You are on page 1of 7

IPASJ International Journal of Computer Science (IIJCS)

Web Site: http://www.ipasj.org/IIJCS/IIJCS.htm


Email: editoriijcs@ipasj.org
ISSN 2321-5992

A Publisher for Research Motivation ........

Volume 3, Issue 3, March 2015

Centroidal Distance Based Offline Signature


Recognition Using Global and Local Features
Mr. RASKAR RAHUL BHAUSAHEB 1, Prof. SANDEEP KUMAR 2, Mr. KHARADE SACHIN 3
1

Mtech CSE Student, IES, Bhopal.

Asst. Professor,CSE Dept, IES, Bhopal.

Asst. Professor, Parikrama COE, Kashti.

ABSTRACT
Signatures continue to be an important biometric because it remains widely used as a means of personal verification and therefore
an automatic verification system is needed. In this paper we present an off-line signature verification and recognition system based
on a centroidal distance extracted such as global features and local features. A centroid is obtained from a set of genuine samples
using the features that were extracted. The centroid signature is then used as a template which is used to verify a claimed ignature.
To obtain a satisfactory measure of similarity between our template signature and the claimed signature, we use the centroidal
distance in the feature space. In our approach, we propose a novel of line signature verification scheme, the scheme is based on
selecting 21 centroid of the signature. Taking first centroid as reference point, the Euclidian distance to all 20 remaining centroid
points are calculated. Based on distance matching of centroid, classification is performed and compared them with already trained
feature points. Finally in classification stage; a simple centroidal distance measure is used as decision tool. The average
recognition accuracy obtained using this model ranges from 90% to 100% with the training set of 10 persons to 30 persons.
Keywords: Forgeries, Feature, Signature Verification, Euclidean distance, image processing, false acceptance rate, false

rejection rate, vectors.

1.INTRODUCTION
Signature verification is an important research area in the field of authentication of a person as well as documents in ecommerce and banking. The use of signatures is a common way to authenticate identity which is crucial matter in most
legal issues. It is a behavioral characteristic that is practiced over a period of time. It is not based on physical traits like
fingerprints, iris. Aside from that, it cannot be stolen unlike other means such as identification by password. However, its
verification is a different matter. Just by looking at the differences of each character in a signature is not enough to
distinguish the genuine from a forged one. Thus, signature verification system is developed .There are two methods of
signature verification. one is an on-line method to measure the sequential data such as handwriting style with a special
device. The other is an off-line method that uses an image scanner to obtain handwriting data written on paper. Online
approaches are more easy to apply than offline systems. On-line systems use special input devices such as tablets, where as
the only available information in an offline system is a static two-dimensional image obtained from scanned prewritten
signatures on a paper .The dynamic information of the pen-tip movement such as pen co-ordinates ,pressure, velocity,
acceleration ,and pen-up and pen-down can be captured by a tablet in real time but no an image scanner. The offline
method, therefore, needs to apply complex image processing techniques to segment and analyze signature shape for feature
extraction.
1.1. SIGNATURE VERIFICATION CONCEPTS
1.1.1 Types of Forgeries
Random: These are written by those person who doesnt know the shape of the of the original signature.
Simple: These signatures are written by those person who knows how the signature looks like by knowing the name of
the signer without much practice.
Skilled:These signatures written by Person who knows exactly how the original Signature looks like with proper
practice.
1.2 Types of Features
Three main types of features extracted from Signature Image which are as follows:
Global features- These are extracted from the whole signature image. Global features
include Area of cropped signature , Centre of gravity, signature height to width ratio, etc.
Local features- These are extracted from the small portion of signature image. To computate local featuresare more
expensive than global features but these features are much more accurate than global features.

Volume 3 Issue 3 March 2015

Page 36

IPASJ International Journal of Computer Science (IIJCS)


A Publisher for Research Motivation ........

Volume 3, Issue 3, March 2015

Web Site: http://www.ipasj.org/IIJCS/IIJCS.htm


Email: editoriijcs@ipasj.org
ISSN 2321-5992

Local features include local pixel density, slant features, critical points etc.
Geometric features It represent the characteristic geometry of a signature that keeps both their global as well as local
feature properties.
1.3 Error Rate
False Rejection Rate (FRR): This is the percentage of genuine signatures which can be rejected as false.

False Acceptance Rate (FAR): This is the percentage of forgery signatures accepted as genuine as true.

2.MAIN OBJECTIVE
The main objective of this research is to implement a new method for signature verification and recognition using centroid
method. This method scans the user signature and pre-processes it. After pre-processing the features of signature image is
extracted. Then these features verified with previously stored features so as to find out forgery. For implementing this
method we are going to implement one algorithm centroid extraction method. In centroid method we are going to find out
centroid of scanned signature then vertical and horizontal lines are drawn from that centroid. After plotting horizontal and
vertical line the image gets divided into 4 rectangles. Again this method is applied to each rectangle.Taking first centroid as
reference point,the Euclidian distance to all 20 remaining centroid points are calculated. Based on distance matching of
centroid, classification is performed and compared them with already trained feature points .several experiments are
conducted to demonstrate the ability of the proposed scheme is discriminating the genuine signatures from the forgeries.
The results of the experimentations reveal that the proposed scheme outperforms several other existing verification
methods. The objective of the work is to reduced the two vital parameters False Acceptance Rate(FAR) and False Rejection
Rate(FRR) normally used in any signature verification scheme.

3. PROPOSED METHODOLOGY
The overall architecture of our signature recognition system is shown in figure. General processing stages of the proposed
recognition systems are: Image acquisition, Preprocessing, feature extraction and classification.
3.1 Image acquisition:
Offline signatures are the signatures made on the papers. This requires specifying the resolution, image type and format to
be used in scanning image. The sheet on which signature is made is provided to scanner which gives scanned image of
signature. In this system, we are going to use scanner with suitable resolution and format. The image is acquired, by taking
signatures from 30 members. Each member is given a white sheet with 16 rectangular boxes of 3X5cm to give their
signatures. Later these sheets are scanned and segmented to get individual signature image and stored in database.

3.2 Preprocessing
After extracting the signature ,the next step is to process the extracted signature image suitable to extract features from it.
The raw data is subjected to a number of preliminary processing steps to make it usable in the descriptive stages of character
analysis. Pre-processing aims to produce data that are easy for the OCR systems to operate accurately.
The main objectives of pre-processing are:

Volume 3 Issue 3 March 2015

Page 37

IPASJ International Journal of Computer Science (IIJCS)


A Publisher for Research Motivation ........

Volume 3, Issue 3, March 2015

Web Site: http://www.ipasj.org/IIJCS/IIJCS.htm


Email: editoriijcs@ipasj.org
ISSN 2321-5992

Binarization
Noise reduction
Stroke width normalization
Skew correction
Slant Removal
Grayscale conversion
Thinning
Fitting to the box.
3.2.1 Binarization
Document image binarization (thresholding) refers to the conversion of a gray-scale image into a binary image. Two
categories of thresholding occurs. One is Global, picks one threshold value for the entire document image which is often
based on an estimation of the background level from the intensity histogram of the image. And other is Adaptive (local),
uses different values for each pixel according to the local area information.
3.2.2 Noise Reduction Normalization
Noise reduction improves the quality of the document. Two main approaches
1. Filtering (masks)
2. Morphological Operations (erosion, dilation, etc)

Normalization provides a tremendous reduction in data size, thinning extracts the shape information of the characters.

3.2.3 Skew Correction


Skew Correction methods are used to align the paper document with the coordinate system of the scanner. Main approaches
for skew detection include correlation, projection profiles, Hough transform.

3.2.4 Slant Removal


The slant of handwritten texts varies from user to user. Slant removal methods are used to normalize the all characters to a
standard form. The Popular deslanting techniques are Bozinovic Shrihari Method (BSM) and Calculation of the average
angle of near-vertical elements

Multilevel Authentication System F


Volume 3 Issue 3 March 2015

Page 38

IPASJ International Journal of Computer Science (IIJCS)


A Publisher for Research Motivation ........

