesture Recognition for Dynamic Applications Aishwarya Mandlik
More informationPalmprint Recognition Using Transform Domain and Spatial Domain Techniques
Palmprint Recognition Using Transform Domain and Spatial Domain Techniques Jayshri P. Patil 1, Chhaya Nayak 2 1# P. G. Student, M. Tech. Computer Science and Engineering, 2* HOD, M. Tech. Computer Science
More informationComparative Study of Hand Gesture Recognition Techniques
Reg. No.:20140316 DOI:V2I4P16 Comparative Study of Hand Gesture Recognition Techniques Ann Abraham Babu Information Technology Department University of Mumbai Pillai Institute of Information Technology
More informationInvarianceness for Character Recognition Using Geo-Discretization Features
Computer and Information Science; Vol. 9, No. 2; 2016 ISSN 1913-8989 E-ISSN 1913-8997 Published by Canadian Center of Science and Education Invarianceness for Character Recognition Using Geo-Discretization
More informationHANDWRITTEN GURMUKHI CHARACTER RECOGNITION USING WAVELET TRANSFORMS
International Journal of Electronics, Communication & Instrumentation Engineering Research and Development (IJECIERD) ISSN 2249-684X Vol.2, Issue 3 Sep 2012 27-37 TJPRC Pvt. Ltd., HANDWRITTEN GURMUKHI
More informationNOWADAYS, there are many human jobs that can. Face Recognition Performance in Facing Pose Variation
CommIT (Communication & Information Technology) Journal 11(1), 1 7, 2017 Face Recognition Performance in Facing Pose Variation Alexander A. S. Gunawan 1 and Reza A. Prasetyo 2 1,2 School of Computer Science,
More informationAutomatic Static Signature Verification Systems: A Review
Automatic Static Signature Verification Systems: A Review 1 Vitthal K. Bhosale1 Dr. Anil R. Karwankar2 1 PG Student, Government College of Engineering, Aurangabad (M.S.), 2 Assistant Professor, Dept. Of
More informationINTERNATIONAL RESEARCH JOURNAL OF MULTIDISCIPLINARY STUDIES
STUDIES & SPPP's, Karmayogi Engineering College, Pandharpur Organize National Conference Special Issue March 2016 Neuro-Fuzzy System based Handwritten Marathi System Numerals Recognition 1 Jayashri H Patil(Madane),
More informationBlood Microscopic Image Analysis for Acute Leukemia Detection
I J C T A, 9(9), 2016, pp. 3731-3735 International Science Press Blood Microscopic Image Analysis for Acute Leukemia Detection V. Renuga, J. Sivaraman, S. Vinuraj Kumar, S. Sathish, P. Padmapriya and R.
More informationSpatial Topology of Equitemporal Points on Signatures for Retrieval
Spatial Topology of Equitemporal Points on Signatures for Retrieval D.S. Guru, H.N. Prakash, and T.N. Vikram Dept of Studies in Computer Science,University of Mysore, Mysore - 570 006, India dsg@compsci.uni-mysore.ac.in,
More informationAvailable online at ScienceDirect. Procedia Computer Science 59 (2015 )
Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 59 (2015 ) 419 426 International Conference on Computer Science and Computational Intelligence (ICCSCI 2015) Degree Centrality
More informationThe combination of palm print and hand geometry for biometrics palm recognition
International Journal of Video & Image Processing and Network Security IJVIPNS-IJENS Vol: 2 No: 0 The combination of palm print and hand geometry for biometrics palm recognition Dewi Yanti Liliana, Eries
More informationAvailable online at ScienceDirect. Procedia Computer Science 45 (2015 )
Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 45 (2015 ) 205 214 International Conference on Advanced Computing Technologies and Applications (ICACTA- 2015) Automatic
More informationTexture Image Segmentation using FCM
Proceedings of 2012 4th International Conference on Machine Learning and Computing IPCSIT vol. 25 (2012) (2012) IACSIT Press, Singapore Texture Image Segmentation using FCM Kanchan S. Deshmukh + M.G.M
More informationAn Efficient Character Segmentation Based on VNP Algorithm
Research Journal of Applied Sciences, Engineering and Technology 4(24): 5438-5442, 2012 ISSN: 2040-7467 Maxwell Scientific organization, 2012 Submitted: March 18, 2012 Accepted: April 14, 2012 Published:
More informationAUTOMATIC LOGO EXTRACTION FROM DOCUMENT IMAGES
AUTOMATIC LOGO EXTRACTION FROM DOCUMENT IMAGES Umesh D. Dixit 1 and M. S. Shirdhonkar 2 1 Department of Electronics & Communication Engineering, B.L.D.E.A s CET, Bijapur. 2 Department of Computer Science
More informationTumor Detection and classification of Medical MRI UsingAdvance ROIPropANN Algorithm
International Journal of Engineering Research and Advanced Technology (IJERAT) DOI:http://dx.doi.org/10.31695/IJERAT.2018.3273 E-ISSN : 2454-6135 Volume.4, Issue 6 June -2018 Tumor Detection and classification
