SIMILARITY EVALUATION OF ONLINE SIGNATURES BASED ON MODIFIED DYNAMIC TIME WARPING

被引:19
作者
Rashidi, S. [1 ]
Fallah, A. [1 ]
Towhidkhah, F. [1 ]
机构
[1] Amirkabir Univ Technol, Fac Biomed Engn, Tehran, Iran
关键词
VERIFICATION;
D O I
10.1080/08839514.2013.813187
中图分类号
TP18 [人工智能理论];
学科分类号
140502 [人工智能];
摘要
Many people are very accustomed to the process of signing their name and having it matched for authentication. In a signature verification system, the signatures are processed to extract features that are used for verification. These features should not be duplicable. A basic problem is intraclass variations that will greatly affect the matching scores produced. The problem of distinctiveness occurs when the expectation of signatures to vary significantly between individuals is not met. There may be a large number of similarities in the feature sets used to represent the signatures of two different individuals. The efficiency of any signature verification system depends mainly on the discrimination power and robustness of the features used in the system. This study evaluates 40 functional features of viewpoint classification error and consistency for extracting the best subset once a set of features provides maximal discrimination capability between genuine and forged signatures. A modified distance of the DTW algorithm is proposed to improve performance of the verification phase. The proposed system is evaluated on the public SVC2004 signature database. The experimental results show that first, the most discriminate and consistent features are velocity based. Second, the average EER for the proposed algorithm in comparison with the general DTW algorithm shows a 5.47% decrease. Moreover, a comparative study based on a different classifier with a skilled forgery shows that the best result has an EER of 1.73% using the Parzen window classifier.
引用
收藏
页码:599 / 617
页数:19
相关论文
共 22 条
[1]
Online signature classification and its verification system [J].
Adamski, Marcin ;
Saeed, Khalid .
SEVENTH INTERNATIONAL CONFERENCE ON COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT APPLICATIONS, PROCEEDINGS, 2008, :189-194
[2]
Dolfing JGA, 1998, INT C PATT RECOG, P1309, DOI 10.1109/ICPR.1998.711942
[3]
Fierrez-Aguilar J, 2005, LECT NOTES COMPUT SC, V3781, P188, DOI 10.1007/11569947_24
[4]
Target dependent score normalization techniques and their application to signature verification [J].
Fierrez-Aguilar, J ;
Ortega-Garcia, J ;
Gonzalez-Rodriguez, J .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS, 2005, 35 (03) :418-425
[5]
Gruber C., 2010, IEEE T SYST MAN CY B, V31, P1059
[6]
Herbst N., 1979, IBM J RES DEV, V21, P245
[7]
Hu L, 2007, INT C WAVEL ANAL PAT, P1192
[8]
Jain A., 1999, Biometrics: personal identification in networked society
[9]
A FUZZY K-NEAREST NEIGHBOR ALGORITHM [J].
KELLER, JM ;
GRAY, MR ;
GIVENS, JA .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS, 1985, 15 (04) :580-585
[10]
Using geometric extrema for segment-to-segment characteristics comparison in online signature verification [J].
Lee, J ;
Yoon, HS ;
Soh, J ;
Chun, BT ;
Chung, YK .
PATTERN RECOGNITION, 2004, 37 (01) :93-103