Personal Verification Using Off-line Signature with Tree-based Features
The signature verification is one of the major and general purposes frequently used approach for person’s verification among all the other existing and known biometric-based verification methods. This brought the attention to the development of an automatic signature verification system. In this paper, an off-line signature verification and recognition system based on tree and grid by adopting a feature extraction novel approach such as pixels in tree, eccentricity, and center was used. The problem of using a trained dataset in order to perform the verification was overcome by using only one genuine and test signature at the run time. Decision of the result which was based on authenticity and governed by the maximum correct feature favor, acceptance, and rejection is based on its majority. The usefulness of the proposed approach was acknowledged by the use of experimental results.
KeywordsOff-line signature verification Tree-based feature Grid-based feature
- 1.Battista Biggio, Zahid Akhtar, Giorgio Fumera, Gian Luca Marcialis, and Fabio Roli, 2012, “Security Evaluation of Biometric Authentication Systems Under Real Spoofing Attacks”, IEEE Biometrics Compendium, IET Biometrics Volume: 1, Issue: 1.Google Scholar
- 2.Andrea Ceccarelli, Leonardo Montecchi, Francesco Brancati, Paolo Lollini, Angelo Marguglio, and Andrea Bondavalli, 2015, “Continuous and Transparent User Identity Verification for Secure Internet Services”, IEEE Transactions On Dependable And Secure Computing, Vol. 12, No. 3, DOI 10.1109/TDSC.2013.2297709.
- 3.Karan Khare, Surbhi Rautji and Deepak Gaur, 2013, “Behavioural Biometrics and Cognitive Security Authentication Comparison Study”, Advanced Computing: An International Journal (ACIJ), Vol. 4, No. 6, pp. 15–24.Google Scholar
- 4.Israa M. Alsaadi, 2015, “Physiological Biometric Authentication Systems, Advantages, Disadvantages And Future Development: A Review”, International Journal Of Scientific & Technology Research Vol. 4, Issue 12, pp. 285–289.Google Scholar
- 5.Dakshina Ranjan Kisku, Phalguni Gupta and Jamuna Kanta Sing, IJSIA 2010, “Offline Signature Identification by Fusion of Multiple Classifiers using Statistical Learning Theory,” Computer Vision and Pattern Recognition.Google Scholar
- 6.Madasu Hanmandlu, Mohd. Hafizuddin Mohd. Yusof and Vamsi Krishna Madasu, 2005, “Offline Signature Verification and Forgery Detection using Fuzzy Modeling,” The Journal of the Pattern Recognition Society, Vol. 38, pp. 341–356.Google Scholar
- 7.Vahid Kiani, Reza Pourreza, Hamid Reza Pourezza, 2010, “Offline Signature Verification Using Local Radon Transform and Support Vector Machines,” International Journal of Image Processing (IJIP), Vol. 3, No. 5, pp. 184–194.Google Scholar
- 8.Debasish Jena, Banshidhar Majhi, Saroj kumar Panigrahy and Sanjay Kumar Jena, ICCI 2008, “Improved Offline Signature Verification Scheme Using Feature Point Extraction Method,” Proc. 7th IEEE Int. Conference on Cognitive Informatics, pp. 475–480.Google Scholar
- 9.Mishra, Prabit Kumar and Sahoo, Mukti Ranjan, 2009, “Offline Signature Verification Scheme”.Google Scholar
- 10.Priyanka Chaurasia, 2009, Offline Signature Verification using High Pressure Regions, US Patent 7, 599,528, Oct 6, 2009.Google Scholar
- 11.Meenakshi K. Kalera, Sargur Srihari and Aihua Xu, 2004, “Offline Signature Verification and Identification using Distance Statistics,” International Journal of Pattern Recognition and Artificial Intelligence, Vol. 18, No. 7, pp. 1339–1360.Google Scholar
- 12.Banshider Majhi, Y Santhosh Reddy, D Prasanna Babu, 2006, “Novel Features for Offline Signature Verification”, International Journal of Computers, Communications & Control, Vol. I, No. 1, pp. 17–24.Google Scholar
- 13.Donato Impedovo, Giuseppe Pirlo, 2008, “Automatic Signature Verification: The State of the Art,” IEEE Transactions on Systems, Man and Cybernetics-Part C: Applications and Reviews, Vol. 38, No. 5, pp. 609–635.Google Scholar