More informationA Combined Method for On-Line Signature Verification
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 14, No 2 Sofia 2014 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2014-0022 A Combined Method for On-Line
More informationHCR Using K-Means Clustering Algorithm
HCR Using K-Means Clustering Algorithm Meha Mathur 1, Anil Saroliya 2 Amity School of Engineering & Technology Amity University Rajasthan, India Abstract: Hindi is a national language of India, there are
More informationProcessing of binary images
Binary Image Processing Tuesday, 14/02/2017 ntonis rgyros e-mail: argyros@csd.uoc.gr 1 Today From gray level to binary images Processing of binary images Mathematical morphology 2 Computer Vision, Spring
More informationA Hand Gesture Recognition Method Based on Multi-Feature Fusion and Template Matching
Available online at www.sciencedirect.com Procedia Engineering 9 (01) 1678 1684 01 International Workshop on Information and Electronics Engineering (IWIEE) A Hand Gesture Recognition Method Based on Multi-Feature
More informationA Study on the Consistency of Features for On-line Signature Verification
A Study on the Consistency of Features for On-line Signature Verification Center for Unified Biometrics and Sensors State University of New York at Buffalo Amherst, NY 14260 {hlei,govind}@cse.buffalo.edu
More information3D Object Recognition using Multiclass SVM-KNN
3D Object Recognition using Multiclass SVM-KNN R. Muralidharan, C. Chandradekar April 29, 2014 Presented by: Tasadduk Chowdhury Problem We address the problem of recognizing 3D objects based on various
More informationBiometrics Technology: Image Processing & Pattern Recognition (by Dr. Dickson Tong)
Biometrics Technology: Image Processing & Pattern Recognition (by Dr. Dickson Tong) References: [1] http://homepages.inf.ed.ac.uk/rbf/hipr2/index.htm [2] http://www.cs.wisc.edu/~dyer/cs540/notes/vision.html
More informationFinger Vein Biometric Approach for Personal Identification Using IRT Feature and Gabor Filter Implementation
Finger Vein Biometric Approach for Personal Identification Using IRT Feature and Gabor Filter Implementation Sowmya. A (Digital Electronics (MTech), BITM Ballari), Shiva kumar k.s (Associate Professor,
More informationA Survey on Feature Extraction Techniques for Palmprint Identification
International Journal Of Computational Engineering Research (ijceronline.com) Vol. 03 Issue. 12 A Survey on Feature Extraction Techniques for Palmprint Identification Sincy John 1, Kumudha Raimond 2 1
More informationA New Algorithm for Shape Detection
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 19, Issue 3, Ver. I (May.-June. 2017), PP 71-76 www.iosrjournals.org A New Algorithm for Shape Detection Hewa
More informationExtract an Essential Skeleton of a Character as a Graph from a Character Image
Extract an Essential Skeleton of a Character as a Graph from a Character Image Kazuhisa Fujita University of Electro-Communications 1-5-1 Chofugaoka, Chofu, Tokyo, 182-8585 Japan k-z@nerve.pc.uec.ac.jp
More informationComputer Science Faculty, Bandar Lampung University, Bandar Lampung, Indonesia
Application Object Detection Using Histogram of Oriented Gradient For Artificial Intelegence System Module of Nao Robot (Control System Laboratory (LSKK) Bandung Institute of Technology) A K Saputra 1.,
More informationImplementation of Dynamic Time Warping Method for the Vehicle Number License Recognition
International Journal of Electrical and Computer Engineering (IJECE) Vol. 4, No. 2, April 2014, pp. 278~284 ISSN: 2088-8708 278 Implementation of Dynamic Time Warping Method for the Vehicle Number License
More informationIdentifying and Reading Visual Code Markers
O. Feinstein, EE368 Digital Image Processing Final Report 1 Identifying and Reading Visual Code Markers Oren Feinstein, Electrical Engineering Department, Stanford University Abstract A visual code marker
More informationClassification of Printed Chinese Characters by Using Neural Network
Classification of Printed Chinese Characters by Using Neural Network ATTAULLAH KHAWAJA Ph.D. Student, Department of Electronics engineering, Beijing Institute of Technology, 100081 Beijing, P.R.CHINA ABDUL
More informationFootprint Recognition using Modified Sequential Haar Energy Transform (MSHET)
47 Footprint Recognition using Modified Sequential Haar Energy Transform (MSHET) V. D. Ambeth Kumar 1 M. Ramakrishnan 2 1 Research scholar in sathyabamauniversity, Chennai, Tamil Nadu- 600 119, India.
More informationA Novel Automated Approach for Offline Signature Verification Based on Shape Matrix
A Novel Automated Approach for Offline Signature Verification Based on Shape Matrix Sumbal Iqbal Ahmed Peshawar Pakistan Rashid Jalal Qureshi Emirates Aviation University Dubai,UAE Imran Khan Peshawar,
More informationPrototype Selection for Handwritten Connected Digits Classification
2009 0th International Conference on Document Analysis and Recognition Prototype Selection for Handwritten Connected Digits Classification Cristiano de Santana Pereira and George D. C. Cavalcanti 2 Federal
More informationRecognition of Unconstrained Malayalam Handwritten Numeral
Recognition of Unconstrained Malayalam Handwritten Numeral U. Pal, S. Kundu, Y. Ali, H. Islam and N. Tripathy C VPR Unit, Indian Statistical Institute, Kolkata-108, India Email: umapada@isical.ac.in Abstract
More informationSimulation of Zhang Suen Algorithm using Feed- Forward Neural Networks
Simulation of Zhang Suen Algorithm using Feed- Forward Neural Networks Ritika Luthra Research Scholar Chandigarh University Gulshan Goyal Associate Professor Chandigarh University ABSTRACT Image Skeletonization
More informationAvailable online at ScienceDirect. Energy Procedia 69 (2015 )
Available online at www.sciencedirect.com ScienceDirect Energy Procedia 69 (2015 ) 1885 1894 International Conference on Concentrating Solar Power and Chemical Energy Systems, SolarPACES 2014 Heliostat
More informationPolar Harmonic Transform for Fingerprint Recognition
International Journal Of Engineering Research And Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 13, Issue 11 (November 2017), PP.50-55 Polar Harmonic Transform for Fingerprint
More information2 Proposed Methodology
3rd International Conference on Multimedia Technology(ICMT 2013) Object Detection in Image with Complex Background Dong Li, Yali Li, Fei He, Shengjin Wang 1 State Key Laboratory of Intelligent Technology
More informationFeature Extractors. CS 188: Artificial Intelligence Fall Nearest-Neighbor Classification. The Perceptron Update Rule.
CS 188: Artificial Intelligence Fall 2007 Lecture 26: Kernels 11/29/2007 Dan Klein UC Berkeley Feature Extractors A feature extractor maps inputs to feature vectors Dear Sir. First, I must solicit your
More informationSkew Detection and Correction of Document Image using Hough Transform Method
Skew Detection and Correction of Document Image using Hough Transform Method [1] Neerugatti Varipally Vishwanath, [2] Dr.T. Pearson, [3] K.Chaitanya, [4] MG JaswanthSagar, [5] M.Rupesh [1] Asst.Professor,
More informationTexture Segmentation by Windowed Projection
Texture Segmentation by Windowed Projection 1, 2 Fan-Chen Tseng, 2 Ching-Chi Hsu, 2 Chiou-Shann Fuh 1 Department of Electronic Engineering National I-Lan Institute of Technology e-mail : fctseng@ccmail.ilantech.edu.tw
More informationHandwritten Signature Verification And Recognition Using ANN
Handwritten Signature Verification And Recognition Using ANN Mohan Mandaogade Saurabh Vishal Mhaske ABSTRACT Automatic person identification is one of the major concerns in this era of automation. However,
More informationA Study of Medical Image Analysis System
Indian Journal of Science and Technology, Vol 8(25), DOI: 10.17485/ijst/2015/v8i25/80492, October 2015 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 A Study of Medical Image Analysis System Kim Tae-Eun
More informationCOMBINING NEURAL NETWORKS FOR SKIN DETECTION
COMBINING NEURAL NETWORKS FOR SKIN DETECTION Chelsia Amy Doukim 1, Jamal Ahmad Dargham 1, Ali Chekima 1 and Sigeru Omatu 2 1 School of Engineering and Information Technology, Universiti Malaysia Sabah,
More informationMulti prototype fuzzy pattern matching for handwritten character recognition
Multi prototype fuzzy pattern matching for handwritten character recognition MILIND E. RANE, DHABE P. S AND J. B. PATIL Dept. of Electronics and Computer, R.C. Patel Institute of Technology, Shirpur, Dist.
