Visual Signature Verification using Affine Arc-length

Slides:



Advertisements
Similar presentations
Object Recognition from Local Scale-Invariant Features David G. Lowe Presented by Ashley L. Kapron.
Advertisements

Fingerprint Verification Bhushan D Patil PhD Research Scholar Department of Electrical Engineering Indian Institute of Technology, Bombay Powai, Mumbai.
Chapter 9 Creating and Maintaining Database Presented by Zhiming Liu Instructor: Dr. Bebis.
Fingerprint Minutiae Matching Algorithm using Distance Histogram of Neighborhood Presented By: Neeraj Sharma M.S. student, Dongseo University, Pusan South.
Low Complexity Keypoint Recognition and Pose Estimation Vincent Lepetit.
Automatic Feature Extraction for Multi-view 3D Face Recognition
USign—A Security Enhanced Electronic Consent Model Yanyan Li 1 Mengjun Xie 1 Jiang Bian 2 1 University of Arkansas at Little Rock 2 University of Arkansas.
Facial feature localization Presented by: Harvest Jang Spring 2002.
66: Priyanka J. Sawant 67: Ayesha A. Upadhyay 75: Sumeet Sukthankar.
Face Recognition & Biometric Systems, 2005/2006 Face recognition process.
Biometrics & Security Tutorial 7. 1 (a) Please compare two different kinds of biometrics technologies: Retina and Iris. (P8:2-3)
Motion Tracking. Image Processing and Computer Vision: 82 Introduction Finding how objects have moved in an image sequence Movement in space Movement.
Instructor: Dr. G. Bebis Reza Amayeh Fall 2005
Feature extraction: Corners 9300 Harris Corners Pkwy, Charlotte, NC.
Lecture 6: Feature matching CS4670: Computer Vision Noah Snavely.
A Study of Approaches for Object Recognition
A Robust Real Time Face Detection. Outline  AdaBoost – Learning Algorithm  Face Detection in real life  Using AdaBoost for Face Detection  Improvements.
Uncalibrated Geometry & Stratification Sastry and Yang
Detecting Image Region Duplication Using SIFT Features March 16, ICASSP 2010 Dallas, TX Xunyu Pan and Siwei Lyu Computer Science Department University.
Feature extraction: Corners and blobs
Scale Invariant Feature Transform (SIFT)
Comparison and Combination of Ear and Face Images in Appearance-Based Biometrics IEEE Trans on PAMI, VOL. 25, NO.9, 2003 Kyong Chang, Kevin W. Bowyer,
Smart Traveller with Visual Translator for OCR and Face Recognition LYU0203 FYP.
05/06/2005CSIS © M. Gibbons On Evaluating Open Biometric Identification Systems Spring 2005 Michael Gibbons School of Computer Science & Information Systems.
Face Recognition Using Neural Networks Presented By: Hadis Mohseni Leila Taghavi Atefeh Mirsafian.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Karthiknathan Srinivasan Sanchit Aggarwal
Multiclass object recognition
Handwritten Signatures Authentication using ANNs Committee Machines M.Heinen, F. Osório and P. Engel October Handwritten Signatures Authentication.
CPSC 601 Lecture Week 5 Hand Geometry. Outline: 1.Hand Geometry as Biometrics 2.Methods Used for Recognition 3.Illustrations and Examples 4.Some Useful.
3D SLAM for Omni-directional Camera
Signature with Text-Dependent and Text-Independent Speech for Robust Identity Verification B. Ly-Van*, R. Blouet**, S. Renouard** S. Garcia-Salicetti*,
Online Signature Verification Based on Dynamic Regression Signature Verification 11/06/2003.
Feature extraction: Corners 9300 Harris Corners Pkwy, Charlotte, NC.
776 Computer Vision Jan-Michael Frahm, Enrique Dunn Spring 2013.
Lecture 7: Features Part 2 CS4670/5670: Computer Vision Noah Snavely.
Login session using mouse biometrics A static authentication proposal using mouse biometrics Christopher Johnsrud Fullu 2008.
Feature extraction: Corners and blobs. Why extract features? Motivation: panorama stitching We have two images – how do we combine them?
1 Machine Vision. 2 VISION the most powerful sense.
Features Jan-Michael Frahm.
I can be You: Questioning the use of Keystroke Dynamics as Biometrics Tey Chee Meng, Payas Gupta, Debin Gao Ke Chen.
CS654: Digital Image Analysis
Keypoint extraction: Corners 9300 Harris Corners Pkwy, Charlotte, NC.
Signature Recognition Using Neural Networks and Rule Based Decision Systems CSC 8810 Computational Intelligence Instructor Dr. Yanqing Zhang Presented.
Online Signature Verification
Guillaume-Alexandre Bilodeau
Hand Geometry Recognition
A review of audio fingerprinting (Cano et al. 2005)
Paper – Stephen Se, David Lowe, Jim Little
Gait Recognition Gökhan ŞENGÜL.
Bag-of-Visual-Words Based Feature Extraction
A Seminar Report On Face Recognition Technology
Traffic Sign Recognition Using Discriminative Local Features Andrzej Ruta, Yongmin Li, Xiaohui Liu School of Information Systems, Computing and Mathematics.
BLIND AUTHENTICATION: A SECURE CRYPTO-BIOMETRIC VERIFICATION PROTOCOL
Learning Mid-Level Features For Recognition
Supervised Time Series Pattern Discovery through Local Importance
Tracking Objects with Dynamics
FACE RECOGNITION TECHNOLOGY
FACE DETECTION USING ARTIFICIAL INTELLIGENCE
Pattern Recognition Sergios Theodoridis Konstantinos Koutroumbas
Real-time Wall Outline Extraction for Redirected Walking
Secure and Privacy-Preserving User Authentication Using Biometrics
CSE 455 – Guest Lectures 3 lectures Contact Interest points 1
Presented by :- Vishal Vijayshankar Mishra
Pattern Classification All materials in these slides were taken from Pattern Classification (2nd ed) by R. O. Duda, P. E. Hart and D. G. Stork, John.
Vision Tracking System
SIFT keypoint detection
Visual-based ID Verification by Signature Tracking
Pattern Classification All materials in these slides were taken from Pattern Classification (2nd ed) by R. O. Duda, P. E. Hart and D. G. Stork, John.
Presented by Xu Miao April 20, 2005
Presentation transcript:

Visual Signature Verification using Affine Arc-length Mario E. Munich and Pietro Perona California Institute of Technology www.vision.caltech.edu/mariomu

Outline Biometric ID Visual Signature Acquisition Description of the system Signature Verification Dynamic Time Warping Signature parameterization Experimental Results Conclusions and further work CVPR99 - June 24th, 1999

Biometric ID Identification based on measurements of human biological characteristics Vision-based: Face Recognition [Taylor et. al.,Turk & Pentland, Wiskott et.al.] Fingerprint Recognition [Jain et. al.] Iris Scanning [Daugman] Retina Scanning ... Other: Voice Recognition Signature Verification CVPR99 - June 24th, 1999

Why visual signature acquisition? tablet digitizer screen keyboard Current I/O computer interfaces have limitations for decreasing their size. Cell phone + PDA PDA mouse Future new I/O computer interfaces will involve Audio and Visual techniques. camera microphone Advantages: smaller size implementing them in VLSI. more natural way for people to communicate with computers. CVPR99 - June 24th, 1999

Visual signature acquisition CVPR99 - June 24th, 1999

Visual signature acquisition Preprocessing Pen Tip Tracker Ballpoint Detector Filter Signature Verification True! CVPR99 - June 24th, 1999

Preprocessing Get the template of the pen tip Mouse-clicking (manual) Pen familiar to the system Unknown pen Get the portion of image where the pen tracker looks for the pen tip (size = 25x25 pixels) (size = 31x31 pixels) CVPR99 - June 24th, 1999

Pen tip tracker Portion of the image extracted in order to compute correlation Location of maximum correlation Pen tip template Predicted position of the pen tip Predicted position of the pen tip The most likely position of the pen tip is given by the location of maximum correlation CVPR99 - June 24th, 1999

Filter Predicts the position of the pen tip in the following image Speeds up computations Smoothes out the trajectory Estimates the position of the pen tip for missing frames Model of pen tip’s dynamics where: x(t): 2D pen tip’s position v(t): 2D pen tip’s velocity a(t): 2D pen tip’s acceleration y(t): location of max. correlation CVPR99 - June 24th, 1999

Real Time Implementation Camera Pentium 230 Frame grabber PCI Bus The frame grabber is a PXC200 from Imagination. The system runs at 60 Hz with a total processing time of 15ms per frame. No calibration needed. CVPR99 - June 24th, 1999

Acquired signatures Picture Example signature Prototype Forgery CVPR99 - June 24th, 1999

Signature Verification New signature True signature or forgery? Comparison Prototype Training set CVPR99 - June 24th, 1999

Signature Verification Off-line Signature Verification Works on a static image of the signature, i.e., the result of the act of signing. On-line Signature Verification Works on the dynamic process of generation of the signature, i.e., the action of signing itself. (“Automatic signature verification and writer identification, the state of the art”, by M.Parizeau and R. Plamondon is a good survey paper) There are two types of signature verification systems, one works with a static image of the signatures while the other works on the dynamic generation of the signature. Our system captures the signatures as the subject is signing, therefore, our verification system falls within the second category. We use the well-known Dynamic Time Warping technique in order to perform verification. For more information on the particular implementation of DTW see the paper. CVPR99 - June 24th, 1999

