You are on page 1of 6

Abstract the TS model with multiple rules for

Automatic autograph confirmation is a improved performance.


entrenched and an lively area of research 1. Introduction
with various applications such as For centuries, handwritten autographs have
bank check verification, ATM access, etc. been an integral part of consummating
This paper proposes a innovative approach business transactions, contracts and
to the problem of automatic off-line agreements. The distinctiveness of a
signature handwritten autograph helps to prove the
Verification and forgery detection. The identity of the signer, while the act of
proposed approach is based on fuzzy signing a document represents the signer’s
modeling that employs the Takagi–Sugeno acceptance of its terms and also codifies the
(TS) model. autograph confirmation and document’s contents as being official and
forgery detection are carried out using angle complete at the time it was signed. The four
features extracted from box approach. the legal properties of a handwritten signature
signature image is divided and resized to a are briefly stated below:
fixed size window and is then thinned. The • Authentication: A handwritten signature
thinned image is then partitioned into a fixed allows positive verification of the signer’s
number of eight sub-images called boxes. identity.
This partition is done using the horizontal • Acceptance: The signature conveys willful
density approximation approach. Each sub- intent and acceptance of the terms stated in
image is then further resized and again the manuscript.
partitioned into twelve further sub-images • Integrity: The signature establishes the
using the uniform partitioning approach. The integrity of the signed document, indicating
features of consideration are normalized that it has not been altered
vector angle (a) from each box. Each feature in any way.
extracted from sample signatures gives rise • Non-repudiation: The accumulated effect
to a fuzzy set. Since the choice of a proper of the above three factors promises such a
fuzzification function is crucial for high degree of purpose that the signer
verification, we have devised a new cannot deny that the person has signed.
fuzzification function with structural Handwritten signatures are of different
parameters, which is able to adapt to the shapes and sizes and the variations in them
variations in fuzzy sets . We have also are so immense that it is difficult for a
derived two TS models by considering a rule individual to differentiate a genuine
for each input feature in the first formulation signature from a forged one by having a
(Multiple rules) and glance at the signature. Generally signatures
by considering a single rule for all input can be classified as simple, cursive or
features in the second formulation. here, we graphical based on their shape. Signatures
have found that TS model with are the ones where the person just writes his
numerous rules is better than TS model with or her name. Cursive signatures are the ones
single rule for identifying three types of that are written in a cursive way. Lastly, the
forgeries; random, skilled and unskilled signatures can be classified as graphical
from a large database of sample signatures when cursive signatures depict geometric
in addition to verifying genuine signatures. patterns.
We have also conferred an innovative Automated identification of handwritten
approach and two intuitive approaches using signatures became imperative when it was
difficult to distinguish genuine signatures
from simulated forgeries on the basis of characteristics such as the order of strokes,
visual assessment. This led to computer the velocity and other dynamic information
recognition of handwritten signatures, which are not available in the off-line case. The
though a bit slow, is more reliable and verification process has to wholly rely on
efficient. the features that can be extracted from the
In this paper, an automatic off-line trace of the static signature image only.
autograph verification and falsification Although difficult to design, off-line
detection system based on fuzzy modeling is signature verification is crucial for
proposed. This system uses the Takagi– determining the writer identification as most
Sugeno(TS)model incorporated with of the financial transactions in present times
structural parameters to take account of local are still carried out on paper. Therefore, it
variations in the characteristics of the becomes all the more essential to verify a
signature. The system has been tested on a signature for its authenticity. The design of
large database of both genuine and forged any signature verification system generally
signatures. The main contributions of this requires the solution of five sub-problems:
paper are: Modification of TS model with data acquisition, pre-processing, feature
structural parameters, derivation of two extraction, comparison process and
formulations of this model, use of box performance evaluation . Surveys of the
features for signature verification forgery state of the art off-line signature verification
detection by devising an innovative systems designed up to 1993 appear in Refs.
approach and two intuitive approaches. The [5-7]. Another survey article [8] has
organization of the paper is as follows. We summarized the approaches used for off-line
present an overview of both signature signature verification from 1993 to 2000.
verification and forgery detection jobs in We present here a review of a few papers in
Sections 2 and 3, respectively. The proposed this field, which have not been covered in
system involving these tasks is described in the survey articles. The emphasis of these
Section 4. Section 5 tabulates the
papers is mainly on fuzzy-based techniques
experimental results on the database of
Signature images. Finally, the conclusions foroff-line signature verification.An off-line
are presented in Section 5. signature system consisting of signature
recognition and verification is proposed in
2. Overview of autograph confirmation Ref. [9]. In this, the recognition phase is
systems based on the multi-stage classifier and a
Automated handwritten signature combination of global and local features
verification can be divided into two classes,
whereas the verification is done using fuzzy
namely, on- and off-line. In the online
signature verification systems the signature concepts. HMM-based approach in Ref. [10]
is captured during the writing process, thus derives dynamically and automatically the
making the dynamic information available author dependent parameters to set up an
whereas in the off-line signature verification optimal decision rule for off-line verification
systems, the signature is captured once the process. Here thecross validation principle is
writing process is over and thus only a static used to derive not only the best HMM
image is available.
models, but also an optimal
As compared to on-line signature
verification systems, off-line systems are acceptation/rejection threshold for each
difficult to design as many desirable author. This threshold leads to a high
discrimination between the authors and 2. Unskilled forgery—The signer imitates
impostors in the context of random the signature in his own style without any
forgeries. Signature verification is also knowledge of the spelling and does not have
any prior experience. The imitation is
attempted using the Pseudo-Bacterial
preceded by observing the signature closely
Genetic Algorithm (PBGA) [11], which for a while.
introduces a new operation called bacterial 3. Skilled forgery—Undoubtedly the most
operation. Its basic idea is to try to improve difficult of all forgeries is created by
parts of chromosomes. In the cases where professional impostors or persons who have
there are weak inter-relations within the experience in copying the signature. For
parameters encoded in one chromosome, it achieving this one could either trace or
imitate the signature by hard way.
should be possible to perform optimization
In the 1980s, Ammar et al. [4] have worked
in parts. As a test problem, the PBGA was on the detection of skilled forgeries. They
applied for the discovery of fuzzy rules. The have calculated the statistics of dark pixels
rules are units and used them to identify changes in the
global flow of the writing. The later work of
Ammar [25] is based on reference patterns,
3. Overview of forgery detection systems namely the horizontal and vertical
Automatic examination of questioned positions of the signature image. The
signatures did not come into being until the projections of thequestioned signature and
advent of computers in the 1960s. As the reference are compared using Euclidean
computer systems became more powerful distance. Guo et al. [14] have presented an
and more affordable, designing an automatic algorithm for the detection of skilled
forgery detection system became an active forgeries based on a local correspondence
research subject. Most of the work in off- between a questioned signature and a model
line forgery detection, however, has been on obtained a priori. Writer-dependent
random or simple forgeries and less on properties are measured at the sub-stroke
skilled or simulated forgeries [21-25]. level and a cost function is trained for each
Before looking into the landmark writer. Forged samples of a genuine
contributions in the area of forgery signature are not readily available as it is
detection, we first enumerate the types of difficult to imitate the various styles of
forgeries. signatures by amateurs for producing the
3.1. Types of forgeries unskilled forgeries and by professional
The forgeries involved in handwritten impostors for producing the skilled
signatures have been categorized based on forgeries. Keeping this point in mind and
their characteristic features [6]. We have considering the real-world scenario, we have
also attempted to classify the various kinds trained our system with only genuine
of forgeries into the following types: signatures, i.e., none of the forgeries were
1. Random forgery—The signer uses the used for training the system. Most of the
name of the victim in his own style to create signature verification systems trained with
a forgery known as the simple forgery or both genuine and forged signatures was
random forgery. This forgery accounts for subject to errors. For example, the automatic
the majority of the forgery cases although off-line signature verification of Pender [15]
they are very easy to detect even by the has a false acceptance rate (FAR) of 100%
naked eye [13]. when trained with only genuine signatures.
This means that it could not distinguish even forverifying the genuine signatures and
a single forgery from genuine signatures detecting forgeries. We now briefly explain
when the system is not trained with the various stages in the signature
the samples of forged signatures. verification system.
4. The proposed system 4.2. Pre-processing
The proposed system includes both Pre-processing of scanned
signature verification and forgery detection signatures/signature images is necessary
parts. The difference between the two before feature extraction. In this system, all
parts is that verification is based on inherent the signature images are first resized to a
characteristics of a signer whereas the fixed window of size (120 x 60 pixels), then
detection is based on specification of binarized and thinned using the modified
a limit, which exceeds the inherent variation SPTA algorithm [2]. Features are then
in the genuine signatures of a signer. extracted from this pre-processed signature
Different categories of forgery arise image.
depending on what limit of variation we 4.3. Feature extraction
allow over the inherent variation. The The pre-processed image is then partitioned
various phases of the verification and into eight portions using the equal horizontal
detection are briefly discussed in the density method. In this method, the
following. binarized image is scanned horizontally
4.1. Data acquisition from left to right and then from right to left
The signatures were handwritten on a white and the total number of dark pixels is
sheet of paper, using a black pen. The obtained over the entire image. The pixels
signature images were then scanned are clustered into eight regions such that
at a resolution of 200 dpi and approximately equal number of dark pixels
resampled/resized by 50% using falls in each region. This process is
a B-Spline filter in Irfan View. Irfan View is illustrated in Fig. 4a and explained in the
a very fast, small, compact and innovative following. Here, the total number of points
FREEWARE graphic viewer for Windows (dark pixels) is 48. If we partition these
9x/ME/NT/2000/XP. Some typical pixels into 4, we get 48/4 = 12 pixels
signatures along with their forgeries are per partition. Since the partition is done
given in Fig. 2. Some signatures were also column wise, getting exactly 12 points in
extracted from bank checks as shown in each partition is quite impossible. Therefore,
Fig. 3. The extraction of a signature from a we have taken approximately 12 points in
bank check is in itself a very difficult task each partition using two-way scanning
[16] as the check backgrounds are complex approach as described below. We scan the
in nature. For this reason, we have image from left to right till we reach the
considered bank checks with a uniform column where the number of points in a
background and done a simple histogram particular partition is 12 or more. We then
analysis to determine the global threshold repeat the same procedure while scanning
that separates the signature from its the image from right to left direction. For
background [17,18]. The original scanned left toright, we partition the image at column
signatures are pre-processed involving numbers 1-7 (12 points), 8-11 (13 points),
size normalization, binarization and thinning 12-19 (12 points) and 20-30 (11 points). For
before features are extracted from each of right to left we partition the image at column
them. These features constitute the numbers 30-19 (13 points), 18-11 (14
knowledge base, which is then used points), 10-7 (12 points) and 6-1 (9 points).
We then take the average of two column membership function (MF) that includes two
numbers in each partition as given in Table structural parameters sk and tk:
4. Each partition is now resized to a fixed -xk\
window (box of 38 x 60 pixels) size and is (2) where xk is the mean cr| is the variance
thinned again. Each box is again of Mi fuzzy set. Note that the inclusion of
partitioned into 4 rows x 3 columns, these parameters will help track
constituting 12 boxes. In total we have 96 the variations in the handwriting of
partitions for a single signature. Sincethe signatures. When sk = 1
angle distribution shows more variation than and tk = — 1, the MF is devoid of structural
the distance distribution [1] as depicted in parameters and
Fig. 5 we have considered only the angles in hence it is solely governed by the mean and
the present work. We calculate the variance. The
summation of the angles of all points in each justification for the modified MF is two-
box with respect to the bottom left corner of fold: (i) Easy to
the box. The summation of angles is track variations over mean and variance, and
normalized with the number of pixels in the (ii) no need of
box. These angles constitute the feature sophisticated learning technique. The
database for a given signature. The feature numerator and denominator
extraction process is illustrated in Fig. 4b. of exponential function in Eq. (2) contain a
4.4. Verification using TS model with constant
structural parameters term (i.e., 1) plus a function of parameter
Since the main thrust here is to establish the and the known
genuineness of the signature thereby variation (i.e., either change in mean or in
detecting the forgeries, we go in variance). This
for fuzzy modeling of angle features. For the choice is guided by the consideration of no
purpose of signature verification and role for parameters
detection of forgeries, we have employed if the signatures of a person do not change.
the TS model. In this, we are following the But this
same concept as outlined in Ref. [19] for need not be the case for other applications.
considering each feature as forming a fuzzy The strength of the rule in Eq. (1) is
set over large samples. This is because the obtained as
same feature exhibits variation in different
samples giving rise to a fuzzy set. So, our
attempt is to model the uncertainty through a
fuzzy model such as the TS model.
The First Formulation: Let xk be the kth
feature in a fuzzy
set Ak, so the Mi IF THEN fuzzy rule in TS
model has the
following form:
Rule k : IF xk is Ak
THEN yk = ck0 + ck1xk. (1)
Each signature will have a rule so we have
as many rules as
the number of features. The fuzzy set Ak is
represented by the following exponential

You might also like