Skip to main content

Processing of Handwritten Signature Image for Authentication

  • Conference paper
Security-Enriched Urban Computing and Smart Grid (SUComS 2010)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 78))

Abstract

Since last few years, Handwritten Signature Authentication is a classical research work area in the line of Computer Science. Various new techniques of Image Analysis also attracting the Computer Scientists as well. Firstly, Pixel clustering is used to transform the signature image into bi-color image. Then secondly, instead of considering the whole image, only signature area is extracted. Thirdly, by using Image scaling technique the signature image resized along the coordinate directions. As different techniques are used to subsample (image after transformation) which will be discussed in turn. Fourthly, a different technique is used for thinning to reduce the threshold output of an edge detector algorithm is used to lines of a single pixel thickness. In this paper we propose the above mentioned series of techniques as the preprocessing analysis part of Handwritten Signature Recognition.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Young, T., Gerbrands, J.J., van Vliet, L.J.: Morphology-based Operations, http://www.ph.tn.tudelft.nl/Courses/FIP/noframes/fip-Morpholo.html (last visited on May 16, 2009)

  2. Bloomberg, D.S., Vincent, L.: Pattern Matching using the Blur Hit-Miss Transform. Journal of Electronic Imaging 9(2), 140–150 (2000)

    Article  Google Scholar 

  3. Serra, J., Vincent, L.: An Overview of Morphological Filtering. Circuits, Systems and Signal Processing 11(1), 47–108 (1992)

    Article  MathSciNet  MATH  Google Scholar 

  4. Bloomberg, D.S., Vincent, L.: Blur Hit-Miss Transform and its Use in Document Image Pattern Detection. In: Proceedings of SPIE, Document Recognition II, San Jose, CA, March 30, vol. 2422, pp. 278–292 (1995)

    Google Scholar 

  5. Al-Otum, H.M., Uraikat, M.T.: Color image morphology using an adaptive saturation-based technique. Optical Engineering, Journal of SPIE 43(06), 1280–1292 (2004)

    Article  Google Scholar 

  6. Dutta Majumder, D., Chanda, B.: Digital Image Processing and Analysis. Prentice-Hall of India Pvt. Ltd., Englewood Cliffs (2006)

    Google Scholar 

  7. Zimmer, A., Ling, L.L.: A Hybrid On/Off Line Handwritten Signature Verification System. In: International Conference on Document Analysis and Recognition, Edinburgh, Scotland, August 3-6, vol. 1, pp. 424–428 (2003)

    Google Scholar 

  8. Kashi, R.S., Turin, W., Nelson, W.L.: On-line handwritten signature verification using stroke direction coding. In: Optical Engineering, SPIE Digital Library, vol. 35, pp. 2526–2533 (1996)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, Th. (2010). Processing of Handwritten Signature Image for Authentication. In: Kim, Th., Stoica, A., Chang, RS. (eds) Security-Enriched Urban Computing and Smart Grid. SUComS 2010. Communications in Computer and Information Science, vol 78. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16444-6_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-16444-6_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-16443-9

  • Online ISBN: 978-3-642-16444-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics