A Project Based Approach Towards Off-Line Signature Authentication

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

e-ISSN: 2582-5208

International Research Journal of Modernization in Engineering Technology and Science


( Peer-Reviewed, Open Access, Fully Refereed International Journal )
Volume:03/Issue:07/July-2021 Impact Factor- 5.354 www.irjmets.com

A PROJECT BASED APPROACH TOWARDS OFF-LINE SIGNATURE


AUTHENTICATION
Hemant Singh Rawat*1, Ayush Sharma*2, Manan Gupta*3,
Tarun Kumar*4, Aditya Tandon*5
*1,2,3,4Student, Computer Science Engineering, Krishna Engineering College, Ghaziabad, U.P, India.
*5Professor, Department Of Computer Science Engineering, Krishna Engineering College,
Ghaziabad, U.P, India.
ABSTRACT
In this paper, we present a system to verify whether the given signature belong to a valid person or not (off-line
signature authentication system) using machine learning logistic regression algorithm by taking out some
global feature from the signature and put them on the model.
Keywords: Logistic Regression, Feature Extraction, Handwritten Signature, Pre-Processing.
I. INTRODUCTION
A signature (also called sign) of any person is a handwritten representation of someone's nickname, name, or
other signs that a person writes on paper as a identity proof. The person whose signature is on any paper is
called a signer. A signature work on any document indicates the work as readily recognise its creator. There is a
minor confusion between a sign and an autograph, which is an artistic sign. This confusion among the people
has both an autograph and signature and some people keep their signatures private because of security reasons
while fully used their autograph.
A. Function of Signature
A signature can has many different functions but one of the most important functions is to permanently attach
to a document of a person uniquely identifiable, undeniable identity as physical witness of that person witness
and proof of the content of all the things in the document. For ex, the part of a signature in any contracts isn’t
just to provide the proof of identity to both the parties, but also to provide a proof of consideration and
agreement. On legal documents, an illiterate person can make a ‘mark’ or people can put a thumb expression on
documents as an alternative of a signature. In most of the countries, signatures are noticed and observed in the
appearance of a notary officer to carry additional legal formality.

Fig 1: Photos of Signatures


B. Online Signature
In online signature, the content on the document is mixed up with the private key of the user, this process is
also called hashing, then the other user check with the help of public key of the sign user whether the document
is sign by the user or not. Users can set one or more lines of custom text known as a signature block to be
automatically appended to their messages. The content usually includes hashed data public key and every
change is done in hexadecimal coding. Here, both the parties don’t have to be together but all the security stuff

www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science


[1361]
e-ISSN: 2582-5208
International Research Journal of Modernization in Engineering Technology and Science
( Peer-Reviewed, Open Access, Fully Refereed International Journal )
Volume:03/Issue:07/July-2021 Impact Factor- 5.354 www.irjmets.com
is handled by the third party, through which the signature has been done. But the third party need cash to do it,
they don’t provide free service. This type of signature is also called digital signature. And it is very hard, almost
impossible, to alter the data in the signed document.
We introduced an Off-line handwritten signature system and it has two parts:
(i) Training the signatures
(ii) Verification of given signature.
The block diagram of the off-line handwritten signature system is given in below figure Fig 2.

Fig 2: Block diagram of the system


II. PRE-PROCESSING
The pre-processing process is included in both testing and training of the signature. The scanned signatures are
converted into grey scale mode. This is because to make signatures easy and ready to apply the feature
extraction method. The pre-processing process has four steps an they are given below.
A. Background Elimination
The area of the signature must be cropped, it is necessary to extract the features. A threshold needs to be set to
capture signature density wise from the background. After setting the threshold, the pixels of the signature
would be categorize either “1” or “0” based on the density of the pixel.
B. Noise Reduction
To eliminate the noise, we need to check all the adjacent neighbour of a pixel i.e., 8-neighbours(up, down, left
and right). We check it on the grey scale image. If a pixel has more black pixel than white then the pixel is black
otherwise it consider a white.
C. Width Normalisation
The size or dimensions of different image may be different. So to overcome this problem, we readjust the image
width and height in order to have proper calculation. But during changing the height and width, we must have
same height to width ratio. At the end of width normalization width dimension is adjusted to 100.
D. Thinning
In this process, we want to decrease the thickness of the ink on the signature. The thickness can be change very
often while using pen. We need a constant thickness of every line in the signature for proper calculation.
III. FEATURE EXTRACTION
In this phase, extracted features are the inputs of training phase.
A. Signature Area
The area of the signature is the total number of pixel in the image of signature. This feature provides
information about the signature density.
B. Signature height to width ratio
It is the ratio of the height of the signature to the width of the signature. A person signature can have different
height and width in different signature but the ratio of all the signature are approximately equal.
C. Maximum Horizontal histogram and Vertical histogram
www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science
[1362]
e-ISSN: 2582-5208
International Research Journal of Modernization in Engineering Technology and Science
( Peer-Reviewed, Open Access, Fully Refereed International Journal )
Volume:03/Issue:07/July-2021 Impact Factor- 5.354 www.irjmets.com
For each row, which has highest ‘1’ values than the rest of the row is taken to be maximum horizontal
histogram. And for each column, which has highest ‘1’ values than the rest of us is taken to be maximum vertical
histogram.
D. Vertical and Horizontal centre of the signature
The centre of the row of an image is called horizontal centre of the signature and the centre of the column of an
image is called vertical centre of the signature
E. Local maxima numbers of the signature
The number of local maxima of the vertical and horizontal histogram is calculated.
F. Edge point numbers of the signature
Edge point is the pixel which has only one neighbour, which belongs to the signature, in 8-neighbor.
IV. SIGNATURE DATABASE
For training and testing of the Signature recognition and authentication system 100 signature are used (50 are
real and 50 are forged).The signature are taken from the 10 persons.
For training the system 4 out of five real and forged signatures of a person is used and the last one is used for
testing.
So there are total 50 real signature of 10 persons and 50 forges signature of 10 persons.
V. RESULT
A. Training phase
In the Training phase, the model extract the global features of the first 4 image of a person from real and 4
images from the forged dataset. And use the features of these images as a training dataset for the model.
B. Testing phase
In testing phase, the last signature from the real and forge dataset is taken and classify using the coefficient, we
find in training phase, whether it is forged or real signature.
Here the model used logistic regression machine learning algorithm and train it coefficient by using gradient
descent.
So out of 100 dataset of 10 persons, 80 signatures is taken for training the model and 20 is for testing. Here is a
confusion matrix of the testing data:
N=20 Predicted NO Predicted YES
Actual NO 6 4
Actual YES 2 8
Fig.3: Confusion matrix of testing data
In this confusion matrix, total correct predictions are 14 and total wrong predictions are 6. This show the
efficiency of this system i.e., 70 %.
VI. CONCLUSION
We present an offline handwritten signature authentication technique which is based on logistic regression
machine learning algorithm. The efficiency of this model is 70% as we can see in Fig.3 . Carefully chosen
discriminating features of signatures made this system more powerful. Also we need to be careful while taking
image of the signature otherwise system efficiency may vary (decrease if not taken carefully). Also taken the
signature as clean paper as possible.
VII. REFERENCES
[1] Prashanth CR,KB Raja,KR Venugopal, LM Patnaik,”Standard Scores Correlation based Offline signature
verification system”, International Conference on advances in computing, control and
telecommunication Technologies 2009 .
[2] R. Plamondon and S.N. Srihari, "Online and Offline Handwriting Recognition: A Comprehensive Survey",
IEEE Tran. on Pattern Analysis and Machine Intelligence, vol.22 no.1, pp.63-84, Jan.2000.
www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science
[1363]
e-ISSN: 2582-5208
International Research Journal of Modernization in Engineering Technology and Science
( Peer-Reviewed, Open Access, Fully Refereed International Journal )
Volume:03/Issue:07/July-2021 Impact Factor- 5.354 www.irjmets.com
[3] J Edson, R. Justino, F. Bortolozzi and R. Sabourin, "An off-line signature verification using HMM for
Random,Simple and Skilled Forgeries", Sixth International Conference on Document Analysis and
Recognition, pp.1031-1034, Sept.2001. 211-222, Dec.2000.
[4] S.Srihari. K. M. Kalera. and A. XU, “Offline Signature Verification and Identification Using Distance
Statistics,” International Journal of Pattern Recognition And Artificial Intelligence ,vol. 18, no. 7, pp.
1339–1360, 2004.
[5] Ramachandra A. C ,Jyoti shrinivas Rao”Robust Offline signature verification based on global features”
IEEE International Advance Computing Conference ,2009.
[6] “An Introduction to Artificial Neural Systems” by Jacek M. Zurada, West Publishing Company 1992.
[7] OZ, C. Ercal, F. and Demir, Z. Signature Recognition and Verification with ANN.
[8] Golda, A. 2005. Principles of Training multi-layer neural network using back propagation.
[9] Ozgunduz, E., Karsligil, E., and Senturk, T. 2005.Off-line Signature Verification and Recognition by
Support Vector Machine. Paper presented at the European Signal processing Conference.
[10] Pacut, A. and Czaja, A. 2001. Recognition of Human Signatures. Neural Network, in proceedings of the
International Conference on Neural Network, IJCNN’01, vol.2, pp 1560-1564.
[11] D.Z. Lejtman. On-line Handwritten Signature Verification Using Wavelets and Back-propagation Neural
Networks. Proceedings of the Sixth International Conference on Document Analysis and Recognition,
pp 992, 2001.

www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science


[1364]

You might also like