Skip to main content
Log in

Enhanced quantum-based neural network learning and its application to signature verification

  • Methodologies and Application
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

In this paper, an enhanced quantum-based neural network learning algorithm (EQNN-S) which constructs a neural network architecture using the quantum computing concept is proposed for signature verification. The quantum computing concept is used to decide the connection weights and threshold of neurons. A boundary threshold parameter is introduced to optimally determine the neuron threshold. This parameter uses min, max function to decide threshold, which assists efficient learning. A manually prepared signature dataset is used to test the performance of the proposed algorithm. To uniquely identify the signature, several novel features are selected such as the number of loops present in the signature, the boundary calculation, the number of vertical and horizontal dense patches, and the angle measurement. A total of 45 features are extracted from each signature. The performance of the proposed algorithm is evaluated by rigorous training and testing with these signatures using partitions of 60–40 and 70–30%, and a tenfold cross-validation. To compare the results derived from the proposed quantum neural network, the same dataset is tested on support vector machine, multilayer perceptron, back propagation neural network, and Naive Bayes. The performance of the proposed algorithm is found better when compared with the above methods, and the results verify the effectiveness of the proposed algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  • Bajaj R, Chaudhury S (1997) Signature verification using multiple neural classifiers. Pattern Recognit 30(1):1–7

    Article  Google Scholar 

  • Bhattacharya I, Ghosh P, Biswas S (2013) Offline signature verification using pixel matching technique. Procedia Technol 30:970–977

    Article  Google Scholar 

  • Buryne PD, Forre R (1986) Signature verification with elastic image matching. In: International Carnahan conference on security technology Gothenburg, Sweden, August. IEEE, pp 12–14

  • Castellani M (2017) Competitive co-evolution of multi-layer perceptron classifiers. Soft Comput: 1–16. https://doi.org/10.1007/s00500-017-2587-6

  • Chan L-H, Salleh S-H, Ting C-M (2009) PCA, LDA and neural network for face identification. In: 4th IEEE conference on industrial electronics and applications, Xian, China, IEEE, pp 1256–1259

  • Dimauro G, Impedovo S, Pirlo G, Salzo A (1997) A multi-expert signature verification system for bankcheck processing. IJPRAI 11(5):827–844

    Google Scholar 

  • Ferrer M, Vargas J, Morales A, Ordonez A (2012) Robustness of offline signature verification based on gray level features. IEEE Trans Inf Forensics Secur 7(3):966–977

    Article  Google Scholar 

  • Gupta AK, Singh YP (2011) Analysis of bidirectional associative memory of neural network method in the string recognition. In: International conference on computational intelligence and communication networks (CICN), Gwalior, India, 2011. IEEE, pp 172–176

  • Han K-H, Kim J-H (2002) Quantum-inspired evolutionary algorithm for a class of combinatorial optimization. IEEE Trans Evol Comput 6(6):580–593

    Article  Google Scholar 

  • Kruthi C, Shet DC (2014) Offline signature verification using support vector machine. In: Fifth international conference on signal and image processing (ICSIP), Bangalore, India, 2014. IEEE, pp 3–8

  • Kuzuno H, Tonami S (2015) Detection of sensitive information leakage in Android applications using signature generation. Int J Space Based Situated Comput 5(1):53–62

    Article  Google Scholar 

  • Lu T-C, Yu G-R, Juang J-C (2013) Quantum-based algorithm for optimizing artificial neural networks. IEEE Trans Neural Netw Learn Syst 24(8):1266–1278

    Article  Google Scholar 

  • Nakamura S, Duolikun D, Enokido T, Takizawa M (2016) A read-write abortion protocol to prevent illegal information flow in role-based access control systems. Int J Space Based Situated Comput 6(1):43–53

    Article  Google Scholar 

  • Pansare A, Bhatia S (2012) Handwritten signature verification using neural network. Int J Appl Inf Syst 1(2):44–49

    Google Scholar 

  • Patel OP, Tiwari A (2014) Quantum inspired binary neural network algorithm. In: International conference on information technology (ICIT), Bhubaneswar, India, 2014. IEEE, pp 270–274

  • Qi Y, Hunt BR (1994) Signature verification using global and grid features. Pattern Recognit 27(12):1621–1629

    Article  Google Scholar 

  • Qiu L, Sun X, Xu J (2017) Categorical quantum cryptography for access control in cloud computing. Soft Comput: 1–8

  • Ren Y, Wang H, Du J, Ma L (2016) Code-based authentication with designated verifier. Int J Grid Util Comput 7(1):61–67

    Article  Google Scholar 

  • Sanmorino A, Yazid S (2012) A survey for handwritten signature verification. In: 2nd International conference on uncertainty reasoning and knowledge engineering (URKE), Jakarta, Indonesia, 2012. IEEE, pp 54–57

  • Sarikaya R, Hinton GE, Deoras A (2014) Application of deep belief networks for natural language understanding. IEEE/ACM Trans Audio Speech Lang Process 22(4):778–784

    Article  Google Scholar 

  • Sartakhti JS, Afrabandpey H, Saraee M (2017) Simulated annealing least squares twin support vector machine (SA-LSTSVM) for pattern classification. Soft Comput 21(15):4361–4373

    Article  Google Scholar 

  • Shanker AP, Rajagopalan A (2007) Off-line signature verification using DTW. Pattern Recognit Lett 28(12):1407–1414

    Article  Google Scholar 

  • Sun X, Tian H, Wang Y, Ren Y (2014) Toward quantum-resistant strong designated verifier signature. Int J Grid Util Comput 5(2):80–86

    Article  Google Scholar 

  • Wang T, Wang Y (2010) Pattern classification with ordered features using mrmr and neural networks. In: International conference on information, networking and automation, ICINA 2010, Kunming, China, 2010, pp 2128–2131

  • Wang Y, Ma J, Lu X, Lu D, Zhang L (2016) Efficiency optimisation signature scheme for time-critical multicast data origin authentication. Int J Grid Util Comput 7(1):1–11

    Article  Google Scholar 

  • Wilkinson TS, Pender DA, Goodman JW (1991) Use of synthetic discriminant functions for handwritten-signature verification. Appl Opt 30(23):3345–3353

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Om Prakash Patel or Mukesh Prasad.

Ethics declarations

Conflicts of interest

The authors declare that they have no conflict of interest.

Additional information

Communicated by V. Loia.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Patel, O.P., Tiwari, A., Chaudhary, R. et al. Enhanced quantum-based neural network learning and its application to signature verification. Soft Comput 23, 3067–3080 (2019). https://doi.org/10.1007/s00500-017-2954-3

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-017-2954-3

Keywords

Navigation