scispace - formally typeset
Search or ask a question

Showing papers on "Signature recognition published in 2004"


Proceedings ArticleDOI
20 Sep 2004
TL;DR: This paper proposes a novel scheme that encrypts the training images used to synthesize the single minimum average correlation energy filter for biometric authentication, and shows analytically that the recognition performance remains invariant to the proposed encryption scheme, while retaining the desired shift-invariance property of correlation filters.
Abstract: In this paper, we address the issue of producing cancelable biometric templates; a necessary feature in the deployment of any biometric authentication system. We propose a novel scheme that encrypts the training images used to synthesize the single minimum average correlation energy filter for biometric authentication. We show theoretically that convolving the training images with any random convolution kernel prior to building the biometric filter does not change the resulting correlation output peak-to-sidelobe ratios, thus preserving the authentication performance. However, different templates can be obtained from the same biometric by varying the convolution kernels thus enabling the cancelability of the templates. We evaluate the proposed method using the illumination subset of the CMU pose, illumination, and expressions (PIE) face dataset. Our proposed method is very interesting from a pattern recognition theory point of view, as we are able to 'encrypt' the data and perform recognition in the encrypted domain that performs as well as the unencrypted case, regardless of the encryption kernel used; we show analytically that the recognition performance remains invariant to the proposed encryption scheme, while retaining the desired shift-invariance property of correlation filters.

297 citations


Book
03 Sep 2004
TL;DR: Three leading researchers bridge the gap between research, design, and deployment, introducing key algorithms as well as practical implementation techniques to construct robust information processing systems for biometric authentication in both face and voice recognition systems.
Abstract: A breakthrough approach to improving biometrics performance Constructing robust information processing systems for face and voice recognition Supporting high-performance data fusion in multimodal systems Algorithms, implementation techniques, and application examples Machine learning: driving significant improvements in biometric performance As they improve, biometric authentication systems are becoming increasingly indispensable for protecting life and property. This book introduces powerful machine learning techniques that significantly improve biometric performance in a broad spectrum of application domains. Three leading researchers bridge the gap between research, design, and deployment, introducing key algorithms as well as practical implementation techniques. They demonstrate how to construct robust information processing systems for biometric authentication in both face and voice recognition systems, and to support data fusion in multimodal systems. Coverage includes: How machine learning approaches differ from conventional template matching Theoretical pillars of machine learning for complex pattern recognition and classification Expectation-maximization (EM) algorithms and support vector machines (SVM) Multi-layer learning models and back-propagation (BP) algorithms Probabilistic decision-based neural networks (PDNNs) for face biometrics Flexible structural frameworks for incorporating machine learning subsystems in biometric applications Hierarchical mixture of experts and inter-class learning strategies based on class-based modular networks Multi-cue data fusion techniques that integrate face and voice recognition Application case studies

158 citations


Proceedings ArticleDOI
Andy Adler1
02 May 2004
TL;DR: It is shown that it is still possible to regenerate biometric images even if biometric algorithms emit only quantized match scores, and it is concluded that the quantization of match score values does not protect against the regeneration of images from stored biometric data.
Abstract: We address the possibility of regenerating sample images from stored biometric data, specifically from automatic face recognition algorithms. Such algorithms calculate a match score from comparison of a newly acquired image of a person to a template calculated from previously captured images. Although several vendors of biometric algorithms claim that an image of a person cannot be regenerated from the template, it has been shown that, in general, such regeneration can be performed with a "hill climbing attack". In order to defend against this attack, it is recommended that biometric algorithms emit only quantized match scores. In this paper, we show that it is still possible to regenerate biometric images even if this recommendation is implemented. Each iteration of the algorithm is applied to a quadrant of the sample image. Before each calculation, noise is added to the image in the opposite quadrant, in order to force the match score to a value just below the quantization threshold, providing useful information. Results show this algorithm successfully regenerates images which compare at high match scores for reasonable values of the quantization level. We conclude that the quantization of match score values does not, by itself, protect against the regeneration of images from stored biometric data.

92 citations


Journal ArticleDOI
TL;DR: A consistent framework for adaptation allows us to efficiently estimate the tangent vectors representing the variability and improves classification results on two real-world pattern recognition tasks from the domains handwritten character recognition and automatic speech recognition.
Abstract: We integrate the tangent method into a statistical framework for classification analytically and practically. The resulting consistent framework for adaptation allows us to efficiently estimate the tangent vectors representing the variability. The framework improves classification results on two real-world pattern recognition tasks from the domains handwritten character recognition and automatic speech recognition.

74 citations


Proceedings ArticleDOI
26 Oct 2004
TL;DR: A comparison of elastic matching schemes for writer dependent on-line handwriting recognition of isolated Tamil characters using preprocessed x-y coordinates, quantized slope values, and dominant point coordinates is presented.
Abstract: We present a comparison of elastic matching schemes for writer dependent on-line handwriting recognition of isolated Tamil characters. Three different features are considered namely, preprocessed x-y coordinates, quantized slope values, and dominant point coordinates. Seven schemes based on these three features and dynamic time warping distance measure are compared with respect to recognition accuracy, recognition speed, and number of training templates. Along with these results, possible grouping strategies and error analysis is also presented in brief.

71 citations


Proceedings ArticleDOI
26 Oct 2004
TL;DR: The main objective of this method is to reduce the number of signature samples required by each writer in the training phase, and a set of graphometric features and a neural network (NN) classifier are used.
Abstract: In an off-line signature verification method based on personal models, an important issue is the number of genuine samples required to train the writer's model. In a real application, we are usually quite limited in the number of samples we can use for training [Cha, S., 2001, Baltzakis, H. et al., 2001, Yingyong, Q. et al., 1994]. Classifiers like the neural network [Baltzakis, H. et al., 2001], the hidden Markov model [Justino, E.J.R. et al., 2001] and the support vector machine [Justino, E.J.R. et al., 2003] need a substantial number of samples to produce a robust model in the training phase. This paper reports on a global method based on only two classes of models, the genuine signature and the forgery. The main objective of this method is to reduce the number of signature samples required by each writer in the training phase. For this purpose, a set of graphometric features and a neural network (NN) classifier are used.

65 citations


Proceedings ArticleDOI
25 Jul 2004
TL;DR: The experiments showed that color as well as texture information is important for a person recognition system and a combination of these two kind of features results in a performance improvement.
Abstract: The need for automatic visual surveillance is increasing and the research on person recognition systems is more and more supported. As many biometric recognition methods, e.g. face recognition, are based on quite high camera resolutions which are not available in many situations, we examine features as well as classifier techniques for full body recognition. We present our experiments with color and texture features in the application of full body person recognition. On a database of 53 individuals we tested approved features for object recognition as well as MPEG7 color and texture descriptors on a person recognition task. For comparison, we used an RBF network classifier as well as a nearest-neighbor classifier. Our experiments showed that color as well as texture information is important for a person recognition system. Additionally, a combination of these two kind of features results in a performance improvement.

59 citations


Proceedings ArticleDOI
Scott Axelrod1, Benoît Maison1
17 May 2004
TL;DR: This work combines hidden Markov models of various topologies and nearest neighbor classification techniques in an exponential modeling framework with a model selection algorithm to obtain significant error rate reductions on an isolated word digit recognition task.
Abstract: We combine hidden Markov models of various topologies and nearest neighbor classification techniques in an exponential modeling framework with a model selection algorithm to obtain significant error rate reductions on an isolated word digit recognition task. This work is a preliminary investigation of large scale modeling techniques to be applied to large vocabulary continuous speech recognition.

51 citations


Patent
06 Jan 2004
TL;DR: In this article, the authors proposed a method for signature recognition based on determining a tilt angle of the vertical element of a signature and a tilt factor, which is defined as a horizontal offset between the tilt angle and reference tilt as a function of distance from a signature baseline.
Abstract: Various computer-implemented methods are provided. One method for signature recognition includes identifying a vertical element of a signature and determining a tilt angle of the vertical element. Tilt angle is defined by a line that is approximately parallel to the vertical element. In addition, the method includes determining a tilt factor. Tilt factor is defined as a horizontal offset between the tilt angle and a reference tilt as a function of distance from a signature baseline. The method further includes altering the signature using the tilt factor and comparing the altered signature to known signature(s) to determine if the altered signature matches one of the known signature(s). Another method includes altering the signature using a predetermined tilt factor and comparing the altered signature to known signature(s). If the altered signature does not match one of the known signature(s), these steps may be repeated with different predetermined tilt factors.

48 citations


01 Jan 2004
TL;DR: A new approach for recovering the time order of the off-line writing signal, based on a graph description of the handwriting signal and a recognition process using Hidden Markov Models (HMM), and a complete omni-scriptor isolated word recognition system has been developed.
Abstract: On-line handwriting includes more information on the time order of the writing signal and on the dynamics of the writing process than off-line handwriting. Therefore, on-line recognition systems achieve higher recognition rates. This can be concluded from results reported in the literature, and has been demonstrated empirically as part of this work. We propose a new approach for recovering the time order of the off-line writing signal. Starting from an over-segmentation of the off-line handwriting into regular and singular parts, the time ordering of these parts and recognition of the word are performed simultaneously. This approach, termed “ OrdRec”, is based on a graph description of the handwriting signal and a recognition process using Hidden Markov Models (HMM). A complete omni-scriptor isolated word recognition system has been developed. Using a dynamic lexicon and models for upper and lower case characters, our system can process binary and gray value word images of any writing style (script, cursive, or mixed). Using a dual handwriting data base which features both the on-line and the off-line signal for each of the 30 000 words written by about 700 scriptors, we have shown experimentally that such an off-line recognition system, using the recovered time order information, can achieve recognition performances close to those of an on-line recognition system.

44 citations


Book ChapterDOI
27 Oct 2004
TL;DR: This work overviews biometric authentication and presents a system for on-line signature verification, approaching the problem as a two-class pattern recognition problem, using standard pattern classification techniques.
Abstract: We overview biometric authentication and present a system for on-line signature verification, approaching the problem as a two-class pattern recognition problem. During enrollment, reference signatures are collected from each registered user and cross aligned to extract statistics about that user’s signature. A test signature’s authenticity is established by first aligning it with each reference signature for the claimed user. The signature is then classified as genuine or forgery, according to the alignment scores which are normalized by reference statistics, using standard pattern classification techniques. We experimented with the Bayes classifier on the original data, as well as a linear classifier used in conjunction with Principal Component Analysis (PCA). The classifier using PCA resulted in a 1.4% error rate for a data set of 94 people and 495 signatures (genuine signatures and skilled forgeries).

Patent
01 Jul 2004
TL;DR: In this paper, a system and methods for biometric security using signature recognition biometrics in a smartcard reader system was presented, which also includes a signature scan sensor that detects biometric samples and a device for verifying biometric data.
Abstract: The present invention discloses a system and methods for biometric security using signature recognition biometrics in a smartcard-reader system. The biometric security system also includes a signature scan sensor that detects biometric samples and a device for verifying biometric samples. In one embodiment, the biometric security system includes a smartcard configured with a signature scan sensor. In another embodiment, the system includes a reader configured with a signature scan sensor. In yet another embodiment, the present invention discloses methods for proffering and processing signature samples to facilitate authorization of transactions.

Proceedings ArticleDOI
26 Oct 2004
TL;DR: This study aims to assess the stability of a set of common features used for analysing signatures both within a single capture session and over time (multiple sessions).
Abstract: Signatures are the most widely used form of legally binding identification and authentication. The repeatability of a person's signature underpins its recognition and hence usefulness in everyday authentication situations. This study aims to assess the stability of a set of common features used for analysing signatures both within a single capture session and over time (multiple sessions). Secondly, the physical characteristics of signatures which result in the most repeatable performance for each feature are also analyzed. These results have implications for biometric signature verification systems and the document forensic field in that it gives an indication as to the stability of features leading potentially to improved performance and the types of features that should be analyzed given particular characteristics of the signature under investigation.

01 Jan 2004
TL;DR: This is the first paper where this novel approach -called tied posteriors- for handwriting recognition is presented, and the usage of a language model, that consists of character n-grams, as an alternative to the recognition with a large dictionary of German words is demonstrated.
Abstract: In this paper a system for on-line cursive handwriting recognition is described. The system is based on Hidden Markov Models (HMMs) using discrete and hybrid modeling techniques. Here, we focus on two aspects of the recognition system. First, we present different hybrid modeling techniques, whereas one depends on an information theory-based neural network (MMI-criterion) used as a vector quantizer and the other uses a neural net for estimating the a posteriori probabilities to replace the codebook of a tied-mixture HMM system. This is the first paper where we present this novel approach -called tied posteriors- for handwriting recognition. Second, we demonstrate the usage of a language model, that consists of character n-grams, as an alternative to the recognition with a large dictionary of German words. Our resulting system for character recognition yields significantly better recognition results using an unlimited vocabulary.

Proceedings ArticleDOI
17 May 2004
TL;DR: A novel strategy for combining general and user-dependent knowledge in a multimodal biometric verification system is presented, based on SVM classifiers and trade-off coefficients introduced in the standard SVM training problem and achieves a highly remarkable relative improvement in the EER.
Abstract: A novel strategy for combining general and user-dependent knowledge in a multimodal biometric verification system is presented. It is based on SVM classifiers and trade-off coefficients introduced in the standard SVM training problem. Experiments are reported on a bimodal biometric system based on fingerprint and on-line signature traits. A comparison between three fusion strategies, namely user-independent, user-dependent and the proposed adapted user-dependent, is carried out. As a result, the suggested approach outperforms the former ones. In particular, a highly remarkable relative improvement of 68% in the EER with respect to the user-independent approach is achieved. The severe and very common problem of training data scarcity in the user-dependent strategy is also relaxed by the proposed scheme, resulting in a relative improvement of 40% in the EER compared to the raw user-dependent strategy.

Proceedings ArticleDOI
02 May 2004
TL;DR: The result shows that stroke based features contain robust dynamic information, and offer greater accuracy for dynamic signature verification, in comparison to results without using stroke features.
Abstract: Dynamic signature verification (DSV) uses the behavioral biometrics of a hand-written signature to confirm the identity of a computer user. This paper presents a novel stroke-based algorithm for DSV. An algorithm is developed to convert sample signatures to a template by considering their spatial and time domain characteristics, and by extracting features in terms of individual strokes. Individual strokes are identified by finding the points where there is a: 1) decrease in pen tip pressure, 2) decrease in pen velocity, and 3) rapid change in pen angle. A significant stroke is discriminated by the maximum correlation with respect to the reference signatures. Between each pair of signatures, the local correlation comparisons are computed between portions of pressure and velocity signals using segment alignment by elastic matching. Experimental results were obtained for signatures from 10 volunteers over a four-month period. The result shows that stroke based features contain robust dynamic information, and offer greater accuracy for dynamic signature verification, in comparison to results without using stroke features.

01 Jan 2004
TL;DR: This work approaches signature verification using seprate filters with different approaches, where global features of the signature, such as average velocity, are considered using a Euclidian distance and local features are considered.
Abstract: Handwritten Signature verification is a biometric technique that is useful because signatures are in many practices accepted as a means of identity verification. This work approaches signature verification using seprate filters with different approaches. In the first, global features of the signature, such as average velocity are considered using a Euclidian distance. In the second filter, local features are considered. Strokes are segmented using the minima of the velocity and encoded before comparing them using dynamic time warping and signer-specific thresholds.

Proceedings ArticleDOI
26 Oct 2004
TL;DR: Several reduction methods of signature data are presented and the results were compared to those obtained with the whole coarse data points of the signature in order to evaluate their efficiency.
Abstract: Authentication based on handwritten signature is the most accepted authentication system based on biometry because it is easy to use and because the use of signature is part of our habits. In the field of authentication by on-line signature, we present a method to reduce the amount of data to be stored for pattern comparison and that needs few processing. Many systems described in literature keep the whole signature's points even if it is not recommended, even advised against it, in order to avoid forgers to obtain a signature's pattern. The proposed method for data reduction was evaluated with respect to a method of curve comparison very often used for authentication by on-line handwritten signature: dynamic time warping (DTW). After we have presented several reduction methods of signature data, we show the results obtained with each one. In order to evaluate their efficiency, the results were compared to those obtained with the whole coarse data points of the signature.

Proceedings ArticleDOI
26 Oct 2004
TL;DR: This paper proposes an on-line method to recognize handwritten music scores using the hidden Markov model, and finds that the recognition rate is 2.4% higher than that achieved with the traditional method, and the processing time was 73% of that required by theTraditional method.
Abstract: The hidden Markov model (HMM) has been successfully applied to various kinds of on-line recognition problems including, speech recognition, handwritten character recognition, etc. In this paper, we propose an on-line method to recognize handwritten music scores. To speed up the recognition process and improve usability of the system, the following methods are explained: (1) The target HMMs are restricted based on the length of a handwritten stroke, and (2) Probability calculations of HMMs are successively made as a stroke is being written. As a result, recognition rates of 85.78% and average recognition times of 5.19 ms/stroke were obtained for 6,999 test strokes of handwritten music symbols, respectively. The proposed HMM recognition rate is 2.4% higher than that achieved with the traditional method, and the processing time was 73% of that required by the traditional method.

Proceedings ArticleDOI
26 Oct 2004
TL;DR: This paper focuses on handling the two-dimensional feature of on-line handwriting signals in recognition engines, and compares formally and experimentally a number of solutions on various character recognition tasks.
Abstract: This paper focuses on handling the two-dimensional feature of on-line handwriting signals in recognition engines. This spatial information is taken into account in various ways depending on the nature of characters to be recognized. We review some techniques used in the literature and investigate new ones to represent and model the spatial information in handwriting recognition engines. We compare formally and experimentally a number of solutions on various character recognition tasks.

Proceedings ArticleDOI
23 Aug 2004
TL;DR: This work investigates three different rejection strategies for offline handwritten sentence recognition implemented as a postprocessing step of a hidden Markov model based text recognition system and are based on confidence measures derived from a list of candidate sentences produced by the recognizer.
Abstract: This work investigates three different rejection strategies for offline handwritten sentence recognition. The rejection strategies are implemented as a postprocessing step of a hidden Markov model based text recognition system and are based on confidence measures derived from a list of candidate sentences produced by the recognizer. The better performing confidence measures make use of the fact that the recognizer integrates a word bigram language model. Experimental results on extracted sentences from the IAM database validate the effectiveness of the proposed rejection strategies.

01 Jan 2004
TL;DR: A simple adaptive off-line signature recognition method based on the feature analysis of extracted significant strokes for a given signature, which correctly decides on the majority of tested patterns, which include both simple and skilled forgeries.
Abstract: This paper proposes a simple adaptive off-line signature recognition method based on the feature analysis of extracted significant strokes for a given signature. Our system correctly decides on the majority of tested patterns, which include both simple and skilled forgeries. The presence of possible doubtful signatures (those ones on which is difficult to decide) is also considered. Experimental results have shown a good trade-off between response time and reasonable accuracy of recognition results.

Proceedings ArticleDOI
23 May 2004
TL;DR: Both the voice and iris patterns acquired by an individual are hidden in certain wavelet coefficients of his fingerprint image using block classification and the embedded biometric template is further compressed, enabling a reduction of the system data rate.
Abstract: Data hiding has been successfully applied lately in a variety of applications, other than copyright protection. A data hiding technique applied in a multimodal biometric system for automatic recognition is introduced in this paper. Specifically, both the voice and iris patterns acquired by an individual are hidden in certain wavelet coefficients of his fingerprint image using block classification and the embedded biometric template is further compressed. The proposed technique achieves a reduction of the system data rate, as opposed to the conventional independent compression and storage of each biometric signal. At the same time, accurate data reconstruction is guaranteed, enabling a successful recognition process based on the combination of three biometric modalities.

Patent
15 Oct 2004
TL;DR: In this article, a current query from a requesting source includes at least one monitored biometric feature of an individual of interest, which is used to form biometric data packages, each of which contains information about one Biometric feature and identity data associated with the corresponding individual.
Abstract: Identity and biometric data are collected from individuals. The collected data is used to form biometric data packages, each of which contains information about one biometric feature and identity data associated with the corresponding individual. Each biometric data package is stored in a categorical fashion based on its biometric feature. A current query from a requesting source includes at least one monitored biometric feature of an individual of interest. A first correlation is performed between the current query's monitored biometric feature and the same type of biometric feature associated with those of the biometric data packages previously stored in a categorical fashion. A second correlation is performed between the current query's monitored biometric feature and the monitored biometric feature associated with each of the previous queries. Results of the correlations can be indications of suspicious behavior that was used by the requesting source to form the current query.

