Handwritten Signature Verification

Slides:



Advertisements
Similar presentations
Distinctive Image Features from Scale-Invariant Keypoints
Advertisements

Patient information extraction in digitized X-ray imagery Hsien-Huang P. Wu Department of Electrical Engineering, National Yunlin University of Science.
Automatic Color Gamut Calibration Cristobal Alvarez-Russell Michael Novitzky Phillip Marks.
Document Examiner Feature Extraction: Thinned vs Skeletonised Images
A Graph based Geometric Approach to Contour Extraction from Noisy Binary Images Amal Dev Parakkat, Jiju Peethambaran, Philumon Joseph and Ramanathan Muthuganapathy.
QR Code Recognition Based On Image Processing
Road-Sign Detection and Recognition Based on Support Vector Machines Saturnino, Sergio et al. Yunjia Man ECG 782 Dr. Brendan.
Word Spotting DTW.
Presented by Xinyu Chang
IEEE Transactions on Consumer Electronics, Vol. 45, No. 1, AUGUST 1999 Muhammad Bilal Ahmad and Tae-Sun Choi, Senior Member,IEEE.
Fusion of HMM’s Likelihood and Viterbi Path for On-line Signature Verification Bao Ly Van - Sonia Garcia Salicetti - Bernadette Dorizzi Institut National.
Simple Face Detection system Ali Arab Sharif university of tech. Fall 2012.
COIN-O-MATIC A fast and reliable system for automatic coin classification Laurens van der MaatenPaul Boon.
USign—A Security Enhanced Electronic Consent Model Yanyan Li 1 Mengjun Xie 1 Jiang Bian 2 1 University of Arkansas at Little Rock 2 University of Arkansas.
Facial feature localization Presented by: Harvest Jang Spring 2002.
Edge Detection. Our goal is to extract a “line drawing” representation from an image Useful for recognition: edges contain shape information –invariance.
Robust Object Segmentation Using Adaptive Thresholding Xiaxi Huang and Nikolaos V. Boulgouris International Conference on Image Processing 2007.
Face Detection: a Survey Speaker: Mine-Quan Jing National Chiao Tung University.
Detecting Image Region Duplication Using SIFT Features March 16, ICASSP 2010 Dallas, TX Xunyu Pan and Siwei Lyu Computer Science Department University.
Scale Invariant Feature Transform (SIFT)
A Novel 2D To 3D Image Technique Based On Object- Oriented Conversion.
Feature extraction Feature extraction involves finding features of the segmented image. Usually performed on a binary image produced from.
Brief overview of ideas In this introductory lecture I will show short explanations of basic image processing methods In next lectures we will go into.
Image Filtering. Problem! Noise is a problem, even in images! Gaussian NoiseSalt and Pepper Noise.
Face Recognition Using Neural Networks Presented By: Hadis Mohseni Leila Taghavi Atefeh Mirsafian.
כמה מהתעשייה? מבנה הקורס השתנה Computer vision.
Digital Image Processing - (monsoon 2003) FINAL PROJECT REPORT Project Members Sanyam Sharma Sunil Mohan Ranta Group No FINGERPRINT.
FEATURE EXTRACTION FOR JAVA CHARACTER RECOGNITION Rudy Adipranata, Liliana, Meiliana Indrawijaya, Gregorius Satia Budhi Informatics Department, Petra Christian.
CPSC 601 Lecture Week 5 Hand Geometry. Outline: 1.Hand Geometry as Biometrics 2.Methods Used for Recognition 3.Illustrations and Examples 4.Some Useful.
OBJECT RECOGNITION. The next step in Robot Vision is the Object Recognition. This problem is accomplished using the extracted feature information. The.
K. Zagoris, K. Ergina and N. Papamarkos Image Processing and Multimedia Laboratory Department of Electrical & Computer Engineering Democritus University.
ENT 273 Object Recognition and Feature Detection Hema C.R.
Joon Hyung Shim, Jinkyu Yang, and Inseong Kim
Filtering and Enhancing Images. Major operations 1. Matching an image neighborhood with a pattern or mask 2. Convolution (FIR filtering)
November 13, 2014Computer Vision Lecture 17: Object Recognition I 1 Today we will move on to… Object Recognition.
Handwritten Hindi Numerals Recognition Kritika Singh Akarshan Sarkar Mentor- Prof. Amitabha Mukerjee.
Chapter 4: Pattern Recognition. Classification is a process that assigns a label to an object according to some representation of the object’s properties.
Digital Image Processing - (monsoon 2003) FINAL PROJECT REPORT Project Members Sanyam Sharma Sunil Mohan Ranta Group No FINGERPRINT.
Dengsheng Zhang and Melissa Chen Yi Lim
Digital Image Processing Lecture 16: Segmentation: Detection of Discontinuities Prof. Charlene Tsai.
Autonomous Robots Vision © Manfred Huber 2014.
Mobile Image Processing
CS654: Digital Image Analysis Lecture 36: Feature Extraction and Analysis.
Chapter 9: Image Segmentation
By Pushpita Biswas Under the guidance of Prof. S.Mukhopadhyay and Prof. P.K.Biswas.
Digital Image Processing Lecture 16: Segmentation: Detection of Discontinuities May 2, 2005 Prof. Charlene Tsai.
Scene Text Extraction Using Focus of Mobile Camera Egyul Kim, SeongHun Lee, JinHyung Kim Artificial Intelligence & Pattern Recognition Lab, KAIST, Korea.
Instructor: Mircea Nicolescu Lecture 5 CS 485 / 685 Computer Vision.
Chapter 6 Skeleton & Morphological Operation. Image Processing for Pattern Recognition Feature Extraction Acquisition Preprocessing Classification Post.
Frank Bergschneider February 21, 2014 Presented to National Instruments.
September 26, 2013Computer Vision Lecture 8: Edge Detection II 1Gradient In the one-dimensional case, a step edge corresponds to a local peak in the first.
Arabic Handwriting Recognition Thomas Taylor. Roadmap  Introduction to Handwriting Recognition  Introduction to Arabic Language  Challenges of Recognition.
Optical Character Recognition
Signature Recognition Using Neural Networks and Rule Based Decision Systems CSC 8810 Computational Intelligence Instructor Dr. Yanqing Zhang Presented.
OCR Reading.
Program Studi S-1 Teknik Informatika FMIPA Universitas Padjadjaran
Digital Image Processing - (monsoon 2003) FINAL PROJECT REPORT
FINGER PRINT RECOGNITION USING MINUTIAE EXTRACTION FOR BANK LOCKER SECURITY Presented by J.VENKATA SUMAN ECE DEPARTMENT GMRIT, RAJAM.
Digital Image Processing Lecture 16: Segmentation: Detection of Discontinuities Prof. Charlene Tsai.
Introduction to Computational and Biological Vision Keren shemesh
Image Processing - in short
WICT 2008 Offline Handwritten Signature Verification using Radial Basis Function Neural Networks Kenneth P. Camilleri St. Martin’s Institute of IT Dept.
Lecture 3. Edge Detection, Texture
Computer Vision Lecture 9: Edge Detection II
Object Recognition Today we will move on to… April 12, 2018
Spatial operations and transformations
SIFT.
CSE 185 Introduction to Computer Vision
Recognition and Matching based on local invariant features
Spatial operations and transformations
Presentation transcript:

