Vous êtes sur la page 1sur 12

International Journal of Electronics, Communication & Instrumentation Engineering Research and Development (IJECIERD) ISSN 2249-684X Vol.

3, Issue 4, Oct 2013, 1-12 TJPRC Pvt. Ltd.

OFFLINE SIGNATURE VERIFICATION USING STATISTICAL FEATURE


DEVSHRI SATYARTHI & R. K. GUPTA Department of CSE & IT, M.I.T.S., Gwalior, Madhya Pradesh, India

ABSTRACT
A method for offline (static) handwritten signature identification and verification proposed based on a combination of different statistical measures. In the proposed method focus is on the combination of statistical measures in order to improve the overall efficiency as individual measure lack in providing unique feature for different signature and provide generalized feature for minute change in signature of the same person. The proposed method is tested our own signature database contains 400 offline signature of individuals including, 1 test signature and the result are compare with other state of art of method sand prove that proposed methods is better in terms of efficiency.

KEYWORDS: Signature Verification, Statistical Feature, Threshold, Euclidean Distance INTRODUCTION


Signature is composed of special characters and brandish and therefore most of the time they can be unreadable. Signature are the primary mechanism both authentication and authorization in legal document and transaction, so need for research scope of person authentication has increased in upcoming year. Offline signature based on only pixel image can be evaluated. Offline signature arrest only one time writing process, in which all information available in static images. One most important is offline has the advantage of using it in the same way as the existing manual recognition method. Recognition and Verification are most important method to finding the signature is genuine or forgery. Recognition means to find the identification of the signature owner, and Verification means taking a decision about whether the signature is genuine or forgery. In this paper focus on the offline signature verification to based on statistical analysis. In paper take three type signatures there are: (i) random, (ii) simple, (iii) skilled. Random forgeries are written by that person who doesnt know the shape of original signature. Simple forgeries are written by a person who knows the shape of original signature without much practice. Skilled forgeries are written by a person who knows the shape of original signature without much practice, and forgeries are four types there are: (a) genuine signature, (b) random forger, (c) simulated simple forgery, and (d) simulated skilled forgery. Genuine signature is original signature, random signature is something learn but not original signature, simulated simple forgery is copy not know original shape of signature without any practice, and simulated skilled forgery is copy not know original shape of signature with need practice.

QUALITY PERFORMANCE MEASURES


In evaluating the performance of a signature ver ication system, there are two important factors: the false rejection rate (FRR) of genuine signatures and the false acceptance rate (FAR) of forgery signatures and these two are inversely related. The false rejection rate (FRR), the false acceptance rate (FAR), the equal error rate (EER) and the average rate (AER) are used as quality performance measures.

Devshri Satyarthi & R. K. Gupta

The FRR is the ratio of genuine test signatures rejected to the total number of genuine test signatures submitted. The FRR called the type I error and is defined as,

The FAR is the ratio of the number of forgeries accepted to the total number of forgeries submitted. The FAR is also called the type II error and is defined as,

The average of the FRR and FAR is called the AER. The EER is find the equal error rate between forgeries accepted and forgeries submitted number. The EER is also called the type III error.

RELATED WORK
D. R. Kisku et al. focus on offline signature identification by fusion of three classifiers using SVM, there are Mahalanobis distance, Euclidean distance and the Gaussian empirical rule because the use of these classifier is to reduce the error rates in terms of skilled forgery detection with less computational complexity, and its depends on the quality of the matching scores produced by individual matchers, and also overcome the problem of non-uniformity. So the main reason to use the SVM to produce quality matching scores by fusing the individual matchers [1]. B. kovari, et al. provides statistical approach for modeling different kinds of signature verification system and estimating their performance limitations based on simple properties of the signature database, which is used to evaluate the system. In this paper give the solution of address the problem of improvement and thereby possibly break the 5% barrier. The paper based on SVM and feature extraction [2]. M. K. Randhawa focused on SVM and Hues invariant moment. The importance of using SVM is that it finds hyper plane, which maximizes the distance from either class to hyper plane and distinguish the largest possible number of point belonging to the same class on same side, which reduces the misclassification error of both training and testing set. It uses offline signature pre-processing for image, including normalization, grey scales, skeltonisation and binarisation, and based on these feature extraction technique based on fusion Hus moment invariants and Zone features are extracted. These moments consider the image scaling, translation, rotation, and shear. In zone feature it divides the image into three equal size horizontal rows called zone, and verify the signature using the SVM technique [3]. So it is used a statistical learning theory based linear SVM has been used for fusion of different sources of feature sets which are often found better compared to other statistical methods of fusion. In the proposed SVM based fusion scheme, matching score based fusion is adopted since at this level the fusion scheme is independent of classifiers used for generating matching score. It use global and local feature extraction for determine the identity of authentic and forgery signatures successfully from the database such as width, height, area of black pixels of each grid region, normalized area of black pixels, center of gravity, aspect ratio, horizontal and vertical projections, etc. , according to these feature extraction find the value as a input and on base of inputs and database perform the matching score and generate the result with the help of measurement techniques for generating matching scores, such as Euclidean distance, Mahalanobis distance and Gaussian empirical rule [3].