More informationBiometric Security System Using Palm print
ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference
More informationHuman Gait Recognition using All Pair Shortest Path
2011 International Conference on Software and Computer Applications IPCSIT vol.9 (2011) (2011) IACSIT Press, Singapore Human Gait Recognition using All Pair Shortest Path Jyoti Bharti 1+, M.K Gupta 2 1
More informationA Generalized Method to Solve Text-Based CAPTCHAs
A Generalized Method to Solve Text-Based CAPTCHAs Jason Ma, Bilal Badaoui, Emile Chamoun December 11, 2009 1 Abstract We present work in progress on the automated solving of text-based CAPTCHAs. Our method
More informationTopic 6 Representation and Description
Topic 6 Representation and Description Background Segmentation divides the image into regions Each region should be represented and described in a form suitable for further processing/decision-making Representation
More informationHand Geometry Verification based on Chain Code and Dynamic Time Warping
Hand Geometry Verification based on Chain Code and Dynamic Time Warping I Ketut Gede Darma Putra Department of Electrical Engineering Udayana University, Bali, Indonesia Made Ari Sentosa Alumni of Department
More informationAUTOMATED STUDENT S ATTENDANCE ENTERING SYSTEM BY ELIMINATING FORGE SIGNATURES
AUTOMATED STUDENT S ATTENDANCE ENTERING SYSTEM BY ELIMINATING FORGE SIGNATURES K. P. M. L. P. Weerasinghe 149235H Faculty of Information Technology University of Moratuwa June 2017 AUTOMATED STUDENT S
More informationJournal of Applied Research and Technology ISSN: Centro de Ciencias Aplicadas y Desarrollo Tecnológico.
Journal of Applied Research and Technology ISSN: 1665-6423 jart@aleph.cinstrum.unam.mx Centro de Ciencias Aplicadas y Desarrollo Tecnológico México Singla, S. K.; Yadav, R. K. Optical Character Recognition
More informationA Comparison of Color Models for Color Face Segmentation
Available online at www.sciencedirect.com Procedia Technology 7 ( 2013 ) 134 141 A Comparison of Color Models for Color Face Segmentation Manuel C. Sanchez-Cuevas, Ruth M. Aguilar-Ponce, J. Luis Tecpanecatl-Xihuitl
More informationSEGMENTATION OF CHARACTERS WITHOUT MODIFIERS FROM A PRINTED BANGLA TEXT
SEGMENTATION OF CHARACTERS WITHOUT MODIFIERS FROM A PRINTED BANGLA TEXT ABSTRACT Rupak Bhattacharyya et al. (Eds) : ACER 2013, pp. 11 24, 2013. CS & IT-CSCP 2013 Fakruddin Ali Ahmed Department of Computer
More informationOffline Signature Verification using Grid based and Centroid based Approach
Offline Signature Verification using Grid based and Centroid based Approach Sayantan Roy Department of Computer Science Engineering ISM Dhanbad Jharkhand ABSTRACT Now a day s Signature verification is
More informationToward Part-based Document Image Decoding
2012 10th IAPR International Workshop on Document Analysis Systems Toward Part-based Document Image Decoding Wang Song, Seiichi Uchida Kyushu University, Fukuoka, Japan wangsong@human.ait.kyushu-u.ac.jp,
More informationImage enhancement for face recognition using color segmentation and Edge detection algorithm
Image enhancement for face recognition using color segmentation and Edge detection algorithm 1 Dr. K Perumal and 2 N Saravana Perumal 1 Computer Centre, Madurai Kamaraj University, Madurai-625021, Tamilnadu,
More informationTexture Feature Extraction Using Improved Completed Robust Local Binary Pattern for Batik Image Retrieval
Texture Feature Extraction Using Improved Completed Robust Local Binary Pattern for Batik Image Retrieval 1 Arrie Kurniawardhani, 2 Nanik Suciati, 3 Isye Arieshanti 1, Institut Teknologi Sepuluh Nopember,
More informationRULE BASED SIGNATURE VERIFICATION AND FORGERY DETECTION
RULE BASED SIGNATURE VERIFICATION AND FORGERY DETECTION M. Hanmandlu Multimedia University Jalan Multimedia 63100, Cyberjaya Selangor, Malaysia E-mail:madasu.hanmandlu@mmu.edu.my M. Vamsi Krishna Dept.
More informationOnline Feature Extraction Technique for Optical Character Recognition System
Online Feature Extraction Technique for Optical Character Recognition System Khairun Saddami 1,2, Khairul Munadi 1,2,3 and Fitri Arnia 1,2,3,* 1 Doctoral Program of Engineering, Faculty of Engineering,
More informationKeywords Wavelet decomposition, SIFT, Unibiometrics, Multibiometrics, Histogram Equalization.
Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure and Reliable
More informationCHAPTER 1 INTRODUCTION
CHAPTER 1 INTRODUCTION 1.1 Introduction Pattern recognition is a set of mathematical, statistical and heuristic techniques used in executing `man-like' tasks on computers. Pattern recognition plays an
More informationAvailable online at ScienceDirect. Procedia Computer Science 58 (2015 )
Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 58 (2015 ) 552 557 Second International Symposium on Computer Vision and the Internet (VisionNet 15) Fingerprint Recognition
More informationObject Classification Using Tripod Operators
Object Classification Using Tripod Operators David Bonanno, Frank Pipitone, G. Charmaine Gilbreath, Kristen Nock, Carlos A. Font, and Chadwick T. Hawley US Naval Research Laboratory, 4555 Overlook Ave.
More informationApplication of fuzzy set theory in image analysis. Nataša Sladoje Centre for Image Analysis
Application of fuzzy set theory in image analysis Nataša Sladoje Centre for Image Analysis Our topics for today Crisp vs fuzzy Fuzzy sets and fuzzy membership functions Fuzzy set operators Approximate
More informationFace Detection using Hierarchical SVM
Face Detection using Hierarchical SVM ECE 795 Pattern Recognition Christos Kyrkou Fall Semester 2010 1. Introduction Face detection in video is the process of detecting and classifying small images extracted
More informationREINFORCED FINGERPRINT MATCHING METHOD FOR AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM
REINFORCED FINGERPRINT MATCHING METHOD FOR AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM 1 S.Asha, 2 T.Sabhanayagam 1 Lecturer, Department of Computer science and Engineering, Aarupadai veedu institute of
More informationHandwritten Character Recognition with Feedback Neural Network
Apash Roy et al / International Journal of Computer Science & Engineering Technology (IJCSET) Handwritten Character Recognition with Feedback Neural Network Apash Roy* 1, N R Manna* *Department of Computer
More informationOFFLINE SIGNATURE VERIFICATION USING SUPPORT LOCAL BINARY PATTERN
OFFLINE SIGNATURE VERIFICATION USING SUPPORT LOCAL BINARY PATTERN P.Vickram, Dr. A. Sri Krishna and D.Swapna Department of Computer Science & Engineering, R.V. R & J.C College of Engineering, Guntur ABSTRACT
More informationImage Segmentation Based on Watershed and Edge Detection Techniques
0 The International Arab Journal of Information Technology, Vol., No., April 00 Image Segmentation Based on Watershed and Edge Detection Techniques Nassir Salman Computer Science Department, Zarqa Private
More informationAdaptive Neuro-Fuzzy Inference System for Texture Image Classification
2015 International Conference on Automation, Cognitive Science, Optics, Micro Electro-Mechanical System, and Information Technology (ICACOMIT), Bandung, Indonesia, October 29 30, 2015 Adaptive Neuro-Fuzzy
More informationThe Institute of Telecommunications and Computer Sciences, UTP University of Science and Technology, Bydgoszcz , Poland
Computer Technology and Application 6 (2015) 64-69 doi: 10.17265/1934-7332/2015.02.002 D DAVID PUBLISHIN An Image Analysis of Breast Thermograms Ryszard S. Choras The Institute of Telecommunications and
More information5 Database of Shoe marks
5 Database of Shoe marks This chapter has been derived from: Geradts Z; Keijzer J; The image-database REBEZO for shoe marks with developments on automatic classification of shoe outsole designs, Forensic
More informationShort Survey on Static Hand Gesture Recognition
Short Survey on Static Hand Gesture Recognition Huu-Hung Huynh University of Science and Technology The University of Danang, Vietnam Duc-Hoang Vo University of Science and Technology The University of
More information