International Journal of Advancements in Research & Technology, Volume 2, Issue 5, M ay-2013 ISSN 2278-7763 383 REVIEW ON OFFLINE SIGNATURE VERIFICATION METHODS BASED ON ARTIFICIAL INTELLIGENCE TECHNIQUE Imran Hussain, Vikash Shrivastava, Vivek Kr. Shrivastava 1 IT Department, ITM Bhilwara, Rajasthan, India; 2 I-Gate Global Solution Limited, Noida, U.P, India; 3 IT Department, ITM Bhilwara, Rajasthan, India Email: imran.hussain1983@gmail.com ABSTRACT Signature can be used as a biometric is implemented in various systems as well as every signature signed by each person is distinct at the same time. It is very important to have a computerized signature verification system. In case of offline signature verification system dynamic features are not included obviously, but we can use a signature as an image and apply image processing techniques to make an effective offline signature verification system. Author wants to illustrate two techniques reviewed by him on Offline signature Verification. Those techniques are mixed of Energy with Angle and Energy with Chain Code. Keywords : Neural Network, Angle, Energy Density, Chain code, FAR and FRR. I. INTRODUCTION or person identification, the usage of biometrics is very general and important in daily routine. Signature can be used as a biometrics as every signature is distinct in nature. As signature has already taken and accepted as an identification of the person who signed in so many systems, it is very much important to keenly observe the signature before having any conclusion about the signee. This gives opportunity to develop a computerized signature verification system. But, in many cases only image of a signature is available so offline signature verification seems more important than online signature verification system. The main thing of consideration is that a signature of a person may vary according to the mood, health etc. even the genuine signer may not sign in the same manner as his/her signature as it is. A change is observed every time. Then this seems somewhat difficult to distinguish between genuine signature and a forgery. signatures, because of the age, geographic location, illness, and perhaps the emotional state of the person, accentuates the problem. All these joined together, cause large intra-personal variation. A robust system has to be developed which should not only be able to consider these factors but also able to detect various types of forgeries. The systems should neither be too coarse nor too sensitive. It should have an acceptable trade-off between a low False Rejection Rate (FRR) and a low False Acceptance Rate (FAR). The proposed systems should also find an optimal storage and comparison solution for the extracted feature points. IJOART Basically, approaches to signature verification divided into two categories according to the acquisition of the data: Online and Off-line. On-line signature records the motion of the stylus while the signature is produced, and includes position, and possibly velocity, acceleration and pressure of pen, as functions of time. Online signature verification systems use this information captured during acquisition. These dynamic characteristics are specific to each and every individual and sufficiently stable . Off-line signature is a 2-D image of the signature. Processing Off-line is complex due to the absence of dynamic characteristics. Difficulty also lies in the fact that it is hard to break signature strokes due to highly stylish and unconventional writing styles. The quality and the variety of the writing pen may also affect the nature of the signature obtained. The non-repetitive nature of variation of the Copyright © 2013 SciResPub. The problem is approached in two steps. Initially the scanned signature image is preprocessed to be suitable for extracting features. Then the preprocessed image is used to extract relevant geometric parameters that can distinguish signatures of different persons. The next step involves the use of these extracted features to verify a given image. A. Motivation The motivation behind the review is the growing need for a full proof signature verification scheme which can guarantee maximum possible security from fake signatures. The idea behind the review is also to ensure that the proposed scheme can provide comparable and if possible better performance than already established offline signature verification schemes. There may be a case where the type of verification system used for training differs from classification using network. Though the test sample is of a genuine person, it might not be possible to prove with either of these systems