Signature Analysis for Forgery Detection

  • Dinesh Rao AdithyaEmail author
  • V. L. Anagha
  • M. R. Niharika
  • N. Srilakshmi
  • Shastry K. Aditya
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 906)


Forgery of signature has become very common, and the need for identification and verification is vital in security and resource access control. There are three types of forgery: random forgery, simple or casual forgery, expert or skilled or simulated forgery. The main aim of signature verification is to extract the characteristics of the signature and determine whether it is genuine or forgery. There are two types of signature verification: static or offline and dynamic or online. In our proposed solution, we use offline signature analysis for forgery detection which is carried out by first acquiring the signature and then using image pre-processing techniques to enhance the image. Feature extraction algorithms are further used to extract the relevant features. These features are used as input parameters to the machine learning algorithm which analyses the signature and detects for forgery. Performance evaluation is then carried out to check the accuracy of the output.


Signatures Forgery Image processing Neural network Feature extraction Authentication 


  1. 1.
    Karounia*, A., Dayab, B., & Bahlakb, S. (2010). Offline signature recognition using neural networks approach. WCIT.Google Scholar
  2. 2.
    Shankar, A. P., & Rajagopalan, A. N. (2007). Offline signature verification using DTW. Pattern Recognition Letters, 28.Google Scholar
  3. 3.
    Bhattacharyaa*, I., Ghoshb, P., & Biswasb, S. (2013). Offline signature verification using pixel matching technique. In International Conference on Computational Intelligence: Modeling Techniques and Applications (CIMTA).Google Scholar
  4. 4.
    Anand, H., & Bhombe, D. L. (2014, May). Enhanced signature verification and recognition using matlab. International Journal of Innovative Research in Advanced Engineering (IJIRAE), 1(4). ISSN 2349-2163.Google Scholar
  5. 5.
    Blei, D. M., et al. (2003). Latent dirichlet allocation. Journal of Machine Learning Research, 3, 993–1022.zbMATHGoogle Scholar
  6. 6.
    Fanga, B., Leungb, C. H*., Tangc, Y. Y., Tseb, K. W., Kwokd, P. C. K., & Wonge, Y. K. (2003). Offline signature verification by the tracking of feature and stroke positions. Pattern Recognition, 36, 91–101.Google Scholar
  7. 7.
    Lewis, D. Naive (Bayes) at forty: The independence assumption in information retrieval.Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  • Dinesh Rao Adithya
    • 1
    Email author
  • V. L. Anagha
    • 1
  • M. R. Niharika
    • 1
  • N. Srilakshmi
    • 1
  • Shastry K. Aditya
    • 1
  1. 1.Department of Information Science and EngineeringNitte Meenakshi Institute of TechnologyBangaloreIndia

Personalised recommendations