Upload
juan-mestra
View
219
Download
0
Embed Size (px)
Citation preview
8/14/2019 An approach for on-line signature authentication using Zernike moments 2011.pdf
1/12
An approach for on-line signature authentication using Zernike moments
K.R. Radhika a,, M.K. Venkatesha b, G.N. Sekhar a
a B.M.S. College of Engineering, Basavangudi, Bangalore 560 019, Karnataka, Indiab R.N.S. Institute of Technology, Bangalore 560 062, Karnataka, India
a r t i c l e i n f o
Article history:
Received 17 December 2009
Available online 21 December 2010
Communicated by G. Borgefors
Keywords:
On-line signature authentication
Zernike moments
Polynomial order selection
a b s t r a c t
In this work, shape analysis of the acceleration plot, using lower order Zernike moments is performed for
authentication of on-line signature. The on-line signature uses time functions of the signing process. The
lower order Zernike moments represent the global shape of a pattern. The derived feature, acceleration
vector is computed for the sample signature which comprises on-line pixels. The Zernike moment repre-
sent the shape of the acceleration plot. The summation value of a Zernike moment for a signature sample
is obtained on normalized acceleration values. This type of substantiation decreases the influence of pri-
mary features with respect to translation, scaling and rotation at preprocessing stage. Zernike moments
provide rotation invariance. In this investigation it was evident that the summation of magnitude of a
Zernike moment for a genuine sample was less as compared to the summation of magnitude of a impos-
ter sample. The number of derivatives of acceleration feature depends on the structural complexity of the
signature sample. The computation of best order by polynomial fitting and reference template of a sub-
ject is discussed. The higher order derivatives of acceleration feature are considered. Signatures with
higher order polynomial fitting and complex structure require higher order derivatives of acceleration.
Each derivative better represents a portion of signature. The best result obtained is 4% of False Rejection
Rate [FRR] and 2% of False Acceptance Rate [FAR].
2010 Elsevier B.V. All rights reserved.
1. Introduction
Anincreasing numberof banks andcompaniesaim to move secu-
rity from simple static passwords to more dynamic security mea-
sures to suit the comfort level of the user in mobile-commerce and
web-commerce. The most personal way for authentication is sign-
ing. By providing the signature, an identity-conclusion function is
observed. The conclusion function signals the finality of providing
authentication via self-certification (Coats et al., 2007). Signatures
are non-intrusive, culturally accepted and understood proof of
authentication all over the world. New concepts that can mine
behavioral knowledgein large datasets arevery much essential. Like
fingerprint, face, irisand other biometricfeatures, signature alsohas
some common characteristics. The ubiquitous signature pattern is
storedin numberof applications andis notdependenton age(Guest,
2006). Being a behavioral pattern, it is non-invasive.
The major challenge in signature authentication is that, it is
strongly affected by user-dependencies, as it varies from one sign-
ing instance to another in a known way depending on an available
signing space. Discrimination power is achieved to deal low per-
manence and vulnerability due to forgery. In simple forgery, a
forged signature is produced with the knowledge about genuine
writers name only. In simulated forgery, a forged signature imitat-
ing reasonably a genuine signature is captured. In unskilled forger-
ies, signatures are produced by inexperienced forgers without the
knowledge of the spelling of name but are done after having ob-
served the genuine specimens closely for some time. Skilled forger-
ies are those where forgers can see the genuine signature and have
time to practice the imitations. It is well known that no two genu-
ine signatures of a person are precisely the same and some signa-
ture experts note that if two signatures written on paper were
same, then they could be considered as forgery by tracing ( Gupta
and Joyce, 2007). Any authentication system should consider sta-
tistical matching because different features are evaluated with dif-
ferent user specific thresholds. The robust acquisition procedure,
feature extraction process and classifier procedure are required
for applications such as crypto-biometrics and bio-hashing. Even
if the forger takes great pain in remembering the styles and con-
tours of the strokes, it is extremely unlikely that he/she would be
able to match the velocity profile or any other dynamic character-
istics of the original signature (Kiran et al., 2001). The work done
by Julian Fierrez provided explicit listing of 100 on-line features
(Fierrez-Aguilar et al., 2005). Using statistical parametric method,
Luan proposed a maximin distance for a subject, by ordering fea-
tures (Lee et al., 1996). k best features for which distance defined
by a criterion is largest from the rest of the entire population are
selected. Symbolic representation is a feature based approach
where, signature is described compactly to reduce enrollment data
0167-8655/$ - see front matter 2010 Elsevier B.V. All rights reserved.doi:10.1016/j.patrec.2010.12.008
Corresponding author. Tel.: +91 9845387862; fax: +91 80 26614357.
E-mail address:[email protected](K.R. Radhika).
Pattern Recognition Letters 32 (2011) 749760
Contents lists available at ScienceDirect
Pattern Recognition Letters
j o u r n a l h o m e p a g e : w w w . e l s e v i e r . c o m / l o c a t e / p a t r e c
http://dx.doi.org/10.1016/j.patrec.2010.12.008mailto:[email protected]://dx.doi.org/10.1016/j.patrec.2010.12.008http://www.sciencedirect.com/science/journal/01678655http://www.elsevier.com/locate/patrechttp://www.elsevier.com/locate/patrechttp://www.sciencedirect.com/science/journal/01678655http://dx.doi.org/10.1016/j.patrec.2010.12.008mailto:[email protected]://dx.doi.org/10.1016/j.patrec.2010.12.0088/14/2019 An approach for on-line signature authentication using Zernike moments 2011.pdf
2/12
size (Guru and Prakash, 2007). These capture feature variations in
the form of interval type data, to form a statistical parametric mod-
el. A holistic vector representation consisting of global features is
derived from the signature trajectories. Each feature value is repre-
sented in the form of an interval with the aid of their respective
mean and standard deviation values. The symbolic representation
proposed by Guru using MCYT signature corpus achieved equal er-
ror rate [ERR] of 5.35%. Hundred features provided by Kashi et al.
(1997) were used. The work has tabulated FRR and FAR for the
range of feature dependent threshold values. In the work done
by Oscar Miguel-Hurtado, time sequences of signature acquired
by the sensor are pre-processed by a dynamic time warping algo-
rithm and Gaussian mixture models (Migual-hurtado et al., 2007).
Analysis for discriminative power is done by Fishers ratio, with
Gaussian components ranging from 4, 8 and 16. The experiment
was on MCYT signature database of 2500 genuine and 2500 skilled
forgeries from 100 users. The performance of 8% EER for skilled
forgeries was achieved for a subset of 26 features. Shape matching
through particle dynamics warping (Agam and Suresh, 2007) mea-
sures similarity by an energy term which depends only on the
shape context of the particles and not on the distance between
them. Hidden Markov Model has ability to absorb both variability
and the similarity between patterns. In empirical risk minimiza-
tion principle, the decision rule is based on a finite number of
known examples in training set. It represents a doubly stochastic
process governed by an underlying markov chain with finite num-
ber of states and a set of random functions, each of which is asso-
ciated with the output-observation of one state. The best results in
terms of learning probability can be implemented with a proper
selection of a global feature. The classification, decoding and train-
ing problems are solved with forwardbackward algorithm, the
Viterbi algorithm and BaumWelch algorithm respectively. The
vector quantization for input vector is achieved by k-means algo-
rithm. Forward algorithm is used to determine the verification
probability. The work proposed by Fierrez et al. (2007) achieved
0.74% and 0.05% EER for skilled and random forgeries respectively
with a posteriori user-dependent decision threshold. The databaseconsisted 145 subjects comprising 3625 client signatures, 3625
skilled forgeries and 41,760 random imposter attempts. In an an-
other regional based statistical method, one dimensional fractal
coding was performed for persian on-line signature recognition.
The n spatially uniform points with range segment centriod, do-
main segment start point number and range to domain transfor-
mation parameters were sampled (Mozaffari et al., 2006). The
mapping vector accumulator recorded the angle and magnitude
of domain-range mapping vector. Multiple mapping vector accu-
mulator and multiple domain-range co-location matrix [MDRCLM]
was used for a signature locus. The work done by Saeed Mozaffari
achieved 83% recognition rate using MDRCLM on entropy and mo-
ment. This was tested on a database of 15 signature classes, each
containing 10 unconstraint samples gathered by a hyper pen1200u digitizer tablet. Each of the sample was normalized into
300 spatially uniform points.
The synergistic method definition of a ballistic stroke using
kinematic theory of rapid human movements was given by
Plamondon et al. (2007). The model lead to trajectory reconstruc-
tion, both in spatial domain and in the kinematic domain. The
study of outlier patterns for interactive comparative analysis by
Djioua et al. (2006) represented rapid human movements in vecto-
rial version. The delta-log normal model can produce smooth con-
nections by ensuring the deformed strokes which are consistent.
The kinematics theory describes the basic properties of a single
stroke and how strokes can be added vectorially to generate a sig-
nature, from a given series of input commands. The commands are
fed alternatively in two competing systems, agonist system andantagonist system to the direction of movement. The overall syn-
ergy controls the pen tip velocity to produce a signature. Panel
interface was used to display simulated signals of the test pattern
and to compare with standard pattern visually.
1.1. Zernike moments
Orthogonal Zernike momentsaredefinedby the projection of the
imagefunctionf
(x
,y
) within theunitcircle onto thecomplex Zernike
polynomials. The Zernike invariants are the magnitudes of the real
and imaginary componentsof the resultingmoments. When images
are normalized in terms of regular low-level central geometric mo-
ments, the derived Zernike moments will be invariant to rotation,
translation and scale. The image can be decomposed into a sum of
basic structures. The polynomial set covers the interior of the unit
circlex2 +y2 = 1. Zernike moments are orthogonally stable and pro-
vide image reconstruction. The choice of the Zernike method will
avoid skeletonization as compared to Fourier descriptors (Milgram
et al., 1990). Rotation in spatial domain implies a phase shift to the
Zernike moments. The orthogonal property enables to separate out
the individual contribution of each order moment to reconstruction
process (Amin and Subbalakshmi, 2004).
Some of the applications of Zernike Moments are robust image
water marking, iris, face, palm print, gait and Devanagiri handwrit-
ten numeral identifications (Xiao and Yang, 2008; Hse and Richard
Newton, 2004; Wiliem et al., 2007; Hanmandlu and Murthy, 2007;
El-ghazal et al., 2007). The optimum automatic thresholding is
achieved using the phase of Zernike moments for edge detection
(Belkasim et al., 2004). Wave aberrations in an optical system with
a circular pupil are accurately described by a weighted sum of Zer-
nike polynomials. The better classification accuracy and noise
robustness to white Gaussian noise are achieved compared to blur
invariant analysis methods based on complex moments (Zhu et al.,
2009). The Zernike moment provide expression efficiency, fast
computation and multi-level representation for describing the var-
ious shapes of pattern (Bin and Xiong, 2002). Haddadnia et al.
(2002) and Pang et al. (2004) explored the use of pseudo Zernike
moment invariants as facial features for face recognition. In thework done byChen and Srihari (2005)for off-line signature verifi-
cation with an on-line flavor, Zernike is applied for upper and low-
er contours of signature. The signature is segmented into 20 small
curves linearly so that shape feature can be separately computed
for each contours. Sixteen moments, up to order six are extracted.
16 2 20 feature values were extracted from a signature. Apply-ing harmonic distance as similarity measure, 83.7% acceptance rate
and 83.4% rejection rate was achieved. The shape characteristic of
derived feature acceleration under continuous dynamic program-
ming provided genuine acceptance rate of 97% and imposter rejec-
tion rate of 92% using MCYT-100 on-line signature database
(Radhika et al., 2009). The acceleration vector is fed as input to Zer-
nike moment summation value computations. The imposter rejec-
tion rate of 90% and genuine acceptance rate of 80% is achieved(Radhika et al., 2009). This paper proposes higher order derivatives
of the acceleration vector with a novel reference template selection
method.
Some challenges exist while implementing Zernike moments in
an application. The scale and translation invariance cannot be
explicitly achieved. One of the indirect approaches is through
expressing moments using centralized and normalized regular mo-
ments (Binand Xiong, 2002; Belkasim et al., 2007). The square to
circular mapping during the computation of moments lead to geo-
metrical error. It is minimized by mapping all the pixels inside the
unit disk. The numerical error is caused by double integral and the
use of the truncated approximation series of Zernike moments
(Wee and Paramesran, 2007). It is eliminated by integrating poly-
nomials over corresponding intervals of pixels. Less shape informa-tion is used for skewed and stretched shapes (Zhang and Lu, 2002).
750 K.R. Radhika et al. / Pattern Recognition Letters 32 (2011) 749760
8/14/2019 An approach for on-line signature authentication using Zernike moments 2011.pdf
3/12
1.2. Feature extraction using zernike moments
The lower order moments represent the global shape of a pat-
tern and the higher order, the detail (Padilla-Vivanco et al.,
2003). High order Zernike moments are more sensitive to noise(Milgram et al., 1990). The zeroth order moment represents the
mean intensity value in an image neighbourhood and first-order
moments are related to the centre of gravity of the intensity sur-
face. The second-order moment captures the variance of the inten-
sity levels present in the local neighbourhood, so on (Chen et al.,
2005). In this paper, we aim to work on magnitude of summation
of lower order Zernike moments with a derived feature. This leads
in reducing response time of the system as higher order moments
take significantly longer time to compute. The Euclidean norm is
applied to each of the vector representing the acceleration value
for each on-line pixel. The maximum euclidean norm value of
acceleration values is used for normalization. The magnitudes of
a rotated image are same as compared to the magnitudes of the
image before rotation as shown inFig. 1.
2. Formulation
The Zernike functions are a product of the radial polynomials
with sine and cosine functions. As stated earlier, Zernike moments
have simple rotational symmetry properties, which lead to a poly-
nomial product of formz[q]g[h], whereq ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffix2 y2
p andg[h] is a
continuous function that repeats every 2p radians. This satisfiesthe requirement that, rotating the co-ordinate system by an angle
adoes notchange the formof the polynomialg[h+ a] (Wyant,1992).
The other property of Zernike polynomials is that the radial
function must be a polynomial in q of degree 2n and contain noexponent ofq less than m. n is order number and m is a variablewith a value less than are equal to n. Bothn andm are non-nega-
tive integers. Further,z[q] must be even ifmis even and odd ifmisodd.z[n, m,q] is a polynomial of order 2n and it can be written as
Xnms0
1s 2nms!
s!ns!nms!q2nsm: 1
The radial polynomials are combined with sines and cosines as
z[n, m,q]cos[mh], z[n, m,q]sin[mh] where cosh xffiffiffiffiffiffiffiffiffix2y2
p andsinh yffiffiffiffiffiffiffiffiffi
x2y2p .
3. Proposed system
3.1. Feature vector calculation
From signature samples, on-line features such as x,y, pressure,azimuth and inclination in three dimensional space are extracted.
Azimuth is the angle between thez-axis and the radius vector con-
necting the origin and any point of interest. Inclination is the angle
between the projection of the radius vector onto thexyplane and
thex-axis. z-axis is the pressure axis. The range ofx, y,z, azimuth
and inclination are [012,699], [09649], [01024], [0360] and
[090], respectively. The different combinations of the five time
functions in presence or absence of time variability is studied
(Houmani et al., 2009).
P is the point of interest. O is the origin. The radial distance of
a point from origin is calculated asr= (x2 +y2 +z2)1/2.u and h are
Fig. 1. Rotation invariant property.
(a) (b) (c)
Fig. 2. (a) Representation of spherical coordinates. (b) 2D cross sectional view ofXYplane. (c) Representation of unit vectors.
K.R. Radhika et al./ Pattern Recognition Letters 32 (2011) 749760 751
8/14/2019 An approach for on-line signature authentication using Zernike moments 2011.pdf
4/12
measured.Sis the distance of the projection from point of interest
to thez-axis as shown in Fig. 2(a). In Fig. 2(b), S is the displacement
vector from the origin to projection of point of interest to xy
plane. We can equate the two values of S as (x2 +y2)1/2 = r sinh.
UsingFig. 2(b), x= S cosu andy= S sinu. Substituting for S, x= rsinhcosu andy = rsinhsinu. FromFig. 2(a),z= rcosh.
The direction of rcan be analysed by keeping h andu valuesfixed.
qis the position vector of
P. ^
rpoints vertically upwards as
shown inFig. 2(c). Therefore unit vector ris @q@r
@q@r
. The directionof hcan be analysed by keeping rand u values fixed. The value ofhis increased. h points towards southwards. The unit vector h is@q@h
@q@h
. The direction of the u can be analysed by keeping randhvalues fixed. The value ofu is increased. upoints towards east-
wards. The unit vector u is @q@u
h i. @q@u
. r, h, u forms the orthogonal
basis. The three components ofrare [x,y,z] = [r sinhcosu, r sinhsinu,rcosh]. q rsinhcosu^x rsinhsinu^y rcoshz. The position vectorq rr. So, the velocity is dq
dt dr
dtr rr0 ~v rr0 hrh0 urusinh
(http://www.scar.utoronto.ca/pat/fun/NEWT3D/PDF/VECTRS3D.
PDF). Differentiating,
~a rr00 rh02 ru02sin2h h 1
rddt
r2h0 ru02sinhcosh
u 1
rsinh
d
dt r2u0sin2h
: 2
The derivation of~a is given inAppendix A.
3.2. Lower order Zernike moment selection
The moment should provide, a descriptive power with a simi-
larity ordering for genuine samples to achieve classification and
compact in size to minimize the storage requirement. The transfor-
mation gives an infinite sequence of moments, while separability
of feature space is guaranteed (Nassery and Faez, 1996). Signature
is a ballistic motion without feedback.
Fourty-eight Zernike polynomials are generated in polar co-
ordinates for n< m values substituted in (2). In these set of polyno-
mials, the six Zernike polynomials with n = m values are selected.
These are of the order (1,1), (2,2), (3,3), (4,4), (5,5) and (6,6). Each
of the training sample is subjected to Zernike polynomial order and
moment summation values are calculated as explained in Section
1.2. It was evident that, the magnitude of summation values of
genuine samples were less than forged samples summation values
(vice versa).Fig. 3(a) and (b) depict the moment summation values
of genuine and imposter samples for a person. The summation val-
ues are in the range of [10281029] for genuine samples and for
imposter samples they are in the range of [10321033].
In the proposed work,Pttraining samples are selected for each
subject. Pt ranges from 5 to 10. The two measures of threshold,
average and maximum average difference are considered. The
average value [ag] is found using the moment summation values,
Ztotal for Pt training samples. The maximum average difference
[agmax] measure is the highest difference value between Ztotal
andag, considering all the Ptraining samples. The testing samples
are compared with threshold to find FRR and FAR. The summation
value less than or equal to threshold leads to acceptance. The sum-
mation value greater than threshold lead to rejection. The experi-
ment was conducted for 30 people on all six polynomials with
n= musing (1). Considering only the sine components for n= mor-
der, an optimistic order with lesser FRR and FAR for same row was
not indicated as shown inTable 1.
Continuing the experiment for only cosine components for
n= m orders, sixth row inTable 2led to lesser values in both FRR
and FAR columns. The experiment generated (6,6) as an optimistic
order under agmax threshold.
The results are shown in Fig. 4(a) and (b). After selecting the or-
der 6 as best fit Zernike polynomial for the acceleration values cal-
culated using (2), the other variation for n= 6 and m ranging from 0
to 6 were considered (Wyant, 1992).Table 3shows FRR and FAR
Fig. 3. (a) Zernike summation values for 25 genuine samples of order (6,1). (b) Zernike summation values for 25 forged samples of order (6,1).
Table 1
Zernike moments ofn = m order with sine components.
n m Zernike
coefficient
FRR in %
using ag
measure
FAR in %
using ag
measure
FRR in %
using agmax
measure
FAR in %
using agmax
measure
1 1 qsin[h] 12.53 2.83 6.23 6.562 2 q2sin[2h] 11.7 2.83 7 5.53 3 q3sin[3h] 8.96 4.73 6.8 5.134 4 q4sin[4h] 7.93 5.26 7.3 4.835 5 q5sin[5h] 4.9 6.5 6.83 5.566 6 q6sin[6h] 5.56 7.2 6.73 5.16
Table 2
Zernike moments ofn = m order with cosine components.
n m Zernike
coefficient
FRR in %
using ag
measure
FAR in %
using ag
measure
FRR in %
using agmax
measure
FAR in %
using agmax
measure
1 1 qcos[h] 13.43 1.7 7.4 5.72 2 q2cos[2h] 7.9 5.2 8.3 63 3 q3cos[3h] 7.16 5.9 6.9 5.64 4 q4cos[4h] 6.7 6.5 6.8 5.65 5 q5cos[5h] 5.96 6.83 6.36 5.766 6 q6cos[6h] 5.76 6.06 6.23 5.3
752 K.R. Radhika et al. / Pattern Recognition Letters 32 (2011) 749760
http://www.scar.utoronto.ca/pat/fun/NEWT3D/PDF/VECTRS3D.PDFhttp://www.scar.utoronto.ca/pat/fun/NEWT3D/PDF/VECTRS3D.PDFhttp://www.scar.utoronto.ca/pat/fun/NEWT3D/PDF/VECTRS3D.PDFhttp://www.scar.utoronto.ca/pat/fun/NEWT3D/PDF/VECTRS3D.PDF8/14/2019 An approach for on-line signature authentication using Zernike moments 2011.pdf
5/12
8/14/2019 An approach for on-line signature authentication using Zernike moments 2011.pdf
6/12
values for the two measures of threshold ofn= 6 order. The exper-
iment generated (6,1) as an best fitting order.
3.3. Polynomial order and reference template selection procedure for a
subject
In the proposed system the reference template of a person is se-
lected according to leave-one-out method. The genuine signaturesamples of a subject vary in length. ~xt and~yt represent on-linepixel co-ordinates. In the set of normalization techniques such as
minmax, decimal scaling,z-score, median, median absolute devi-
ation, etc., minmax normalization is best suited for the case
where the bounds are known (Jain et al., 2005). The minmax nor-
malization is achieved using(3) and (4).
~ynti ~yti minyQ
maxy miny; i2 1;2;. . .; length~ytf g andQ 512;
3
~xnti ~xti minxQ
maxxminx; i2 1;2;. . .; length~xtf g andQ 512;
4
~ar;ot is the reference sample acceleration vector, ~as;jt is trainingsample acceleration vector as shown in Fig. 5(a) and (b). r, sindicate
reference and training sample. o,j indicate {1, 2,3,4} order ofrand s,
respectively. The value ofQrepresents the maximumx andy co-
ordinate value. The sample is normalized to Q Qsize. Dynamic
time warping is utilized to match two signature sequences so that
correspondent characteristic point pair can be extracted from the
matching result (Chen et al., 2009). Dynamic time warping proce-
dure is applied on the acceleration vectors as shown in Fig. 5(c).
