Academia.eduAcademia.edu

Handwritten Signature Verification

description139 papers
group2,373 followers
lightbulbAbout this topic
Handwritten Signature Verification is a biometric authentication process that analyzes and confirms the authenticity of a person's handwritten signature by comparing its features, such as shape, speed, and pressure, against a stored reference signature to determine identity and prevent forgery.
lightbulbAbout this topic
Handwritten Signature Verification is a biometric authentication process that analyzes and confirms the authenticity of a person's handwritten signature by comparing its features, such as shape, speed, and pressure, against a stored reference signature to determine identity and prevent forgery.

Key research themes

1. How can neural network architectures optimize the verification of handwritten signatures using static and dynamic feature integration?

This research area focuses on the application of artificial neural networks (ANNs) to handwritten signature verification by leveraging both static visual features and dynamic pen movement data captured via electronic devices. It addresses the challenges of intra-personal signature variation and forgery detection by modeling signatures as complex attribute functions and seeks to optimize network topology for improved verification accuracy and noise robustness.

Key finding: This study demonstrated that a neural network trained with both static features (height, slant) and dynamic features (velocity, pen tip pressure) extracted from stylus-captured signatures achieved an overall error rate as low... Read more
Key finding: Parallel to the previous work (work_id 36645439), this paper confirmed that multi-layer neural networks, leveraging an attribute-based representation integrating both static and dynamic signature features, can accurately... Read more
Key finding: This paper highlighted the effectiveness of employing machine learning classifiers such as support vector machines (SVM) and decision trees to enhance signature verification performance through optimized feature extraction.... Read more
Key finding: Addressing scalability in production environments, this research introduced a feature-based verification approach that enables matching sample signatures against up to 20 reference signatures efficiently, overcoming... Read more

2. What are the advances and challenges in offline handwritten signature verification using texture-based features and image processing techniques?

This theme explores methodologies for verifying offline signatures—those captured as scanned images without dynamic pen motion data—primarily through the extraction of texture features, edge detection, and other image processing approaches. It is concerned with developing effective feature descriptors that cope with the loss of temporal information and with improving classification accuracy despite noise, intra-personal variability, and complex script characteristics. The focus is also on achieving practical performance on large and diverse datasets, including those of non-Latin scripts.

Key finding: Utilizing texture descriptors Local Binary Patterns (LBP) and Uniform Local Binary Patterns (ULBP), this study verified off-line handwritten signatures in Indic scripts (Bangla and Hindi). Empirical results on a large dataset... Read more
Key finding: This work proposed the use of the Sobel operator for extracting gradient-based edge features from scanned offline signatures, combined with a k-Nearest Neighbor (KNN) classifier for verification. It demonstrated that the edge... Read more
Key finding: Implementing Convolutional Neural Networks (CNNs) within offline verification contexts, this paper presented an image processing-based verification framework that leverages hierarchical feature extraction from signature pixel... Read more
Key finding: This paper introduced a fuzzy logic-based system for offline signature verification implemented via hardware description language and realized on FPGA. It combined preprocessing techniques and feature comparison metrics such... Read more
Key finding: This research applied Hidden Markov Models (HMMs) to offline signature images by extracting pixel-density based features segmented horizontally, modeling the natural intra- and inter-personal variability via stochastic state... Read more

3. How do writer-dependent and cluster-specific classification strategies improve offline handwritten signature verification accuracy?

This theme investigates the tailoring of signature verification systems by exploiting writer-specific features and classifiers to enhance verification precision. It explores methods for clustering writers with similar signature characteristics and applying cluster-specific classifiers, thereby reducing intra-cluster variability and improving decision boundaries. This approach balances the computational complexity of fully writer-dependent methods with the generalizability of global models and addresses challenges inherent in offline signature verification, such as the absence of dynamic data and significant intra-personal variations.

Key finding: This paper proposed a multi-level writer-dependent approach that integrates writer-specific feature selection with k-means clustering of writers based on signature characteristics to identify cluster-specific classifiers for... Read more

All papers in Handwritten Signature Verification

The objective of this paper is to propose an offline signature verification system (OSVS) designed for writer-independent applications. The system shall differentiate between original and forged signatures. The system encompasses key... more
Recognizing handwritten text from images is a complex yet essential task in the field of computer vision, especially for document digitization and archival systems. This study introduces a hybrid handwritten text recognition system that... more
We address, in this work, a new feature generation method for two different approaches of off-line handwritten signature verification (HSV), writer-dependent and writerindependent HSV. The proposed method uses conjointly the contourlet... more
We address, in this work, a new feature generation method for two different approaches of off-line handwritten signature verification (HSV), writer-dependent and writerindependent HSV. The proposed method uses conjointly the contourlet... more
Cerebrovascular diseases such as stroke are among the most common causes of death and disability worldwide and are preventable and treatable. Early detection of strokes and their rapid intervention play an important role in reducing the... more
The Autism Spectrum Disorder (ASD) is a neurological disease, which affects the mental, social and physical state of a person. A person of any age group can be found infected by it. It is very difficult to identify, if a person is the... more
This review discusses the developments in handwriting recognition and optical character recognition (OCR) systems, with a focus on the transformative role of artificial intelligence (AI) in enhancing accuracy, precision, and scalability.... more
This study explores the distinction between Fully Connected (FC) and Dense layers in neural network-based image processing. Traditional FC layers from early deep learning models connect every neuron to all previous layer neurons, leading... more
An integral step in the development, expression, and support of my forensic opinion is researching the recognized and authoritative writings that would explain the causes of the significant characteristics observed during my forensic... more
to cation and Analysis (SIGVA 1.0), Usable With IBM-PC Compatible Machines by Maan Ammar, Mohammed Aita, Basil Younaki and Bassam Takwa at Basic and Applied ISSues in Handwriting and Drawing Research Conference. University of Western... more
Classification of traditional handwriting script and to preserve many cultures have been developed in some parts of the world, including image classification of handwriting Kaganga script. This study aims to propose a new combination... more
Background: Fluorescence Microscope is a promising analytical method for the examination of the sequence of strokes of writing inks of different colours, brands, and models in a questioned document. Aims and Objectives: In the present... more
Signature recognition is the process of verifying a writer’s identity by checking the signature against samples previously stored in the database. Several techniques such as the distance-based and statistical classifiers used for feature... more
Handwritten signatures are very useful in many applications. Such as in the field of bank-cheque processing, document authentication, ATM access, etc. Simultaneous signature verification and forgery detection are also important to avoid... more
Face recognition is a fast growing and crucial area of study due to its applicability in different life applications. Face recognition systems often face significant challenges due to poor-quality datasets, which can result from factors... more
In this paper an efficient off-line signature verification method based on an interval symbolic representation and a fuzzy similarity measure is proposed. In the feature extraction step, a set of Local Binary Pattern (LBP) based features... more
A signature verification system is of two types: Offline and Online. Its main application is in detecting fraud in banks and other organizations. Several approaches are designed till date and all approaches have their own advantages and... more
The purpose of this study was to identify and establish the movements in writing samples of patients attending cardiology clinics, in support of the hypothesis that early detection of heart related problems is possible by identifying the... more
As digital documents and signatures become more prevalent, the field of forensic document examination must adapt to detect forgeries effectively. Traditional methods, such as ink analysis and stroke pattern recognition, are often... more
In this paper, we propose a writer dependent approach for offline signature verification based on writer-specific features and cluster-specific classifiers. In this work, writer-dependency is exploited at three levels: features,... more
Authorizing handwritten signature has always been a challenge to prevent illegal transactions, especially when the forged and the original signatures are very "similar-looking" in nature. In this paper, we aim to automate forged signature... more
This monograph focuses on the precarious status of the handwritten signature as a sign of civic identity. On the one hand, a handwritten signature legally introduces the relationship of identity between the signer’s civic name and the... more
Handwriting is a neuro-muscular phenomenon and is unique in nature. The potential of hand in designing the writing involves complex mechanism of the unite movement of finger's, thumb and hand which is operated by the timed neural response... more
Numerous types of cases are encountered all over the world in respect to handwriting and signature examination. The cases of forgery, disguise and fraudulent documents are quiet common. Forgery is usually done by person other than the... more
According to the American National Science and Technology Council (NSTC), the first signature recognition system was developed in 1965. Then the research continued in 1970 focusing on the potential of geometric characteristic of a... more
Standard Hidden Markov Models (HMM) have proved to be a very useful tool for temporal sequence pattern recognition, although they present a poor discriminative power. On the contrary Neural Networks (NNs) have been recognized as powerful... more
In recent education system, project submission is crucial for college students to complete their respective studies. The understudies needed to propose their undertaking before finishing the pre-last year. One of the critical assessment... more
Fly ash is generated during the combustion of coal and rice husk ash is generated by the combustion of rice husk for energy production. Fly ash is industrial waste and rice husk ash is agricultural waste that is widely available... more
Handwritten signatures are very useful in many applications. Such as in the field of bank-cheque processing, document authentication, ATM access, etc. Simultaneous signature verification and forgery detection are also important to avoid... more
Signature verification is the widely used biometric verification method for maintaining individual privacy. It is generally used in legal documents and in financial transactions. A vast range of research has been done so far to tackle... more
Background: Since evolution handwriting is one of the most efficient acquired characteristic by any individual. It is an amalgamation of nature and nurture. Learning begins prenatally, and children are not only “ready to learn” but... more
This paper summarizes a system for recognizing isolated Urdu characters using advanced machine learning algorithms. The system analyzes visual features of Urdu characters, like strokes and curves, to train models such as CNN, SVM, ANN,... more
This paper summarizes a system for recognizing isolated Urdu characters using advanced machine learning algorithms. The system analyzes visual features of Urdu characters, like strokes and curves, to train models such as CNN, SVM, ANN,... more
In this paper, we consolidate the gist of unimodal algorithms and their performance in signature verification system. Signature is an ultimate biometrics to authenticate an individual. The signatures are used in cheques, legal... more
a number of biometric techniques have been proposed for personal identification in the past. Among the vision-based ones are face recognition, fingerprint recognition, iris scanning and retina scanning. Voice recognition or signature veri... more
A research study examining the success rate of participants in identification of their own handwriting and/or handwritten numerals. Published in SAFE Journal, The Examiner, Vol. 11, December 2023
A new approach for High Pressure Pixel Polar Distribution on Off-line Signature Verification individual. The robustness of the analyzed system for simple forgeries is tested out with Support Vector Machines models. For the sake of... more
Signature can be seen as an individual characteristic of a person which, if modeled with precision can be used for his/her validation. An automated signature verification technique saves valuable time and money. The paper is primarily... more
The most common secure personal authentication in biometrics is handwritten signature. It's widely used in many felids as banks , business transactions , and documents which are being authorized via signatures. The main challenging... more
The research reported in this thesis investigated cognitive-linguistic predictors of reading comprehension (both within and across languages) among multilingual primary school children in the Punjab region of India. The participants of... more
Handwritten signatures are very useful in many applications. Such as in the field of bank-cheque processing, document authentication, ATM access, etc. Simultaneous signature verification and forgery detection are also important to avoid... more
Quack 6. Janowski, Rettungsgewißheit. 7. Dies gilt insbesondere für oKairo CG 25211, wo der von Daressy, Ostraca, 42 in Drucktypen gebotene Text viele Fragen aufwirft und ohne substantielle Moditikationen oft gar nicht übersetzbar ist,... more
The existence of identity theft in society has become a major concern due to the effects it causes to those that are affected by it, more especially in the financial sector. Thus this thesis establishes the existence of identity theft... more
Handwriting recognition using OCR (Optical Character Recognition) is a transformative technology that is rapidly changing the way we interact with handwritten documents. OCR technology has traditionally been used for scanning printed... more
This paper presents a simple method for the design of Chaotic Linear Feedback Shift Register (CLFSR) system. The proposed method is based on a combination of two known systems. The first is called Linear Feedback Shift Register (LFSR)... more
The sole objective of a forensic document examiner is to assist in discovering and proving the facts in any investigation or legal inquiry involving genuineness of a document or any part thereof. A document is usually questioned because... more
The sole objective of a forensic document examiner is to assist in discovering and proving the facts in any investigation or legal inquiry involving genuineness of a document or any part thereof. A document is usually questioned because... more
Outcome-based education is a pedagogical process which focuses on the achievement of certain specified results. Outcome-based teaching and learning (OBTL), therefore, is concerned with curriculum design and ensuring that the contents,... more
Download research papers for free!