+ REVIEW OF VARIOUS TECHNIQUES OF DIGITAL SIGNATURE VERIFICATION Miss. P.N .Ganorkar Rajiv Gandhi College Engineering and Research R.T.M.N.U Nagpur (Maharashtra), India Email: prachiti.ganorkar@gmail.co Miss. Kalyani Pendke Rajiv Gandhi College Engineering and Research R.T.M.N.U Nagpur (Maharashtra), India Email: pendke@gmail.com ABSTRACT: In the era of growing technology, security is the major concern to avoid fakes and forgeries. There are various Biometric systems which help in personal identification, amongst those verification systems, one system is Signature Verification System, Signature verification is split into two according to the available data in the input. Online and Offline. It also referred as static and dynamic. Signature verification also used to provide authentication to user. The main advantages of signature verification are that it used for e-business which helps in banking applications. The proposed paper present review of various techniques of digital signature verification and also various algorithms for signature verification. Keywords: Segmentation, Hidden Marko Method, Offline signature algorithm, online signature algorithm, Support Vector Machine. Relative slope algorithm. I. INTRODUCTION: Signature verification techniques utilize many different characteristics of an individual’s signature in order to identify that individual V The advantages of using such an authentication techniques are: i) Signatures are widely accepted by society as a form of identification and verification. ii) Information required is not sensitive. iii) Forging of one’s signature does not mean a long-life loss of that one’s identity. The basic idea is to investigate a signature verification technique which is not costly to develop, is reliable even if the individual is under different emotions, user friendly in terms of configuration. In signature verification application, the signatures are processed to extract features that are used for verification. There are two stages called enrolment and verification. Mrs. Shailendra Aote Rajiv Gandhi College Engineering and Research R.T.M.N.U Nagpur (Maharashtra), India Email: shailendra_aote@rediffmail.com In determining the performance of the verification system the selection of features takes main role and it is critical. There are two types of features that validating a signature. They are static and dynamic features. Static features are those, which are extracted from signatures that are recorded as an image whereas dynamic features are extracted from signatures that are acquired in real time. For signature verification, the system uses signature which is already present in database and the real time signature taken by the digital pen and pad. Slope value of stored signature and real time signature taken by digital pen being match for verification. If value matches up to some range then it will be considered as genuine otherwise forgery. Other parameters for verification are time, speed, threshold value of both the signature, efficiency, accuracy and the various processes are data acquisition, pre-processing, enrolment, feature extraction, relative slope based extraction, two tier time extraction, verification algorithm, hidden Markova method. . II. LITERATURE REVIEV: 2.1 Various Techniques Used For Signature Verification 2.1.1 Hidden Markov Models Approach Hidden Markov Model (HMM) is one of the widely used models for sequence analysis in signature verification techniques in trajectory Handwritten signature contain sequence of vector of each point value related to signature in trajectory. Therefore a well chosen set of feature vector for hmm could used to design an efficient signature verification system. Stochastic model have the capacity to observe the variability between pattern and their similarities. HMM stochastic model contain the matching model and signature .This matching is done on the basis of probability of distributed features of signature or probability of how signature is calculated. The probability of result signature is higher than test signature then signature is genuine of original person otherwise forgery. Paper [1] describes the system that use only global feature. it uses binary signature pattern .a discrete random transform is calculated for each binary signature image at the range of 0-360,which is a function to calculate total pixel in the image and the intensity of given pixel is calculated using non-overlapping beams per angle for x no. of angle. due to this periodicity ,it is shift ,rotation and scale invariant .this HMM model is used for each writer signature this method achieve an 18.4% AER for a set of 440 genuine signature from 32 writer and 132 skilled forgeries. Using this is method we can divide the line into no. of segment for calculating the values of various algorithms. Hidden Markova model again used two models User-Specific Model (US.HMM) And User Adapted universal background model (UA-UBM HMM). US-HMM and UA-UBM systems can be used together for improved verification performance by fusing at the score level the Viterbi path information from the US-HMM system and the likelihood ratio evidence from the UA-UBM system. images were used and with the full estimated convenience matrix incorporated. 2.1.4 Support Vector Machine Support vector machine heaving algorithm that uses the high dimensional features space and estimate difference between classes of a given data to generalize unseen data .for classification and verification purpose, the system [5] uses global directional and grid features of the signature. and SVM for classification and verification. The database of 1320 signatures is used from 70 writers. 