skip to main content
10.1145/3456146.3456147acmotherconferencesArticle/Chapter ViewAbstractPublication PagesdsdeConference Proceedingsconference-collections
research-article

Performance Evaluation of the JK-nearest Neighbor Online Signature Verification Parameters

Authors Info & Claims
Published:08 July 2021Publication History

ABSTRACT

There are several classification algorithms used for signature verification purposes. The k-nearest neighbor (KNN) algorithm was previously used in online signature verification, but in this paper, we present an evaluation of the online signature verification using the JKNN classifier, which is a generalized case of the KNN classifier. An optimal classifier is used to evaluate the algorithm's main parameters that provide the most accurate verification results. The evaluation of each parameter of the algorithm is presented and tested using the SVC2004 database. Our results show that JKNN can provide accurate results by optimizing the main parameters of the algorithm. Both false acceptance rate and false rejection rate behave differently with different values of each parameter; the least average error rate can be achieved by choosing the parameters’ optimal values.

References

  1. A. N. Azmi, D. Nasien, and F. S. Omar. Biometric signature verification system based on freeman chain code and k-nearest neighbor. Multimedia Tools and Applications, 76(14):15341–15355, 2017. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. V. A. Bharadi, V. I. Singh, and B. Nemade. Hybrid wavelets based feature vector generation from multidimensional data set for on-line handwritten signature recognition. In 2014 5th International Conference-Confluence The Next Generation Information Technology Summit (Confluence), pages 561–568. IEEE, 2014.Google ScholarGoogle Scholar
  3. T. Cover and P. Hart. Nearest neighbor pattern classification. IEEE Transactions on Information Theory, 13(1):21–27, 1967. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. I. Isha, P. Pooja, and V. Varsha. Offline signature verification based on euclidean distance using support vector machine. International Journal of Advanced Engineering, Management and Science, 2(8):239595.Google ScholarGoogle Scholar
  5. A. Jain, S. K. Singh, and K. P. Singh. Handwritten signature verification using shallow convolutional neural network. Multimedia Tools and Applications, pages 1–26, 2020.Google ScholarGoogle Scholar
  6. S. S. Khan. Kernels for one-class nearest neighbour classification and comparison of chemical spectral data. College of Engineering and Informatics, National University of Ireland, 2010.Google ScholarGoogle Scholar
  7. S. S. Khan and A. Ahmad. Relationship between variants of one-class nearest neighbors and creating their accurate ensembles. IEEE Transactions on Knowledge and Data Engineering, 30(9):1796–1809, 2018.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. A. Kholmatov and B. Yanikoglu. Susig: an on-line signature database, associated protocols and benchmark results. Pattern Analysis and Applications, 12(3):227–236, 2009.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. M. Okawa. Online signature verification using single-template matching with time-series averaging and gradient boosting. Pattern Recognition, 102:107227, 2020.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. J. Ortega-Garcia, J. Fierrez-Aguilar, D. Simon, J. Gonzalez, M. Faundez-Zanuy, V. Espinosa, A. Satue, I. Hernaez, J.-J. Igarza, C. Vivaracho, Mcyt baseline corpus: a bimodal biometric database. IEE Proceedings-Vision, Image and Signal Processing, 150(6):395–401, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  11. D.-Y. Yeung, H. Chang, Y. Xiong, S. George, R. Kashi, T. Matsumoto, and G. Rigoll. Svc2004: First international signature verification competition. In International conference on biometric authentication, pages 16–22. Springer, 2004.Google ScholarGoogle Scholar
  12. C. S. Vorugunt, "OSVFuseNet: Online Signature Verification by feature fusion and depth-wise separable convolution based deep learning." Neurocomputing 409, 157-172, 2020.Google ScholarGoogle ScholarCross RefCross Ref
  13. A. Foroozandeh, A. A. Hemmat, and H. Rabbani. "Online handwritten signature verification and recognition based on dual-tree complex wavelet packet transform." Journal of Medical Signals and Sensors 10.3, 145-157, 2020.Google ScholarGoogle Scholar
  14. C. Nathwani. "Online Signature Verification Using Bidirectional Recurrent Neural Network." In 2020 4th International Conference on Intelligent Computing and Control Systems (ICICCS), pp. 1076-1078. IEEE, 2020.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Performance Evaluation of the JK-nearest Neighbor Online Signature Verification Parameters
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          DSDE '21: 2021 4th International Conference on Data Storage and Data Engineering
          February 2021
          165 pages
          ISBN:9781450389303
          DOI:10.1145/3456146

          Copyright © 2021 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 8 July 2021

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed limited

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format .

        View HTML Format