2
Computer Engineering Department, Faculty of Engineering, Mutah University
Mutah, 61710, Jordan
Convert image into binary acquired images may degrade the final result of built on
system; therefore we start with enhancement as pre-
processing technique to sort out from low quality images
as well to enhance the performance of the whole system.
Image Normalization
3.1 Binarization
The first step in given approach is to convert the
Thresholding acquisitioned signature to binary form, i.e. black and white
pixels. Working in this form is more useful than any other
form, since it is easy to work with 2 bits representation of
image.
Morphology
Coloured image (2D) Binary image
Image Cropping
Edge Detection
3.3 Thresholding the boundary between two regions. There are many
operators could be used with edge detection technique
We used Otsu’s method or basically gray threshold such as canny, sobel, prewitt and roberts. In our proposed
computed used global image threshold values. Otsu’s approach we used can for the reason of clearness, table 2
method is based on threshold selection by statistical shows some of comparison results between these operators
criteria [7]. Otsu suggested minimizing the weighted sum on our prepared database.
of within-class variances of the object and background
pixels to establish an optimum threshold. Threshold value Table 2: edge detection operatores copmarsion, R is subject reader
based on this method will be between 0 and 1, after Operator Clock R1 R2 R3 R4 Clearance
achieve this value we can segment an image based on it. Canny 1.0320 97% 96% 97% 96% 96%
Sobel 0.2500 70% 66% 66% 69% 67%
Prewitt 0.0780 45% 22% 18% 24% 23%
3.4 Morphological operators
Roberts 0.0620 80% 81% 80% 81% 80%
The Mathematical Morphology is calculated based on
simple mathematical concepts from set theory, The comparison was decided subjectively by given edged
morphological operators are useful for binary image, it figures to the group of subject’s researchers who are
views binary image as asset of its foreground (1-valued) working in the image processing field to decide the
pixels, and set operations such as union and intersection clearance according to the following factors:
can be applied directly to binary image sets [9]. In our • Contrast clearance.
approach, we used bridge to connect discontinuity of • Edge clearance.
pixels, then used remove operator to remove interior • Continuity clearance.
pixels keeping the boundaries of signature. A The canny method differs from the other edge-detection
skeletonization is used to remove pixels on the boundaries methods in that it uses two different thresholds (to detect
of objects but does not allow objects to break apart. The strong and weak edges), and includes the weak edge in the
pixels remaining make up the image skeleton. output only if they are connected to strong edge. This
method is therefore less likely than the other to be fooled
by noise, and more likely to detect true weak edges.
5. Conclusion
This paper proposed new approaches of pre-processing
and auto cropping of signature images, where the given
approach shows high accuracy of signature object
detection and segmentation, the performance of this
approach was shown through its speed time, and keeping
the content information of the signature object without
losing.
IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 2, No 4, March 2010 5
www.IJCSI.org
References
[1] Fang, B. Off-line signature verification with generated [9] Gonzalez, R.C., R.E. Woods, and S.L. Eddins, Digital Image
training samples. in IEE Proc.Vis. Image and Signal Processing USING MATLAB. 2004: Pearson Prentice Hall.
Processing. 2002. [10] Neoh., H.S. and A. Hazanchuk. Adaptive Edge Detection
[2] Plamondon, R. and G. Lorette, Automatic signature for Real-Time Video Processing using FPGAs. in GSPx 2004
verification and writer identification: The state of the art. Conference. 2004.
Pattern Recognition, 1989 22(2): p. 107-131.
Bassam AL-Mahadeen is an assistant professor at Math & IT
[3] Abuhaiba, I.S., Offline Signature Verification Using Graph
department, faculty of science at Tafila Technical University,
Matching. Turk. J. Elec. Engin, 2007. 15(1): p. 89-104. Jordan. He obtained his PhD in CIS from Arab Academy for
[4] Kővári, B. Extraction of Dynamic Features for Off-line Banking & Financial Sciences, Jordan in 2005. He also holds MSc
Signature Analysis. in Automation and Applied Computer in Computer Science from Al Al-Byte University, Jordan in 1999,
Science Workshop (AACS). 2007. and BSc in Computer Science from Mutah University, Jordan in
[5] Santosh, K. and N. Cholwich, A Comprehensive Survey on 1992. His research interests include Wireless image sensor
On-Lie Handwriting Recognition Technology and its Real networks, RFID applications, Healthcare Simulation and Modeling,
image processing, and Interconnection Networks. He was the
Application to the Nepalese Natural Handwriting. Director of Computer Center at Tafila Technical University, and
Kathmandu University Journal of Science, Engineering and Full Time Lecturer at Mutah University. He is a member of IAJIT.
Technology, 2009. 5(1): p. 31-55.
[6] Fierrez-Aguilar, J., Alonso-Hermira, N., Moreno-Marquez, Mokhled S. AlTarawneh is an assistant professor at computer
G., Ortega-Garcia, J., An off-line signature verification engineering department, faculty of engineering at Mutah University,
system based on fusion of local and global information. Proc. Jordan. He is also a director of computer center, Mutah University.
of BIOAW, Springer LNCS-3087, 2004: p. 295–306. His research interests include computer vision, pattern recognition,
[7] Otsu, N., A threshold selection method from gray level image processing, image quality assessment, and biometrics.
Altarawneh is a member of Jordan Engineers Association (JEA),
histograms. IEEE Trans. Systems, Man and Cybernetics, member of Arab Computer Society (ACS), member of IET, UK and
1979. 9: p. 62-66. International Engineers Association (IAENG). AlTarawneh holds a
[8] Muralidharan, N. Signature Verification: A Popular Doctorate degree in computer engineering from Newcastle
Biometric technology. in Second LACCEI International University, United Kingdom. He received the master's degree from
Latin American and Caribbean Conference for Engineering University of the Ryukyus, Okinawa, Japan, the BE degree in
computer engineering from Azerbaijan Technical University, Baku,
and Technology. 2004.
Azerbaijan.