Handwritten Signature Verification Dhawan, Ashish Ganesan, Aditi R. ECE 533 Project – Fall 2005

Introduction Need for signature verification: Types of verification: Signature: very common metric. Types of verification: Online - captures dynamic data. Offline - uses features from the image. Tough pattern recognition problem. Types of forgeries: Casual. Skilled.

Approach

Pre-processing Noise Removal: Inversion of Image. Gaussian Noise. Use of Average filter. Inversion of Image. Conversion of Image to Binary: Use of Automatic Global thresholding.

Averaged and Inverted Image Original Image Thresholded Image

Geometric Features Extraction Slant Angle: Signature is assumed to rest on an imaginary line known as the Baseline. The angle of inclination of the baseline to the horizontal is called the Slant Angle. Center of Gravity. Original Image Baseline Rotated Image

Features Extraction Aspect ratio: Normalized Area: Ratio of width to height of the signature. Normalized Area: Ratio of the area occupied by signature pixels to the area of the bounding box. Bounding box of the signature

Features Extraction Slope of the line joining the Centers of Gravity of the two halves of signature image. Right Half Left Half

Verification and Results Extracted features from Test-Images are used in deriving the mean values and standard deviations, which are used for final verification. The Euclidian distance in the feature space measures the proximity of a query signature image to the genuine signature image of the claimed person. If this distance is below a certain threshold then the query signature is verified to be that of the claimed person otherwise it is detected as a forged one. Nature of Signature No. of Samples False Acceptance Rate False Rejection Rate Original 45 --- 6.67% Forged 30 10%

Conclusion and Future Work The system is robust and can detect random, simple and semi-skilled forgeries. A larger database can reduce false acceptances as well as false rejections. Future Work: Collection of larger database. Addition of extra features. Number of edge points: Edge point is a point that has only one 8-neighbor. Number of cross points. Cross point is a point that has at least three 8-neighbors.