Volume 3, Issue 3, March 2015

Web Site: http://www.ipasj.org/IIJCS/IIJCS.htm


Email: editoriijcs@ipasj.org
ISSN 2321-5992

3.2.5 Grayscale Conversion: Since the scanned images are stored in database as a color image, a three dimensional image
(MXNX3) is not suitable for further processing, and should be converted into a grayscale image where each pixel is
represented by a value in the range 0 to 255.
3.2.6 Thinning: To eliminate the strokes in signature, thinning morphological operator is applied.
3.2.7 Fitting Boundary Box: Individual signature images are automatically cropped to the size of the signature using
fitting rectangular boundary box algorithm described in Algorithm 2.1, so that unnecessary areas are removed. It allows
reducing the total number of pixels in the analyzed image (Fig. 2).
Algorithm : Fitting boundary box
Input: 8-bit binary image.
Output: Signature image reduced in size
Start
Step 1: Read signature image from specified location.
Step 2: Find the size of an image (row, column).
Step 3: Scan the image from top row, For (I=1 to row) do the following
find the sum of Ith row pixels
if sum is less than columns
save that row number in k1 and stop scanning.
Step 4: Scan the image from the bottom row,
For (I=row to 1) do the following
find the sum of Ith row pixels.
if sum is less than column
save that row number in k2 and stop scanning.
Step 5: Scan the image from right most column,
for (I=1 to column) do the following
find the sum of Ith column pixels
if sum is less than row
save that column number in k3 and stop scanning.
Step 6: Scan the image from left most column,
for (I=column to 1) do the following
find the sum of Ith column pixels
if sum is less than row
save that column number in k4 and stop scanning.
Step 7: Store the pixels of original image from row k1 to k2 and from column k3 to k4 in the variable I2.
Step 8: Take I2 as a signature image reduced in size
Stop

3.3 Feature Extraction


This is the most important stage of any offline signature verification system. This stage which makes each offline signature
system different from other offline system because signature acquisition and preprocessing is somewhat common stages in
all systems but the features extracted different from each system which makes every offline signature verification system
unique features available to extract in offline signature. In this System, the features extracted are Signature centroids.
These extracted features from the basis to compare and there by classify signature either genuine or forge.
In this step, suitable global and local features are extracted from the image. The procedure employed in this stage is
described in the following steps. First- the global features such as height, width and area are extracted from whole image.
Second- DWT (Discrete Wavelet Transform) is applied on signature image and maximum vertical projection position and
maximum horizontal projection position features are extracted.

Volume 3 Issue 3 March 2015

Page 39

IPASJ International Journal of Computer Science (IIJCS)


A Publisher for Research Motivation ........

Volume 3, Issue 3, March 2015

Web Site: http://www.ipasj.org/IIJCS/IIJCS.htm


Email: editoriijcs@ipasj.org
ISSN 2321-5992

3.5.Training: This involves developing a Euclidean Distance and Knowledge base.


3.6. Testing : In testing, all the features are extracted from the testing image. These features are given to the Euclidean
Distance, which classifies given sample and produces output to identify the owner of a signature. The subsequent section of
the paper describes the features employed, classifier used and the experimentation conducted

4.FEATURED EMPLOYED
To recognize the signature images, global features mainly height, width, Centroid-x, Centroid-y, area, maximum vertical
projection position and maximum horizontal projection position and powerful wavelet energy features are employed.
Height, Width, Area and Centroid-x, Centroid-y features are shown in the fig. 3. Centroid-x and Centroid-y indicate point
with highest pexel density. The row, which has highest signature pixels, is taken as maximum horizontal projection
position. The column, which has highest signature pixels, is taken as maximum vertical projection position. These two
features are extracted from the sub images obtained w. The Energy features are extracted using technique called wavelet.
Mainly one level Discrete Wavelet Transform is applied on each block of the signature image to decompose it into four subimages.

One of these sub-images is a smoothed version (approximation co-efficients) of the original image corresponding to the low
pass information and the other three ones are high pass information (detailed co-efficients) that represent the horizontal,
vertical and diagonal edges of the image respectively. The procedure followed involves following steps. First: The whole
image is divided into 16 blocks as shown in the fig. 4. Second: First level DWT with the filter called db4 is applied to each
of the 16 blocks. DWT decomposes each block into four sub-images as shown in the fig.5. Third: For each of the detailed
coefficient matrices, energy features are extracted using the equation (1) , Where MXN - Size of the sub image, I(i,j) - Total
Number of White Pixels
All the 20 features extracted by the above procedure is listed in the TABLE 1.

5.CLASSIFICATION USING CENTROIDAL DISTANCE


This is last stage of any offline signature verification system in which the features extracted from database are compared
with the features from test signatures and based on the classification criteria the signature are classified either genuine or
forged .In this system classification is based on angle pixel matching, Stroke speed and signature centroid distance
matching is used to classify signature.
Euclidean Distance Model is used for classification. This classifier is good for features extracted and fast in computation.
This is the simple distance between a pair of vectors of size n. We can calculate distance using Euclidean distance model by
following equation. In threshold calculation these distances are useful. Let X (x1, x2..xn) and
Y(y1,y2.yn) are two vectors of size n. We can calculate distance (d) by using equation.

The Euclidean distance or Euclidean metric is the "ordinary" distance between two points that one would measure with a
ruler, and is given by the Pythagorean formula. By using this formula as distance, Euclidean space (or even any inner
product space) becomes a metric space. The associated norm is called the Euclidean norm.

Volume 3 Issue 3 March 2015

Page 40

IPASJ International Journal of Computer Science (IIJCS)


A Publisher for Research Motivation ........

Volume 3, Issue 3, March 2015

Web Site: http://www.ipasj.org/IIJCS/IIJCS.htm


Email: editoriijcs@ipasj.org
ISSN 2321-5992

The Euclidean distance between points p and q is the length of the line segment connecting them. In Cartesian coordinates,
if p = (p1, p2,..., pn) and q = (q1, q2,..., qn) are two points in Euclidean n-space, then the distance from p to q, or from q to
p is given by equation 2.
Using Euclidean distance metric, similarity score between any two feature set can be obtained in terms of the extracted
features. The distance is used as the matching criterion, i.e. a signature is matched if this distance lies in a range of
subjective threshold. However, using the Euclidean distance we generate matching scores by matching a query signature
with all the signatures of database
A. Testing : In testing, all the features of test image are extracted. Using the Euclidean distance we generate matching
scores by matching a test signature features with all the signatures of database, which classifies given sample and produces
output to identify the owner of a signature. A signature is matched if this distance lies in a range of subjective threshold.

6. EXPERIMENTATION
Two separate experiments were conducted using the proposed model and results of the experiments are described in this
section.
A.Experiment 1
The first experiment has been performed on a signature database where features of each signature were extracted. The
features extracted in this experiment are, Height, Width and Area of the signature, horizontal and vertical projections and
energy values. Further, the DWT was applied to the whole image to get horizontal, vertical and diagonal components. From
each component we extracted horizontal and vertical projections. After that signature image is divided into 16 blocks.
Energy values of each block were extracted. Identification rate resulted from this experiment is shown in Fig. is 70% for 30
person database which is very less.
B. Experiment 2
In this experiment, DWT is applied on each of the 16 blocks to get 16*3 sub images and Energy features (16*3) are
extracted from these sub images. Also the two global features, Centroid-x and Centroid-y are added. The performance rate
shown in the Fig.7 has increased to 90-100% for the enrollment of 10-30 people.
The experiments conducted indicate that as the number of different signatures increases the performance accuracy is
decreased. Also with the increase of training samples the performance accuracy has been increased.

7.EXCEPTED OUTCOME
The biometrics characteristics of a sample signature can never be exactly the same as those provided during the registration
procedure for the same id. This requires the matching algorithm to return results which are near matches to the
characteristics given, and hence the need for a threshold arises. In the signature verification system an upper threshold is
used i.e. all the matches which are below this specified threshold are said to be valid and the others are rejected.

Volume 3 Issue 3 March 2015

Page 41

IPASJ International Journal of Computer Science (IIJCS)


A Publisher for Research Motivation ........

