AUTOMATED STUDENT S ATTENDANCE ENTERING SYSTEM BY ELIMINATING FORGE SIGNATURES

Similar documents
Advanced Migration of Schema and Data across Multiple Databases

Location Based Selling Platform for Mobile Buyers

Offline Signature verification and recognition using ART 1

GEO BASED ROUTING FOR BORDER GATEWAY PROTOCOL IN ISP MULTI-HOMING ENVIRONMENT

Migrate and Transfer Schema and Data across Multiple Databases

FINGER VEIN RECOGNITION USING LOCAL MEAN BASED K-NEAREST CENTROID NEIGHBOR AS CLASSIFIER

SCALABLE IN-MEMORY DATA MANAGEMENT MODEL FOR ENTERPRISE APPLICATIONS

ADAPTIVE VIDEO STREAMING FOR BANDWIDTH VARIATION WITH OPTIMUM QUALITY

INTELLIGENT NON-DESTRUCTIVE CLASSIFICATION OF JOSAPINE PINEAPPLE MATURITY USING ARTIFICIAL NEURAL NETWORK

Gesture based PTZ camera control

OpenFOAM on GPUs. Thilina Rathnayake R. Department of Computer Science & Engineering. University of Moratuwa Sri Lanka

ACKNOWLEDGEMENT. my PhD Supervisor Dr. Vidhyacharan Bhaskar, Professor, Department of

OFFLINE SIGNATURE VERIFICATION

A ROLE MANAGEMENT MODEL FOR USER AUTHORIZATION QUERIES IN ROLE BASED ACCESS CONTROL SYSTEMS A THESIS CH.SASI DHAR RAO

UNIVERSITI MALAYSIA PAHANG

STUDY ON THE USE OF PUBLIC DATA CENTERS FOR IT INFRASTRUCTURE OUTSOURCING IN SRI LANKA

STUDY ON THE EFFECT OF ORIENTATION ON PHTOTOVOLTAIC ARRAY OUTPUT IN SELECTED LOCATIONS OF SRI LANKA

Particle Swarm Optimization Methods for Pattern. Recognition and Image Processing

Signature Recognition by Pixel Variance Analysis Using Multiple Morphological Dilations

NOVATEUR PUBLICATIONS INTERNATIONAL JOURNAL OF INNOVATIONS IN ENGINEERING RESEARCH AND TECHNOLOGY [IJIERT] ISSN: VOLUME 2, ISSUE 1 JAN-2015

STUDY ON MATURITY OF BUSINESS CONTINUITY MANAGEMENT AND ICT RELIANCE IN SRI LANKA MASTER OF BUSINESS ADMINISTRATION IN INFORMATION TECHNOLOGY

University of Moratuwa

ACCELERATED COMPLEX EVENT PROCESSING WITH GRAPHICS PROCESSING UNITS

Enhanced Web Log Based Recommendation by Personalized Retrieval

Minutiae Based Fingerprint Authentication System

STANDARD REST API FOR

Fingerprint Identification System Based On Neural Network

Online Signature Verification Technique

Copyright is owned by the Author of the thesis. Permission is given for a copy to be downloaded by an individual for the purpose of research and

Approach to Increase Accuracy of Multimodal Biometric System for Feature Level Fusion

APPENDIX A. Sample of a report front cover TITLE OF PROJECT IN CAPITAL LETTERS. (Centered within prescribed margin) STUDENT S FULL NAME

Real Time Multi-Sensor Data Acquisition and Processing for a Road Mapping System

International Journal of Advance Engineering and Research Development

EXTRACTING GENERIC TEXT INFORMATION FROM IMAGES

Touchless Fingerprint recognition using MATLAB

Asymmetric Digital Subscriber Line As Internet Superhighway for Sri Lanka

TOMRAS: A Task Oriented Mobile Remote Access System for Desktop Applications

Offline Signature Verification using Grid based and Centroid based Approach

Off-line Signature Verification Using Neural Network

Building and Reusing Of Requirements Repository

Handwritten Script Recognition at Block Level

Face Detection using Color based method with lighting compensation scheme

Offline Handwritten Signatures Classification Using Wavelet Packets and Level Similarity Based Scoring

Tumor Detection and classification of Medical MRI UsingAdvance ROIPropANN Algorithm

Komal Patiyal 1, Sanjay 2 1,2 Computer Science & Engineering, Himachal Pradesh Technical University,Hamirpur. IJRASET: All Rights are Reserved

Cursive Handwriting Recognition System Using Feature Extraction and Artificial Neural Network

Suspicious Activity Detection of Moving Object in Video Surveillance System

(Cover Page) TITLE OF THE THESIS TITLE OF THE THESIS TITLE OF THE THESIS (Not more than 3 lines. CAPS Times New Roman Font size 20)

Improving Latent Fingerprint Matching Performance by Orientation Field Estimation using Localized Dictionaries

The adaptive serializable snapshot isolation protocol for managing database transactions

Multimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint

The Discovery and Retrieval of Temporal Rules in Interval Sequence Data

ALGORITHMIC ASPECTS OF DOMINATION AND ITS VARIATIONS ARTI PANDEY

A Frequent Max Substring Technique for. Thai Text Indexing. School of Information Technology. Todsanai Chumwatana

REINFORCED FINGERPRINT MATCHING METHOD FOR AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM

Handwritten Hindi Numerals Recognition System

DEVANAGARI SCRIPT SEPARATION AND RECOGNITION USING MORPHOLOGICAL OPERATIONS AND OPTIMIZED FEATURE EXTRACTION METHODS

An agent-based peer-to-peer grid computing architecture

Simulation of Zhang Suen Algorithm using Feed- Forward Neural Networks

Learning to Recognize Faces in Realistic Conditions

Automatic Static Signature Verification Systems: A Review

Handwritten Devanagari Character Recognition Model Using Neural Network

ADAPTIVE TILE CODING METHODS FOR THE GENERALIZATION OF VALUE FUNCTIONS IN THE RL STATE SPACE A THESIS SUBMITTED TO THE FACULTY OF THE GRADUATE SCHOOL

IJESRT. Scientific Journal Impact Factor: (ISRA), Impact Factor: 1.852

IMAGE SEGMENTATION USING THRESHOLDING. Submitted By- Raya Dutta Registration no

Encryption of Text Using Fingerprints

Graph Geometric Approach and Bow Region Based Finger Knuckle Biometric Identification System

Copyright is owned by the Author of the thesis. Permission is given for a copy to be downloaded by an individual for the purpose of research and

Face Recognition using Eigenfaces SMAI Course Project

ONLINE SIGNATURE VERIFICATION TECHNIQUES

Robust PDF Table Locator

I. INTRODUCTION. Image Acquisition. Denoising in Wavelet Domain. Enhancement. Binarization. Thinning. Feature Extraction. Matching

Face Recognition for Mobile Devices

CS231A Course Project Final Report Sign Language Recognition with Unsupervised Feature Learning

HANDWRITTEN SIGNATURE VERIFICATION USING NEURAL NETWORK & ECLUDEAN APPROACH

Face Recognition Using Vector Quantization Histogram and Support Vector Machine Classifier Rong-sheng LI, Fei-fei LEE *, Yan YAN and Qiu CHEN

Design of Digital Signature Verification Algorithm using Relative Slopemethod

Face Detection using Hierarchical SVM

Spam Filtering Using Visual Features

Dedication. To the departed souls of my parents & father-in-law.

Ref: NU/REG/E1/ / Date: CIRCULAR

Tree Rule Firewall. A Thesis Submitted for the Degree of. Doctor of Philosophy. Thawatchai Chomsiri. Faculty of Engineering and Information Technology

Abstract -Fingerprints are the most widely. Keywords:fingerprint; ridge pattern; biometric;

Biometric Security Roles & Resources

Department of Electronic Engineering FINAL YEAR PROJECT REPORT

A Framework for Efficient Fingerprint Identification using a Minutiae Tree

Dietrich Paulus Joachim Hornegger. Pattern Recognition of Images and Speech in C++

College of Sciences. College of Sciences. Master s of Science in Computer Sciences Master s of Science in Biotechnology

AN EFFICIENT BINARIZATION TECHNIQUE FOR FINGERPRINT IMAGES S. B. SRIDEVI M.Tech., Department of ECE

An Efficient Iris Recognition Using Correlation Method

Graduate School website:

ISSN: ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 4, July 2013

A Directional Feature with Energy based Offline Signature Verification Network

FINGERPRINT DATABASE NUR AMIRA BINTI ARIFFIN THESIS SUBMITTED IN FULFILMENT OF THE DEGREE OF COMPUTER SCIENCE (COMPUTER SYSTEM AND NETWORKING)

CPSC 695. Geometric Algorithms in Biometrics. Dr. Marina L. Gavrilova

Postgraduate Diploma in Marketing

Knowledge libraries and information space

Extracting Layers and Recognizing Features for Automatic Map Understanding. Yao-Yi Chiang

Development of an Automated Fingerprint Verification System

One type of these solutions is automatic license plate character recognition (ALPR).

Transcription:

AUTOMATED STUDENT S ATTENDANCE ENTERING SYSTEM BY ELIMINATING FORGE SIGNATURES K. P. M. L. P. Weerasinghe 149235H Faculty of Information Technology University of Moratuwa June 2017

AUTOMATED STUDENT S ATTENDANCE ENTERING SYSTEM BY ELIMINATING FORGE SIGNATURES K. P. M. L. P. Weerasinghe 149235H Dissertation submitted to the Faculty of Information Technology, University of Moratuwa, Sri Lanka for the partial fulfillment of the requirements of the Degree Master of Science in Information Technology. June 2017

Declaration We declare that this thesis is our own work and has not been submitted in any form for another degree or diploma at any university or other institution of tertiary education. Information derived from the published or unpublished work of others has been acknowledged in the text and a list of references is given. K. P. M. L. P. Weerasinghe Date: Supervised by Mr. B. H. Sudantha Date: I

Acknowledgement First and foremost, I would like to express my deepest gratitude to my supervisor, Mr. B. H. Sudantha, for his dedicated guidance, invaluable advice, and constant encouragement throughout my master study. I am also indebted to him for the efforts he has devoted to serious consultations and serious review of this thesis. His enthusiasm and insights in many research problems have provided me with a source of thoughts and actions. I am thankful to lecturer, the Head of the Department of Information Technology, Dr. L. Ranathunga for his help to understanding Image Processing Techniques during the course module IN 5610. This thesis would not have been completed without the constant support of my husband Mr. Lakshan Aponsu. I would express my wordless thanks to my husband for his deep understanding and encouragement during these years. II

Abstract Entering student s attendance into the excel sheets for each of the subjects, is very difficult, time consuming process. At the beginning of some course modules, the number of registered students are unknown. Lecturers use papers to take students attendance, so that the entering of student s attendance is more complex. Automated student s attendance entering system can be used to simplify the task. To build up such a system signature recognition and verification is important. The signature of a person is an important biometric attribute of a human being which can be used to authenticate human identity. To automate the process, this thesis consists of 3 phases. Signature identification and extraction from the attendance sheets and classification for testing process, Signature recognition by comparing each signature in the database and recognize the owner of the signature and the last phase is signature verification to identify whether the signature is original or counterfeit. In each phase, necessary image processing techniques are applied and useful features are extracted from each signature. Support Vector Machine (SVM) is used for classification of signatures extracted from attendance sheets. For signature recognition, multiclass Support Vector Machine is used and analyze using Fault Acceptance Ratio (FAR) and Fault Rejection Ratio (FRR) to check the accuracy of the classifier. Signature database consists only genuine signatures of each signer so that in signature verification stage a machine learning technique, Kolmogorov Smirnov test is used to verify the signature is belong to the original and if it is not match with the particular student s signature, taken as zero. In this paper, off-line signature recognition & verification is proposed, where the signature is captured and presented to the user in an image format. A software package, Matlab2016b is used for this procedure. The described method in this thesis represents an effective and accurate approach to automatic signature recognition and verification. It is capable of matching the test signatures with the database of 83.33% accuracy. It is capable of classifying all signatures in the attendance sheet of 100% accuracy. In this work, it verifies 100% of signatures is original. Eventually, based on the methodologies employed in this thesis, it provides a promising stage for the development of an automated online signature detection system. III

Contents Acknowledgements.i Abstract.. ii List of Tables....iii List of Figures...iv Chapter 1 Introduction 1.1 Prolegomena..1 1.2 Background and Motivation for Automate the Signature Extraction, Recognition and Verification Process...2 1.3 Problem in Brief.3 1.4 Research Objectives...3 1.5 Outline of this Thesis.4 1.6 Summary 4 Chapter 2 Review of Literature 2.1 An Overview of Document Signature Extraction.6 2.2 An Overview of Signature Recognition & Verification 6 2.2.1 Neural Network Approach..7 2.2.2 Support Vector Machine Approach 8 2.2.3 Hidden Markov Model Approach...8 2.2.4 Neural Fuzzy Based Approach...9 2.3 Another Approaches for Signature Verification..10 IV

2.3.1 Image based approach..10 2.3.2 Statistical approach...10 2.3.3 Template matching approach 11 2.4 Future Challenges of Signature Recognition and Verification 11 2.5 Summary..12 Chapter 3 Signature Based Systems 3.1 Types of Signatures..13 3.2 Types of Signature Forgeries...13 3.3 Background of Signature Extraction from Scanned Documents.13 3.4 Background of Signature Recognition and Verification..14 3.5 Types of Signature Recognition and Verification Systems.14 3.5.1 Off-Line or Static Signature Recognition and Verification..14 3.5.2 On-Line or Dynamic Signature Recognition and Verification.16 Chapter 4 Proposed Approach 4.1 Signature Classification using Support Vector Machine.17 4.2 Signature Recognition using Multiclass Support Vector Machine..20 4.2.1 Signature Recognition Workflow.20 4.2.2 Error Correcting Output Code Multiclass Model.21 4.3 Signature Verification using Kolmogorov Smirnov Test 22 4.3.1 Person Dependent Learning (Person Specific learning)...23 4.3.2 Within-person Distribution...23 4.3.3 Person Dependent Classification..24 4.3.4 Comparing Distributions...25 4.3.5 Kolmogorov-Smirnov Test...25 V

4.3.6 Person-Dependent Method...26 Chapter 5 Experimental Setup 5.1 Signature Identification and Extraction from Scanned Attendance Sheets 27 5.1.1 Convert RGB to Grayscale...27 5.1.2 Binarization..28 5.1.3 Edge Detection.29 5.1.4 Remove Unnecessary Pixels.30 5.1.5 Morphological Dilation 31 5.1.5.1 Thicken..32 5.1.5.2 Bridge...33 5.1.6 Image Segmentation and Cropping..34 5.2 Signature Classification using Binary SVM...35 5.3 Signature Recognition.35 5.3.1 Signature Acquisition...35 5.3.2 Image Preprocessing.36 5.3.2.1 Convert RGB to Grayscale 37 5.3.2.2 Binarization...37 5.3.2.3 Remove Unnecessary Pixels.37 5.3.2.4 Thinning 38 5.3.2.5 Auto Cropping of Signature..38 5.3.3 Feature Extraction 39 5.3.3.1 Global Features.40 5.3.3.2 Local Features...41 5.4 Signature Verification.42 5.4.1 Algorithm for KS Test..42 VI

5.4.2 Writing Data to Excel Sheets...45 Chapter 6 Results and Discussion 6.1 Signature Extraction Process..46 6.1.1 Results Analysis in Signature Classification using Binary SVM...47 6.2 Signature Recognition and Verification Process 47 6.2.1 Kolmogorov Smirnov Test Performance Measure..48 Chapter 7 Conclusion...50 References...52 Appendix..56 VII

List of Tables Table 5.1: Sample distance distribution of known signature...44 Table 5.2: Sample distance distribution of known vs questioned 44 VIII

List of Figures Figure 1.1: An illustration of the differences between the three areas of application for signature matching 2 Figure 4.1: A brief outline of proposed framework for signature extraction 17 Figure 4.2: Support vectors which are closest to hyperplane.18 Figure 4.3: Signature recognition workflow.20 Figure 4.4: Signature verification where a questioned signature(right) is matched against five knowns...22 Figure 4.5: Comparing all possible genuine-genuine pairs..24 Figure 4.6: The steps of KS test for signature verification...26 Figure 5.1: Grayscale image of scanned attendance sheet...28 Figure 5.2: Binarize image of scanned attendance sheet..29 Figure 5.3: Detected edges of scanned attendance sheet..30 Figure 5.4: Filtered image of scanned attendance sheet...31 Figure 5.5: Scanned attendance sheet by applying close operator..32 Figure 5.6: Scanned attendance sheet by applying thicken operator.33 Figure 5.7: Bridged image of scanned attendance sheet..34 Figure 5.8: Scanned attendance sheet marked patches with a box. 35 Figure 5.9: Sample of signatures 36 Figure 5.10: Variation of a signature of the same person 36 Figure 5.11: Grayscale signature image.37 Figure 5.12: Binarized signature image.37 Figure 5.13: Signature image after removing unwanted pixels...38 Figure 5.14: Signature image after thinning.38 IX

Figure 5.15: Signature image with area cropped..39 Figure 5.16: Partitioned signature into 4 parts.40 Figure 5.17: HOG features extracted from one signature...42 Figure 5.18: Signature recognized as genuine by verification process...45 Figure 5.19: Enter attendance records into excel sheet 45 Figure 6.1: Signature image with multiple bounded regions due to discontinuity 46 Figure 6.2: Signature image after removing the discontinuity 46 Figure 6.3: Misclassification of a signature...48 X