alone. B. Research Objectives IJOART International Journal of Advancements in Research & Technology, Volume 2, Issue 5, M ay-2013 ISSN 2278-7763 Signature verification is an important research area in the field of personal authentication. The recognition of human handwriting is important concerning about the improvement of the interface between human-beings and computers. If the computer is intelligent enough to understand human handwriting it will provide a more attractive and economic man-computer interface. In this area signature is a special case that provides secure means for authentication, attestation authorization in many high security environment. The objective of the signature verification system is to discriminate between two classes: the original and the forgery, which are related to intra and interpersonal variability. The variation among the signatures of same person is called Intra Personal Variation. The variation between originals and forgeries is called Inter Personal Variation. Our review is concerned with the techniques of off-line signature verification. The static information derived in an off-line signature verification system may be global, structural, geometric or statistical. We concern with offline signature verification which is based on geometric centre and is useful in separating skilled forgeries from the originals. The algorithms used have given improved results as compared to the previously proposed algorithms C. Applications of Off-Line Signature Verification The handwritten signature has many purposes and meanings. It can be used to witness intentions (e.g. signing of a contract), to indicate physical presence (e.g. signing in for work), as a seal of approval or authorization and as a stamp of authenticity. Thus, numerous applications for the off-line signature verification are available. 384 In this method, two features are used for training. Aspect ratio is used as a global feature and energy density is used as local feature. Aspect ratio is the ratio of Height (maximum vertical distance) to length (maximum horizontal distance) of the signature. It is calculated after skew removal. Energy density is defined as the total energy present in each segment. 100 segments of each signature are done and energy density is obtained by counting the total number of 1s in each segment (i.e. Total White Pixels). Thus, the “feature vector” of size 101X1, for energy density method, is final database. This final database is fed to the neural network to perform the desired function i.e. training or classification. b. Chain Code Fig. 1 Connectivity of a Pixel IJOART Fig. 2. Direction Changes in a Part of a Signature Chain code is based on the direction of the connecting pixels. Each pixel is observed for next connected pixel and their direction changes mapped by giving a numerical value A signature is treated as an image transport a certain to every possible direction. There are generally 8 pattern of pixel that relate to a specific individual signature connectivity is taken into consideration as shown in the Fig. verification problem , therefore is concerned with 1. But in this technique 4 connectivity i.e. 0, 1, 2 & 3 is used. examining and formative whether particular signature truly As another 4 directions i.e. 4, 5, 6 & 7 are simply the belongs to a person or not. signature verification is a different negation of 0, 1, 2 & 3 directions. To obtain chain-code top pattern recognition problem as two genuine signature of a left corner is considered as origin and scanning is done left to person are precisely the same the difficulty also sterns from right, top to bottom (refer Fig. 2). Each pixel has observed the fact that skilled forgeries follow a genuine pattern separately and direction vector for that pixel is noted down. unlike fingerprint which vary widely for two different This process is carried out until the last pixel has scanned. person. signature verification can be divided into two classes, Now, the frequency of occurrence in a particular direction is namely, off- and on-line verification. calculated for each segment and the histogram for each segment is used it to train the neural network. II. BACKGROUND AND RELATED WORK III. PROPOSED APPROACHES Various approaches were done by various people to achieve highest accuracy as well as FAR & FRR. Till now the accuracy, FAR and FRR features were compared on the basis of Energy Density, Angle, Chain Code and mix of Energy Density with Angle and mix of Energy Density with Chain Code features. The details of these techniques are depicted as below. a. Energy Density Copyright © 2013 SciResPub. c. Angle In this method first the Pre-processing image is resized and partitioned into four portion or cell using the equal horizontal method after that each partition(cell) are divided in to 3 row and 3 column of equal size so we have total nine sub cell of each cell. After that consider the sub cell one by one and calculate the angle of each with pixels by considering the bottom left corner after that calculate the mean value of the angles this process is repeat for all the IJOART International Journal of Advancements in Research & Technology, Volume 2, Issue 5, M ay-2013 ISSN 2278-7763 sub cells. Once the value of angle, for each sub cell, is found, then calculating the mean value from that, to determine the value of angle for that cell or partition. This process is repeat for the reaming three partitions, so at the end we have the angle vector of size 1*4. This is given as an input to the neural network. For example the data base used consist 100 signature samples. For one sample we have angle vector of size 1*4 so for all 100 sample we have feature vector of size 100 *4 which is used as a final data base for training the neural network and also for classification. 385 original digitized signature image under consideration. Then from (b) to (e) result of binarization, denoising, thining and skew removal is shown respectively. (f) describes the result of segmentation process for which 100 segments is made for each signature and further processing is done with each segments found after this step. After complete preprocessing both the energy density and directional feature is computed and fed to an artificially intelligent network for training and classification. IV. IMPLEMENTAION AND VERIFICATION (a) Implementation of the proposed approach is basically divided in two parts i.e. Training and Classification. Training belongs to preparing and training of neural network for doing the classification work with an optimum accuracy. The proposed signature verification system takes an image of the signature as input and verifies whether the input image matches with the genuine training signature image available in the database or not. The system can be broadly categorized on the basis of method used for pre-processing and feature extraction from the image database and final input given to the neural network. Raw Signature Database is gathered from 10 people and 110 Genuine & 110 Forgeries from each individual is collected (i.e. 2200 Signature Samples) and digitized using scanner, 300 dpi resolution. The first step for pre-processing is Binarization. It is used to produce binary image i.e. to convert colored (if any) image in black & white (i.e. in 0 or 1) format. In this paper global threshold is used for this purpose. Noise is filtered out using median filter. Thinning is done after noise filtering. Morphological operation is applied (in MATLAB) to performs the desired thinning. Rotation of signature patterns by a non predictive angle is one of the major difficulties. In this paper simply the concept of trigonometry is used for skew removal. Fig. 4 shows the effect of different stages of pre-processing. The next step of pre-processing is to extract the signature only from the whole image, by removing the image of extra paper remained. After signature extraction again resizing is carried out, and then segmentation process is completed to extract the local features of the signature (i.e. energy density or directional feature of each segment according to the method under test). Author has used 100 segment of each signature sample for further processing. In energy density method author has also used aspect ratio as a global feature to improve the performance of the system. Aspect ratio is extracted just before the resizing and segmentation. (b) Binarization Original Signature Image (c) Denoising (d) Thinning (e) Skew Removal IJOART In proposed directional feature with energy method for offline signature verification system author simply merge the above two methods altogether to observe the effect of the merging. Energy, aspect ration and directional feature of a thinned and binarized signature image is calculated and fed as an input to a feed forward back propagation neural network for training and classification again this preprocessing is done in the same manner. Fig. 3 shows the effect of some of the preprocessing steps. (a) shows the Copyright © 2013 SciResPub. (f) Segmentation : 100 segments done for each signature Fig. 3. (a) to (f) Output of Different Stages of Pre-processing Fig. 4. Proposed Architecture of Neural Network for mix of energy IJOART International Journal of Advancements in