Offline Signature Verification Using Graph Matching
|
|
|
- Jeffery Glenn
- 10 years ago
- Views:
Transcription
1 Turk J Elec Engin, VOL.15, NO.1 7, c TÜBİTAK Offline Signature Verification Using Graph Matching IbrahimS.I.ABUHAIBA Department of Electrical and Computer Engineering, Islamic University of Gaza, P. O. Box 1276, Gaza-PALESTINE [email protected] Abstract In this paper, we present a simple and effective signature verification method that depends only on the raw binary pixel intensities and avoids using complex sets of features. The method looks at the signature verification problem as a graph matching problem. The method is tested using genuine and forgery signatures produced by five subjects. An equal error rate of 26.7% and 5.6% was achieved for skilled and random forgeries, respectively. A positive property of our algorithm is that the false acceptance rate of random forgeries vanishes at the point of equal false rejection and skilled forgery false acceptance rates. Keeping the normalization size at pixels makes the verification time in the two seconds range. Key Words: Offline Signature Verification, Graph Matching, Thinning, Normalization. 1. Introduction The need to ensure that only the right people have authorization to high-security accesses has led to the development of systems for automatic personal verification. Signatures, fingerprints, palm prints, voice, and handwriting have all been used to verify the declared identity of an individual. Among all, signature has a fundamental advantage in that it is the customary way of identifying an individual in daily operations such as automated banking transaction, electronic fund transfers, document analysis, and access control. A signature verification system must be able to detect forgeries and at the same time reduce rejection of genuine signatures. The signature verification problem can be classified into categories:offline and online. Offline signature verification [1-49] does not use dynamic information that is used extensively in online signature verification systems [, 22, 5-54]. In this paper, we investigate the problem of offline signature verification. The problem of offline signature verification has been faced by taking into account three different types of forgeries:random forgeries, produced without knowing either the name of the signer nor the shape of his signature; simple forgeries, produced knowing the name of the signer but without having an example of his signature; and skilled forgeries, produced by people who, looking at an original instance of the signature, attempt to imitate it as closely as possible. It is obvious that the problem of signature verification becomes more and more difficult when passing from random to simple and skilled forgeries, the latter being so difficult a task that even human beings make errors in several cases. In fact, exercises in imitating a signature often allow us to produce forgeries so similar to the originals that discrimination is practically impossible; in many 89
2 Turk J Elec Engin, VOL.15, NO.1, 7 cases, the distinction is complicated even more by the large variability introduced by some signers when writing their own signatures. Many research works on signature verification have been reported. Researchers have applied many technologies, such as neural networks and parallel processing [1-8], to the problem of signature verification and they are continually introducing new ideas, concepts, and algorithms. Other approaches have been proposed and evaluated in the context of random forgeries, like 2D transforms [9], histograms of directional data [1, 6, 1] or curvature [11], horizontal and vertical projections of the writing trace of the signature [12], structural approaches [13], local measurements made on the writing trace of the signature [14] and the position of feature points located on the skeleton of the signature [15]. Following Plamondon et al [16], a handwritten signature is the result of a rapid movement. Hence, the shape of the signature remains relatively the same over time when the signature is written down on a pre-established frame (context) like a bank check. This physical constraint contributes to the relative time-invariance of the signatures, which supports using only static shape information to verify signatures. Some other solutions in the case of random forgeries are mainly based on the use of global shape descriptors as the shadow code, investigated by Sabourin et al [17]. Other approaches using global shape descriptors such as shape envelope projections on the coordinate axes, geometric moments, or even more general global features such as area, height and width, have been widely investigated [3, 4, 15, 18, 19]. In [], offline models of signature verification are compared based on HMMs. The approach of [21] employs a three expert system that evaluates the signature three different ways and judges it as genuine, forgery, or rejection by a majority vote of the three experts. In [22], a signature verification system is presented that works with both static and dynamic features. In [23], the authors infer that shape similarity and causality of signature s generation are more important than matching the dynamics of signing. This result indicates that this dynamics is not stable enough to be used for signature verification since the subject is trying to reproduce a shape rather than a temporal pattern. This is why we use, in this paper, only static images to verify signatures. A new formalism for signature representation based on visual perception is proposed in [24]. Several learning strategies for signature verification were evaluated using a high-dimensional feature space that captures both local geometric information as well as stroke information in [25]. In [26], a serial three stage multi-expert system for facing the problem of signature verification is proposed. Many other important works in offline signature verification can be found in [27-49]. It is worth pointing out that most of the systems proposed up to now, while performing reasonably well on a single category of forgeries (random, simple or skilled), decrease in performance when working with all the categories of forgeries simultaneously, and generally this decrement is bigger than one would expect. The main reason for this behavior lies in the difficulty of defining a feature set that is adequate to work with all the classes of forgery simultaneously. Also, in current verification systems, it is difficult to find clear and strong justifications of why a specific set of features is used instead of others. Even if a justification is found, extracting such features is difficult and not robust. In this paper, we suggest a very simple signature verification method that depends only on the raw binary pixel intensities. The method looks at the signature verification problem as a graph matching problem. The rest of the paper is organized as follows. Section 2 is a survey of related work that is based on graph matching. Signature preprocessing operations are described in Section 3. Signature verification is formulated as a graph matching problem in Section 4. We report results in Section 5. Finally, the paper is concluded in Section 6. 9
3 ABUHAIBA:Offline Signature Verification Using Graph Matching, 2. Graph Matching-Based Related Work A large number of applications of graph matching have been described in the literature. The following is a survey of some related works. There has been many works in face recognition field. For example, in [59], the authors present a face recognition method using graph matching with a multi-layer grammatical face model. The method increases the robustness of recognition under varying lighting conditions. Furthermore, with high-level semantic understanding of the face, the authors are able to perform an intelligent recognition process driven by the status of the face, i.e. changes in expressions and poses. In [6], a system is proposed to handle the illumination problem of face recognition systems by using Retinex and color constancy algorithm. The Retinex and color constancy approach has been plugged with elastic bunch graph matching. The work in [61] presents a formalization of model-based facial feature recognition as an inexact graph matching problem, one graph representing a model of a face and the other an image where recognition has to be performed. A method for enhancing the performance of elastic graph matching in frontal face authentication is proposed in [62]. Graph matching is used in other image similarity problems. In [63], the authors present a part-based image similarity measure derived from stochastic matching of attributed relational graphs that represent the compositional parts and part relations of image scenes. The advantage of this model is its ability to accommodate spatial attributed relations and support supervised and unsupervised learning from training data. In [64], the authors present a method for finding similarities in a pair of three-dimensional objects. The method involves obtaining boundary cubes approximations to the two objects. Having obtained the approximations, they apply exact and inexact graph-matching algorithms to quantify the similarity between two objects. In [65], the problem of computing the similarity between two images is transformed to that of approximating the distance between two extended region adjacency graphs, which are extracted from the images. Invariance to translation, rotation, and scaling could be achieved using this method. In [66], the authors propose an approach to solve problems such as image registration, pattern detection and localization, and common pattern discovery under a unified framework based on graph matching. Experimental results show that their approach can handle rotation, scaling and translation, as well as distortion and occlusion. A method is proposed in [67] to retrieve images by content. The method is based on matching of strong graphs defined by relational signatures computed between clusters of a fuzzy partition. Such a representation combines color and spatial information between the regions and has nice geometric properties with respect to scale factor, rotation and translation. In [68], the authors describe a tracking algorithm to address the interactions among objects, and to track them individually and confidently via a static camera. It is achieved by constructing an invariant bipartite graph to model the dynamics of the tracking process, of which the nodes are classified into objects and profiles. The best match of the graph corresponds to an optimal assignment for resolving the identities of the detected objects. In [69], a new method is presented for segmentation and recognition of image objects based on structural pattern recognition. The input image is decomposed into regions through a quadtree algorithm. The decomposed image is represented by an attributed relational graph (ARG) named input graph. The objects to be recognized are also stored in an ARG named model graph. Object segmentation and recognition are accomplished by matching the input graph to the model graph. Some other diverse applications of graph matching follow. In [7], a subcircuit recognition method is developed using a nonlinear graph matching strategy. Subcircuit recognition is a problem of identifying all instances of a small subcircuit in a larger circuit. In [71], the authors propose a generic graph matching 91
4 Turk J Elec Engin, VOL.15, NO.1, 7 based framework that resolves the phase-ordering and fixed-ordering problems associated with scheduling on a clustered VLIW processor by simultaneously considering various scheduling alternatives of instructions. In [72], the authors present a new agent teamwork coordination strategy, called Rolegraphs, which represents and recognizes team intentions without requiring full knowledge of plans, or complete observations. The strategy relies on the role relationships formed within hierarchical teamwork structures. A graph matching approach is used to interpret these hierarchical structures, and to recognize team intentions at runtime. The work in [73] presents a graph matching model for the software architecture recovery. Modeling the recovery process as graph matching is an attempt to identify a sub-optimal transformation from a pattern graph, representing the high-level view of the system, onto a subgraph of the software system graph. In [74], the performance of an Attributed Relational Graph (ARG) matching algorithm, tailored for dealing with large graphs, is evaluated in the context of a real application:the detection of component parts in CAD images of mechanical drawings. The matching problem is a graph-subgraph isomorphism and the algorithm exploits semantic information about nodes while does not require information about the topology of the graphs to be matched. 3. Signarure Preprocessing Before a signature can be compared to any other signature, it undergoes some preprocessing operations. A signature is captured as a binary image, S. Then, pepper noise is removed, if there is any, to allow more accurate calculation of center of area. The angle, θ, of least second moment of S is found. The angle is measured counterclockwise from the y-axis. The signature is rotated about the center of area of S θ degrees clockwise. This rotation eliminates skew angle of a signature which is necessary for signatures of the same subject. After rotation, the image is smoothed which is a necessary step before thinning. To reduce data, the image is thinned using Zhang-Suen algorithm [57, 58]. The thinned image undergoes a normalization step that preserves the aspect ratio of the signature. The set of pixels that constitute the final thinned-normalized image of S, denoted as the set of vertices X, represents the signature S. These steps are summarized as follows, where after every image processing operation S is replaced by the resultant image. 1. Remove pepper noise from S. 2. Find the angle of least second moment, θ, ofs. 3. Rotate S θ degrees clockwise. 4. Smooth S. 5. Thin S. 6. Normalize S. The set of pixels that constitute the final normalized image, S ; denoted as the set of vertices X, represents the signature S. We illustrate signature preprocessing by an example. Figure 1(a) shows a binary image of a genuine signature. After removing pepper noise, finding the angle of least second moment, rotating the image, smoothing, and thinning, the image of Figure 1(b) is obtained. Normalizing the thinned image produces that of Figure 1(c). The set of pixels, X, of Figure 1(c) represents the genuine signature of Figure 1(a). 92
5 ABUHAIBA:Offline Signature Verification Using Graph Matching, (a) (b) (c) Figure 1. Signature preprocessing:(a) original image, (b) image after pepper noise removal, skew elimination, smoothing, and thinning, and (c) final normalized image. 4. Comarison Of Two Signatures As A Graph Matching Problem We introduce the following definitions from graph theory [55]. Definition 1. Let V be a finite nonempty set of vertices, and let E be a set of unordered pairs of elements taken from V.Thepair(V, E) is then called an undirected graph on V,whereV is the set of vertices and E is its set of edges. We write G =(V, E) to denote such a graph. Definition 2. A graph G =(V, E) is called bipartite if V = X Y with X Y = Ø, and every edge of G is of the form {x, y } with x X and y Y. If every vertex in X is joined with every vertex in Y,we have a complete bipartite graph. In this case, if X = m, and Y = n, the graph is denoted K m,n. Definition 3. Let G =(V, E) be a bipartite graph as defined above. A matching in G is a subset of E such that no two edges share a common vertex in X or Y. A complete matching of X into Y is a matching in G such that every x X is the end point of an edge. For a bipartite graph G =(V, E) withv partitioned as X Y, a complete matching of X into Y requires X Y. If X is large, then the construction of such a matching cannot be accomplished just by observation or trial and error. The following theorem, [55], provides a necessary and sufficient condition for the existence of such a matching. Theorem 1. Let G =(V, E) be a bipartite graph with V partitioned as X Y. A complete matching of X into Y exists if and only if for every subset A of X, A R(A), wherer(a) is the subset of Y consisting of vertices each of which is adjacent to at least one vertex in A. Let S 1 and S 2 be two offline signature images to be compared. Let X and Y be the sets of vertices (pixels) that represent S 1 and S 2, respectively. Cleary, X and Y are disjoint sets. We construct a complete bipartite graph G =(V, E) =K m,n,fromx and Y where V = X Y, X = m, and Y = n. SinceG is complete and assuming that the signatures are ordered such that X Y, then according to Theorem 1, a complete matching of X into Y exists. Usually, there are too many such complete matchings. Our 93
