A New Approach to Signature Verification: Digital Data Acquisition Pen Ondřej Rohlík Department of Computer Science and Engineering University.

Slides:



Advertisements
Similar presentations
Perceptron Learning Rule
Advertisements

Automatic classification of weld cracks using artificial intelligence and statistical methods Ryszard SIKORA, Piotr BANIUKIEWICZ, Marcin CARYK Szczecin.
CSCI 347 / CS 4206: Data Mining Module 07: Implementations Topic 03: Linear Models.
Image Indexing and Retrieval using Moment Invariants Imran Ahmad School of Computer Science University of Windsor – Canada.
GMM-Based Multimodal Biometric Verification Yannis Stylianou Yannis Pantazis Felipe Calderero Pedro Larroy François Severin Sascha Schimke Rolando Bonal.
A segmented principal component analysis applied to calorimetry information at ATLAS ACAT May 22-27, Zeuthen, Germany H. P. Lima Jr, J. M. de Seixas.
Handwritten Character Recognition Using Artificial Neural Networks Shimie Atkins & Daniel Marco Supervisor: Johanan Erez Technion - Israel Institute of.
Forged Handwriting Detection Hung-Chun Chen M.S. Thesis in Computer Science Advisors: Drs. Cha and Tappert.
Dynamic Face Recognition Committee Machine Presented by Sunny Tang.
Classification of Music According to Genres Using Neural Networks, Genetic Algorithms and Fuzzy Systems.
1 Efficient Placement and Dispatch of Sensors in a Wireless Sensor Network Prof. Yu-Chee Tseng Department of Computer Science National Chiao-Tung University.
Neural Optimization of Evolutionary Algorithm Strategy Parameters Hiral Patel.
Face Recognition Using Neural Networks Presented By: Hadis Mohseni Leila Taghavi Atefeh Mirsafian.
Objectives: You will understand: How analyst can individualize handwriting to a particular person. What types of evidence are submitted to the document.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
Case Studies Dr Lee Nung Kion Faculty of Cognitive Sciences and Human Development UNIVERSITI MALAYSIA SARAWAK.
Ch. 16 Document Examination CSI And Document Examination CSI And Document Examination.
Handwriting analysis ASISTM Project Forensic Investigations.
Handwriting analysis.
CPSC 601 Lecture Week 5 Hand Geometry. Outline: 1.Hand Geometry as Biometrics 2.Methods Used for Recognition 3.Illustrations and Examples 4.Some Useful.
HOnors Forensic Science.  I. Document Examiners  A. Involves examination of handwriting and typewriting to ascertain the source or authenticity of a.
Ondrej Rohlik, Pavel Mautner, Vaclav Matousek, Juergen Kempf
Artificial Neural Networks
Loop Investigation for Cursive Handwriting Processing and Recognition By Tal Steinherz Advanced Seminar (Spring 05)
Jan Tichava – presenting author Ondřej Rohlík Jan Pikl Department of Computer Science and.
Matlab Matlab Sigmoid Sigmoid Perceptron Perceptron Linear Linear Training Training Small, Round Blue-Cell Tumor Classification Example Small, Round Blue-Cell.
1 Pattern Recognition Concepts How should objects be represented? Algorithms for recognition/matching * nearest neighbors * decision tree * decision functions.
Neural Networks Kasin Prakobwaitayakit Department of Electrical Engineering Chiangmai University EE459 Neural Networks The Structure.
CONTENTS:  Introduction  What is neural network?  Models of neural networks  Applications  Phases in the neural network  Perceptron  Model of fire.
 The advancement of science and technology is directly proportional to the advancement of time.  As we are swimming in the current of time we are gradually.
1 Handwriting Analysis, Forgery, and Counterfeiting By the end of these notes you will be able to: describe 12 types of handwriting characteristics that.
TECHNICAL SEMINAR ON SMART QUILL.
The Perceptron. Perceptron Pattern Classification One of the purposes that neural networks are used for is pattern classification. Once the neural network.
J.-Y. Yang, J.-S. Wang and Y.-P. Chena, Using acceleration measurements for activity recognition: An effective learning algorithm for constructing neural.
Signature Verification By Mayura Worlikar COSC 5010.
PRESENTATION ON BIOMETRICS
1  The Problem: Consider a two class task with ω 1, ω 2   LINEAR CLASSIFIERS.
Ch 16 Quiz, Document Research Poster Forensic Science 3/20/15.
Forensic Science.  I. Document Examiners  A. Involves examination of handwriting and typewriting to ascertain the source or authenticity of a questioned.
Handwriting Analysis EHS BioMed/Forensics. Video links chnique/document-examination/
TECHNICAL SEMINAR ON SMART QUILL
Introduction to Neural Networks Introduction to Neural Networks Applied to OCR and Speech Recognition An actual neuron A crude model of a neuron Computational.
Feature Selection and Weighting using Genetic Algorithm for Off-line Character Recognition Systems Faten Hussein Presented by The University of British.
Each neuron has a threshold value Each neuron has weighted inputs from other neurons The input signals form a weighted sum If the activation level exceeds.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Signature Recognition Using Neural Networks and Rule Based Decision Systems CSC 8810 Computational Intelligence Instructor Dr. Yanqing Zhang Presented.
Pattern Recognition Lecture 20: Neural Networks 3 Dr. Richard Spillman Pacific Lutheran University.
CSE343/543 Machine Learning Mayank Vatsa Lecture slides are prepared using several teaching resources and no authorship is claimed for any slides.
Prof. Yu-Chee Tseng Department of Computer Science
Neural Network Architecture Session 2
Handwriting Comparison
Hand Geometry Recognition
CATALYST Create two copies of the piece of text as neatly as possible.
ARTIFICIAL NEURAL NETWORKS
COMP24111: Machine Learning and Optimisation
Forged Handwriting Detection
WICT 2008 Offline Handwritten Signature Verification using Radial Basis Function Neural Networks Kenneth P. Camilleri St. Martin’s Institute of IT Dept.
BACKPROPOGATION OF NETWORKS
Target 4-2 Handwriting Analysis.
Handwriting Analysis Like Fingerprints, every person’s handwriting is unique and personalized Handwriting is difficult to disguise or forge Questioned.
Document Forgery: Handwriting Analysis
Face Recognition with Neural Networks
Document Examination Chapter 16.
OLA HIGH Criminal Justice / Forensic Science
describe 12 types of handwriting characteristics
Face Recognition: A Convolutional Neural Network Approach
Input and Output devices in a Computer
Warm Up Objective: Scientists will describe forensic explosives and arson by analyzing the documentary. What is the topic? What will you be doing? Why.
Warm Up Objective: Scientists will describe questioned documents by analyzing handwriting. What is the topic? What will you be doing? Why is this important?
Outline Announcement Neural networks Perceptrons - continued
Presentation transcript:

A New Approach to Signature Verification: Digital Data Acquisition Pen Ondřej Rohlík Department of Computer Science and Engineering University of West Bohemia in Pilsen

Ondřej Rohlík, University of West Bohemia in Pilsen - SoftCOM Outline pen – pictures, construction signals – description application areas signature verification author identification results

Ondřej Rohlík, University of West Bohemia in Pilsen - SoftCOM The Pen The pen was designed and constructed at Fachhochschule Regensburg

Ondřej Rohlík, University of West Bohemia in Pilsen - SoftCOM Writing with the Pen

Ondřej Rohlík, University of West Bohemia in Pilsen - SoftCOM Signals

Ondřej Rohlík, University of West Bohemia in Pilsen - SoftCOM Signals

Ondřej Rohlík, University of West Bohemia in Pilsen - SoftCOM Application Areas signature verification authentic signature or fake person identification which of several people character/text recognition replacement of keyboards and/or scanners

Ondřej Rohlík, University of West Bohemia in Pilsen - SoftCOM Signature Verification – Problem - we have to classify into two classes - classes overlaps each other - we have no training data for “fakes”

Ondřej Rohlík, University of West Bohemia in Pilsen - SoftCOM Program Developed

Ondřej Rohlík, University of West Bohemia in Pilsen - SoftCOM Useable Features

Ondřej Rohlík, University of West Bohemia in Pilsen - SoftCOM Algorithms For each class C Training algorithm For each feature f For each pair of signatures Classes[C][i] and Classes[C][j] Compute the difference between Classes[C][i] and Classes[C][j] and add it to an extra variable Sum[f] Compute mean value mean[f] and variance var[f] of each feature over all pairs using the variable Sum[f] Compute critical cluster coefficient using variances var[f] and weights w[f] over all features f For class C to be verified Recognition algorithm For each pattern Classes[c][i] For each feature f Compute the difference and remember the least one over all patterns Sum up products of least differences and weights w[f] and compare the sum with Critical cluster coefficient

Ondřej Rohlík, University of West Bohemia in Pilsen - SoftCOM Signature Verification – Results

Ondřej Rohlík, University of West Bohemia in Pilsen - SoftCOM Author Identification – Problem samples are classified into several classes – each corresponds to one author the written word is not a name (signature) but any other word – we use the same word for all authors

Ondřej Rohlík, University of West Bohemia in Pilsen - SoftCOM Author Identification – Problem Graphologists use many signs to characterize the personality of the author – movement (expansion in height and in width, coordination, speed, pressure, stroke, tension, directional trend, rhythm) – form (style, letter shapes, loops, connective forms, rhythm) – arrangement (patterns, rhythm, line alignment, word interspaces, zonal proportions, slant, margins – top, left and right) – signature (convergence with text, emphasis on given name or family name, placement)

Ondřej Rohlík, University of West Bohemia in Pilsen - SoftCOM Author Identification – Solution classification by neural network – two-layer perceptron network trained using variant of back-propagation algorithm with momentum

Ondřej Rohlík, University of West Bohemia in Pilsen - SoftCOM Author Identification – Results

Ondřej Rohlík, University of West Bohemia in Pilsen - SoftCOM Conclusion and Future Work twofold purpose of our research: –to improve reliability of signature verification –to make text recognition devices cheaper result achieved so far are good but more tests must be done in order to prove that our pen and methods are useful acceleration sensor is not suitable for text recognition – will be replaced by pressure sensors

Ondřej Rohlík, University of West Bohemia in Pilsen - SoftCOM Example of signature – “Rohlík“

Ondřej Rohlík, University of West Bohemia in Pilsen - SoftCOM