Signature Verification Previous work on Signature Verification using Dynamical Time Warping: Sato and Kogure 82 Parizeau and Plamondon 90 Huang and Yang 95 Wirtz 95 Nalwa 97 Munich and Perona 98, 99 ... Here is a list of some of the works on signature verification using DTW. CVPR99 - June 24th, 1999

Signature Verification Comparison of two signatures Elementary distance of matching P1(1(t-1)) with P2(2(t-1)) and P1(1(t)) with P2(2(t)). P1(1(t)) Signature 1 (C1) P1(1(t-1)) v(t-1) v(t) P2(2(t)) Similarity measure (“distance” between C1 and C2) Matching function P2(2(t-1)) Signature 2 (C2) CVPR99 - June 24th, 1999

Dynamical Time Warping x(t) y(t) 2 examples from s030 x(t) after DTW y(t) after DTW Alignment Path CVPR99 - June 24th, 1999

Invariance w.r.t. rotation Main inertia axis of the signature In order to obtain some degree of invariance w.r.t. rotations, align the main inertia axis of the signature with the horizontal axis before performing DTW. CVPR99 - June 24th, 1999

Signature parameterization The acquisition system provides us a set of samples {x(t), y(t)} that represents the signature. We could think the signature as a “planar” curve, so the question is whether the parameterization of this curve in time is the “proper” thing to do!? CVPR99 - June 24th, 1999

Signature parameterization C(p) = [x(p), y(p)] Reparametrization: q(p): R+  R+ s.t. C(p) and C(q) have the same trace CVPR99 - June 24th, 1999

Euclidean arc-length Parameterization such that (velocity along the curve) This parameterization defines a length that is preserved in the case of Euclidean transforms Re-parameterization transformation (Nalwa 97) CVPR99 - June 24th, 1999

Affine arc-length Parameterization such that The area of the parallelogram is constant This parameterization defines a length that is preserved in the case of affine transforms Re-parameterization transformation CVPR99 - June 24th, 1999

Why affine? Affine transformations appear when a planar object is rotated and translated in space, and then projected into the eye via parallel projection (Pollick and Sapiro 97) CVPR99 - June 24th, 1999

Evaluation of the SV system There are two types of errors to evaluate in order to asses the performance of the system: FAR (False Acceptance Rate): percentage of false signatures classified as true. FRR (False Rejection Rate): percentage of real signatures classified as false. CVPR99 - June 24th, 1999

Evaluation of the SV system Error rate FAR FRR FAR FRR Error trade-off curve Equal error rate (Indicator of the perf. of the system) Classification Threshold Ideal case: FAR = FRR = 0% CVPR99 - June 24th, 1999

Experiments Collected a database of signatures 56 subjects 25-30 sample signatures per subject 10 signatures were collected per session, and each session took place on a different day 10 forgeries per subject each signature acquired with the real-time pen tracking system Generated a set of duplicated examples (Abu-Mustafa 95) for each signature using time origin shifting, scaling and shearing. The characteristics of our experiment are listed in this slide. I should point out that there is an intrinsic problem in any signature verification system, namely, the lack of examples of signatures in order to build a good reference model per subject and to quantify the generalization error of the system. We automatically generated “Duplicated Examples” from the original ones by applying to them transformations that the system should invariant to. Therefore, for each example of a true signature or a forgery, we generated 20 new examples by displacing the time origin, scaling in the vertical and horizontal coordinates and shearing the signature. The range of the parameters of the transformations were extracted from the training set. CVPR99 - June 24th, 1999

Experiments The algorithm was tested as follows: Training set: 10 signatures per subject, augmented to 200 with the duplicated examples. Test set (true): remaining 15 signatures per subject, augmented to 300 with the duplicated examples. Test set (false): all 1375 signatures from all other subjects (“random forgeries”). Test set (false): 10 intentional forgeries, augmented to 200 with the duplicated examples. CVPR99 - June 24th, 1999

Results Classification performed using the similarity measure FRR FRR FAR FAR Classification performed using the similarity measure provided by DTW. CVPR99 - June 24th, 1999

Results Classification performed using various distance measures (DTW FRR FRR FAR FAR Classification performed using various distance measures (DTW similarity measure, correlation and weighted correlation). CVPR99 - June 24th, 1999

Results pictures examples references False rejects False accepts CVPR99 - June 24th, 1999

Conclusions Presented the performance of a vision-based technique for personal identification. Demonstrated the feasibility of having such a system working in real-time with high performance in verification. Evaluated different representations of the signature and different similarity measures in order to improve performance. Overcame the lack of examples in order to extract more meaningful estimates of the generalization error. CVPR99 - June 24th, 1999

Further work Match all examples in a way such that the prototype would be a more robust representative of its class (sub-sample matching?).(ICCV99). Collect a new, clean and bigger database of examples. Explore different distance functions. CVPR99 - June 24th, 1999