The mean of acceleration values according to position are calculated
leading to 101 parts to form ~cr;ot and~cs;jt vectors as shown inFig. 5(d). The normalization technique applied is z-score. z-score
is calculated using the arithmetic mean and standard deviation of
the respective vector values. The resulting vectors are further nor-
malized to improve numerical properties. The translation transfor-
mation is achieved by the difference value with mean. The scaling
transformation is achieved using standard deviation.
pcoeffr;s;o pf ~cs;jt;~cr;ot
; 5
wherej ranges from 1 to the best polynomial fitting order of refer-
ence sample. The experiment checks the variance of residual values
obtained after performing polynomial fitting process using(5). Var-
iance of residual values is computed up to fourth-order polynomial
fitting for each subject. The sample leading to minimum variance is
selected as reference template. The order of acceleration derivative
for a subject is one less than the best polynomial fitting order of ref-
erence sample.Acceleration vector of a sample represents the transformed ver-
sion of the sample. The proposed work supports the renewability
capacity by achieving only the transformed sequence derivatives.
These incorporates the protection and replacement of features
which will be useful in cancelable biometrics (Maiorana et al.,
2010).
1 2 3 4 5 6 7 8 9 102
1.5
1
0.5
0
0.5
1
1.5x 10
7
SlopeValues
Training Samples
0 5 10 152
1.5
1
0.5
0
0.5
1
1.5x 10
7
Testing Samples
SlopeValues
1 2 3 4 5 6 7 8 9 102
1.5
1
0.5
0
0.5
1
1.5
2x 10
4
Training Samples
Y
InterceptValues
0 5 10 151.5
1
0.5
0
0.5
1
1.5x 10
4
Testing Samples
Y
InterceptValues
a b
c d
Fig. 6. Variation inp1(1) andp1(2) values (green-genuine and red-imposter). (For interpretation of the references to colour in this figure legend, the reader is referred to theweb version of this article.)
754 K.R. Radhika et al. / Pattern Recognition Letters 32 (2011) 749760
8/14/2019 An approach for on-line signature authentication using Zernike moments 2011.pdf
7/12
8/14/2019 An approach for on-line signature authentication using Zernike moments 2011.pdf
8/12
3.4. Higher order acceleration values
~at ~atix;~atiy;~atiz
i2 1;2;. . . ;nf g; 6~a0t ~a0tix;~a
0tiy;~a0tiz
i2 1;2;. . . ;nf g 7(6) and (7) represent ~at and~a0t. The direction cosines of~at,~a0t,~a00t and~a000t are given in Appendix A. The higher order deriv-atives are implemented using symbolic mathematical tool (http://
www.mathworks.com/help/toolbox/symbolic/brvfu8o-1.html).
3.5. Algorithm: computation of summation value for a sample
1. ForNpeople
2. For each on-line signature sample ofm on-line pixels
2.1. For 2 to m
a. The derivative vectors ofr0,h0, u0,r2h0,r2u0sin2h, r00arecalculated.
2.2. For 1 to m
a.[r[1], r[2], r[3]], [h[1], h[2], h[3]], [u[1], u[2], u[3]],
[d^r[1], d^r[2],dr[3]], [dh[1], dh[2], dh[3]], [du[1], du[2], du[3]] vectors are
calculated.
b. The acceleration vector is calculated using (2).
c. [acc[1], acc[2], acc[3]] The order of derivative
equal to the polynomial order-1.
d. accnorm = Euclidean norm (acc[1],acc[2],acc[3]).
2.3. The maximum-accnorm is found.
2.4. For 1 to m
a. The order of Zernike moment is selected.
b. norm-acc-value = accnorm/maximum-accnorm.
c. new-radial-distance = applying Euclidean distance
measure between positional value, norm-acc-value.
d. Zmoment-of-each-pixel = applying new-radial-
distance to selected Zernike moment order, momentvalue is calculated.
2.5. Ztotal = Summation of Zmoment-of-each-pixel is
calculated.
4. Evaluation of order accuracy
~p1 pf~x;~y;order; ~p1 p11;p12;. . . ;p1order 1f g; 8
~y p11~xp12: 9
From (5)the best fit order of the subject is found using acceleration
vector of the signature as the feature vector. To further evaluate the
classification, cartesian domain behavior of on-line signature signal
is considered. The selected order from (5)is applied to~x, ~yfor poly-
nomial fitting in (8). The first two coefficients are used for hypothet-
ical linear plot.
Fig. 6(a) and (b) shows the variation in p1(1) values in training
and testing samples. The imposter training samples have lesser
slope values than genuine training samples represented in red col-
or.Fig. 6(c) and (d) shows the variation in p1(2) values in training
and testing samples. The imposter training samples achieved high-
ery intercept values than genuine training samples represented in
red color. The value ofxis used to evaluate the value ofyusing (9).
xis independent variable and
yis dependent variable. The plot ob-
tained by applying(9) for training samples is shown by Fig. 7(a).
This indicates that the direction corresponding to genuine samples
are parallel to each other. The direction of imposter samples differ
from genuine samples. From testing samples as shown inFig. 7(b)
and (c) it is evident that, the selected order provided same slope
directional variations in genuine samples.
5. Experimental results
The experiment was conducted for 100 25 2 samples usingMCYT on-line signature database. It consists of 2500 genuine sam-
ples and 2500 forged samples of 100 subjects.
5.1. Using acceleration vector
For the training samples Pt= 10, the rejection rate of 90% and
acceptance rate of 80% is achieved for (6,1) order as shown in
Fig. 8(a) (Radhika et al., 2009).
In the work done by Fierrez-Aguilar et al. (2005), the system
based on global analysis outperformed the local approach when
training sample size was 5. Continuing the experiment for Pt= 5
9 the FRR value decreased and FAR value increased with increase
in training samples. FAR and FRR are trade off against one another
(Jain et al., 2002).
Keeping track of receiving operating curve characteristics, pro-
posed system suggests Pt= 7 with EER = 4.5, as reliable value for
authentication applications using (6,1) order as shown in Table 4
andFig. 8(b). Fig. 8(c) depicts, a promising EER can be obtained
by increasing the number of training samples with ag as measure
of threshold for EER lesser than 4.5.
5.2. Using derivatives of acceleration vector
Considering training samples Pt= 7, Table 5 depicts the best
order for each subject (Radhika et al., 2011). The order represented
in table depicts the best polynomial fitting order as explained in
Section 3.3. The best polynomial order depicts the maximum deriv-
ative of acceleration vector to be considered for the subject.
~aorder1person t ~aorder1person tix; ~a
order1person tiy; ~a
order1person tiz
i2 1;2;. . . ;nf g: 10
The three components of~aorder1person are computed using(10). It is pro-vided as input to (6,1) Zernike order as explained in Section 3.2. The
subject wise best fit polynomial order depicting maximum acceler-
ation derivative is saved. The best result obtained is 4% of False
Table 4
Performance for various values ofP.
Pt FRR in % using agmax
measure
FAR in % using agmax
measure
FRR in % using ag
measure
FAR in % using ag
measure
Total time for 100 people in
seconds
Pt= 5 8.12 3.63 7.63 4.27 2.0175E+2
Pt= 6 5.2 4.33 7.25 4.25 2.020E+2
Pt= 7 4.61 4.71 7.2 4.21 2.011E+2
Pt= 8 4.56 4.99 6.72 4.16 2.013E+2
Pt= 9 4.49 5.47 6.11 4.25 2.016E+2
Pt= 10 4.42 5.58 5.46 4.32 2.010E+2
756 K.R. Radhika et al. / Pattern Recognition Letters 32 (2011) 749760
http://www.mathworks.com/help/toolbox/symbolic/brvfu8o-1.htmlhttp://www.mathworks.com/help/toolbox/symbolic/brvfu8o-1.htmlhttp://www.mathworks.com/help/toolbox/symbolic/brvfu8o-1.htmlhttp://www.mathworks.com/help/toolbox/symbolic/brvfu8o-1.html8/14/2019 An approach for on-line signature authentication using Zernike moments 2011.pdf
9/12
Rejection Rate [FRR] and 2% of False Acceptance Rate [FAR] using
agmaxthreshold.
6. Conclusion and future work
6.1. Conclusions
In this paper a simple linear classification approach using lower
order Zernike moments involving only a derived feature such as
acceleration is proposed for the authentication of on-line hand
written signature with less computational time. Although previous
work done have lead to better results with lot of preprocessing
steps like segmentation, warping and probability structures, an at-
tempt is made for arriving at a simple robust system. The less
memory method will aid in pre-embedding authentication soft-
ware to the acquisition device. The feature vector represent bio-
metric characteristics which is unique to every individual and
cannot be reproduced by an imposter.
6.2. Future work
Kinematic properties involved to perform the joint angle trajec-
tory obeys an elliptic form. Extraction principle states that, when
humans draw planar curves, the instantaneous tangential accelerationof hand decrease as the curvature increase. The general structure of
contour curvature is elliptical. The different derivatives of acceler-
ation can be considered to reconstruct the different parts of the ref-
erence template sample. Signatures with higher order polynomial
fitting and complex pole structure require higher order derivatives
of acceleration (Papaj and Hermanowicz, 2010). Each derivative
better represents a portion of reconstruction.
Acknowledgements
The authors thank J. Ortega-Garcia for the provision of MCYT
Signature database from Biometric Recognition Group, B-203, Uni-
versidad Autonoma de Madrid SPAIN (Ortega-Garcia et al., 2003).
Appendix A
r, h, u forms the orthogonal basis. The three components ofrare[rsinhcosu, rsinhsinu, rcosh]. The position vector is written as:
q rsinhcosu^xrsinhsinu^yrcosh^z: 11
Differentiating the position vector with respect to r:
@q
@r sinhcosu^xsinhsinu^ycosh^z;
@q
@r
ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffisin
2hcos2u sin2hsin2ucos2h
q
ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffisin2hcos2usin2u cos2hq
ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffisin
2hcos2h
q 1;
r sinhcosu^xsinhsinu^ycosh^z:
Differentiating the position vector with respect to h:
@q
@h rcoshcosu^xrcoshsinu^yrsinh^z;
@q
@h
ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi ffiffiffiffiffiffir2cos2hcos2ur2cos2hsin2ur2sin2h
q
ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffir2cos2hcos2u sin2u r2sin2h
q
ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffir2sin
2h r2cos2h
q r;
h coshcosu^xcoshsinu^ysinh^z:
Differentiating the position vector with respect tou:
@q
@u rsinhsinu^xrsinhcosu^y;
@q
@u
ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffir2sin
2hsin
2u r2sin2hcos2uq
ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi ffiffiffiffiffiffiffiffiffir2sin
2hsin
2ucos2uq
rsinh;
u sinu^xcosu^y:
The position vectorq rr. The velocity vector (~v) is represented as:dq
dt
dr
dtr rr0 rr0 hrh0 uru0sinh:
Table 5
ordersubjectfor 100 subjects of MCYT database.