Research & Technology, Volume 2, Issue 5, M ay-2013 ISSN 2278-7763 and Chain code method . Nm,n shows Neuron where, m = Layer Number & n = Neuron Number Wi,j,k represents Weight where, i=Layer No.., j=Neuron No., k=Output No.of the particular Neuron The proposed ANN scheme for mix of Chain code with energy feature uses a multi layer feed forward network employing a back propagation learning algorithm with 16 Neurons in input layer and 1 Neuron in output layer. One hidden layer is present with 16 Neurons. The transfer function used for all the three layers are Hyperbolic Tangent Sigmoid (tansig). The proposed architecture of Neural Network is shown in Fig. 4. Here, default value of bias is chosen. Total 501 inputs i.e. 100 for energy of each segment, 400 as direction feature and 1 show aspect ratio is given to this neural network. In case of angle mix with energy feature the signature of 10 person is gathered which consist of 50 genuine and 50 forged signature of an individual person. (i.e. 1000 Signature Samples). Rest all process is same as the previous technique. 386 increasing training samples for all of the methods. For performance evaluation author used some common parameters like time required for training, accuracy, FAR (False Acceptance Ratio) i.e. the percentage of forgeries accepted as genuine & FRR (False Rejection Ratio) i.e. the percentage of rejecting the genuine signatures. A comparison for all the three methods has done on the basis of above mentioned parameters. Table I, II, III & IV respectively elaborate the comparison of all the methods. TABLE I: Comparison of Energy Density and Directional Features methods on the basis of Time Required for Training No. of Training Samples Elapsed Time (50% (in sec.) Genuine ( Energy Sr. & 50% Density No. Forgery) Method) 1 10 6.156 2 20 6.453 3 30 6.593 4 40 7.312 5 50 6.625 6 60 7.671 7 70 7.797 8 80 6.313 9 90 6.704 10 100 6.969 Result Elapsed Time (in sec.) ( Directional Feature Method) 7.375 7.89 8.39 9.282 10.718 8.172 8.281 8.594 9.188 9.125 IJOART Fig.5 Proposed Architecture of Neural Network for mix of energy and angle method The proposed ANN scheme (Fig.5) for mix angle with energy feature uses a multi layer feed forward network employing a back propagation learning algorithm with 4 Neurons in input layer and 1 Neuron in output layer. One hidden layer is present with 40 Neurons. The transfer function used for all the three layers are Hyperbolic Tangent Sigmoid (tansig). Total 4 inputs is given to this neural network. V. RESULTS (i)In case of Energy, Chain Code (as a directional feature) and mix of Energy with Chain Code features: Till now for comparison and performance evaluation of the proposed methodology the author of the proposed approches have used equal number of genuine and forgery samples for training and 100 numbers (50 Genuine + 50 Forgeries) are used for classification. Author increased the training signature samples from 10 (5 Genuine + 5 Forgeries) to 100 (50 Genuine + 50 Forgeries) and observe the effect of Copyright © 2013 SciResPub. Elapsed Time (in sec.) ( Mix of Both) 7.672 8.718 9.141 9.594 11.64 8.5 8.5 11.688 9.531 9.532 Table: II Comparison on the basis FAR Sr. No 1 2 3 4 5 6 7 8 9 10 No. of Training Samples (50% Genuine + 50 % Forgery) 10 20 30 40 50 60 70 80 90 100 Result (FAR in %) Energy Chain Mix of Density Code Energy Density with Chain Code 42 40 28 42 40 12 42 30 10 48 40 6 46 20 8 22 6 4 2 0 6 6 0 0 10 0 0 6 4 0 TABLE III: Comparison on the basis of Accuracy IJOART International Journal of Advancements in Research & Technology, Volume 2, Issue 5, M ay-2013 ISSN 2278-7763 2 5 o, 2 5 f 0 . 12 No. of Training 3 0 o, 2 0 f 0 . 03 Result (FRR in %) Samples (50% 4 0 o, 1 0 f 0 .0 2 5 Genuine + 50 % Forgery) Energy Chain Code Density Sr. No Mix of Energy Density with Chain Code 1 10 44 20 30 2 20 4 12 14 3 30 22 14 22 4 40 12 20 26 5 50 20 30 26 6 60 18 28 24 7 70 22 22 8 8 80 2 6 6 9 90 2 8 4 10 100 2 2 0 5 0 o, 5 0 f 387 0 . 08 0 . 16 0 . 20 0 . 30 0 . 04 0 . 03 0 .0 2 5 0 . 08 0 . 05 0 . 10 0 . 12 0 . 08 0 . 04 Table 3: (For Sample-C). Methods of feature extraction Energy Angle Density Feature No. of samples (Original Forgery) FRR 1 0 o, 2 0 o, 2 5 o, 3 0 o, 4 0 o, 5 0 o, 4 0f 3 0f 2 5f 2 0f 10f 50f FAR 0 . 20 0 . 15 0 . 08 0 . 06 0 .05 0 . 18 FRR 0 0 . 06 0 . 20 0 . 25 0 . 20 0 . 24 FAR 0 . 15 0 . 10 0 . 06 0 . 06 0 0 . 16 0 0 .03 0 .12 0 .20 0. 