Advertisement

Soft Computing

, Volume 23, Issue 9, pp 3067–3080 | Cite as

Enhanced quantum-based neural network learning and its application to signature verification

  • Om Prakash PatelEmail author
  • Aruna Tiwari
  • Rishabh Chaudhary
  • Sai Vidyaranya Nuthalapati
  • Neha Bharill
  • Mukesh PrasadEmail author
  • Farookh Khadeer Hussain
  • Omar Khadeer Hussain
Methodologies and Application

Abstract

In this paper, an enhanced quantum-based neural network learning algorithm (EQNN-S) which constructs a neural network architecture using the quantum computing concept is proposed for signature verification. The quantum computing concept is used to decide the connection weights and threshold of neurons. A boundary threshold parameter is introduced to optimally determine the neuron threshold. This parameter uses min, max function to decide threshold, which assists efficient learning. A manually prepared signature dataset is used to test the performance of the proposed algorithm. To uniquely identify the signature, several novel features are selected such as the number of loops present in the signature, the boundary calculation, the number of vertical and horizontal dense patches, and the angle measurement. A total of 45 features are extracted from each signature. The performance of the proposed algorithm is evaluated by rigorous training and testing with these signatures using partitions of 60–40 and 70–30%, and a tenfold cross-validation. To compare the results derived from the proposed quantum neural network, the same dataset is tested on support vector machine, multilayer perceptron, back propagation neural network, and Naive Bayes. The performance of the proposed algorithm is found better when compared with the above methods, and the results verify the effectiveness of the proposed algorithm.

Keywords

Quantum computing Neural network Signatures Feature extraction Classification 

Notes

Compliance with ethical standards

Conflicts of interest

The authors declare that they have no conflict of interest.

References

  1. Bajaj R, Chaudhury S (1997) Signature verification using multiple neural classifiers. Pattern Recognit 30(1):1–7CrossRefGoogle Scholar
  2. Bhattacharya I, Ghosh P, Biswas S (2013) Offline signature verification using pixel matching technique. Procedia Technol 30:970–977CrossRefGoogle Scholar
  3. Buryne PD, Forre R (1986) Signature verification with elastic image matching. In: International Carnahan conference on security technology Gothenburg, Sweden, August. IEEE, pp 12–14Google Scholar
  4. Castellani M (2017) Competitive co-evolution of multi-layer perceptron classifiers. Soft Comput: 1–16. https://doi.org/10.1007/s00500-017-2587-6
  5. Chan L-H, Salleh S-H, Ting C-M (2009) PCA, LDA and neural network for face identification. In: 4th IEEE conference on industrial electronics and applications, Xian, China, IEEE, pp 1256–1259Google Scholar
  6. Dimauro G, Impedovo S, Pirlo G, Salzo A (1997) A multi-expert signature verification system for bankcheck processing. IJPRAI 11(5):827–844Google Scholar
  7. Ferrer M, Vargas J, Morales A, Ordonez A (2012) Robustness of offline signature verification based on gray level features. IEEE Trans Inf Forensics Secur 7(3):966–977CrossRefGoogle Scholar
  8. Gupta AK, Singh YP (2011) Analysis of bidirectional associative memory of neural network method in the string recognition. In: International conference on computational intelligence and communication networks (CICN), Gwalior, India, 2011. IEEE, pp 172–176Google Scholar
  9. Han K-H, Kim J-H (2002) Quantum-inspired evolutionary algorithm for a class of combinatorial optimization. IEEE Trans Evol Comput 6(6):580–593CrossRefGoogle Scholar
  10. Kruthi C, Shet DC (2014) Offline signature verification using support vector machine. In: Fifth international conference on signal and image processing (ICSIP), Bangalore, India, 2014. IEEE, pp 3–8Google Scholar
  11. Kuzuno H, Tonami S (2015) Detection of sensitive information leakage in Android applications using signature generation. Int J Space Based Situated Comput 5(1):53–62CrossRefGoogle Scholar
  12. Lu T-C, Yu G-R, Juang J-C (2013) Quantum-based algorithm for optimizing artificial neural networks. IEEE Trans Neural Netw Learn Syst 24(8):1266–1278CrossRefGoogle Scholar
  13. Nakamura S, Duolikun D, Enokido T, Takizawa M (2016) A read-write abortion protocol to prevent illegal information flow in role-based access control systems. Int J Space Based Situated Comput 6(1):43–53CrossRefGoogle Scholar
  14. Pansare A, Bhatia S (2012) Handwritten signature verification using neural network. Int J Appl Inf Syst 1(2):44–49Google Scholar
  15. Patel OP, Tiwari A (2014) Quantum inspired binary neural network algorithm. In: International conference on information technology (ICIT), Bhubaneswar, India, 2014. IEEE, pp 270–274Google Scholar
  16. Qi Y, Hunt BR (1994) Signature verification using global and grid features. Pattern Recognit 27(12):1621–1629CrossRefGoogle Scholar
  17. Qiu L, Sun X, Xu J (2017) Categorical quantum cryptography for access control in cloud computing. Soft Comput: 1–8Google Scholar
  18. Ren Y, Wang H, Du J, Ma L (2016) Code-based authentication with designated verifier. Int J Grid Util Comput 7(1):61–67CrossRefGoogle Scholar
  19. Sanmorino A, Yazid S (2012) A survey for handwritten signature verification. In: 2nd International conference on uncertainty reasoning and knowledge engineering (URKE), Jakarta, Indonesia, 2012. IEEE, pp 54–57Google Scholar
  20. Sarikaya R, Hinton GE, Deoras A (2014) Application of deep belief networks for natural language understanding. IEEE/ACM Trans Audio Speech Lang Process 22(4):778–784CrossRefGoogle Scholar
  21. Sartakhti JS, Afrabandpey H, Saraee M (2017) Simulated annealing least squares twin support vector machine (SA-LSTSVM) for pattern classification. Soft Comput 21(15):4361–4373CrossRefGoogle Scholar
  22. Shanker AP, Rajagopalan A (2007) Off-line signature verification using DTW. Pattern Recognit Lett 28(12):1407–1414CrossRefGoogle Scholar
  23. Sun X, Tian H, Wang Y, Ren Y (2014) Toward quantum-resistant strong designated verifier signature. Int J Grid Util Comput 5(2):80–86CrossRefGoogle Scholar
  24. Wang T, Wang Y (2010) Pattern classification with ordered features using mrmr and neural networks. In: International conference on information, networking and automation, ICINA 2010, Kunming, China, 2010, pp 2128–2131Google Scholar
  25. Wang Y, Ma J, Lu X, Lu D, Zhang L (2016) Efficiency optimisation signature scheme for time-critical multicast data origin authentication. Int J Grid Util Comput 7(1):1–11CrossRefGoogle Scholar
  26. Wilkinson TS, Pender DA, Goodman JW (1991) Use of synthetic discriminant functions for handwritten-signature verification. Appl Opt 30(23):3345–3353CrossRefGoogle Scholar

Copyright information

© Springer-Verlag GmbH Germany, part of Springer Nature 2017

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringIndian Institute of Technology IndoreSimrol IndoreIndia
  2. 2.Centre for Artificial Intelligence, School of Software, FEITUniversity of Technology SydneySydneyAustralia
  3. 3.School of BusinessUniversity of New South WalesCanberraAustralia

Personalised recommendations