Person Reference
sample
Best
order
Person Reference
sample
Best
order
Person1 1 2 Person51 5 3
Person2 6 4 Person52 1 4
Person3 6 4 Person53 3 2
Person4 4 4 Person54 1 4
Person5 6 2 Person55 4 3Person6 1 2 Person56 1 3
Person7 6 4 Person57 4 3
Person8 8 4 Person58 5 3
Person9 2 4 Person59 6 3
Person10 4 2 Person60 1 1
Person11 4 4 Person61 6 4
Person12 5 2 Person62 2 4
Person13 4 2 Person63 6 4
Person14 7 3 Person64 5 4
Person15 7 3 Person65 4 3
Person16 1 3 Person66 6 4
Person17 4 3 Person67 7 4
Person18 1 4 Person68 8 2
Person19 7 4 Person69 6 4
Person20 1 3 Person70 4 4
Person21 1 2 Person71 4 4
Person22 4 1 Person72 9 4Person23 3 2 Person73 1 1
Person24 2 4 Person74 5 3
Person25 5 1 Person75 4 2
Person26 6 3 Person76 6 4
Person27 8 2 Person77 7 2
Person28 6 1 Person78 4 1
Person29 8 1 Person79 4 2
Person30 3 1 Person80 5 4
Person31 6 4 Person81 4 4
Person32 6 3 Person82 1 1
Person33 8 3 Person83 4 1
Person34 6 3 Person84 9 2
Person35 8 2 Person84 9 2
Person36 1 3 Person86 8 2
Person37 5 4 Person87 6 1
Person38 8 3 Person88 4 4
Person39 4 2 Person89 5 3
Person40 8 1 Person90 8 3
Person41 8 4 Person91 4 3
Person42 8 2 Person92 6 1
Person43 4 1 Person93 6 3
Person44 5 4 Person94 1 4
Person45 5 1 Person95 5 3
Person46 8 4 Person96 6 3
Person47 6 4 Person97 9 3
Person48 7 4 Person98 1 4
Person49 3 4 Person99 2 2
Person50 5 3 Person100 1 4
K.R. Radhika et al./ Pattern Recognition Letters 32 (2011) 749760 757
8/14/2019 An approach for on-line signature authentication using Zernike moments 2011.pdf
10/12
8/14/2019 An approach for on-line signature authentication using Zernike moments 2011.pdf
11/12
8/14/2019 An approach for on-line signature authentication using Zernike moments 2011.pdf
12/12
References
Amin, Palak, Subbalakshmi, K.P., 2004. Rotation and cropping resilient data hiding
with Zernike moments. Proc. IEEE Internat. Conf. Image Process. 4, 21752178.
Agam, Gady, Suresh, Suneel, 2007. Shape matching through particle dynamics
warping. Proc. IEEE Conf. Comput. Vision Pattern Recognition 1, 17.
Bin, Ye, Xiong, PengJia, 2002. Improvement and invariance analysis of Zernike
moments. Proc. IEEE Internet. Conf. Commun. Circuits Systems West Sino Expo.
2, 963967.
Belkasim, S., Jian Gu, A., Basir, Ghazal O., 2004. The optimum automaticthresholding using the phase of Zernike moments. Proc. Midwest Symp.
Circuits Systems 3, 491494.
Belkasim, S., Hassan, E., Obeidi, T., 2007. Explicit invariance of Cartesian Zernike
moments. Pattern Recognition Lett. 28, 19691980.
Coats, W.S., Bagdasarian, A., Helou, T., Lam, T., 2007. The Practitioners Guide to
Biometrics, first ed. ABA Publications.
Chen, Y., Ding, X., Wang, P.S.P., 2009. Dynamic structural statistical model based on-
line signature verification. Internat. J. Dig. Crime Forensics 1, 2141.
Chen, Qing, Yang, Xiaoli, Zhao, Jiying, 2005. Robust image watermarking with
Zernike moments. Proc. Can. Conf. Electr. Comput. Eng., 13401343.
Chen, Siyuan, Srihari, Sargur, 2005. Use of exterior contours and shape features in
off-line signature verification. Proc. Internet. Conf. Document Anal. Recognition
2, 12801284.
Djioua, Moussa, OReilly, Christian, Plamondon, Rejean, 2006. An interactive
trajectory synthesizer to study outlier patterns in handwriting recognition
and signature verification. Proc. IEEE Internat. Conf. Pattern Recognition 1,
11241127.
El-ghazal, A., Basir, O., Belkasim, S., 2007. A new shape signature for Fourier
descriptors. Proc. Internat. Conf. Image Process. 1, 161164.Fierrez, Julian, Ortega-Garcia, Javier, Ramos, Daniel, Rodriquez, Joaquin, 2007.
HMM-based on-line signature verification: Feature extraction and signature
modeling. J. Pattern Recognition Lett. 28 (16), 23252334.
Fierrez-Aguilar, Julian, Nanni, Loris, Lopez-Penalba, Jaime, Ortega-Garcia, Javier,
Maltoni, Davide, 2005. An on-line signature verification system based on fusion
of local and global information. In: Proc. Internat. Conf. Audio Video Based
Biometric Person Authentication. LNCS, vol. 3546. Springer, pp. 523532.
Guest, Richard, 2006. Age dependency in handwritten dynamic signature
verification systems. J. Pattern Recognition Lett. 27 (10), 10981104.
Gupta, G.K., Joyce, R.C., 2007. Using position extrema points to capture shape in on-
line hand written signature verification. J. Pattern Recognition 40, 28112817.
Guru, D.S., Prakash, H.N., 2007. Symbolic representation of on-line signatures. Proc.
Internat. Conf. Comput. Intell. Multimedia Appl. 2, 313317.
Hanmandlu, M.O.V., Murthy, Ramana, 2007. Fuzzy model based recognition of
handwritten numerals. Pattern Recognition, 18401854.
Houmani, N., Garcia-Salicetti, S., Dorizzi, B., 2009. On assessing the robustness of
pen coordinates, pen pressure and pen inclination to time variability with
personal entropy. Proc. IEEE Internat. Conf. Biometrics: Theory, Appl. Systems,
159164.
Haddadnia, J., Ahmedi, M., Faez, K., 2002. An efficient method for recognition of
human faces using higher orders pseudo Zernike moments invariant. Proc. IEEE
Internat. Conf. Automatic Face Gesture Recognition, 315320.
Hse, Heloise, Richard Newton, A., 2004. Sketched symbol recognition using Zernike
moments. Proc. IEEE Internat. Conf. Pattern Recognition 1, 367370.
Jain, A.K., Bolle, R., Pankanthi, S., 2002. BIOMETRICS: Personal Identification in
Networked Society. fourth ed.. Kluwer Academic Publishers, United States of
America.
Jain, A.K., Nandakumar, K., Ross, A., 2005. Score normalization in multimodal
biometric systems. Pattern Recognition 38, 22702285.
Kiran, G.V., Srinivasa Rao Kunte, R., Samuel, Sudhaker, 2001. On-line signature
verification system using probabilistic feature modelling. Proc. Internat. Symp.
Signal Process. Appl. 1, 355358.
Kashi, R.S., hu, J., Nelson, N.L., Turin, W., 1997. On-line handwritten signature
verification using hidden Markov model features. Proc. Internat. Conf.
Document Anal. Recognition 1, 253257.
Lee, Luan L., Berger, Toby, Aviczer, Erez, 1996. Reliable on-line human signature
verification systems. Proc. IEEETrans. Pattern Anal. Machine Intell. 18,643647.
Migual-hurtado, Oscar, Lorenz, Micheal G., Mengibar-Pozo, Luis, Liu-Jimene, Judith,
2007. On-line signature verification by dynamic time warping and Gaussian
mixture models. Proc. IEEE Internat. Carnahan Conf. Security Technol. 1, 2329.
Mozaffari, Saeed, faez, Karim, Faradji, Farhad, 2006. One dimensional fractal coder
for on-line signature recognition. Proc. Internat. Conf. Pattern Recognition 2,
857860.Milgram, Maurice, Jobert, Mattieu, Lamy, Bertrand, 1990. A segmentation free
approach to symbol extraction and recognition from image document. Proc.
Workshop Machine Vision Appl. 1, 475478.
Maiorana, Emanuele, Campisi, Patrizio, Fierrez, Julian, Ortega-Garcia, Javier, Neri,
Alessandro, 2010. Cancelable templates for sequence-based biometrics with
application to on-line signature recognition. IEEE Transactions on Systems, Man
and Cybernetics Part A: Systems and Humans 40 (3), 525538.
Nassery, P., Faez, K., 1996. Signature pattern recognition using pseudo Zernike
moments and a fuzzy logic classifier. Proc. IEEE Internat. Conf. Image Process.,
197200.
Ortega-Garcia, J., Fierrez-Aguilar, J., et al., 2003. MCYT baseline corpus: A bimodal
biometric database. IEEE Proc. Vision, Image Signal Process. 150, 395401.
Papaj, Michal, Hermanowicz, Ewa, 2010. Identity verification using complex
representations of the handwritten signature. Proc. Internat. Conf. Inform.
Technol., 7982.
Pang, Y.H., Andrew, T.B.J., David, N.C.L., 2004. Face authentication system using
pseudo Zernike moments on wavelet subband. Proc. IEICE Electr. Exp. 1 (10),
275280.
Plamondon, Rejean, Li, Xiaolin, Djioua, Moussa, 2007. Extraction of delta-lognormal
parameters from handwriting strokes. J. Frontiers Comput. Sci. China 1, 106
113.
Padilla-Vivanco, A., Martinez-Ramirez, A., Granados-Agustin, F., 2003. Digital image
reconstruction by Zernike moments. Proc. Opt. Atmos. Propagation Adaptive
Systems VI 5237, 281289.
Radhika, K.R., Sheela, S.V., Venkatesha, M.K., Sekhar, G.N., 2009. Multi-modal
authentication using continuous dynamic programming. In: Proc. Internat.
Conf. Biometric ID Management and Multimodal Communication. LNCS, vol.
5707. Springer, pp. 228235.
Radhika, K.R., Venkatesha, M.K., Sekhar, G.N., 2009. On-line signature
authentication using Zernike moments. Proc. IEEE Internat. Conf. Biometrics:
Theory, Appl. Systems, 14.
Radhika, K.R., Venkatesha, M.K., Sekhar, G.N., 2011. A novel approach for
authentication of on-line handwritten signature based on residuals, poles and
zeros. Internat. J. Pattern Recognition Artif. Intell. 25 (1), 124.
Wiliem, Arnold, Madasu, Vamsi Krishna, Boles, Wageeh, Yarlagadda, Prasad, 2007. A
face recognition approach using Zernike moments for video surveillance. Proc.
RNSA Security Technol. Conf. 1, 341355.Wee, Chong-Yaw, Paramesran, Raveendran, 2007. On the computational aspects of
Zernike moments. J. Image Vision Comput. 25, 967980.
Wyant, James C., 1992. Applied Optics and Optical Engineering, vol. 1. Academic
Press.
Xiao, Degui, Yang, Lei, 2008. Gait recognition using Zernike moments and BP neural
network. Proc. IEEE Internat. Conf. Networking Sensing Control 1, 418423.
Zhu, Hongqing, Liu, Min, Ji, Hanjie, Li, Yu, 2009. Combined invariants to blur and
rotation using Zernike moment descriptors. J. Pattern Anal. Appl. 1, 12.
Zhang, Dengsheng, Lu, Guojun, 2002. Improving retrieval performance of Zernike
moment descriptor on affined shapes. Proc. IEEE Internet. Conf. Multimedia
Expo. 1, 205208.
760 K.R. Radhika et al. / Pattern Recognition Letters 32 (2011) 749760