=Paper=
{{Paper
|id=None
|storemode=property
|title=Off-Line Signature Verification based on Ordered Grid Features: An Evaluation
|pdfUrl=https://ceur-ws.org/Vol-1022/Paper07.pdf
|volume=Vol-1022
|dblpUrl=https://dblp.org/rec/conf/icdar/BarkoulaZZE13
}}
==Off-Line Signature Verification based on Ordered Grid Features: An Evaluation==
Off-Line Signature Verification based on Ordered Grid Features: An Evaluation
Konstantina Barkoula, George Economou Elias N. Zois, Evangelos Zervas
Physics Department Electronics Engineering Department
University of Patras Technological and Educational Institution of Athens
Patras, Greece Egaleo, Greece
email: kbarkoula@gmail.com, economou@upatras.gr e-mail: {ezois, ezervas}@teiath.gr
Abstract— A novel offline signature modeling is introduced According to the experimental protocol followed, there are
and evaluated which attempts to advance a grid based feature two major approaches which have been applied to off-line
extraction method uniting it with the use of an ordered ASVS; writer dependent (WD) and writer-independent (WI).
powerset. Specifically, this work represents the pixel The WD approach uses an atomic classifier for each writer.
distribution of the signature trace by modeling specific The WI approach uses a classifier to match each input
predetermined paths having Chebyshev distance of two, as questioned signature to one or more reference signatures, and
being members of alphabet subsets-events. In addition, it is a single classifier is trained for all writers [9], [10].
proposed here that these events, partitioned in groups, are Feature extraction is considered to be one of the most
further explored and processed within an ordered set context.
challenging tasks when ASVS are designed. An important
As a proof of concept, this study progresses by counting the
events’ first order appearance (in respect to inclusion) at a
feature extraction philosophy which attracts increasing
specific powerset, along with their corresponding distribution. interest, exploits the signature using a coarse or fine detail
These are considered to be the features which will be employed grid which is imposed upon the image. Among others,
in a signature verification problem. The verification strategy examples of grid based feature extraction can be found in the
relies on a support vector machine based classifier and the work provided by references [10], [11], [12], [13], [14], [15],
equal error rate figure. Using the new scheme verification [16], [17], [18] and [19].
results were derived for both the GPDS300 and a proprietary In another work provided by Tselios, Zois, Nassiopoulos
data set, while the proposed technique proved quite efficient in and Economou [20], a grid based feature extraction method
the handling of skilled forgeries as well. was developed which represents the signature trace by taking
into account the histogram of specific pixel path transitions
Grid Features, Power Set, Ordering, Signature Verification along predefined paths within pre-confined Chebyshev
distances of two (FCB2 feature). The feature extraction
I. INTRODUCTION concepts have been advanced by describing these paths in a
way in which they can be viewed as symbols transmitted by
Automated handwritten signature verification systems a discrete space random source. The combination of the
(ASVS) remain up to now an accepted way for humans to produced FCB2 symbols defines the message or event that the
declare their identity in many application areas including random source sends out when a certain sequence of
civilian ones [1], [2], [3], [4]. ASVS are separated into two signature pixels is accounted. They are treated according to
major categories based on the method that the signature is the event concept, reported in standard set and information
obtained. Both online and offline ASVS must cope with the theory and they are complemented along with their
evidence that the process of creating handwritten signatures, corresponding probabilistic moments [21]. In this work and
even when they originate from a well trained genuine writer, in order to further increase our signature discriminating
will carry natural variations, defined as intra-writer capability the potential messages-events of the FCB2 paths are
variability [5]. It is adopted that the online ASVS are organized in sub-groups of independent tetrads. Each tetrad
generally more efficient when compared to offline. A is organized according to its ordered powerset with respect to
commonly used figure of merit which is employed in order inclusion [22]. The outcome of this procedure provides an
to characterize the efficiency of ASVS is the equal error rate attempt to model the handwriting process in concordance
(EER) which is calculated from the ROC or DET plots of with basic elements of information and coding theory.
both types of error rates. The distributions of the now ordered transition paths in
The goal of an offline ASVS is to efficiently transform the new feature space are used to code the signature image.
an image into a mathematical measurable space where it will In the case study presented here a WD verification scheme is
be represented by means of its corresponding features [6]. followed which comprises of the training and testing phase.
Next, the features are feeding computational intelligence Verification results have been drawn with the use of two
techniques and pattern recognition classifiers which will databases, the GPDS300 and a proprietary one by means of
decide, after appropriate training and testing procedures, if a the false acceptance, false rejection and the equal error rate
signature under query belongs to a claimed writer [7], [8]. (EER) figure of merit. The rest of this work is organized as
follows: Section 2 provides the database details and the Since, in offline signatures, signature-pixel ordering is
description of the feature extraction algorithm. Section 3 unknown, the ordered sequence of the pixels cannot be
presents the experimental verification protocol which has estimated. This note diminish the number of queried FCB2
been applied. Section 4 presents the comparative evaluation transition paths, in a 5x5 pixel grid window, with center
results while section 5 draws the conclusions. pixel each black pixel of signature’s image, to the sixteen
independent transition paths presented in Fig. 2. In this case
II. DATABASE AND FEATURE EXTRACTION PROCEDURE study only the FCB2 paths have been taken into account. It is
advantageous in our case to explicitly treat the notion of the
A. Database Description signature pixels indexes (i,j) as a transformation of
The proposed feature extraction modeling has been sequences produced by the source. As a consequence, the
studied with the use of two databases of 8-bit grey scale feature extraction grid can be identified as a discrete space –
signatures: a Greek signers’ database (CORPUS1) [20] and discrete alphabet source.
GPDS-300 (CORPUS2) [12]. CORPUS1 comprises of a
domestic Greek collection of 105 genuine and 21 simulated D. Ordered Event Modeling
forgery signature samples for each of the 69 signers of the Let the triad ( , Β, P) indicate the probability space on
database. Genuine samples were acquired in a one month which all the potential outcomes are identified. By definition
time frame. CORPUS2 contains 24 genuine signatures and is the sample space upon which a discrete digital source
30 simulated forgeries for each of the 300 signers of the transmits alphabet symbols. The source may transmit either
database and is publicly available. During the experimental single symbols or sets of them (events) from a 16 symbol
process, two schemes of randomly selected training and alphabet as figure 2 illustrates. Let B a sigma field (the event
testing samples were used for comparison with the outcomes space) that encloses all potential occurrences of symbols
of contemporary research in the field. In the first scheme, 12 combinations from the FCB2 alphabet. That is, B is the largest
genuine and 12 simulated-forgery reference samples per possible -field [23] which is the collection of all subsets of
writer are used, while in the second scheme 5 genuine and 5 and is called the power set. Finally, let P be the
simulated forgery reference samples are used. The remaining corresponding distributions of the -field.
samples are used for testing. In order to evade the problem of 216 space management
is grouped into T subsets {t }t 1,,T and we define the
B. Preprocessing
In order to produce the binary form of the acquired sub-s-fields Bt as the power sets for each t . In this work
signatures the following preprocessing steps have been we choose to group the 16-FCB2(i) components into
carried out: thresholding using Otsu’s method [6], ensembles of four tetrads (call it hereafter F4-collection) thus
skeletonization, cropping and segmentation. This procedure resulting to an early set of 4 24=64 possible event
is expected to reduce a number of side effects of the writing combinations. From the complete set of all the possible
instruments variations. The result is the generation of the ensembles of the F4 collection only 87 orthogonal cases shall
most informative window (MIW) of the image. The features be enabled along with their corresponding probabilities.
are extracted either from the whole MIW of the signature or From a mathematical point of view the signature image is
from segments of signature’s MIW with the use of the analyzed into four major subspaces where each of them is
equimass sampling grid method [14]. Equimass sampling composed of 16 orthogonal dimensions. The term orthogonal
grid segmentation provides strips of the signature with denotes that each symbol in a sub-alphabet space of a F4
uniform size of signature pixels instead of the trivial distance tetrad cannot be derived as any combination of the same
grid segmentation which provides segments of equal area. subspace F4 symbols. This constraint provides each signature
The result is depicted in Fig. 1. In this work the feature with 87 different F4 orthogonal tetrad event sets, found
vector is generated from the ‘S2’ scheme used in [20]. through exhaustive search. Fig. 3 provides the FCB2 alphabet
along with a F4 orthogonal collection. As a proof of concept,
C. Alphabet Description the orthogonal F4 collection #44, selected randomly is
Fig. 2 depicts the alphabet which is defined as a set of illustrated in figure 3.
symbols, emerging from the FCB2 description according to
[12]. To be more specific, FCB2 alphabet is the set of
transition paths of three consecutive pixels under the
constraint of having the first and third pixels restrained to a
Chebyshev distance equal to two.
