Conference PaperPDF Available

Online signature verification using GA-SVM

Authors:

Abstract and Figures

This paper presents an online signature verification system based on Genetic Algorithm-Support Vector Machine (GA-SVM). The raw information, obtained from SVC 2004 database, as time functions is used to derive 75 features. Six different groups of features have been generated from 75 features and their performance evaluated using SVM. A method is proposed to reduce the computational complexity and the amount of memory required without compromising on accuracy using the sub set of features selected by Genetic Algorithm as the input to SVM. The experimental results show that this method provides good performance in terms of accuracy and memory requirement.
Content may be subject to copyright.
2011 International Conference on Image Information Processing (ICIIP 2011)
Proceedings of the 2011 International Conference on Image Information Processing (ICIIP 2011)
978-1-61284-861-7/11/$26.00 ©2011 IEEE
Online Signature Verification using GA-SVM
Jaspreet Kour
EIE Department
Galgotias College of Engg & Tech.
Greater Noida, India
tojaspreet@gmail.com
M.Hanmandlu
EE Department
IIT
New Delhi, India
mhmandlu@gmail.com
A.Q Ansari
EE Department
Jamia Millia Islamia
New Delhi, India
aqansari62@gmail.com
Abstract— This paper presents an online signature verification
system based on Genetic Algorithm-Support Vector Machine
(GA-SVM). The raw information, obtained from SVC 2004
database, as time functions is used to derive 75 features. Six
different groups of features have been generated from 75 features
and their performance evaluated using SVM. A method is
proposed to reduce the computational complexity and the
amount of memory required without compromising on accuracy
using the sub set of features selected by Genetic Algorithm as the
input to SVM. The experimental results show that this method
provides good performance in terms of accuracy and memory
requirement.
Keywords- Biometrics, Online Signature, GA, SVM
I. INTRODUCTION
Biometrics is an emerging field of technology. It makes use
of unique but measurable physical, biological or behavioral
characteristics to perform the identity verification of a person.
Physiological biometrics is based on direct measurements
of physical parts (such as fingerprint, face, iris, hand geometry
etc.) of human body. Behavioral biometrics is based on the
measurement of an action performed (such as signature, gait,
speech, gesture etc.) by the individual [7]. The main advantage
that signature verification has over other forms of biometric
technologies is that signature is a well accepted biometric for
identity verification in our society for years. The long history
of trust of signature verification means that people are willing
to accept a signature based biometric authentication system.
But the drawback is that some people exhibit a lot of variability
between different manifestations of their signature. Also
signatures evolve with time and are influenced by physical and
emotional condition of the signatories.
Signature analysis is categorized into two modes: offline
and online. In the offline signature verification, signatures are
captured with a scanner or camera, saved and stored in
digitized form for further processing whereas the online
signature verification uses an electronic tablet and a stylus
connected to a computer to extract information about a
signature. It provides dynamic information like pressure,
velocity, acceleration, number of strokes etc.
Online signature verification is more robust, reliable and
accurate than offline signature verification, as its dynamic
properties make forging of an online signature extremely
difficult. Therefore online signature has become an attractive
biometric method in the protection of small personal devices
(PDA, small phone, laptop), in accessing sensitive data and
building, and for the authentication of internet transactions
such as e-commerce, e-banking, e-business, e-contract, etc.
In this paper, a memory efficient online signature
verification algorithm that uses the features chosen by Genetic
Algorithm (GA) as input vector to Support Vector Machine
(SVM) is presented. The online signature verification system
uses only discriminating features selected by GA, which are
unique and thus the memory requirement as well as the
computational complexity are very less.
The outline of this paper is as follows: Background for
SVM and GA is given in Section II. Section III describes the
proposed method to construct online signature verification
system. In Section IV, the results obtained from different
experiments are discussed. Section V gives conclusions and
future scope.
II. BACKGROUND
A. Support Vector Machine
Support Vector Machines (SVMs) create a margin between
two classes, thereby facilitating an effective classification.
Given the data containing two classes, SVM finds a hyper
plane, which maximizes the distance from either class to the
hyper plane and separates largest possible number of points
belonging to same class on the same side of the hyper plane.
Therefore misclassification error between the training set and
the test set is minimized.
Although in their basic form, SVMs learn linear threshold
functions, but in nonlinear case, they can be used to learn
polynomial classifiers, radial basis function (RBF) nets and
multilayer perceptron by applying appropriate kernel functions.
The dimensionality of the feature space has no direct relation to
the learnability of SVM. In other words, SVMs judge the
complexity of hypotheses underlying the classes according to
the margin that separates them. Thus, even with large number
of features, SVM pose no problem for their classification,
provided they are separable using the functions from the
hypothesis space [8].
2011 International Conference on Image Information Processing (ICIIP 2011)
Proceedings of the 2011 International Conference on Image Information Processing (ICIIP 2011)
Fea tu re
Et ti
Feature
selection
usin
g
GA
SVM
classifier
Decision
Tra in ing
classifier
B. Genetic Algorithm
Genetic algorithm (GA) is an adaptive and robust
computational procedure, modeled on the pattern of natural
genetic systems [5]. GA typically generates a constant
population of candidate solutions to the optimization problems.
Individuals are typically represented by n-bit binary vectors
and the search space corresponds to n-dimensional Boolean
space.
The goodness of each candidate solution can be evaluated
using fitness function. Evolutionary algorithms, using some
form of fitness-dependent probabilistic method, select
individual solutions from the current population to produce
solutions for the next generation. Genetic operators are applied
to selected individuals that constitute next generation. Mutation
and cross-over are two common operators used in GAs.
Mutation operator is applied on a single string to change its bits
randomly. Crossover, on other hand operates on two parent
strings to produce two offspring. The process of fitness
depends on selection of input features and application of
genetic operators to generate successive population of solutions
until a satisfactory solution is found.
III. PROPOSED METHOD
Figure 1 shows the block diagram of the proposed online
signature verification system. The whole process involves three
steps: Feature Extraction, Features Selection and Verification.
Figure 1. Block diagram of proposed online signature verification system
A. Data Base
The First International Signature Verification Competition
was held in 2004, to provide a landmark on signature
verification systems referred to as SVC2004 [10]. It contains
40 sets of signatures collected from different people and each
set consists of 20 genuine signatures and 20 skilled forgery
signatures. Signatures are acquired using WACOM Intuos
tablet dynamically, when the instrumented pen moves on the
tablet. Each signature is simply represented as a discrete time
dynamic sequence.
Figure 2. Azimuth angle and inclination angles of the pen with respect to the
plane of graphic card
The raw data of each signature consists of the following
information:
Position on the x-axis
Position on the y-axis
Time stamp
Button status
Azimuth angle of pen with respect to the tablet (Fig 2)
Altitude angle of pen with respect to the tablet (Fig 2)
Pressure
A signature along with its raw dynamic features are shown
in Figure 3
Figure 3. Example of signature(top) and its associated dynamic
information(bottom)
2011 International Conference on Image Information Processing (ICIIP 2011)
Proceedings of the 2011 International Conference on Image Information Processing (ICIIP 2011)
B. Feature Extraction
Our aim is to find the most reliable and suitable features, as
the discriminative power of features play a major role in the
whole verification process. Using a set of raw dynamic data, 75
features have been derived as shown in Table 1. They represent
a collection of some of the features that have been used, studied
and reported in literature [2].
Six different groups of features generated include: shape,
dynamics, time, velocity, geometry, and miscellaneous
features [3].
TABLE I. LIST OF FEATURES
Shape related features
1 Height to width ratio ;
2 Length to width ratio ; Lw =
3 Horizontal mean-min diff; Ycn = Ym -min(Y(k))
4 Vertical mean-min diff ; Ycn = Ym -min(Y(k))
5 Left to right side ratio ; LR =
6 Upper to lower side ratio ; UL =
7-
10 Direction histogram S =
k=2.-----K ; l= 1,2,3,4
Dynamics related features
11 Total Signature time ; T=t
k
-t1
12 Pen down time ; Td =
13 Pen down time Ratio ; Tdr = T
d
/ T
14 RMS speed ;
15 RMS – min- difference of speed ; Vm-min = V-
min(V(K))
16 Max-RMS- difference of speed`; Vma
x
-
m
= max(V(K)) – V
17 Num of positive x velocity ; NV xp = card {Vx(K):
V
(K)>0}
18 Num of negative x velocity ; NV xn = card {Vx(K):
V
(K)<0}
19 Num of positive y velocity ; NV yp = card {Vy(K):
V
y
(K)>0}
20 Num of negative y velocity ; NV yn = card {Vy(K):
V
y
(K)<0}
Time related features
21 T(2nd pen down/Ts
22 (1st T(xma
x
))/Tw )
23 (1st T(xmin))/Tw )
24 (1st T(yma
x
))/Tw )
25 (1st T(ymin))/Tw )
26 (T 2nd pen up)/Tw
27 T (V
<0 | penup)/ Tw
28 T (V
>0 | penup)/ Tw
29 T (V
y
<0 | penup)/ Tw
30 T (V
y
>0 | penup)/ Tw
31 T (V
<0)/ Tw
32 T (V
>0)/ Tw
33 T (V
y
<0)/ Tw
34 T (V
y
>0)/ Tw
35 1st t (V
y,
Min))/ Tw
36 1st t (V
y,
Ma
x
))/ Tw
37 1st t (Vx
,
Mi
n
))/ Tw
38 1st t (Vx
,
Ma
x
))/ Tw
Velocity related features
39 Std. dev. Of V
40 Std. dev. Of V
41 (Average vel. )/ Vx, max
42 / V
y
, max
43 / Vmax
44 Velocity correlation Vx,y )/
Geometry related features
45 No. of penups ; N (pen-ups)
46 No. of sign changes of dx/dt ; N(sign changes Dx/dt)
47 No. of sign changes of dy/dt ; N(sign changes Dy/dt)
48 (Standard deviation of y) /
49 (Standard deviation of x) /
50 No. of local maxima of x ; N (local maxima in x)
51 No. of local maxima of y ; N (local maxima in y)
52 (xlast
p
e
n
-u
p
– xma
x
) /
53 (x1st
p
e
n
-dow
n
– xmin) /
54 (ylast
p
e
n
-u
p
– ymin) /
55 (x1st
p
e
n
-down – ymin) /
56 (ylast
p
e
n
-u
p
– yma
x
) /
57 (x1st
p
e
n
-down – yma
x
) /
58 (xlast
p
e
n
-u
p
– xmin) /
59 (x1st
p
e
n
-dow
n
– xma
x
) /
60 (Tw)/ (xma
x
– x min )
61 (Tw)/ (yma
x
– y min )
62 Std (x)/ (xma
x
– x min )
63 Std (y) / (yma
x
– y min )
Miscellaneous features
64 Average azimuth
65 Maximu m azimuth
66 Minimum azimuth
67 RMS azimuth
68 Average Altitude
69 Maximum Altitude
70 Minimum Altitude
71 RMS Altitude
72 Average Pressure
73 Maximum Pressure
74 Minimum Pressure
75 RMS Pressure
2011 International Conference on Image Information Processing (ICIIP 2011)
Proceedings of the 2011 International Conference on Image Information Processing (ICIIP 2011)
C. Feature Selection using GA
The task of selecting the most discriminative features for a
particular classification problem in a high dimensional space is
known as feature selection. Given a d-dimensional problem,
there exist, 2d possible subset of features. Even for reasonable
values of d, an exhaustive search is usually not feasible. Many
different algorithms have been presented in the literature to
cope up with problem of feature selection, GA being the most
popular out of them. The optimization criterion is taken as the
classification accuracy of SVM for convergence of GA.
D. Verification
To evaluate effectiveness of the proposed method, we have
considered two cases. First, different groups of features
separately and then all features together are input to SVM.
Second, the input vectors for SVM consist of feature subset
chosen by GA.
IV. EXPERIMENTAL RESULTS
Experiment 1:
Each group of features has been considered separately for
classification using SVM. The classification accuracy due to
shape and time features is higher than that of other groups.
Experiment 2:
In this step, two groups are considered together. A
combination of dynamic and time related features shows better
accuracy than that obtained from other combinations.
Experiment 3:
To classification accuracy is improved further by
combining more number of groups and by considering all the
features, as shown in Table II.
TABLE II. RESULTS OF VERIFIC ATION USING SVM
Feature Vector Accuracy
%
Shape Dynamics Time Velocity Geometry Misc.
70.1
70.4
74.5
78.0
76.0
78.6
75.9
83.4
Experiment 4:
In this experiment, GA is used for feature selection. A
reduced set of 41 features selected using GA (shown as grey in
Table I) produces 83.6% accuracy, thereby reducing the
computational complexity by 53%
V. CONCLUSION
This paper proposes a memory efficient method of online
signature verification by integrating GA into SVM.
Comparative experiments show that, shape, dynamics and time
features have better performance than that of other group of
features. Also a method to reduce the computational
complexity and memory requirement has been suggested using
genetic algorithm in the online signature authentication.
Future work aims at exploring new features and testing
them on other classifiers using a local database
REFERENCES
[1] Anil K. Jain, Friederike D. Griess, Scott D. Connell, “On-line signature
verification” Pattern Recognition ,2002, pp. 2963 – 2972.
[2] H .Lei ,V.Govinaraju, “A study on the consistency of features for online
signature verification” SSPR/SPR,2004,p.444
[3] J. Galbally, J. Fierrez, M.R. Freire, and J. Ortega-Garcia, “Feature
Selection Based on Genetic Algorithms for On-Line Signature
Verification”, In Proc. of IEEE Workshop on Automatic Identification
Advanced Technologies, AutoID, pages 198–203, 2007a.
[4] Jonas Richardi,Hamed Ketabdar,Andrzej Drygajlo, “Local and Global
feature Selection for On-line Signature Verification”,Proceedings of
Eight International Conference on Document Analysis And Recognition
(ICDAR’05),2005, pp 625-629
[5] K.Lee,Y Chung and H.Byun, “Face recognition using support vector
machine with the feature set extracted by genetic algorithm”
Proceedings of Audio and Video Based biometric person
authentication,2001,pp 32-37
[6] L. Nanni , A. Nanni, “ A novel local on-line signature verification
system”,2008, Pattern Recognition Letters, Volume 29 Issue 5
[7] Mohammad A. U. Khan, Muhammad Kh alid Khan Niazi, and
Muhammad Aurangzeb Khan,“Velocity-Image Model for Online
Signature Verification”, 2006, IEEE Transactions on Image Processing,
vol. 15, no. 11, pp. 3540-3549
[8] V.Vapnik,Statistical Learning Theory,John Wiley & Sons,New
York,1998
[9] V. S. Nalwa, “Automatic On-Line Signature Verification,” Proc. IEEE,
85 (2) 1997, pp. 215-239.
[10] http://www.cse.ust.hk/svc2004/download.html
[11] Chih-Chung Chang and Chih-Jen Lin, LIBSVM: a library for support
vector machines,2001. http://www.csie.ntu.edu.tw/~cjlin/libsvm
... In [5] the authenticity is established by aligning the test signature with each reference signature of the claimed user, the signature is classified into two classes whether they are genuine or forgery by using standard pattern classification techniques. An online signature verification system [7] employs 75 features using time functions and the information derived from SVC 2004 and makes a comparison using Genetic Algorithm Support Vector Machine (GA-SVM) by integrating GA into SVM. This method reduces the computational complexity and the memory required. ...
... The applications of electronic signature mainly depend on biometrics since it is the only way to guarantee the presence of owner [7]. Biometrics is a technique used to verify authentication of a person and authorize the transaction by employing physical, biological and behavioral characteristics of an individual person [8]. The authentication is carried out by enrolling set of biometric samples such has Handwritten signatures of the user into the system. ...
... With the emerging technology of smart devices, online signature authentication system is getting common and gradually replacing the traditional offline signature authentication method. The notable classification algorithms which are widely used in this field are including Hidden Markov Models (HMM) [8,17,34], SVM [10,19,20,22,24], Dynamic Time Warping (DTW) [9,18,21], and Neural Networks (NN) [12,27]. Almost all of them were reported with their auspicious findings and results. ...
Article
Full-text available
A traditional online handwritten signature recognition system requires direct contact to acquisition device and usually will leave a traceable print on the surface. This made a signature possible and vulnerable to certain attempts of tracking and imitated. Looking into this shortfall, this paper proposes a novel approach to recognise an individual based on his/ her in-air hand motion while signing his/her signature. In this study, a low-cost acquisition device – Microsoft Kinect sensor is adopted to capture an image sequence of hand gesture signature. Palm region is first located and segmented through a predictive palm segmentation algorithm, which are then combined to generate a volume data. The volume data is condensed and reduced into a motion representation image by means of Motion History Image (MHI), which produces rich motion and temporal information. Several features are extracted from the MHI for empirical evaluation. Two classical recognition modes – identification and verification, are testified with an in-house database (HGS database). The proposed system achieves 90.4% identification accuracy and 3.22% equal error rate in verification mode. The experimental results substantiated the potential of the proposed system.
... In [5] the authenticity is established by aligning the test signature with each reference signature of the claimed user, the signature is classified into two classes whether they are genuine or forgery by using standard pattern classification techniques. An online signature verification system [7] employs 75 features using time functions and the information derived from SVC 2004 and makes a comparison using Genetic Algorithm Support Vector Machine (GA-SVM) by integrating GA into SVM. This method reduces the computational complexity and the memory required. ...
Conference Paper
Full-text available
This paper proposes a new online signature verification system based on fuzzy modelling which involves the modification of the fuzzy membership function with the help of structural parameters. By using these structural parameters, the signature of a given user can be easily verified. The proposed approach relies on the extraction of features from the sample data collected from users under different situations and time intervals. Two distinct methodologies have been suggested to obtain the structural parameters: the first method is based on the Shannon entropy functions coupled with an objective function defined in terms of error while the second is based on the interaction among the input fuzzy sets which is computed using s-norms. Both genuine and forged signatures were tested using the proposed techniques with encouraging results
... Vector Machine [37][38][39]. ...
Thesis
Full-text available
An on-line signature verification based on stable dynamic handwriting features has been proposed here. In the proposed method, there are two main ideas presented. The first one is the stable points of signature. In this idea, the stable points are selected based on the variance value for each sampled points. In order to select the stable points, forward and backward variances are calculated for the training data. Then, the particular time intervals corresponding to the less variances are selected and used to extract the stable points of testing data. Furthermore, the stable handwriting features are characterized using the following features: horizontal and vertical positions of stable points, pressure, displacement, the magnitude of velocity, areal velocity, and area pressure. The second idea is the drawback of azimuth and altitude angles. It is considered that both angles cannot verify signatures signed in different directions of pen-motion. Thus, the idea is realized by incorporating additional direction information. Then, a feature called angles of pen-motion is extracted from the azimuth and altitude angles. Furthermore, dissimilarity distance for forward and backward variances feature and angles of pen-motion feature are calculated. It is shown that the signature can be verified by evaluating a linear combination of those dissimilarity distances. Experiments are performed on public signature database MCYT-100, consists of 5,000 signatures from 100 people. The Equal Error Rate of the experiment is 2.74%.
Article
While the Internet of Things (IoT) devices, such as smartwatches, provide a range of services from managing financial transactions to monitoring smart homes, these devices often lead to gateways for malicious access to a user’s cyber-physical space. Biometric-based authentications are becoming popular to secure IoT devices and provide other services. However, when to use what type of biometrics remains challenging due to various factors, including sensing and computing requirements, user interaction requirements, stability over time, and application scenarios, among others. Unlike soft biometrics, e.g., gait, traditional biometrics, e.g., iris, are more stable over time but require active user input and robust sensing and computing, which limits their continuous adaptability to secure a user’s cyber-physical space. Additionally, the integration of new sensors to IoT devices brings opportunistic data types that can individually or in combination with other common biometrics to identify a user. There is a dearth of knowledge about the limitations and applications of new opportunistic biometrics and their combinations with existing biometrics obtained from single or multiple IoT-connected devices. Therefore, this manuscript thoroughly discusses different biometrics that can be implemented on IoT devices to understand the potential of biometric authentications better.
Conference Paper
In this paper, an online signature verification system based on the segmentation of online signature is proposed. The two set of features i.e shape features and dynamic features are extracted and a feature vector concatenating these two set of features is obtained. Euclidean distance is used as a classifier and a writer dependent threshold is used for verification purpose. In order to evaluate the effectiveness of the proposed online signature verification system, several experiments are carried out. Public database SVC 2004 is used for all the tests for online signature verification. The accuracy of proposed system with ten signatures in the training set and ten segments per signature is 91.75 % for skilled forgery. Experimentation is carried out separately for skilled forgery and random forgery. Experimental results on SVC2004 Task 2 show good performance of the proposed online signature verification system.
Conference Paper
This paper proposes a new online signature verification system. We have developed features based on Hanman-Anirban entropy function. We have used the Inner Product Classifier (IPC) for the verification of the signatures. The performance of signature verification has been found to be promising.
Article
Full-text available
In this work, an on-line signature verification system based on local information and on a one-class classifier, the Linear Programming Descriptor classifier (LPD), is presented. The information is extracted as time functions of various dynamic properties of the signatures, then the discrete 1-D wavelet transform (WT) is performed on these features. The Discrete Cosine Transform (DCT) is used to reduce the approximation coefficients vector obtained by WT to a feature vector of a given dimension. The Linear Programming Descriptor classifier is trained using the DCT coefficients.Finally, we have studied the fusion among the approach here proposed and the state-of-the-art of the regional, the local and the global approaches. The fusion outperforms all the stand-alone approaches. Results using all the 5000 signatures from the 100 subjects of the SUBCORPUS-100 MCYT Bimodal Biometric Database are presented, yielding remarkable performance improvement both with Random and Skilled Forgeries. We want to stress that our best fusion approach obtains an Equal Error Rate of 5.2% in the Skilled Forgeries, this value is the lowest Equal Error Rate reported in the literature for the SUBCORPUS-100 MCYT.
Conference Paper
Full-text available
In this paper we propose a methodology for selecting the most discriminative features in a set for online signature verification. We expose the difference in the definition of class between signature verification and other pattern recognition tasks, and extend the classical Fisher ratio to make it more robust to the small sample sizes typically found when dealing with global features and client enrollment time constraints for signature verification systems. We apply our methodology to global and local features extracted from a 50-users database, and find that our criterion agrees better with classifier error rates for local features than for global features. We discuss the possibility of performing feature selection without having forgery data available.
Article
LIBSVM is a library for support vector machines (SVM). Its goal is to help users to easily use SVM as a tool. In this document, we present all its imple-mentation details. For the use of LIBSVM, the README file included in the package and the LIBSVM FAQ provide the information.
Conference Paper
A lot of different features have been proposed for on-line signature verification. By using these features, researchers implicitly believe they have high consistency as well as high discriminatory power. However, very little work has been done to measure the real consistency of these features. In this paper, we propose a model for consistency measure. Experiments were conducted to compare a comprehensive set of features commonly used for on-line signature verification.
Article
We describe a method for on-line handwritten signature verification. The signatures are acquired using a digitizing tablet which captures both dynamic and spatial information of the writing. After preprocessing the signature, several features are extracted. The authenticity of a writer is determined by comparing an input signature to a stored reference set (template) consisting of three signatures. The similarity between an input signature and the reference set is computed using string matching and the similarity value is compared to a threshold. Several approaches for obtaining the optimal threshold value from the reference set are investigated. The best result yields a false reject rate of 2.8% and a false accept rate of 1.6%. Experiments on a database containing a total of 1232 signatures of 102 individuals show that writer-dependent thresholds yield better results than using a common threshold.
Conference Paper
Face recognition problem is challenging because face images can vary considerably in terms of facial expressions, 3D orientation, lighting condi- tions, hair styles, and so on. This paper proposes a method of face recognition by using support vector machines with the feature set extracted by genetic algo- rithms. By selecting the feature set that has superior performance in recognizing faces, the use of unnecessary information of the faces can be avoided and the memory requirement can be decreased significantly. Also, by using a tuning data set in the computation of the evaluation function, the feature set which is less dependent on illumination and expression can be selected. The experimen- tal results show that the proposed method can provide superior performance than the previous method in terms of accuracy and memory requirement.