Offline Signature Verification Using Statistical Feature

E. J. R. Justino et al. HMMs efficiency, it use cross-validation process for achieving best representative signature model from the database. And the reason for use these method is that it define automatic generated threshold in order of false accept rate (FAR) and false reject rate (FRR) signature [4]. E. Yacoubi et al. Use HMMs and the cross-validation principle for random forgery detection. A grid is superimposed on each signature image, segmenting it into local square cells. From each cell, the pixel density is computed, so that each pixel density represents a local feature. Each signature image is therefore represented by a sequence of feature vectors, where each feature vector represents the pixel densities associated with a column of cells [7]. Y. M. A. Omari the global features are extracted at a low computational cost, and they have good noise resilience. These features are less sensitive to noise and signature variations. So it does not give a high accuracy for skilled forgeries, but it is suitable for random forgeries and is better to be combined with other types of features [8]. Samuel and Samuel proposed an off-line signature verification technique that used three new feature sets extracted from a static image of signatures. The three feature sets were image cell size, image centre angle relative to the cell lower right corner and pixels normalized angle relative to the lower right corner [9]. A. C. Ramachandr et al. proposed a Cross-validation for Graph Matching based offline Signature Verification (CGMOSV) algorithm. The dissimilarity measure between two signatures in the database was determined by (i) constructing a bipartite graph (ii) obtaining complete matching in and (iii) finding minimum Euclidean distance by Hungarian method. Using Cross-validation principle reference signatures were selected and an optimum decision threshold value was determined. The threshold value was used to compare and authenticate the test signature. They observed that FRR, FAR and EER values were improved compared to the existing algorithm [10]. E. zgndz et al. From results obtained by the researchers in the field of offline signature verification, it is noticed that the statistical approach, (HMMs, Bayesian etc.) can detect causal and skilled forgeries. Recognition rate of 95% was reported to be achieved using SVM [11].

PROPOSED METHODOLOGY
In this paper, statistical features have been used, as using statistical information or knowledge can easily perform the relation, deviation, etc. between two or more data items. In this method, to find out the relation between set of data items, it follows the concept of correlation coefficients. Also a deviation in between testing sample and the predefined samples is calculated and based on that value decisions are calculated. There are four type of statistical features used: Mean The mean of a statistical distribution with a discrete random variable is the mathematical average of all the terms. To calculate it, add up the values of all the terms and then divide by the number of terms. This expression is also called the arithmetic mean. There are other expressions for the mean of a finite set of terms but these forms are rarely used in Mean Standard deviation Variance Entropy

Devshri Satyarthi & R. K. Gupta

statistics. It denoted by .

is calculate mean, xi is sum of number of set and n is total number of set. Where, X Standard Deviation The standard deviation shows how much variation or "dispersion" exists from the average (mean, or expected value). A low standard deviation indicates that the data points tend to be very close to the mean; high standard deviation indicates that the data points are spread out over a large range of values. It is denoted by

is mean . Where, xi is sum of number of set, n is total number of set and X Variance The variance and the closely-related standard deviation are measures of how spread out a distribution is. In other words, they are measures of variability. It is denoted by 2.

= individual number of set, is mean of the Where, 2 is variance, (X - ) 2 is the sum of total number of set , X set and n is number of set. Entropy Entropy is a statistical measure of randomness that can be used to characterize the texture of the input image.

Where, H (A) is entropy and p is contains the histogram counts returned from imhist.

EUCLIDEAN DISTANCE MODEL


Let A (a1, a2..an) and B (b1, b2.bn) are two vectors of size n. We can calculate distance (d) by using equation 1. (1) In our application, vectors are feature points on plane. So d is the simple distance between two points. Threshold Threshold is a value, which associates the threshold to a Statistic (Polled Data). When data is collected for that

Offline Signature Verification Using Statistical Feature

Statistic, it is compared with the associated Threshold value. If the collected data value suited the threshold value then it indicates that this kind of data might lead to excellent performance of the signature verification. Here, the term "suit" is used as you can set up a threshold value along with a level, such as the equal value, minimum value and otherwise.

Figure 1: Flow Chart of Threshold Value Verification The comparison between the database signatures and test signature is made by computing the difference between four statistical features (mean, entropy, standard deviation, and variance) obtained for both the signatures. A threshold is set which decides the authenticity of the signature. The threshold value of 0.01, 0.05, 0.10, 0.20, 0.30, 0.40 and 0.50 radians is considered for verification purpose. The absolute difference between database and input signature is compared with the threshold value. According to procedure it verifies the signature is original or forgery. That procedure based on the figure 2 used for experimental result.

PROCEDURE
Step1: Input the 400 samples of signature images and 10 signatures for test. Step2: To convert matrix form. Step3: Apply statistical measure. Step4: Set threshold value. Step5: Calculate the value of signature with the use of statistical measure. Step6: Store in database. Step7: Test using Euclidean distance. Step8: Generate result.

Devshri Satyarthi & R. K. Gupta

PROPOSED ALGORITHM
1. Input the 400 samples of signature images and 10 signatures for test. 2. Signature verify 3. while signature(s)=True 4. do 5. for i= 1:100 6. for j= 1:4 7. if mean(i,j) = = 0 8. display (Original) 9. else 10. if mean(i,j) < 0.01 // set threshold value upto 0.01 to 0.50 11. display (FAR) 12. otherwise 13. display (FRR) 14. end if 15. end if 16. if standard deviation(i,j) = = 0 17. display (Original) 18. else 19. if standard deviation (i,j) < 0.01 // set threshold value upto 0.01 to 0.50 20. display (FAR) 21. otherwise 22. display (FRR) 23. end if 24. end if 25. if variance (i,j) = = 0 26. display (Original) 27. else 28. if variance(i,j) < 0.01 // set threshold value upto 0.01 to 0.50 30. display (FAR) 31. otherwise 32. display (FRR) 33. end if 34. end if 35. if entropy(i,j) = = 0 36. display (Original) 37. else 38. if entropy (i,j) < 0.01 // set threshold value upto 0.01 to 0.50 39. display (FAR) 40. otherwise 41. display (FRR) 42. end if 43. end if 44. end for 45. end for 46. return {( mean), (standard deviation), (variance), (entropy)}

Offline Signature Verification Using Statistical Feature

Figure 2: The Flow of Signature Identification

EXPERIMENTAL RESULTS
We have not used the exiting database; instead we created the database using college student signatures from MITS (Madhav institute of technology and science) college Gwalior. This thesis based on four combinations of statistical measures. It work on 2D image, 400 signature images are used in this experimentation, 100 signature used as genuine, 100 signature used as forgery, 100 signature used as skilled forgery, 100 signature used as random forgery and 10 signature images used as test signature for verification. The 400 signature take 100 peoples. Our simulation results show that each statistical feature has significant importance depending upon requirements. So selection of statistical measures is very important and should be done wisely. By using simulated results as reference it is very easy to select the statistical feature before going for a complex signature images. We concluded that a mean, standard deviation, variance, entropy. Like from simulation results we concluded that are mean contest of image processing filtering using mean is classified as spatial filtering and used for noise reduction. Standard deviation is a most widely used measure of variability or diversity used in statistics. Variance is a measure of how far a set of numbers is spread out. It is one of several descriptors of a probability distribution, describing how far the numbers lie from the mean (expected value). Entropy is a measure of unpredictability or information content. All signatures stores in database, than the test signature match with each and every signature in database individually. It used different size of image and different varieties of signature are used and analyze it in two different ways: first image is taken as a whole and second the size of image is changed. These images are converted into matrices. Then using statistical measures it calculate values and its store in database, after the storing then apply Euclidean distance find the absolute difference between input image and database images according to different threshold value, and verify signature is genuine and forgery in form of FAR and FRR according to Threshold value increase efficiency and it give almost better efficiency.

Devshri Satyarthi & R. K. Gupta

According to figure 2 step by step check the signature is original or forgery. Table1, table2, table3, table4 shows the result of implementation of these reaches. Table 1: Mean Variation of FAR and FRR with Threshold 1 2 3 4 5 6 7 Threshold Value 0.01 0.05 0.10 0.20 0.30 0.40 0.50 %FAR 0.5 5.53 5.4 11.63 14 20.3 22.15 %FRR 59.45 64.47 93.97 88.37 86 79.7 77.84

Table 2: Variance Variation of FAR and FRR with Threshold S. No 1 2 3 4 5 6 7 Threshold Value 0.01 0.05 0.10 0.20 0.30 0.40 0.50 %FAR 47.18 91.85 99.05 99 99.47 99.6 99.6 %FRR 49.83 8.35 13.62 1 0.47 0.25 0.25

Table 3: Standard Deviation Variation of FAR and FRR with Threshold S. No 1 2 3 4 5 6 7 Threshold Value 0.01 0.05 0.10 0.20 0.30 0.40 0.50 %FAR 24.83 81.37 88.85 99 99.22 99.45 99.5 %FRR 82.32 18.62 11.25 1 0.77 0.5 0.5

Table 4: Entropy Variation of FAR and FRR with Threshold S. No 1 2 3 4 5 6 7 Threshold Value 0.01 0.05 0.10 0.20 0.30 0.40 0.50 %FAR 0.85 3.72 12.22 11.93 15.4 20.3 26.72 %FRR 99.05 57.37 93.28 87.7 84.6 79.7 73.87

Figure 3: Mean FAR against Threshold

Offline Signature Verification Using Statistical Feature

Figure 4: Mean FRR against Threshold

Figure 5: Mean FAR and FRR against Threshold

Figure 6: Variance FAR against Threshold

Figure 7: Variance FRR against Threshold

10

Devshri Satyarthi & R. K. Gupta

Figure 8: Variance FAR and FRR against Threshold

Figure 9: Standard Deviation FAR against Threshold

Figure 10: Standard Deviation FRR against Threshold

Figure 11: Standard Deviation FAR and FRR against Threshold

Offline Signature Verification Using Statistical Feature

11

Figure 12: Entropy FAR against Threshold

Figure 13: Entropy FRR against Threshold

Figure 14: Entropy FAR and FRR against Threshold

CONCLUSIONS
In this paper we have discussed the details of combination of four statistical features in reference to digital image processing. we introduced new approach for identification of offline signature using statistical feature. We have presented statistical features for selecting the statistical measure properly before going for a complex signature images. The proposed model criteria of the output requirement are taken into account while selecting the four statistical measures. The four combination of statistical feature that feature combine it a give better result as compare to other method. The experimental result we found that signature verification and identification efficiency rate is better archived. In future work will include the pixels data value it is based on pixels data.

12

Devshri Satyarthi & R. K. Gupta

REFERENCES
1. D. R. Kisk, P. Gupta and J. K. Sing, Offline Signature Identification by Fusion of Multiple Classifiers using Statistical Learning Theory, Proceeding of the International Journal of Security and Its Applications Vol. 4, No. 3, July 2010. 2. M. K. Randhawa, A. K. Sharma and R. K. Sharma, Off -line Signature Verification based on Hus Moment Invariants and Zone Features using Support Vector Machine, Proceeding of the International Journal of Latest Trends in Engineering and Technology (IJLTET), Vol. 1, No. 3, September 2012. 3. B. Kovari and H. Charaf,Statistical Analysis of Signature Features with Respect to Applicability in Off -line Signature Verification, Processing of the latest trends on computers, Vol.2. 4. E. J. R. Justino, F. Bortolozzi and R. Sabourin, Off-line signature verification using HMM for random, simple and skilled forgeries, Proceedings of the Sixth International Conference on Document Analysis and Recognition, pp.10311034, 2000. 5. B. Majhi, Y. S. Reddy and D. P. Babu, Novel Fea tures for Off-line Signature Verication, Proceeding of the International Journal of Computers, Communications & Control, Vol. 1, No. 1, pp.17-24, 2006. 6. J. R. Justino, F. V. Bortolozzi and R. Sabourin, A comparison of SVM and HMM classifiers in the offline signature verification, Proceedings of the Elsevier, Pattern Recognition Letters, Vol. 26, No. 9, pp. 1377 -1385, 2005 7. E.J.R. Justino, El Yacoubi, A. Bortolozzi and F. Sabourin, An off -line signature verification system using hidden Markov model and cross-validation, Proceedings of the IEEE Computer Graphics and image processing, pp. 105-112, 2000. 8. Y. M. A. Omari, S. H. S. Abdullah and K. Omar, State of the art Offline signature verification system, Proceeding of the IEEE International Conference on Pattern Analysis and Intelligent Robotics, 28-29 June 2011, Putrajaya, Malaysia. 9. D. Samuel and I. Samuel , Novel Feature Extraction Technique for Offline Signature Verification System, Proceedings of the International Journal of Engineering Science and Technology, Vol. 2, No. 7, pp. 3137-3143, 2010. 10. A. C. Ramachandra, K. Pavithra, K. Yashasvini, K. B. Raja, K. R. Venugopal and L. M. Patnaik, Cross Validation for Graph Matching based Offline Signature Verification, Proceedings of the India Conference INDICON 2008. 11. E. zgndz, T. entrk and M.E Karslgil, Offline Signature Verification and Recognition by Support Vector Machine, Proceedings of the Eusipco, pp. 113 -116, Eusipco-2005, 4-8 September, 2005, Antalya, Turkey.

Vous aimerez peut-être aussi