# A new approach to signature recognition using the fuzzy method

- First Online:

- Received:
- Accepted:

DOI: 10.1007/s10044-012-0283-9

- Cite this article as:
- Kudłacik, P. & Porwik, P. Pattern Anal Applic (2014) 17: 451. doi:10.1007/s10044-012-0283-9

- 6 Citations
- 2.4k Downloads

## Abstract

The paper presents a new fuzzy approach to *off-line* handwritten signature recognition. The solution is based on characteristic feature extraction. After finding signature’s center of gravity a number of lines are drawn through it at different angles. Cross points of generated lines and signature sample, which are further grouped and sorted, are treated as the set of features. On the basis of such structures, obtained from a chosen number of learning samples, a fuzzy model is created, called the fuzzy signature. During a verification phase the level of conformity of an input sample and the fuzzy signature is calculated. The extension in feature extraction as well as proposed fuzzy model has never been employed before. It needs to be emphasized that information stored within the verification system cannot be used to recreate the original signatures collected at the enrolment phase. The fact is particularly valuable for large databases and systems where storage safety is crucial. The solution is very flexible and allows the user to extend an intuitive structure of fuzzy sets by employing dynamic features, making the approach an *on-line* method. The results obtained should be still improved, similarly to the case of other known biometric systems related to signature recognition. However, the presented technique can be easily utilized in applications where FAR coefficient should be very low and is more important than FRR ratio.

### Keywords

Signature recognitionFuzzy setsFuzzy system## 1 Introduction

An analysis of handwritten documents is an important task for business, forensic casework, banking, etc. Obviously, handwriting should be considered individually, because each person has unique style of writing. For this reason professional recognition of a writer is treated as complex and difficult task. The result is credible when performed by highly qualified graphologists only. It should be noted that such investigations are expensive and rarely commissioned—in cases when documents are very important and their authenticity questioned. Moreover, graphological analysis of long documents is very time-consuming.

Some inconveniences can be overcome when only handwritten signature is analysed. Depending on type of an electronic handwriting capture, the source can be processed as a digital image or as a set of dynamic features—when signature is stored using a specialised device such as tablet. The second approach allows the potential system to analyse the source more precisely because in this case other unique properties are available.

The signature features are very often classified as global or local. Global features describe an entire signature and are determined, i.e. by means of both the discrete Wavelet and Hough transform, horizontal and vertical projections and so on. On the contrary, local features describe dynamic properties such as pen motion, slant, pressure, tremor and so on.

The signature recognition methods are also classified as *on-line* and *off-line*, where appropriate dynamic or static features are extracted and analysed. These techniques are well known within the research community [7, 13, 23–25, 34, 41].

There is a number of limitations in the data acquisition phase. The first is signature’s length. In case of too long signatures the data analysis may be difficult for the recognition system to identify the unique data points. In addition, pre-processing and recognition process are time consuming. On the other hand, in case of too short signatures the data set may not be representative enough and false accept rate (FAR) coefficient may be too high (i.e. an impostor can be authorised by the system).

The second limitation is the environment and conditions where a person performs the enrolment and verification phase. For example, two signatures taken from an individual may substantially differ from each other only because the position of a person was different.

After the data acquisition phase the recognition system extracts the unique features; hence signature recognition is classified as behaviour biometric. Given signature is described by means of unique features that identify the signer. Biometric systems should be able to detect whether the signature is genuine or forged. The results of the verification depend on the type of forgery. The first type is a random forgery and can be represented by a signature that belongs to any writer (forger has no information about the signature style and the name of a signer). The second type—simple forgery is a signature characterised by a similar shape as the genuine. The third type is so-called skilled forgery, which is a professional imitation of the genuine.

*Off-line* verification methods are used to detect the random and simple forgeries. It follows from the fact that in this approach only the shape of the signature is accessible, so only this kind of data can be considered. Unfortunately, the *off-line* method does not register timestamps; hence modelling of the signer’s pen motion is impossible or very complex, which makes the recognition task even harder.

*On-line* method requires a stylus and an electronic tablet connected to a computer to capture dynamic signature information. In this method, nature of signatures can be described more precisely because additional parameters can be measured like velocity, pressure points, strokes, accelerations as well as static characteristics. This technique is preferable because dynamic features are very difficult to imitate. Unfortunately, these systems require user-cooperation and complex hardware.

In case of *off-line* recognition, signature template comes from an imaging device, and hence only static data are obtained. The person does not have to be present at the time of verification. For this reason, *off-line* signature recognition is simpler and convenient in various situations such as document verification, banking transactions, etc.

The paper proposes *off-line* fuzzy approach, which makes recognizing forged and genuine signatures possible. However, the method is flexible and allows the future user to include *on-line* features.

The most important advantage of the fuzzy approach is adjusting uncertainty to the input data. Each feature of the signature has a different soft constraint assigned in a fuzzy set form, relevant to a divergence occurring within learning samples. Therefore, to allow the system a proper adjustment, the signature of each individual must be captured at least several times.

The whole process of proposed recognition is described in the following sections of the paper. First, the pre-processing phase is presented. The process of building a fuzzy structure, called the fuzzy signature, is described next. Subsequent sections present the verification phase and obtained results with conclusion at the end.

## 2 Related works and critical remarks

Signature recognition methods are extensively studied and developed for many years [24, 34]. Unfortunately, reliable comparison of different approaches is quite difficult, which is caused by inconsistency in presented standards. In practice different databases are used, where different number of original and forged signatures are stored. The datasets of biometric features are frequently composed on the basis of private (hence unavailable) signatures as well as signatures coming from professional, published databases. It is a well-known fact that recognition performance decreases when number of samples in a database of biometric features is increased. It can be noticed even for small number of additional database records [27]. Such important remark is often ignored; therefore, we postulate that presented results should always be normalized and presentation principles should be respected. In presented approach all results were obtained for SVC2004 database, which is fully available [49]. Hence, results obtained and proposed algorithms can be always reliably compared with achievements of other authors.

On the other hand, it can be also observed that results reported in many papers use different coefficients (FAR, FRR, EER) and factors (accuracy, sensitivity, specificity). Unfortunately, only one of these parameters is very often treated as a single quality factor of described biometric systems. It is another obstacle precluding comparison of achieved results.

*off-line*and Table 2 for

*online*methods. The same problem can be noticed for results gathered in earlier extensive survey of the state-of-the-art [24].

Performance comparison with off-line signature secognition systems [7]

Sr. | Approach | FAR | FRR | Accuracy |
---|---|---|---|---|

1 | Proposed fuzzy approach | 0.61/1.52 | 22.16/12.16 | 99.18/98.38 |

2 | Signature recognition using clustering technique [7] | 2.5/8.2 | 6.5/2.96 | 95.08 |

3 | Contour Method [35] | 11.60 | 13.20 | 86.90 |

4 | exterior contours and shape features [8] | 06.90 | 06.50 | 93.80 |

5 | Local granulometric size distributions [47] | 07.00 | 05.00 | – |

6 | Back-propagation neural network prototype [1] | 10.00 | 06.00 | – |

7 | Geometric centers [39] | 09.00 | 14.58 | – |

8 | Two-stage neural network classifier [6] | 03.00 | 09.81 | 80.81 |

9 | Distance statistics [29] | 34.91 | 28.30 | 93.33 |

10 | Modified direction feature [4] | – | – | 91.12 |

11 | Hidden Markov model and cross-validation [15] | 11.70 | 00.64 | – |

12 | Discrete random transform and a HMM [9] | 10.00 | 20.00 | – |

13 | Kernel principal component selfregression [58] | 03.40 | 08.90 | – |

14 | Parameterized Hough transform [28] | – | – | 95.24 |

15 | Smoothness index-based approach [17] | – | – | 79.00 |

16 | Geometric based on fixed-point arithmetic [19] | 4.9–15.5 | 5.61–16.39 | – |

17 | HMM and graphometric features [16] | 23.00 | 01.00 | – |

18 | Virtual support vector machine [5] | 13.00 | 16.00 | – |

19 | Wavelet-based verification [12] | 10.98 | 05.60 | – |

20 | Genetic algorithm [55] | 01.80 | 08.51 | 86.00 |

Performance comparison with on-line signature recognition systems [7]

Sr. | Approach | FAR | FRR | ERR | Accuracy |
---|---|---|---|---|---|

1 | ER2—dynamic time wrapping [36] | – | – | 7.20 | – |

2 | On-line SRS—digitizer tablet [26] | 7.50–1.10 | 03.90 | – | – |

3 | Image invariants and dynamic features [2] | – | – | – | 83.00 |

4 | On-line SRS model guided segmentation [46] | 0.80 | – | 3.40 | – |

5 | Conjugate gradient neural networks [3] | – | – | – | 98.40 |

6 | Consistency functions [42] | 01.00 | 07.00 | – | – |

7 | Variable length segmentation and HMM [48] | 04.00 | 12.00 | 11.50 | – |

8 | Implementing a DSP kernel [14] | <0.01 | – | – | >99.0 |

9 | Dynamic feature of pressure [51] | 6.80 | 10.80 | – | – |

10 | Low cost dynamic SRS [21] | 7.00 | 6.00 | – | – |

Since the beginning of the theory presented by Zadeh [56] fuzzy sets have become a popular and intuitive tool for uncertainty representation. They are widely used in popular types of intelligent systems handling variations of the input data [40, 43, 50]. Because of the nature of signature verification problems fuzzy approaches are also employed in this kind of research.

Enrolment phase of a general fuzzy approach to signature verification, as well as non-fuzzy methods, usually consists of three stages. The first step considers simple preprocessing of the input data, like normalisation and image filtering. In the second phase signature information is analysed and specific features are extracted. The last phase of fuzzy approaches considers building a fuzzy system (fuzzy model) based on variation of features extracted from learning samples. The verification phase of such systems confronts chosen signature sample (or extracted features) to the fuzzy model and calculates the level of conformity.

Recent research in the field of automatic signature verification employing fuzzy systems are based on different approaches. A significant number of contemporary solutions use different kind of neuro-fuzzy applications [18, 30, 38, 45, 52]. Data for the fuzzy systems come from extraction of various features like position and pressure [30], angles [38], Zernike moments [18], result of discrete wavelet transform [52] and pseudo-outer product [45]. However, alternative solutions are also developed.

Papers [53, 54] introduce fuzzy snake models. The solution is based on open polygonal line (snake) composed by a variable number of equally spaced control points (piecewise-linear, two-dimensional structure). In this case database stores the exact information about signature’s shape, which for some applications could be a disadvantage because of data security reasons.

System based on Bezier curves is presented in paper [57]. The approach allows the user to control the level of uncertainty by adjusting \(\alpha\)-cuts, which results in variable ranges of possible position for Bezier nodes. As well as the previous method, this solution also stores the information about signature’s shape.

Paper [22] proposes Takagi-Sugeno model with fuzzyfied angle features extracted from box approach.

The authors of [20] introduced a biometric crypto system with a fuzzy key, which is not the issue of this paper. However, the approach employs methods of authorisation with interesting feature extraction based on quantized maxima and minima from upper and lower envelopes of the signature.

The mentioned methods were tested mostly on private and unavailable databases with relatively small number of samples (less than 400). Data tested in paper [38] were obtained from four people and include only 20 forged samples. For that case the final average result is also not defined.

Comparison and assessment of methods introduced in papers [20, 53, 57] is impossible because no test results were presented.

Results obtained by authors of analysed examples are various and strongly depend on the type of database that was used. For example, the paper [18] reports the average error rate obtained at the level of 0.5 %. However, tests of that particular case are based on a database of 200 samples collected from 10 people without any forged samples. In addition, the reported error rate is not precisely defined.

Only the authors of [52, 54] used published databases, where the latter is no longer available at the specified website. The first paper reports EER at the level of 12.5 %. It needs to be emphasized that in this case FRR exceeded 25 % for FAR equal 5 % (based on presented ROC curve). The second paper reports FAR and FRR coefficients generally at the levels exceeding 10 % for a database containing more than 2000 samples.

Non-standard results are also reported in [22], where percentages of accepted and rejected samples are given. The best results were obtained for random forgery tests, where percentage of accepted samples equals 22.5 and 25 %, depending on the used type of method.

Private database employed in tests of online approach [30] (position and pressure) allowed the authors to obtain FAR and FRR coefficients equal 0 and 3.5 % respectively, which is a very good result that unfortunately cannot be verified. The same problem is encountered in another online approach employing a neuro-fuzzy method [45], where the best results were obtained for signatures of Chinese individuals.

The fuzzy approach described in this paper have never been proposed before. The first novelty can be found in the preprocessing phase. The method of feature extraction introduced in [44] was extended, which significantly reflects in results of the system. The second novelty is the original fuzzy model created on the basis of structure obtained in the first phase.

Information stored within database of the verification system cannot be used to recreate original shapes of signatures, which is an advantage from data security point of view. Moreover, the solution is characterised by relatively small computational complexity and in comparison with other methods it is much easier to implement.

Considering a relatively big database (1600 samples in SVC2004 database [49]), results obtained for FAR and FRR coefficients are very promising and encourage to further development of the solution.

## 3 Signature preparation

The main goal of writer recognition systems is determining whether two handwritten samples were performed by the same person or not. Signatures of the same individual can differ in many parameters such as size, pen pressure, velocity, etc. Therefore, one of the most important aspects of recognition is the unification process (pre-processing), which allows a system to compare signatures more precisely. The approach is based on the idea of characteristic signature preprocessing [44].

In the next step a new set of points \((x_k, y_k)\) is obtained, where \(k=1,2,\ldots ,M\) and \(M \ll N.\) The new points are calculated from an intersection of a signature and lines generated at different angles and passing through the center point. The phase is shown at Fig. 1. The number of generated lines depends on an angle step \(\Delta \alpha,\) which is a parameter of the method. Fig. 1 contains visualization for \(\Delta \alpha = 30^\circ \) and for that reason six lines are drawn at \(0^\circ,\)\(30^\circ,\)\(60^\circ,\)\(90^\circ,\)\(120^\circ\) and \(150^\circ.\)

### 3.1 Possible extension of the method

## 4 Fuzzy signature

The main idea of the method is to construct a fuzzy structure—fuzzy signature \(FS\)—for each person chosen to be recognized by the system. The structure is formed by a number of fuzzy sets relevant to the input data. Constructed fuzzy sets reflect a diversity existing in the subsequent signatures within a learning set. Let the three samples presented in Fig. 2 represent a learning set. In general, the size of a learning set is not limited.

The first reason why 0 is used as a fill up value is simple. As it was mentioned at the end of Sect. 3, each \(\Omega ^{\alpha }_{S_i}\) is sorted in decreasing order, so the smallest values are located at the end. The value 0 is the shortest distance possible, obtained when the signature’s center of gravity (1) is one of the signature’s points. Therefore, the smallest value fills up shorter sets, preserving the order. To present the second reason, that mainly explains why to level out the sets, further steps of the method are needed to be introduced.

When sizes of \(\Omega ^\alpha _{S_i}\) are even for each \(\alpha \) in all learning samples, they are again divided into groups in order to obtain a membership functions \(\mu _{\alpha i}\) and \(\mu _{S\alpha }\) describing fuzzy sets. The process is depicted in Fig. 3 by frames and arrows. It is important to notice that \(\mu _{\alpha i}\) are created from the content of \(\Omega ^\alpha _{S_i}\) and \(\mu _{S\alpha }\) from the size of \(\Omega ^\alpha _{S_i}.\) Each frame on the figure represents values of a different universe of discourse \(X_{\alpha _i}\) and \(X_{S\alpha}\)—the domains of \(\mu _{\alpha i}\) and \(\mu _{S\alpha},\) respectively.

Therefore, the fuzzy signature FS contains a number of fuzzy sets adjusted to learning samples. The placement of peaks and width of membership functions’ shapes are based on the mean of relevant values and their range, respectively. One can notice that the step of sets levelling, by adding 0 values, lowers the influence of other values in calculation of the mean. It informs there was no value in that domain for this sample, which appropriately reflects in produced soft constraint—a fuzzy set.

### 4.1 Fuzzy size of \(\Omega^\alpha_{S_i}\)

The previous section distinguishes two different types of fuzzy sets. The first, as depicted in Fig. 3, is created from the values of \(\Omega ^\alpha _{S_i}.\) The second type, designated as \(A_{S\alpha }\) with \(\mu _{S\alpha }\) membership function, represents the fuzzy size of \(\Omega ^\alpha _{S_i}.\) The sets and creation of their membership functions are precisely analysed in this section.

Considering Fig. 3 presented in previous section, it can be noticed that membership levels of \(\mu _{S0}\) and \(\mu _{S30}\) are relevant to the number of occurrence of \(\Omega ^{\alpha }_{S_i}\) size within learning samples. For \(\Omega ^{\alpha =0}_{S_i}\) three sizes occur once: 3, 2 and 4. That is why to each of those values the same membership level is assigned (circles with black fill). While for \(\Omega ^{\alpha =30}_{S_i}\) size 3 occurs once, but 2 occurs twice. Therefore, the size 2 is described with a higher membership level.

The presented solution promotes multiple occurrence of \(\Omega ^{\alpha }_{S_i}\) sizes; however, the minimum level is set to \(0.5\) (only in case of \(\frac{O_{x_i}}{N_{\rm L}}\) greater than zero and less than \(0.5\)). The minimum is set to avoid too small membership levels and to increase their influence in recognition algorithm, which is precisely described in the following sections.

Nevertheless, Fig. 4 depicts a number of extra points with nonzero membership level, inserted additionally to create a soft constraint (circles with white fill). The membership levels in this case are obtained from a linear function created according to the chosen \(\beta \) range—near \(x_{S\alpha _{\min }}\) as a raising edge and \(x_{S\alpha _{\max }}\) as a falling edge (\(x_{S\alpha _{\min }},\)\(x_{S\alpha _{\max }}\) represent minimum and maximum of \(\#\Omega ^\alpha _{S_i} \in X_{S\alpha}\) for all learning samples).

### 4.2 Extension of the method and the fuzzy signature

The Sect. 3.1 introduced an extension in preprocessing phase, where more parameters of a signature can be considered (i.e. pen’s angle, velocity, pressure etc.). Creating the fuzzy signature FS in this case is not much more complicated. The only difference lies in the content of \(\Omega ^\alpha _{S_i}\) which elements are extended, containing more information for each point of a signature. Obviously, the \(\#\Omega ^\alpha _{S_i}\) does not change; therefore, fuzzy size \(A_{S\alpha}\) can be obtained as described in the previous section. However, other stored parameters need to be processed, which will extend the fuzzy signature FS by additional fuzzy sets.

Membership functions of additional fuzzy sets can be obtained analogically to \(\mu _{\alpha _i}\) of \(A_{\alpha _i},\) which are precisely described in Sect. 4.

The generalized versions of trapezoidal and triangular membership function \(\mu _{\alpha _{ki}}\) can be obtained the same way.

## 5 Signature recognition

The fuzzy signature FS is created and stored in the system’s database for each person that needs to be recognised. The process of recognition is based on obtaining the levels of conformity of a given signature with fuzzy structures from the database. If the level of conformity meets configured requirements, the signature can be considered as recognised. In general, the task can be accomplished by different means. However, the first phase of calculation is common for different approaches; that is why it will be described next.

Calculated results are basis for further processing within different verification methods that produce one final result \(R \in [0,1],\) representing the output level of conformity. In general, this kind of tasks are performed by operators of aggregation.

The main idea of the approach is that the influence of the local results—aggregated \(R_{\alpha _i}\)—is controlled by the \(R_{S\alpha},\) because the fuzzy size \(A_{S\alpha }\) is the most important element in the structure of FS. It can be described as higher in the hierarchy. For a better result, the sizes of \(\Omega _{S_{\rm in}}^{\alpha}\) have to be matched first to increase the influence of the lower structure. Various methods of verification can be obtained from (20) by applying different \(\oplus \) operators.

### 5.1 Assessment of an input signature

After obtaining the final result \(R,\) which is the level of conformity, an assessment needs to be performed in order to classify the input signature \(S_{\rm in}\) as genuine/matched or forged/not matched. In general, two solutions are possible. The most simple way is to assume one fixed level \(R_{\min _{\rm in}}\) for the whole recognition system. Unfortunately, as it is easy to apply, it makes the system insensitive to diversity between different cases.

The second approach considers each fuzzy signature separately. In this case every fuzzy signature stored in the database has a decision level \(R_{\min _i}\) assigned, where \(i=1,2,\ldots ,P\) and \(P\) is the number of stored fuzzy signatures \(FS.\) The \(R_{\min _i}\) value works as a trigger. When \(R \ge R_{\min _i}\) for the \(S_{\rm in}\) sample, it is classified as genuine/matched for signature number \(i\) or forged/not matched if \(R < R_{\min _i}.\)

## 6 Results obtained

Configurable properties and parameters of the fuzzy system

Property/parameter | Description |
---|---|

Verification method | A type of verification method used to obtain the output level of conformity (“hard”, “soft”, “hard-soft” and “soft-hard”) |

T-norm | A type of triangular norm used in computation (considered types implemented in FUZZLIB library: minimum, product, nilpotent, Hamacher product and Łukasiewicz t-norm) |

\(\Delta \alpha \) | The angle step of the preprocessing phase—Fig. 1 |

\(\gamma \) | The fuzzyfication ratio (8)—influences the width of \(\mu _{\alpha _i}\) membership functions |

\(\sigma _{\min }\) | The minimum width of the \(\mu _{\alpha _i}\) membership functions—Eqs. (8), (7) |

\(\beta \) | The range defining the width of edges for the \(\mu _{S\alpha }\) membership functions—Fig. 4 and Eq. (13) |

\(\Delta r\) | The range of classification (25) |

\(L\) | the number of learning samples |

Tests were performed for different configuration of parameters to find the suite of values and properties giving the best results of FAR and FRR error levels. As the source of signatures the SVC2004 database was used [49]. It contains 1,600 signatures of 40 people, where 40 signatures are assigned to each person (20 genuine and 20 professionally forged). Unfortunately, performing tests covering all possible combinations, even for several values of each parameter, is extremely time-consuming because of an exponential complexity of the problem. That is why in assessment of the most important parameters of the system test were executed starting with arbitrarily chosen values which were modified during the process. In many cases this kind of method reveals a general influence of one changing parameter on the obtained results.

Before the tests the problem of the learning samples number (parameter \(L\)) had to be analysed. In general, if more signature samples of an individual are involved in the learning process, then the recognition level for signatures of that person is higher. On the other hand, in case of the analysed approach, too much samples can generate large widths of created fuzzy sets making the system too “fuzzy”, having a negative impact on the FRR error. It is caused by the differences between signatures of one person. Secondly, adjusting the system with too big number of learning signatures is uncomfortable for the user and the person responsible for the process. Even if it is done only once, in case of many potential users it could be considered as a disadvantage of the verification system. That is why the size of a learning set have to be chosen reasonably by finding a compromise.

During tests of the presented system it was assumed that the number of learning signatures should not exceed 5 samples. The decision was based mainly on the small number of genuine signatures for each individual in SVC2004 database (20 signatures). In that case, for at least 15 remaining samples, the obtained FRR coefficient can be considered as representative. That is why the tests were performed for two values: the highest \(L=5,\) which were expected to give better results and smaller \(L=3\) to analyse the influence of a decreased number of learning samples. The results presented at Fig. 6 confirm the expectations.

The verification method and the type of T-norm were analysed next. The best results were obtained for the “soft-hard” approach and the minimum T-norm. The “hard” and “hard-soft” solutions were rejected at the beginning. The methods practically adjust the system only to the learning samples and reject most of the other genuine samples, which results in a very big FRR and disqualifies the approaches. The “soft” and hybrid “soft-hard” methods gave the best results, making the system much more responsive to adjustment of the parameters. However, only with the “soft-hard” method the system was able to obtain a very low FAR for FRR below 25 %. In case of T-norm analysis, the Lukasiewicz and the nilpotent T-norms occurred to be too restrictive. These functions assign zero to lower values of their parameters, which is undesirable particularly for the “hard” verification method and partial matching in general. For the product and the Hamacher product the system produces very low values of conformity levels, which causes a difficulty in adjustment of \(\Delta r.\) The problem can be partially solved by increasing \(\gamma \)—the fuzzyfication ratio, which obviously reflects on the FAR error. This fact causes that the system is less responsive to changes of the parameters in comparison to the minimum T-norm.

Test results

\(\Delta \alpha \) | \(\gamma \) | \(\sigma _{\min }\) | \(\beta \) | \(\Delta r\) | \(L\) | FAR | FRR | Accuracy |
---|---|---|---|---|---|---|---|---|

10 | 1.09 | 0.09 | 3.5 | 0.2 | 5 | 0.61 | 22.16 | 0.9919 |

25 | 1.19 | 0.08 | 3.5 | 0.2 | 5 | 0.61 | 27.83 | 0.9914 |

10 | 1.35 | 0.09 | 3.5 | 0.2 | 5 | 1.52 | 12.16 | 0.9838 |

25 | 1.35 | 0.09 | 3.5 | 0.2 | 5 | 1.52 | 17.16 | 0.9833 |

### 6.1 Computational complexity

The process of creation of the fuzzy signature FS is characterized by a linear time complexity (\(O(n)\)), according to the \(\Delta \alpha \) parameter. During tests the 2core 2.2 GHz Intel processor machine was used. The average time of computation of one fuzzy signature was equal 1.7 ms for \(\Delta \alpha =10^\circ,\) and 0.77 ms for \(\Delta \alpha =25^\circ.\) Each FS was created from five learning samples. An average time of verification for one signature (\(S_{\rm in}\)) was equal 0.59 and 0.27 ms, respectively.

It is important to emphasize that all numerical tests were implemented in the Java language and executed within the Java Virtual Environment. Considering the fact of possible implementation at non-virtual platform it gives hope for much shorter times of computation.

## 7 Conclusions

As it was mentioned in the introduction, one goal of the paper was to define an automated process of signature analysis for biometric classifiers, where machine learning methods can be used. The present paper formulates the appropriate structure of such method and describes all the phases needed to build a fuzzy system dedicated for signature verification. The proposed method can be applied in the environment, where input signatures, even of the same person, are characterised by a large differences and for this reason cannot be accurately recognized using other methods. The high FRR ratio causes that the technique is destined for important security systems, where FAR errors should be very low. It must be emphasised that a very good result of FAR obtained for the presented solution stands against the common opinion that the *off-line* methods are easy to forge.

Another advantage of the approach, certainly very important for security systems, is the characteristic preprocessing phase, which greatly increases the safety level of information stored in the database. In case of a data theft the intruder has an access to a processed form of signatures, which cannot be used to recreate the original. In addition, small time complexity of the algorithm gives hope for a further development of the method, which can be applied in various domains.

## Open Access

This article is distributed under the terms of the Creative Commons Attribution License which permits any use, distribution, and reproduction in any medium, provided the original author(s) and the source are credited.