Next Article in Journal
Surface Deformation Analysis of the Wider Zagreb Area (Croatia) with Focus on the Kašina Fault, Investigated with Small Baseline InSAR Observations
Next Article in Special Issue
Combined Fully Contactless Finger and Hand Vein Capturing Device with a Corresponding Dataset
Previous Article in Journal
BLE Fingerprint Indoor Localization Algorithm Based on Eight-Neighborhood Template Matching
Previous Article in Special Issue
Sensor-Based Technology for Social Information Processing in Autism: A Review
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Online Signature Verification Based on a Single Template via Elastic Curve Matching

1
School of Information Engineering, Wuhan University of Technology, Wuhan 430070, China
2
Hubei Collaborative Innovation Center for High-Efficient Utilization of Solar Energy, Hubei University of Technology, Wuhan 430068, China
*
Author to whom correspondence should be addressed.
Sensors 2019, 19(22), 4858; https://doi.org/10.3390/s19224858
Submission received: 29 August 2019 / Revised: 27 October 2019 / Accepted: 29 October 2019 / Published: 7 November 2019
(This article belongs to the Special Issue Biometric Systems)

Abstract

:
Person verification using online handwritten signatures is one of the most widely researched behavior-biometrics. Many signature verification systems typically require five, ten, or even more signatures for an enrolled user to provide an accurate verification of the claimed identity. To mitigate this drawback, this paper proposes a new elastic curve matching using only one reference signature, which we have named the curve similarity model (CSM). In the CSM, we give a new definition of curve similarity and its calculation method. We use evolutionary computation (EC) to search for the optimal matching between two curves under different similarity transformations, so as to obtain the similarity distance between two curves. Referring to the geometric similarity property, curve similarity can realize translation, stretching and rotation transformation between curves, thus adapting to the inconsistency of signature size, position and rotation angle in signature curves. In the matching process of signature curves, we design a sectional optimal matching algorithm. On this basis, for each section, we develop a new consistent and discriminative fusion feature extraction for identifying the similarity of signature curves. The experimental results show that our system achieves the same performance with five samples assessed with multiple state-of-the-art automatic signature verifiers and multiple datasets. Furthermore, it suggests that our system, with a single reference signature, is capable of achieving a similar performance to other systems with up to five signatures trained.

1. Introduction

Biometric authentication has always been a field of primary concern in the security application field [1,2]. Person authentication or verification using handwritten signatures is one of the most widely researched behavior-biometrics and the most popular method for identity verification [3]. Usually, signature verification systems can be divided into two categories, namely, off-line and on-line systems, which have a significant difference. Dynamic signatures are too difficult to imitate and forge, even for skilled forgers [4] because they are unique and consistent for a given period. Compared with off-line signatures [5], online signatures are more robust and gain a higher level of security by monitoring dynamic features like time series of position trajectories, pressure, altitude, and azimuth. There is a tendency to recover online signatures from offline signature images [6].
Online signature verification can basically be viewed as a problem of similarity discrimination, whereby a decision must be made about whether a given online signature corresponds to the claimed identity or not. In a signature verification system, we compare the features of a test signature against those from a set of genuine signatures of an enrolled user, which can be called reference signatures or template signatures. By stable and discriminative feature extraction and selection, there are two approaches to identify the authenticity of a signature, which can be called the function approach and the parameter approach.
Signature verification methods based on the parameter approach include the statistical classification [7,8], neural network [9], support vector machine (SVM) [10], Bayesian decision [11] and features cluster [12], where some global or local features derived from the original signature signal, e.g., average speed, pressure, the number of strokes, etc., constitute signature feature patterns or feature vectors.
The signature verification system based on a function considers each signature signal as a function of time and verifies the signer by comparing the reference signature with the test signature directly. Usually, matching procedures or special function parameter calculations are a need between signatures, requiring more time and space. The common approaches include Dynamic Time Wrapping (DTW) [13], its improved version [14,15,16,17,18,19] and the hidden Markov model (HMM) [20,21].
Bonus template matching approaches are considered, and a longest common subsequences (LCSS) combined elastic distance metrics is also used [22]. A discrete cosine transform (DCT) [23] has been applied to 44 time signals. A multi-section vector quantization (VQ) approach [24] has been suggested where all signatures are represented by vectors of the same length. Similar methods such as the Fourier description [25], wavelet packet and discrete wavelet transform (DWT) [26] have been presented too.
A function-based system utilizes all original information about the signature, and shows better performance than parameter-based systems. Nowadays, fusion for improving verification accuracy has become a promising trend, and a combination of parametric approaches and functional approaches is often adopted in literature [16,17,18,27].

1.1. Related Work

Although a signature can show individual behavior features, it is more unstable and diverse than other biometric verification technologies such as fingerprint recognition, iris recognition, face recognition and so on. Due to changes in the internal and external environment, there are fluctuations in the size, location and rotation angle of signatures with the same signer at different input times. In addition, signatures will not maintain high consistency for a long time as writing habits and the external environment change. As a result, two repetitions of a signature from the same writer never have an identical appearance [28]. Each person can even have several signatures of diverse styles, and one style of signature is obviously not suitable for the verification of another style of signature. Of course, the style variability also makes signature verification better for privacy protection than fixed biometric recognition technology.
In a traditional signature verification system, a large number of samples are mandatory when building a reliable statistical classifier and many algorithms even also require skilled forgery samples [29]. Figuring out a stable signature region is also a hot topic in recent research. Similarly [19,29], extraction of a stable signature region also depends on availabiliy of a large number of training signatures. In practice, it is often impractical to obtain various signature samples from a signer, which limits the applicability of a signature verification system.
How to reduce the enrollment signature size is a crucial issue. Another problem is how to reduce the differences between different signatures, that is, the problem of signature alignment is also a key problem to be solved.
It is the most widely used and recommended method for size alignment by max-min normalization [30]. Some template matching methods, such as DTW [14], LCSS [22] and so on, also apply for alignment. Recently, alignment methods based on Gaussian mixture model (GMM) have been developed [17], but training a Gauss model requires a large number of samples.
For selecting effective reference signatures, the intra-class variation of genuine signatures can be quantified with a correlation-based criterion which detects and recovers non-linear time distortions in different specimens as described in [31].
A single reference signature system (SRSS) for training with only a single reference signature has been proposed in [28], which followed the strategy of duplicating the reference signature to enlarge the training set. In this work, the strategy consists of duplicating the given signature a number of times and training an automatic signature verifier with each of the resulting signatures and the duplication scheme is based on a sigma lognormal decomposition of the reference signature.
Nevertheless, in a real situation, it is sometimes difficult to obtain enough signatures from a signer, especially in commercial applications and forensic covers. Therefore, this paper discusses the model and method of designing an automatic signature verification system using only one real reference signature per enrolled signer. Moreover, in this study, it is vitally important to effectively align the test signature to the reference signature for verification in order to cut down the influence of fluctuations caused by variances of size, location and rotation angle, which may deteriorate the performance of verification.
The signature trajectory can be viewed as a 2D/3D curve. The similarity between two signatures can be measured by curve similarity [32]. Curve similarity is a major category of similarity measure and a large number of similarity problems can be transformed or abstract into curve similarity problems.
Measuring curve similarity is a common method for curve matching. The curves are usually assumed to be represented as polygonal chains in the plane and to be measured by distance such as DTW or Fréchet distance as in [33]. The Fréchet distance, which relies on fewer features, can be applied for signature verification as proposed in [33].
By computing cumulative distance, DTW provides normalization and alignment as a computational technique to determine the best match between two curves, which might produce different sample points. The Fréchet distance belongs to a general class of distance measures that are sometimes called “dog-man” distances and is a max measure which is outlined in terms of the maximum leash length over a parameterization. However, two classical curve similarity measures are sensitive to data anomaly points and cannot adapt to changes in the translation and scaling of the curve.

1.2. This Paper

Our goal of this paper is to design an automatic signature verification system for a SRSS. To this end, a new curve similarity measure model and calculation method has been established, which we call the curve similarity model (CSM). The curve similarity draw lessons from geometric similarity, and can be adapted to various transformations such as translation, scaling and rotation, and can better be adapted to the inconsistency of signatures such as signature size, position and rotation angle in the signature curve.
The procedure presented in this paper considers a rigorous and adaptive CSM to build a robust SRSS. Therefore, we completed the exploratory work reported in [32], proposed a continuous and discrete curve similarity model based on transformation, and accomplished the curve optimal matching calculation based on evolutionary computation (EC) [32]. Based on the characteristics of the SRSS, a differentiated fusion feature named local similarity score (LSC) is designed for the difference calculation between two signatures.
The paper is organized as follows: Section 2 introduces the relevant definitions of CSM. Section 3 describes the proposed curve similarity calculation method and process. The fourth section describes the optimal sectional matching of signature curves and local matching feature extraction for SRSS. The experimental results will be presented and discussed in Section 3. Conclusions are drawn in the last section.

2. Model and Method

2.1. Curve Similarity Model

2.1.1. Original Definition

One curve is typically represented by a function. A definition must be provided to study the problem of the curve similarity. In geometry, there is a strict definition for shape similarity, which is an accurate similarity. In engineering applications, due to the large number of error factors, the definition of fuzzy curve similarity is adopted. Taking a 2D plane curve as an example, a kind of curve similarity is defined as follows:
Definition 1
([32]). Given functions f1(x) and f2(x), d ( f 1 , f 2 ) = C 1 C 2 | f 1 ( x ) f 2 ( x ) | d x is the distance between two functions, and also known as the function similarity distance or the curve similarity distance, where [C1, C2] is the function definition domain or the definition domain.
Definition 2
([32]). For a given threshold ε, if d(f1,f2) < ε, then f1(x) and f2(x) are similar, otherwise they are not.
As mentioned above in the definitions of curve similarity distance (CSD) and curve similarity, the two functions have the same definition domains, that is to say, two curves must be aligned first, which is very limited in practical application. In most cases, the definition domains of two functions are different, and it is necessary to perform a truncation, translation, stretching, or even rotation transformation on a function to calculate the similarity distance.
As shown in Figure 1, given a curve L, the curves L1 to L3 are new curves obtained after applying different transformations such as translation or stretching. If the above calculation method is adopted, the distances between L1 to L3 and L are different. Similar problems are available in the calculation of DTW and Fréchet distances of the curves.
From the perspective of transformation, the above several curves are similar, and the distance is 0. Therefore, when to measure the similarity between curves, the transformation of the curve should be taken into consideration. Firstly, a curve similarity distance definition based on curve transformation may be suggested.

2.1.2. Improvement Definition

Definition 3.
Given functions f1(x) defined on [R1, R2] and f2(x) defined on [C1, C2], and make transform T f 1 ( x ) = k · f 1 ( ( x b ) / a ) h , then the minimum distance of all the matching distances between f’1(x) and f2(x) with different transformation T is as follows:
d i s ( a , b , k , h ) = a R 1 + b a R 2 + b | T ( f 1 ( x ) ) f 2 ( x ) | d x = a R 1 + b a R 2 + b | f 1 ( x ) f 2 ( x ) | d x = a R 1 + b a R 2 + b | k · f 1 ( ( x b ) / a ) h f 2 ( x ) | d x = R 1 R 2 a · | k · f 1 ( t ) h f 2 ( a · t + b ) | d t t = ( x b ) / a = R 1 R 2 a · | k · f 1 ( x ) h f 2 ( a · x + b ) | d x
d ( f 1 , f 2 ) = d ( f 1 , f 2 ) = min { d i s ( a , b , k , h ) }
which is called the curve similarity distance of f2(x) to f1(x) under the transformation T, where f1(x) is called the reference function or the reference curve, f2(x) is called the comparison function or the comparison curve, f’1(x) is called the transform function or the transform curve, T is called a function similarity transformation or a curve similarity transformation (CST), and dis(a,b,k,h) is called the distance of the two curves under the curve similarity transformation T.
Obviously, the distance between the two curves is different under different similarity transformations T, and the curve similarity distance (CSD) is the distance after the optimal matching of the reference curve for the comparison curve. After the curve similarity transformation, the curve similarity distance is denoted by min{dis(a,b,k,h)}.
Once the optimal matching of the curves is obtained, the corresponding curve similarity distance can be obtained, as shown in Figure 2.
From Figure 2, a, k are translational transformations in the horizontal and vertical directions, respectively, and b, h are scaling transformations in the horizontal and vertical directions, respectively.
Therefore, the similarity of curves based on curve similarity transformation is defined as follows:
Definition 4.
Given a reference curve f1(x) and a comparison curve f2(x), for a given threshold ε, if d(f1,f2) ≤ ε, then the curve f2(x) is called similar to curve f1(x), and vice versa.

2.1.3. Discrete Definition

In engineering applications, the expression of the curve is therefore difficult to obtain, and can only be represented by an implicit function. By sampling, a continuous curve can be represented by a set of discrete ordered points. In this way, it is a common problem to measure the similarity of the two curves, which is to determine the similarity between two discrete ordered sets. As a result, a discrete curve similarity definition is needed. Similarly, the definition of discrete curve similarity transformation is given by reference to planar image transformation.
Definition 5.
Given one discrete curve FA = {(x1, y1), (x2, y2)…(xm, ym)}, and
T = [ a 0 0 0 k 0 b h 1 ]
is the curve similarity transformation matrix, where the meanings of a, b, k, h are the same as those described in Formula (1), corresponding to the translation and scale transformation of the horizontal and translation directions, respectively. F A = T · F A = { ( x 1 * ,   y 1 * ) , ( x 2 * ,   y 2 * ) , , ( x m * ,   y m * ) } is called the similarity transformation curve of FA, where:
{ x i * = a · x i + b y i * = k · y i + h
Without any doubt, the transformation matrix T can be more complicated, such as rotation, mirroring and shearing transformation, and various combinations thereof. Moreover, the definition of discrete curve similarity distance under the condition of curve similarity transformation can be given.
Definition 6.
Given a discrete curve FA = {(x1, y1), (x2, y2) … (xm, ym)} as a reference curve, another curve FB = {(x’1, y’1), (x’2, y’2) … (x’n, y’n)} is considered as a comparison curve. F’A = T • FA is transformed by a similarity transformation matrix T from FA. Among all similarity transformation matrices T, the minimum distance of all the matching distances between F’A and FB is as follows:
d i s ( t , a , b , k , h ) = 1 m i = 1 , j = i + t m | T ( x i , y i ) ( x j , y j ) |      = 1 m i = 1 , j = i + t m | ( x i * , y i * ) ( x j , y j ) |      = 1 m i = 1 , j = i + t m | ( a · x i + b , k · y i + h ) ( x j , y j ) |      = 1 m i = 1 , j = i + t m | ( a · x i + b x j , k · y i + h y j ) |      = 1 m i = 1 , j = i + t m ( a · x i + b x j ) 2 + ( k y i + h y j ) 2
D ( F A , F B ) = D ( F A , F B ) = min { d i s ( t , a , b , k , h ) } ,
which is called the curve similarity distance of FB to FA under the transformation T. The meanings of a, b, k, h are the same as those described in Formula (1) and Figure 2, corresponding to the translation and scale transformation of the horizontal and translation directions, respectively. Meanwhile, t is the starting point position of the optimal matching of the reference curve on the comparison curve.
Likewise, the definition of discrete curve similarity is as follows:
Definition 7.
Given a discrete reference curve FA and a comparison curve FB, for a given threshold ε, if D(FA, FB) ≤ ε, then the curve FB is called similar to curve FA, and vice versa.
Finally, calculating the similarity distance of the comparison curve to the reference curve is equivalent to calculating the optimal matching of the reference curve in the sense of the average distance on the comparison curve after the transformation. Therefore, performing a similarity measure between two curves requires two steps, one is to calculate the optimal matching, and the other is to perform threshold discrimination.
In the classic curve matching algorithm DTW, once a curve of two curves is translated or stretched, the distance measurement between them will be modified. In the curve similarity measure process, the curve similarity distance calculation depends on a transformation matrix. The characteristics of the transformation matrix can well prevent the deformation process of the translation, stretching and rotation of the curve. However, the transformation matrix is sometimes difficult to solve directly.
Accordingly, an evolutionary computation (EC) [32] algorithm has been introduced to obtain the transformation matrix and the optimal matching interval between two curves by minimizing the matching distance. The specific search algorithm is introduced later.

2.1.4. Matching Calculation

It can be observed from the definition that the curve similarity distance is the optimal matching of the reference curve with the comparison curve under different similarity transformations. Therefore, the matching distance between two curves under different CSTs can be obtained by random search algorithm. EC is a very effective algorithm for intelligent random search, where the similarity transformation matrix T is the parameter space of random search.
The whole idea of EC is to generate S random populations POP = {POP(0), POP(1), …, POP(S − 1)}, each of which corresponds to a set of parameters of CST T and a fitness value fitness = D(FA, FB) from Formula (6), where the fitness is smaller, the population is better. At the same time in each iteration search, each individual will generate new descendants near itself, and the best individuals can be chosen to enter the next iteration search.
The above process is repeated until the iterative search reaches the maximum number of iterations, at which point the optimal individual parameters and fitness will be regarded as CST and CSD, respectively.
At the same time, the parameters (t, a, b, k, h) should meet certain constraint conditions and adopt real coding for the signature curve matching. The boundary condition of the following system is 0 ≤ t < 2n, 0.90 ≤ a ≤ 1.10, 0.90 ≤ k ≤ 1.10, −100 ≤ b < 100, and −100 ≤ h ≤ 100, where a and k are elastic scales in the horizontal and vertical directions, and b and h are translations.
The Algorithm 1 process is as follows:
Algorithm 1. Optimal matching calculation by EC
i = 0
Forj = 0: S − 1 Do
//random generation of parameters t, a, b, k, h
initial a population POPi(j) = (t, a, b, k, h)
calculate fitness of each member in POPi(j)
End For
Whilei < Iterations Do
i = i + 1
 //sorting and classification
 order POPi−1 by fitness in ascending and divide them into 4 levels
 //acceleration search
For j = 0:S − 1 Do
  If POPi−1(j) is at level kind
   //where, kind = 1, 2, 3, 4, indicating the classification level of each population
   //random generation of new parameters t, a, b, k, h in the neighborhood
   //i.e., a = rand(POPi−1(j).a, kind)
   generate new kind+1 subpopulations nPOP from POPi−1(j)
   calculate fitness of each member in nPOP
   //sorting subpopulations
   order nPOP by fitness in ascending
    //select best subpopulation nPOP as POPi−1(j + S)
    POPi−1(j + S) = nPOP(0)
  End If
End For
 //global selection
 order POPi−1 by fitness in ascending, where there are 2S populations
 select the top S from POPi−1 as POPi
End While
When generating new kind + 1 subpopulations from one population, each subpopulation has different parameter generation range at different level. Generally speaking, the fitness is smaller, the parameter generation range of each subpopulation is narrower.
Suppose that the j-th population POP(j) is at the kind-th level, on which parameter generation range is GRkind = kind • GRmax/4, kind + 1 subpopulations nPOP can be randomly generated, here:
n P O P = { n P O P ( k ) | | n P O P ( k ) P O P ( j ) | <   G R k i n d , k = 0 ~ k i n d }
For example, for parameter a, GRmax = max(a) − min(a). When kind = 1 and a new random number r = −1 or 1 is generated, anew = aold + r • GRkind = aold + r • GRmax/4. At the same time, check whether anew satisfies the boundary condition.
The other parameters t, b, k, h all perform similar operations. Therefore, from the new subpopulation process generated by the parameters represented by each original population, the parameters of the generated subpopulations are determined according to the classification level of the original population. Although this parameter is also random, it varies randomly to the original population by its classification level.

2.2. Proposed System

Online signature verification system can be discriminated by the similarity distance of two signature curves, where one signature can be called as the reference signature and the other can be called as the comparison signature. For instance, two signature trajectories can be considered as plane curves which can be also divided into X curves and Y curves, as shown in Figure 3.
For a reference signature curve and a comparison signature curve, if the similarity distance between them is sufficiently small, it can be considered that the comparison signature is genuine one, otherwise it is a forged signature. A block diagram of the proposed system is illustrated in Figure 4.
Given SignR = {(x1, y1), (x2, y2) … (xM, yM)} and SignC = {(x’1, y’1), (x’2, y’2) … (x’N, y’N)} as the reference curve and the comparison curve, respectively. For the calculation of the similarity distance of the signature curves, if the reference curve is calculated as a whole with the comparison signature, it will lead to greater errors. Segmentation curve matching can be used to better measure local differences between curves, which could be common in complex curve similarity measures.

2.2.1. Preprocessing

As the variations in different signatures have different dynamic ranges, min–max normalization is implemented in their X and Y coordinates. One signature should be reprocessed as follows:
x i = 2000 × x min ( x ) max ( x ) min ( x ) , y i = 1000 × y min ( y ) max ( y ) min ( y )
where x and y are the original coordinates, and xi and yi are the normalized coordinates. The normalization scales of horizontal and vertical directions are different, and 2000 and 1000 are taken respectively to keep the original scale of the signature curve as much as possible.

2.2.2. Segmentation

SignR is divided into K sections and there are m data points of each the reference segmentation curve. Each the reference segmentation curve can be defined as
{ ( S i g n R ) i = { ( x t , y t ) | t [ R i , R i ] , R i R i = m } m = INT ( M / K ) R 0 = ( M m · K ) / 2 R i = R 0 + ( i 1 ) · m R i = R 0 + i · m i [ 1 , K ]
where, INT(x) is the integral function.
Likewise for the comparison curve, each possible matching interval corresponding to the reference segmentation curve can be defined as
{ ( S i g n C ) i = { ( x t , y t ) | t [ C i , C i ] , C i C i = 2 n + m } n = INT ( N / K ) C 0 = ( N n · K ) / 2 C i = C 0 + ( i 1 ) · n n / 2 m / 2 C i = C 0 + ( i + 1 ) · n n / 2 + m / 2 0 C i < C i N , i [ 1 , K ]
Here, considering the positional correlation and the deviation between the signature curves, when the reference signature length of each segmentation is m, the interval to be matched of the comparison signature is at least m in length, and is offset by n before and after the corresponding segmentation position. Equivalently, the reference curve swims within the interval to be matched on the comparison curve to obtain the optimal matching position.

2.2.3. Segmentation Matching

The process of the optimal segmentation matching is as follows:
Step 1: Take the reference signature curve as a template, and divide it into K segments according to Equation (9).
Step 2: The comparison curve should be divided into K segmentations according to Equation (10).
Step 3: For the i-th segmentation of the comparison curve, search the optimal matching with the corresponding the i-th segmentation of the reference curve by EC algorithm, and get the similarity distance di. Meanwhile, the matching distance dxi and dyi of the corresponding X, Y curves can be calculated based on the current matching result.
Step 4: Set σxi, σyi which are the standard deviation of X, Y data points in i-th segmentation of the reference curve, compare it with the matching distance dxi and dyi, and calculate the similarity score sxi and syi of this segmentation, respectively, as in Equations (11) and (12).
{ s x i = h ( d x i , σ x i , α ) + h ( d x i , σ x i , β ) + h ( d x i , σ x i , γ ) s y i = h ( d y i , σ y i , α ) + h ( d y i , σ y i , β ) + h ( d y i , σ y i , γ )
{ h ( d , σ , δ ) = 100 · exp ( 0.5 δ · d 2 / ( σ / 4 + 10 ) 2 ) α = 0.25 ~ 0.5 , β = 1 ~ 2 , γ = 2 ~ 5
Step 5: Repeat step 3 until all segmentation curves parameters are calculated.
Step 6: Calculate the average of sx, sy as the result outputs of X, Y curves’ similarity measure, and use the weighted average as the result output of the similarity measure Score of the two curves, as shown in later Formula (14).
It should be noted that when performing the optimal matching segmentation calculation, the similarity distance between the two curves can be obtained, which are considered as 2D curves. Next, the matching distances of the corresponding 1D curves X and Y can be separately calculated. Obviously, the calculated matching distances are absolute values, and if a similarity evaluation is to be performed, one threshold is needed to discriminate. For this reason, the similarity average is calculated using Gaussian functions of three different widths and the absolute distance measure is converted to a relative measure between 0 and 100. Thus, the discrimination threshold can be unified to a value between 0 and 100.
A pair of genuine signature curves is adopted for the optimal segmentation matching as seen in Figure 5. The matching results of X, Y curves are shown in Figure 6, respectively.
A pair of genuine and forged signature curves is adopted for the segmentation matching as seen in Figure 7. The matching results of X, Y curves are shown in Figure 8, respectively.
The optimal segmentation matching results between three curves are shown in Table 1 and Table 2.
It can be seen from Table 1 and Table 2 that for the similarity of X, Y curves is calculated by the same template signature and segmentations, the similarity between two genuine signatures is usually higher than that between the genuine and forged signatures. On each segmentation, the similarity calculation of the X, Y curves depends on the standard deviations of the respective segmentations in the template signature, as shown in Equation (11). To accurately estimate this deviation, a large number of genuine and forged signatures are needed for matching calculations and statistics. Obviously, this is difficult to obtain in practical applications. Here we use the intra-segmentation standard deviation of the signature segmentation itself and a deviation as the empirical value. In addition, the three control parameters α, β, and γ are equivalent to controlling the width of the Gaussian function, and are also an empirical value. Here, α = 0.4, β = 1.6, γ = 3.2 are selected. The changes in these parameters are not sensitive to the correct rate of the final evaluation results. Due to space limitations, this article will not discuss them.

2.2.4. Feature Extraction

In the i-th matching interval [Ri, Ri+1], the interval velocity ratio (IVR) of corresponding points is calculated as follows:
{ v j = ( x j x j 1 ) 2 + ( y j y j 1 ) 2 v j = ( x j x j 1 ) 2 + ( y j y j 1 ) 2 I V R i = 100 R i R i + 1 j = R i + 1 R i min ( v j + 1 v j + 1 , v j + 1 v j + 1 )

2.2.5. Similarity Measure

The similarity measure Score of two signature curves is calculated as follows:
{ S c o r e = w a · L S C + w b · G S C L S C = 1 K i = 1 K ( 0.2 s x i + 0.3 s y i + 0.5 I V R i ) G S C = g ( M / N ) w a + w b = 1 , w a 0 , w b 0
where LSC and GSC are local similarity score and global similarity score, respectively, while wa and wb are the corresponding weights. M and N are the lengths of the reference signature and the comparison signature, respectively.
Here:
g ( x ) = { 0 x < 0.5 100 × exp ( 2 ( x 1 ) 2 ) 0.5 x 2 0 x > 2
is used to calculate score of the writing time ratio of two origin signatures.
The calculation of the weight is calculated by enumeration, where wa = 0.85 and wb = 0.15, and the detailed process is shown in the next Section 3.4.
It is considered that threshold ε of the signature verification system is 60 in many cases, and when Score is greater than 60, it may be distinguished into a genuine signature, and below 60 may be considered as a forged signature.
This is similar to the 100 point test. Passing more than 60 points is a pass, and below 60 is a failure. Of course, accurately determining the threshold is also a problem that needs to be studied in depth. For each user’s signature threshold determination, some other real registration signatures or even skilled forged signatures are needed. As a single template signature authentication system, only a reasonable threshold is given here, which is one of the key issues that need to be studied in the future.

3. Experiments

In this section, experiments to evaluate the efficacy of the four datasets are described and signature verification performances are reported.

3.1. Dataset and Evaluation Protocol

The efficacy of the proposal is demonstrated on the publicly available SUSIG, SVC2004 Task1&Task2 and MCYT datasets. The main differences among the four datasets are the acquisition protocol, device, and signer. In the following, the datasets used in this paper are briefly described:
(1)
SUSIG Visual Subcorpus [34]: This dataset consists of 2820 western signatures from 94 signers with 20 genuine signatures collected in two sessions and 10 skilled forgery signatures (half are highly skilled) with an LCD touch device. For convenience, this subcorpus is called SUSIG for short in this paper. The data in SUSIG consists of X, Y, pressure, and timestamp, collected at 100 Hz.
(2)
SVC2004 Task1 Subcorpus [35]: This datasets are acquired with a Wacom graphic tablet. It consists of 800 English and Chinese signatures from 40 signers with 20 genuine signatures collected in two sessions and 20 skilled forgeries per signer. For convenience, this subcorpus is called SVC1 for short in this paper. The data in SVC1 consists of X, Y and timestamp, collected at 100 Hz.
(3)
SVC2004 Task2 Subcorpus [35]: It is also composed of 40 signers with the same number of genuine and forged signatures as in Task1. For convenience, this subcorpus is called SVC2 for short in this paper. The data in SVC2 consists of X, Y, pressure, azimuth, altitude, timestamp, and button status, collected at 100 Hz.
(4)
MCYT-100 Subcorpus [36]: It is also composed of 100 signers with 25 genuine and 25 forged signatures. For convenience, this subcorpus is called MCYT for short in this paper. The data in MCYT consists of X, Y, pressure, azimuth, altitude, timestamp, and button status, collected at 100 Hz.
Out of these, one genuine signature is selected randomly to be used as reference sample (template), and the other genuine signatures and all skilled forgeries are used as test samples. Thus, in our work there are 9480 reference and test signatures from 274 signers to be verified in total.
We adopt EER, i.e., the error rate at which false acceptance rate (FAR) and false rejection rate (FRR) are equal, as a measure for characterizing verification performance. In order to obtain reliable results for independent test data, this process of random selection of reference signatures and performance evaluation is repeated ten repetitions.

3.2. Parameter Determination for EC

Taking the template signature of Figure 5 as an example, the signature is from SVC2004 Task1 signer #1, with 147 data points. The total number of segmentations K of different data points of the reference signature is shown in Table 3.
The optimal segmentation matching calculation between the template signature and itself was executed. The theoretically similarity distance of each segmentation is theoretically zero. The parameters S and Iterations of the EC are determined by enumeration calculation as seen in Figure 9, where S = 4, 8, 12, 16, 20 and Iterations = 100, 200, 400, 800. In the abovementioned optimal segmentation matching calculation, although the global optimal parameters are not obtained, the different S and Iterations can quickly reach the local minimum. Comprehensive calculation of speed and accuracy requirements, choose S = 20 and Iterations = 400 as the control parameters for EC.

3.3. Feature Validity Test

Select 20 genuine signatures and 20 skilled forged signatures of the first signer on SVC1, take one of the first 10 genuine signatures as a template in turn, and the remaining 19 genuine signatures and 20 skilled forged signatures respectively perform matching calculation, and then calculate sx, sy, IVR, GSC, LSC, and final Score.
Figure 10a–d show the distribution of similarity differences between genuine and skilled forged signatures. Signature verification can be regarded as a two-category problem. It can be seen from the distribution process of the comparison results of the signatures in Figure 10a that only the similarity of X and Y curves are used, and it is difficult to distinguish the authenticity of each test signature. From Figure 10b, it can be seen that the IVR has a certain degree of discrimination, but there are many indistinguishable confusing signatures. However it can be clearly seen in Figure 10c that the fusion feature LSC and the global feature GSC have a high degree of discrimination. Only a very small number of test signatures are misidentified. In the Formula (11), the above several features are merged, and the similarity of the two curves can be used as a one-dimensional index. The discriminant threshold can be used to directly identify or classify the signature authenticity.
In Figure 10d, it can also be clearly seen that different template signatures have different discriminating thresholds, and the degree of discrimination between genuine and forged signatures is also different. Using the #4, #5, and #7 signatures as templates, the signature authenticity can be completely distinguished, and the #7 template has the largest degree of discrimination.

3.4. Feature Weight Calculation

Let the number of signatures of the template equal one and the weight value wa is increments from 0 to 1 with the interval 0.05. The signatures of the first four signers on SVC1 dataset are selected for training to find the optimal wa. On the four signature datasets, the respective EERs under different weights are calculated. The results are shown in Table 4.
From Table 4, it can be seen on the training samples that the minimum EER is obtained when wa = 0.85, and the EERs on the other datasets are 3.47%, 12.30%, 12.25%, and 6.07%, respectively. At this point, the same minimums are obtained on SVC1 and MCYT datasets. In Figure 11, we can see that when wa is incremented, the EER value changes to a convex function, and the EER on different datasets has only a minimum value.
In fact, we can also see that the EER is not much different when wa ∈ [0.6, 0.95], which means that our weight selection has better robustness, and when wa ≤ 0.3, The EER has increased dramatically. At the same time, when wa = 0, signature verification actually only depends on GSC the signature writing time ratio. On the SVC1 and SVC2 datasets, the EER of each is over 20%, and on the SUSIG dataset, the EER is still less than 5%. It can be seen that the writing time ratio is a better feature distinguishing the test signature. In addition, SVC1&SVC2 is much higher than the SUSIG dataset in the difficulty of signature verification of four signature datasets. This can also be obtained from the whole experimental results.

3.5. Experimental Results

Performance of the system with the maximum EER, the minimum EER, the average EER and the standard deviation of EERs measured in percentage for different number reference signatures of similarity metrics are shown in Table 5.
From the results described above, when experiments are implemented on SUSIG, EER = 3.47% can be the best result based on CSM with five reference samples. As for SVC1&SVC2&MCYT, it can be provided EER = 12.30%, EER = 12.25% and EER = 6.07%, respectively. For four different datasets and different number of reference samples, the EERs of test results with #1 template repeated 10 times are arranged in ascending order, as shown in Figure 12.
At the same time, it should be emphasized that the deviation of the maximum and minimum values of EER is more than double almost when #1 sample is randomly selected as templates in ten repetitions as seen in Table 5 and Figure 12. It demonstrates that the selection of template samples is also essential and representative template samples can effectively improve the accuracy of signature verification.
In order to demonstrate the effectiveness of our proposed method, we compare the results of our proposed method with other state-of-the-art methods. It is to be mentioned that each of these methods have different features and classifiers, and it is difficult to make comparisons between them based on different datasets. Hence, we just compare the performance of methods which are carried out on SUSIG, SVC1, SVC2 and MCYT datasets. Nevertheless, the best results methods carried out both on them are taken for comparative studies, which use five genuine reference signature of a signer for enrollment. The best EERs reported from the reference works on SUSIG, SVC1, SVC2 and MCYT are given in Table 6, Table 7, Table 8 and Table 9 with one and five genuine reference signatures.
Furthermore, it should be pointed out that the performance of a signature verification system is related to the number of samples used to build the model. Even in some statistical models, true and false signatures need to be trained. However, in many cases, it is difficult to register a large number of signatures in the actual system, which also limits the practical applications of many excellent methods, but for our signature verification system, the requirement for the number of reference signatures or templates is minimal and even only one signature can be used. Moreover, among the already known single signature systems, our performance is the best, and is very close to that of multi-signature systems.

4. Conclusions

The similarity measurement of curves is an old problem. A lot of pattern recognition problems can be converted into curve similarity problems to study. In this research, we presented a novel signature verification based on the curve similarity model, which is equally competitive when compared to other approaches and leads to much simpler and easier matching procedures. Considering internal and external writing environments being always varied, signatures were effectively aligned to the reference signature curve by CSM and a curve similarity distance was proposed to make an assessment the similarity between test signatures and references. Open access signature datasets SUSIG, SVC2004 Task1&Task2, and MCYT-100 were used in our work, and several experiments were implemented. Experimental results illustrated that the best matching could be obtained by our proposed CSM method with one signature template. The error rates EERSUSIG = 3.47%, EERSVC1 = 12.30%, EERSVC2 = 12.25% and EERMCYT = 6.07% were provided, respectively, which demonstrated the effectiveness and robustness of our proposed method. The most important thing is the case that our method can use one signature to authenticate, and the performance of our method is not much different from that of multi-signature verification systems. Finally, this innovative method opens the door to new competitions on signature verification using a single signature as reference template.

Author Contributions

H.H. and J.Z. proposed the conception of this research and drafted this article. E.Z. and J.T. focused on the collection, analysis and interpretation of data. E.Z. and J.T. revised the whole content of this manuscript. All authors approved and agreed with the final paper version to be published.

Funding

This work was supported by the National Key R&D Program of China “The study on Load-bearing and Moving Support Exoskeleton Robot Key Technology and Typical Application” [grant numbers 2017YFB1300502]; the National Natural Science Fund “The mathematical model of natural computation and research” [grant numbers 61672319, 2017].

Conflicts of Interest

None of these authors has conflict of interest in this research.

References

  1. Hammoud, R.I.; Abidi, B.R.; Abidi, M.A. Biometrics—Personal Identification in Networked Society; Springer: New York, NY, USA, 2005. [Google Scholar]
  2. Lim, M.H.; Yuen, P.C. Entropy Measurement for Biometric Verification Systems. IEEE Trans. Cybern. 2015, 46, 1065–1077. [Google Scholar] [CrossRef] [PubMed]
  3. Impedovo, D.; Pirlo, G. Automatic Signature Verification: The State of the Art. IEEE Trans. Syst. Man Cybern. 2008, 38, 609–635. [Google Scholar] [CrossRef] [Green Version]
  4. Guru, D.S.; Prakash, H.N. Online Signature Verification and Recognition: An Approach Based on Symbolic Representation. IEEE Trans. Pattern Anal. Mach. Intell. 2009, 31, 1059–1073. [Google Scholar] [CrossRef] [PubMed]
  5. Réjean, P.; Srihari, S.N. On-line and off-line handwriting recognition: A comprehensive survey. IEEE Trans. Pattern Anal. Mach. Intell. 2000, 22, 63–84. [Google Scholar]
  6. Diaz, M.; Ferrer, M.A.; Parziale, A.; Marcelli, A. Recovering Western On-Line Signatures from Image-Based Specimens. In Proceedings of the International Conference on Document Analysis and Recognition (ICDAR 14), Kyoto, Japan, 9–15 November 2017; pp. 1204–1209. [Google Scholar]
  7. Nelson, W.; Turin, W.; Hastie, T. Statistical methods for on-line signature verification. Int. J. Pattern Recognit. Artif. Intell. 1994, 8, 749–770. [Google Scholar] [CrossRef]
  8. Kiran, G.V.; Kunte, R.S.R.; Samuel, S. On-line signature verification system using probabilistic feature modeling. In Proceedings of the IEEE International Symposium on Signal Processing & Its Applications, Kuala Lumpur, Malaysia, 13–16 August 2001. [Google Scholar]
  9. Wu, Q.Z.; Jou, I.C.; Lee, S.Y. On-line signature verification using LPC cepstrum and neural networks. IEEE Trans. Cybern. 1997, 27, 148–153. [Google Scholar]
  10. Gruber, C.; Gruber, T.; Sick, B. Online Signature Verification with New Time Series Kernels for Support Vector Machines. In Proceedings of the International Conference on Biometrics ICB 2006: Advances in Biometrics, Hong Kong, China, 5–7 January 2006. [Google Scholar]
  11. Lv, H.; Wang, W. On-Line Signature Verification Based on Dynamic Bayesian Network. In International Conference on Advances in Natural Computation; Springer: Berlin/Heidelberg, Germany, 2006. [Google Scholar]
  12. Guru, D.S.; Prakash, H.N.; Manjunath, S. On-line Signature Verification: An Approach Based on Cluster Representations of Global Features. In Proceedings of the 2009 Seventh International Conference on Advances in Pattern Recognition, Kolkata, India, 4–6 February 2009; IEEE Computer Society: Washington, DC, USA, 2009. [Google Scholar]
  13. Martens, R.; Claesen, L. On-line signature verification by dynamic time-warping. In Proceedings of the 13th International Conference on Pattern Recognition, Vienna, Austria, 25–29 August 1996. [Google Scholar]
  14. Faundez-Zanuy, M. On-line signature recognition based on VQ-DTW. Pattern Recognit. 2017, 40, 981–992. [Google Scholar] [CrossRef]
  15. Sharma, A.; Sundaram, S. An enhanced contextual DTW based system for online signature verification using Vector Quantization. Pattern Recognit. Lett. 2016, 84, 22–28. [Google Scholar] [CrossRef]
  16. Sharma, A.; Sundaram, S. A Novel Online Signature Verification System Based on GMM Features in a DTW Framework. IEEE Trans. Inf. Forensics Secur. 2016, 12, 705–718. [Google Scholar] [CrossRef]
  17. Xia, X.; Chen, Z.; Luan, F.; Song, X. Signature alignment based on GMM for on-line signature verification. Pattern Recogn. 2017, 65, 188–196. [Google Scholar] [CrossRef]
  18. Fiérrez-Aguilar, J.; Krawczyk, S.; Ortega-Garcia, J.; Jain, A.K. Fusion of Local and Regional Approaches for On-Line Signature Verification. In Proceedings of the Advances in Biometric Person Authentication, International Workshop on Biometric Recognition Systems (IWBRS 2005), Beijing, China, 22–23 October 2005; Springer: Berlin/Heidelberg, Germany, 2005. [Google Scholar]
  19. Parziale, A.; Diaz, M.; Ferrer, M.A.; Marcelli, A. SM-DTW: Stability Modulated Dynamic Time Warping for signature verification. Pattern Recogn. Lett. 2019, 121, 113–122. [Google Scholar] [CrossRef]
  20. Wada, N.; Hangai, S. HMM Based Signature Identification System Robust to Changes of Signatures with Time. In Proceedings of the 2007 IEEE Workshop on Automatic Identification Advanced Technologies, Alghero, Italy, 7–8 June 2007. [Google Scholar]
  21. Shafiei, M.M.; Rabiee, H.R. A New On-Line Signature Verification Algorithm Using Variable Length Segmentation and Hidden Markov Models. In Proceedings of the International Conference on Document Analysis and Recognition, Edinburgh, UK, 6 August 2003; IEEE Computer Society: Washington, DC, USA, 2003. [Google Scholar]
  22. Gruber, C.; Gruber, T.; Krinninger, S.; Sick, B. Online Signature Verification with Support Vector Machines Based on LCSS Kernel Functions. IEEE Trans. Syst. Man Cybern. 2010, 40, 1088–1100. [Google Scholar] [CrossRef] [PubMed]
  23. Rashidi, S.; Fallah, A.; Towhidkhah, F. Feature extraction based DCT on dynamic signature verification. Sci. Iran. 2012, 19, 1810–1819. [Google Scholar] [CrossRef] [Green Version]
  24. Faundez-Zanuy, M.; Pascual-Gaspar, J.M. Efficient on-line signature recognition based on multi-section vector quantization. Pattern Anal. Appl. 2011, 14, 37–45. [Google Scholar] [CrossRef]
  25. Yanikoglu, B.; Kholmatov, A. Online Signature Verification Using Fourier Descriptors. EURASIP J. Adv. Signal Process. 2009, 2009, 1–14. [Google Scholar] [CrossRef]
  26. Fahmy, M.M.M. Online handwritten signature verification system based on DWT features extraction and neural network classification. Ain Shams Eng. J. 2010, 1, 59–70. [Google Scholar] [CrossRef] [Green Version]
  27. Barkoula, K.; Economou, G.; Fotopoulos, S. Online signature verification based on signatures turning angle representation using longest common subsequence matching. Int. J. Doc. Anal. Recognit. 2013, 16, 261–272. [Google Scholar] [CrossRef]
  28. Diaz, M.; Fischer, A.; Ferrer, M.A.; Plamondon, R. Dynamic Signature Verification System Based on One Real Signature. IEEE Trans. Cybern. 2017, 48, 228–239. [Google Scholar] [CrossRef]
  29. Parziale, A.; Fuschetto, S.G.; Marcelli, A. Exploiting stability regions for online signature verification. In New Trends in Image Analysis and Processing—ICIAP 2013; Springer: Berlin/Heidelberg, Germany, 2013. [Google Scholar]
  30. Thumwarin, P.; Pernwong, J.; Matsuura, T. FIR signature verification system characterizing dynamics of handwriting features. J. Adv. Signal Process. 2013, 2013, 183. [Google Scholar] [CrossRef] [Green Version]
  31. Di Lecce, V.; Dimauro, G.; Guerriero, A. Selection of reference signatures for automatic signature verification. In Proceedings of the Fifth International Conference on Document Analysis and Recognition, Bangalore, India, 22 September 1999. [Google Scholar]
  32. Zheng, J.B.; Zhu, G.X. A new algorithm for on-line handwriting signature verification based on evolutionary computation. Wuhan Univ. J. Nat. Sci. 2006, 11, 596–600. [Google Scholar]
  33. Zheng, J.B.; Gao, X.L.; Zhan, E.Q. Algorithm of On-Line Handwriting Signature Verification Based on Discrete Fréchet Distance. In International Symposium on Advances in Computation and Intelligence; Springer: Berlin/Heidelberg, Germany, 2008. [Google Scholar]
  34. Kholmatov, A.; Yanikoglu, B. SUSIG: An on-line signature database, associated protocols and benchmark results. Pattern Anal. Appl. 2009, 12, 227–236. [Google Scholar] [CrossRef]
  35. Yeung, D.Y.; Chang, H.; Xiong, Y.; George, S.E.; Kashi, R.S.; Matsumoto, T.; Rigoll, G. SVC2004: First International Signature Verification Competition in Biometric Authentication; Lecture Notes in Computer Science; Springer: Cham, Switzerland, 2004; pp. 16–22. [Google Scholar]
  36. Ortega-Garcia, J.; Fierrez-Aguilar, J.; Simon, D.; Gonzalez, J.; Faundez-Zanuy, M.; Espinosa, V.; Satue, A.; Hernaez, I.; Igarza, I.-I.; Vivaracho, C.; et al. MCYT baseline corpus: A bimodal biometric database. IEEE Proc. Vis. Image Signal Process. 2003, 150, 395–400. [Google Scholar] [CrossRef]
  37. Ansari, A.Q.; Singh, A.K.; Hanmandlu, M.; Kour, J. Online signature verification using segment-level fuzzy modelling. IET Biom. 2014, 3, 113–127. [Google Scholar] [CrossRef]
  38. Sae-Bae, N.; Memon, N. Online Signature Verification on Mobile Devices. IEEE Trans. Inf. Forensics Secur. 2014, 9, 933–947. [Google Scholar] [CrossRef]
  39. Ibrahim, M.T.; Kyan, M.; Guan, L. On-line signature verification using global features. In Proceedings of the IEEE Conference on Electrical & Computer Engineering, St. John’s, NL, Canada, 3–6 May 2009. [Google Scholar]
  40. Kholmatov, A.; Yanikoglu, B. Identity authentication using improved online signature verification method. Pattern Recognit. Lett. 2005, 26, 2400–2408. [Google Scholar] [CrossRef]
  41. Wang, K.; Wang, Y.; Zhang, Z. On-line signature verification using wavelet packet. In Proceedings of the IEEE International Joint Conference on Biometrics, Washington, DC, USA, 11–13 October 2011. [Google Scholar]
  42. Fierrez-Aguilar, J.; Ortega-Garcia, J.; Gonzalez-Rodriguez, J. Target Dependent Score Normalization Techniques and Their Application to Signature Verification. IEEE Trans. Syst. Man Cybern. Part C Appl. Rev. 2005, 35, 418–425. [Google Scholar] [CrossRef]
  43. Pascual-Gaspar, J.M.; Cardeñoso-Payo, V.; Vivaracho-Pascual, C. Practical On-Line Signature Verification. In Proceedings of the Advances in Biometrics, Third International Conference, Alghero, Italy, 2–5 June 2009. [Google Scholar]
  44. Fierrez-Aguilar, J.; Nanni, L.; Lopez-Peñalba, J.; Ortega-Garcia, J.; Maltoni, D. An On-Line Signature Verification System Based on Fusion of Local and Global Information. In Audio- and Video-Based Biometric Person Authentication; Springer: Berlin/Heidelberg, Germany, 2005. [Google Scholar]
  45. Nanni, L.; Lumini, A. A novel local on-line signature verification system. Pattern Recognit. Lett. 2008, 29, 559–568. [Google Scholar] [CrossRef]
  46. Cpałka, K.; Zalasiński, M.; Rutkowski, L. A new algorithm for identity verification based on the analysis of a handwritten dynamic signature. Appl. Soft Comput. 2016, 43, 47–56. [Google Scholar] [CrossRef] [Green Version]
  47. Nanni, L.; Maiorana, E.; Lumini, A.; Campisi, P. Combining local, regional and global matchers for a template protected on-line signature verification system. Expert Syst. Appl. 2010, 37, 3676–3684. [Google Scholar] [CrossRef]
  48. Muramatsu, D.; Matsumoto, T. Effectiveness of Pen Pressure, Azimuth, and Altitude Features for Online Signature Verification. In International Conference on Biometrics; Springer: Berlin/Heidelberg, Germany, 2007. [Google Scholar]
  49. Bao, L.V.; Garcia-Salicetti, S.; Dorizzi, B. On Using the Viterbi Path along with HMM Likelihood Information for Online Signature Verification. IEEE Trans. Cybern. 2007, 37, 1237–1247. [Google Scholar]
  50. Ibrahim, M.T.; Khan, M.A.; Alimgeer, K.S.; Khan, M.L.; Taj, I.A.; Guan, L. Velocity and pressure-based partitions of horizontal and vertical trajectories for on-line signature verification. Pattern Recognit. 2010, 43, 2817–2832. [Google Scholar] [CrossRef]
Figure 1. Translation and stretching transformation of curves.
Figure 1. Translation and stretching transformation of curves.
Sensors 19 04858 g001
Figure 2. The curve similarity transformation between the two curves.
Figure 2. The curve similarity transformation between the two curves.
Sensors 19 04858 g002
Figure 3. Two signature curves and their corresponding X and Y curves.
Figure 3. Two signature curves and their corresponding X and Y curves.
Sensors 19 04858 g003
Figure 4. Block diagram of the proposed system.
Figure 4. Block diagram of the proposed system.
Sensors 19 04858 g004
Figure 5. The matching results of two genuine signatures.
Figure 5. The matching results of two genuine signatures.
Sensors 19 04858 g005
Figure 6. The matching result of X and Y curves between two genuine signatures.
Figure 6. The matching result of X and Y curves between two genuine signatures.
Sensors 19 04858 g006
Figure 7. The matching results of the genuine and the forged signatures.
Figure 7. The matching results of the genuine and the forged signatures.
Sensors 19 04858 g007
Figure 8. The matching result of X, Y curve between the genuine and forged signatures.
Figure 8. The matching result of X, Y curve between the genuine and forged signatures.
Sensors 19 04858 g008
Figure 9. The optimal segmentation matching calculation with different EC parameters.
Figure 9. The optimal segmentation matching calculation with different EC parameters.
Sensors 19 04858 g009
Figure 10. One of the first 10 genuine signatures is used as the template signature in turn, and the remaining genuine and skilled forged signatures are used as the comparison result of the test signatures. (a) Score X and score Y distribution; (b) Score IVR distribution; (c) GSC and LSC distribution; (d) 10 templates in turn Score distribution.
Figure 10. One of the first 10 genuine signatures is used as the template signature in turn, and the remaining genuine and skilled forged signatures are used as the comparison result of the test signatures. (a) Score X and score Y distribution; (b) Score IVR distribution; (c) GSC and LSC distribution; (d) 10 templates in turn Score distribution.
Sensors 19 04858 g010
Figure 11. EERs and the mean on four signature datasets with different weight wa.
Figure 11. EERs and the mean on four signature datasets with different weight wa.
Sensors 19 04858 g011
Figure 12. EERs of test results with #1 template repeated 10 times for SUSIG, SVC1, SVC2 and MCYT, respectively.
Figure 12. EERs of test results with #1 template repeated 10 times for SUSIG, SVC1, SVC2 and MCYT, respectively.
Sensors 19 04858 g012
Table 1. Results of segmentation matching between a pair of genuine signature curves (K = 10).
Table 1. Results of segmentation matching between a pair of genuine signature curves (K = 10).
No.[Ri, Ri]Matchingtabkhddxdyoxoysxsy
1[3,17][0,14]01.03360.931044.622.427.870.592.377.969.2
2[17,31][15,29]150.9990.929561.611.742.479.7220.194.181.6
3[31,45][27,41]251.05−230.902955.420.734.354.7107.973.865.8
4[45,59][42,56]270.99−110.906155.413.947.923.5130.267.857.8
5[59,73][55,69]270.9060.906126.33.921.866.9234.399.195.0
6[73,87][70,84]291.06−860.906818.56.68.620.9112.189.597.1
7[87,101][82,96]281.06−611.091766.324.740.4151.5251.891.386.3
8[101,115][96,110]291.02310.916266.316.647.477.2108.488.250.9
9[115,129][108,122]280.9981.013732.624.814.735.3137.752.294.2
10[129,143][119,133]260.92660.9210044.711.043.842.5154.287.668.6
Average82.176.7
Table 2. Results of segmentation matching between a pair of genuine and forged signature curves (K = 10).
Table 2. Results of segmentation matching between a pair of genuine and forged signature curves (K = 10).
No.[Ri, Ri]Matchingtabkhddxdyoxoysxsy
1[3,17][2,16]20.96320.94−9556.415.130.270.592.388.665.6
2[17,31][26,40]260.91530.994112.096.7172.279.7220.120.923.6
3[31,45][47,61]311.04300.93−6338.39.016.654.7107.993.889.2
4[45,59][66,80]301.07130.915397.026.676.923.5130.238.336.4
5[59,73][82,96]260.94820.9−4050.210.759.366.9234.393.571.8
6[73,87][106,120]301.00820.9−1228.67.918.720.9112.185.387.4
7[87,101][119,133]230.90761.09−2061.716.439.9151.5251.896.086.6
8[101,115][135,149]190.95960.91−3037.112.329.177.2108.493.272.9
9[115,129][160,174]240.95400.94119.64.510.435.3137.797.197.0
10[129,143][179,193]231.0030.92439.617.316.642.5154.273.993.9
Average78.172.4
Table 3. Proposal parameter K with different data points of the reference signature.
Table 3. Proposal parameter K with different data points of the reference signature.
Order12345678910
Data Points Count M≤100≤150≤200≤250≤300≤350≤400≤500≤600Other
Proposal K8101214161820222430
Table 4. EERs under different weights on four datasets.
Table 4. EERs under different weights on four datasets.
#WeightAverage EER (in %)
TrainTest
wawbSVC1 *SUSIGSVC1SVC2MCYT *
10.001.0017.344.4924.2023.73
20.050.9516.564.3222.0621.66
30.100.9015.754.1320.0419.13
40.150.8515.193.9818.4718.13
50.200.8014.633.8317.0716.66
60.250.7514.003.6816.0515.54
70.300.7013.383.5415.1614.65
80.350.6512.503.4114.4613.97
90.400.6012.063.2614.0113.38
100.450.5511.443.1513.5312.93
110.500.5011.063.0613.0512.597. 50
120.550.4510.502.9912.7912.437.08
130.600.4010.252.9812.6412.256.74
140.650.359.812.9912.4912.226.51
150.700.309.313.0312.4012.166.33
160.750.258.943.0812.3212.136.13
170.800.208.753.2112.3212.156.10
180.850.158.633.4712.3012.256.07
190.900.108.643.7412.3212.426.14
200.950.058.814.0912.4712.666.34
211.000.009.884.8412.6712.916.85
* Only choose wa = 0.5~1.0 as there is a long computation time with the most signatures.
Table 5. Performances of the system with different dataset.
Table 5. Performances of the system with different dataset.
DataSet# of SamplesEER (in %)
AverageMinimumMaximum
SUSIG13.472.27%4.32%
SVC1112.309.62%14.94%
SVC2112.259.53%14.58%
MCYT16.073.98%7.92%
Table 6. Comparative studies of state-of-the-art methods implemented on SUSIG.
Table 6. Comparative studies of state-of-the-art methods implemented on SUSIG.
Method# of SamplesAverage EER (in %)
Fuzzy modeling [37]55.38
Histogram + Manhattan [38]54.37
FFT + DTW [25]53.03
DTW_Linear C [34]52.10
35 global feature + FLD [39]51.59
Parzen window + DCT [23]51.49
TASS + RLCSS [26]50.52
Target-wise [28]16.67
Proposed method13.47
Table 7. Comparative studies of state-of-the-art methods implemented on SVC1.
Table 7. Comparative studies of state-of-the-art methods implemented on SVC1.
Method# of SamplesAverage EER (in %)
DTW [40]56.96
DTW + HMM [18]56.91
LCSS + SVM [22]56.84
Wavelet Packet [41]56.65
TASS + RLCSS [26]55.33
SVC-competition [35]52.84
Target-wise [28]117.25
Proposed method112.30
Table 8. Comparative studies of state-of-the-art methods implemented on SVC2.
Table 8. Comparative studies of state-of-the-art methods implemented on SVC2.
Method# of SamplesAverage EER (in %)
Fuzzy modeling [37]57.57
Function-based + HMM [42]57.14
LCCS-SVM [22]56.84
DTW + HMM [18]56.91
LCSS [26]55.33
Feature selection + DTW [43]53.38
SVC-competition [35]52.89
5 features DTW + VQ [15]52.73
DTW with SCC [17] 52.63
Target-wise [28]118.25
Proposed method112.25
Table 9. Comparative studies of state-of-the-art methods implemented on MCYT.
Table 9. Comparative studies of state-of-the-art methods implemented on MCYT.
Method# of SamplesAverage EER (in %)
DTW + Fourier descriptors [25]57.22
Symbolic Representation [4]56.12
HMM+Parzen Window [44]55.29
Time function_LDP [45]55.20
Histogram + Manhattan [38]54.02
Neuro-fuzzy system [46]54.02
Fusion matchers [47]53.81
Dynamic programming [48]53.52
HMM + Viterbi Path [49]53.37
Wavelet coefficients [28]53.21
GMM + DTW [16]
Velocity and pressure partition [50]
53.05
51.09
Target-wise [28]113.56
Proposed method16.07

Share and Cite

MDPI and ACS Style

Hu, H.; Zheng, J.; Zhan, E.; Tang, J. Online Signature Verification Based on a Single Template via Elastic Curve Matching. Sensors 2019, 19, 4858. https://doi.org/10.3390/s19224858

AMA Style

Hu H, Zheng J, Zhan E, Tang J. Online Signature Verification Based on a Single Template via Elastic Curve Matching. Sensors. 2019; 19(22):4858. https://doi.org/10.3390/s19224858

Chicago/Turabian Style

Hu, Huacheng, Jianbin Zheng, Enqi Zhan, and Jing Tang. 2019. "Online Signature Verification Based on a Single Template via Elastic Curve Matching" Sensors 19, no. 22: 4858. https://doi.org/10.3390/s19224858

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop