JOURNAL OF COMPUTER SCIENCE AND ENGINEERING, VOLUME 3, ISSUE 2, OCTOBER 2010

56

A comparison among Features Used in Offline Signature Verification Systems Nabil A. Lashin, Hanaa M. Hamza

Abstract—Many features have been used for signature verification systems in the last decades. A comparison among the most commonly used sets of features (Global, Moments, Grid, and Texture) has been presented in this paper. The proposed system combines the results of using global, moments, grid, and texture features, then compares among the effectiveness of using each feature individually and using the combined results. For each set of features a multi-layer perceptrons (MLP) neural network is used as a first and preliminary stage classifier. Then taking the average of these individual outputs represents the final decision. The system is tested and proved experimentally that combining various feature sets in verification process achieves better results than using individual features. Moreover, the proposed system can detect the different types of forgeries in low false acceptance rate (FAR). Index Terms— Global features, Grid features, moment invariants, neural network, offline signature verification, texture features.

——————————  ——————————

1 INTRODUCTION andwritten signature reflects unique characteristics for each signer. Signature can be composed of clear written letters or symbols or undefined patterns. Automatic signature based applications have a wide spread domain because it is easier for human to write his signature when he / she is asked to do, and the devices used to automatically capture the signature is cheaper than other devices used to capture other biometrics. These applications may aim to recognize the signer through his / her signature, or aim to verify if the queried signature is signed by the claimed signer. This paper presents a model system for automatic signature verification. A signature verification system should be able to differentiate between the genuine signature and the forgery one. By forgery is meant copying, falsifying, or altering any kind of written or printed matter for the purpose of defrauding others [1]. There are three different types of forgeries to be recorded: first one is random forgery which is written by the person who doesn’t know the shape of genuine signature, and just knows the signer's name. The second, called simple forgery, which is represented by a signature sample, written by the person who knows the shape of original signature without much practice. The last type is skilled or simulated forgery, represented by a trained imitation of the genuine signature. Signature verification systems exist in two different categories based on the way the signatures are captured. They can be either online or offline systems. In online systems, an electronic tablet with a special pen is used to capture the signature during the signing process. Dynamic information can be stored online such as: pen pressure, timing and speed. In offline systems, a scanner is used to capture the signature after the signing process is completed. Online systems are more accurate than offline because of using dynamic data which is difficult to be forged. The forger always tries to imitate the shape of the signature not how the signature was made. But

H

————————————————

Nabil A. Lashin, Lecturer - Faculty of Computers and Informatics, Zagazig University. Hanaa M. Hamza, Demonstrator - Faculty of Computers and Informatics, Zagazig University.

using these systems requires the presence of the signer during the capturing process, so it may be undesirable in some applications. To authenticate documents which are signed every day in official issues, using offline systems is more suitable and quicker than online ones. Other systems try to combine the benefits of both online and offline systems.[2, 3] It captures the online signature dynamically at the registration phase to capture more than one reference signature. After that at each transaction, the signature can be put on any paper and captured offline. This paper interests in offline signature verification system as a trial to enhance its results because of the needing for such systems in many security based applications. Such systems are composed of two phases: registration phase, which is done only once at which the signer is asked to give many reference signatures to let the system learns its characteristics. The second phase is a testing phase at which the signer signs to test the system which is already learnt, and this is done at each time the signer needs to query the system. During each phase basic steps are done as follow: preprocessing, feature extraction, classification, and performance evaluation. The architecture of the proposed model is exhibited in Fig. 1. In which four features sets are extracted. Each set's results are fed into an artificial neural network as a first stage classifier, then try to combine the output results by taking the average to give the final decision. A complete classifier is being implemented for each signer to allow for the system to be dynamically add / remove signers to system database [4].

2. SYSTEM ARCHITECTURE The following figure presents the architecture of the proposed system for offline signature verification based on four different sets of features. The system consists as shown of four phases. These phases are preprocessing, feature extraction, Multi-layer perceptrons (MLP) neural network classifier built for each feature set, and the final decision tool which combines the decisions of the previous stage to verify the queried signature and decide if it is genuine or forged. The following sections will discuss each phase in more details.

JOURNAL OF COMPUTER SCIENCE AND ENGINEERING, VOLUME 3, ISSUE 2, OCTOBER 2010

57 Captured queried Signature Preprocessing

Feature Extraction

Global Features 14

Classification

MLP

Moments Features 84

Grid Features 96

MLP

Texture Features 48

MLP

MLP

Taking the average

Output the final decision (Genuine, or Forgery)

Fig. 1. Structure of the proposed system in the testing phase.

2.1 Preprocessing This stage is considered as the first treatment with the signatures or preprocessing phase. At which the captured signatures are converted into binary data images in the aim of preparing the signature for the next phase.

Where size X and size Y represent both the horizontal and vertical dimensions of the signature, xi and yi the coordinates of each image pixel, CmImgX and CmImgY the center of gravity in both directions, and totPixImg the total number of pixels in the image.

2.2 Feature extraction Each set of features provides a specific kind of information about the signature topography. The extracted global features are concerned with the structure of the whole signature. The extracted moments features form shape descriptors which are invariant with respect to translation, scale, and rotation. The extracted grid features divide the captured signature into grids to extract each grid local features. While the extracted texture features collect the information about the transitions of black and white pixels.

– Out Ratio [2]



Global Features -

The ratio of pixels (4) localized outside the rectangle (totPixOut) formed by one standard deviation of the pixels previously determined around the mean and the total number of pixels in the image (totPixImg):

totPixOut OutR =

(4)

totPix Im g

Where both SD_X and SD_Y [2] are defined as the distribution of the pixels around the X axis and Y axis respectively as exhibited in (1),(2).

Aspect Ratio [2]

The aspect ratio (3) of the signature is calculated by the ratio of the standard deviation of the pixels in relation to the center of gravity of the signature on both the horizontal and vertical directions. sizeX 2 (1) ∑ ( x i − Cm Im gX ) / totPix Im g SD x = i =1

– Vertical and Horizontal Center [4],[5],[6] Both the vertical center Cy and horizontal center Cx are given by (5) and (6) respectively. y max



C

y

=



y

y =1 x max x =1

x max

sizeY

SD y = Pr op =

2

∑ ( y − Cm Im gY ) / totPix Im g i =1 i SD x SD y

(2)

(3)



C

x

=



x =1

x =1



∑ x∑ x =1 x max

x max

y max y =1

y max y =1



y max y =1

b[ x, y ]

(5)

b[ x, y ]

b[ x , y ] b[ x , y ]

Where b[x, y] are the foreground pixel.

(6)

JOURNAL OF COMPUTER SCIENCE AND ENGINEERING, VOLUME 3, ISSUE 2, OCTOBER 2010

58 – Base line shift [4] It is defined as the difference between the vertical centers of gravity (5) of the left and the right part of the image. It is considered as a measure for the orientation of the signature. - Maximum Vertical and Horizontal Projection [4,5,6] The vertical projection of the skeletonized signature image is calculated. The highest value of the projection histogram is considered as the maximum vertical projection. Also, the horizontal projection histogram is calculated and the highest value of it and considered as the maximum horizontal projection. - Vertical and Horizontal Projection Peaks [4]



The number of the local maxima of the vertical projection histogram is considered as a vertical projection peaks while the number of the local maxima of the horizontal projection histogram is considered as horizontal projection peak. - Number of Edge and Cross Points [4,5,6] Edge points are defined as signature points that have only one 8-neighbor. While, cross points are defined as signature points that have at least three 8-neighbors. - Number of closed loops [4] The number of closed loops (CL) can be defined as given by (7) where EP represents the number of edge points and EL represents the number of extra departures and can be determined by (8).

CL = 1 +

EL =



EL − EP 2

[( Number of 8−nighbors ) − 2]

(7)

(8)

It is noticed that if the skeletonized signature image is not compact, that is, the signature is divided into two or more non overlapping segments, the number of closed loops, will have no physical meaning. But still, this number can describe the amount of complexity that the signature lines involve. Moments Features [7]

Moments are used in image analysis where they are considered the best descriptor for the image feature. Hu (1962) defines seven values, computed by normalizing central moments through order three, that are invariant to object scale, position, and orientation. The signature is rotated from 0o to 360o in 30o increments, the seven moments' values are extracted correspond to twelve different rotation angle. So, for each signature 84 features are extracted. •

Texture Features [4]

The texture feature values are calculated using the cooccurrence matrices. As shown in Equation 9 the co-occurrence matrix is a 2 * 2 matrix which describes the transition of black and white pixels. p p  P d [ i , j ] =  p 00 p 01  , 11   10 (9) where p00 is the number of times that two white pixels occur, separated by d. p01 is the number of times that a combination of a white and a black pixel occurs, separated by d. p10 is the same as p01. p11 is the number of times that two black pixels occur, separated by d. The image is divided into six rectangular segments (3 * 2). For each segment the P(1,0), P(1,1), P(0,1) and P(-1,1) matrices are calculated and the P01 and P11 elements of these matrices are used as texture features of the signature. So, totally 48 features are calculated. 2.3 Classifier

All cross Po int s



Fig. 2. The grid feature vector of a signature.

Grid Features [4]

The grid feature vector has 96 values calculated from dividing the signature's image into 96 rectangular segments (12 * 8), and for each segment, the sum of foreground pixels is calculated. A signature image and the corresponding grid feature vector are shown in Fig. 2. A black rectangle indicates the maximum number of black pixels, and a white rectangle indicates the smallest number of black pixels.

For each signer an individual two stage classifier is being implemented as cited before to easily add / remove signers to the proposed system. An artificial neural network classifier for each set of features forms the first stage classifier, and then in the second stage a combining classifier is built by calculating the average of the previous stage’s outputs. As shown in Fig. 3, MLP neural network for each feature set consists of 2 layers (2 neurons in a single hidden layer, 1 neuron in the output layer). The learning phase of the first stage classifier is done using 16 reference signatures collected from each signer in the registration phase. Through the testing phase presented by Fig. 1, the verification scenario will be as follow: the queried signature's features are extracted, and then these values will be presented to the classifier of the claimed signer to decide if this signature is genuine or forged one.

JOURNAL OF COMPUTER SCIENCE AND ENGINEERING, VOLUME 3, ISSUE 2, OCTOBER 2010

1 2 3 . . . n

Output

Inputs Where n, is the number of features in the feature’s set. (n = 14 in the Global Feature set ANN, n = 84 in the Moments Feature set ANN, n = 96 in the Grid Feature set ANN, and n = 48 in the Texture Feature set ANN)

59 There is no unique database for Automatic Signature Verification systems. Previous researches considered the attributes of their used databases during the system's development. To have a precise automatic signature verification system the behavioral features of the signer should be considered and the system should be customized based on the signers' attributes [8]. In the proposed system, signatures are taken from different signers with various signatures' styles which vary among clear Arabic letters; English letters, and patterns which vary in its writing direction. The forged samples are signed by different volunteers. Sample signatures from the database are shown in Fig. 4.

Fig. 3. MLP for each feature set.

3. SIGNATURE DATABASE SIGNER NAME

ORIGIN

RANDOM FORGED

SIMPLE FORGED

SKILLED FORGED

Mohamed Hamza Manar Sabry Fatma Hamed Sabry Morsy Samar Sabry Mohamed Hassan Abd-El rahman Mohamed Hosni Shabana

Nora Zaki

Akmal sleem Fig. 4. A sample from database.

As indicated in Table 1, samples are collected from 55 signers. For training, 16 references genuine, 8 random forgeries, 8 simple forgeries, and 8 skilled forgeries are used as commonly developed [9]. For testing, 8 genuine, and 24 forged ones represents three types of forgeries.

Random

TABLE 1 : VERIFICATION DATABASE

Forged

For 55 Signers, Number of Signatures

Genuine

8 * 55

Random

8 * 55

Training Set

Genuine

16 * 55

Forged Simple Forged Skilled

Testing Set

8 * 55 8 * 55 8 * 55

JOURNAL OF COMPUTER SCIENCE AND ENGINEERING, VOLUME 3, ISSUE 2, OCTOBER 2010 (Unseen

Forged

during

Simple

training

Forged

process)

Skilled

8 * 55 8 * 55

Forged

4. SYSTEM'S PERFORMANCE In the feature extraction phase, a comparison among the times consumed to extract each set of features from on signature is recorded. As shown in Fig. 5, it is clear that Grid features are extracted in the least time, while moments features take a longest time to be extracted. Time to extract features from one signature 1.4 1.2

Minutes

1 0.8

60 - False Acceptance Rate (FAR): if the forged signature is accepted falsely as genuine one. - False Reject Rate (FRR): if the genuine signature is rejected falsely as forged one Minimizing FAR rate is considered better than FRR because the person can always be given a second chance to verify his/her identity [7]. - Correct Acceptance Rate (CAR): if the genuine signature is accepted correctly as genuine one. - Correct Rejection Rate (CRR): if the forged signature is rejected correctly as forged one. 4.1 Using feature sets individually The first stage classifier is consisted of 4 MLP, one network for each feature set. In testing phase, a queried signature is presented to the system, given a candidate signer name. The output of each one of these classifiers should be close to ``1'' if the signature is genuine or close to ``0'' if it is a forged signature. The features are ranked according to the minimum FAR as follows: global, grid, moments, and texture. So, the global features achieve the minimum error rate in forgery detection.

0.6

4.2 Combining the feature set's outputs

0.4 0.2 0

Global

Minutes 0.333333333

Moments

Grid

Texture

1.25

0.125

0.208333333

Feature Sets

Fig. 5. Time Complexity.

In the second stage, the outputs of the previous stage are averaged to constitute the final decision. The experimental results are summarized at Table 2. It is noticed that the second stage in the classifier which combines the outputs of the individual features has the minimum FAR that is reached nearly to zero. So, the system won't accept falsely the queried signature as genuine where it is forged one. Moreover, it is clear that the maximum CRR is reached; hence the system will reject correctly the forged signatures.

The classifier system is evaluated using the following statistical evaluation parameters: TABLE 2 : THE EXPERIMENTAL RESULTS. Origin Signatures

Global Moments Grid Texture

Simple Forgeries

Skilled Forgeries

FRR

CAR

FAR

Random Forgeries CRR

FAR

CRR

FAR

CRR

23.86 3.86 17.05 58.41

76.14 96.14 82.95 41.59

2.73 12.95 3.18 18.86

97.27 87.05 96.82 81.14

2.05 11.59 4.32 11.59

97.95 88.41 95.68 88.41

2.05 11.82 3.64 16.82

97.95 88.18 96.36 83.18

11.14

88.86

0.45

99.55

0.45

99.55

0.68

99.32

Combining classifier

5. CONCLUSION The paper presents a model that compares the effectiveness of using various sets of features in signature verification systems. The tested features are classified to four sets: global, moments, grid, and texture features. Each set is adequate to discriminate among signatures, and provides a specific kind of information. This paper compares among these features, and then the proposed system's final decision is based on the average function which combines the outputs of the four feature sets' classifiers. The proposed model achieve the least FAR in

forgery detection, so these results are satisfactory compared to the results of the previous presented systems. The proposed comparison may be considered as a guide for the coming automatic signature verification systems; according to the sensitivity of the automatic signature verification system's application, the suitable set of features can be chosen and extracted. Further work could be repeating these experiments using larger data sets, and by adding more new features.

JOURNAL OF COMPUTER SCIENCE AND ENGINEERING, VOLUME 3, ISSUE 2, OCTOBER 2010

61

REFERENCES [1] Rasha Abbas, B.E., “Backpropagation Networks Prototypes for Off-line Signature Verification". Master Thesis, Department of Computer Science, RMIT, 1994. [2] A. Zimmer and L.L. Ling, "Offline Signature Verification System Based on the Online Data". EURASIP Journal on Advances in Signal Processing, 2007. 2008(Article ID 492910): p. 16 pages. [3] Y. Qiao, J. Liu, and X.Tang, "Offline Signature Verification Using Online Handwriting Registration". Computer Vision and Pattern Recognition, CVPR '07. IEEE Conference 2007: p. 1-8. [4] H. Baltzakis and N. Papamarkos, "A new signature verification technique based on a two-stage neural network classifier". Engineering Applications of Artificial Intelligence, 2001: p. 95-103. [5] E. Özgündüz, T. Şentürk, and M. Elif Karslıgil, "Off-Line Signature Verification and Recognition by Support Vector Machine". 13th European Signal Processing Conference, 2005. [6] I. Barbantan, C. Vidrighin, and R. Borca, "An Offline System for Handwritten Signature Recognition". IEEE Xplore, 2009. [7] Oz, C., "Signature Recognition and Verification with Artificial Neural Network Using Moment Invariant Method". Advances in Neural Networks - Second International Symposium on Neural Networks. Proceedings, Part II., 2005. 3497: p. 195-202. [8] S. Ghandali and M. Moghaddam, "Off-Line Persian Signature Identification and Verification Based on Image Registration and Fusion". Journal of Multimedia, North America, 4, 2009. [9] M. K. Kalera, S. Sriharly, and A. Xu, "Offline Signature Verification and Identification Using Distance Statistics". International Journal of Pattern Recognition, and Artificial Intelligence, 2004. 18(7): p. 1339 – 1360.

A comparison among Features Used in Offline ...

JOURNAL OF COMPUTER SCIENCE AND ENGINEERING, VOLUME 3, ISSUE 2, OCTOBER 2010. 56. A comparison ... Abstract—Many features have been used for signature verification systems in the last decades. ... acceptance rate (FAR).

135KB Sizes 0 Downloads 173 Views

Recommend Documents

Bag-of-Features Representations for Offline ...
[4]). However, their application in document analysis and recognition is rather ... paper is the integration of a learned statistical bag-of-features model with an ...

Comparison of Tabulation Methods Used by Two 1985 ...
The arguments to support the justification for adopting the AFA policy of dropping ... Movement of Contestants Into and Out of Award Categories. Using Different ...

Offline Data Synchronization in IPMS
In this paper, "Offline mode" development for the UP (University of Prishtina) ... [5] proposes “Evaluation of contact synchronization algorithm for the android ...

stability of language features: a comparison of the wals ...
probably refers to alignment in VPs). 2. Accusative alignment ..... features. Available online: http//email.eva.mpg.de/~wichmann/WichmannHolmanIniSubmit.pdf .

Interacting with Features in GPlates
See ​www.earthbyte.org/Resources/earthbyte_gplates.html​ for EarthByte data sets. Background. GPlates ... Feature Type box at the top of the window). .... Indonesian Gateway and associated back-arc basins, Earth-Sci. Rev., vol 83, p.

Interacting with Features in GPlates
... the new changes. See the GPlates online manual for further information: ... In this exercise we will learn how to query features. To start with we .... 85-138, 1995. Gaina, C., and R. D. Müller, Cenozoic tectonic and depth/age evolution of the.

A New Crossover Operator Used In Genetic Algorithm ...
JOURNAL OF COMPUTER SCIENCE AND ENGINEERING, VOLUME 5, ISSUE 1, JANUARY 2011. 29 ... in the second parent will define which cells in the first.

comparison
I She's os tall as her brother. Is it as good as you expected? ...... 9 The ticket wasn't as expensive as I expected. .. .................... ............ . .. 10 This shirt'S not so ...

Resource Scheduling Algorithms used in Cloud: A ...
IJRIT International Journal of Research in Information Technology, Volume 2, ... Weighted Round Robin algorithm, Minimum Connection Degrees algorithm, ...

Job Satisfaction among Doctors in a Tertiary Care ... - JK Science
Job satisfaction is very important but very less studied issue.This study was an ... increased productivity/performance (1) and negatively with absenteeism and ...

comparison
1 'My computer keeps crashing,' 'Get a ......... ' . ..... BORN: WHEN? WHERE? 27.7.84 Leeds. 31.3.84 Leeds. SALARY. £26,000 ...... 6 this job I bad I my last one.

A comparison of loop closing techniques in monocular SLAM
Careful consideration is given to the distinctiveness of the features – identical but indistinctive observations receive a low probability of having come from the same place. This minimises false loop closures. • Image–to–map – Corresponden

Modesty in selfpresentation: A comparison between the USA and Japan
Modesty in self-presentation: A comparison between the USA and Japanajsp_ 60..68. Toshio Yamagishi,1 Hirofumi Hashimoto,1 Karen S. Cook,2 Toko Kiyonari,3. Mizuho Shinada,1 Nobuhiro Mifune,1 Keigo Inukai,1 Haruto Takagishi,1 Yutaka Horita1 and Yang Li

Description of Algorithms used in Cashlib - GitHub
Aug 12, 2010 - zero knowledge the knowledge of ai such that gi = hai mod n. .... Techniques for converting honest-verifier zero-knowledge proofs to full ...

pdf-80\a-comparison-of-thermoregulation-and-water-metabolism-in ...
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. pdf-80\a-comparison-of-thermoregulation-and-water-meta ... lis-and-dipodomys-merriami-university-of-californ

A Comparison of Issues and Advantages in Agile and Incremental ...
Mar 10, 2009 - The incremental and agile model used at the company is a selection of agile ... vated teams developing software in three month projects. (time-boxing) ...... provide us with concise descriptions for each of the factors. • Benefit ...

A comparison of loop closing techniques in monocular ...
son's original system [5] where the pose of a handheld camera is tracked, while simultaneously ..... [1] H. Bay, T. Tuytelaars, and L. Van Gool. SURF: Speeded up ...

a Qualitative Comparison of Tendencies in Brazil and ...
categorized, with the purpose of comparing the topics, applications and methods that are studied in Brazil ... seeing CAD software mainly as a representation tool. In order to confirm .... tive tool, for visualization, and for remote collaboration).

pdf-80\a-comparison-of-thermoregulation-and-water-metabolism-in ...
There was a problem loading more pages. pdf-80\a-comparison-of-thermoregulation-and-water-meta ... lis-and-dipodomys-merriami-university-of-californi.pdf.

A comparison of thinning methods in red pine
Abstract: Long-term replicated experiments that contrast thinning method (dominant thinning, .... ameter, using data from two long-term replicated studies in.

A Comparison Study in Residential Sector Energy ...
A Comparison Study in Residential Sector Energy Balance: ... of a medium residential apartment in Tehran is assessed comparing to average .... Living room.