Download presentation
Presentation is loading. Please wait.
Published byMarilyn Sanders Modified over 8 years ago
1
Signature Recognition Using Neural Networks and Rule Based Decision Systems CSC 8810 Computational Intelligence Instructor Dr. Yanqing Zhang Presented By Mateena Syeda Shilpa Panaganti
2
Outline Introduction Signature Recognition System Design/Architecture Implementation Experimental Results Conclusions and Future Work
3
Introduction Authentication and Identification bears an important role in many fields Different types of authentication Password Picture recognition Signature recognition Finger print recognition Growing interest towards Biometric Authentication Airports Credit card validation Surveillance
4
A Signature is defined as the name of a person written with his/her own hand Signature Recognition is the process of verifying the user signature with the ones stored in database A computationally expensive and a difficult process Helps in authenticating Bank Checks Credit Card Transactions Property Documentation Forensic Investigation Signature Recognition
5
Line crossing Segmentation Behavioral Analysis Statistical Approach Neural Networks Types of Signature Recognition
6
Proposed System Design Data acquisition – Getting input signatures Preprocessing – Removing erroneous data Feature Extraction – Recording of special characteristics Neural Network structure – Associating with each characteristic Training Networks - Organizing of the authentic and forged data Rule Based Decision Making – Establishing error rate, thresholds Performance evaluation – TAR, TRR, FAR, FRR
7
Neural Networks Rule Based Decision system 2 1 3 4 5 Stroke Angles Moment Values Protein sequence Pre- Processing Sum of Grey Values System Architecture Result : Genuine/ Forged Input Signature Median Filtering Resizing
8
Implementation Data Acquisition Signatures Acquisition A finite number of samples collected from few Subjects Authentic Forged Each signature is scanned using a Scanner Stored as image in TIF format
9
Preprocessing MATLAB - Image Processing Toolbox Normalized each signature image to fit a 128x256 vector The Median Filter Removal of Noise/Spurious pixels Define Neighborhood size Choose the median intensity value among the pixels in the neighborhood Replace the pixel's intensity by the median value
10
Original Signature Preprocessed Signature
11
Feature Extraction A Feature is any extractable measurement taken on the input pattern that is to be classified The key is to choose and extract features that are computationally feasible lead to a good classification system with few misclassification errors reduce the input data into a manageable amount of information without discarding valuable or vital information
12
Moments Moments are defined as Moments are used to determine properties of a component Also known as “invariant” - denotes an image or a shape feature which remains unchanged if that image or shape undergoes one or combination of the following changes: Change of size (scale) Change of position (translation) Change of orientation (rotation) Reflection
13
Result of Moment Features extracted from the Signature
14
Strokes A global feature - important for distinguishing signatures Developed a new method to determine Orientation of the signature at different points Orientation is defined as inverse tangent of the Yn/Xn Orientation = Tan -1 (Yn / Xn ) The points at which the orientation is calculated are known as critical points Established an Angle threshold θ Stroke = TRUE, if Orientation > θ 3 features - X coordinate, Y coordinate and the angle at that position
15
Result of Stroke Features extracted from the Signature
16
Multi Neural Network Neural Network Training Back propagation algorithm Five different Neural Networks Why five systems? Each system is trained with three features Neural Network Testing Five different testing results Decision Rules
17
Neural Networks Rule Based Decision system 2 1 3 4 5 Stroke Angles Moment Values Protein sequence Preprocessed Input Signature Sum of Grey Values System Architecture Result : Genuine/ Forged
18
Decision Function The output from each network is a value between 0 and 1 indicating the degree of confidence in the genuineness of the presented signature A Threshold value between 0 and 1 is selected to authenticate the signature A signature is accepted if the output of the network exceeds the Threshold value The selection of Threshold value plays a vital role
19
Threshold Values Generally 0.5 is taken as Threshold value for Single Neural Network Here each Feature extracted is given an individual Threshold value Two Neural Network Systems resulting the testing results of Moments have 0.8 Threshold value. Two systems with stroke angles have 0.6 Threshold. One system resulting the sum of grey values has 0.7 Threshold value.
20
Decision Rules Two Moments and two stroke angles are considered as single element. Eight rules are drawn with respect to Decision function values of features. In Rules given below M-Moments A-Stroke Angles S-Sum of Grey values
21
Decision Rules (cont..) If M>0.8 and A>0.6 and S>0.7 then accepted If M>0.8 and A>0.6 and S<0.7 then accepted If M>0.8 and S>0.7 and A<0.7 then accepted If S>0.7 and A>0.6 and M<0.8 then accepted If M>0.8 and A<0.6 and S<0.7 then rejected If S>0.7 and A<0.6 and M<0.8 then rejected If A>0.6 and M<0.8 and S<0.7 then rejected If M<0.8 and A<0.6 and S<0.7 then rejected
22
Performance Evaluation The performance of system is evaluated by four different categories TAR – True Acceptance Rate TRR – True Rejection Rate FAR – False Acceptance Rate FRR – False Rejection Rate The Main aim here is to increase the TAR and FRR, while decreasing TRR and FAR.
23
Results Signatures Acquisition Each signature is scanned using a Scanner (Hewlett Packard Scan Jet) connected to Pentium 4 PC Total 20 subjects are tested For each subject 5 genuine signatures are collected and trained the system 8 are tested with forgeries 12 are authentic signature The Neural Network system is trained with different values of parameters The system is trained with various values of hidden neurons and error.
24
Multi-Network TAR Table TAR Moment1 Moment2 Stroke1 Stroke2 Grey Value Signature10.9990.9980.9730.9520.998 Signature20.8790.8770.6120.6360.751 Signature30.7990.7980.7480.7290.995 Signature40.8760.8770.890.8910.997 Signature50.9980.9990.7640.7890.689 Signature60.9130.9110.9560.9580.978 Signature70.8760.8770.5870.5880.887 Signature80.9780.9790.4990.5140.846 Signature90.8970.8990.640.6280.658 Signature100.7640.7630.9890.9870.995 Signature110.8380.8390.7870.7790.589
25
TRR and FAR Tables TRRMoment1 Moment2 Stroke1 Stroke2 Grey Value Signature 120.7690.7670.7890.7750.677 FAR Moment1 Moment2 Stroke1 Stroke2 Grey Value Signature200.7660.7650.7280.7310.716
26
FRR Table FRR Moment1 Moment2 Stroke1 Stroke2 Grey Value Signature130.7190.7180.5890.5920.636 Signature140.9760.9770.560.5880.697 Signature150.8890.8870.4860.4280.674 Signature160.7390.740.5120.5370.798 Signature170.7890.7910.5890.5740.816 Signature180.699 0.6430.6590.621 Signature190.8280.8290.5670.5490.698
27
Single Network TAR Output Signature10.947 Signature20.825 Signature30.637 Signature40.56 Signature50.789 Signature60.899 Signature70.778 Signature80.664 Signature90.527 TRROutput Signature100.467 Signature110.399 Signature 120.489 FRR Output Signature130.491 Signature140.474 Signature150.38 Signature160.425 Signature170.398 FAROutput Signature180.518 Signature190.63 Signature200.589
31
Conclusions Built a robust algorithm Consumes less time for execution Multi Network improved results Median Filtering preserved the sharpness of the signature Strokes evaluation resulted in more accuracy in detection Thresholds provided flexibility in controlling error in making a decision Reduced/eliminated fraud to a large extent
32
Future Work This system can be extended to Online Signature Recognition Enhanced Back-Propagation Algorithm and Batch Back- Propagation Algorithm can be implemented together for improved performance. New feature extractions can be added Intensity/ Speed Existence of breaks in signature
33
References 1. Anil K Jain -Online Signature Verification 2. SHENG-FUU LIN, YU-WEI -A Study on Chinese Carbon- Signature Recognition 3. The biometric resource center- http://www.biomet.org/signature.html http://www.biomet.org/signature.html 4. An Application of Biometric Technology: Signature Recognition http://technologyexecutivesclub.com/artbiomterissignature.htm http://technologyexecutivesclub.com/artbiomterissignature.htm 5. Pattern recognition - http://www.ph.tn.tudelft.nl/PRInfo/prarea.html 6. Median Filtering - http://www.rhrsoft.com/ico/median_filter_menu.html http://www.rhrsoft.com/ico/median_filter_menu.html
34
Thank You!
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.