I. INTRODUCTION
The recent advances in technology and increasing requirement for security have resulted in rapid development of
personal identification based on biometrics. Modern systems
aim to move security from simple static passwords to more
dynamic security measures to suit the comfort level of the
user in mobile-commerce and web-commerce. Biometric authentication finds its application in secure electronic banking,
mobile phone transactions, credit cards, secure access to
buildings and network services. New pattern recognition
techniques that can mine and discover behavioral knowledge in large data sets are very much essential. The major
challenge in signature authentication is that, it is strongly
affected by user-dependencies as it varies from one signing
instance to another in a known way. It is well known that
no two genuine signatures of a person are precisely the
same and some signature experts note that if two signatures
written on paper were same, then they could be considered
as forgery by tracing [3]. Even if the forger takes great pain
in remembering the styles and contours of the strokes, it is
extremely unlikely that he/she would be able to match the
velocity profile or any other dynamic characteristics of the
original signature [2].
II. BACKGROUND
The image can be decomposed into a sum of basic structures. The Zernike moments are a set of complex polynomials
inside the unit circle, x2 +y 2 = 1. This set completely covers
the interior of the unit circle. Geometric moment of an image
provide scaling and translation invariance. Its basis set is
not orthogonal, computationally expensive as the redundant
information are coded and recovery of image is difficult [19],
[21]. Zernike moments are applied on normalized image.
Radhika is with B.M.S.College of Engineering, Basavangudi, Bangalore560019, Karnataka, INDIA e-mail:radhikakr@ieee.org
M K Venkatesha is with R.N.S.Institute of Technology, Bangalore560062, Karnataka, INDIA
G N Shekar is with B.M.S.College of Engineering, Basavangudi, Bangalore 560019, Karnataka, INDIA
(1)s
s=0
(2n m s)!
2(ns)m
s!(n s)!(n m s)!
(1)
x +y
in polar coordinates.
(2)
where
r=
x2 + y 2 + z 2 , =
d
d
, =
dt
dt
r = x
sincos + ysinsin + zcos
= x
coscos + ycossin zsin
=
xsin + ycos
h1 = r(r r2 r2 sin2 )
1 d 2
2
(r ) r sincos
h2 =
r dt
1 d 2 2
(r sin )
h3 =
rsin dt
The r is the radial distance of a point from origin. x
, y
and z are unit vectors. is the azimuth angle and is the
Fig. 1.
Fig. 5.
Fig. 2.
Fig. 3.
n
6
6
6
6
6
6
6
6
6
6
6
6
6
m
6
6
5
5
4
4
3
3
2
2
1
1
0
Polynomial
6 cos[6]
6 sin[6]
5 (6 + 72 )cos[5]
5 (6 + 72 )sin[5]
4 (15 422 + 284 )cos[4]
4 (15 422 + 284 )sin[4]
3 (20 + 1052 1684 + 846 )cos[3]
3 (20 + 1052 1684 + 846 )sin[3]
2 (15 1402 + 4204 5046 + 2108 )cos[2]
2 (15 1402 + 4204 5046 + 2108 )sin[2]
(6 + 1052 5604 12608 + 46210 )cos[]
(6 + 1052 5604 12608 + 46210 )sin[]
1 422 + 4204 16806 + 31508 277210 + 92412
Fig. 6.
B. Future Works
The next step of improvement would be to achieve the
shape analysis of acceleration plot using 3D Zernike polynomials [9], [11], [15] in fast computation mode [12], [17]
with translation invariant central moments [18]. The experimental results could be given for radial basis function [RBF]
classifier on the large MCYT signature database of 330
signers, 16500 signatures. This database consist of random
and skilled forgeries [22].
IX. ACKNOWLEDGEMENTS
The authors would like to thank J.Ortega-Garcia for
the provision of MCYT Signature database from Biometric Recognition Group, B-203, Universidad Autonoma de
Madrid SPAIN [1].
R EFERENCES
[1] J.Ortega-Garcia, Fierrez-Aguilar et al, MCYT baseline corpus: a bimodal biometric database ,IEEE Proc .Vision, Image
and Signal Processing, vol.150, no.6, pp 395-401, December
2003.
[2] G.V.Kiran, R.Srinivasa Rao Kunte,Sudhaker Samuel, On-line
signature verification system using probabilistic feature modelling,Proc. International Symposium on Signal Processing
and its applications,vol 1,pp 355-358,2001.
[3] G.K.Gupta, R.C.Joyce, Using position extrema points to
capture shape in on-line hand written signature verification,
Pattern Recognition, vol 40, pp. 2811 - 2817, 2007.
[4] Julian Fierrez, Javier Ortega-Garcia, Daniel Ramos, Joaquin
-Rodriquez, HMM-based on-line signature verification: Feature extraction and signature modeling, Pattern Recognition
Letters, vol 28, no 16, pp. 2325-2334, December 2007.
[5] D.S.Guru,H.N.Prakash, Symbolic Representation of On-line
signatures, in Proc. Int Conf on Computational Intelligence
and Multimedia applications,vol 2 ,pp. 313-317,2007.
[6] Oscar Migual-hurtado,Luis Mengibar-Pozo,Micheal G.
Lorenz, Judith Liu - Jimene, On-line signature verification
by Dynamic Time Warping and Gaussian mixture models
,in Proc. 41st annual IEEE Int Carnahan Conf on security
technology, pp. 23-29,October 2007.
[7] Moussa Djioua,Christian OReilly and Rejean Plamondon, An
interactive trajectory synthesizer to study outlier patterns in
handwriting recognition and signature verification ,in Proc.
18th Int Conf on Pattern Recognition, vol 1 ,pp. 11241127,2006.
[8] R.S Kashi, J hu,N.L.Nelson,W.Turin, On-line Handwritten
signature verification using hidden Markov Model features, in
Proc. 4th Int Conf of Document analysis and Recognition,vol.
1 pp. 253-257,1997.
[9] Marcin Novotoni, Reinhard Klein, Shape retrieval using 3D
Zernike descriptors, in Proc. Journal Computer-Aided design,vol 36,pp. 1047-1062,2004.
[10] Heloise Hse ,A.Richard Newton,Sketched Symbol Recognition using Zernike moments,in Proc. IEEE Int conf on Pattern
Recognition, vol 1,pp. 367-370,2004.
[11] Marcin Novotni, Reinhard Klein, 3D Zernike Descriptors for
Content Based Shape Retrival, in Proc. Int conf on Image and
Vision Computing, pp. 237-242, 2001.
[12] Chong, Chee-Way, R.Mukundan, P.Raveendran, An Efficient
Algorithm for fast computation of Pseudo-Zernike moments,
in Proc. Int conf on Image and vision computing, pp. 237-242,
2001.
[13] Maurice Milgram, Mattieu Jobert, Bertrand Lamy, A Segmentation Free Approach to symbol extraction and recognition
from image document, in Proc. Workshop on machine vision
applications, pp. 475-478,1990.
[14] James C Wyant, Applied optics and optical Engineering.
Chapter 1: Basic Wavefront Aberration Theory for optical
metrology, vol XI, 1992.
[15] N.Canterakis, 3D Zernike moments and Zernike affine invariants for 3D Image Analysis and Recognition, in Proc.
Scandinavin conference on Image Analysis, vol 1, pp. 85-93,
1999.
[16] A. Padilla-Vivanco,A. Martinez-Ramirez, F.GranadosAgustin, Digital image reconstruction by Zernike moments,
in Proc. Optics in atmospheric propagation and adaptive
systems VI, vol. 5237, pp. 281-289,2003.
[17] Gholem Reza Amayeh, Ali Erol, George Bebis , Mircea
Nicolescu, Accurate and efficient computation of high order
Zernike, in Proc. Int Symposium on Advances in visual
computing, vol. 3804, pp. 462-469,2005.
[18] Chee-way Chong, P.Raveendran, R. Mukundan, Translation
invariants of Zernike moments, in Proc. Pattern Recognition,
vol. 36 , pp. 1765-1773,2003.
[19] Palak Amin, K.P.Subbalakshmi, Rotation and Cropping resilient data hiding with Zernike moments, in IEEE Proc.
International Conference on image processing, pp. 2175-2178,
2004.
[20] P.Nassery, K.Faez, Signature pattern recognition using
pseudo Zernike moments and a fuzzy logic classifier, in IEEE
Proc. International Conference on Image Processing, pp. 197200, 1996.
[21] Arnaud De Meyer, Colette turck, Alian Dieterlen,DanielJoseph Lougnot , PSF analysis with Zernike moments, a tool
toward characterization in 3D microscopy,in Proc. Workshop
on Physics in signal and Image Processing, pp. 40-41, 2007.
[22] Julian Fierrez-Aguilar, Loris Nanni, Jaime Lopez-Penalba,
Javier ortega-Garcia, Davide Maltoni, An On-line Signature
Verification System Based on Fusion of Local and Global
Information, in Proc. Int. Conf. on Audio and Video Based
Biometric Person Authentication, LNCS, vol.3546, pp. 523532, Springer, Heidelberg, 2005.
[23] Siyuan Chen, Sargur Srihari, Use of Exterior Contours and
Shape Features in Off-line Signature Verification, in Proc.
Int. Conf. on Document Analysis and Recognition, vol. 2, pp.
1280-1284, 2005.
[24] A. El-ghazal, O. Basir, S.Belkasim, A New Shape Signature
for Fourier Descriptors, in Proc. Int. Conf. on Image Processing, vol. 1, pp. 161-164, 2007.
[25] K.R.Radhika, S.V.Sheela, M.K.Venkatesha and G.N.Sekhar,
Multimodal Authentication using Continuous Dynamic Programming, Joint COST 2101 & 2102 International Conference on Biometric ID Management and Multimodal Communication, LNCS Springer, Heidelberg 2009(at press).
[26] Arnold Wiliem, Vamsi Krishna Madasu, Wageeh Boles,
Prasad Yarlagadda, A face recognition approach using Zernike
Moments for video surveillance, in Proc. RNSA Security
Technology Conference, pp. 341-355, 2007.
[27] M Hamandlu, O.V.Ramana Murthy, Fuzzy model based
recognition of handwritten numerals, Pattern Recognition, pp.
1840-1854, 2007.