Figure 1. Signature image with equimass made segments
Figure 2. FCB2 alphabet set which forms the probability space .
Figure 3. One F4 collection of tetrads (#44). Each horizontal tetrad is
considered to form a subspace in the original 16-dimnensional feature
space and consequently generates a powerset of events
Finally, each one of the four F4 power-sets of figure 3b is
evaluated by ordering the elements of the powerset with
respect to inclusion. Fig. 4 provides a graphical explanation
of one powerset in line with the proposed modeling. In order Figure 4. Power set for one subspace (the first horizontal line of fig. 3) of
to illustrate the method with clarity, figure 4 has been created the #44 F4 collection ordered with respect to inclusion
which shows the powerset of the #44 F4 collection with
respect to inclusion. The indexes x, y, z, w are associated phase of the WD verification scheme follows: for each
with one tetrad’s elements of the F4 collection. For each writer, #nref reference samples of genuine along with an
arrow in figure 4 there is a corresponding probability equal number of simulated-forgery signature samples are
evaluated for every segmented image. Thus, the overall randomly chosen in order to train the classifier. The “S2”
dimensionality of the feature vector for one F4 collection is image segmentation scheme combines the features calculated
equal to 32 (4+12+12+4) for each image segment. on the whole signature image as well as the relevant 2x2
According to the exposed material, a discrete source, equimass segmentation grid [20]. These features supply the
designated as Sn, can be defined by its transmitted set of classifier training section without assuming any additional
symbols-events which are now members of an ordered F4 processing. The classifier used is a hard-margin two class
collection. This novel modeling of the feature generation support vector machine (SVM) classifier using radial basis
process is an evolution of the previous method as it was kernel. Selection of the training samples for the genuine class
described in [20]. It attempts to model the distribution of the was accomplished using randomly chosen samples according
signature pixel paths as an information source and to to the hold-out validation method. The remaining genuine
associate events of ordered paths (arrows as seen in fig. 4) and simulated forgery signatures feature vectors, drawn
along with their corresponding first order probabilities. using the same F4 collection, feed the SVM classifier directly
for testing. The SVM output apart from the binary class
E. Creation of the ordered feature vector decision provides a score value which is equal to the distance
To make this work robust a short description is provided of the tested sample from the SVM separating hyperplane.
for generating the ordered feature components. According to The operating parameters of the SVM have been determined
the material exposed in sections IIC, IID, each one of the through exhaustive search. It is noted that there is a wide
preprocessed image segments is scanned top-down and left- area of rbf sigma values that the system has the reported
right to identify its signature pixels. Let us denote with the results.
labels One (O) and Two (T) a conjugated pair of 5 5 Evaluation of the verification efficiency of the system is
moving grids with the property that their topological centers accomplished with the use of a global threshold on the
are distant by a Euclidean distance of one. Then for each overall SVM output score distribution. This is achieved by
signature pixel the {O, T} grids are imposed. Next, detection providing the system’s False Acceptance Rate (FAR:
of discrete events at both {O, T} grids is performed followed samples not belonging to genuine writers, yet assigned to
by the evaluation of the corresponding ordered probabilities, them) and the False Rejection Rate (FRR: samples belonging
as described in fig. 4. In addition, fig. 5 presents in a to genuine writers, yet not classified) functions. With these
graphical manner the generation of a feature component two rates, the receiver operator characteristics (ROC) are
namely the {X, XY}. In this work the overall feature drawn by means of their FAR/FRR plot. Then, classification
dimensionality is 128 due to the selection of the performance is measured with the utilization of the system
segmentation preprocessing steps. Equal Error Rate (EER: the point which FAR equals FRR).
III. CLASSIFICATION PROTOCOL IV. RESULTS
On the grounds of proofing the proposed concept and According to the discussion presented above, FAR, FRR
according to the discussion exposed in section II the training and the relevant EER rates, are evaluated for (a) CORPUS 1
and and (b) CORPUS 2 with five and twelve reference
Figure 6. ROC curves with the corresponding EER for corpuses 1, 2.
literature. Since the approach described in this case study is
Figure 5. (A) One set of the #44 F4 collection as depicted in fig. 3b. (B) preliminary it is anticipated that further exhaustive research
left and right grids labeled as One (O) and Two (T) respectively imposed will unveil important conclusions with respect to the
on a signature trace (mark with green shadowed pixels) and corresponding modeling of handwriting. However a number of various
events activated. For illustration purposes the topological grids have a
distance of 7 instead of 1 that is followed at the actual feature extraction
other models and experimental setups including i.e. the
method. (C) Ordered event detection is designated between the red circles dissimilarity framework [10] need to be examined in order to
and feature component update along red line. verify the effectiveness of the proposed approach.
samples for both genuine and forger class. The TABLE I. VERIFICATION EFFICIENCY (%)
corresponding results are presented in Table I by means of Experimental Set FAR FRR EER
the mean FAR, FRR and EER values. The letters G and F in CORPUS 1, #nref=5 (GF) 2.18 3.29 2.79
Table I designate the genuine and skilled forgery samples CORPUS 2, #nref=5 (GF) 13.03 5.23 9.04
respectively. In addition, the ROC curves are presented for CORPUS 1, #nref=12 (GF) 1.13 1.60 1.45
both databases in fig. 6 along with their corresponding EER CORPUS 2, #nref=12 (GF) 7.73 3.45 5.53
defined as the cross section of the ROC curves and the
diagonal. TABLE II. COMPARING EER WITH APPROACH [20]
Our results are compared to recently published relevant
Experimental Set EER (%)
figures. The reported results for CORPUS 1 are compared [20] #nref=5 (GF) 9.16
with the results relevant to those reported in [12] for feature Proposed #nref=5 (GF) 2.79
level simulated forgery verification tests using ‘S2’ scheme [20] #nref=12 (GF) 4.65
using (a) nref=5 and (b) the mean value of nref=10 and Proposed #nref=12 (GF) 1.45
nref=15 tests for comparison with our test using nref=12.
The comparison results are presented in Table II. Concerning TABLE III. COMPARING EER WITH VARIOUS APPROACHES (%)
CORPUS 2, we present in Table III, the results of recently
Method EER EER
reported research work using nref=5 and nref=12, along with [20] #nref=5 (GF) 12.32 Proposed 9.04
the results of the current approach. [12] GPDS-100 nref=5 (GF) 12.02 #nref=5
[19] #nref=13 (only G) 4.21
V. CONCLUSIONS [20] for nref=12 (GF) 6.2 Proposed 5.53
In this work a handwritten model based on the powerset [12] # ref = {10G, 15F} 8.26 #nref=12
of an ordered event topology with respect to inclusion is [13] #refn=12 (GF) 13.76
[24] #nref=12 (GF) 15.11
considered as a tool for offline signature verification. A
[25] # nref=12 (only G) 15.4
number of verification experiments based on an SVM
classifier have been carried out in two signature databases REFERENCES
namely the GPDS and a proprietary one. Primary verification
[1] R. Plamondon and S. N. Srihari, "On-line and off-line handwriting
results indicate that the proposed feature extraction method recognition: A comprehensive survey," IEEE Transactions on Pattern
has an appealing aspect; As a comment on the efficiency of Analysis and Machine Intelligence, vol. 22, pp. 63-84, 2000.
the method one can state that in the case of the Corpus 1 a [2] F. Leclerc and R. Plamondon, "Automatic Signature verification: the
substantial improvement is observed while in the case of state of the art-1989-1993", International Journal of Pattern
Corpus 2 the results are comparable with those of the Recognition and Artificial Intelligence, vol. 8, pp. 643-660, 1994.
[3] D. Impedovo, and G. Pirlo, "Automatic signature verification: The [23] Hazewinkel, M.: Encyclopedia of Mathematics, Springer, 2001.
state of the art, "IEEE Transactions on Systems Man and [24] V. Nguyen, Y. Kawazoe, T. Wakabayashi, U. Pal, and M.
Cybernetics" vol. 38, pp. 609-635, 2008. Blumenstein, "Performance Analysis of the Gradient Feature and the
[4] L. Batista, D. Rivard, R. Sabourin, E. Granger, and P. Maupin, "State Modified Direction Feature for Off-line Signature Verification", in
of the art in off-line signature verification". In Verma, B., Proc. 2010 Int Conf on Frontiers in Handwriting Recognition, pp.
Blumenstein, M. (eds.) Pattern Recognition Technologies and 303-307, 2010.
Applications: Recent Advances, pp. 39–62, 2008. [25] M. B. Yilmaz, B. Yanikoglu, C. Tirkaz, and A. Kholmatov, "Offline
[5] M. C. Fairhurst, "Signature verification revisited: promoting practical signature verification using classifier combination of HOG and LBP
exploitation of biometric technology", Electron. Commun. Eng. J., features", in Proc. Int Joint Conf on Biometrics, pp. 1-7, 2011.
vol. 9, pp. 273–280, 1997.
[6] R. C. Gonzalez and R. E. Woods, "Digital Image processing",
Addison Wesley, Reading, 1992.
[7] S. Theodoridis and K. Koutroumbas, "Pattern Recognition",
Academic Press, 2009.
[8] R. O. Duda and P. E. Hart, Pattern classification. New York: John
Wiley and Sons, 2001.
[9] D. Bertolini, L. S. Oliveira, E. Justino, and R. Sabourin, "Reducing
forgeries in writer-independent off-line signature verification through
ensemble of classifiers". Pattern Recognition, vol. 43, pp. 387–396,
2010.
[10] D. Rivard, E. Granger and R. Sabourin, "Multi feature extraction and
selection in writer independent off-line signature verification",
International Journal on Document Analysis and Recognition, vol. 16,
pp. 83-103, 2013.
[11] V. K. Madasu, and B. Lovell. "An Automatic Off-line Signature
Verification and Forgery Detection System", in Verma, B.,
Blumenstein, M. (eds.) Pattern Recognition Technologies and
Applications: Recent Advances, pp. 63–89, 2008.
[12] J. F. Vargas, M. A. Ferrer, C. M. Travieso and J. B. Alonso, "Off-line
signature verification based on grey level information using texture
features", Pattern Recognition, vol. 44, pp. 375-385, 2011.
[13] R. Kumar, J. D. Sharma, and B. Chanda, "Writer independent off-line
signature verification using surroundedness feature", Pattern
Recognition Letters, vol. 33, pp. 301-308, 2012.
[14] D. Impedovo, G. Pirlo, L. Sarcinella, E. Stasolla, and C. A. Trullo,
"Analysis of Stability in Static Signatures using Cosine Similarity",
in: Proc of International Conference on Frontiers in Handwriting
Recognition, pp. 231-235, 2012.
[15] B. H. Shekar, and R. K. Bharathi, "LOG-Grid based off-line signature
verification", in Fourth International Conference on signal and image
processing, 2012. S. Mohan, S., Kumar, S.S. (eds), LNEE 222, pp.
321-330, 2013.
[16] J. P. Swanepoel, and J. Coester. "Off-line signature verification using
flexible grid features and classifiers fusion", in International
Conference on Frontiers in Handwriting Recognition, pp. 297-302. ,
2012.
[17] M. K. Kalera, S. Shrihari and A. Xu, "Offine line signature
verification using distance statistics", International Journal of Pattern
Recognition and Artificial Intelligence, vol. 18, pp. 1339-1360,
2005.
[18] A. Gilperez, F. Alonso-Fernandez, S. Pecharroman, J. Fierrez-
Aguilar, and J. Ortega-Garcia, "Off-line signature verification using
contour features", in International Conference on Frontiers in
Handwriting Recognition ICFHR 2008.
[19] M. Parodi, J. C. Gomez, and A. Belaid, "A circular grid-based
rotation invariant feature extraction approach for off-line signature
verification", in 11th International Conference on Document
Analysis and Recognition, pp. 1289-1293. 2011.
[20] K. Tselios, E. N. Zois, E. Siores, A. Nassiopoulos, and G. Economou,
"Grid-based feature distributions for off-line signature verification".
IET Biometrics, vol. 1, pp. 72-81, 2012.
[21] T. M. Cover, and A. Y. Thomas, "Elements of information theory",
2nd ed. John Wiley and Sons (2006).
[22] P. R. Halmos, "Naive set theory". The University Series in
Undergraduate Mathematics. van Nostrand Company, Princeton,
1960.