6 Turk J Elec Engin, VOL.15, NO.1, 7 goal is to find the minimum cost complete matching of X into Y. This is some form of the well known Assignment Problem (AP) from graph theory. We use the algorithm of [56], referred to as the Hungarian Method, to solve this assignment problem; i.e., find how much the signatures S 1 and S 2 match. The key point in using the Hungarian method to solve our AP problem is to find the cost matrix C which is m n matrix whose rows correspond to the vertices of X and whose columns correspond to the vertices of Y. Since the vertices X and Y are originally pixels extracted from signature images S 1 and S 2, respectively, every vertex x X or y Y has its x and y coordinates (row and column numbers in the raster image). These coordinates are used to find the distance between x and y after aligning the centers of area of the sets X and Y. Then, an entry c xy of C, x X, y Y, equals the Euclidean distance between x and y. This is the cost of matching point x from signature S 1 to point y from signature S 2. After calculating all entries of C, the formulated assignment problem is solved. The cost, cost min,ofthe resultant solution equals the sum of all entries, c xy, that correspond to the minimum cost solution. This cost is normalized by dividing it by X yielding the normalized minimum cost per pixel. Then, cost min is further divided by a factor, f, which takes into account the columns of C, which could not be matched. The factor f, measures the percentage of vertices sharing in any complete matching X into Y. To verify that a test signature, S, belongs to a specific subject, it is compared against a predetermined number, p, of prototype genuine signatures of the same subject as follows: 1. The p prototype signatures are preprocessed as described in Section 3 to produce the sets of vertices Y 1, Y 2,..., Y p. 2. S is preprocessed as described in Section 3 to produce the set of vertices X. 3. Let d =, whered will measure the minimum distance between S and the prototype signatures of the considered subject. For every set of vertices Y i, i =1,2,..., p, do { Let f =min( X, Y i )/ max( X, Y i ). If f α, then { Find the cost matrix C between X and Y i as described earlier. Rotate the matrix C so that there are at least as many rows as columns. Let r =numberofrowsofc. Compute the minimum cost matching, cost min, of rows into columns considering the cost matrix C. Let cost min = cost min /( f r). If cost min <d,thenlet d = cost min. } } 4. If d is less than or equal to some calculated threshold, D, then signature S is accepted, otherwise, it is rejected. In step 3, above, sometimes, rotating C is required by the Hungarian matching algorithm, since X and Y i will correspond to rows and columns of the cost matrix, respectively, and the algorithm finds a complete matching of rows into columns, which requires that the number of rows be less than or equal to the number of columns. Again, the factor, f, measures the percentage of vertices sharing in any complete matching of rows into columns. We continue to find a matching if f is not less than predetermined threshold, α, since such signatures most probably don t belong to the same subject. If f α, then a minimum cost 94
7 ABUHAIBA:Offline Signature Verification Using Graph Matching, matching is found. However, columns that could not be matched are punished by dividing the minimum cost, cost min,byf. The cost is normalized by dividing by the number of rows, r. The distance threshold, D, depends on the size of the normalization box, differs from subject to subject, and is calculated as follows: D = B D max (1) where B is constant, and for a specific subject, D max is the maximum distance between any two of his p prototype signatures, and is calculated as follows: 1. The p prototype signatures are preprocessed as described in Section 3 to produce the sets of vertices Y 1, Y 2,..., Y p. 2. Let D max =. 3. For every set of vertices Y i, i =1,2,..., p -1,do For every set of vertices Y j, j = i +1,i +2,..., p, do { Let f =min( Y i, Y j )/ max( Y i, Y j ). If f α, then { Find the cost matrix C between Y i and Y j as described earlier. Rotate the matrix C so that there are at least as many rows as columns. Let r =numberofrowsofc. Compute the minimum cost matching, cost min, of rows into columns considering the cost matrix C. Let cost min = cost min /(f r). If cost min >D max,thenletd max = cost min. } } 5. Results Datasets: A grid of 5 rows by 3 columns was prepared and printed on an A4 paper to collect signatures of subjects. Each cell of the grid is 6.3 cm width and 4.5 cm height. This size is usually sufficient to handwrite a signature freely. Subjects were asked to provide 15 of their genuine signatures on an A4 page with the described grid. Subjects were also asked not to touch the borders of the grid cells to facilitate signature segmentation. Although we explained to subjects that their signatures will be solely used in a scientific research study and this was written clearly in Arabic on the top of the page, most of the subjects refused to provide any signature. Only five subjects agreed and provided 15 genuine signatures each. Therefore, the total number of collected genuine signatures is 15 5 = 75 signatures. Figure 2 shows one sample page containing genuine signatures of subject No. 1. The same grid was used to collect forgeries of signatures of the collected genuine signatures. Each of the same five subjects was trained on signatures of the others. Then, he/she was asked to provide from 2 to 4 forgery signatures for each of the other genuine signatures. 15 forgeries were collected for each genuine signature. So, the total number of forgery signatures is 15 5 = 75 signatures. Figure 3 shows one sample page of 15 forgeries of the genuine signatures shown in Figure 2. 95
8 Turk J Elec Engin, VOL.15, NO.1, 7 Figure 2. Fifteen genuine signatures of subject No. 1. Figure 3. Fifteen forgeries of signature of subject No. 1. These signatures were produced by the other four subjects. After signature collection, they were scanned as binary images using an hp ScanJet 34C scanner. The resolution was set to dpi. The algorithm was run on a Pentium III PC, 85 MHz with 384 MB RAM. Three types of tests were conducted: 96
9 ABUHAIBA:Offline Signature Verification Using Graph Matching, 1. Genuine test, where genuine signatures were verified by considering the first three genuine signatures of every subject as prototype signatures, i.e., p = 3. The rest 12 signatures of every subject are tested against his three prototype signatures. Therefore, the total number of tested signatures equals 12 5 = 6. This test is used to compute the false rejection rate, FRR. 2. Random forgery test, where for every subject, all genuine signatures of all other subjects are considered random forgeries of signature of the subject under consideration. This gives 5 (5 1) 15 = signatures to be tested. A false acceptance rate, FAR random, is calculated specifically for this test. 3. Skilled forgery test, where for every subject, 15 skilled forgeries are tested yielding a total of 15 5 = 75 skilled test forgeries. Another false acceptance rate, FAR skilled, is computed for this test. The algorithm was run many times using the following sizes of normalization boxes:8 16, 16 32, 24 48, 32 64, 4 8, 48 96, , and For every specific normalization box, the first three signatures of every subject were preprocessed just once and used in all tests. The ratio, α, ofthe number of rows to number of columns of cost matrix, C, was set to.9. The factor, B,usedtocalculate D max was allowed to vary from to 3 in increments of.5. Figure 4(a-h) displays how the false rejection rate, FRR, false acceptance rate for random forgeries, FAR random, and false acceptance rate for skilled forgeries, FAR skilled, change against B, fordifferent sizes of normalization box. As B gets larger, FRR gets smaller and the two FARs get larger. It is natural to notice that the FAR random curve is lower than the FAR skilled curve, since in random forgeries the signer has no previous knowledge and/or training on the signature he is forging. He just provides any signature that can be easily detected as the curve shows. However, in skilled forgeries, the forger does not sign until he has known the model of the signature to be forged, and he has been trained on that signature. Curves of equal error rate, EER, defined as the rate at which FRR = FAR, against size of normalization box are displayed in Figure 5. Notice that as the size increases, EER decreases until it reaches 26.7% and 5.6% for skilled and random forgeries, respectively, at size pixels, B = After this size, EER fluctuates. Returning to Figure 4, we notice, except for part (a), that FAR random vanishes at the point of equal false rejection and skilled forgery false acceptance rates, which is a positive property of our algorithm. Samples of rejected genuine signatures and accepted skilled forgeries are shown infigure 6, forsubject No. 1, normalization box, B = , at the point of equal false rejection rate and false acceptance rate of skilled forgeries. For this subject, 3 out of 12 genuine signatures were rejected and only one forgery out of 15 was accepted. All random forgeries were rejected for this subject. In [24], two types of classifiers, a nearest neighbor and a threshold classifier, are used for offline signature verification. These classifiers show a total error rate below 2% and 1%, respectively, in the context of random forgeries. These rates are better that ours which is 5.6%. For skilled forgeries, the false acceptance rate of our algorithm is near those of other researchers. However, the main advantage or our approach is its simplicity compared to that of [24] and other approaches. Figure 7 shows the average processing time required to verify one signature. It is noticed that the time increases exponentially as the size of the normalization box increases, which is a well known behavior of the Hungarian method for complete graph matching. Keeping the size at pixels makes the time in the two seconds range. Also, using more powerful computers should decrease processing time. 97
