Skip to the main content

Original scientific paper

https://doi.org/10.7906/indecs.20.6.7

Genuine Forgery Signature Detection using Radon Transform and K-Nearest Neighbour

Kiran Kumar ; Department of ECE, Vidyavardhaka College of Engineering Mysuru, India
Bharath Kurki N. ; Department of ECE, DSATM Bangalore, India
Gururaj Harinahalli Lokesh ; Manipal Institute of Technology Bengaluru, Manipal Academy of Higher Education Manipal, India
Francesco Flammini ; University of Applied Sciences and Arts of Southern Switzerland Manno, Switzerland
Sunil Kumar D.S ; Department of Computer Science, Mangalore University Mangalore, India


Full text: english pdf 484 Kb

page 763-774

downloads: 145

cite

Download JATS file


Abstract

Authentication is very much essential in managing security. In modern times, it is one in all priorities. With the advent of technology, dialogue with machines becomes automatic. As a result, the need for authentication for a variety of security purposes is rapidly increasing. For this reason, biometrics-based certification is gaining dramatic momentum. The proposed method describes an off-line Genuine/ Forgery signature classification system using radon transform and K-Nearest Neighbour classifier. Every signature features are extracted by radon transform and they are aligned to get the statistic information of his signature. To align the two signatures, the algorithm used is Extreme Points Warping. Many forged and genuine signatures are selected in K-Nearest Neighbour classifier training. By aligning the test signature with each and every reference signatures of the user, verification of test signature is done. Then the signature can be found whether it is genuine or forgery. A K-Nearest Neighbour is used for classification for the different datasets. The result determines how the proposed procedure is exceeds the current state-of-the-art technology. Approximately, the proposed system's performance is 90 % in signature verification system.

Keywords

signature; recognition; k-nearest neighbour; radon transform

Hrčak ID:

289412

URI

https://hrcak.srce.hr/289412

Publication date:

30.12.2022.

Visits: 530 *




INTRODUCTION

Authenticating with signatures individually can be considered as major attributes of a person. Like other authentication methods such as smart cards, fingerprints, PINs and passwords, signatures cannot be forgotten, lost or stolen. That is why the there is a huge demand for signature verification. The major challenge is to come up with more accurate automated signature verification systems. This handwritten signature verification can be done online and offline automatically. In online signature verification system many electronic devices like digital pens, digitizers and tablets are used. You need a still image to see your signature offline. Verification of the signatures in offline is the method used most commonly as it requires no additional equipment to record the signature which can be done even without a signer. If a person tries to copy the other person’s signature without his knowledge, it is considered as a forgery. This forgery can be divided as three different categories: random, trick and simple, depending on the knowledge of the signature done by a forger. Forger creates its own dash pattern because it has information about the signer's name when it doesn't know the exact signature. It is an example for a simple forgery. Suppose counterfeiter attempts to counterfeit without knowing the name or signature, this is a random counterfeit. Over the last two decades, the field of signature verification has created many innovations on behalf of many other researchers. In the local histogram feature approach1-7, polar and Cartesian coordinates are used to separate the signature into different zones. In each zone, Histogram features like Directional Gradient (HOG) Histogram and Local Binary Pattern (LBP) Histogram has to be calculated. In LBP, there is variant called Block wise Binary Pattern (BBP)8 which is generally used to separate a signature into many 3×3 blocks. Another method, known as writer independent9 values properties such as shape and texture of a signature. This method extracts black and candidate pixels. The distance moment10 based on the structural information and point-to-point temporal records of envelope by finding out the point-to-point distance. A novel autonomous system for signature detection depending on architecture of neural network has been proposed by Shikha et al.11. Self Organizing Map (SOM) is the learning algorithm used, which classifies patterns based on a Multilayer Perceptron (MLP). Shekaret et al.12 proposed a morphologically structured spectrum constructed in the form of a lattice. The signature is equally divided into 8 grids of same size using this method. A different method was proposed by Bhattacharya et al.13 called as Pixel Matching Technology (PMT). The reference signature is mapped with each pixel in the template of a signature in this approach. SVM based verification is done in a system which verifies the offline signature proposed by Sheth and Kruty14. Yasmine et. al15 proposed a new one class SVM based system which verifies the signature online. The template of an original signature done by a signer is used in this method.

