Skip to main content
Log in

Verification of static signature pattern based on random subspace, REP tree and bagging

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this paper we propose an effective method for static signature recognition from spontaneous handwritten text images. Our method relies on different aspects of writing: the presence of redundant patterns in the writing and its features. Signatures are analyzed at small fragments in which we seek to extract the patterns that an individual employs frequently as he writes. We exploit different features of writing like orientation, centroid and contour by computing a set of features from writing samples at different levels of observations. Orientation like intersecting point, edge point and gradient change of signature achieve great success in feature description. These features are extracted from the standard signature database and extracted features are trained and tested by machine learning (ML) approach. The machine learning approaches like Bagging, Random subspace (RS) and REP tree are used for classification purpose. Bagging with 10 iterations and base learner achieved efficiency upto 88 %. RS randomly selects features from feature set and creates new feature set. It uses decision tree as base classifier with different tree size. RS achieved efficiency same as Bagging but has more statistical errors. However, in case of REP tree we have achieved efficiency upto 75 %. The experimental results show that the Bagging and RS achieves promising results on publicly available data set.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22

Similar content being viewed by others

References

  1. Almaz J, Fornés A, Valveny E, et al (2011) A non-rigid feature extraction method for shape recognition 2011 international conference on document analysis and recognition. IEEE, pp 987–991

  2. Impedovo D, Pirlo G (2008) Automatic signature verification: the state of the art. IEEE Trans Syst Man Cybern Part C Appl Rev 38(5):609–635

    Article  Google Scholar 

  3. Jain A, Bolle R, Pankanti S (2006) Biometrics: personal identification in networked society, vol 479, Springer

  4. Jain A, Flynn P, Ross AA (2007) Handbook of biometrics, Springer

  5. Jan Z, Muhammad H, Sajjad M, Abbas N, Ansari MA, Baloch B (2016) Offline signature recognition using delaunay triangulation, vol 48

  6. Jayanthi SK, Sasikala S (2013) Reptree classifier for identifying link spam in web search engines. IJSC 3(2):498–505

    Article  Google Scholar 

  7. Kalmegh S (2015) Analysis of weka data mining algorithm reptree, simple cart and randomtree for classification of indian news. International Journal of Innovative Science, Engineering & Technology 2(2):438–446

    Google Scholar 

  8. Kassner A, Thornhill RE (2010) Texture analysis: a review of neurologic mr imaging applications. Am J Neuroradiol 31(5):809–816

    Article  Google Scholar 

  9. Kumar R, Kundu L, Chanda B, Sharma JD (2010) A Writer-independent off-line signature verification system based on signature morphology Proceedings of the 1st international conference on intelligent interactive technologies and multimedia. ACM, pp 261–265

  10. Nguyen V, Blumenstein M (2011) An application of the 2d gaussian filter for enhancing feature extraction in off-line signature verification International conference on document analysis and recognition. IEEE, p 2011

  11. Ortega-Garcia J, Fierrez-Aguilar J, Simon D, Gonzalez J, Faundez-Zanuy M, Espinosa V, Satue A, Hernaez I, Igarza J-J, Vivaracho C, et al (2003) Mcyt baseline corpus: a bimodal biometric database. IEE Proceedings-Vision, Image and Signal Processing 150(6):395–401

    Article  Google Scholar 

  12. Papoulis A, Unnikrishna Pillai S (2002) Probability, random variables, and stochastic processes, Tata McGraw-Hill Education

  13. Plimmer B, Grundy J, Hosking J, Priest R (2006) Inking in the ide: Experiences with pen-based design and annotatio Visual languages and human-centric computing (VL/HCC’06). IEEE, pp 111–115

  14. Prakash HN, Guru DS (2010) Offline signature verification an approach based on score level fusion

  15. Quinlan JR (1996) Bagging boosting, and c4. 5 AAAI/IAAI, vol 1, pp 725–730

  16. Haralick RM (1979) Statistical and structural approaches to texture. Proc IEEE 67(5):786–804

    Article  Google Scholar 

  17. Roy S, Maheshkar S (2014) Offline signature verification using grid based and centroid based approach, vol 86

  18. Ruiz-del Solar J, Devia C, Loncomilla P, Concha F (2008) Offline signature verification using local interest points and descriptors Iberoamerican congress on pattern recognition. Springer, pp 22–29

  19. Vargas JF, Ferrer MA, Travieso CM, Alonso JB (2011) Off-line signature verification based on grey level information using texture features. Pattern Recogn 44 (2):375–385

    Article  MATH  Google Scholar 

  20. Veeramachaneni K, Osadciw LA, Varshney PK (2005) An adaptive multimodal biometric management algorithm. IEEE Trans Syst Man Cybern Part C Appl Rev 35 (3):344–356

    Article  Google Scholar 

  21. Vielhauer C, Dittmann J (2006) Biometrics for user authentication. encyclopedia of multimedia, ed. b furth

  22. Wijesoma WS, Yue KW, Chien KL, Chow TK (2001) Online handwritten signature verification for electronic commerce over the internet Web Intelligence: Research and Development. Springer, pp 227–236

  23. Zhang D, Campbell JP, Maltoni D, Bolle RM (2005) Guest editorial special issue on biometric systems. IEEE Trans Syst Man Cybern Part C Appl Rev 35 (3):273–275

    Article  Google Scholar 

  24. Zhang D, Campbell JP, Maltoni D, Bolle RM (2007) Guest editorial introduction to the special issue on recent advances in biometric systems. IEEE Trans Syst Man Cybern B Cybern 37(5):1091

    Article  Google Scholar 

  25. Zois EN, Alewijnse L, Economou G (2016) Offline signature verification and quality characterization using poset oriented grid features. Pattern Recogn 54:162–177

    Article  Google Scholar 

  26. Zontul M, Aydın F, Doğan G, Şener S, Kaynar O (2013) Wind speed forecasting using reptree and bagging methods in kirklareli-Turkey

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sushila Maheshkar.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chandra, S., Maheshkar, S. Verification of static signature pattern based on random subspace, REP tree and bagging. Multimed Tools Appl 76, 19139–19171 (2017). https://doi.org/10.1007/s11042-017-4531-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-017-4531-2

Keywords

Navigation