05/12/03B. Dorizzi On-line Signature Identity Verification Bernadette Dorizzi, GET/INT, 9 rue Charles Fourier, 91011 Evry

Slides:



Advertisements
Similar presentations
Masters Presentation at Griffith University Master of Computer and Information Engineering Magnus Nilsson
Advertisements

Fusion of HMM’s Likelihood and Viterbi Path for On-line Signature Verification Bao Ly Van - Sonia Garcia Salicetti - Bernadette Dorizzi Institut National.
Chapter 9 Creating and Maintaining Database Presented by Zhiming Liu Instructor: Dr. Bebis.
USign—A Security Enhanced Electronic Consent Model Yanyan Li 1 Mengjun Xie 1 Jiang Bian 2 1 University of Arkansas at Little Rock 2 University of Arkansas.
GMM-Based Multimodal Biometric Verification Yannis Stylianou Yannis Pantazis Felipe Calderero Pedro Larroy François Severin Sascha Schimke Rolando Bonal.
Biometrics & Security Tutorial 7. 1 (a) Please compare two different kinds of biometrics technologies: Retina and Iris. (P8:2-3)
Hidden Markov Models Theory By Johan Walters (SR 2003)
Hidden Markov Models in NLP
Hidden Markov Model based 2D Shape Classification Ninad Thakoor 1 and Jean Gao 2 1 Electrical Engineering, University of Texas at Arlington, TX-76013,
Combining Shape and Physical Models for Online Cursive Handwriting Synthesis Jue Wang (University of Washington) Chenyu Wu (Carnegie Mellon University)
Instructor: Dr. G. Bebis Reza Amayeh Fall 2005
HMM-BASED PATTERN DETECTION. Outline  Markov Process  Hidden Markov Models Elements Basic Problems Evaluation Optimization Training Implementation 2-D.
Face Recognition Using Embedded Hidden Markov Model.
1 Hidden Markov Model Instructor : Saeed Shiry  CHAPTER 13 ETHEM ALPAYDIN © The MIT Press, 2004.
Chapter 11 Integration Information Instructor: Prof. G. Bebis Represented by Reza Fall 2005.
Student: Hsu-Yung Cheng Advisor: Jenq-Neng Hwang, Professor
Learn how to make your drawings come alive…  Lecture 2: SKETCH RECOGNITION Analysis, implementation, and comparison of sketch recognition algorithms,
Performance Evaluation in Computer Vision Kyungnam Kim Computer Vision Lab, University of Maryland, College Park.
Comparison and Combination of Ear and Face Images in Appearance-Based Biometrics IEEE Trans on PAMI, VOL. 25, NO.9, 2003 Kyong Chang, Kevin W. Bowyer,
Pattern Recognition. Introduction. Definitions.. Recognition process. Recognition process relates input signal to the stored concepts about the object.
Dynamic Time Warping Applications and Derivation
Laurent Itti: CS599 – Computational Architectures in Biological Vision, USC Lecture 7: Coding and Representation 1 Computational Architectures in.
Biometrics and Authentication Shivani Kirubanandan.
Automatic Fingerprint Verification Principal Investigator Venu Govindaraju, Ph.D. Graduate Students T.Jea, Chaohang Wu, Sharat S.Chikkerur.
05/06/2005CSIS © M. Gibbons On Evaluating Open Biometric Identification Systems Spring 2005 Michael Gibbons School of Computer Science & Information Systems.
A Brief Survey on Face Recognition Systems Amir Omidvarnia March 2007.
Authors: Anastasis Kounoudes, Anixi Antonakoudi, Vasilis Kekatos
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
KinWrite: Handwriting-Based Authentication Using Kinect Proceedings of the 20th Annual Network & Distributed System Security Symposium, NDSS 2013 Jing.
ONLINE HANDWRITTEN GURMUKHI SCRIPT RECOGNITION AND ITS CHALLENGES R. K. SHARMA THAPAR UNIVERSITY, PATIALA.
Handwriting Copybook Style Analysis Of Pseudo-Online Data Student and Faculty Research Day Mary L. Manfredi, Dr. Sung-Hyuk Cha, Dr. Charles Tappert, Dr.
Isolated-Word Speech Recognition Using Hidden Markov Models
Handwritten Signatures Authentication using ANNs Committee Machines M.Heinen, F. Osório and P. Engel October Handwritten Signatures Authentication.
A Talking Elevator, WS2006 UdS, Speaker Recognition 1.
CPSC 601 Lecture Week 5 Hand Geometry. Outline: 1.Hand Geometry as Biometrics 2.Methods Used for Recognition 3.Illustrations and Examples 4.Some Useful.
Introduction to Biometrics Charles Tappert Seidenberg School of CSIS, Pace University.
IIIT Hyderabad Representation of Ballistic Strokes of Handwriting for Recognition and Verification Prabhu Teja S Advisor Anoop M. Namboodiri.
7-Speech Recognition Speech Recognition Concepts
International Conference on Intelligent and Advanced Systems 2007 Chee-Ming Ting Sh-Hussain Salleh Tian-Swee Tan A. K. Ariff. Jain-De,Lee.
Signature with Text-Dependent and Text-Independent Speech for Robust Identity Verification B. Ly-Van*, R. Blouet**, S. Renouard** S. Garcia-Salicetti*,
Signature with Text-Dependent and Text-Independent Speech for Robust Identity Verification B. Ly-Van*, R. Blouet**, S. Renouard** S. Garcia-Salicetti*,
Jun-Won Suh Intelligent Electronic Systems Human and Systems Engineering Department of Electrical and Computer Engineering Speaker Verification System.
22CS 338: Graphical User Interfaces. Dario Salvucci, Drexel University. Lecture 10: Advanced Input.
Online Signature Verification Based on Dynamic Regression Signature Verification 11/06/2003.
Biometrics Authentication Technology
ECE 8443 – Pattern Recognition ECE 8423 – Adaptive Signal Processing Objectives: ML and Simple Regression Bias of the ML Estimate Variance of the ML Estimate.
Designing multiple biometric systems: Measure of ensemble effectiveness Allen Tang NTUIM.
1 Iris Recognition Ying Sun AICIP Group Meeting November 3, 2006.
Signature Verification By Mayura Worlikar COSC 5010.
Handwritten Signature Verification
PRESENTATION ON BIOMETRICS
I can be You: Questioning the use of Keystroke Dynamics as Biometrics Tey Chee Meng, Payas Gupta, Debin Gao Ke Chen.
Statistical Models for Automatic Speech Recognition Lukáš Burget.
CS Statistical Machine learning Lecture 25 Yuan (Alan) Qi Purdue CS Nov
Handwriting Recognition
Speaker Recognition UNIT -6. Introduction  Speaker recognition is the process of automatically recognizing who is speaking on the basis of information.
Signature Recognition Using Neural Networks and Rule Based Decision Systems CSC 8810 Computational Intelligence Instructor Dr. Yanqing Zhang Presented.
BIOMETRICS VOICE RECOGNITION. Meaning Bios : LifeMetron : Measure Bios : LifeMetron : Measure Biometrics are used to identify the input sample when compared.
Online Signature Verification
Hand Geometry Recognition
BLIND AUTHENTICATION: A SECURE CRYPTO-BIOMETRIC VERIFICATION PROTOCOL
FACE RECOGNITION TECHNOLOGY
Statistical Models for Automatic Speech Recognition
Online Signature as a Behavioral Biometric
Secure and Privacy-Preserving User Authentication Using Biometrics
Visual Signature Verification using Affine Arc-length
WICT 2008 Offline Handwritten Signature Verification using Radial Basis Function Neural Networks Kenneth P. Camilleri St. Martin’s Institute of IT Dept.
Visual-based ID Verification by Signature Tracking
Handwritten Characters Recognition Based on an HMM Model
A maximum likelihood estimation and training on the fly approach
Presentation transcript:

05/12/03B. Dorizzi On-line Signature Identity Verification Bernadette Dorizzi, GET/INT, 9 rue Charles Fourier, Evry

05/12/03B. Dorizzi Outline Generalities Preprocessing Feature extraction Models : Cooperation local/global : Kashi 98 DTW (Jain : 2002) HMM (Rigoll, Dolfing, Salicetti) Evaluation : Signature Competition at Conf SVC 2004

05/12/03B. Dorizzi On-line signatures Acquisition on an electronic tablet or with a special pen, able to record a sequence of points (speed and pression of the signature, not only the static image) Interest : behavioral more than physiological, difficult to imitate. Highly variable intra-class characteristics : enrollment will necessitate several samples of the signature

05/12/03B. Dorizzi Recognition General scheme Sequence of points Sequence of features A signature of a claimed client X Learning Use of the samples of the signature of X to create a model of X The signature is presented at the input of the model of X and a similiraty measure is computed. Comparison to a threshold allows to accept or discard the signature

05/12/03B. Dorizzi Signature samples

05/12/03B. Dorizzi Performance evaluation Two types of errors FR=False Rejection FA=False Acceptation FRR= Nb of FR Nb of clients FAR= Nb ofFA Nb of imposteurs TER= Nb of FR+Nb of FA Total acces Nb

