Skip to main content

Analysis of Handwritten Signature Image

  • Conference paper
Security Technology (SecTech 2009)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 58))

Included in the following conference series:

  • 796 Accesses

Abstract

Handwritten Signature Identification is a classical work area in the line of Computer Science and Technology since last few years. Various new techniques of Image Analysis also attracting the Computer Scientists as well. Firstly, Pixel clustering is used to transform the signature image into bi-color image. Then secondly, instead of considering the whole image, only signature area is extracted. Thirdly, by using Image scaling technique the signature image resized along the coordinate directions. As different techniques are used to subsample (image after transformation) which will be discussed in turn. Fourthly, a different technique is used for thinning to reduce the threshold output of an edge detector algorithm is used to lines of a single pixel thickness. In this paper we propose the above mentioned series of techniques as the preprocessing analysis part of Handwritten Signature Recognition.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Young, T., Gerbrands, J.J., van Vliet, L.J.: Morphology-based Operations, http://www.ph.tn.tudelft.nl/Courses/FIP/noframes/fip-Morpholo.html (last visited on May 16, 2009)

  2. Bloomberg, D.S., Vincent, L.: Pattern Matching using the Blur Hit-Miss Transform. Journal of Electronic Imaging 9(2), 140–150 (2000)

    Article  Google Scholar 

  3. Serra, J., Vincent, L.: An Overview of Morphological Filtering. Circuits, Systems and Signal Processing 11(1), 47–108 (1992)

    Article  MATH  MathSciNet  Google Scholar 

  4. Bloomberg, D.S., Vincent, L.: Blur Hit-Miss Transform and its Use in Document Image Pattern Detection. In: Proceedings of SPIE, Document Recognition II, San Jose CA, March 30, vol. 2422, pp. 278–292 (1995)

    Google Scholar 

  5. Al-Otum, H.M., Uraikat, M.T.: Color image morphology using an adaptive saturation-based technique. Optical Engineering, Journal of SPIE 43(6), 1280–1292 (2004)

    Article  Google Scholar 

  6. Dutta Majumder, D., Chanda, B.: Digital Image Processing and Analysis. Prentice-Hall of India Pvt. Ltd., Englewood Cliffs (2006)

    Google Scholar 

  7. Zimmer, A., Ling, L.L.: A Hybrid On/Off Line Handwritten Signature Verification System. In: International Conference on Document Analysis and Recognition, Edinburgh, Scotland, August 3-6, vol. 1, pp. 424–428 (2003)

    Google Scholar 

  8. Kashi, R.S., Turin, W., Nelson, W.L.: On-line handwritten signature verification using stroke direction coding. Optical Engineering, SPIE Digital Library 35, 2526 (1996)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bhattacharyya, D., Das, P., Bandyopadhyay, S.K., Kim, Th. (2009). Analysis of Handwritten Signature Image. In: Ślęzak, D., Kim, Th., Fang, WC., Arnett, K.P. (eds) Security Technology. SecTech 2009. Communications in Computer and Information Science, vol 58. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-10847-1_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-10847-1_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-10846-4

  • Online ISBN: 978-3-642-10847-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics