Skip to main content

Off-line signature verification without requiring random forgeries for training

  • Session IA1b — Feature Matching & Detection
  • Conference paper
  • First Online:
Image Analysis Applications and Computer Graphics (ICSC 1995)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1024))

Included in the following conference series:

Abstract

This paper presents an Off-line Signature Verification System for the elimination of random forgeries. Compared with the proposed systems thus far, our system is trained with genuine signatures only. This eliminates many of the problems existent in the current systems. The proposed system is evaluated with a data base of 200 signatures.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. D. A. Mighell, T. S. Wilkinson and J. W. Goodman. Backpropagation and its application to handwritten signature verification. Tourtzkey, D. (Ed), Advances in Neural Information Processing Systems 1, pp. 341–347, Morgan Kaufman, 1989.

    Google Scholar 

  2. D. K. R. McCormack and B. M. Brown. Handwritten signature verification using the Backpropagation neural network. In Neural Computing Research and Applications: Part Two, pp. 243–251, Queen's University of Belfast, N. Ireland, 1992.

    Google Scholar 

  3. G. A. Carpenter, S. Grossberg, N. Markuzon, and J. H. Reynolds. Fuzzy ARTMAP: A neural network architecture for incremental supervised learning of analog multidimensional maps. IEEE Tran. Neural Networks. Vol. 3. No. 5. 698–713, 1992.

    Google Scholar 

  4. G. W. Cottrell, P. Munro, and D. Zipser. Image Compression by back propagation: an example of exlensional programming. Advances in Cognitive Sciences, 3, Sharkey, N.E. (Ed), Norwood, NJ, 1989.

    Google Scholar 

  5. H. Cardot, M. Revenu, B. Victorri, and M. Revillet. An artificial neural network a rehi tecture for handwritten signature authentication, SEPT, 42 rue des Coutures, 14000 Caen, France, 1992.

    Google Scholar 

  6. N. Ostu. A threshold selection method from gray-level histograms. IEEE Trans. Syst. Man. Cybernetics, Vol. SMC-9, NO. 1, 62–66, 1979.

    Google Scholar 

  7. R. Plamondon and G. Lorette. Automatic Signature Verification and Writer Identification: The State of The Art. Pattern Recognition, Vol. 22. No. 2, 107–131, 1989.

    Google Scholar 

  8. R. Sabourin, M. Cheriet and G. Genest. An Extended-Shadow-Code Based Approach For Oil-Line Signature Verification. Proc. 2nd. Int. Conf. Doc. Ananlysis and Recognition., pp. 1–6, Tsukuba science city, Japan, October 20–22, 1993.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nabeel A. Murshed .

Editor information

Roland T. Chin Horace H. S. Ip Avi C. Naiman Ting-Chuen Pong

Rights and permissions

Reprints and permissions

Copyright information

© 1995 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Murshed, N.A., Bortolozzi, F., Sabourin, R. (1995). Off-line signature verification without requiring random forgeries for training. In: Chin, R.T., Ip, H.H.S., Naiman, A.C., Pong, TC. (eds) Image Analysis Applications and Computer Graphics. ICSC 1995. Lecture Notes in Computer Science, vol 1024. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-60697-1_93

Download citation

  • DOI: https://doi.org/10.1007/3-540-60697-1_93

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-60697-0

  • Online ISBN: 978-3-540-49298-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics