Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

(592.06KB)
This is an Open Access publication published under CSC-OpenAccess Policy.

PUBLICATIONS BY COUNTRIES

Top researchers from over 74 countries worldwide have trusted us because of quality publications.

United States of America
United Kingdom
Canada
Australia
Malaysia
China
Japan
Saudi Arabia
Egypt
India
Freeman Chain Code (FCC) Representation in Signature Fraud Detection Based On Nearest Neighbour and Artificial Neural Network (ANN) Classifiers
Aini Najwa Azmi, Dewi Nasien
Pages - 434 - 454     |    Revised - 10-11-2014     |    Published - 10-12-2014
Volume - 8   Issue - 6    |    Publication Date - November / December 2014  Table of Contents
MORE INFORMATION
KEYWORDS
Offline Signature Verification System (SVS), Pre-processing, Thinned Binary Image (TBI), Feature Extraction, Freeman Chain Code (FCC), Nearest Neighbour, Artificial Neural Network (ANN).
ABSTRACT
This paper presents a signature verification system that used Freeman Chain Code (FCC) as directional feature and data representation. There are 47 features were extracted from the signature images from six global features. Before extracting the features, the raw images were undergoing pre-processing stages which were binarization, noise removal by using media filter, cropping and thinning to produce Thinned Binary Image (TBI). Euclidean distance is measured and matched between nearest neighbours to find the result. MCYT-SignatureOff-75 database was used. Based on our experiment, the lowest FRR achieved is 6.67% and lowest FAR is 12.44% with only 1.12 second computational time from nearest neighbour classifier. The results are compared with Artificial Neural Network (ANN) classifier.
1 Google Scholar 
2 CiteSeerX 
3 refSeek 
4 Scribd 
5 SlideShare 
6 PdfSR 
1 Al-Mayyan, Waheeda, Own, Hala S., & Zedan, Hussein. (2011). Rough set approach to online signature identification. Digital Signal Processing, 21 (3), 477-485. doi: http://dx.doi.org/10.1016/j.dsp.2011.01.007.
2 Ravi, J., Hosamani, S., & Raja, K. B. (2012, 26-28 July 2012). Off-line Signature Identification Based on DWT and Spatial Domain Features. Paper presented at the Computing Communication & Networking Technologies (ICCCNT), 2012 Third International Conference on Computing Communication & Networking Technologies.
3 Ortega-Garcia, J., et al. (2003).: MCYT baseline corpus: A bimodal biometric database. IEEE Proceedings Vision, Image and Signal Processing 150(6).
4 Ubul, K., Adler, A., Abliz, G., Yasheng, M., & Hamdulla, A. (2012, 2-5 July 2012). Off-line Uyghur signature recognition based on modified grid information features. Paper presented at the Information Science, Signal Processing and their Applications (ISSPA), 2012 11th International Conference on Information Science, Signal Processing and their Applications.
5 Zhang, Zhaoxiang, Wang, Kaiyue, & Wang, Yunhong. (2011). A Survey of On-line Signature Verification. In Z. Sun, J. Lai, X. Chen & T. Tan (Eds.), Biometric Recognition (Vol. 7098, pp. 141-149): Springer Berlin Heidelberg.
6 Zhan, Enqi, Guo, Jinxu, Zheng, Jianbin, Ma, Chan, & Wang, Linjuan. (2009, 15-16 May 2009). On-line Handwritten Signature Verification Based on Two Levels Back Propagation Neural Network. Paper presented at the Intelligent Ubiquitous Computing and Education, 2009 International Symposium on Intelligent Ubiquitous Computing and Education.
7 Tomar, Minal, & Singh, Pratibha. (2011). An Intelligent Network for Offline Signature Verification Using Chain Code. In N. Meghanathan, B. Kaushik & D. Nagamalai (Eds.), Advanced Computing (Vol. 133, pp. 10-22): Springer Berlin Heidelberg.
8 Cheng-Yaw, Low, Beng-Jin Teoh, A., & Connie, Tee. (2008, 3-5 June 2008). Support Vector Machines (SVM)-based biometric watermarking for offline handwritten signature. Paper presented at the Industrial Electronics and Applications, 2008. ICIEA 2008. 3rd IEEE Conference on Industrial Electronics and Applications.
9 Oz, Cemil. (2005). Signature Recognition and Verification with Artificial Neural Network Using Moment Invariant Method. In J. Wang, X.-F. Liao & Z. Yi (Eds.), Advances in Neural Networks – ISNN 2005 (Vol. 3497, pp. 195-202): Springer Berlin Heidelberg.
10 Ghandali, S., & Moghaddam, M. E. (2008, 16-19 Dec. 2008). A Method for Off-line Persian Signature Identification and Verification Using DWT and Image Fusion. Paper presented at the Signal Processing and Information Technology, 2008. ISSPIT 2008. IEEE International Symposium on Signal Processing and Information Technology.
11 Porwik, P. (2007, 28-30 June 2007). The Compact Three Stages Method of the Signature Recognition. Paper presented at the Computer Information Systems and Industrial Management Applications, 2007. CISIM '07. 6th International Conference on Computer Information Systems and Industrial Management Applications.
12 Pal, S., Alireza, A., Pal, U., & Blumenstein, M. (2011, 6-8 Dec. 2011). Off-line Signature Identification Using Background and Foreground Information. Paper presented at the Digital Image Computing Techniques and Applications (DICTA), 2011 International Conference on Digital Image Computing Techniques and Applications.
13 Pal, S., Alireza, A., Pal, U., & Blumenstein, M. (2012, 4-7 Dec. 2012). Multi-script off-line signature identification. Paper presented at the Hybrid Intelligent Systems (HIS), 2012 12th International Conference on Hybrid Intelligent Systems.
14 Pal, S., Pal, U., & Blumenstein, M. (2012, 10-15 June 2012). Off-line English and Chinese signature identification using foreground and background features. Paper presented at the Neural Networks (IJCNN), The 2012 International Joint Conference on Neural Networks.
15 Pourshahabi, M. R., Sigari, M. H., & Pourreza, H. R. (2009, 4-7 Dec. 2009). Offline Handwritten Signature Identification and Verification Using Contourlet Transform. Paper presented at the Soft Computing and Pattern Recognition, 2009. SOCPAR '09. International Conference of Soft Computing and Pattern Recognition.
16 Karouni, Ali, Daya, Bassam, & Bahlak, Samia. (2011). Offline signature recognition using neural networks approach. Procedia Computer Science, 3 (0), 155-161. doi: http://dx.doi.org/10.1016/j.procs.2010.12.027.
17 Lei, Liu, & Huichuan, Duan. (2009, 14-16 Aug. 2009). The Research of handwritten signatures. Paper presented at the IT in Medicine & Education, 2009. ITIME '09. IEEE International Symposium on IT in Medicine & Education.
18 Biswas, Samit, Bhattacharyya, Debnath, Kim, Tai-hoon, & Bandyopadhyay, SamirKumar. (2010). Extraction of Features from Signature Image and Signature Verification Using Clustering Techniques. In T.-h. Kim, A. Stoica & R.-S. Chang (Eds.), Security-Enriched Urban Computing and Smart Grid (Vol. 78, pp. 493-503): Springer Berlin Heidelberg.
19 Ning, Wang. (2009, 24-26 Nov. 2009). Signature Identification Based on Pixel Distribution Probability and Mean Similarity Measure with Concentric Circle Segmentation. Paper presented at the Computer Sciences and Convergence Information Technology, 2009. ICCIT '09. Fourth International Conference on Computer Sciences and Convergence Information Technology.
20 Impedovo, Donato, & Pirlo, Giuseppe. (2011). Stability Analysis of Static Signatures for Automatic Signature Verification. In G. Maino & G. Foresti (Eds.), Image Analysis and Processing – ICIAP 2011 (Vol. 6979, pp. 241-247): Springer Berlin Heidelberg.
21 Munich, M. E., & Perona, P. (2003). Visual identification by signature tracking. Pattern Analysis and Machine Intelligence, IEEE Transactions on, 25 (2), 200-217. doi: 10.1109/TPAMI.2003.1177152.
22 Deng, P. S., Li-Jing, Jaw, Jau-Hwang, Wang, & Cheng-Tan, Tung. (2003, 14-16 Oct. 2003). Trace copy forgery detection for handwritten signature verification. Paper presented at the Security Technology, 2003. Proceedings. IEEE 37th Annual 2003 International Carnahan Conference on Security Technology.
23 Fahmy, Maged M. M. (2010). Online handwritten signature verification system based on DWT features extraction and neural network classification. Ain Shams Engineering Journal, 1(1), 59-70. doi: http://dx.doi.org/10.1016/j.asej.2010.09.007.
24 Pottier, I., & Burel, G. (1994, 27 Jun-2 Jul 1994). Identification and authentification of handwritten signatures with a connectionist approach. Paper presented at the Neural Networks, 1994. IEEE World Congress on Computational Intelligence., 1994 IEEE International Conference on Neural Networks.
25 Soleymanpour, E., Rajae, B., & Pourreza, H. R. (2010, 27-28 Oct. 2010). Offline handwritten signature identification and verification using contourlet transform and Support Vector Machine. Paper presented at the Machine Vision and Image Processing (MVIP), 2010 6th Iranian.
26 Abushariah, A. A. M., Gunawan, T. S., Chebil, J., & Abushariah, M. A. M. (2012, 3-5 July 2012). Automatic person identification system using handwritten signatures. Paper presented at the Computer and Communication Engineering (ICCCE), 2012 International Conference on Computer and Communication Engineering.
27 Pranckeviciene, Erinija, Somorjai, Ray, Baumgartner, Richard, & Jeon, Moon-Gu. (2005). Identification of signatures in biomedical spectra using domain knowledge. Artificial Intelligence in Medicine, 35 (3), 215-226. doi: http://dx.doi.org/10.1016/j.artmed.2004.12.002.
28 Akram, M., Qasim, R., & Amin, M. A. (2012, 18-19 May 2012). A comparative study of signature recognition problem using statistical features and artificial neural networks. Paper presented at the Informatics, Electronics & Vision (ICIEV), 2012 International Conference on Informatics, Electronics & Vision.
29 Angadi, S. A., & Gour, Smita. (2013). LVQ-Neural Network Based Signature Recognition System Using Wavelet Features. In M. S & S. S. Kumar (Eds.), Proceedings of the Fourth International Conference on Signal and Image Processing 2012 (ICSIP 2012) (Vol. 222, pp. 1-13): Springer India.
30 Bandyopadhyay, S. K., Bhattacharyya, D., Das, P., & Debnath, D. (2008, 24-26 April 2008). Handwritten Signature Authentication Using Statistical Estimation. Paper presented at the Multimedia and Ubiquitous Engineering, 2008. MUE 2008. International Conference on Multimedia and Ubiquitous Engineering.
31 Bhattacharya, Indrajit, Ghosh, Prabir, & Biswas, Swarup. (2013). Offline Signature Verification Using Pixel Matching Technique. Procedia Technology, 10 (0), 970-977. doi: http://dx.doi.org/10.1016/j.protcy.2013.12.445.
32 De Medeiros Napoles, S. H. L., & Zanchettin, C. (2012, 10-15 June 2012). Offline handwritten signature verification through network radial basis functions optimized by Differential Evolution. Paper presented at the Neural Networks (IJCNN), The 2012 International Joint Conference on Neural Networks.
33 Dhar, K., & Kunz, A. (1988, 5-7 Oct 1988). Digital technique to analyze handwritten signatures. Paper presented at the Security Technology, 1988. Crime Countermeasures, Proceedings. Institute of Electrical and Electronics Engineers 1988 International Carnahan Conference on Security Technology.
34 Doroz, Rafal, & Porwik, Piotr. (2011). Handwritten Signature Recognition with Adaptive Selection of Behavioral Features. In N. Chaki & A. Cortesi (Eds.), Computer Information Systems – Analysis and Technologies (Vol. 245, pp. 128-136): Springer Berlin Heidelberg.
35 Doroz, Rafal, & Wrobel, Krzysztof. (2012). Dynamic Signature Recognition Based on Modified Windows Technique. In A. Cortesi, N. Chaki, K. Saeed & S. Wierzcho n (Eds.), Computer Information Systems and Industrial Management (Vol. 7564, pp. 158-167): Springer Berlin Heidelberg.
36 Melin, Patricia. (2012). Signature Recognition with a Hybrid Approach Combining Modular Neural Networks and Fuzzy Logic for Response Integration Modular Neural Networks and Type-2 Fuzzy Systems for Pattern Recognition (Vol. 389, pp. 77-92): Springer Berlin Heidelberg.
37 Palys, Malgorzata, Doroz, Rafal, & Porwik, Piotr. (2013). Statistical Analysis in Signature Recognition System Based on Levenshtein Distance. In R. Burduk, K. Jackowski, M. Kurzynski, M. Wozniak & A. Zolnierek (Eds.), Proceedings of the 8th International Conference on Computer Recognition Systems CORES 2013 (Vol. 226, pp. 217-226): Springer International Publishing.
38 Moolla, Y., Viriri, S., Nelwamondo, F. V., & Tapamo, J. R. (2012, 12-15 Aug. 2012). Handwritten signature verification using weighted fractional distance classification. Paper presented at the Signal Processing, Communication and Computing (ICSPCC), 2012 IEEE International Conference on Signal Processing, Communication and Computing.
39 Potolea, Rodica, B arb antan, Ioana, & Lemnaru, Camelia. (2011). A Hierarchical Approach for the Offline Handwritten Signature Recognition. In J. Filipe & J. Cordeiro (Eds.), Enterprise Information Systems (Vol. 73, pp. 264-279): Springer Berlin Heidelberg.
40 Rivard, Dominique, Granger, Eric, & Sabourin, Robert. (2013). Multi-feature extraction and selection in writer-independent off-line signature verification. International Journal on Document Analysis and Recognition (IJDAR), 16 (1), 83-103. doi: 10.1007/s10032-011- 0180-6.
41 Jayadevan, R., Kolhe, S. R., Patil, P. M., & Pal, U. (2012). Automatic processing of handwritten bank cheque images: a survey. International Journal on Document Analysis and Recognition (IJDAR), 15 (4), 267-296. doi: 10.1007/s10032-011-0170-8.
42 Heinen, M. R., & Osorio, F. S. (2006, 0-0 0). Handwritten Signature Authentication using Artificial Neural Networks. Paper presented at the Neural Networks, 2006. IJCNN '06. International Joint Conference on Neural Networks.
43 Shashi Kumar, D. R., Ravi Kumar, R., Raja, K. B., Chhotaray, R. K., & Pattanaik, Sabyasachi. (2010). Combined Off-Line Signature Verification Using Neural Networks. In V. Das & R. Vijaykumar (Eds.), Information and Communication Technologies (Vol. 101, pp. 580-583): Springer Berlin Heidelberg.
44 Mendaza-Ormaza, A., Miguel-Hurtado, O., Blanco-Gonzalo, R., & Diez-Jimeno, F. (2011, 18-21 Oct. 2011). Analysis of handwritten signature performances using mobile devices. Paper presented at the Security Technology (ICCST), 2011 IEEE International Carnahan Conference on Security Technology.
45 Ribeiro, Bernardete, Gon çalves, Ivo, Santos, S érgio, & Kovacec, Alexander. (2011). Deep Learning Networks for Off-Line Handwritten Signature Recognition. In C. San Martin & S.- W. Kim (Eds.), Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications (Vol. 7042, pp. 523-532): Springer Berlin Heidelberg.
46 Batista, Luana, Granger, Eric, & Sabourin, Robert. (2010). A Multi-Classifier System for Off- Line Signature Verification Based on Dissimilarity Representation. In N. Gayar, J. Kittler & F. Roli (Eds.), Multiple Classifier Systems (Vol. 5997, pp. 264-273): Springer Berlin Heidelberg.
47 Paulik, M. J., & Mohankrishnan, N. (1993, 16-18 Aug 1993). A 1-D, sequence decomposition based, autoregressive hidden Markov model for dynamic signature identification and verification. Paper presented at the Circuits and Systems, 1993, Proceedings of the 36th Midwest Symposium on Circuits and Systems.
48 Wada, N., & Hangai, S. (2007, 7-8 June 2007). HMM Based Signature Identification System Robust to Changes of Signatures with Time. Paper presented at the Automatic Identification Advanced Technologies, 2007 IEEE Workshop on Automatic Identification Advanced Technologies.
49 Putz-Leszczynska, Joanna, & Pacut, Andrzej. (2013). Universal Forgery Features Idea: A Solution for User –Adjusted Threshold in Signature Verification. In N. Nguyen (Ed.), Transactions on Computational Collective Intelligence IX (Vol. 7770, pp. 152-172): Springer Berlin Heidelberg.
50 Srinivasan, D., Ng, W. S., & Liew, A. C. (2006). Neural-network-based signature recognition for harmonic source identification. Power Delivery, IEEE Transactions on, 21 (1), 398-405. doi: 10.1109/TPWRD.2005.852370.
51 Nasien, Dewi (2012). Feature Extraction and Selection Algorithm for Chain Code Representation of Handwritten Character. Ph. D Thesis. Universiti Teknologi Malaysia, Malaysia.
52 Štruc V., Pavešic, N.: The Complete Gabor-Fisher Classifier for Robust Face Recognition, EURASIP Advances in Signal Processing, vol. 2010, 26 pages, doi:10.1155/2010/847680, 2010.
Mr. Aini Najwa Azmi
FACULTY OF COMPUTING, UNIVERSITI TEKNOLOGI MALAYSIA - Malaysia
aininajwa.azmi@gmail.com
Dr. Dewi Nasien
FACULTY OF COMPUTING, UNIVERSITI TEKNOLOGI MALAYSIA - Malaysia