Signature Recognition Using Neural Networks and Rule Based Decision Systems CSC 8810 Computational Intelligence Instructor Dr. Yanqing Zhang Presented.

Slides:



Advertisements
Similar presentations
Patient information extraction in digitized X-ray imagery Hsien-Huang P. Wu Department of Electrical Engineering, National Yunlin University of Science.
Advertisements

Applications of one-class classification
QR Code Recognition Based On Image Processing
Road-Sign Detection and Recognition Based on Support Vector Machines Saturnino, Sergio et al. Yunjia Man ECG 782 Dr. Brendan.
Principal Component Analysis Based on L1-Norm Maximization Nojun Kwak IEEE Transactions on Pattern Analysis and Machine Intelligence, 2008.
Caroline Rougier, Jean Meunier, Alain St-Arnaud, and Jacqueline Rousseau IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 21, NO. 5,
Automatic classification of weld cracks using artificial intelligence and statistical methods Ryszard SIKORA, Piotr BANIUKIEWICZ, Marcin CARYK Szczecin.
Fingerprint Minutiae Matching Algorithm using Distance Histogram of Neighborhood Presented By: Neeraj Sharma M.S. student, Dongseo University, Pusan South.
Adviser:Ming-Yuan Shieh Student:shun-te chuang SN:M
66: Priyanka J. Sawant 67: Ayesha A. Upadhyay 75: Sumeet Sukthankar.
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
HCI Final Project Robust Real Time Face Detection Paul Viola, Michael Jones, Robust Real-Time Face Detetion, International Journal of Computer Vision,
1 Learning to Detect Objects in Images via a Sparse, Part-Based Representation S. Agarwal, A. Awan and D. Roth IEEE Transactions on Pattern Analysis and.
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
Ensemble Tracking Shai Avidan IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE February 2007.
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
Comparison and Combination of Ear and Face Images in Appearance-Based Biometrics IEEE Trans on PAMI, VOL. 25, NO.9, 2003 Kyong Chang, Kevin W. Bowyer,
Smart Traveller with Visual Translator for OCR and Face Recognition LYU0203 FYP.
Face Processing System Presented by: Harvest Jang Group meeting Fall 2002.
Automatic Fingerprint Verification Principal Investigator Venu Govindaraju, Ph.D. Graduate Students T.Jea, Chaohang Wu, Sharat S.Chikkerur.
05/06/2005CSIS © M. Gibbons On Evaluating Open Biometric Identification Systems Spring 2005 Michael Gibbons School of Computer Science & Information Systems.
A Brief Survey on Face Recognition Systems Amir Omidvarnia March 2007.
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Face Recognition Using Neural Networks Presented By: Hadis Mohseni Leila Taghavi Atefeh Mirsafian.
Biometrics: Ear Recognition
West Virginia University
Presented by: Kamakhaya Argulewar Guided by: Prof. Shweta V. Jain
ONLINE HANDWRITTEN GURMUKHI SCRIPT RECOGNITION AND ITS CHALLENGES R. K. SHARMA THAPAR UNIVERSITY, PATIALA.
Handwritten Signatures Authentication using ANNs Committee Machines M.Heinen, F. Osório and P. Engel October Handwritten Signatures Authentication.
CPSC 601 Lecture Week 5 Hand Geometry. Outline: 1.Hand Geometry as Biometrics 2.Methods Used for Recognition 3.Illustrations and Examples 4.Some Useful.
Introduction to Biometrics Charles Tappert Seidenberg School of CSIS, Pace University.
Kumar Srijan ( ) Syed Ahsan( ). Problem Statement To create a Neural Networks based multiclass object classifier which can do rotation,
Ajay Kumar, Member, IEEE, and David Zhang, Senior Member, IEEE.
User Authentication Using Keystroke Dynamics Jeff Hieb & Kunal Pharas ECE 614 Spring 2005 University of Louisville.
COMPARISON OF IMAGE ANALYSIS FOR THAI HANDWRITTEN CHARACTER RECOGNITION Olarik Surinta, chatklaw Jareanpon Department of Management Information System.
Handwritten Recognition with Neural Network Chatklaw Jareanpon, Olarik Surinta Mahasarakham University.
A Face processing system Based on Committee Machine: The Approach and Experimental Results Presented by: Harvest Jang 29 Jan 2003.
Biometrics Authentication Technology
Handwritten Signature Verification
Face Image-Based Gender Recognition Using Complex-Valued Neural Network Instructor :Dr. Dong-Chul Kim Indrani Gorripati.
1 Machine Vision. 2 VISION the most powerful sense.
Objectives: Terminology Components The Design Cycle Resources: DHS Slides – Chapter 1 Glossary Java Applet URL:.../publications/courses/ece_8443/lectures/current/lecture_02.ppt.../publications/courses/ece_8443/lectures/current/lecture_02.ppt.
FieldTraining Seminar on Field Training Seminar on “Hand-Geometry Based Person Authentication System ” By By Ullesh Chavadi M Ullesh Chavadi M.
Evaluation of Gender Classification Methods with Automatically Detected and Aligned Faces Speaker: Po-Kai Shen Advisor: Tsai-Rong Chang Date: 2010/6/14.
Optical Character Recognition
Student Gesture Recognition System in Classroom 2.0 Chiung-Yao Fang, Min-Han Kuo, Greg-C Lee, and Sei-Wang Chen Department of Computer Science and Information.
Solar Image Recognition Workshop, Brussels, 23 & 24 Oct. The Detection of Filaments in Solar Images Dr. Rami Qahwaji Department of Electronic Imaging and.
Recognition of biological cells – development
Hand Geometry Recognition
Improving the Performance of Fingerprint Classification
Gender Classification Using Scaled Conjugate Gradient Back Propagation
Authentication.
Recognizing Deformable Shapes
FACE RECOGNITION TECHNOLOGY
Visual Signature Verification using Affine Arc-length
Forged Handwriting Detection
WICT 2008 Offline Handwritten Signature Verification using Radial Basis Function Neural Networks Kenneth P. Camilleri St. Martin’s Institute of IT Dept.
A New Approach to Track Multiple Vehicles With the Combination of Robust Detection and Two Classifiers Weidong Min , Mengdan Fan, Xiaoguang Guo, and Qing.
Zhengjun Pan and Hamid Bolouri Department of Computer Science
Introduction to Pattern Recognition
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
PROJECTS SUMMARY PRESNETED BY HARISH KUMAR JANUARY 10,2018.
Dynamic Authentication of Typing Patterns
Department of Electrical Engineering
Faculty of Science IT Department Lecturer: Raz Dara MA.
An Infant Facial Expression Recognition System Based on Moment Feature Extraction C. Y. Fang, H. W. Lin, S. W. Chen Department of Computer Science and.
A maximum likelihood estimation and training on the fly approach
Recognizing Deformable Shapes
Presentation transcript:

Signature Recognition Using Neural Networks and Rule Based Decision Systems CSC 8810 Computational Intelligence Instructor Dr. Yanqing Zhang Presented By Mateena Syeda Shilpa Panaganti

Outline Introduction Signature Recognition System Design/Architecture Implementation Experimental Results Conclusions and Future Work

Introduction Authentication and Identification bears an important role in many fields Different types of authentication  Password  Picture recognition  Signature recognition  Finger print recognition Growing interest towards Biometric Authentication  Airports  Credit card validation  Surveillance

A Signature is defined as the name of a person written with his/her own hand Signature Recognition is the process of verifying the user signature with the ones stored in database A computationally expensive and a difficult process Helps in authenticating  Bank Checks  Credit Card Transactions  Property Documentation  Forensic Investigation Signature Recognition

 Line crossing Segmentation  Behavioral Analysis  Statistical Approach  Neural Networks Types of Signature Recognition

Proposed System Design Data acquisition – Getting input signatures Preprocessing – Removing erroneous data Feature Extraction – Recording of special characteristics Neural Network structure – Associating with each characteristic Training Networks - Organizing of the authentic and forged data Rule Based Decision Making – Establishing error rate, thresholds Performance evaluation – TAR, TRR, FAR, FRR

Neural Networks Rule Based Decision system Stroke Angles Moment Values Protein sequence Pre- Processing Sum of Grey Values System Architecture Result : Genuine/ Forged Input Signature Median Filtering Resizing

Implementation Data Acquisition Signatures Acquisition  A finite number of samples collected from few Subjects  Authentic  Forged  Each signature is scanned using a Scanner  Stored as image in TIF format

Preprocessing  MATLAB - Image Processing Toolbox  Normalized each signature image to fit a 128x256 vector  The Median Filter Removal of Noise/Spurious pixels Define Neighborhood size Choose the median intensity value among the pixels in the neighborhood Replace the pixel's intensity by the median value

Original Signature Preprocessed Signature

Feature Extraction  A Feature is any extractable measurement taken on the input pattern that is to be classified  The key is to choose and extract features that are  computationally feasible  lead to a good classification system with few misclassification errors  reduce the input data into a manageable amount of information without discarding valuable or vital information

 Moments  Moments are defined as  Moments are used to determine properties of a component  Also known as “invariant” - denotes an image or a shape feature which remains unchanged if that image or shape undergoes one or combination of the following changes:  Change of size (scale)  Change of position (translation)  Change of orientation (rotation)  Reflection

Result of Moment Features extracted from the Signature

Strokes  A global feature - important for distinguishing signatures  Developed a new method to determine Orientation of the signature at different points  Orientation is defined as inverse tangent of the Yn/Xn Orientation = Tan -1 (Yn / Xn )  The points at which the orientation is calculated are known as critical points  Established an Angle threshold θ  Stroke = TRUE, if Orientation > θ  3 features - X coordinate, Y coordinate and the angle at that position

Result of Stroke Features extracted from the Signature

Multi Neural Network Neural Network Training  Back propagation algorithm  Five different Neural Networks  Why five systems?  Each system is trained with three features Neural Network Testing  Five different testing results Decision Rules

Neural Networks Rule Based Decision system Stroke Angles Moment Values Protein sequence Preprocessed Input Signature Sum of Grey Values System Architecture Result : Genuine/ Forged

Decision Function The output from each network is a value between 0 and 1 indicating the degree of confidence in the genuineness of the presented signature A Threshold value between 0 and 1 is selected to authenticate the signature A signature is accepted if the output of the network exceeds the Threshold value The selection of Threshold value plays a vital role

Threshold Values Generally 0.5 is taken as Threshold value for Single Neural Network Here each Feature extracted is given an individual Threshold value Two Neural Network Systems resulting the testing results of Moments have 0.8 Threshold value. Two systems with stroke angles have 0.6 Threshold. One system resulting the sum of grey values has 0.7 Threshold value.

Decision Rules Two Moments and two stroke angles are considered as single element. Eight rules are drawn with respect to Decision function values of features. In Rules given below  M-Moments  A-Stroke Angles  S-Sum of Grey values

Decision Rules (cont..) If M>0.8 and A>0.6 and S>0.7 then accepted If M>0.8 and A>0.6 and S<0.7 then accepted If M>0.8 and S>0.7 and A<0.7 then accepted If S>0.7 and A>0.6 and M<0.8 then accepted If M>0.8 and A<0.6 and S<0.7 then rejected If S>0.7 and A<0.6 and M<0.8 then rejected If A>0.6 and M<0.8 and S<0.7 then rejected If M<0.8 and A<0.6 and S<0.7 then rejected

Performance Evaluation The performance of system is evaluated by four different categories TAR – True Acceptance Rate TRR – True Rejection Rate FAR – False Acceptance Rate FRR – False Rejection Rate The Main aim here is to increase the TAR and FRR, while decreasing TRR and FAR.

Results Signatures Acquisition  Each signature is scanned using a Scanner (Hewlett Packard Scan Jet) connected to Pentium 4 PC  Total 20 subjects are tested  For each subject 5 genuine signatures are collected and trained the system  8 are tested with forgeries  12 are authentic signature  The Neural Network system is trained with different values of parameters  The system is trained with various values of hidden neurons and error.

Multi-Network TAR Table TAR Moment1 Moment2 Stroke1 Stroke2 Grey Value Signature Signature Signature Signature Signature Signature Signature Signature Signature Signature Signature

TRR and FAR Tables TRRMoment1 Moment2 Stroke1 Stroke2 Grey Value Signature FAR Moment1 Moment2 Stroke1 Stroke2 Grey Value Signature

FRR Table FRR Moment1 Moment2 Stroke1 Stroke2 Grey Value Signature Signature Signature Signature Signature Signature Signature

Single Network TAR Output Signature Signature Signature Signature40.56 Signature Signature Signature Signature Signature TRROutput Signature Signature Signature FRR Output Signature Signature Signature Signature Signature FAROutput Signature Signature Signature

Conclusions Built a robust algorithm Consumes less time for execution Multi Network improved results Median Filtering preserved the sharpness of the signature Strokes evaluation resulted in more accuracy in detection Thresholds provided flexibility in controlling error in making a decision Reduced/eliminated fraud to a large extent

Future Work This system can be extended to Online Signature Recognition Enhanced Back-Propagation Algorithm and Batch Back- Propagation Algorithm can be implemented together for improved performance. New feature extractions can be added  Intensity/ Speed  Existence of breaks in signature

References 1. Anil K Jain -Online Signature Verification 2. SHENG-FUU LIN, YU-WEI -A Study on Chinese Carbon- Signature Recognition 3. The biometric resource center An Application of Biometric Technology: Signature Recognition Pattern recognition Median Filtering -

Thank You!