05/12/03B. Dorizzi Performance curves FRR High security ROC curveIn order to make a decision a threshold has to be settled EER: Equal Error rate FAR Low security FRR FAR EER (equal error rate) Threshold

05/12/03B. Dorizzi Data acquisition Depends on the capabilities of the hardware –High-end tablet : robust pressure sensibility, precise pen pressure measure, measure of the pen orientation –PDA : only coordinates and information on pen-up, pen-down Coordinates : x(t),y(t) Pressure p(t) Orientation  (t),  (t)

05/12/03B. Dorizzi Preprocessings Resampling and smoothing of the trajectory –Between 100 and 150 points per second (too many points, noise) Low-pass Filtering (the low frequencies carry the information) Apparent contradiction : point spacing on the trajectory. If irregular (dependant on the speed of the signing process) one capture the speed. But, in some parts of the trajectory there are very few points, thus little spatial information. (cf. Jain cf comprise between the 2).

05/12/03B. Dorizzi Local and contextual features Speed in x and y direction Acceleration in x et y direction Tangential Acceleration Cosine et sine of angle  : dynamical parameters The signature is considered as a sequence of points. A vector of features is computed at each point of the trajectory

05/12/03B. Dorizzi Cosine and sine of the angle which estimates the  (t) variation : Contextual (shape) parameters

05/12/03B. Dorizzi Global Features (Kashi et al., IJDAR 98) Mixture of both shape and dynamical features –2 time-related features : total signature time, ratio of pen-down time to total time –6 other dynamic features depends on the writing velocity and acceleration –13 shape-related features The signature is considered as a whole

05/12/03B. Dorizzi

05/12/03B. Dorizzi Dolfing approach Philips Research Laboratory The signature is split into different portions (part of the trajectory between 2 values of de v y =0) To each portion is associated a vector of 32 features The signature is considered as a sequence of points, these points are regrouped in several sub-parts. A feature vector is associated to each sub-part.

05/12/03B. Dorizzi Feature Description –13 spatial features –13 dynamic features –6 contextual features Spatial features: –sin and cos of the starting and ending angles : thetastart, thetaend –3 intermediate angles –Aspect ratio –La curvature –Existance of a pen-up

05/12/03B. Dorizzi Figure associated to the spatial features

05/12/03B. Dorizzi Dynamic features Number of samples nt min, max, moy of speed v acceleration a pressure p variation of pressure delta p vmax-vmoy pen-tilt with 2 angles

05/12/03B. Dorizzi Contextual features Sin et cos of angles psi1, psi2, psi3 which are the angles of the 3 lignes with x axe which start from the gravity center of the current portion towards the gravity center of the 3 preceeding segments. seg1 seg2 seg3 Seg courant

05/12/03B. Dorizzi Several Models of the signatures and associated similarity measures « A Hidden Markov Model approach to online handwritten signature verification », Kashi et al, IJDAR Computation of a global distance between 1 signature and a set of references signatures of writer i. « On-line signature verification », Jain et al., Pattern Recognition, DTW to compare two signatures considered as 2 sequences of features. Rigoll, Dolfing, Salicetti etc… : Modelization by a HMM of each writer (several signatures considered as sequences of features are considered) : computation of a likelihood measure for a signature to be produced by the HMM of writer i

05/12/03B. Dorizzi Global feature-based verification Kashi et al. A signature model for entrant i is a set of means  and standard deviations , obtained during training from 6 instances of signatures Error measure E i for a given signature claimed to be that of i: N is the total number of global features M i,k is the value of the K-th feature of the signature to verify  i,k and  i,k are the mean and standard deviation of feature k over the reference set of i.

05/12/03B. Dorizzi Dynamic Time Warping Local features are computed at each point of the trajectory A signature = a string (sequence of feature vectors) A signature model for a person is composed of 3 different samples of the signature String matching (DTW Dynamic Time Warping) allows the comparison of strings of different lengths. Finds an alignment between the points in the 2 strings such that the sum of the differences between each pair of aligned points is minimal To find the minimal difference, all possible alignments must be investigated. Dynamic programming is a method to implement that

05/12/03B. Dorizzi Mise en comparaison de 3 signatures d’une même personne S 1, S 2, S 3

05/12/03B. Dorizzi Verification A test signature is compared to the model of signer i (represented by 3 signatures). 3 possible strategies : minimum of all the dissimilarity values, average of all the dissimilarity values, maximum of all the dissimilarity values Decision : comparison of this value to a threshold The threshold can be identical for all the writers or set individually for each writer. In this article, no forgeries data is used to calculate the thresholds.

05/12/03B. Dorizzi Writer Modelization by Hidden Markov model

05/12/03B. Dorizzi What is a HMM? Non deterministic automata with one or several states A double stochastic process A Markov chain representing the states of the HMM: S = {S 1, S 2, S 3,……S N } A process which induces a sequence of observations

05/12/03B. Dorizzi What is a HMM? state 1state 2state 3 O = (O 1,..., O t,...)

05/12/03B. Dorizzi Why a HMM? The different signatures of a same writer are variable. This variability will be well modelized by a HMM. This modelization will allow to consider a non stationary signal (the signature) as a piecewise-stationary signal.

05/12/03B. Dorizzi Components of a HMM N: number of states in the model: S = {S 1, S 2,……,S N } A: Matrix of probability transitions a ij =P[q t+1 =S j |q t =S i ], 1  i, j  N Initial distribution of the states:  i = P[q 1 = S i ], 1  i  N Emission law of the observations in each state B j (O t )=P[O t |q t =S j ], 1  j  N Discrete HMM: B j is a matrix Continuous HMM: B j is a mixture of gaussian probalility density functions

05/12/03B. Dorizzi Markovian modelization of a signature

05/12/03B. Dorizzi Learning phase A process allowing the reestimation of the parameters of the HMM, in order to maximize the loglikelihood of the true signatures.

05/12/03B. Dorizzi Signature Verification Comparison of the loglikelihood of the signature, knowing the HMM model of the writer, with a threshold in order to take the decision «Distance» decision threshold –Accept if |Log(P(S| ) - L mean )|< , otherwise reject where L mean = mean loglikelihood on the learning database of the declared i client. MMC of the writer SignatureLog-likelihood

05/12/03B. Dorizzi Systems Evaluation Difficult because of the non availability of common databases : A lot of « home-made » databases with no connection between them (between 9 and 100 individuals). In general the EER lies between 1% and 6% Evaluation in presence of forgeries of more or less good qualities (skilled, over the shoulder, random, rough etc…) For instance, the Philips data base (very difficult due to the presence of high quality imitations, including dynamics) 1500 true signatures sur 51 persons, 1470 imitations « over the shoulder » 1530 imitations « home enhanced » 240 professional imitations Non identical evaluation protocols : personal threshold versus global one The threshold is generally determined in order that FAR=FRR (EER Equal Error Rate) or in order to minimize TER (Equal Error Rate) on a development database (some signers that will not be considered in the test base) using forgeries.

05/12/03B. Dorizzi SVC 2004 First International Signature Verification Competition –In conjunction with the First International Conference on Biometric Authentication in Hong Kong (ICBA 2004) Two tasks: –Coordinate input only –Coordinate, pen orientation and pressure inputs Database for each task:100 writers –Training set: 5 among 20 genuine signatures per writer –Evaluation set: Unknown genuine signatures per writer 20 skilled forgeries from 5 other contributors

05/12/03B. Dorizzi Conclusion Signature scan : a quite variable modality, resistant to forgeries, well accepted, but not suitable for each person Not so many applications : Natural with PDA, in banking contexts Some tools already available : smartpen, etc…

05/12/03B. Dorizzi References J.G.A. Dolfing, "Handwriting recognition and verification, a Hidden Markov approach", Ph.D. thesis, Philips Electronics N.V., M. Fuentes, S. Garcia-Salicetti, B. Dorizzi "On-line Signature Verification : Fusion of a Hidden Markov Model and a Neural Network via a Support Vector Machine", IWFHR8, Août J. Ortega-Garcia, J. Gonzalez-Rodriguez, D. Simon-Zorita, S. Cruz-Llanas, "From Biometrics Technology to Applications regarding face, voice, signature and fingerprint Recognition Systems", in Biometrics Solutions for Authentication in an E-World, (D. Zhang, ed.), pp , Kluwer Academic Publishers, July A. Jain, F D. Griess, S.D. Connell « On-line signature verification », Pattern Recognition,, vol 35, pp , 2002 J.G.A. Dolfing, "On-line signature verification with Hidden Markov Models", Proc. of ICDAR, pp , R. Kashi, J. Hu, W.L. Nelson, W. Turin, "A Hidden Markov Model approach to online handwritten signature verification", Intl. J. on Document Analysis and Recognition, Vol. 1, pp , G. Rigoll, A. Kosmala, "A systematic comparison of on-line and off-line methods for signature verification with Hidden Markov Models", Proc. of ICPR, pp , 1998.