scispace - formally typeset
Search or ask a question
Journal Article

Handwritten signature identification using basic concepts of graph theory

01 Oct 2011-WSEAS Transactions on Signal Processing archive (World Scientific and Engineering Academy and Society (WSEAS))-Vol. 7, Iss: 4, pp 117-129
TL;DR: Previous work in the field of signature and writer identification is presented to show the historical development of the idea and a new promising approach in handwritten signature identification based on some basic concepts of graph theory is defined.
Abstract: Handwritten signature is being used in various applications on daily basis. The problem arises when someone decides to imitate our signature and steal our identity. Therefore, there is a need for adequate protection of signatures and a need for systems that can, with a great degree of certainty, identify who is the signatory. This paper presents previous work in the field of signature and writer identification to show the historical development of the idea and defines a new promising approach in handwritten signature identification based on some basic concepts of graph theory. This principle can be implemented on both on-line handwritten signature recognition systems and off-line handwritten signature recognition systems. Using graph norm for fast classification (filtration of potential users), followed by comparison of each signature graph concepts value against values stored in database, the system reports 94.25% identification accuracy.

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI
TL;DR: Three widely used feature detection algorithms, HARRIS, BRISK (Binary Robust Invariant Scalable Keypoints) and FAST (Features from Accelerated Segment), are compared to calculate the run time and accuracy for set of signature images and theBRISK algorithm got the best result among the feature detection algorithm in terms of accuracy.
Abstract: The signing process is one of the most important processes used by organizations to ensure the confidentiality of information and to protect it against any unauthorized penetration or access to such information. As organizations and individuals enter the digital world, there is an urgent need for a digital system capable of distinguishing between the original and fraud signature, in order to ensure individuals authorization and determine the powers allowed to them. In this paper, three widely used feature detection algorithms, HARRIS, BRISK (Binary Robust Invariant Scalable Keypoints) and FAST (Features from Accelerated Segment), these algorithms are compared to calculate the run time and accuracy for set of signature images. Three techniques have been applied using (UTSig) dataset; the experiment consisted of four phases: first, applying the techniques on one image, then on four images, then on eight images, finally applying the techniques on ten images where time and accuracy were calculated for each algorithm in the all phases. The results showed that the BRISK algorithm got the best result among the feature detection algorithm in terms of accuracy and the FAST algorithm got the best result among the feature detection algorithm in terms of run time.

3 citations


Cites background from "Handwritten signature identificatio..."

  • ...A handwritten signature contains different elements such as letters, symbols and nickname where all these elements is handwritten by the individual in order to implement a set of transactions like paying a bank check and for give a permission or approval to carry out a particular decision [1]....

    [...]

Journal ArticleDOI
TL;DR: Some basic concepts of signature are presented and different approaches to introduce an efficient signature verification and identification system are explored.
Abstract: signature verification is a behavioral biometric. Every day, we may face signature verification problem directly or indirectly whether it is in a banking transaction or signing a credit card transaction or authenticating a legal document. In order to solve this problem, during the last few decades, research has been going on with different approaches to introduce an efficient signature verification and identification system. This paper presents some basic concepts of signature and also explores on different approaches for verification.

3 citations


Cites background from "Handwritten signature identificatio..."

  • ...There are few key factors on which a signature depend [4]:...

    [...]

Proceedings ArticleDOI
29 May 2019
TL;DR: Signature graphs are not directly matched with each other, but first compared with a set of predefined prototype graphs, in order to obtain a dissimilarity representation, and it is empirical confirmed that the learning-free graph embedding outperforms state-of-the-art methods with respect to both accuracy and runtime.
Abstract: Due to the high availability and applicability, handwritten signatures are an eminent biometric authentication measure in our life. To mitigate the risk of a potential misuse, automatic signature verification tries to distinguish between genuine and forged signatures. Most of the available signature verification approaches make use of vectorial rather than graph-based representations of the handwriting. This is rather surprising as graphs offer some inherent advantages. Graphs are, for instance, able to directly adapt their size and structure to the size and complexity of the respective handwritten entities. Moreover, several fast graph matching algorithms have been proposed recently that allow to employ graphs also in domains with large amounts of data. The present paper proposes to use different graph embedding approaches in conjunction with a recent graph-based signature verification framework. That is, signature graphs are not directly matched with each other, but first compared with a set of predefined prototype graphs, in order to obtain a dissimilarity representation. In an experimental evaluation, we employ the proposed method on two widely used benchmark datasets. On both datasets, we empirically confirm that the learning-free graph embedding outperforms state-of-the-art methods with respect to both accuracy and runtime.

3 citations

References
More filters
Journal ArticleDOI
TL;DR: A brief overview of the field of biometrics is given and some of its advantages, disadvantages, strengths, limitations, and related privacy concerns are summarized.
Abstract: A wide variety of systems requires reliable personal recognition schemes to either confirm or determine the identity of an individual requesting their services. The purpose of such schemes is to ensure that the rendered services are accessed only by a legitimate user and no one else. Examples of such applications include secure access to buildings, computer systems, laptops, cellular phones, and ATMs. In the absence of robust personal recognition schemes, these systems are vulnerable to the wiles of an impostor. Biometric recognition, or, simply, biometrics, refers to the automatic recognition of individuals based on their physiological and/or behavioral characteristics. By using biometrics, it is possible to confirm or establish an individual's identity based on "who she is", rather than by "what she possesses" (e.g., an ID card) or "what she remembers" (e.g., a password). We give a brief overview of the field of biometrics and summarize some of its advantages, disadvantages, strengths, limitations, and related privacy concerns.

4,678 citations


"Handwritten signature identificatio..." refers background in this paper

  • ...Key-Words: - handwritten signature, signature recognition, identification, graph theory, biometrics, behavioral characteristics...

    [...]

Journal ArticleDOI
TL;DR: This paper describes a novel approach for signature verification and identification in an offline environment based on a quasi-multiresolution technique using GSC (Gradient, Structural and Concavity) features for feature extraction using a mapping from the handwriting domain to the signature domain.
Abstract: This paper describes a novel approach for signature verification and identification in an offline environment based on a quasi-multiresolution technique using GSC (Gradient, Structural and Concavity) features for feature extraction. These features when used at the word level, instead of the character level, yield promising results with accuracies as high as 78% and 93% for verification and identification, respectively. This method was successfully employed in our previous theory of individuality of handwriting developed at CEDAR — based on obtaining within and between writer statistical distance distributions. In this paper, exploring signature verification and identification as offline handwriting verification and identification tasks respectively, we depict a mapping from the handwriting domain to the signature domain.

343 citations


"Handwritten signature identificatio..." refers methods in this paper

  • ...Since the approach presented later in this paper can be implemented as both off-line and on-line system we will cover previous work of the off-line and online handwritten identification systems....

    [...]

Journal ArticleDOI
TL;DR: This paper attempts to eliminate the assumption that the written text is fixed by presenting a novel algorithm for automatic text-independent writer identification by taking a global approach based on texture analysis, where each writer's handwriting is regarded as a different texture.

341 citations


"Handwritten signature identificatio..." refers methods in this paper

  • ...…achievements in the field of ISSN: 1790-5052 118 Issue 4, Volume 7, October 2011 the handwriting recognition and writer identification can be very important for the handwritten signature identification because all the methods developed in this field can be implemented to identify signature....

    [...]

Proceedings ArticleDOI
01 Sep 2000
TL;DR: A new method to identify the writer of Chinese handwritten documents by taking the handwriting as an image containing some special texture, and writer identification is regarded as texture identification, which is a content independent method.
Abstract: In this paper, we describe a new method to identify the writer of Chinese handwritten documents. There are many methods for signature verification or writer identification, but most of them require segmentation or connected component analysis. They are content dependent identification methods, as signature verification requires the writer to write the same text (e.g. his name). In our new method, we take the handwriting as an image containing some special texture, and writer identification is regarded as texture identification. This is a content independent method. We apply the well-established 2D Gabor filtering technique to extract features of such textures and a weighted Euclidean distance classifier to fulfil the identification task. Experiments are made using Chinese handwritings from 17 different people and very promising results were achieved.

172 citations


"Handwritten signature identificatio..." refers methods in this paper

  • ...This is why we will mention some of the previous work in this field as a good idea that can be used in signature identification....

    [...]

Journal ArticleDOI
TL;DR: Both Bayesian classifiers and neural networks are employed to test the efficiency of the proposed feature and the achieved identification success using a long word exceeds 95%.

166 citations


"Handwritten signature identificatio..." refers methods in this paper

  • ...This is why we will mention some of the previous work in this field as a good idea that can be used in signature identification....

    [...]