40 writers are used for training with each signing 8 signatures thus a total of 320 signatures for training. For initial testing, the approach uses 8 original signatures and 8 forgeries and achieves FRR 2% and FAR 11%.support vector machine used various techniques like LCSS-GLOBAL and LCSS-LOCAL.LCSS is nothing but local common subsequence used to find the approximate value of verified signature. The two kernels LCSS-global and LCSS-local offer the possibility to classify time series of different lengths with SVM technique. SVM used dynamic warping technique. This technique used algorithm for alignment of time series function. [6] 2.1.2 Neural Networks Approach Because of power and ease, NN is popular in pattern Recognitions .the simple approach for this is to first extract the set of features representing the signature which provide different sample from several sample .the 2nd step is for NN to learn the relationship between signature and its class either genuine or forgery. Once this relationship has been learn the network represent with test signature that can be classified as belonging to a particular signature. Therefore NN are highly suitable for global aspect of handwritten signatures. Theproposed paper [2] uses structure features from the structure contour, modified direction feature and additional features like surface area, length skew and centriod Feature in which a signature is divided into two halves and for each halves a position of centre of gravity is calculated in reference to the horizontal axis for classification and verification ..Two approaches can compared the Resilient Back propagation (RBP) and neural network and Radical Basic Function (RBF) using database of 2106 signature containing 936 genuine and 1170 forgeries. These two classifier register 91.21% and 88% true verification respectively. 2.1.3 Template matching approach Fang et al [3] proposed two methods for the detection of skilled forgeries suing template matching. One of them is depend on the optimal matching of the one dimensional projection profiles of the signature pattern and the other based on the elastic matching of the strokes in the two dimensional signature pattern. The testing of the signature verification is given by the statistics of the training set compared with the positional variation and the decision based on a distance measures is made . Both the type of images is tested i.e. binary and gray .the error rate of 18.1% of the average verification was achieved for matching purpose when local pokes of the vertical projection profiles of the gray level signature III.ALGORITHM USED FOR SIGNATURE VERIFICATION. 3.1.1 Relative Slope Algorithm It is one of the algorithms used to verify the signature. This algorithm based on slope value of the signature [7]. It uses HMM model to calculate and optimized the slope value .HMM model used to divide the line into segment which helps us to calculate the slope value of line easily using previous value. This algorithm again uses relative slope extraction algorithm and two level time metric algorithm and verification algorithm. Various types of signature like offline signature, online signature used relative slope algorithm to calculate slope value and match them with another value to verify whether the given signature is forgery or genuine. algorithm and verification algorithm. Various types of signature like offline signature, online signature used relative slope algorithm to calculate slope value and match them with another value to verify whether the given signature is forgery or genuine This algorithm gives efficiency and accuracy higher than other to calculate slope value. Various processes like data acquisition, pre-processing, feature extraction, enrolment, and verification etc. Following are the steps of algorithm. Relative Slope Algorithm Steps: 1) Pre-process and normalize the algorithm. 2) Divide the signature into segment using optimized HMM method. 3) Based on requirement combine these segments into line segment. 4) Calculate the relative slope value of each segment with respect to previous segment. 5) Carry step (4) till all segment are processed else step (6). 6) Store the slope value of each segment which can be used for verification. 7) End. IV. CONCLUSION: The above paper presents the survey of various techniques of digital signature verification. These various techniques provide security and authentication to the user. The above paper also presents various algorithms to provide signature verification. The various techniques are NEURAL NETWORK which provide various parameters for matching, TEMPLATE MATCHING APPROACH which provide matching technique like elastic and dynamic matching, it provide minimum error rate and SUPPORT VECTOR MACHINE which provide vector representation data and reduced error rate and HMM MODEL .From all of the above the HMM model is one of the popular technique for signature because it divide the given signature into no. of segment and also gives low error rate. V.REFERANCE [1] S.Srihari. K. M. Kalera. And A. XU, “Offline Signature Verification and Identification Using Distance Statistics,” International Journal of Pattern Recognition And Artificial Intelligence, vol. 18, no. 7, pp. 1339–1360, 2004. [2] H. S. Sridhar and M. Beall, “Signature Verifications Using Kolmogrov Smirnov Statistic,” Proceedings of International Graphonomics Society, Salemo Italy, pp. 152–156, June, 2005. [3] Ashwini Pansare, Shalini Bhatia, “ Handwritten Signature Verification using Neural Network,” International Journal of Applied Information Systems (IJAIS) – ISSN : 2249-0868 Foundation of Computer Science FCS, New York, USA, January 2012. [4] Ramachandra A. C, Jyoti shrinivas Rao”Robust Offline signature verification based on global features” IEEE International Advance Computing Conference, 2009. [5] Martinez, L.E., Treviso, C.M, Alonso, J.B., and Ferrer, M. Parameterization of a forgery Handwritten Signature Verification using SVM. IEEE 38thAnnual 2004 International Carnahan Conference on Security Technology, 2004 PP.193-196 [6] Christian Gruber, Thyme Gruber, “Online Signature Verification with Support Vector Machines Based on LCSS Kernel Functions”, IEEE, August 2010 [7]Sudarshan Madabashi, Vivek Shriniwas,” Online Offline signature verification using relative slope algorithm.” international workshop on measurement system IEEE, March2005. [8] H. Morita, T. Ohishi, Y. Komiya, “On-line Signature Verification Algorithm Incorporating Pen Position, Pen Pressure and Pen Inclination Trajectories”, IEEE, 2001. [9] Enrique ArgonesRua, “Online Signature Verification Based on Generative Models”, IEEE, August 2012. [10] Ming Men, Xizang Xi, Sizing Lou, “On-line Signature Verification Based on Support Vector Data Description and Genetic Algorithm”, IEEE, 2008. [11] T.S. Enturk. E. O¨ zgunduz. and E. Karshgil, “Handwritten Signature Verification Using Image Invariants and Dynamic Features,” Proceedings of the 13th European Signal Processing Conference EUSIPCO 2005, Antalya Turkey, and 4th-8th September, 2005. [12] S.Srihari. K. M. Kalera. and A. XU, “Offline Signature Verification and Identification Using Distance Statistics,” International Journal of Pattern Recognition And Artificial Intelligence ,vol. 18, no. 7, pp. 1339–1360, 2004.