Presentation on theme: "Graham Leedham & Vladimir Pervouchine"— Presentation transcript:
1Validating the use of Handwriting as a Biometric and it’s Forensic Analysis Graham Leedham & Vladimir PervouchineC2i, School of Computer EngineeringNanyang Technological UniversitySingapore
2Structure of this Talk Brief History of Handwriting A look at the Variability of HandwritingA look at Forensic Document AnalysisComputer Tools to assist FDE’sIs handwriting an accurate biometric?Study of the effectiveness of features used by FDE’s
3History of Handwriting 25000 years agoCave paintings are the oldest pictures ever found. Many were made more than 25,000 years ago by 'stone age' cave dwellers using sticks, sharp stones or their fingers. For 'paint' they used charcoal, coloured earth and vegetable dyes.Early man could not write, so to remember things or leave messages he drew pictures on cave walls, rocks, bones or wet clay. Gradually, over the years, pictures became symbols, and then letters to form alphabets of signs to represent sounds.
4History of Handwriting SUMERIAN CUNEIFORMSome of the earliest examples of a writing system come from the Sumerian people who lived in the Middle East between 4000 and 6000 years ago.'Cuneiform' means 'wedge-shaped' because the inscriptions were made by pressing the triangular tip of a reed or a stick (stylus) into wet clay tablets. The wedge marks were combined into signs representing objects and ideas. At first there were over 2000 different signs, but the Sumerians gradually reduced their 'alphabet' to about 600 symbols.It was also at about this time that Chinese characters began to emerge independently in China with symbols being written on bone and shells. They too were originally pictures and symbols to represent ideas and objects.These were the earliest forms of writing. And subsequently had its own history of development.
5History of Handwriting 4000 years agoEGYPTIAN HIEROGLYPHICSWhile cuneiform was spreading throughout Mesopotamia, a different writing system was being developed in nearby Egypt. From about 5000 years ago the Egyptians used a form of stylised picture writing called hieroglyphics. ('Writing of the Gods'.)
6History of Handwriting 2500 years agoGREEKAbout 2500 years ago, the ancient Greeks were using an alphabet very much like our own. In fact, the word 'alphabet' comes from the first and second Greek letters, 'alpha' and 'beta'.The Greek alphabet was developed from the Phoenician writing system. The Phoenicians were great sailors and merchants who traded with many countries in the Mediterranean, taking their writing with them. But the Greeks added signs for vowels because the Phoenician alphabet contained only consonants.
7History of Handwriting 2000 years agoROMANWhen the Romans conquered Greece just over 2000 years ago they took over the Greek alphabet and altered the shape of many letters. The letters of the English alphabet come directly from the Roman alphabet, although we have added three extra letters: J, U and W.
8History of Handwriting 800 years agoGOTHICAfter the Roman Empire collapsed in the 5th century AD, it was mainly monks who kept up the art of writing. Soon every monastery had its own scriptorium where manuscripts were copied, decorated and bound into books.
9The Magna Carta written in 1215 (written in Latin)
10History of Handwriting 500 years agoITALICIn the 15th century a group of Italian scholars working in Florence decided that Gothic was difficult to read so they developed a new script. This style soon became popular all over Europe. Even today we still call styles like this 'Italic' because they came from Italy.
11History of Handwriting 300 years agoCOPPERPLATEThe 'Copperplate' style of handwriting was taught by writing masters from the 17th century onwards. Sometimes known as the English running hand, this neat easy-to-read script was also easy to write. Word after word could be produced without lifting the pen between letters. Until the invention of the typewriter it was widely used for business records and legal documents.
12History of Handwriting Several handwriting styles are now taught in schools around the world. There is less variation in style.
13Variability of Handwriting Individualstylesdevelop
14Variation of the word “the” written by 8 different writers Variation of the word “the” written by 8 different writers. Source: Harrison, 1981
15Variation of the letters “G” and “R” written by 15 different writers. Source: Harrison, 1981
16Example of variation in letter formation styles in 10 letters from 9 different writers. Source: Harrison, 1981
17Handwriting can be produced by many different writing instruments
18Handwriting has been used as a legal or official seal for centuries “Setyour handto the document.”“Make your mark.”
19Forgery / Disguise / Alteration Is the writing FORGED? (the author is not who he claims to be and is attempting to assert the writing is the same as someone else’s) orIs the writing DISGUISED? (the author wishes to deny doing the writing at a later date) orIs the writing ALTERED? (Has someone modified or altered the original document?)
21Current Methods used by Forensic Document Examiners Primarily involves manual extraction and comparison of various global and local visible features.They are usually doing a comparison test between a “Questioned Document” and a set of “Known Documents”.The objective is to determine whether the “Questioned Document” was, or was not, written by a particular individual.The “Questioned Document” may be in disguised handwriting.
22Current Methods used by Forensic Document Examiners Global features: Handwriting size, word spacing, line spacing,arrangement of words, margin patterns, baseline patterns,line quality, spelling, grammar …Local features: character size, height-width ratios of characters,Size and shape of loops, letter slant, letter design, letter spacing, writing pressure,speed variation, t-crossings and i-dots, hooking, punctuation marks ...FOR MORE INFO...See texts: Harrison W.R. (1981), Suspect Documents, their Scientific Examinations, Nelson-Hall Inc., Illinois.Hilton O. (1993), Scientific Examination of Questioned Documents, CRC Press, Florida.
23Current Methods used by Forensic Document Examiners Hidden writing left as pressure indentations on sheets below the one written on are recovered using ElectroStatic Detection Apparatus (ESDA) equipment.
24Current Methods used by Forensic Document Examiners FISH - Forensic Information System for Handwriting - used by the bundeskriminalamant, Germany to maintain a database of known and unknown writers. A handwriting sample is characterised by interactive extraction of several global and local features to create a database of handwriting which can be indexed to locate similar handwriting to that in a Questioned Document.
25Current Methods used by Forensic Document Examiners Tick sheets, or comparison charts, (used in the UK and other countries) are created showing side-by-side comparison of known and questioned words or characters. The comparison is subjective and based on local and global features. The degree of similarity is graded on a five point scale –1. Was written by….,2. High probability it was written by....,3. Probable/could well have been written by….,4. No evidence,5. Inconclusive.
26Example of a manually produced comparison chart to show that these writings were produced by different writers:Source: Harrison, 1981
27Forgery / Disguise / Alteration Is the writing FORGED? (the author is not who he claims to be and is attempting to assert the writing is the same as someone else’s) orIs the writing DISGUISED? (the author wishes to deny doing the writing at a later date) orIs the writing ALTERED? (Has someone modified or altered the original document?)
28Example of a manually produced comparison chart to show disguised handwriting.Source: Harrison, 1981
29Forgery / Disguise / Alteration Is the writing FORGED? (the author is not who he claims to be and is attempting to assert the writing is the same as someone else’s) orIs the writing DISGUISED? (the author wishes to deny doing the writing at a later date) orIs the writing ALTERED? (Has someone modified or altered the original document?)
30EARLY COMPUTER TOOLS TO ASSIST DOCUMENT EXAMINERS: The early computer tools were predominantly in the use of the COMPUTER IMAGE PROCESSING and image handling techniques.e.g. Behenen and Nelson, 1992.And in the ENHANCEMENT of poor images as encountered in ESDA lifts or provide alternative methods to view the hidden writing.e.g. Baier et al., 1987As well as a number of attempts at WRITER IDENTIFICATIONe.g. Kuckuck et al., 1979
31Our Earlier Research attempted to ease the workload of the FDE Objective: to investigate the possible use of computer basedimage handling tools to assist a document examiner in the analysisof a handwritten document and preparation of the evidence.1. Oct Dec 1994: (FODES)Holcombe G., An experimental image processingenvironment for the forensic examination of questioneddocuments, MSc Dissertation, University of Essex, 1995.2. Oct Dec 1997: (WIS)Greening C., Automatic writer identification for forensic document analysis, PhD Dissertation, University of Essex, 1998.3. May April 1999: (FOX)Applied Research Fund Project (RG25/95) “Image Analysis Tools for Authentication and Enhanced Classification of Handwritten Script Using Forensic Techniques” carried out at Nanyang Technological University.
32Previous Research at NTU (& Essex University) Achievements:Prototype system comprising tools to:1. Scan and view images, segment text from background.2. Various automatic and interactive tools to process the handwritten documents: line, word and character segmentation, chart generation, slant variation, loop, ascender and descender feature extraction, animated word, character or signature visualisation, stroke sequence extraction ….
33TOOLS TO ASSIST DOCUMENT EXAMINERS: Work at Essex University and Nanyang Technological University:Leedham, Sagar, Solihin, Holcombe, Chong, Greening ( )1. Handwriting Extraction :Background removalShadow noise removalSalt and pepper noise removal3. Feature Extraction:Baseline patterns and angleWord slantAverage stroke widthHeight of main body, ascendersDepth of descendersLoop features: area, slant,circle dissimilarity index4. Simulation :Ruler guided writingSlant manipulation2. Line, Word, CharacterSegmentation:Text is availablescannedimagenoise freevariousfeaturessimulatedimagesFOX & WIS systemsPurpose: To enable document examiners to produce display charts and physical measurements.
34Previous Research Results Achieved Screenshot of visualization softwareSupplementary software for visual comparison of letter formation has been implemented.A set of rule-based algorithms have been developed for feature extraction.
35TOOLS TO ASSIST DOCUMENT EXAMINERS: Work in Germany & Netherlands:BKA, Schomaker, Franke, de Jong, et alOne of the first systems to be installed to provide database matching of handwriting features for individuals was the FISH system introduced by the German law enforcement agency (Bundeskriminalamt) which semi-automatically extracts features to characterise handwriting and store them in a database.(Shown at the 5th IGS, 1991, Tempe, by Manfred Hecker)A recent research consortium has sought to extend this work in the WANDA system (see
36TOOLS TO ASSIST DOCUMENT EXAMINERS: Work in Australia:Found, Rogers, Sita et alInvestigating handwritten signature complexity and tools to assist document examiners. Providing objective means for the subjective techniques employed by document examiners.Other work:There are numerous other researchers currently working on writer identification and tools to identify forged handwriting:Eg. Bensefia et al. from Rouen University, FranceFairhurst et al. from Kent University, UKCha & Tappert from Pace University, USAUeda et al., Nara College of Technology, Japan
37So what is all this about??? What is the problem?So what is all this about???People have been doing HANDWRITING for 1000’s of years,Crime involving FORGED, DISGUISED or ALTERED handwriting is common in cheques, anonymous letters, wills and other examples where deception can lead to illegal gain or advantage.FORENSIC DOCUMENT EXAMINERS have been authenticating handwriting in one form or another for more than 100 years.Many TEXT BOOKS have been written describing the analysis techniques and providing CASE STUDIES.Today all LAW ENFORCEMENTS AGENCIES practice Questioned Document Examination and employ Forensic or Questioned Document Examiners along with other Forensic Scientists.There exist a number of PROFESSIONAL ORGANISATIONS around the world which foster professional training and accreditation to forensic Document Examination.
38THE PROBLEM IS…..Other branches of Forensic Science such as DNA analysis, blood, fibre and soil analysis are supported by a wealth of CHEMICAL, BIOLOGICAL and PHYSICAL KNOWLEDGE obtained from years of scientific research and published in learned journals.Forensic Document Examiners do not have any similar SCIENTIFIC BASIS to support their EXPERT OPINION.The current acceptability of Forensic Document Examiners expert opinion is based on the CREDIBILITY, EXPERIENCE and STANDING of the FDE. They have little scientific evidence to support their opinion. Their judgement is subjective and not an exact science.Recent legal challenges (eg Daubert, 1993 and Starzecypzel, 1995) have brought this lack of scientific support into the limelight.
39OBJECTIVES……During the past 20 years there has been sporadic interest in the application of computer systems to ASSIST AND SUPPORT the work of Forensic Document Examiners.In this rest of this presentation some of our current research work is presented which:Provides computer support to the analysis methods used by document examinersSeeks scientific evidence to support the analysis methods used by forensic document examiners.Whilst much of the research carried out in handwriting processing and recognition provides considerable scientific knowledge about the education of writing styles, cognitive processes and motor-control activities in the production and recognition of handwriting, only a limited amount of the work is directly applied to the work of the FDE.
40Research Motivation (restating) Most of the techniques employed by document examiners are based on standard practices and previous experience. The Forensic Document Examiner as an Expert Witness is highly reliant on their personal standing and credibility.There is very little scientific justification for many of their practices and procedures. The only truly scientific examination is the chemical analysis and dating of ink and paper.Several court rulings have brought into question the scientific basis of the expert document examiners testimony.Eg United States vs Starzecpyzel, 1995
41Is handwriting a biometric? The argument is that - because handwriting is a practiced ballistic skill, it represents some uniqueness to the individual which can be used to identify the individual.However skilled forgery is widespread, and individual variability due to health, stress writing implement, writing stance etc… is significant. Where does the genuine end and the forgery begin?
42Scientific basis for forensic document examination CURRENT APPROACHESScientific basis for forensic document examinationAPPROACH 1.Is handwriting unique?Feature extraction:Proves it is a biometric. Mainly computational features + some document examiner featuresAPPROACH 2.Are professional forensic document examiners better than other people at handwriting examination?Justifies the need for tools to assist forensic document examiners in what they do.APPROACH 3.Is it possible to verify the effectiveness of features employed by forensic document examiners?Feature extraction:Justifies the use of features/methods used by Document Examiners.
43Two tests for establishing error rates APPROACH 1: IS HANDWRITING UNIQUE?Work on individuality at CEDAR (Srihari et al. Journal of Forensic Sciences, 2002)Establish discriminatory power of handwritingUse objective methodsAlgorithms suitable for software implementationRelate methods to FDE (forensic document examination) proceduresRigorous testing, establish error-ratesPeer-reviewIdentificationAlgorithmHandwriting SampleHandwriting Sample 1Handwriting Sample 2Writer 1Writer nSame WriterDifferent Writer(a)Verification(b)Two tests for establishing error rates
44APPROACH 1: IS HANDWRITING UNIQUE? POVIDING TOOLS TO ASSIST DOCUMENT EXAMINERS:CEDAR-FOX toolset developed at CEDAR
45APPROACH 2: ARE PROFESSIONAL FORENSIC DOCUMENT EXAMINERS BETTER THAN OTHER PEOPLE IN HANDWRITING EXAMINATION?Work at Drexel University, USA:Kam et al (1994- )andWork at LaTrobe University, Australia:Found, Rogers et al (1994-)Both groups performed a number of experiments comparing professional FDE’s and lay people.They concluded that“Professional document examiners DO possess writer-identification skills absent in the general population.”
46APPROACH 3: IS IT POSSIBLE TO VERIFY THE EFFECTIVENESS OF FEATURES USED BY FORENSIC DOCUMENT EXAMINERS?Handwriting has been shown to be discriminative when identifying whether an unknown writer is one a group of N known writers and verifying whether two documents are from the same or different writers. (Srihari et al)Document examiners have been proven to be better than lay people at writer identification/verification, including forgery identification. (Kam et al & Found, Rogers et al)The methods employed by document examiners are well documented in various texts.
47This is what we are trying to do. APPROACH 3: IS IT POSSIBLE TO VERIFY THE EFFECTIVENESS OF FEATURES USED BY FORENSIC DOCUMENT EXAMINERS?The comparison methods used by FDE’s are frequently QUALITATIVE / SUBJECTIVE and the resulting evidence also qualitative / subjective.QUANTITATIVE / OBJECTIVE ANALYSIS of the methods used by FDE’s is necessary to determine techniques and methods which can be supported by scientific proof.This is what we are trying to do.