RELATED WORKS AND MOTIVATION

Signatures are the most socially and legally recognized means of personal authentication and, therefore, a modality that faces high levels of attack. Signature verification plays an important role in identifying forged signatures. Biometric application. Biometrics measures an individual's unique physical or behavioral characteristics with the goal of recognizing or authenticating an identity. This motivates to develop an high accurancy based offline signature recognition system. The performance of a validation model depends on the set of features used in the model. Much work has been done in connection with offline signature verification, which uses different types of feature sets to work with the model. In most works, the features are topology, geometric information, gradients, structural information, and concave base16,17. Ferrer et al.18 proposed a method using the set of geometric features given in the description of the signature envelope and stroke distribution. After that, hidden Markov models, support vector machines and Euclido removal classifiers were used for review processes. Zulnarnain et al. In recent works, a signature inspection method was introduced based on geometric features such as triangular pages, angles and ranges derived after triangulation of the signature image. For classification, they used Euclidean classifier and voting based classifiers. Some plants are reported for gray value distribution20,21, pixel orientation22-24, pixel environment25 and curvature functions26. Graph metric functions are also available in the literature27. In28, the authors proposed a form function called a string torque and analyzed the upper and lower signatures. Support vector machine (SVM) was used with code characteristics for signature confirmation. One model has been used in combination with several features to improve the classification accuracy of the model. For example, in29 with directional characteristics, exercise information and gray value distribution were used. The authors used 16 serious features obtained from the distribution of pixels in the diluted Signature valley. Combinations of different types of characteristics express feature extraction unit. Of course, to use a model for 16 time applications, momentary information calculations are mathematically considered with 16 timing functions. In the recent work30 proposed by Serdouk et al., Directional distribution is not the only feature extraction policy. Here, combining the longest barrel function in the direction combined with the gradient of the local binary pattern (GLBP), and the longest run strengthens the horizontal, vertical direction, and two main diagonal directions considered Combined to do. So you used a combination of topology and color history features. As a phase feature, the longest pixel is used. Gradation information is extracted with neighboring local binary patterns (GLBP). GLBP calculations on each pixel of the signature image can cost cost. Serdouk et al. We proposed a verification system based on the artificial immune recognition system. A template-based validation scheme is also presented31. The method they provide is based on using a grid template to encode the geometry of the signature. Also note that many prior art works use an ensemble of multiple classifiers to achieve the best results. Oi et al.32 Recent studies have presented a framework based on discrete Radon transforms (DRTs), principal component analysis (PCA), and stochastic neural networks (PNNs) to identify counterfeiting from actual signatures. rice field. However, in an application, the designed hardware device needs to run fast for classification and decision making. Table 1 outlines the existing methods and their classification methods. Zois Elias et al.33 addresses a feature extraction scheme based on the detection of first-order transitions between asymmetric lattice arrangements of simple pixel structures. Experiments were conducted with a group of decisions, accompanied by a selection of reinforcement features, using only unlinked or blinded training and test datasets, all derived from four widely used signature database. Sharif et al.34 used the geometric features and the features generated from the study of the local pixel distribution. They used genetic algorithm-based feature selection and eventually SVM for the classification work. Batool et al.35 presented a way to generate features by determining the pixel distribution in the signature area. I used SVM for classification. The ratio of training and test variables is shown in the experiment as 70:30. Ajij et al.36 introduces a new feature set based on the quasi-straightness of boundary pixel execution for signature verification. The basic combination of direction codes extracts the quasi-segments from the signature boundary pixels and retrieves the feature sets from the various quasi-line classes. Several methods or detection models have been developed, but the results of existing methods confirm that there is still room for improvement in terms of accuracy and robustness. In addition, you have the opportunity to propose a powerful feature set that works in conjunction with less complex classifiers for better performance. It would be even more beneficial if the feature set could be easily extracted from the signature image. In this article, we have proposed a new feature set from the Extreme Points Warping that defines the signature stroke. The following sections detail the proposed methods and test results. The contributions of this article are described further in the text. • This method introduces a new way to select features from signatures. This combination of forms a new signing feature. • In our approach, the average of the extracted features passes through a classifier for verification. • However, by demonstrating the experiment based on the actual data set, the robustness and efficiency of the proposed method.