Proceedings ArticleDOI
06 Sep 2004
TL;DR: The goal of this work is to determine and compare different methods from the pattern recognition domain in order to be able to recognize some objects in an image by comparing several features, classification methods and methodologies.
Abstract: We present in this paper a study on target recognition. The goal of this work is to determine and compare different methods from the pattern recognition domain in order to be able to recognize some objects in an image. We suppose having detected by a segmentation process a candidate object appearing with an unknown scale or rotation. To be able to recognize this object, we have first to describe it by some features having the property to be invariant by rotation, translation or scale. Second, we have to realize a supervised classification in order to compare this unknown object with one from the knowledge database. We present some experimental results for target recognition by comparing several features, classification methods and methodologies.

01 Jan 2004
TL;DR: The perplexity is used to compare the different models and their prediction power, and relate it to the performance of a recognition system under different language models.
Abstract: In this paper we present a number of language models and their behavior in the recognition of unconstrained handwritten English sentences. We use the perplexity to compare the different models and their prediction power, and relate it to the performance of a recognition system under different language models. In the recognition experiments a system with the classical architecture of preprocessing, feature extraction and recognition by means of Hidden Markov Model is used. In the recognition phase the language model constrains the possible next words. Keywords: handwriting recognition, unconstrained English sentence recognition, unigram probability, bigram probability, perplexity.

Book ChapterDOI
29 Sep 2004
TL;DR: Two possible improvements in Dynamic Time Warping are studied: matching process and distance computation, which use the result of the matching as a way to detect forgery and modify the computation of the distance.
Abstract: Authentication by handwritten on-line signature is one of the most accepted authentication system In a way, it is based on biometrics It is embedded in our cultural habits and easy to use The aim of this paper is to study two possible improvements in Dynamic Time Warping: matching process and distance computation After applying a polygonal approximation on the signatures, we test different approaches on the authentication problem Usually, the information used to match the on-line signatures are the coordinates or the speed at the input data points First, as far as the matching is concerned, we investigate other possibilities relying on the local information at each point Next, we also test several methods to take into account local information to compute the distance To limit genuine signature rejections, we use the result of the matching as a way to detect forgery and we also modify the computation of the distance Finally, we evaluate the different approaches on a base of 800 signatures The results obtained show an amelioration of the classical use of DTW

Proceedings ArticleDOI
26 Oct 2004
TL;DR: The combination of three classifiers for handwritten word recognition with different architectures is studied and a new ensemble method working with several base classifiers is applied and the results are compared to the results of the combination of theThree classifiers.
Abstract: The study of multiple classifier systems has become an area of intensive research in pattern recognition recently. Also in handwriting recognition, systems combining several classifiers have been investigated. In this paper the combination of three classifiers for handwritten word recognition with different architectures is studied. In addition a new ensemble method working with several base classifiers is applied and the results of the ensemble method are compared to the results of the combination of the three classifiers. In the experiments a large-scale handwritten word recognition task is considered.

Proceedings ArticleDOI
26 Oct 2004
TL;DR: The purpose of this project is to reduce the memory size of the previous handwriting recognition algorithm based on an HMM using self-organizing map (SOM) density tying and improve recognition capability by incorporating additional information.
Abstract: The purpose of this project is two fold. The first purpose is to reduce the memory size of our previous handwriting recognition algorithm based on an HMM using self-organizing map (SOM) density tying. The second is to improve recognition capability by incorporating additional information. SOM density tying reduced the dictionary size to 1/7 of the original size, with a recognition rate of 90.45%, only slightly less than the original recognition rate of 91.51%. Our additional feature increased recognition capability to 91.34%.

Patent
26 Mar 2004
TL;DR: In this article, a transponder reader with a signature scan sensor and a transceiver for verifying biometric signatures was presented. But the signature recognition biometrics were not used for authentication.
Abstract: The present invention discloses a system and methods for biometric security using signature recognition biometrics in a transponder-reader system. The biometric security system also includes a signature scan sensor that detects biometric samples and a device for verifying biometric samples. In one embodiment, the biometric security system includes a transponder configured with a signature scan sensor. In another embodiment, the system includes a reader configured with a signature scan sensor. In yet another embodiment, the present invention discloses methods for proffering and processing signature samples to facilitate authorization of transactions.