Signature Verification

Slides:



Advertisements
Similar presentations
FUNCTION FITTING Student’s name: Ruba Eyal Salman Supervisor:
Advertisements

Collecting data Chapter 6. What is data? Data is raw facts and figures. In order to process data it has to be collected. The method of collecting data.
Pseudo-Relevance Feedback For Multimedia Retrieval By Rong Yan, Alexander G. and Rong Jin Mwangi S. Kariuki
INFORMATION TECHNOLOGY Data Capture and Input Methods.
Commercial Data Processing Lesson 2: The Data Processing Cycle.
Input to the Computer * Input * Keyboard * Pointing Devices
Pattern Recognition 9/23/2008 Instructor: Wen-Hung Liao, Ph.D.
Overview of Computer Vision CS491E/791E. What is Computer Vision? Deals with the development of the theoretical and algorithmic basis by which useful.
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
Multiple Agents for Pattern Recognition Louis Vuurpijl
AUTOMATIC DATA CAPTURE  a term to describe technologies which aim to immediately identify data with 100 percent accuracy.
Chapter 1 Program Design
Irwin/McGraw-Hill Copyright © 2000 The McGraw-Hill Companies. All Rights reserved Whitten Bentley DittmanSYSTEMS ANALYSIS AND DESIGN METHODS5th Edition.
CP1610: Introduction to Computer Components
Security-Authentication
1. Introduction to Pattern Recognition and Machine Learning. Prof. A.L. Yuille. Dept. Statistics. UCLA. Stat 231. Fall 2004.
 A data processing system is a combination of machines and people that for a set of inputs produces a defined set of outputs. The inputs and outputs.
CS Machine Learning. What is Machine Learning? Adapt to / learn from data  To optimize a performance function Can be used to:  Extract knowledge.
Pattern Classification All materials in these slides were taken from Pattern Classification (2nd ed) by R. O. Duda, P. E. Hart and D. G. Stork, John Wiley.
INPUT DEVICES. KEYBOARD Most common input device for a computer.
ONLINE HANDWRITTEN GURMUKHI SCRIPT RECOGNITION AND ITS CHALLENGES R. K. SHARMA THAPAR UNIVERSITY, PATIALA.
Data Mining. 2 Models Created by Data Mining Linear Equations Rules Clusters Graphs Tree Structures Recurrent Patterns.
Introduction to Pattern Recognition
嵌入式視覺 Pattern Recognition for Embedded Vision Template matching Statistical / Structural Pattern Recognition Neural networks.
Introduction Mohammad Beigi Department of Biomedical Engineering Isfahan University
Pattern Recognition Vidya Manian Dept. of Electrical and Computer Engineering University of Puerto Rico INEL 5046, Spring 2007
: Chapter 1: Introduction 1 Montri Karnjanadecha ac.th/~montri Principles of Pattern Recognition.
Handwritten Signatures Authentication using ANNs Committee Machines M.Heinen, F. Osório and P. Engel October Handwritten Signatures Authentication.
Input Devices Manual and Automatic By Laura and Gracie.
Associative Pattern Memory (APM) Larry Werth July 14, 2007
B IOMETRIC STANDARDS A N OVERVIEW OF BIOMETRICS AND IDENTITY MANAGEMENT Supervisor : Ahmed Abu Mosameh Prepared by samaher el nbahen UNIVERSITY.
Artificial Neural Nets and AI Connectionism Sub symbolic reasoning.
Teuvo Kohonen Dr. Eng., Emeritus Professor of the Academy of Finland; Academician Since the 1960s, Professor Kohonen has introduced several new concepts.
An Introduction to Artificial Intelligence and Knowledge Engineering N. Kasabov, Foundations of Neural Networks, Fuzzy Systems, and Knowledge Engineering,
1 12 Systems Analysis and Design in a Changing World, 2 nd Edition, Satzinger, Jackson, & Burd Chapter 12 Designing Systems Interfaces, Controls, and Security.
Compiled By: Raj G Tiwari.  A pattern is an object, process or event that can be given a name.  A pattern class (or category) is a set of patterns sharing.
User Authentication Using Keystroke Dynamics Jeff Hieb & Kunal Pharas ECE 614 Spring 2005 University of Louisville.
Handwritten Recognition with Neural Network Chatklaw Jareanpon, Olarik Surinta Mahasarakham University.
Introduction to Pattern Recognition. Pattern Recognition.
Signature Verification By Mayura Worlikar COSC 5010.
PRESENTATION ON BIOMETRICS
Artificial Intelligence, Expert Systems, and Neural Networks Group 10 Cameron Kinard Leaundre Zeno Heath Carley Megan Wiedmaier.
Objectives: Terminology Components The Design Cycle Resources: DHS Slides – Chapter 1 Glossary Java Applet URL:.../publications/courses/ece_8443/lectures/current/lecture_02.ppt.../publications/courses/ece_8443/lectures/current/lecture_02.ppt.
Artificial Neural Systems. Intro Artificial neural systems try to process information in the same way as the human brain does. Traditional computer systems.
My topic is…………. - It is the fundamental building block and the primary lines of defense in computer security. - It is a basic for access control and.
Artificial Intelligence, simulation and modelling.
Pattern Recognition NTUEE 高奕豪 2005/4/14. Outline Introduction Definition, Examples, Related Fields, System, and Design Approaches Bayesian, Hidden Markov.
Handwriting Recognition
Pattern Recognition. What is Pattern Recognition? Pattern recognition is a sub-topic of machine learning. PR is the science that concerns the description.
Introduction to Classification & Clustering Villanova University Machine Learning Lab Module 4.
The Big Picture Things to think about What different ways are there to collect information automatically? What are the advantages and disadvantages of.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Memory Random Access Memory (RAM) and Read Only Memory (ROM)
By: Shane Serafin.  What is handwriting recognition  History  Different types  Uses  Advantages  Disadvantages  Conclusion  Questions  Sources.
Optical Character Recognition
 At the end of the class students should:  distinguish between data and information.  explain the characteristics and forms of Information Processing.
Signature Recognition Using Neural Networks and Rule Based Decision Systems CSC 8810 Computational Intelligence Instructor Dr. Yanqing Zhang Presented.
Introduction to Pattern Recognition Kama Jambi
INTRODUCTION TO NEURAL NETWORKS 2 A new sort of computer What are (everyday) computer systems good at... and not so good at? Good at..Not so good at..
Auditing Concepts.
Artificial Intelligence
Introduction to Classification & Clustering
Digital Video Library - Jacky Ma.
Introduction to Pattern Recognition
Machine Learning overview Chapter 18, 21
Intro to Machine Learning
Rumbaugh’s Objectmodeling Technique
Image Recognition. Contents: Motivation Objective Definition Introduction Preprocessing / Edge Detection Neural Networks in Image Recognition Practical.
PROJECTS SUMMARY PRESNETED BY HARISH KUMAR JANUARY 10,2018.
Automatic Handwriting Generation
Presentation transcript:

Signature Verification Presented By: Arpit Jain 04226g-CSE Under the guidance of Dr.Vipin Tyagi

Content: About Pattern Recognition and its application About Signature Verification. Difference from Character Recognition Introduction of Signature Verification Categories of Signature Verification Approaches Neural Network Application Tools used References

About: Basically, Signature verification is subtopic of Character Recognition and Character Recognition is subtopic of Pattern Recognition. So, first of all question rises in our mind is WHAT IS PATTERN RECOGNITION?

What is pattern recognition? “The assignment of a physical object or event to one of several prespecified categeries” -- Duda & Hart A pattern is an object, process or event that can be given a name. A pattern class (or category) is a set of patterns sharing common attributes and usually originating from the same source. During recognition (or classification) given objects are assigned to prescribed classes. A classifier is a machine which performs classification.

Examples of applications Handwritten: sorting letters by postal code, input device for PDA‘s. Printed texts: reading machines for blind people, digitalization of text documents. Optical Character Recognition (OCR) Biometrics Diagnostic systems Military applications Face recognition, verification, retrieval. Finger prints recognition. Speech recognition. Medical diagnosis: X-Ray, EKG analysis. Machine diagnostics, waster detection. Automated Target Recognition (ATR). Image segmentation and analysis (recognition from aerial or satelite photographs).

About Signature Verification Signature is an identification of a person through his/her hand writing. The recognition of human hand writing is a very important research area concerning with the improvement of the interface between the human beings and the computers. If the computer is intelligent enough to understand human hand writing it will provide a more attractive and more economic man computer interface with proper person authentication and attestation.

Difference from Character recognition Signature verification is so different with the character recognition, because signature is often unreadable and it looks like an image with particular curves that represents the writing style of a person and not as a collection of letters and words. Signature is just a symbol and a special case of handwriting

Introduction: Signature verification is a popular research area in the field of pattern recognition and document processing. It also plays an important role in many applications concerned with security, access control or financial and contractual matters. In signature verification techniques comparison of signatures with variation in length and height is done, which occurs even for the repetition of the signature of one single person.

Types of Forgeries: There are three types of forgeries taken into account. Random Forgeries: Written by those person who don’t know the shape of original signature. Simple Forgeries: Written by a person who knows the shape of original signature without much practice. Skilled Forgeries: Written by a person who knows the shape with much practice of the signature.

Contd… (Random) (Original) (Simple) Skilled

Categories of Verification Technique: Online Verification Approach: Also called as dynamic approach where signature is captured during the writing process. e.g. Building entrance, credit card processing etc. Offline Verification Approach: Known as static approach where signature is captured once the writing process is over and only static image is available. E.g. Bank cheque clearing etc

Approaches Statistical PR: based on underlying statistical model of patterns and pattern classes. Structural (or syntactic) PR: pattern classes represented by means of formal structures as grammars, automata, strings, etc. Neural networks: classifier is represented as a network of cells modeling neurons of the human brain (connectionist approach).

Neural Network Neural Networks provide an emerging paradigm for image recognition implementation that involves large interconnected networks of relatively simple and typically nonlinear units. There are three entities that characterize Neural Network These are - 1. Network topology 2. characteristics of individual units 3. strategy for pattern learning

Contd: It include some more approaches also - Simple Pattern Associators Feedforward-with-backpropagation learning structure. Hopfield method

Contd: Key Neural Network Concepts : Overall Computational model consist of variable interconnection of simple elements. Objective is for the network in the training process to develop an internal structure that enables it to correctly identify or classify new similar patterns. Neural Networks are dynamic systems, whose state changes over time, in response to external inputs or an initial state.

Applications: {1} Banks (Mostly Uses) {2} Performing Financial Transaction {3} Boarding an Aircraft {4} crossing international Borders

TOOLS USED: For making a system the tool which I am using is MATLAB. It is more user friendly then any other language and very vast too. Most important reason for using this tool is because MATLAB provides Pattern Recognition tool which helps me a lot while doing my project.

MAKING GUI FOR RESULT By using MATLAB, I am creating a GUI which helps in reading the Signature and then checking for characters and curves of Signature. I am making this interface for just to reduce the complexity of the system for the user.

Model: The model that we are going to use here is Prototype Model.

References www.wikipedia.com Y Santhosh Reddy, D Prasanna Babu “Novel Features for Off-line Signature Verification” "An off-line signature verification usingHMMfor Random,Simple and Skilled Forgeries", Sixth International Conference on Document Analysis and Recognition, pp.