10 Turk J Elec Engin, VOL.15, NO.1, 7 8 x 16 normalization box B 24 x 48 normalization box FRR 1 FAR_random FAR_skilled FRR FAR_random FAR_skilled B 4 x8 normalization box (a) (c) FRR FAR_random FAR_skilled B 56 x112 normalization box FRR 1 FAR_random 9 FAR_skilled (g) B (e) 16 x 32 normalization box FRR FAR_random FAR_skilled B 32 x 64 normalization box FRR 1 FAR_random 9 FAR_skilled B 48 x96 normalization box B (b) (d) FRR FAR_random FAR_skilled 64 x128 normalization box FRR 1 FAR_random 9 FAR_skilled (h) B Figure 4. False rejection and acceptance rates against B:with different sizes of normalization box: (a) 8 16, (b) 16 32, (c) 24 48, (d) 32 64, (e) 4 8, (f) 48 96, (g) and (h) (f) 98
11 ABUHAIBA:Offline Signature Verification Using Graph Matching, EER 4 1 EER_random EER_skilled 8x16 16x32 24x48 32x64 4x8 48x96 Size of normalization box 56x112 64x128 Figure 5. Equal error rate against size of normalization box. (a) (b) (c) (d) Figure 6. Examples of false rejection and false acceptance for subject No. 1:(a), (b), and (c) rejected genuine signatures, and (d) accepted forgery. Average verification time (s) x16 16x32 24x48 32x64 4x8 48x96 Size of normalization box Figure 7. Average verification time versus size of normalization box. 56x112 64x Conclusion In this paper, we investigated the problem of offline signature verification. From the results, it is obvious that the problem of signature verification becomes more difficult when passing from random to skilled forgeries, the latter being so difficult a task that even human beings make errors in several cases. We presented a simple and effective signature verification method that depends only on the raw binary pixel intensities and avoids using complex sets of features that are usually used in the literature. Our method looks at the signature verification problem as a graph matching problem, for which we used the Hungarian method to solve. The method was tested using genuine and forgery signatures produced by five subjects. Three types of 99
12 Turk J Elec Engin, VOL.15, NO.1, 7 tests were conducted:(1) genuine test, where genuine signatures were verified, (2) random forgery test, where for every subject, all genuine signatures of all other subjects are considered random forgeries of signature of the subject under consideration, and (3) skilled forgery test, where for every subject, skilled forgeries are tested. An equal error rate of 26.7% and 5.6% for skilled and random forgeries, respectively, was achieved at size pixels. A positive property of our algorithm is that the false acceptance rate of random forgeries vanishes at the point of equal false rejection and skilled forgery false acceptance rates. Concerning processing time, It is noticed that it increases exponentially as the size of the normalization box increases. Keeping the size at pixels makes the time in the two seconds range. Also, using more powerful computers should decrease processing time. Acknowledgement The author would like to thank the referees for their valuable comments which helped to improve paper presentation. References [1] J.P. Drouhard, R. Sabourin, M. Godbout, Evaluation of a Training Method and of Various Rejection Criteria for a Neural Network Classifier Used for Off-Line Signature Verification, IEEE Int l Conf. Neural Networks, Orlando, Fla., June 26-July 2, pp ,299, [2] R. Sabourin, J.P. Drouhard, Off-Line Signature Verification Using Directional PDF and Neural Networks, Proc. of the 11 th ICPR, pp , The Hague, The Netherlands, [3] H. Cardot, M. Revenu, B. Victorri, M.J. Revillet, A static signature verification system based on a cooperative neural network architecture, International Journal of Pattern Recognition and Artificial Intelligence, 8(3), pp , [4] R. Bajaj, S. Chaudhury, Signature verification using multiple neural classifiers, Pattern Recognition, (1), pp. 1 7, [5] K. Huang, H. Yan, Off-line signature verification based on geometric feature extraction and neural network classification, Pattern Recognition, (1), pp. 9 17, [6] J.P. Drouhard, R. Sabourin, M. Godbout, A neural network approach to off-line signature verification using directional PDF, Pattern Recognition, 29(3), pp , [7] L.L. Lee, Neural approaches for human signature verification, Third International Conference on Signal Processing Proceedings, pp , [8] M.C. Fairhurst, P. Brittan, An Evaluation of Parallel Strategies for Feature Vector Construction in Automatic Signature Verification Systems, Int. J. Pattern Recognition and Artificial Intelligence, vol. 8, no. 3, pp , [9] W.F. Nemcek, W.C. Lin, Experimental Investigation of Automatic Signature Verification, IEEE Trans. Systems, Man and Cybernetics, pp , [1] T.S. Wilkinson, J.W. Goodman, Slope Histogram Detection of Forged Handwritten Signatures, Proc. SPIE, pp , Boston,
13 ABUHAIBA:Offline Signature Verification Using Graph Matching, [11] E.R. Brocklehurst, Computer Methods of Signature Verification, J. Forensic Science Society, pp , [12] M. Ammar, Y. Yoshida, T. Fukumura, Off-Line Preprocessing and Verification of Signatures, Int l J. Pattern Recognition and Artificial Intelligence, vol. 2, no. 4., pp , [13] R. Sabourin, R. Plamondon, L. Beaumier, Structural Interpretation of Handwritten Signature Images, Int. J. on Pattern Recognition and Artificial Intelligence, vol.8, no. 3, pp , [14] R.N. Nagel, A. Rosenfeld, Computer Detection of Freehand Forgeries, IEEE Trans. Computers, vol. 26, no. 9, pp , [15] Y. Qi, B. R. Hunt, Signature verification using global and grid features, Pattern Recognition, 27(12), pp , [16] R. Plamondon, G. Lorette, Automatic signature verification and writer identification the state of the art, Pattern Recognition, 22, pp , [17] R. Sabourin, M. Cheriet, G. Genest, An Extended-Shadow-Code Based Approach for Off-Line Signature Verification, Second IAPR Conf. Document Analysis and Recognition, pp. 1-5,Tsukuba, Japan, Oct [18] M. Ammar, Progress in verification of skillfully simulated handwritten signatures, International Journal of Pattern Recognition and Artificial Intelligence, 5(1 2): , [19] N.A. Murshed, R. Sabourin, F. Bortolozzi, A cognitive approach to off-line signature verification, International Journal of Pattern Recognition and Artificial Intelligence, 11(5), pp , [] G. Rigoli, A. Kosmala, A Systematic Comparison Between on-line and off-line Methods for Signature Verification with Hidden Markov Models, 14th International Conference on Pattern Recognition - vol. II, pp , Australia, [21] G. Dimauro, S. Impedovo, G. Pirlo, A. Salizo, A multi-expert signature verification system for bank check processing, International Journal of Pattern Recognition and Artificial Intelligence, 11(5), pp , [22] Q. Wu, S. Lee, I. Jou, On-line signature verification based on split-and-merge matching mechanism, Pattern Recognition Letters, 18(7), pp , [23] M. Munich, P. Perona, Visual signature verification using affine arc-length, Proc. IEEE Comput. Soc. Conf. Comput. Vision and Pattern Recogn., [24] R. Sabourin, G. Genest, F.J. Prêteux, Off-Line Signature Verification by Local Granulometric Size Distributions, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 19, No. 9, pp , [25] S.N. Srihari, A. Xu, M.K. Kalera, Learning strategies and classification methods for off-line signature verification, Proc. of the 7th Int. Workshop on Frontiers in handwriting recognition (IWHR), pp , 4. [26] C. Sansone, M. Vento, Signature Verification:Increasing Performance by a Multi-Stage System, Pattern Analysis & Applications, No. 3, pp ,. [27] C. Allgrove, M. C. Fairhurst, Majority Voting for Improved Signature Verification, IEE Colloquium on Visual Biometrics, (Ref No. /18), pp ,. [28] G. Dimauro, S. Impedovo, G. Pirlo, Component-Oriented Algorithms for Signature Verification, Int. J. Pattern Recognition and Artificial Intelligence, vol. 8, no. 3, pp ,