Volume 3, Issue 3, March 2015

Web Site: http://www.ipasj.org/IIJCS/IIJCS.htm


Email: editoriijcs@ipasj.org
ISSN 2321-5992

The performance is measured in certain standard terms these are as follow:


False Acceptance Rate (FAR):
It is the ratio of the number of unauthorized users accepted by the system to the total number of verification attempts made.
False Rejection Rate (FRR):
It is the ratio of the number of authorized users rejected by the system to the total number of verification attempts made.
The feature values are compared with the values in the range of maximum value and the minimum value and the result is
given. For Sigature sample 1 and Signature sample 2 the matching of values is more than the 70%. Hence both signatures
are accepted as genuine otherwise forgery.

8. CONCLUSION
In this work, an off-line signature recognition system designed using 3 stages namely pre-processing, feature extraction and
classification stage in order to make the right decision is presented. This signature recognition is based on 59 powerful
global and local wavelet features of different signatures and the recognizer employs Euclidian Distance. One of major
advantages of Euclidian Distance is ease of computation. Experimental evidence has shown that this method has provided
substantial improvements. 90% to100% accuracy is obtained for the 5*12 to 30*12 signatures used in database. This
accuracy can be improved still with the more number of samples of each signature used. One problem faced, is the lack of
samples needed to build a reliable signature recognition system and asses the performance. Unfortunately this system has
failed to recognize the some rotated signatures. Future avenues of this work include an analysis of new features of signature
image and combining those with the feature vectors used in this work to obtain better accuracy than the accuracy of present
work.

REFERENCES
[1] K. Han, and I.K. Sethi, Handwritten Signature Retrieval and Identification, Pattern Recognition 17, 1996, pp. 83-90.
[2] S. Chen, and S. Srihari, Use of Exterior Contour and Shape Features in Off-line Signature Verification, 8th
International Conference on DocumentAnalysis and Recognition (ICDAR 05), 2005, pp. 1280- 1284.
[3] Erdem, U.M., 2D Object Recognition In Manufacturing Environment Using Implicit Polynomials and Algebraic
Invariants,Master Thesis, Bogazici University, 1997.
[4] Fu, K.S., Mui, J.K., A survey On Image Segmentation, Pattern Recognition, Vol. 13, pp.3-16, Pergoman Press, 1981.
[5] M.Babu Rao, Dr.B.Prabhakara Rao and Dr.A.Govardhan, Content Based Image Retrieval using Dominant Color and
Texture features, February 2011, pp. 118-123.
[6] MING-KUEI HU, Visual Pattern Recognition by Moment Invariants, February 4, 2010,pp. 179-187.
[7] Plamondon, The Handwritten Signature as a Biometric Identifier: Psychophysical Model & System Design IEE
Conference Publications,R.1995,Issue CP408, 23-27.
[8] Bradley Schafer, Serestina Viriri, An Off-Line Signature Verification System, IEEE International Conference on
Signal and Image Processing Applications, 2009, pp. 95-100
[9] Michael Blumenstein, Graham Leedham, Vu Nguyen,Global Features for the Off-Line Signature Verification
Problem, IEEE 10th International Conference on Document Analysis and Recognition, 2009,pp.1300-1304.
[10] Minal Tomarand Pratibha Singh, A DirectionalFeature with Energy based Offline SignatureVerification Network
Vol.2, No.1, February 2011, PP48-57
[11] Banshider Majhi, Y Santhosh Reddy, D Prasanna Babu, Novel Features for Off-line Signature Verification,
International Journal of Computers, Communications & Control, Vol. 1, pp: 17-24, 2006.
[12] Sayantan Roy, Sushila Maheshkar, Offline Signature Verification using Grid based and Centroid based Approach,
International Journal of Computer Applications, Vol. 86, pp: 35-39, 2014.

AUTHOR
Raskar Rahul Bhausaheb received the B.E. in Computer Engineering from Vidya Pratishthans College Of Engineering,
Baramati in 2011.Now, He is doing M.Tech in Computer Science and Engineering from Rajiv Gandhi Proudyogiki
Vishwavidyalaya, Bhopal.
Prof.Sandeep Kumar received the M.Tech. in Computer Science and Engineering from RGPV, Bhopal. Now, he is
working as Assistant Professor in IES , Bhopal..

Volume 3 Issue 3 March 2015

Page 42

You might also like