179 research outputs found

    Biometric signature verification system based on freeman chain code and k-nearest neighbor

    Get PDF
    Signature is one of human biometrics that may change due to some factors, for example age, mood and environment, which means two signatures from a person cannot perfectly matching each other. A Signature Verification System (SVS) is a solution for such situation. The system can be decomposed into three stages: data acquisition and preprocessing, feature extraction and verification. This paper presents techniques for SVS that uses Freeman chain code (FCC) as data representation. Before extracting the features, the raw images will undergo preprocessing stage; binarization, noise removal, cropping and thinning. In the first part of feature extraction stage, the FCC was extracted by using boundary-based style on the largest contiguous part of the signature images. The extracted FCC was divided into four, eight or sixteen equal parts. In the second part of feature extraction, six global features were calculated against split image to test the feature efficiency. Finally, verification utilized Euclidean distance to measured and matched in k-Nearest Neighbors. MCYT bimodal database was used in every stage in the system. Based on the experimental results, the lowest error rate for FRR and FAR were 6.67 % and 12.44 % with AER 9.85 % which is better in term of performance compared to other works using that same database

    Freeman chain code as representation in offline signature verification system

    Get PDF
    Over recent years, there has been an explosive growth of interest in the pattern recognition. For example, handwritten signature is one of human biometric that can be used in many areas in terms of access control and security. However, handwritten signature is not a uniform characteristic such as fingerprint, iris or vein. It may change to several factors; mood, environment and age. Signature Verification System (SVS) is a part of pattern recognition that can be a solution for such situation. The system can be decomposed into three stages: data acquisition and preprocessing, feature extraction and verification. This paper presents techniques for SVS that uses Freeman chain code (FCC) as data representation. In the first part of feature extraction stage, the FCC was extracted by using boundary-based style on the largest contiguous part of the signature images. The extracted FCC was divided into four, eight or sixteen equal parts. In the second part of feature extraction, six global features were calculated. Finally, verification utilized k-Nearest Neighbour (k-NN) to test the performance. MCYT bimodal database was used in every stage in the system. Based on our systems, the best result achieved was False Rejection Rate (FRR) 14.67%, False Acceptance Rate (FAR) 15.83% and Equal Error Rate (EER) 0.43% with shortest computation, 7.53 seconds and 47 numbers of features

    Optimized jk-nearest neighbor based online signature verification and evaluation of the main parameters

    Get PDF
    In this paper, we propose an enhanced jk-nearest neighbor (jk-NN) classifier for online signature verification. After studying the algorithm's main parameters, we use four separate databases to present and evaluate each algorithm parameter. The results show that the proposed method can increase the verification accuracy by 0.73-10% compared to a traditional one class k-NN classifier. The algorithm has achieved reasonable accuracy for different databases, a 3.93% error rate when using the SVC2004 database, 2.6% for MCYT-100 database, 1.75% for the SigComp'11 database, and 6% for the SigComp'15 database.The proposed algorithm uses specifically chosen parameters and a procedure to pick the optimal value for K using only the signer's reference signatures, to build a practical verification system for real-life scenarios where only these signatures are available. By applying the proposed algorithm, the average error achieved was 8% for SVC2004, 3.26% for MCYT-100, 13% for SigComp'15, and 2.22% for SigComp'11

    Securing the Biometric through ECG using Machine Learning Techniques

    Get PDF
    In the current era, biometrics is widely used for maintaining the security. To extract the information from the biomedical signals, biomedical signal processing is needed. One of the significant tools used for the diagnostic is electrocardiogram (ECG). The main reason behind this is the certain uniqueness in the ECG signals of the individual.  In this paper, the focus will be on distinguishing the individual on the basis of ECG signals using feature extraction approaches and the machine learning algorithms. Other than preprocessing approach, the discrete cosine transform is applied to perform the extraction. The classification between the signals of the individuals is carried out using the Support Vector Machine and K-Nearest Neighbor machine learning techniques.  The classification accuracy achieved through SVM is 87% and K-NN has achieved a classification accuracy of 96.6% with k=3. The work has shown how machine learning can be used to classify the ECG signal

    Component-connected Feature for Signature Identification

    Get PDF
    A signature is the oldest security techniques to verify the identification of a person. This is due to every person has a different signature and each signature has the characteristic physiological and behavior. There are two kinds of signature such as offline and online signatures used to verify someone identity. Offline signatures were used in this study because offline signature does not have dynamic features such as an online signature. This study proposed an identification system of offline signature by using k-NN based on the features that were stored in the database. The proposed identification system consists of preprocessing, feature extraction and verification stages. We collected the data samples from 10 persons. Each person wrote 10 signatures. Total data was 100 signatures. The first stage used in this study was preprocessing such as noise removal, binarization, skeleton, and cropping.  The second stage was feature extraction. Feature extraction had some important information such as height-width ratio, the ratio of the density of signatures, edge distance ratio, the ratio of the number and proximity of the column, and the number of connected components in the signature. That information was stored in a separate database. We separated 10 signatures of each person into 6 signatures as data sample and 4 signature as test data. We verified 40 signatures of test data from 10 persons using k-NN. It is shown that from 40 signatures used in our test data, 28 signatures were correctly identified and 12 signatures belong to others

    Writer Identification of Arabic Handwritten Documents

    Get PDF

    Writer Identification of Arabic Handwritten Documents

    Get PDF

    Biometrics

    Get PDF
    Biometrics uses methods for unique recognition of humans based upon one or more intrinsic physical or behavioral traits. In computer science, particularly, biometrics is used as a form of identity access management and access control. It is also used to identify individuals in groups that are under surveillance. The book consists of 13 chapters, each focusing on a certain aspect of the problem. The book chapters are divided into three sections: physical biometrics, behavioral biometrics and medical biometrics. The key objective of the book is to provide comprehensive reference and text on human authentication and people identity verification from both physiological, behavioural and other points of view. It aims to publish new insights into current innovations in computer systems and technology for biometrics development and its applications. The book was reviewed by the editor Dr. Jucheng Yang, and many of the guest editors, such as Dr. Girija Chetty, Dr. Norman Poh, Dr. Loris Nanni, Dr. Jianjiang Feng, Dr. Dongsun Park, Dr. Sook Yoon and so on, who also made a significant contribution to the book
    corecore