Online Signature Verification using Dynamic Time Warping Siew Keng Chan and Yong Haur Tay Faculty of Information and Communication Technology Universiti Tunku Abdul Rahman (UTAR), MALAYSIA [email protected], [email protected]

Abstract Biometrics authentication has been gaining popularity among the industries that highly incorporate securities in their daily activities. Signature verification is one of the biometrics authentication techniques which has been used for years and publicly accepted. The ease of use of signature verification coupled with lower cost and technology advances in tablet technologies, signature verification has been adapted into applications such as credit cards transactions, checks transactions and documents verification. This paper focuses on the development of an online signature verification using Dynamic Time Warping (DTW) algorithm. The developed system would be fully described in the relevant sections as well as the techniques and implementations involved. The developed system was tested on a database in the purpose to evaluate the performance of the system. The database used in the system is obtained from Signature Verification Competition 2004 (SVC2004) which consists of genuine signatures and skilled forgery signatures. The equal error rate (EER) obtained after some experiments is 0.15 using universal threshold and 0.135 using user-based threshold with the implementation of Dynamic Time Warping (DTW) algorithm.

Keywords: Online Signature Verification, Dynamic Time Warping algorithm, Gaussian Formula, Biometrics Authentication, Thresholds

Introduction Signature verification involves the process of verifying whether a signature of a signer is true against whom the signer is claimed to be. At the beginning of its usage, signature was verified through its shapes and graphical looks by people. Over times when technology evolved, a number of methods have been developed to overcome the increasing fraudulent transactions caused by forgery signatures and to meet the increasing needs of lower security authentication for instance checks authentication and credit cards fraudulent.

Two types of signature verification namely online signature verification and offline signature verification are well separated by the types of input data. Online signature verification uses signatures that are taken from digitizing tablet which captures dynamic features such as coordinates, pen inclination, pressure and altitude [1]. It can be found in applications such as electronic documents verification. Offline signature verification uses signatures that are taken from the image of the signatures. It is normally found in applications such as bank checks. However, online signature verification has been widely used due to the rapid development of digitizing technology and it provides more information to the verification process compared with offline signature. Furthermore, it is harder to forge those dynamic features captured from a digitizing tablet. As a result, online signature verification is more reliable than offline signature verification. In online signature verification, dynamic features which include global and local features are captured from the digitizing tablet. Global feature describes the entire signature which includes features like signing speed and signature bounding box. Local feature describes the specific point along the trajectory of the signature such as distance and curvature change between two consecutive points. Alisher [2] had used only local features in her implementation which are the x and y offsets relative to the first point on the signature trajectory, x and y coordinate differences between two consecutive points, curvature differences between two consecutive points and critical points of signature trajectory. After the features are retrieved, most of the time the features extracted would be preprocessed using a series of technique such as smoothing, normalization and re-sampling. Smoothing is used to remove the jaggedness occur along the signature trajectory. Normalization is used to scale the signature to its width and height or either one of it. Resampling is used to remove redundant points or to resample the signature to have equidistant points. Before implementing these techniques, a number of considerations have to be taken into account as some of the characteristics of the signature would be removed from the signature which might cause inaccuracy in the verification process. H. Lei et al [1] have used size normalization to normalize the signature based on its width and height.

There are two algorithms which are used in computing the dissimilarity of two signatures which depends on the type of features used. For global features, Euclidean distance for instance would be used. This is because the number of features extracted is equal. For local features, the commonly used algorithms would be Dynamic Time Warping (DTW) and Hidden Markov Model (HMM). These two algorithms are very useful in aligning two signatures of different length. H. Let et al [1] have coupled DTW with another method known as Extended R-Squared (ER2) method to compute a similarity score of the signature. DTW was used to obtain the warped path between two signatures. Then, both signatures would be normalized to have equal length as ER2 can only be used on sequences of equal length. After the distance or dissimilarity is obtained, decision of whether to reject or accept the signature. Filters or classifiers are commonly used in the decision making. Alisher [2] has used classifiers which are Principal Component Analysis (PCA), Bayes Classifier and Support Vector Machine (SVM). Comparison has been done among these classifiers and PCA achieved the best result with Equal Error Rate of 1.46%. H. Lei et al [1] have used a formula called Gaussian formula to convert the distance obtained from DTW algorithm into a similarity score. The Gaussian Formula is (1). dist in formula (1) is the distance obtained from DTW algorithm. Md is the maximum distance obtained from stored template signatures for a particular subject.

e

− dist 2*M

d

Dynamic Time Warping (DTW) DTW algorithm is a matching technique that is used to align two sequences of different length. The general algorithm for DTW is (2).

D ( m , n ) = d ( r m , t n ) + {min( D ( m , n − 1 ), D ( m − 1 , n − 1 ), D ( m − 1 , n )}

(2)

d(rm,tn) is the distance computed for between two coordinates. The second term of the formula is to obtain the minimum distance from the correspondent points. D(m,n) would be the accumulated distance obtained so far. A warped path and an accumulated distance would be obtained from this algorithm. This is illustrated in Figure 1. Gaussian Formula Gaussian formula is used to convert the distance obtained from DTW algorithm into a manageable value or score. The formula is shown in equation (1). This score is used in determining the decision whether to accept or reject the test signature enrolled. System Description This section describes the system structure which consists of two main modules which are enrollment module and main verification module. Figure 2 shows the overall structure of the system and how the system works. The following section would explain the details of each modules and sub-modules.

(1)

Template signatures are sample genuine signatures taken from subject to build up a profile for that particular subject. An empirically selected threshold would be used to decide whether to accept or reject the signature. In evaluating the performance of the system, a series of experiments would be carried and error rates would be used as a measure of the performance. There are two error rates known as False Acceptance Rate (FAR) and False Rejection Rate (FRR). FAR describes the number of wrongly accepted forgery signatures while FRR describes the number of wrongly rejected genuine signatures. EER is used to describe the error rate where FAR and FRR are equal.

Approach and Methods This section would explain the approaches and methods implemented. The algorithm used is DTW algorithm. Gaussian formula is used to convert the distance obtained from DTW algorithm into a similarity score. This score would be used to compare with a threshold to make the decision whether to accept or reject the signature.

Figure 1: This figure is the illustration of DTW algorithm which shows the possible warped path. The accumulated distance would be obtained from the top right. Enrollment Module Enrollment module is part of the system that collects and generates the necessary profiles of subjects. Enrollment module consists of three sub-modules which are enrollment

sub-module, database generator sub-module and database sub-module. Enrollment sub-module is where six reference signatures are taken from each subject to generate a set of statistics. This set of statistics consists of the user-based threshold, maximum distance and minimum distance obtained from the reference signatures of the subject and stored in a text file. The text file is named after the subject ID. Each subject is given an ID for part of the verification purposes. The database generator sub-module contains the preprocessing process, the feature extractions process and the DTW algorithm. These processes are the same for the distance computation sub-module in the main verification module. The pre-processing process involves the size normalization process where the sequence is normalized based on its width and height. The features extracted from the sequences include:• Distance of x and y coordinates • Curvature distance • Distance of two consecutive points • Distance of each point from the first point All the features are extracted using the Euclidean distance formula (3) except for curvature distance. d is the distance to be obtained. x and y are the coordinates of the points.

d =

(xm − xn )2 + (ym − yn )2

(3)

The curvature distance would first obtain the speed of each point using formula (4). Then, the curvature distance would be obtained using formula (5). x and y are the coordinates of the points for both formulas. d is the speed and c is the curvature distance of the particular point.

