This document proposes a new approach to automatic offline signature verification and forgery detection using fuzzy modeling and the Takagi-Sugeno (TS) model. Signatures are divided into boxes and angle features are extracted from each box. Two TS models are derived: one with multiple rules considering each feature individually, and one with a single rule for all features. The multiple rule model performs better at identifying random, skilled, and unskilled forgeries from a large signature database.
This document proposes a new approach to automatic offline signature verification and forgery detection using fuzzy modeling and the Takagi-Sugeno (TS) model. Signatures are divided into boxes and angle features are extracted from each box. Two TS models are derived: one with multiple rules considering each feature individually, and one with a single rule for all features. The multiple rule model performs better at identifying random, skilled, and unskilled forgeries from a large signature database.
Copyright:
Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOCX, PDF, TXT or read online from Scribd
This document proposes a new approach to automatic offline signature verification and forgery detection using fuzzy modeling and the Takagi-Sugeno (TS) model. Signatures are divided into boxes and angle features are extracted from each box. Two TS models are derived: one with multiple rules considering each feature individually, and one with a single rule for all features. The multiple rule model performs better at identifying random, skilled, and unskilled forgeries from a large signature database.
Copyright:
Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOCX, PDF, TXT or read online from Scribd
Automatic autograph confirmation is a improved performance.
entrenched and an lively area of research 1. Introduction with various applications such as For centuries, handwritten autographs have bank check verification, ATM access, etc. been an integral part of consummating This paper proposes a innovative approach business transactions, contracts and to the problem of automatic off-line agreements. The distinctiveness of a signature handwritten autograph helps to prove the Verification and forgery detection. The identity of the signer, while the act of proposed approach is based on fuzzy signing a document represents the signer’s modeling that employs the Takagi–Sugeno acceptance of its terms and also codifies the (TS) model. autograph confirmation and document’s contents as being official and forgery detection are carried out using angle complete at the time it was signed. The four features extracted from box approach. the legal properties of a handwritten signature signature image is divided and resized to a are briefly stated below: fixed size window and is then thinned. The • Authentication: A handwritten signature thinned image is then partitioned into a fixed allows positive verification of the signer’s number of eight sub-images called boxes. identity. This partition is done using the horizontal • Acceptance: The signature conveys willful density approximation approach. Each sub- intent and acceptance of the terms stated in image is then further resized and again the manuscript. partitioned into twelve further sub-images • Integrity: The signature establishes the using the uniform partitioning approach. The integrity of the signed document, indicating features of consideration are normalized that it has not been altered vector angle (a) from each box. Each feature in any way. extracted from sample signatures gives rise • Non-repudiation: The accumulated effect to a fuzzy set. Since the choice of a proper of the above three factors promises such a fuzzification function is crucial for high degree of purpose that the signer verification, we have devised a new cannot deny that the person has signed. fuzzification function with structural Handwritten signatures are of different parameters, which is able to adapt to the shapes and sizes and the variations in them variations in fuzzy sets . We have also are so immense that it is difficult for a derived two TS models by considering a rule individual to differentiate a genuine for each input feature in the first formulation signature from a forged one by having a (Multiple rules) and glance at the signature. Generally signatures by considering a single rule for all input can be classified as simple, cursive or features in the second formulation. here, we graphical based on their shape. Signatures have found that TS model with are the ones where the person just writes his numerous rules is better than TS model with or her name. Cursive signatures are the ones single rule for identifying three types of that are written in a cursive way. Lastly, the forgeries; random, skilled and unskilled signatures can be classified as graphical from a large database of sample signatures when cursive signatures depict geometric in addition to verifying genuine signatures. patterns. We have also conferred an innovative Automated identification of handwritten approach and two intuitive approaches using signatures became imperative when it was difficult to distinguish genuine signatures from simulated forgeries on the basis of characteristics such as the order of strokes, visual assessment. This led to computer the velocity and other dynamic information recognition of handwritten signatures, which are not available in the off-line case. The though a bit slow, is more reliable and verification process has to wholly rely on efficient. the features that can be extracted from the In this paper, an automatic off-line trace of the static signature image only. autograph verification and falsification Although difficult to design, off-line detection system based on fuzzy modeling is signature verification is crucial for proposed. This system uses the Takagi– determining the writer identification as most Sugeno(TS)model incorporated with of the financial transactions in present times structural parameters to take account of local are still carried out on paper. Therefore, it variations in the characteristics of the becomes all the more essential to verify a signature. The system has been tested on a signature for its authenticity. The design of large database of both genuine and forged any signature verification system generally signatures. The main contributions of this requires the solution of five sub-problems: paper are: Modification of TS model with data acquisition, pre-processing, feature structural parameters, derivation of two extraction, comparison process and formulations of this model, use of box performance evaluation . Surveys of the features for signature verification forgery state of the art off-line signature verification detection by devising an innovative systems designed up to 1993 appear in Refs. approach and two intuitive approaches. The [5-7]. Another survey article [8] has organization of the paper is as follows. We summarized the approaches used for off-line present an overview of both signature signature verification from 1993 to 2000. verification and forgery detection jobs in We present here a review of a few papers in Sections 2 and 3, respectively. The proposed this field, which have not been covered in system involving these tasks is described in the survey articles. The emphasis of these Section 4. Section 5 tabulates the papers is mainly on fuzzy-based techniques experimental results on the database of Signature images. Finally, the conclusions foroff-line signature verification.An off-line are presented in Section 5. signature system consisting of signature recognition and verification is proposed in 2. Overview of autograph confirmation Ref. [9]. In this, the recognition phase is systems based on the multi-stage classifier and a Automated handwritten signature combination of global and local features verification can be divided into two classes, whereas the verification is done using fuzzy namely, on- and off-line. In the online signature verification systems the signature concepts. HMM-based approach in Ref. [10] is captured during the writing process, thus derives dynamically and automatically the making the dynamic information available author dependent parameters to set up an whereas in the off-line signature verification optimal decision rule for off-line verification systems, the signature is captured once the process. Here thecross validation principle is writing process is over and thus only a static used to derive not only the best HMM image is available. models, but also an optimal As compared to on-line signature verification systems, off-line systems are acceptation/rejection threshold for each difficult to design as many desirable author. This threshold leads to a high discrimination between the authors and 2. Unskilled forgery—The signer imitates impostors in the context of random the signature in his own style without any forgeries. Signature verification is also knowledge of the spelling and does not have any prior experience. The imitation is attempted using the Pseudo-Bacterial preceded by observing the signature closely Genetic Algorithm (PBGA) [11], which for a while. introduces a new operation called bacterial 3. Skilled forgery—Undoubtedly the most operation. Its basic idea is to try to improve difficult of all forgeries is created by parts of chromosomes. In the cases where professional impostors or persons who have there are weak inter-relations within the experience in copying the signature. For parameters encoded in one chromosome, it achieving this one could either trace or imitate the signature by hard way. should be possible to perform optimization In the 1980s, Ammar et al. [4] have worked in parts. As a test problem, the PBGA was on the detection of skilled forgeries. They applied for the discovery of fuzzy rules. The have calculated the statistics of dark pixels rules are units and used them to identify changes in the global flow of the writing. The later work of Ammar [25] is based on reference patterns, 3. Overview of forgery detection systems namely the horizontal and vertical Automatic examination of questioned positions of the signature image. The signatures did not come into being until the projections of thequestioned signature and advent of computers in the 1960s. As the reference are compared using Euclidean computer systems became more powerful distance. Guo et al. [14] have presented an and more affordable, designing an automatic algorithm for the detection of skilled forgery detection system became an active forgeries based on a local correspondence research subject. Most of the work in off- between a questioned signature and a model line forgery detection, however, has been on obtained a priori. Writer-dependent random or simple forgeries and less on properties are measured at the sub-stroke skilled or simulated forgeries [21-25]. level and a cost function is trained for each Before looking into the landmark writer. Forged samples of a genuine contributions in the area of forgery signature are not readily available as it is detection, we first enumerate the types of difficult to imitate the various styles of forgeries. signatures by amateurs for producing the 3.1. Types of forgeries unskilled forgeries and by professional The forgeries involved in handwritten impostors for producing the skilled signatures have been categorized based on forgeries. Keeping this point in mind and their characteristic features [6]. We have considering the real-world scenario, we have also attempted to classify the various kinds trained our system with only genuine of forgeries into the following types: signatures, i.e., none of the forgeries were 1. Random forgery—The signer uses the used for training the system. Most of the name of the victim in his own style to create signature verification systems trained with a forgery known as the simple forgery or both genuine and forged signatures was random forgery. This forgery accounts for subject to errors. For example, the automatic the majority of the forgery cases although off-line signature verification of Pender [15] they are very easy to detect even by the has a false acceptance rate (FAR) of 100% naked eye [13]. when trained with only genuine signatures. This means that it could not distinguish even forverifying the genuine signatures and a single forgery from genuine signatures detecting forgeries. We now briefly explain when the system is not trained with the various stages in the signature the samples of forged signatures. verification system. 4. The proposed system 4.2. Pre-processing The proposed system includes both Pre-processing of scanned signature verification and forgery detection signatures/signature images is necessary parts. The difference between the two before feature extraction. In this system, all parts is that verification is based on inherent the signature images are first resized to a characteristics of a signer whereas the fixed window of size (120 x 60 pixels), then detection is based on specification of binarized and thinned using the modified a limit, which exceeds the inherent variation SPTA algorithm [2]. Features are then in the genuine signatures of a signer. extracted from this pre-processed signature Different categories of forgery arise image. depending on what limit of variation we 4.3. Feature extraction allow over the inherent variation. The The pre-processed image is then partitioned various phases of the verification and into eight portions using the equal horizontal detection are briefly discussed in the density method. In this method, the following. binarized image is scanned horizontally 4.1. Data acquisition from left to right and then from right to left The signatures were handwritten on a white and the total number of dark pixels is sheet of paper, using a black pen. The obtained over the entire image. The pixels signature images were then scanned are clustered into eight regions such that at a resolution of 200 dpi and approximately equal number of dark pixels resampled/resized by 50% using falls in each region. This process is a B-Spline filter in Irfan View. Irfan View is illustrated in Fig. 4a and explained in the a very fast, small, compact and innovative following. Here, the total number of points FREEWARE graphic viewer for Windows (dark pixels) is 48. If we partition these 9x/ME/NT/2000/XP. Some typical pixels into 4, we get 48/4 = 12 pixels signatures along with their forgeries are per partition. Since the partition is done given in Fig. 2. Some signatures were also column wise, getting exactly 12 points in extracted from bank checks as shown in each partition is quite impossible. Therefore, Fig. 3. The extraction of a signature from a we have taken approximately 12 points in bank check is in itself a very difficult task each partition using two-way scanning [16] as the check backgrounds are complex approach as described below. We scan the in nature. For this reason, we have image from left to right till we reach the considered bank checks with a uniform column where the number of points in a background and done a simple histogram particular partition is 12 or more. We then analysis to determine the global threshold repeat the same procedure while scanning that separates the signature from its the image from right to left direction. For background [17,18]. The original scanned left toright, we partition the image at column signatures are pre-processed involving numbers 1-7 (12 points), 8-11 (13 points), size normalization, binarization and thinning 12-19 (12 points) and 20-30 (11 points). For before features are extracted from each of right to left we partition the image at column them. These features constitute the numbers 30-19 (13 points), 18-11 (14 knowledge base, which is then used points), 10-7 (12 points) and 6-1 (9 points). We then take the average of two column membership function (MF) that includes two numbers in each partition as given in Table structural parameters sk and tk: 4. Each partition is now resized to a fixed -xk\ window (box of 38 x 60 pixels) size and is (2) where xk is the mean cr| is the variance thinned again. Each box is again of Mi fuzzy set. Note that the inclusion of partitioned into 4 rows x 3 columns, these parameters will help track constituting 12 boxes. In total we have 96 the variations in the handwriting of partitions for a single signature. Sincethe signatures. When sk = 1 angle distribution shows more variation than and tk = — 1, the MF is devoid of structural the distance distribution [1] as depicted in parameters and Fig. 5 we have considered only the angles in hence it is solely governed by the mean and the present work. We calculate the variance. The summation of the angles of all points in each justification for the modified MF is two- box with respect to the bottom left corner of fold: (i) Easy to the box. The summation of angles is track variations over mean and variance, and normalized with the number of pixels in the (ii) no need of box. These angles constitute the feature sophisticated learning technique. The database for a given signature. The feature numerator and denominator extraction process is illustrated in Fig. 4b. of exponential function in Eq. (2) contain a 4.4. Verification using TS model with constant structural parameters term (i.e., 1) plus a function of parameter Since the main thrust here is to establish the and the known genuineness of the signature thereby variation (i.e., either change in mean or in detecting the forgeries, we go in variance). This for fuzzy modeling of angle features. For the choice is guided by the consideration of no purpose of signature verification and role for parameters detection of forgeries, we have employed if the signatures of a person do not change. the TS model. In this, we are following the But this same concept as outlined in Ref. [19] for need not be the case for other applications. considering each feature as forming a fuzzy The strength of the rule in Eq. (1) is set over large samples. This is because the obtained as same feature exhibits variation in different samples giving rise to a fuzzy set. So, our attempt is to model the uncertainty through a fuzzy model such as the TS model. The First Formulation: Let xk be the kth feature in a fuzzy set Ak, so the Mi IF THEN fuzzy rule in TS model has the following form: Rule k : IF xk is Ak THEN yk = ck0 + ck1xk. (1) Each signature will have a rule so we have as many rules as the number of features. The fuzzy set Ak is represented by the following exponential