14 Turk J Elec Engin, VOL.15, NO.1, 7 [29] N.A. Murshed, F. Bortolozzi, R. Sabourin, Off-Line Signature Verification, Without a Priori Knowledge of Class w2. A New Approach, Proc. Third IAPR Conf. Document Analysis and Recognition, pp , Aug , Montréal, Canada, pp , [] F. Nouboud, R. Plamondon, Global Parameters and Curves for Off-Line Signature Verification, Proc. Int l Workshop on Frontiers in Handwriting Recognition, Taiwan, pp , [31] J. Mathyer, The Expert Examination of Signatures, J. Criminal Law, Criminology, and Police Science, vol. 5, no. 3, May-June, pp , [32] R. Sabourin, R. Plamondon, G. Lorette, Off-Line Identification with Handwritten Signature Images:Survey and Perspectives, Structured Document Image Analysis. New York:Springer-Verlag, pp , [33] R. Sabourin, G. Genest, An Extended-Shadow-Code Based Approach for Off-Line Signature Verification:Part 2 Evaluation of Several Multi-Classifier Combination Strategies, Third IAPR Conf. Document Analysis and Recognition, pp , Montréal, Canada, Aug , [34] M. Ammar, Y. Yoshida, T. Fukumura, A new effective approach for off-line verification of signatures by using pressure features. Proceedings of the 8th International Conference on Pattern Recognition, pages , [35] J.K. Guo, D. Doermann, A. Rosenfeld, Local correspondence for detecting random forgeries, Proceedings of the International Conference on Document Analysis and Recognition, pp , [36] M.K. Kalera, B. Zhang, S.N. Srihari, Off-line signature verification and identification using distance statistics, Proceedings of the International Graphonomics Society Conference, Scottsdale, AZ, pp , November 3. [37] S. Lee, J.C. Pan, Off-line tracing and representation of signatures, IEEE Transactions on Systems, Man and Cybernetics, Vol. 22, pp , [38] M.E. Munich, P. Perona, Visual identification by signature tracking, IEEE Transactions on Pattern Analysis and Machine Intelligence, 25(2), pp. 217, 3. [39] R. Plamondon, G. Lorette, On-line and off-line handwriting recognition:a comprehensive survey, IEEE Transactions on Pattern Analysis and Machine Intelligence, 22(1), pp ,. [4] R. Sabourin, R. Plamondon, Preprocessing of handwritten signatures from image gradient analysis, Proceedings of the 8th International Conference on Pattern Recognition, pp , [41] R. Plamondon, F. Leclerc, Automatic signature verification:the state of the art , International Journal of Pattern Recognition and Artificial Intelligence, 8(3), pp , [42] L.L. Lee, M.G. Lizarraga, N.R. Gomes, A.L. Koerich, A prototype for Brazilian bank check recognition, International Journal of Pattern Recognition and Artificial Intelligence, 11(4), pp , [43] Y. Qi, B.R. Hunt, A multiresolution approach to computer verification of handwritten signatures, IEEE Transactions on Image Processing, 4(6), pp , [44] P.S. Deng, H. Y. M. Liao, C.W. Ho, H. R. Tyan, Wavelet-based off-line signature verification, Computer Vision and Image Understanding, 76, pp ,
15 ABUHAIBA:Offline Signature Verification Using Graph Matching, [45] B. Fang, C.H. Leung, Y.Y. Tang, K.W. Tse, P.C.K. Kwok, Y.K. Wong, Off-line signature verification by the tracking of feature and stroke positions, Pattern Recognition, 36, pp , 3. [46] T.J. Hastie, E. Kishon, M. Clark, J. Fan, A model for signature verification, in Proceedings of the IEEE Conference on Systems, Man, and Cybernetics, 1, pp , [47] J.S. Lew, Kinematic theory of signature verification measurements, Mathematical Biosciences, 48, pp , 198. [48] T. Matsuura, H. Sakai, On stochastic system representation of handwriting process and its application to signature verification, Third International Conference on Signal Processing Proceedings, pp , [49] R. Sabourin, J. P. Drouhard, E.S. Wah, Shape matrices as a mixed shape factor for offline signature verification, Proceedings of the Fourth International Conference on Document Analysis and Recognition, pp , [5] R. Plamondon, The Design of An On-Line Signature Verification System:From Theory to Practice, Int. J. Pattern Recognition and Artificial Intelligence, vol. 8, no. 3, pp , [51] R. Plamondon, S.N. Srihari, On-Line and Offline Handwriting Recognition:A Comprehensive Survey, IEEE Transaction on Pattern Analysis and Machine Intelligence, vol. 22, no. 1,. [52] V.S. Nalwa, Automatic On-Line Signature Verification, Proceedings of the IEEE, Vol. 85, No. 2, pp , [53] L. Lee, T. Berger, E. Aviczer, Reliable on-line Human Signature Verification Systems, IEEE Trans. Pattern Analysis and Machine Intelligence, 18(6), pp , [54] B. Kashi, J. Hu, W.L. Nelson, W. Turin, Hidden Markov Model approach to online handwritten signature verification International Journal on Document Analysis and Recognition, 1(2), pp , [55] R.P. Grimaldi, Discrete and Combinatorial Mathematics, Addison-Wesley Longman Inc., forth edition, [56] N. Christofides, Graph Theory:An Algorithmic Approach, Academic Press Inc., [57] T. Zhang, C. Suen, A fast parallel algorithm for thinning digital patterns, Communications of the ACM, vol. 27, pp , Mar., [58] G.X. Ritter, J.N. Wilson, Handbook of Computer Vision Algorithms in Image Algebra, CRC Press, 2 nd edition, 1. [59] Z. Xu, J. Luo, Face Recognition by Expression-Driven Sketch Graph Matching, 18th International Conference on Pattern Recognition (ICPR 6), pp , 6. [6] N. Kela, A. Rattani, P. Gupta, Illumination Invariant Elastic Bunch Graph Matching for Efficient Face Recognition, 6 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW 6), p. 42, 6. [61] R. Cesar, E. Bengoetxea, I. Bloch, Inexact Graph Matching Using Stochastic Optimization Techniques for Facial Feature Recognition, 16th International Conference on Pattern Recognition (ICPR 2) - Volume 2, p. 465, 2. 13
16 Turk J Elec Engin, VOL.15, NO.1, 7 [62] A. Tefas, C. Kotropoulos, I. Pitas, Using Support Vector Machines to Enhance the Performance of Elastic Graph Matching for Frontal Face Authentication, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 23, No. 7, pp , 1. [63] D.-Q. Zhang, S.-F Chang, Detecting image near-duplicate by stochastic attributed relational graph matching with learning, Proceedings of the 12th annual ACM international conference on Multimedia, New York, NY, USA, pp , 4. [64] C. Maple, Y. Wang, A Three-dimensional Object Similarity Test Using Graph Matching Techniques, Eighth International Conference on Information Visualisation (IV 4), pp , 4. [65] R. Baeza-Yates, G. Valiente, An Image Similarity Measure Based on Graph Matching, Seventh International Symposium on String Processing Information Retrieval (SPIRE ), p. 28,. [66] H. Jiang, Chong-Wah Ngo, Graph Based Image Matching, 17th International Conference on Pattern Recognition (ICPR 4) - Volume 3, pp , 4. [67] S. Tabbone, L. Wendling, Retrieving Images by Content from Strong Relational Graph Matching, 17th International Conference on Pattern Recognition (ICPR 4) - Volume 2, pp , 4. [68] Hwann-Tzong Chen, Horng-Horng Lin, Tyng-Luh Liu, Multi-Object Tracking Using Dynamical Graph Matching, 1 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 1) - Volume 2, p. 21, 1. [69] L. Augusto C., R.M. Cesar-Jr., Quadtree-Based Inexact Graph Matching for Image Analysis, XVIII Brazilian Symposium on Computer Graphics and Image Processing (SIBGRAPI 5), pp , 5. [7] N. Rubanov, An efficient subcircuit recognition using the nonlinear graph matching, Proceedings of the 18th annual symposium on Integrated circuits and system design, Florianolpolis, Brazil, pp , 5. [71] R. Nagpal, Y.N. Srikant, A Graph Matching Based Integrated Scheduling Framework for Clustered VLIW Processors, 4 International Conference on Parallel Processing Workshops (ICPPW 4), pp , 4. [72] S. Soon, A. Pearce, M. Noble, Adaptive Teamwork Coordination Using Graph Matching over Hierarchical Intentional Structures, Third International Joint Conference on Autonomous Agents and Multi-agent Systems - Volume 1 (AAMAS 4), pp , 4. [73] K. Sartipi, K. Kontogiannis, On Modeling Software Architecture Recovery as Graph Matching, 19th IEEE International Conference on Software Maintenance (ICSM 3), p. 224, 3. [74] L.P. Cordella, P. Foggia, C. Sansone, M. Vento, Fast Graph Matching for Detecting CAD Image Components, 15th International Conference on Pattern Recognition (ICPR ) - Volume 2, p. 634,. 14
The Role of Size Normalization on the Recognition Rate of Handwritten Numerals
The Role of Size Normalization on the Recognition Rate of Handwritten Numerals Chun Lei He, Ping Zhang, Jianxiong Dong, Ching Y. Suen, Tien D. Bui Centre for Pattern Recognition and Machine Intelligence,
ECE 533 Project Report Ashish Dhawan Aditi R. Ganesan
Handwritten Signature Verification ECE 533 Project Report by Ashish Dhawan Aditi R. Ganesan Contents 1. Abstract 3. 2. Introduction 4. 3. Approach 6. 4. Pre-processing 8. 5. Feature Extraction 9. 6. Verification
Biometric Authentication using Online Signatures
Biometric Authentication using Online Signatures Alisher Kholmatov and Berrin Yanikoglu [email protected], [email protected] http://fens.sabanciuniv.edu Sabanci University, Tuzla, Istanbul,
Keywords image processing, signature verification, false acceptance rate, false rejection rate, forgeries, feature vectors, support vector machines.
International Journal of Computer Application and Engineering Technology Volume 3-Issue2, Apr 2014.Pp. 188-192 www.ijcaet.net OFFLINE SIGNATURE VERIFICATION SYSTEM -A REVIEW Pooja Department of Computer
Document Image Retrieval using Signatures as Queries
Document Image Retrieval using Signatures as Queries Sargur N. Srihari, Shravya Shetty, Siyuan Chen, Harish Srinivasan, Chen Huang CEDAR, University at Buffalo(SUNY) Amherst, New York 14228 Gady Agam and
Handwritten Signature Verification using Neural Network
Handwritten Signature Verification using Neural Network Ashwini Pansare Assistant Professor in Computer Engineering Department, Mumbai University, India Shalini Bhatia Associate Professor in Computer Engineering
Method of Combining the Degrees of Similarity in Handwritten Signature Authentication Using Neural Networks
Method of Combining the Degrees of Similarity in Handwritten Signature Authentication Using Neural Networks Ph. D. Student, Eng. Eusebiu Marcu Abstract This paper introduces a new method of combining the
SIGNATURE VERIFICATION
SIGNATURE VERIFICATION Dr. H.B.Kekre, Dr. Dhirendra Mishra, Ms. Shilpa Buddhadev, Ms. Bhagyashree Mall, Mr. Gaurav Jangid, Ms. Nikita Lakhotia Computer engineering Department, MPSTME, NMIMS University
Automatic Extraction of Signatures from Bank Cheques and other Documents
Automatic Extraction of Signatures from Bank Cheques and other Documents Vamsi Krishna Madasu *, Mohd. Hafizuddin Mohd. Yusof, M. Hanmandlu ß, Kurt Kubik * *Intelligent Real-Time Imaging and Sensing group,
Signature verification using Kolmogorov-Smirnov. statistic
Signature verification using Kolmogorov-Smirnov statistic Harish Srinivasan, Sargur N.Srihari and Matthew J Beal University at Buffalo, the State University of New York, Buffalo USA {srihari,hs32}@cedar.buffalo.edu,[email protected]
Visual-based ID Verification by Signature Tracking
Visual-based ID Verification by Signature Tracking Mario E. Munich and Pietro Perona California Institute of Technology www.vision.caltech.edu/mariomu Outline Biometric ID Visual Signature Acquisition
Optimizing the Global Execution Time with CUDA and BIGDATA from a Neural System of Off-line Signature Verification on Checks.
Int'l Conf. Par. and Dist. Proc. Tech. and Appl. PDPTA'5 495 Optimizing the Global Execution Time with CUDA and BIGDATA from a Neural System of Off-line Signature Verification on Checks. Francisco Javier
DESIGN OF DIGITAL SIGNATURE VERIFICATION ALGORITHM USING RELATIVE SLOPE METHOD
DESIGN OF DIGITAL SIGNATURE VERIFICATION ALGORITHM USING RELATIVE SLOPE METHOD P.N.Ganorkar 1, Kalyani Pendke 2 1 Mtech, 4 th Sem, Rajiv Gandhi College of Engineering and Research, R.T.M.N.U Nagpur (Maharashtra),
LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE. [email protected]
LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE 1 S.Manikandan, 2 S.Abirami, 2 R.Indumathi, 2 R.Nandhini, 2 T.Nanthini 1 Assistant Professor, VSA group of institution, Salem. 2 BE(ECE), VSA
A Learning Based Method for Super-Resolution of Low Resolution Images
A Learning Based Method for Super-Resolution of Low Resolution Images Emre Ugur June 1, 2004 [email protected] Abstract The main objective of this project is the study of a learning based method
Signature Region of Interest using Auto cropping
ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 1 Signature Region of Interest using Auto cropping Bassam Al-Mahadeen 1, Mokhled S. AlTarawneh 2 and Islam H. AlTarawneh 2 1 Math. And Computer Department,
The Scientific Data Mining Process
Chapter 4 The Scientific Data Mining Process When I use a word, Humpty Dumpty said, in rather a scornful tone, it means just what I choose it to mean neither more nor less. Lewis Carroll [87, p. 214] In
Simultaneous Gamma Correction and Registration in the Frequency Domain
Simultaneous Gamma Correction and Registration in the Frequency Domain Alexander Wong [email protected] William Bishop [email protected] Department of Electrical and Computer Engineering University
Efficient on-line Signature Verification System
International Journal of Engineering & Technology IJET-IJENS Vol:10 No:04 42 Efficient on-line Signature Verification System Dr. S.A Daramola 1 and Prof. T.S Ibiyemi 2 1 Department of Electrical and Information
Statistical Analysis of Signature Features with Respect to Applicability in Off-line Signature Verification
Statistical Analysis of Signature Features with Respect to Applicability in Off-line Signature Verification BENCE KOVARI, HASSAN CHARAF Department of Automation and Applied Informatics Budapest University
STATIC SIGNATURE RECOGNITION SYSTEM FOR USER AUTHENTICATION BASED TWO LEVEL COG, HOUGH TRANSFORM AND NEURAL NETWORK
Volume 6, Issue 3, pp: 335343 IJESET STATIC SIGNATURE RECOGNITION SYSTEM FOR USER AUTHENTICATION BASED TWO LEVEL COG, HOUGH TRANSFORM AND NEURAL NETWORK Dipti Verma 1, Sipi Dubey 2 1 Department of Computer
Online Farsi Handwritten Character Recognition Using Hidden Markov Model
Online Farsi Handwritten Character Recognition Using Hidden Markov Model Vahid Ghods*, Mohammad Karim Sohrabi Department of Electrical and Computer Engineering, Semnan Branch, Islamic Azad University,
A Performance Comparison of Five Algorithms for Graph Isomorphism
A Performance Comparison of Five Algorithms for Graph Isomorphism P. Foggia, C.Sansone, M. Vento Dipartimento di Informatica e Sistemistica Via Claudio, 21 - I 80125 - Napoli, Italy {foggiapa, carlosan,
Support Vector Machines for Dynamic Biometric Handwriting Classification
Support Vector Machines for Dynamic Biometric Handwriting Classification Tobias Scheidat, Marcus Leich, Mark Alexander, and Claus Vielhauer Abstract Biometric user authentication is a recent topic in the
Circle Object Recognition Based on Monocular Vision for Home Security Robot
Journal of Applied Science and Engineering, Vol. 16, No. 3, pp. 261 268 (2013) DOI: 10.6180/jase.2013.16.3.05 Circle Object Recognition Based on Monocular Vision for Home Security Robot Shih-An Li, Ching-Chang
AN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION
AN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION Saurabh Asija 1, Rakesh Singh 2 1 Research Scholar (Computer Engineering Department), Punjabi University, Patiala. 2 Asst.
Analecta Vol. 8, No. 2 ISSN 2064-7964
EXPERIMENTAL APPLICATIONS OF ARTIFICIAL NEURAL NETWORKS IN ENGINEERING PROCESSING SYSTEM S. Dadvandipour Institute of Information Engineering, University of Miskolc, Egyetemváros, 3515, Miskolc, Hungary,
3)Skilled Forgery: It is represented by suitable imitation of genuine signature mode.it is also called Well-Versed Forgery[4].
Volume 4, Issue 7, July 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A New Technique
CS 534: Computer Vision 3D Model-based recognition
CS 534: Computer Vision 3D Model-based recognition Ahmed Elgammal Dept of Computer Science CS 534 3D Model-based Vision - 1 High Level Vision Object Recognition: What it means? Two main recognition tasks:!
Tracking Moving Objects In Video Sequences Yiwei Wang, Robert E. Van Dyck, and John F. Doherty Department of Electrical Engineering The Pennsylvania State University University Park, PA16802 Abstract{Object
Determining optimal window size for texture feature extraction methods
IX Spanish Symposium on Pattern Recognition and Image Analysis, Castellon, Spain, May 2001, vol.2, 237-242, ISBN: 84-8021-351-5. Determining optimal window size for texture feature extraction methods Domènec
Open Access A Facial Expression Recognition Algorithm Based on Local Binary Pattern and Empirical Mode Decomposition
Send Orders for Reprints to [email protected] The Open Electrical & Electronic Engineering Journal, 2014, 8, 599-604 599 Open Access A Facial Expression Recognition Algorithm Based on Local Binary
Research on Chinese financial invoice recognition technology
Pattern Recognition Letters 24 (2003) 489 497 www.elsevier.com/locate/patrec Research on Chinese financial invoice recognition technology Delie Ming a,b, *, Jian Liu b, Jinwen Tian b a State Key Laboratory
Identity authentication using improved online signature verification method
Pattern Recognition Letters 26 (2005) 2400 2408 www.elsevier.com/locate/patrec Identity authentication using improved online signature verification method Alisher Kholmatov, Berrin Yanikoglu * Sabanci
High-Performance Signature Recognition Method using SVM
High-Performance Signature Recognition Method using SVM Saeid Fazli Research Institute of Modern Biological Techniques University of Zanjan Shima Pouyan Electrical Engineering Department University of
Biometric Authentication using Online Signature
University of Trento Department of Mathematics Outline Introduction An example of authentication scheme Performance analysis and possible improvements Outline Introduction An example of authentication
A colour Code Algorithm for Signature Recognition
Electronic Letters on Computer Vision and Image Analysis 6(1):1-12, 2007 A colour Code Algorithm for Signature Recognition Vinayak Balkrishana Kulkarni Department of Electronics Engineering. Finolex Academy
International Journal of Advanced Information in Arts, Science & Management Vol.2, No.2, December 2014
Efficient Attendance Management System Using Face Detection and Recognition Arun.A.V, Bhatath.S, Chethan.N, Manmohan.C.M, Hamsaveni M Department of Computer Science and Engineering, Vidya Vardhaka College
How To Filter Spam Image From A Picture By Color Or Color
Image Content-Based Email Spam Image Filtering Jianyi Wang and Kazuki Katagishi Abstract With the population of Internet around the world, email has become one of the main methods of communication among
How To Fix Out Of Focus And Blur Images With A Dynamic Template Matching Algorithm
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X Image Estimation Algorithm for Out of Focus and Blur Images to Retrieve the Barcode
Part-Based Recognition
Part-Based Recognition Benedict Brown CS597D, Fall 2003 Princeton University CS 597D, Part-Based Recognition p. 1/32 Introduction Many objects are made up of parts It s presumably easier to identify simple
DIAGONAL BASED FEATURE EXTRACTION FOR HANDWRITTEN ALPHABETS RECOGNITION SYSTEM USING NEURAL NETWORK
DIAGONAL BASED FEATURE EXTRACTION FOR HANDWRITTEN ALPHABETS RECOGNITION SYSTEM USING NEURAL NETWORK J.Pradeep 1, E.Srinivasan 2 and S.Himavathi 3 1,2 Department of ECE, Pondicherry College Engineering,
Hybrid Lossless Compression Method For Binary Images
M.F. TALU AND İ. TÜRKOĞLU/ IU-JEEE Vol. 11(2), (2011), 1399-1405 Hybrid Lossless Compression Method For Binary Images M. Fatih TALU, İbrahim TÜRKOĞLU Inonu University, Dept. of Computer Engineering, Engineering
Novelty Detection in image recognition using IRF Neural Networks properties
Novelty Detection in image recognition using IRF Neural Networks properties Philippe Smagghe, Jean-Luc Buessler, Jean-Philippe Urban Université de Haute-Alsace MIPS 4, rue des Frères Lumière, 68093 Mulhouse,
PHYSIOLOGICALLY-BASED DETECTION OF COMPUTER GENERATED FACES IN VIDEO
PHYSIOLOGICALLY-BASED DETECTION OF COMPUTER GENERATED FACES IN VIDEO V. Conotter, E. Bodnari, G. Boato H. Farid Department of Information Engineering and Computer Science University of Trento, Trento (ITALY)
A Genetic Algorithm-Evolved 3D Point Cloud Descriptor
A Genetic Algorithm-Evolved 3D Point Cloud Descriptor Dominik Wȩgrzyn and Luís A. Alexandre IT - Instituto de Telecomunicações Dept. of Computer Science, Univ. Beira Interior, 6200-001 Covilhã, Portugal
ART Extension for Description, Indexing and Retrieval of 3D Objects
ART Extension for Description, Indexing and Retrieval of 3D Objects Julien Ricard, David Coeurjolly, Atilla Baskurt LIRIS, FRE 2672 CNRS, Bat. Nautibus, 43 bd du novembre 98, 69622 Villeurbanne cedex,
Introduction to Pattern Recognition
Introduction to Pattern Recognition Selim Aksoy Department of Computer Engineering Bilkent University [email protected] CS 551, Spring 2009 CS 551, Spring 2009 c 2009, Selim Aksoy (Bilkent University)
Low-resolution Image Processing based on FPGA
Abstract Research Journal of Recent Sciences ISSN 2277-2502. Low-resolution Image Processing based on FPGA Mahshid Aghania Kiau, Islamic Azad university of Karaj, IRAN Available online at: www.isca.in,
Signature Segmentation from Machine Printed Documents using Conditional Random Field
2011 International Conference on Document Analysis and Recognition Signature Segmentation from Machine Printed Documents using Conditional Random Field Ranju Mandal Computer Vision and Pattern Recognition
Automatic 3D Reconstruction via Object Detection and 3D Transformable Model Matching CS 269 Class Project Report
Automatic 3D Reconstruction via Object Detection and 3D Transformable Model Matching CS 69 Class Project Report Junhua Mao and Lunbo Xu University of California, Los Angeles [email protected] and lunbo
3D Model based Object Class Detection in An Arbitrary View
3D Model based Object Class Detection in An Arbitrary View Pingkun Yan, Saad M. Khan, Mubarak Shah School of Electrical Engineering and Computer Science University of Central Florida http://www.eecs.ucf.edu/
Using Lexical Similarity in Handwritten Word Recognition
Using Lexical Similarity in Handwritten Word Recognition Jaehwa Park and Venu Govindaraju Center of Excellence for Document Analysis and Recognition (CEDAR) Department of Computer Science and Engineering
Binary Image Scanning Algorithm for Cane Segmentation
Binary Image Scanning Algorithm for Cane Segmentation Ricardo D. C. Marin Department of Computer Science University Of Canterbury Canterbury, Christchurch [email protected] Tom
WATER BODY EXTRACTION FROM MULTI SPECTRAL IMAGE BY SPECTRAL PATTERN ANALYSIS
WATER BODY EXTRACTION FROM MULTI SPECTRAL IMAGE BY SPECTRAL PATTERN ANALYSIS Nguyen Dinh Duong Department of Environmental Information Study and Analysis, Institute of Geography, 18 Hoang Quoc Viet Rd.,
Template-based Eye and Mouth Detection for 3D Video Conferencing
Template-based Eye and Mouth Detection for 3D Video Conferencing Jürgen Rurainsky and Peter Eisert Fraunhofer Institute for Telecommunications - Heinrich-Hertz-Institute, Image Processing Department, Einsteinufer
Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches
Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches PhD Thesis by Payam Birjandi Director: Prof. Mihai Datcu Problematic
Neural Network based Vehicle Classification for Intelligent Traffic Control
Neural Network based Vehicle Classification for Intelligent Traffic Control Saeid Fazli 1, Shahram Mohammadi 2, Morteza Rahmani 3 1,2,3 Electrical Engineering Department, Zanjan University, Zanjan, IRAN
Combating Anti-forensics of Jpeg Compression
IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 6, No 3, November 212 ISSN (Online): 1694-814 www.ijcsi.org 454 Combating Anti-forensics of Jpeg Compression Zhenxing Qian 1, Xinpeng
Categorical Data Visualization and Clustering Using Subjective Factors
Categorical Data Visualization and Clustering Using Subjective Factors Chia-Hui Chang and Zhi-Kai Ding Department of Computer Science and Information Engineering, National Central University, Chung-Li,
High-dimensional labeled data analysis with Gabriel graphs
High-dimensional labeled data analysis with Gabriel graphs Michaël Aupetit CEA - DAM Département Analyse Surveillance Environnement BP 12-91680 - Bruyères-Le-Châtel, France Abstract. We propose the use
Euler Vector: A Combinatorial Signature for Gray-Tone Images
Euler Vector: A Combinatorial Signature for Gray-Tone Images Arijit Bishnu, Bhargab B. Bhattacharya y, Malay K. Kundu, C. A. Murthy fbishnu t, bhargab, malay, [email protected] Indian Statistical Institute,
Solving Simultaneous Equations and Matrices
Solving Simultaneous Equations and Matrices The following represents a systematic investigation for the steps used to solve two simultaneous linear equations in two unknowns. The motivation for considering
3D Human Face Recognition Using Point Signature
3D Human Face Recognition Using Point Signature Chin-Seng Chua, Feng Han, Yeong-Khing Ho School of Electrical and Electronic Engineering Nanyang Technological University, Singapore 639798 [email protected]
International Journal of Advanced Research in Computer Science and Software Engineering
Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental
Establishing the Uniqueness of the Human Voice for Security Applications
Proceedings of Student/Faculty Research Day, CSIS, Pace University, May 7th, 2004 Establishing the Uniqueness of the Human Voice for Security Applications Naresh P. Trilok, Sung-Hyuk Cha, and Charles C.
A Dynamic Approach to Extract Texts and Captions from Videos
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
TIETS34 Seminar: Data Mining on Biometric identification
TIETS34 Seminar: Data Mining on Biometric identification Youming Zhang Computer Science, School of Information Sciences, 33014 University of Tampere, Finland [email protected] Course Description Content
A Simple Feature Extraction Technique of a Pattern By Hopfield Network
A Simple Feature Extraction Technique of a Pattern By Hopfield Network A.Nag!, S. Biswas *, D. Sarkar *, P.P. Sarkar *, B. Gupta **! Academy of Technology, Hoogly - 722 *USIC, University of Kalyani, Kalyani
Interactive person re-identification in TV series
Interactive person re-identification in TV series Mika Fischer Hazım Kemal Ekenel Rainer Stiefelhagen CV:HCI lab, Karlsruhe Institute of Technology Adenauerring 2, 76131 Karlsruhe, Germany E-mail: {mika.fischer,ekenel,rainer.stiefelhagen}@kit.edu
Comparison of Non-linear Dimensionality Reduction Techniques for Classification with Gene Expression Microarray Data
CMPE 59H Comparison of Non-linear Dimensionality Reduction Techniques for Classification with Gene Expression Microarray Data Term Project Report Fatma Güney, Kübra Kalkan 1/15/2013 Keywords: Non-linear
FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT MINING SYSTEM
International Journal of Innovative Computing, Information and Control ICIC International c 0 ISSN 34-48 Volume 8, Number 8, August 0 pp. 4 FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT
An Approach for Utility Pole Recognition in Real Conditions
6th Pacific-Rim Symposium on Image and Video Technology 1st PSIVT Workshop on Quality Assessment and Control by Image and Video Analysis An Approach for Utility Pole Recognition in Real Conditions Barranco
A Reliability Point and Kalman Filter-based Vehicle Tracking Technique
A Reliability Point and Kalman Filter-based Vehicle Tracing Technique Soo Siang Teoh and Thomas Bräunl Abstract This paper introduces a technique for tracing the movement of vehicles in consecutive video
Signature Verification Competition for Online and Offline Skilled Forgeries (SigComp2011)
2011 International Conference on Document Analysis and Recognition Signature Verification Competition for Online and Offline Skilled Forgeries (SigComp2011) Marcus Liwicki, Muhammad Imran Malik, C. Elisa
ARTIFICIAL INTELLIGENCE METHODS IN EARLY MANUFACTURING TIME ESTIMATION
1 ARTIFICIAL INTELLIGENCE METHODS IN EARLY MANUFACTURING TIME ESTIMATION B. Mikó PhD, Z-Form Tool Manufacturing and Application Ltd H-1082. Budapest, Asztalos S. u 4. Tel: (1) 477 1016, e-mail: [email protected]
Object Recognition. Selim Aksoy. Bilkent University [email protected]
Image Classification and Object Recognition Selim Aksoy Department of Computer Engineering Bilkent University [email protected] Image classification Image (scene) classification is a fundamental
Data, Measurements, Features
Data, Measurements, Features Middle East Technical University Dep. of Computer Engineering 2009 compiled by V. Atalay What do you think of when someone says Data? We might abstract the idea that data are
Character Image Patterns as Big Data
22 International Conference on Frontiers in Handwriting Recognition Character Image Patterns as Big Data Seiichi Uchida, Ryosuke Ishida, Akira Yoshida, Wenjie Cai, Yaokai Feng Kyushu University, Fukuoka,
A Lightweight and Effective Music Score Recognition on Mobile Phone
J Inf Process Syst, http://dx.doi.org/.3745/jips ISSN 1976-913X (Print) ISSN 92-5X (Electronic) A Lightweight and Effective Music Score Recognition on Mobile Phone Tam Nguyen* and Gueesang Lee** Abstract
Multimodal Biometric Recognition Security System
Multimodal Biometric Recognition Security System Anju.M.I, G.Sheeba, G.Sivakami, Monica.J, Savithri.M Department of ECE, New Prince Shri Bhavani College of Engg. & Tech., Chennai, India ABSTRACT: Security
Visualization of General Defined Space Data
International Journal of Computer Graphics & Animation (IJCGA) Vol.3, No.4, October 013 Visualization of General Defined Space Data John R Rankin La Trobe University, Australia Abstract A new algorithm
Florida International University - University of Miami TRECVID 2014
Florida International University - University of Miami TRECVID 2014 Miguel Gavidia 3, Tarek Sayed 1, Yilin Yan 1, Quisha Zhu 1, Mei-Ling Shyu 1, Shu-Ching Chen 2, Hsin-Yu Ha 2, Ming Ma 1, Winnie Chen 4,
Face Recognition in Low-resolution Images by Using Local Zernike Moments
Proceedings of the International Conference on Machine Vision and Machine Learning Prague, Czech Republic, August14-15, 014 Paper No. 15 Face Recognition in Low-resolution Images by Using Local Zernie
How To Use Neural Networks In Data Mining
International Journal of Electronics and Computer Science Engineering 1449 Available Online at www.ijecse.org ISSN- 2277-1956 Neural Networks in Data Mining Priyanka Gaur Department of Information and
Open issues and research trends in Content-based Image Retrieval
Open issues and research trends in Content-based Image Retrieval Raimondo Schettini DISCo Universita di Milano Bicocca [email protected] www.disco.unimib.it/schettini/ IEEE Signal Processing Society
An Energy-Based Vehicle Tracking System using Principal Component Analysis and Unsupervised ART Network
Proceedings of the 8th WSEAS Int. Conf. on ARTIFICIAL INTELLIGENCE, KNOWLEDGE ENGINEERING & DATA BASES (AIKED '9) ISSN: 179-519 435 ISBN: 978-96-474-51-2 An Energy-Based Vehicle Tracking System using Principal
Extend Table Lens for High-Dimensional Data Visualization and Classification Mining
Extend Table Lens for High-Dimensional Data Visualization and Classification Mining CPSC 533c, Information Visualization Course Project, Term 2 2003 Fengdong Du [email protected] University of British Columbia
Automatic Calibration of an In-vehicle Gaze Tracking System Using Driver s Typical Gaze Behavior
Automatic Calibration of an In-vehicle Gaze Tracking System Using Driver s Typical Gaze Behavior Kenji Yamashiro, Daisuke Deguchi, Tomokazu Takahashi,2, Ichiro Ide, Hiroshi Murase, Kazunori Higuchi 3,
Cyber Graphics. Abstract. 1. What is cyber graphics? 2. An incrementally modular abstraction hierarchy of shape invariants
Preprint of the Keynote Paper: Tosiyasu L. Kunii, Cyber Graphics, Proceedings of the First International Symposium on Cyber Worlds (CW2002), November 6-8 2002 Tokyo, Japan, in press, IEEE Computer Society
Palmprint Recognition. By Sree Rama Murthy kora Praveen Verma Yashwant Kashyap
Palmprint Recognition By Sree Rama Murthy kora Praveen Verma Yashwant Kashyap Palm print Palm Patterns are utilized in many applications: 1. To correlate palm patterns with medical disorders, e.g. genetic
