use of exterior contours and shape features in off line
play

Use of Exterior Contours and Shape Features in Off-line Signature - PowerPoint PPT Presentation

Use of Exterior Contours and Shape Features in Off-line Signature Verification Siyuan Chen and Sargur Srihari Center of Excellence for Document Analysis and Recognition (CEDAR) University at Buffalo State University of New York, USA Overview


  1. Use of Exterior Contours and Shape Features in Off-line Signature Verification Siyuan Chen and Sargur Srihari Center of Excellence for Document Analysis and Recognition (CEDAR) University at Buffalo State University of New York, USA

  2. Overview Motivation: Off-line signature verification is a task of relevance to complex document processing, forensics, biometrics Task: Known Signatures Questioned Signature 1. 2. Verification process … … … Questioned is Genuine/Forgery/Unknown Philosophy: 1. Use linear trace-- similar to on-line approach (contour-based) 2. Use topology-based approach-- similar to OCR (shape-based) 3. Combine methods

  3. Overview of Rest of Presentation 1. Image Pre-processing 2. Algorithm 1: Contour-based Overview of algorithm Combining contours of signature Matching contours of signature Feature extraction 3. Algorithm 2: Shape-based 4. Classifier Combination 5. Performance 6. Conclusion

  4. Image Preprocessing (common to both methods) A. Binarization (Otsu’s method) Grey scale image Binary image before after B. Broken Stroke connection

  5. Algorithm 1: Contour-based Known images Questioned signature image Image Preprocessing Randomly (binarization,repair) select one as reference Contour Generation (chain code, pseudo path) Matching to reference Reference contour by DTW contour Feature Extraction 20 (Zernike moments of contour segs) 640 Compute distance with 33.42, 53.94, 35.30 known set of n images 66.55, 13.62, 73.84 17.30, 13.58 … Determine … … … … … , Threshold threshold Genuine/Forgery/Unknown

  6. Exterior Contours (upper/lower) Chain code generation Exterior Contours (1) (3) (4) (5) (2) Contour (1) Contour (2) Contour (3) Contour (4) Contour (5) X: 9 10 11 … X: 68 68 68 … X: 297 298 299 … X: 351 352 353 … X: 365 365 365 … Y: 104 104 104 … Y: 91 90 89 … Y: 53 52 51 … Y: 108 107 106 … Y: 96 95 94 … Slope: 2 2 3 … Slope: 2 2 2 … Slope: 3 3 3 … Slope: 2 3 3 … Slope: 2 2 2 … Curvature: 0 0 1 … Curvature: 7 0 0 … Curvature: 0 0 0 … Curvature: 7 1 0 … Curvature: 7 0 0 … Pseudo Path direction direction

  7. Matching Contours of Signature 1. ฀ Determine slope and curvature of contour points (from chaincode) 2. Use dynamic time warping to obtain corresponding points

  8. Contour matching Dynamic Time Warping (DTW) • Initialization: = ( 0 , 0 ) ( 0 , 0 ), w here D d [ ] 2 1 2 2 = − + ( , ) ( ( ) ( )) ( ( ), ( )) d i i f slope i slope i f curvature i curvature i x y s x y c x y DTW: local constraints • Recursion: and slope weights [ ] = ' + ξ ' ' ( , ) min ( , ) (( ' , ), ( , )) D i i D i i i i i i x y x y x y x y Y ' , ' i x i y L ξ = x φ − φ − × − ' ' ' ' ∑ (( ' , ), ( , )) ( ( ), ( )) ( ) i i i i d T l T l m T l x y x y x y = 0 l • Termination: X − − ( 1 , 1 ) D T T = A x y ( , ) d X Y + T T x y

  9. Alignment of Contour Points Genuine-Genuine Genuine-Forgery

  10. Alignment and Contour Segmentation Contour segmentation (20 equal length segments in reference)

  11. Contour Segment Feature Extraction Moments of contour segment form feature vector ρ y Zernike moments Order Zernike No. Moments θ 0 x 0 A 00 1 1 A 11 1 θ = ρ θ = ρ ( , ) ( , ) ( ) jm V x y V R e 2 A 20 , A 22 2 nm nm nm − − ( )! ( ) / 2 n m n s 3 A 31 ,A 33 2 ρ = − ρ − ∑ 2 ( ) ( 1 ) s n s R nm + − = n m n m 0 s 4 A 40 ,A 42 , A 44 3 − − ! ( )! ( )! s s s 2 2 5 A 51 , A 53 , A 55 , 3 + 1 n * = ρ θ 2 + 2 ≤ 6 A 60 , A 62 , A 64 , 4 ∑ ∑ ( , ) ( , ) 1 A f x y V x y π nm nm A 66 , x y - Total (complex) 16 - Total (value) 32

  12. Segment Distance Computation K i : Q i : 0 0 ⎡ ⎤ ⎡ ⎤ 33 . 42 40 . 42 ⎢ ⎥ ⎢ ⎥ 53 . 94 67 . 84 ⎢ ⎥ ⎢ ⎥ ⎢ ⎥ ⎢ ⎥ 35 . 30 54 . 29 ⎢ ⎥ ⎢ ⎥ ⎢ ⎥ ⎢ ⎥ 66 . 55 86 . 49 ⎢ ⎥ ⎢ ⎥ 13 . 62 ⎢ ⎥ 32 . 77 ⎢ ⎥ ⎢ ⎥ ⎢ ⎥ 73 . 84 98 . 59 ⎢ ⎥ ⎢ ⎥ ⎢ ⎥ ⎢ ⎥ 17 . 30 6 . 68 ⎢ ⎥ ⎢ ⎥ 13 . 58 ⎢ ⎥ 12 . 18 ⎢ ⎥ ⎢ ⎥ ⎢ ⎥ L L ⎢ ⎥ ⎢ ⎥ ⎢ ⎥ ⎢ L ⎥ L ⎣ ⎦ ⎣ ⎦ a 32 length feature vector q i a 32 length feature vector k i 1 = Harmonic distance between questioned and known signatures : ( , ) D Q K 1 20 ∑ d = 1 i i ( ) 32 2 = − ∑ Where is the Euclidean distance between th e ith segment of signatures d d q k i i ij ij = 1 j

  13. Algorithm 2: Word-shape based* 8 4 Gradient (12 bits): 111101111111 Structural (12 bits): 000011001100 Concavity (8 bits): 10100000 ( ) = + + × × = Total bits 12 12 8 4 8 1024 bits × + 0 . 5 C C = Similarity score 00 11 1024 is the number of bits where both vecto rs have "0" s C 00 is the number of bits where both vecto rs have "1" s C 11 *Described in paper at IWFHR, Tokyo, Nov. 2004

  14. Combination of Two Methods Threshold Contour Algorithm S zer set 1 high confidence genuine / high confidence forgery / low confidence genuine / Knowns Questioned low confidence forgery Threshold S gsc Shape Algorithm set 2 high confidence genuine vs. low confidence forgery or high confidence genuine vs. high confidence genuine or high confidence genuine vs. low confidence genuine � Genuine high confidence forgery vs. low confidence genuine or high confidence forgery vs. high confidence forgery or high confidence forgery vs. high confidence forgery � Forgery high confidence genuine vs. high confidence forgery � Unknown

  15. Test Bed: Training /Testing Data Genuine signatures (1320): 55 individuals , 24 signatures each Forgery signatures (1320): 55 individuals , 24 signatures each

  16. Signature Verification Performance Accuracy(55 writers/24 signatures each) ALGORITHM 1-FAR 1-FRR ACCURACY 1. Contour Method 87.1 86.8 86.9 (11.6) (9.6) (10.6) (with rejection) 2. Word Shape 83.2 81.5 82.4 Method (13.2) (8.2) (10.6) (with rejection) 94.1 93.5 93.8 Combined method (10.9) (8.6) (10.2) (with rejection)

  17. Accuracy-Rejection Trade-off Combined Method Accuracy Rejection Rate

  18. Conclusion 1. Linear trace based on exterior contour (pseudo path) has value in off-line signature verification 2. Zernike moments are appropriate shape features for handwriting images 3. Contour based and shape based methods are complementary leading to improved combination performance

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend