© S. Cha8/8/2002CSIS Automatic Detection of Handwriting forgery Dr. Sung-Hyuk Cha & Dr. Charlies C. Tappert School of Computer Science & Information Systems.

Slides:



Advertisements
Similar presentations
Patient information extraction in digitized X-ray imagery Hsien-Huang P. Wu Department of Electrical Engineering, National Yunlin University of Science.
Advertisements

Handwritten Mathematical Symbol Recognition for Computer Algebra Applications Xiaofang Xie, Stephen M. Watt Dept. of Computer Science, University of Western.
Word Spotting DTW.
Identification and Individualization
Is it Science?. The beginning The father of the US polygraph machine was Doctor William Marston He designed the first device that measured blood pressure.
Emerging Computer Applications to Multidisciplinary Security Issues Charles Tappert and Sung-Hyuk Cha School of Computer Science and Information Systems.
Facial feature localization Presented by: Harvest Jang Spring 2002.
Locally Constraint Support Vector Clustering
Chapter 2: Pattern Recognition
Forged Handwriting Detection Hung-Chun Chen M.S. Thesis in Computer Science Advisors: Drs. Cha and Tappert.
Detection of Forged Handwriting Using a Fractal Number Estimate of Wrinkliness Experts are required to differentiate between authentic and forged signatures.
Trinity College Dublin PixelGT: A new Ground Truth specification for video surveillance Dr. Kenneth Dawson-Howe, Graphics, Vision and Visualisation Group.
A User Verification System: Spring, 2002 Timely Problems, Novel Solutions Project Team Members: William Baker, Arthur Evans, Lisa Jordan, Saurabh Pethe.
California Car License Plate Recognition System ZhengHui Hu Advisor: Dr. Kang.
Face Processing System Presented by: Harvest Jang Group meeting Fall 2002.
Edge Detection Evaluation in Boundary Detection Framework Feng Ge Computer Science and Engineering, USC.
Team 6: Experimental Handwriting System Allen Alarcon Ingrid Anderson Bhupesh Kapoor Shi-wu Lee.
COEN 252 Computer Forensics Writing Computer Forensics Reports.
Forensic Science and the Law
Presented by: Kamakhaya Argulewar Guided by: Prof. Shweta V. Jain
Handwriting Copybook Style Analysis Of Pseudo-Online Data Student and Faculty Research Day Mary L. Manfredi, Dr. Sung-Hyuk Cha, Dr. Charles Tappert, Dr.
Thinking Mathematically
Competence Centre on Information Extraction and Image Understanding for Earth Observation Matteo Soccorsi (1) and Mihai Datcu (1,2) A Complex GMRF for.
Handwritten Signatures Authentication using ANNs Committee Machines M.Heinen, F. Osório and P. Engel October Handwritten Signatures Authentication.
Loop Investigation for Cursive Handwriting Processing and Recognition By Tal Steinherz Advanced Seminar (Spring 05)
1 Pattern Recognition Concepts How should objects be represented? Algorithms for recognition/matching * nearest neighbors * decision tree * decision functions.
The Nature of Evidence A Guide to Legal Evidence & the Courts.
1 Handwriting Analysis, Forgery, and Counterfeiting By the end of these notes you will be able to: describe 12 types of handwriting characteristics that.
A New Approach to Signature Verification: Digital Data Acquisition Pen Ondřej Rohlík Department of Computer Science and Engineering University.
FORENSIC SCIENTISTS, EXPERT TESTIMONY Notes 1.3. Objectives 1. Explain the role and responsibilities of the expert witness. 2. Compare and contrast the.
Skills of a Forensic Scientist & Frye vs. Daubert Standards
Bara Lilla Nyíri Gergely Piotr Czekański Kovács Laura Team H: Automatic Poker Player.
1 Pattern Recognition Pattern recognition is: 1. A research area in which patterns in data are found, recognized, discovered, …whatever. 2. A catchall.
Document Examination.
Handwritten Hindi Numerals Recognition Kritika Singh Akarshan Sarkar Mentor- Prof. Amitabha Mukerjee.
Presented By Lingzhou Lu & Ziliang Jiao. Domain ● Optical Character Recogntion (OCR) ● Upper-case letters only.
Application of neural network to analyses of CCD colour TV-camera image for the detection of car fires in expressway tunnels Speaker: Wu Wei-Cheng Date:
Cross examination Is the DNA a mixture of two or more people? How did you calculate the match statistic? What is the scientific basis of that calculation?
Signature Verification By Mayura Worlikar COSC 5010.
Handwritten Signature Verification
Handwriting Analysis EHS BioMed/Forensics. Video links chnique/document-examination/
1 What Is Scientific Evidence? Scientific evidence is most often presented in court by an expert witness testifying on expert opinions. It also includes.
By Pushpita Biswas Under the guidance of Prof. S.Mukhopadhyay and Prof. P.K.Biswas.
Evidence and Expert Testimony. Expert Testimony  Two Types of Witnesses: Fact and Expert  Fact -- have personal knowledge of facts of case  Cannot.
Admissibility. The Frye Standard  1923 – became the standard guideline for determining the judicial admissibility of scientific examinations. To meet.
Cell Segmentation in Microscopy Imagery Using a Bag of Local Bayesian Classifiers Zhaozheng Yin RI/CMU, Fall 2009.
A New Generation of Artificial Neural Networks.  Support Vector Machines (SVM) appeared in the early nineties in the COLT92 ACM Conference.  SVM have.
Optical Character Recognition
City Forensics: Using Visual Elements to Predict Non-Visual City Attributes Sean M. Arietta, Alexei A. Efros, Ravi Ramamoorthi, Maneesh Agrawala Presented.
Why do I need a Chain of Custody (COC)? Presentation to: KWWOA Department for Environmental Protection Energy & Environment Cabinet To Protect and Enhance.
ANN-based program for Tablet PC character recognition
The Expert Witness in Forensic Psychology
Implementing Boosting and Convolutional Neural Networks For Particle Identification (PID) Khalid Teli .
Forged Handwriting Detection
WICT 2008 Offline Handwritten Signature Verification using Radial Basis Function Neural Networks Kenneth P. Camilleri St. Martin’s Institute of IT Dept.
Prof. Carolina Ruiz Department of Computer Science
Outline Announcement Texture modeling - continued Some remarks
network of simple neuron-like computing elements
The Assistive System Progress Report 2 Shifali Kumar Bishwo Gurung
Iris Authentication: System
describe 12 types of handwriting characteristics
Important court decisions
Chapter 10 Handwriting Analysis, Forgery, and Counterfeiting
Multi-Information Based GCPs Selection Method
1-3 Functions of a Forensic Scientist
Automatic Handwriting Generation
Survey Networks Theory, Design and Testing
Using Clustering to Make Prediction Intervals For Neural Networks
Expert Witness Testimony
Prof. Carolina Ruiz Department of Computer Science
Presentation transcript:

© S. Cha8/8/2002CSIS Automatic Detection of Handwriting forgery Dr. Sung-Hyuk Cha & Dr. Charlies C. Tappert School of Computer Science & Information Systems

© S. Cha8/8/2002CSIS Analysis of Handwriting RecognitionExaminationPersonality identification (Graphology) On-lineOff-lineWriter VerificationWriter Identification Natural WritingForgeryDisguised Writing Handwriting Analysis Taxonomy

© S. Cha8/8/2002CSIS Background Differences b/w authentic handwriting & forgery Measure of Wrinkliness Automatic Forgery Detection Model ConclusionOverview

© S. Cha8/8/2002CSIS To determine the Validity of Individuality in Handwriting Legal Motivation Frye vs. US (1923) scientific community Daubert vs. Merrell Dow (1993) testing, peer review, error rates U.S. vs. Starzecpyzel (1995) “skilled” testimony GE vs. Joiner (1997) weight of evidence Kumho vs.Carmichael (1999) reliability standard

© S. Cha8/8/2002CSIS Each person writes differently. Individuality of Handwriting

© S. Cha8/8/2002CSIS (b) Forgeries of (a) (a) Authentic handwriting samples from one writer Authentic vs. Forgeries

© S. Cha8/8/2002CSIS 3 Differences b/w authentic & forgery 1. Shape 2. Pressure 3. Speed

© S. Cha8/8/2002CSIS Angular and Magnitude Type Element String AngularMagnitude ImageStroke DirectionStroke Width

© S. Cha8/8/2002CSIS w1w2w3w4w5w6w min(wi) = 3 w1 w2 w3 w4 w5 w6 w7w8w9w min(wi) = 2.83 Stroke Width Extraction (a) Vertical & horizontal stroke width(b) Diagonal stroke width

© S. Cha8/8/2002CSIS Fractal: How Long is a Coastline?

© S. Cha8/8/2002CSIS Fractal: How wrinkly is the Coastline of Britain?

© S. Cha8/8/2002CSIS (a) Number of in the boundary = 69 (b) Number of in the boundary = 32 (a) (b) Fractal: How wrinkly is Handwriting?

© S. Cha8/8/2002CSIS Fractal: Measure of Wrinkliness

© S. Cha8/8/2002CSIS (d-e) ascender & descender Computational Features

© S. Cha8/8/2002CSIS (f) stroke width (g-i) projected histogram and gradient histogram Computational Features

© S. Cha8/8/2002CSIS sample1 by xsample2 by xsample1 by xForgery of x by y Feature Extractor Distance computing d-dimensional within-authentic- handwriting distance set d-dimensional between-authentic- handwriting & forgery distance set Automatic Forgery Detection Model

© S. Cha8/8/2002CSIS cent slant wid zone side-h bot-h grad Feature distances AAAAAAFFFFFFAAAAAAFFFFFF Truth Inputs & Truth

© S. Cha8/8/2002CSIS Original/ Forgery? Distance compu- tation Feature extraction Authentic sample from a known source Handwriting sample in question Artificial Neural Network

© S. Cha8/8/2002CSIS Distributions and Errors between authentic & forgery distance within authentic distance forgery identified authentic identified as forgery Decision boundary d (,),)

© S. Cha8/8/2002CSIS within class between class Random selection dichotomizer s’ -error d’ -error dichotomizer s -error d -error estimate Design of Experiment

© S. Cha8/8/2002CSIS Conclusion Authentic handwriting and forgery handwritten word images were collected. Differences b/w authentic handwriting and forgery Measure of Wrinkliness Automatic Forgery Detection Model using the dichotomy approach. Further quantitative study with more samples is necessary.

© S. Cha8/8/2002CSIS The End Thank you.