Professional Documents
Culture Documents
.! ;
37
! 3* +
-
5
*
= +
&
> <!<
; *! .$"67 47 8
9 !<
r-d-depart@taminn.org
:;
#?
8@<!( A &@'( .2 =B . .C
# + -> +"% D*! E* 2 % #< ( 7 &'( .% 47 ;!F !"# !$
=<! +77 A 2
&'( #9 % .
+ G%! 5!"7% % A , &H G % ;% I,! !J<
#< %
4" . #,
&@'( @ ="@B M@ @N
O .7 ;%!* LE1 % > !"# .!$ !<
1 * 7 .% =<! .%
+"7% .$ A O/ % P
P!"# <!<
!"# .
# Q ? +<* GR S# H% !7
.@
# A .!/ ;!$
& S# . A .! + O .
> !7 +#!"#
S#@ @ .@$"< J A D@ @ .@ +@/U< V!"7 .! .7 ;
0 =< % J !< - A%!T
A @ %!@*
@* .!@ . @E9 .O@/
* P@ .D*! W A , EB =4 P!< - % , !"6/ ; P
@ % .7 ;
"B!/ ;!$ X>!? ;A
,6 +/U< V!"7 Y"< J %!* 569 !Z .!
@N
@ 2 % +W> <M Y +"H <M Y * 7 ;
;%["7 1 . #, ">7 +"H . #, A D J
.7 "B * \
J 8,W
:
^]
.7 ;% "O/ )7 =<
? %+ +E SB % P_9, =<! 8 !T A +#< 2 A ;
8" .
A E* &'( .2 =B
L6* P!"# A 2 P!"# &R E1 A .7 4
=< % "[$ X% A
$ ;%["7 ),% 41 2 `, $1 ;A!
4@7 ;!@F @!"# !$@ "7 =< % .
+ !"# % $2 `, !"# +"1 = P!"# <!<
P!"# *
Y@ @ %
@4" .@ #,@ 8<!( A &'( .2 =B .C
# + -> +"% D*! E* !"# !$ < % .7 &'( .%
.
S"
! = &
< &'( * 69 % =< .
+ G%! 5!"7% % A , &H G % ;% I,!
"@7 =@< % @7 ;%!@* LE1 % > !"# .!$ !<
1 * 7 .% =<! +77 =<! .%
A +#<
!
A
!$ %!* ;/2 E1 2 A .7 ;
GR &'( .2 =B 7
* P%! % aE" . ;% % +[" !
@ O@ .
@+@ &@'( )" !"6 .A7 =< &'( .
$J ; # .A7 =< P
!$ .! A % < ;
b +"
@$1 +@ ... @!"# <!<
@ P!"# .
# ? +<* GR S# H% !7 &'( H% ="B M N
A@ %!@B
P2 +#!"# +"7% .$ A O/ % 1 =< A .
+ A &'( )!"
*
]].
+
1
Learning Vector Quantization
142 www.emunconf.ir
@ > !@ % D@ @ H% ="B M #E !7 ="B M $
.$"67 A ;%["7 E
@$2 % @* +<$@ ^] :
@+@ Y6 "7% % +E* !N % $ =< * 7 ;
0
A =< % .6 .$
* .%
.$ % .%!/+ GR
& $2 % * +<$ ^c %!/+ GR
& &E
=@< % %!@/ G@R d@%' & @
* hf A ]f]g 7 "6 4 % ;
0 .%A%!T+ +
A 2 1 57
@ @ @ A +@/U< ]] V!"@7 !"#3 A ;%["@7 D 6% .7 ;
2 7
9 =<!"$ % H% =< *
< 7% H% %i]
k<@" % 7 ;
0
& +
A .! 2 !J<% + .
% GR &E "6
.$@ l @ .!@J<% 8@ % .
@
*+@ @*
@+ "B!/ * N
< .! * +<$ A !"$ +,*! =< * 7 ;
2 2
@<$ % .@7 ;
0 D &''4 A ;%["7 .A7 ;%T * .8 7 ;
+7!
&
.57 ">%!T
& B!( % !"# A ;%["7 D !J<% +< %
:7 !<A & =< ">7
@ n @! _@, m X@ % .7 ;
_ .! =< % "B * .4 Y"67 +E* ">7 c X %
^m X % .7 ;
_ !< - . ! A%!T XT .! GAM % ]^m X % .7 ;
;%% op * GR S9! !< - A%!T
% "B * J .$ J f X % .7 "B!/ !H _ % !< - A +/U< V!"7 n ! _, D c
6< !J<
#< k<" =< 7 ;
;%2 ;
"B!/ * . .! +!R k<" q X % D $" % .7 "B!/ !H +7!
.
;
Y"67 +E* .4 ^c
r
.4 %2 7
.! =<!
.7 ;
;%["7
< .! J ;! !< - A%!T .$ A =< %
@ .!@ @"B @* .4 !J< ] S# .Y< ;%!* .
Y6 J !< - A%!T P.% 6H 7 !2 Y"67
: 6H 7 A .4 =< S# =< 8W .
+ =< % )
& +
A
.
@+@ P7
9 LH < & .% . ;%% =< %!* ?3#< .% D < A !< - . ;%% ="B!/ 2 [s * : .% .]
+6<! & !2 Y"67 * % + ;%% Y"67 .% ! 3* .! Y$B SH LH < % . ;%% * 7 =< ! t!B =< %
.
*+ ;!>b ;%% A
=@ %!@/+@ & !< - % aE" %!* < D< \O9 N
!< - . +A%!T XT
" E9! =< % :!< - A%!T .c
@"B!/ @* @ @ ;A
@ 1 !< - %!* * !< - % S 4H +<7
N
+<$"< J E9! =< % (
PS#@ P) @( S@,H A @ .@ +/U<
> ;%% op .
4 . 6H % * +[E" .$"< J A ;%["7 u37 .% +
E9! `H % *
4 E9! ;
L*! +/U< %! < % +/U< =< A < ! * .% + V!"7 W < EB
.
+ ;%"7!B 7 J
%! =< A < ! 2 EB %%!/+ 6< ;
a<!4 S,H A . J %! .% A ;
"B!/ %!
" 6H =< % : J .m
@
<!B S@* .
+ J A "7% G
* 8E4" .% %! * % + "B!/ Y- <$ % EB =< 1 u37
<2+ 7
.7 ;
.A7 ;%T +"H <M +,- #, < I7 J
1
Principle Component Analysis
2
Null Component Analysis
3
Dynamic Time Warping
4
Hidden Markov Model
5
Verification
www.emunconf.ir 143
!< - A%!T ^m
!< @- .@ +@/U< V!"@7 !< @- . !@ ;
GR &E n ! `H % * .
+ X =<!"$ A 6H =<
.$@A%!T GR ;%2 ;
2 % u<! &
B<% .% 6H % #
< A uT .%
"[/ c X % * ( .
+
& @ @ @*
@ ;
@ ;!@>b +,- @!B Y"67 =< % !<-) P
+ A +/U< V!"7 N
!< -
@W
d@ Y*! D 1 6H =< % (.7 G 7! 6 !<- .! ;%% .A7 ;!>b l =<
"6 $J Y*! A +6<!
.%%!/+ V!"7 2 . +/U< ;
;%% !< - % 2 &!x
(7);
!"EB !< - P(|?)% D< !< - ^cS#
!< - A%!T ) L! =< Y<2 7
!< - % !N % .)/2
< D<
!< - %2 7
A
4 :^ĞŐŵĞŶƚĂƚŝŽŶ
@ .! ;
}T .$"< J .!1 V"9
A uT d % F S% *
"% 1 .Y% GR +9 =< % IB
A @+@ =@< % @7 ;
@ ;%["@7 "
0 A .)/ %2 @7
.!@ .%
@ % 1
A uT A $2 %!*
1
1
Gaussian Filter
2
Region Of Interest
144 www.emunconf.ir
@* L@! =< 7 ;
"B!/ ;!$ =< A +E "
0 .M H% E %!* ;%["7 +E* < z+E "
0
!" "72
9 < A XJ<6 S6#T < = &!x !/ S6#T ! .! 9 ! % % + Y6 6H f !< - !
"
Y6 !"#? * +9 9 < " !J<% %%!/+ !# ~ B &E S6#T ! .! ;% %%!/+ Y6 6H f % > 9 =<
@H% .
+ .)/ 9 =< .Y
*+ 7 S * 9 =<!"/D Y<O/+ L6?! < 9 ! u37 .%!*
@<
@ D@ S6#T 2
!"* !/ ![
S6#T 2
!" "72
9 A &[ D !/ "
0 % *
"%
+@<%% !< @- < "
0 R"
*+ N9' * W .
1 !< - A D
A uT Y + L! =< .B!/
>
(mS#).
;
+# d
A uT
[7 d ()!N % + 2 % * 7
, .! T SH . $1 , !< - ^f S#
@W
< @#9 % ) Y@<% ;![9
S-" S# < S-"
A uT < % ;%["7
A uT .! +- i A !/ f S# %
;%["@7 +@- A =<!@
.10 @6 J
< Y A * Y<%
1
A uT q + S-" < % ;%["7 +- f A !/ (6
.
+ o !< - .A! A %! =< * .Y<% ;![9 <
A uT < 2 % * % +
% @ S@ %2 @7
A
@4 .%2 @7
!< - % S + ;
;%% $1 % .!/ 8" &E GR A
4
.% "B!/ * L9 +
A % +/U< =<
+ =< . +/U< V!"7 !< -
+/U< V!"7 c^m
S# n ! . +/U< A +/U< V!"7 GJ
% =< % 7 =< +/U< V!"7 !N % %2 7
A
4
.7 ;
"B!/ ;!$ D ) ( +/U< A 2 ;! ", * 7 ;
;%["7
1
Local Thresholding
2
6-Connected
www.emunconf.ir 145
z
. @E9 .O/
* A N
=< .! Y
* ;%["7 , *!9 $1 .
$J .! + A
< , S %2 7
A
4 :S#
@* .% GR .%! &E A! . !
< .O/
* A S,H .Y< "B!/ ;!$ +- ^ A D . E9 .O/
* % .7 ;
;%["7
@ +@ q S# % .%
+! !F D +<$ R" % % + A%!T
!"4<!7 _ S6#T m A ;%["7 *
%+ R"
=@< %!@* 569 !Z .! u37 .Y
*+ .O/
* A! . ;%% $1 % .%! A
4 .
* N9' .%! =< R"
;%["@7 @$2 Sp[ A ;%% % > A ;%["7 .1 L! =< Y
*+ ;%["7
* .
4 ;%% ,6
* ! \'"> A X>!? ,6
*
.
> 569 !Z X>!? ,6 D ;
2 7
* %!* Y >
1
Chain Code
2
SubSampeling
3
Signature
146 www.emunconf.ir
z J ^f
<2+ 7
J . .% EB
" * L! =< 27 "B!/ & +,- . #, I7 J =< %
.
+ "7% G
* 8E4" EB 1 =< * % + "B!/ Y- u37
:6<
<!B ]^f
.! .
<2+ 7
;
;%% S,H A . J %! .% %! EB %2 7
6<
<!B
;%% op M % * W
.7 ;
;%% X< !<A S# % +"H <M < ">7 .7 ;
"B!/ !N % +"H <M +,- #, < N
=<
:7
@6 @J @ % =@< S% =
, A 2 .% %! ;
! ! .$A * % + _ 8
.!/%< H
@ =@< .
@
@ > !"#<%D .% %! Y A ! =< ;
! ! .! 2 .!/ * H =< .!1 A
4 =<!
.%% %!*
!@Z .%! !/ W
%
>
;
! .! .!" u YA % !s .% % %! =< !/
4 = ! =< * 7 +
4
u@ ! ;
! ! Y
* Y"67 % &!* .% %! < !/ `H % .
> !"* X
;
! u %%!/ #, % =< A
*O .% %! , 6 *
> +< .% A "7% < !J O/ =<
? A
4 ! =< !J<% &, .% + ;
! .!"
@ > .
"7% %H #, A ! aE" . . n ! .% .%! %!* % L! =<
.
"6
.
%+ GR 6< A ;%["7 * =< G * .%
.!/ Y-
<!B c^f
=@<
@+@ +H@ 6H =< % * +< "# + %!/+ GR 6< &E GR =9 % .!/ Y-
<!B
"[/ M % * W
% @> . "7% .! % Y %H
" %
.
"7% +[E" .$! ;%% 7 =# !1 ! % #
< 1 * 7
A ;%["@7
@ @
@" A "@7% !@ .! +1!> Y
* +9!( !s #, <
< N
=< .! Y
* =4 +- G
!@2 ">7 iS# % * .% + ;%["7 4 #, A N
=< .! .
# Y/%!7 +1!> %2 7
% $
T <M % ! =<
?
% @,$ .!@ @( =@ .
!J % > ! .! 7 =# .!<% ? +1!> * Y%+
" % L! =<
*+ N9'
1
Pattern Recognition
2
Kohnen Learning Rule
3
Supervised
4
Learning Vector Quantization
www.emunconf.ir 147
2 @R" @* @B!/
@
> !@H A 2 % D 2 <6 .$!
, A 2 ;
! ! IB ! #
< .1 R
< % A 2
.%
> z;%! . ! !"*
A 2
<!B %
!7
1
Dead Neurons
2
Local Optimum
148 www.emunconf.ir
80
70
5<5<4
60
8<6<4
50
10<7<4
40
8<5<5<4
30
9<5<5<5
20
15<8<8<4
10
10<4<4<4
0
ر100 ر200 ر1000 ر2000
aE" ! O/ % 4 D< \O9 A ;%["7 P #, .! ; 2 7 k<" ^]g S#
100
90 10 : ون#
80
20 : ون#
70
60 35 : ون#
50
40 42 ون#
30
20
56 ون#
10 63 ون#
0
aE" ! O/ %
4 D< \O9 A ;%["7 P #, .! ;
2 7
k<" ^]] S#
',H
*+ N9' * W 7 ;
2 $2 L*! < !<- . +/U< +>! A ;%["7 A ;
2 7
k<" !<A . % % W
+@7! % #, A ;%["7 + .7 ;
+<$ R" % % ,$ _ +/U< =< L*! A ;%["7 7 ;%% op Y
.
"B!/ !H
:`
[1 M.Savov, G.Gluhchev, Automated Signature Detection from Hand Movement, “International
Conference on Computer Systems and Technologies – CompSysTech” 2004
www.emunconf.ir 149
[2] A.Zimmer, L.Luan Ling, A Hybrid On/Off Line Handwritten Signature Verification System,
“Proceedings of the Seventh International Conference on Document Analysis and Recognition
(ICDAR 2003)” 0-7695-1960-1/03 17.00 © 2003 IEEE
[3] J. Coetzer B.M. Herbst J.A. du Preez, Off-line signature verification: a comparison between
human andmachine performance, “Springer’s transaction on computer vision and pattern
recognition” sum 2006, 5pgs
[4] B. D. Zhang K. Wang, Online signature verification based on null component analysis and
principal component analysis” Pattern Anal Applic (2006)” 8: 345–356DOI 10.1007/s10044-005-
0016-4 Springer-Verlag London Limited
[5] B. Li, D. Zhang, K. Wang, Improved Critical Point Correspondence for On-line Signature
Verification, “International Journal of Information Technology” Vol.12 No.7 2006
[6] J. Soldek,V. Shmerko, Phil Phillips, G. Kukharev, W. Rogers , S.Yanushkevich, IMAGE
ANALYSIS AND PATTERN RECOGNITION IN BIOMETRIC TECHNOLOGIES,” Proceedings
International Conference on the Biometrics”: Fraud Prevention, Enchanced Service, LasVegas,
Nevada, USA, 2003, pp. 270-286
[7] H. E. S. Said1, G. S. Peake1, T. N. Tan2 and K. D. Baker1, Writer Identification from Non-
uniformly Skewed Handwriting Images, British Machine Vision Conference 2005, pp 478-488.
[8] O. Rohl´ık, handwritten text analysis Thesis, March 2003, UNIVERSITY OF WEST
BOHEMIA IN PILSEN
[9] A. ABED, V. EGLIN, F. LEBOURGEOIS, H. EMPTOZ, Frequencies Decomposition and
Partial Similarities Retrieval for Ancient Handwriting Documents Compression, “ACI MADONNE -
ACI Masse de données of the pluridisciplinary thematic network”, RTP-Doc, 2006.
[10] S. E. Umbaugh, Computer Imaging Digital Image Analysis and Processing, CRC Press, 2005
]mic P4
YE ;J% &" P!"# !$ P+'1 !,* +E !"*%[11]
150 www.emunconf.ir