48APPROACH 3: OBJECTIVES OF THE STUDY 1. To develop a system to automatically extract structural features from individual handwritten characters.2. To assess the uniqueness and individuality of the structural or visually observable features used by Forensic Document Examiners3. To determine whether the features are unique to a writer and can be used for author identification
49SELECTION OF CHARACTERS TO STUDY Cannot examine all characters as feature sets must be individually tailored and algorithms written:Choose frequently occurring charactersCharacters must potentially possess writer-specific features. (Capital letters as well as letters that consist of several strokes, like those with ascenders or descenders, bear more individual information than simple characters like “i” or “c”.)Robust automatic feature extraction of the writer-specific features must be achievableBased on an analysis of 220,000 words from three novels, the characters chosen for analysis were ‘d’, ‘y’, ‘f’ and grapheme ‘th’.The three letters and one grapheme represent >12% of typical script.
50Frequencies of letters and graphemes in English texts Letters / graphemes should:be frequenthave ascenders / descendersnot have too simple shape
51Features of “d” Height Width Height to width ratio Relative height of ascenderSlant of ascenderFinal stroke angleFissure angleIn this study we concentrate on structural micro-features extracted from characters and graphemes. These are a subset of the features used by forensic document examiners.
52Example of a manually produced comparison chart to show that these writings were produced by different writers:Source: Harrison, 1981
53Features of “y” Height Width Height to width ratio Relative height of descenderDescender loop completenessDescender slantFinal stroke angleSlant at point
54Features of “f” Height Width Height to width ratio Presence of loop at FTPresence of loop at FBSlant
55Features of “th’ Height Width Height to widht ratio Distance HC Distance TCDistance THAngle between TH and TCSlant of t-stemSlant of h-stemPosition of t-bar
56Data used for evaluation : Individual characters were extracted manually from 600 samples of the CEDAR letter representing data from 200 writers.To decrease variation of a character form caused by the preceding and the following characters, samples of characters “d” and “y” were extracted only from the end of words, and samples of grapheme “th” were extracted only from the beginning of words.All samples of character “f” were extracted because there were only 8 occurrences of this character in the letter.There were at most 10 samples of character “d”, 8 samples of “y”, 8 samples of “f”, and 9 samples of “th” extracted from each of the 600 documents.Letter“d”“y”“f”“th”Samples per writer302427
57Automatic Feature Extraction : The algorithms used two version of an image: a binarised image of a character and its skeleton, which was obtained by thinning the binarised image.After all images had been processed by feature extraction programs, the feature values were verified manually for each image. An image was excluded from the set of patterns used in the later study if any of the features was extracted incorrectly.Correct Feature Extractionfdyth92%85%87%
58We assume that an FDE can : effectively utilise more subtle features than our system does, for it is very hard to express in strict mathematical terms many of the document examiner features, andthe person can determine which features should, and which should not, be used in a particular case (that is, having looked at handwritten samples, an expert is able to select only the important features for handwriting comparison).As a consequence, an expert FDE should be able to distinguish writers or establish authorship of questioned documents better, on average, than our system.Our research is thus aimed at determining a lower bound on the accuracy of writer discrimination
59Feature RelevanceWe want to place each feature into one of three classes according to the results of feature subset selection experiments:Indispensable - it was selected in each optimal feature setPartially relevant - selected in some of the optimal feature setsIrrelevant features - not selected in any optimal feature setThis provides information about the features which should always be chosen, which features can be substituted by others (only some of this subset need to be chosen), and features which should be excluded.
60Evaluation of the Feature Set An induction algorithm was used to evaluate a feature set.We used n-fold cross validation, called Distal, to evaluate a feature subset (Yang et al., 1997)The training data was divided into n approximately equal partitions and the induction algorithm was then run n times each time leaving one subset for test and using the other n − 1 parts for training.The classification accuracy obtained from n tests was then averaged and associated with the corresponding feature subset.The wrapper approach was used to find all the best feature subsets (John et al., 1994)
61Evaluation of the feature set A binary 31-bit string[ … 0 1]Feature set to evaluate[ f2 f3 f4 f31 ]The original feature set[ f1 f2 f3 f4 f5 f6 … f30 f31 ]DistalN-fold cross validationAccuracy value for the feature setANN
62Classifier used to Evaluate the Feature Set All feature values were treated as real numbers. The normalised Manhattan distance was used as the distance measure for DistAlwhere k is the number of features (31), mini and maxi are the minimum and maximum values of the ith feature in the data set respectively.
63Search for the best feature sets An exhaustive search is not feasible)Initial randomly generated stringsGenetic AlgorithmEvolution of population of stringsEvaluation of accuracy(string fitness) for each string by n-fold cross validationNext generation of stringsArray of fitness valuesBest strings found
64Search for the best feature sets For some writers the amount of patterns obtained for one of the four characters was too small because of errors in the feature extraction stage.To make the results of experiments comparable for all single characters and the four-character set, patterns from 165 different writers were used (writers who had less than 15 patterns for any of the character due to errors in feature extraction stage were excluded from the study).
65Results Classification Accuracy for 165 writers Character “d” “y” “f” “th”“dyf th”Accuracy, %1620263658Results for single character performance are in agreement withthose of Srihari et al,, 2002 even using a different feature set.
66ResultsIndispensable features, fiPartially relevant features, fiIrrelevant features, fi1, 2, 11, 16, 18, 22, 25, 26, 27, 28, 29, 30, 313, 4, 5, 8, 9, 10, 12, 13, 14, 15, 17, 21, 23, 246, 7, 19, 20Feature for the grapheme “th” consititue the greatest number of indispensible features. (8 out of 13).Four features were irrelevant (angles in “d” and loops in “f”).
67ConclusionsMany of the features FDE’s use contain discriminatory power.Genetic Algorithms are again demonstrated to be effective at identifying indispensable and dispensable features.Analysis of graphemes is more accurate than individual characters (also noted by FDE methods).These results are only valid for identifying or verifying genuine handwriting samples. The detection of forgery or disguise is unlikely to be successful with this method.
68ConclusionsOnly a small set of characters and one grapheme were analysed. It is not possible to draw absolute conclusions based on such limited analysis.We CAN say that more formalisation of document examiner features and analysis on a wider range of letters and graphemes is likely to provide a solid scientific basis for the techniques and features currently used by FDE (and also enable useful tools to be developed to enhance their exmination performance).
69FUTURE WORK To improve the accuracy of feature extraction: - A more effective algorithm should be found for letter image skeletonization- Some of the angular feature measurements need to be reconsidered and the accuracy improved- Important features, and particularly loop features, need to be further defined for measurement of different feature values corresponding to different kinds of loopsThe analysis must be extended to include more writers and more examples of each letter before a conclusive result can be obtained.
70ADDENDUM: Intelligent Skeletonisation and Penstroke Direction and Sequence Recovery Feint line of g’sdescenderPeople are particularlygood at determiningpen-stroke directionand even thefluency of the writing
71Intelligent Skeletonisation and Penstroke Direction and Sequence Recovery We need to integrate the subtleties of human visual perception with knowledge of forensic document examination.An idealised skeleton of the letter also showing pen-down and pen-up pointsThe imperfect skeleton produced by a popular skeletonisation algorithm
72A New Skeletonisation scheme Purpose: approximate pen trajectory so that individual features of handwriting are retained.Approach: three stages.Vectorisation: initial skeletal branches are formed.Stroke formation: the branches are merged into strokes and hidden loops are recovered.Adjustment of skeleton: spline knot positions are adjusted.
74ObservationsA new method of skeletonisation was developed which preserves structural features of handwritingThe method allows extraction of structural features more accurately than was possible with original thinning and postprocessingThe method allows the extraction of additional structural features that could not be reliably extracted previouslyWriter identification has been demonstrated to be improved.More details to appear inVladimir Pervouchine, Graham Leedham, and Konstantin Melikhov, Handwritten character skeletonisation for forensic document analysis, Accepted for presentation at the 20th Annual ACM Symposium on Applied Computing, Santa Fe, New Mexico, March 2005.
75SUMMING UPHandwriting remains a mechanism for authorisation. Legal challenges to the authenticity of the handwriting will continue.While handwriting has changed rapidly over the past few 100 years there is less stability now. (Some would argue that handwriting skills are degrading because of the widespread use of IT.)Scientific support to processes and procedures practiced by FDE’s to provide that authenticity is beginning.There remain many challenges. E.g. Detecting skilled forgery and performing verification in the presence of handwriting changes due to illness.