dx = i

d

yi

=

( xi −1 − xi +1 ) 2 + ( y i −1 − y i +1 ) 2 ( xi −1 − x i +1 ) 2 + ( y i −1 − y i +1 ) 2

c x = (d x i

cy = (d x i

i −1

× d x ) 2 + (d y i +1

i −1

× d y )2

i −1

× d y )2

2

i −1

× d x ) − (d y i +1

(4)

i +1

i +1

Data acquisition sub-module is where a test signature would be obtained from the subject using a digitizing tablet. The tablet would store the necessary information such as x and y coordinates into a text file. Distance computation sub-module performs the same operations as the database generator sub-module in enrollment module. The processes involved are preprocessing technique, feature extraction process and DTW algorithm. All the templates signatures would be pair wised with the test signature and a minimum distance would be obtained from the list of distances. The minimum distance would then be converted into a score using the Gaussian formula. The score would be used by the verification submodule. The verification sub-module would retrieve the thresholds of the subject which is stored in the subject’s profile using the ID supplied from the database. Two types of threshold would be retrieved which are user-based threshold and universal threshold. The user-based threshold is varied among subjects while the universal threshold is the same for all subjects. If the score is less than the threshold, the test signature would be rejected as forgery signature and vice versa.

Results There are two experiments carried out to test the performance of the system using the database obtained from SVC2004. In this database, there are 85 subjects each with 40 genuine signatures and 40 forgery signatures.

xi −1 − xi +1 y i −1 − y i +1

Main Verification Module Main verification module is part of the system that performs the verification process using the information generated in the enrollment module for each subject. This module consists of three sub-modules which are data acquisition sub-module, distance computation sub-module and verification submodule.

(5)

The DTW algorithm aligned the two sequences and produced a distance between the two distances. This distance is then converted into score using Gaussian formula. The database sub-module is where all the profiles generated for each subject are kept. All the files are named accordingly using the subjects’ ID.

The first experiment was to test the system’s performance using the DTW algorithm on universal threshold and userbased threshold. The second experiment was to discriminate the difference between the Dmax and Dmin in the Gaussian formula. Dmaz is the maximum distance obtained from the pair wise alignment of the six template signatures and Dmin is the minimum distance. The three error rates mentioned in the earlier section would be used as the measurement of the performance of the system. The EER achieved in the first experiment was 0.15 for the case of using universal threshold and 0.135 for the case of using user-based threshold. The EER achieved in the second experiment was 0.15 for using Dmin and 0.19 for using Dmax.

Enrollment Module Provide six template signatures

Database Sub-module (Stores all the subjects’ profile). The profiles will be requested by verification sub-module in the main verification module. The information sent back to the sub-module includes the thresholds.

Writer 1

Enrollment Sub-module

Text file containing x and y coordinates, time stamp, and button status. (Possible extra information: altitude, azimuth and pressure)

Scores and distances

Thresholds

Database Generator Sub-module Pre-processing Process -Size Normalization

Pass to

Feature Extractions Features are extracted from the signatures

DTW Algorithm Pass to

Distance Computation Sub-module

Text file containing x and y coordinates, time stamp, and button status. (Possible extra information: altitude, azimuth and pressure)

Input test Signature

Writer 1 (Forgery)

Writer 1 (Genui ne)

Scores computed

Request thresholds using ID

Verification Sub-module (Make decision to accept or reject the test signatures using Universal Threshold and User-based Threshold) The thresholds are obtained from database sub-module in the enrollment module.

Data Acquisition Sub-module

Main Verification Module

Figure 2: This figure shows the entire structure of the developed signature verification system.

Discussion Analysis has been carried out to study the results obtained from the first experiment using user-based threshold and universal threshold on DTW algorithm. The results show that user-based threshold performed better than universal threshold. User-based threshold was generated specially for each subject whereas universal threshold was used for all the subjects in the database. The user-based threshold was generated using the Gaussian formula using the distances obtained from the template signatures.

Analysis has been carried out to study the second experiment which was used to test the discriminative of maximum distance and minimum distance used in the Gaussian formula. Five subjects have been selected for this analysis. All the genuine and forgery signatures of each of the selected subjects were used in the analysis. Each of the signatures was pair wise aligned with the template signatures stored for the selected subjects. The minimum distance was recorded and tabulated. Minimum distance of the genuine signature class and maximum distance of the forgery signature class were obtained from the list of the distances. The margins were computed for each subject between the minimum distance of the genuine class and the maximum distance of the forgery

class. From the observation for these five subjects, the margin is larger when Dmin was used compared with the margin when Dmax was used. This shows that Dmin is more suitable to be used and provides better classification of the genuine and forgery classes.

Conclusion Throughout the research on signature verification, there are a few methods that can be used in enhancing the performance of the system and reduce the error rates. The classes of genuine signatures and forgery signatures are generally inseparable classes on the feature space. Thus, in order to separate the classes into two different classes, classifiers such as Principal Component Analysis (PCA) and Support Vector Machine (SVM) may be useful in the classification purposes. For the algorithm, DTW can be further enhanced in terms of computation time. Fast Dynamic Time Warping is a technique that reduces the computation time. In terms of feature extractions, more features can be studied and used in the system such as the global features. Global features can be viewed as important features as local features defining the signatures. With more discriminative features implemented, the system perhaps can perform better in the verification module.

References [1] H.Lei, S.Palla and V.Govindaraju, “ER²: an intuitive Similarity Measure for On-Line Signature Verification”, Center for Unified Biometrics and Sensors (CUBS), State University of New York at Buffalo, USA. [2] A.A.Kholmatov, “Biometric Identity Verification using On-Line & Off-Line Signature Verification”, Graduate School of Engineering and Natural Sciences, Sabanci University, Spring 2003 [3] H.Lei, V.Govindaraju, “A Comparative Study on the Consistency of Features in On-Line Signature Verification”, CUBS, Center for Unified Biometrics and Sensors, State University of New York at Buffalo, Amherst, NY 14620, USA [4] R.Martens, L.Claesen, “Dynamic Programming Optimization for On-line Signature Verification”, IEEE 1997 [5] V.S. Nalwa, “Automatic On-Line Signature Verification”, Proceedings of the IEEE, Vol 85, No.2 February 1997. [6] R.Martens, L.Claesen, “On-Line Signature Verification by Dynamic Time Warping”, Proceedings of ICPR ‘96 [7] R.Niels, “Dynamic Time Warping, An Intuitive Way for Handwriting Recognition”, Radboud University Nijmegen, The Netherlands, November/December 2004. [8] S.Salvador, P.Chan, “FastDTW: Toward Accurate Dynamic Time Warping in Linear Time and Space”, Dept. of Computer Sciences, Florida Institute of Technology [9] D-Y.Yeung, H.Chang, et al, “SVC2004: First International Signature Verification Competition”, 2004

Online Signature Verification using Dynamic Time ... - Semantic Scholar

Online Signature Verification, Dynamic Time Warping ... applications such as bank checks. ... achieved the best result with Equal Error Rate of 1.46%. H. Lei et al ...

107KB Sizes 1 Downloads 284 Views

Recommend Documents

Multi-Window Time-Frequency Signature ... - Semantic Scholar
Hermite functions, missing samples, multi-window time-frequency representation, multiple ... These motions generate sidebands about the ... and the applications of associated sparse reconstruction techniques for effective joint-variable.

Multi-Window Time-Frequency Signature ... - Semantic Scholar
Radar offers privacy and non-intrusive monitoring capability. Micro-. Doppler .... In order to obtain a good estimate of the. TFR, we use ..... compare the performance of sets of windows based on Slepian and Hermite functions. The measured ...

Online Signature Verification using PCA and Neural ...
vision-based ones include voice recognition and signature verification. Signature has been a ... electronic payments, access control, and so on. In this paper ...

Online Signature Verification using PCA and Neural Network - IJRIT
includes online banking transactions, electronic payments, access control, and so on. ... prevalence of credit cards and bank cheques has long been the target of ...

Online Signature Verification using PCA and Neural Network - IJRIT
Signature verification can be applied in commercial fields such as E-business, which includes online banking transactions, electronic payments, access control, ...

Online Signature Verification using PCA and ... - IJRIT
vision based techniques include face recognition, fingerprint recognition, iris scanning and retina scanning and the vision-based ones include voice recognition ...

Allocating Dynamic Time-Spectrum Blocks for ... - Semantic Scholar
[email protected]. ABSTRACT. A number .... prototype we are currently developing at Microsoft [24]. The ..... three consecutive time-windows [tcur, tcur + Γ], at least one of which it ...... Assignment for Mobile Ad Hoc Networks. In I-SPAN ...

Allocating Dynamic Time-Spectrum Blocks for ... - Semantic Scholar
The problem of allocating spectrum in cognitive radio net- works poses new challenges that do not arise in traditional wireless technologies, including Wi-Fi.

implementing dynamic semantic resolution - Semantic Scholar
testing of a rule of inference called dynamic semantic resolution is then ... expressed in a special form, theorem provers are able to generate answers, ... case of semantic resolution that Robinson called hyper-resolution uses a static, trivial mode

implementing dynamic semantic resolution - Semantic Scholar
expressed in a special form, theorem provers are able to generate answers, .... First Australian Undergraduate Students' Computing Conference, 2003 page 109 ...

Dynamic Channel Allocation Using a Genetic ... - Semantic Scholar
categorised in terms of a Channel Allocation Matrix. A novel. Dynamic ... same category in the proposed Channel Allocation Matrix. .... Priority decrease. 3 5 2 11 9. Fig. 5. An example of an individual's string representation. The fitness value is e

Dynamic Channel Allocation Using a Genetic ... - Semantic Scholar
Internet users that do not enjoy fast access networks. Broadband fixed wireless access (BFWA) networks can be rapidly deployed and provide data rates that current Internet users demand. Typical BFWA network components are the ..... operating in the 5

using rapd markers - Semantic Scholar
based on this, cluster analysis was done using minimum variance algorithm. Cluster analysis showed two major groups. Each sub-group was characterized ...

using rapd markers - Semantic Scholar
RAPD data were used to calculate a Squared Euclidean Distance matrix, and based on this, cluster ... Africa, South-East, Asia, U.S.A, Brazil, Australia and. Turkey. In some ... homogenate was cooled to room temperature and extracted with 5 ...

Dynamic Approaches to Cognition - Semantic Scholar
neurocognitive model of the state of the brain-mind. In R. Bootzin, J. Kihlstrom ... nition is a dynamical phenomenon and best understood in dynamical terms. ... cal research, particularly in connectionist form (Smolensky. 1988). By the 1990s, it ...

Stable communication through dynamic language - Semantic Scholar
texts in which particular words are used, or the way in which they are ... rules of grammar can only be successfully transmit- ted if the ... are much more likely to pass through the bottleneck into the ... ternal world is not sufficient to avoid the

Dynamic Moral Hazard and Stopping - Semantic Scholar
Jan 3, 2011 - agencies “frequently” to find a wide variety of workers. ... 15% and 20% of searches in the pharmaceutical sector fail to fill a post (Pharmafocus. (2007)). ... estate agent can affect buyer arrival rates through exerting marketing

Somatosensory Integration Controlled by Dynamic ... - Semantic Scholar
Oct 19, 2005 - voltage recording and representative spike waveforms (red) and mean ..... Note the deviation of the experimental data points from the unity line.

Dynamic Moral Hazard and Stopping - Semantic Scholar
Jan 3, 2011 - agencies “frequently” to find a wide variety of workers. ... 15% and 20% of searches in the pharmaceutical sector fail to fill a post (Pharmafocus. (2007)). ... estate agent can affect buyer arrival rates through exerting marketing

Optimal Dynamic Hedging of Cliquets - Semantic Scholar
May 1, 2008 - Kapoor, V., L. Cheung, C. Howley, Equity securitization; Risk & Value, Special Report, Structured. Finance, Standard & Poor's, (2003). Laurent, J.-P., H. Pham, Dynamic Programming and mean-variance hedging, Finance and Stochastics, 3, 8

Exploring Dynamic Branch Prediction Methods - Semantic Scholar
Department of Computer Science and Engineering, Michigan State University ... branch prediction methods and analyze which kinds of information are important ...

Secure Dependencies with Dynamic Level ... - Semantic Scholar
evolve due to declassi cation and subject current level ... object classi cation and the subject current level. We ...... in Computer Science, Amsterdam, The Nether-.