1 0 0.20 Comparison on the basis of Time: Num ber of Samples Time required for Feature Extraction and Training (Energy Density) Feature required for Feature Extraction and Training (Angle Feature) 50 21 .9 4 Sec. 49 .8 2 Sec. TABLE IV: Comparison on the basis of FRR (ii) In case of Energy, Angle (as a directional feature) and mix of Energy with Angle features: IJOART 100 36 .5 6 Sec. 92 .3 3 Sec. Table 1: (For Sample-A) Methods of feature extraction Energy Angle Density Feature No. of samples (Original Forgery) 1 0 o, 2 0 o, 2 5 o, 3 0 o, 4 0 o, 4 0f 3 0f 2 5f 2 0f 1 0f 5 0 o, 5 0 f VI. CONCLUSION Chain code method is reported very effective for recognition. The mixed method of energy with chain code is giving superior performance. Mixed of energy and angle is also performed well. Due to variation in the signature there is small change in performance. It is required to evaluate the FRR FAR FRR FAR 0 . 20 0 . 15 0 . 08 0 . 03 0 .0 2 5 0 . 10 0 . 06 0 . 16 0 . 20 0 . 20 0 . 15 0 . 10 0 . 08 0 . 06 0 .0 2 5 0 . 02 0 . 03 0 . 04 0 . 10 0 . 10 0 . 12 0 . 16 0 . 06 0 . 14 Table 2: (For Sample-B). Methods of feature extraction Energy Angle Density Feature No. of samples (Original Forgery) 1 0 o, 4 0 f 2 0 o, 3 0 f FRR FAR FRR FAR 0 . 06 0 . 20 0 . 05 0 . 16 0 . 10 0 . 05 0 0 . 03 Copyright © 2013 SciResPub. Sr. No No. of Training Samples (50% Genuine + 50 % Forgery) Result (Accuracy in %) Energy Chain Mix of Density Code Energy Density with Chain Code 1. 10 57 70 71 2. 20 77 74 87 3. 30 68 78 84 4. 40 70 70 84 5. 50 67 75 83 6. 60 80 83 86 7. 70 88 89 93 8. 80 96 97 97 9. 90 94 96 98 10. 100 96 97 100 mixed method performance on same signatures databases. The IJOART International Journal of Advancements in Research & Technology, Volume 2, Issue 5, M ay-2013 ISSN 2278-7763 388 feature and classifier performance will also be needed to evaluate at small training dataset. References 1. Bai-ling Zhang, “Off-Line Signature Recognition and Verification by Kernel Principal Component Self-Regression,” Fifth International Conference on Machine Learning and Applications (ICMLA'06) 10.1109/ICMLA.2006.37, p. 28 to 33. 2. Deepthi Uppalapati,“Integration of Offline and Online Signature Verification systems,” Department of Computer Science and Engineering, I.I.T., Kanpur, July 2007. 3. Rejean Plamondon and Sargur N. Srihari, “On-Line and Off-Line Handwriting Recognition: A Comprehensive Survey,” IEEE transections on pattern analysis and machine intelligence, Vol. 12 No. 1, January 2000, pp. 63 - 84. 4. The IEEE website. [Online]. Available: http://www.ieee.org 5. Department of Computer Science, IIT, Kanpur for precious imformations. Available: http://www.cse.iitk.ac.in 6. H. N. Prakash and D. S. Guru, “Off-line signature verification: an approach based on score level fusion,” International journal of computer application, Vol. 1-No.18, 2010. 7. Samaneh Ghandali and Mohsen Ebrahimi Moghaddan, “Off-line Persian Signature identification and verification based on image registration and fusion,” Journal of Multimedia, Vol.-4 No.3, june 2009. 8. Imran Siddiqi and Nicole vincent, “A set of chain-code based features for writer recognition,”10th International Conference on document analysis and recognition, 2009. 9. Stephane Armand, Michael Blumenstein and Vallipuram Muthukkumarasamy, “Off-line signature verification using enhanced modified direction feature and neural based classification,” 10. Andrew T. Wilson, “Off-line handwriting recognition using neural network,” 11. Miguel A. Ferrer, Gesus B. Alonso and Carlos M. Travieso, “Off-line Geometric parameters for automatic signature verification using fixed point arithematic,” IEEE transections on pattern analysis and machine intelligence, Vol. 27 No.6, June 2005, pp.993-997. IJOART 12. Reena Bajaj and Shantanu Choudhari, “Signature Verification using multiple neural classifiers,” Pattern recognition, Vol. 30 No. 1, 1997, pp. 1-7. 13. Emre Ozgunduz, Tulin Sentruk & M. Elif karsligil, “Off-line signature verification and recognition by support vector machine”. 14. Thomas M. Breuel, “Representations and metrics for off-line handwriting segmentation. 15. M. Blumenstein and B. Verma, “An artificial neural network based segmentation algorithm for off-line handwriting recognition”. 16. Jamal Fathi and Abuhasna, “Signature recognition using conjugate gradient neural network”. 17. Minal Tomar & Pratibha Singh, “A Simpler Energy Density method for Off-line. Signature Verification using Neural Network”. 18. Minal Tomar & Pratibha Singh, “An Intelligent network for offline signature verification system using chain code” published in proceeding of The First International Conference on Computer Science and Information Technology. 19. Rahul Sharma & Manish Shrivastava, “An Offline Signature Verification System using Neural Network Based on Angle Feature and Energy Density” Copyright © 2013 SciResPub. IJOART