Skip to main content

Signature Verification Using a Bayesian Approach

  • Conference paper
Computational Forensics (IWCF 2008)

Part of the book series: Lecture Notes in Computer Science ((LNIP,volume 5158))

Included in the following conference series:

Abstract

The fully Bayesian approach has been shown to be powerful in machine learning. This paper describes signature verification using a non-parametric Bayesian approach. Given sample(s) of Genuine signatures of an individual, the task of signature verification is a problem of classifying a questioned signature as Genuine or Forgery. The verification problem is a two step approach - (i)Enrollment: Genuine signature samples of an individual are provided. The method presented here maps from features space to distance space by comparing all the available genuine signature samples amongst themselves to obtain a distribution in distance space - “within person distribution”. This distribution captures the variation and similarities that exist within a particular person’s signature; (ii)Classification: The questioned signature to be classified, is then compared to each of the genuine signatures to obtain another distribution in distance space - “Questioned vs Known distribution”. The two distributions are then compared using a new Bayesian similarity measure to test whether the samples in the distribution are from the same distribution(Genuine) or not(Forgery). The approach yields improved performance over other non-parametric non Bayesian approaches.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Sabourin, R., Genest, G., Preteux, F.J.: Off-line signature verification by local granulometric size distributions. IEEE Transactions on Pattern Analysis and Machine Intelligence 19(9), 976–988 (1997)

    Article  Google Scholar 

  2. Srihari, S.N., Xu, A., Kalera, M.K.: Learning strategies and classification methods for off-line signature verification. In: Proc.of the 7th Int. Workshop on Frontiers in handwriting recognition(IWFHR), pp. 161–166 (2004)

    Google Scholar 

  3. Favata, J., Srikantan, G.: A multiple feature/resolution approach to handprinted digit and character recognition. International Journal of Imaging Systems and Technology 7, 304–311 (1996)

    Article  Google Scholar 

  4. Srikantan, G., Lam, S.W., Srihari, S.N.: Gradient based contour encoding for character recognition. Pattern Recognition 29(7), 1147–1160 (1996)

    Article  Google Scholar 

  5. Fang, B., Leung, C.H., Tang, Y.Y., Tse, K.W., Kwok, P.C.K., Wong, Y.K.: Off-line signature verification by the tracking of feature and stroke positions. Pattern recognition 36, 91–101 (2003)

    Article  MATH  Google Scholar 

  6. Lee, S., Pan, J.C.: Off-line tracking and representation of signatures. IEEE Transactions on Systems,Man and Cybernetics 22, 755–771 (1992)

    Article  MATH  Google Scholar 

  7. Sabourin, R., Plamondon, R.: Preprocessing of handwritten signatures from image gradient analysis. In: Proc.of the 8th Int.Conference on Pattern Recognition, pp. 576–579 (1986)

    Google Scholar 

  8. Lin, C.C., Chellappa, R.: Classification of partial 2-d shapes using fourier descriptors. IEEE Transactions on Pattern Analysis and Machine Learning Intelligence, 690–696 (1997)

    Google Scholar 

  9. Ammar, M., Yoshido, Y., Fukumura, T.: A new effective approach of off-line verification of signatures by using pressure features. In: Proc.of the 8th Int.Conference on Pattern Recognition, pp. 566–569 (1986)

    Google Scholar 

  10. Cha, S.H., Tappert, C.C., Srihari, S.N.: Optimizing binary feature vector similarity measure using genetic algorithm and handwritten character recognition. In: Proceedings of the Seventh International Conference on Document Analysis and Recognition, vol. 2, p. 662 (2003)

    Google Scholar 

  11. Zhang, B., Srihari, S.: Properties of binary vector dissimilarity measures, Cary, North Carolina (September 2003)

    Google Scholar 

  12. Harish Srinivasan, M.B., Srihari, S.: Machine learning for person identification. In: SPIE Conference on Homeland Security, Orlando, FL, pp. 574–586 (March 2005)

    Google Scholar 

  13. Kalera, M.K., Zhang, B., Sriahri, S.N.: Off-line signature verification and identification using distance statistics. In: Proc.of the Int.Graphonomics society Conference, pp. 228–232 (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Sargur N. Srihari Katrin Franke

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Srihari, S.N., Kuzhinjedathu, K., Srinivasan, H., Huang, C., Pu, D. (2008). Signature Verification Using a Bayesian Approach. In: Srihari, S.N., Franke, K. (eds) Computational Forensics. IWCF 2008. Lecture Notes in Computer Science, vol 5158. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-85303-9_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-85303-9_18

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-85302-2

  • Online ISBN: 978-3-540-85303-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics