Adaptation of Writer-Independent Systems for Offline Signature Verification

Although writer-independent offline signature verification (WI-SV) systems may provide a high level of accuracy, they are not secure due to the need to store user templates for authentication. Moreover, state-of-the-art writer-dependent (WD) and writer-independent (WI) systems provide enhanced accuracy through information fusion at either feature, score or decision levels, but they increase computational complexity. In this paper, a method for adapting WI-SV systems to different users is proposed, leading to secure and compact WD-SV systems. Feature representations embedded within WI classifiers are extracted and tuned to each enrolled user while building a user-specific classifier. Simulation results on the Brazilian signature database indicate that the proposed method yields WD classifiers that provide the same level of accuracy as that of the baseline WI classifiers (AER of about 5.38), while reducing complexity by about 99.5%.

[1]  Robert Sabourin,et al.  An extended-shadow-code based approach for off-line signature verification. II. Evaluation of several multi-classifier combination strategies , 1995, Proceedings of 3rd International Conference on Document Analysis and Recognition.

[2]  Bhabatosh Chanda,et al.  Writer-independent off-line signature verification using surroundedness feature , 2012, Pattern Recognit. Lett..

[3]  Robert Sabourin,et al.  Dynamic selection of generative-discriminative ensembles for off-line signature verification , 2012, Pattern Recognit..

[4]  Cinthia Obladen de Almendra Freitas,et al.  Bases de dados de cheques bancarios brasileiros , 1998 .

[5]  Giuseppe Pirlo,et al.  Automatic Signature Verification: The State of the Art , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[6]  Robert Sabourin,et al.  A neural network approach to off-line signature verification using directional PDF , 1996, Pattern Recognit..

[7]  Robert Sabourin,et al.  An extended-shadow-code based approach for off-line signature verification , 1993, Proceedings of 2nd International Conference on Document Analysis and Recognition (ICDAR '93).

[8]  Flávio Bortolozzi,et al.  Off-line signature verification using HMM for random, simple and skilled forgeries , 2001, Proceedings of Sixth International Conference on Document Analysis and Recognition.

[9]  Robert Sabourin,et al.  Multi-feature extraction and selection in writer-independent off-line signature verification , 2013, International Journal on Document Analysis and Recognition (IJDAR).

[10]  Paul A. Viola,et al.  Boosting Image Retrieval , 2000, Proceedings IEEE Conference on Computer Vision and Pattern Recognition. CVPR 2000 (Cat. No.PR00662).

[11]  Robert Sabourin,et al.  Improving performance of HMM-based off-line signature verification systems through a multi-hypothesis approach , 2010, International Journal on Document Analysis and Recognition (IJDAR).

[12]  Luiz Eduardo Soares de Oliveira,et al.  Off-line Signature Verification Using Writer-Independent Approach , 2007, 2007 International Joint Conference on Neural Networks.

[13]  Robert P. W. Duin,et al.  Dissimilarity representations allow for building good classifiers , 2002, Pattern Recognit. Lett..

[14]  Flávio Bortolozzi,et al.  An off-line signature verification method based on the questioned document expert's approach and a neural network classifier , 2004, Ninth International Workshop on Frontiers in Handwriting Recognition.

[15]  Robert E. Schapire,et al.  The Boosting Approach to Machine Learning An Overview , 2003 .

[16]  Pat Langley,et al.  Induction of One-Level Decision Trees , 1992, ML.

[17]  Abraham Kandel,et al.  A Feature-Based Serial Approach to Classifier Combination , 2002, Pattern Analysis and Applications.

[18]  Luiz Eduardo Soares de Oliveira,et al.  Reducing forgeries in writer-independent off-line signature verification through ensemble of classifiers , 2010, Pattern Recognit..

[19]  Sharath Pankanti,et al.  Biometrics: a tool for information security , 2006, IEEE Transactions on Information Forensics and Security.

[20]  Sung-Hyuk Cha,et al.  On measuring the distance between histograms , 2002, Pattern Recognit..