Table 1. Type of the classifiers used existing methods.
MethodFeaturesClassifiers
16Uniform Local Binary Patterns (ULBP)Nearest Neighbor
33Long range correlation (LRC)SVM
34Local pixel distributionGA, SVM
35GLCM, geometric featuresSVM
36Quasi-straight line segmentsSVM

PROPOSED TECHNIQUE

The block diagram of proposed forgery signature recognition system is shown in Figure 1. System consists of different blocks which will explain below. The system that we have introduced is divided into three phases: (a) Enrolment of signatures (Creating model) (ii) Training the signatures (iii) Signature Verification. The given system’s block diagram is described in Figure 1.

Figure 1. K-Nearest Neighbour (K-NN) based signature classification system.
indecs-20-763-g1.gif
In the first phase, to find the parameters which characterize the variance of the signatures which are used as a reference, we use a set of signatures for reference. The extracted parameters along with the set of reference signatures are stored in the system database with unique user identification. During training phase we select few signatures which are genuine and forged to train K-NN classifier. Further in third phase, the claimed person’s signatures which are used for references are compared with the test signature. If the similarity measure is greater than or equal to the threshold value given in classifier, then the authentication of person is done and it will be denied otherwise.

DRT & EXTRACTING THE FEATURE

Discrete Radon Transform is a representation of a shadow or a projection at an angle of original image in each column of a matrix. It is expressed as follows:

R_j=∑_(i=1)W_ij I_i,...j = 1, 2, ..., Nφ·Nθ. (1)

where Rj is jth beam pixels overall intensity, Ψ denotes overall image pixels, wij is the donation of ith pixel to jth beam sum. Furthermore, Ii is ith Pixel’s intensity, Nφ is Beams/angle which are non-overlapping and Nθ is total number of angles. The pen-strokes and background of a signature image has to be mapped to one and zero respectively to extract the global features. Then the speckle noise is removed using median filtering. Finally the signature image’s DRT is found.

ALIGNMENT OF SIGNATURE

To compare the signatures of different lengths Extreme Points Warping Algorithm is used. Rather than warping the whole signal, only few selected (Peaks & Valleys) important points will be warped in Extreme Points Warping (EPW) algorithm. The minimum total distance between the two vectors will be found to get the best straight alignment between the two vectors. We need to align the observation sequence to make sure that every observation sequence is a signature image’s rotation invariant representation. Two observation sequences optimal alignment is obtained in linear way. Then the observation sequences are shifted iteratively with respect to one another. Calculation of the distances between corresponding observations is done in any iteration. When the average distance is minimum between the consecutive observations, then the alignment will be optimal. The average distance between the optimally aligned vectors can be found to get the distance between two signatures.

ENROLLMENT

Five signatures are used for each user in our system during enrolment to this system. The distance between each of the pair is found by pair-wise aligning these signatures, with the help of EPW algorithm. We calculated the following reference set statistics using the alignment scores obtained: a. Average distance to the farthest signature, (dmax) b. Average distance to the nearest signature, (dmin)

TRAINING

In training data set we have two: five- signatures, where one of them is genuine signatures and remaining is forgery. These signatures will be used to get the threshold value which helps us to separate the genuine and forgery classes. The reference signatures are different from these signatures. Initially we need to compare each training signature with signatures in the reference set which is claimed to belong. We use EPW algorithm for that which gives a 2-D feature vector (pmin, pmax). These values are normalized by taking the averages of the corresponding reference set (dmin, dmax) the feature set distribution is found by using equation (2) and (3).

Nmax = dmax/pmax, (2)

Nmin = dmin/pmin. (3)

With the normalized features, forgery and genuine samples in the training set are separated well due to the distribution of these normalized data. We can see that the distance measured of the vectors is normalized by the averages of corresponding reference set. By this we can remove the user dependent thresholds need which is generally used while deciding whether the given signature is similar enough to that of the reference set.

CLASSIFICATION

The Trained classifier is tested using the data set which consists of five genuine and five forgery signatures. The signatures used during the enrolment and training phases are different from these signatures. To find whether the test signature is forgery or genuine, first we need to compare the signature with all the reference signatures which belongs to the ID claimed using EPW algorithm. The distance values (pmin, pmax) which are normalized by the averages of reference set who claimed it (dmin, dmax), Finally trained classifier is used to classify whether the signature is forgery or genuine by using the normalized values.

EXPERIMENTAL RESULTS

Proposed system uses 30 genuine signature patterns and 20 Skill forged signature patterns for each user. In addition, we've added five real-world signature samples from a random user to avoid getting fake signatures from the skill. Similarly, in the testing phase, another 10 original signature samples from the same user, 5 skill counterfeit signature samples from that user, and 5 original signature samples from user are combined and tested. The signature verification efficiency is evaluated by two parameters: (i) false acceptance rate (FAR) and (ii) false rejection rate (FRR). Recognition rate is one more parameter to consider when assessing classifier performance. Details and examples are given in Figures 2-7.

Type I error or False Rejection Rate (F R R) FRR=(No.of genuine signatures identified as forged)/(No.of genuine signature samples) ×100 %. (4)

Type II error or False Acceptance Rate (F A R): FAR=(No.of forged signatures identified as genuine)/(No.of forged signature samples) ×100 %. (5)

Recognition rate: The classifier accuracy is identified by this parameter, which is given by: Recognition rate=(No.of correctly indentified signature samples)/(No.of signature samples) ×100 %. (6)

Figure 2. GUI for Genuine/Forgery signature detection system.
indecs-20-763-g2.png
Figure 3. Reading the input forgery/genuine signature.
indecs-20-763-g3.png
Figure 4. Feature extraction of input signature using Radon transform and KNN.
indecs-20-763-g4.png
Figure 5. Feature extraction of database signatures.
indecs-20-763-g5.png
Figure 6. Results of Fake signature detection using radon transform and KNN.
indecs-20-763-g6.png
Figure 7. Group-wise error rates FRR and FAR are plotted with respect out datasets.
indecs-20-763-g7.png

Table 2. Results of proposed KNN based signature verification system.
UsersNo. of signatureFRRFARAccuracy
User1505/50 = 10 %3/50 = 6 %45/50 = 90 %
User 2503/50 = 6 %4/50 = 8 %47/50 = 94 %
User 3504/50 = 8 %2/50 = 4 %46/50 = 92 %
Table 3. Comparison of proposed method with existing methods.
MethodsFRR ( %)FAR ( %)
1614,2110,48
2209,6413,16
3413,1611,38
1815,5016,39
2114,6610,01
3615,047,85
Proposed Work86

Good results obtained for many individuals (50 signers), but poor results for some one reduces the overall average accuracy. We have showed the error rate for each group of our data set in Figure 6. In which each group has 50 signers. In this study, we measured the performance of the proposed system with characteristics of each signature after the KNN was implemented in the signature to represent it in the validation system as shown in Table 2. In addition, the study estimated 93,1 % recognition accuracy using 100 users with 5 000 signature samples. It is also clear that a small number of signature features during the training phase will result in less valid results, higher FARs and FRRs, and less accuracy. It is also noted that the work has achieved a comparable and sometimes better performance than other systems as shown in table 3. From Figure 8 it is clearly indicated that proposed method having less error rate (FAR, FRR) compare to various existing methods.

Figure 8. Graphical view of comparative analysis with existing works.
indecs-20-763-g8.png
In addition, the results obtained in this experiment show that not only the components (as a function) obtained from the KNN analysis widely adopted in previous studies, but also other items can be used for online and offline signature verification.

CONCLUSIONS

In this offline signature classification, two class pattern recognition is used to approach the problem which uses the K-NN classifier. The robust and stable method, DRT is used to extract the global features of the signature. DRT establishes simulated evolution of time evolution from one vector feature with the next and using EPW it helps us to develop a signature model. The validation results confirm the better effectiveness of the proposed method, as it achieved an accuracy of 93,1 % with 100 users and 5 000 signatures consists of real and artificial signatures.

References

1 

Bastys A.; Kranauskas J.; Krüger V.: Iris recognition by fusing different representations of multi-scale Taylor expansion. Computer Vision and Image Understanding, 115(6), 804-816 2011.http://dx.doi.org/10.1016/j.cviu.2011.02.004

2 

Bastys A.; Kranauskas J.; Masiulis R.: Iris recognition by local extremum points of multiscale Taylor expansion. Pattern recognition, 42(9), 1869-1877 2009.http://dx.doi.org/10.1016/j.patcog.2008.12.004

3 

Bhattacharya I.; Ghosh P.; Biswas S.: Offline signature verification using pixel matching technique. Procedia Technology, 10, 970-977 2013.http://dx.doi.org/10.1016/j.protcy.2013.12.445

4 

Chen S.; Srihari S.: Use of exterior contours and shape features in off-line signature verification. 8th International Conference on Document Analysis and Recognition, pp.1280-1284 2005.

5 

Guerbai Y.; Chibani Y.; Hadjadji B.: The effective use of the one-class SVM classifier for handwritten signature verification based on writer-independent parameters. Pattern Recognition, 48(1), 103-113 2015.http://dx.doi.org/10.1016/j.patcog.2014.07.016

6 

Hsu C.W.; Chang C.C.; Lin C.J.: A practical guide to support vector classification. Department of Computer Science National Taiwan University, 2003.

7 

Kalera M.K.; Srihari S.; Xu A.: Offline signature verification and identification using distance statistics. International Journal of Pattern Recognition and Artificial Intelligence, 18(7), 1339-1360 2004.http://dx.doi.org/10.1142/S0218001404003630

8 

Kruthi C.; Shet D. C.: Offline signature verification using support vector machine. In: 5th International Conference on Signal and Image Processing. IEEE, pp. 3-8, 2014.

9 

Kumar M.M.; Puhan N.B.: Inter-point envelope based distance moments for offline signature verification. In: International Conference on Signal Processing and Communications. IEEE, pp. 1-6, 2014.

10 

Kumar R., et al.: A writer-independent off-line signature verification system based on signature morphology. In: Proceedings of the First International Conference on Intelligent Interactive Technologies and Multimedia, pp.261-265 2010.

11 

Kumar R.; Sharma J.D.; Chanda B.: Writer-independent off-line signature verification using surroundedness feature. Pattern Recognition letters, 33(3), 301-308 2012.

12 

Shekar B.H.; Bharathi R.K.: Eigen-signature: A robust and an efficient offline signature verification algorithm. In: International Conference on Recent Trends in Information Technology. IEEE, pp.134-138, 2011.

13 

Shekar B.H.; Bharathi, R.K.,, Pilar B.: Local morphological pattern spectrum based approach for off-line signature verification. In: International Conference on Pattern Recognition and Machine Intelligence, Springer Berlin & Heidelberg, pp.335-342 2013.

14 

Shekar B.H.; Pilar B.; Sunil K.D.S.: Blockwise binary pattern: a robust and an efficient approach for offline signature verification. The International Archives of Photogrammetry. Remote Sensing and Spatial Information Sciences, XLII(2/W4), 227-232 2017.http://dx.doi.org/10.5194/isprs-archives-XLII-2-W4-227-2017

15 

Shikha P.; Shailja S.: Neural network based offline signature recognition and verification system. Research Journal of Engineering Sciences, 2(2), 11-15 2013.

16 

Loka H.; Zois E.N.; Economou G.: Long range correlation of preceded pixels’ relations and application to off-line signature verification. IET Biometrics, 6(2), 70-78 2017.http://dx.doi.org/10.1049/iet-bmt.2016.0046

17 

Pham T.A.; Le H.; Do N.: Offline handwritten signature verification using local and global features. Annals of Mathematics and Artificial Intelligence, 75(1-2), 231-247 2015.http://dx.doi.org/10.1007/s10472-014-9427-5

18 

Ferrer M.A.; Alonso J.B.; Travieso C.M.: Offline geometric parameters for automatic signature verification using fixed-point arithmetic. IEEE Transactions on Pattern Analysis and Machine Intelligence, 27(6), 993-997 2005.http://dx.doi.org/10.1109/TPAMI.2005.125

19 

Zulkarnain Z., et al.: Triangular geometric feature for offline signature verification. Internarional Journal of Computer and Information Engineering, 10(3), 485-488, 2016.

20 

Jiang N., et al.: Gradient local binary patterns for human detection. In: International symposium on circuits and systems, pp. 978-981, 2013.

21 

Vargas J.F., et al.: Off-line signature verification based on high pressure polar distribution. International conference on frontiers in handwriting recognition, pp. 373-378, 2008.

22 

Bharathi R.K.; Shekar B.H.: Off-line signature verification based on chain code histogram and support vector machine. In: International conference on advances in computing, pp. 2063-2068, 2013.

23 

Lv H., et al.: Off-line chinese signature verification based on support vector machines. Pattern Recognition Letters, 26(15), 2390-2399 2005.http://dx.doi.org/10.1016/j.patrec.2005.04.013

24 

Nguyen V., et al.: Performance analysis of the gradient feature and the modified direction feature for off-line signature verification. In: International conference on frontiers in handwriting recognition. ICFHR, pp. 303-307 2010.

25 

Kumar R.; Sharma J.; Chanda B.: Writer-independent offline signature verification using surroundedness feature. Pattern Recognition Letters, 33(3), 301-308 2012.http://dx.doi.org/10.1016/j.patrec.2011.10.009

26 

Guerbai Y.; Chibani Y.; Hadjadji B.: The effective use of the one-class SVM classifier for handwritten signature verification based on writer-independent parameters. Pattern Recognition, 48(1), 103-113 2015.http://dx.doi.org/10.1016/j.patcog.2014.07.016

27 

Bertolini D., et al.: Reducing forgeries in writer-independent off-line signature verification through ensemble of classifiers. Pattern Recognition, 43(1), 387-396 2010.http://dx.doi.org/10.1016/j.patcog.2009.05.009

28 

Kumar M.M.; Puhan N.B.: Off-line signature verification: upper and lower envelope shape analysis using chord moments. IET Biometrics, 3(4), 347-354 2014.http://dx.doi.org/10.1049/iet-bmt.2014.0024

29 

Pal S., et al.: Performance of an off-line signature verification method based on texture features on a large indic-script signature dataset. In: 12th IAPR Workshop on Document Analysis Systems. IEEE, pp. 72-77, 2016.http://dx.doi.org/10.1109/DAS.2016.48

30 

Serdouk Y.; Nemmour H.; Chibani Y.: New off-line handwritten signature verification method based on artificial immune recognition system. Expert Systems with Applications, 51, 186-194 2016.http://dx.doi.org/10.1016/j.eswa.2016.01.001

31 

Zois E.N.; Alewijnse L.; Economou G.: Offline signature verification and quality characterization using poset-oriented grid features. Pattern Recognition, 54, 162-177, 2016.http://dx.doi.org/10.1016/j.patcog.2016.01.009

32 

Ooi S.Y., et al.: Image-based handwritten signature verification using hybrid methods of discrete radon transform, principal component analysis and probabilistic neural network. Applied Soft Computing, 40, 274-282 2016.http://dx.doi.org/10.1016/j.asoc.2015.11.039

33 

Zois E.N.; Alexandridis A.; Economou. G.: Writer independent offline signature verification based on asymmetric pixel relations and unrelated training-testing datasets. Expert Systems with Application, 125, 14-32 2019.http://dx.doi.org/10.1016/j.eswa.2019.01.058

34 

Muhammad S.K., et al.: A framework for offline signature verification system: best features selection approach. Pattern Recognition Letters, 139, 50-59 2020.http://dx.doi.org/10.1016/j.patrec.2018.01.021

35 

Batool F.E., et al.: Offline signature verification system: a novel technique of fusion of GLCM and geometric features using SVM. Multimedia Tools and Applications, 2020.http://dx.doi.org/10.1007/s11042-020-08851-4

36 

Ajij M.D., et al.: Off-line signature verification using elementary combinations of directional codes from boundary pixels.. Neural Computing and Applications, 2021.http://dx.doi.org/10.1007/s00521-021-05854-6


This display is generated from NISO JATS XML with jats-html.xsl. The XSLT engine is libxslt.