Page 82 - 2024-Vol20-Issue2
P. 82

78 |                                                               AlKarem, Khalid, & Ali

styles [9, 11]. In WD style, a classifier is trained separately    fication model based on multi-dilation convolutional neural
on samples of signatures for each person, and when a new           network, the proposed model was validated using dataset of
person’s signature joins the system, the classifier is retrained.  CEDAR that involves 24 images of genuine and 24 images
In contrast, in the WI approach the system is developed so that    of forgery for every 55 signer. Longjam et al. [21] proposed
a new person’s signature is checked without the necessity to       multi-scripted writer independent offline signature verification
retrain the classification model [12, 13]. This study proposes     method by suggesting hybrid of CNN and Bi-directional Long
to use WI style. Signature verification is an essential part of    Short Term memory (BiLstm) techniques, to recognize skilled
many business processes.                                           forgery and genuine signatures. Their study used different
There are many of introduced studies for online and offline        datasets from the literature such as GPDS-300, GPDS-Bengali,
signature verification in the literature. Ismail et al. [14] In-   GPDS-Devanagari, CEDAR, BHSig260-Bengali, BHSig260-
troduced offline Arabic signature recognition and verification     Hindi, and Meitei Mayek signature. The system evaluated on
system of two separate phases. This technique based on a           various multi-scripted signatures based offline that belongs
multistage classifier and a set of global and local features.      to multiple lingual Indian community. However, lots of stud-
The algorithms for signature verification are relies on fuzzy      ies have been proposed for WI offline signature verification.
concepts. Iranmanesh et al. [15] was employed a systematic         Yet, it is necessary to improve the overall accuracy measure-
method for online signature verification using multilayer per-     ments [7, 22–25]. Working this paper proposed a handwritten
ceptron (MLP) on a subset of principal component analysis          signature recognition method using CNN model architecture.
(PCA) features to analyze the signature time series signals.       The developed model is tested on Arabic handwriting signa-
This method explain a feature selection technique utilizing        tures data to recognize whether the provided signature is real
information extracted from PCA on handwritten signature            or forged. The contribution of this study is summarized as
which can be significant by obtaining reduced error rates, this    below:
technique obtain an 93.1% accuracy on 200 users and 8,000          1- Developing deep learning model for writer independent
signatures consisting of genuine and forger signatures. In         (WI) offline signature verification system based on convolu-
Hafemann et al. [16] the method employed the representations       tional neural network model architecture.
from signature images, using CNN to process the difficulty         2- Developing an Arabic signature dataset that consisting of
of obtaining good features, and improve system performance.        genuine signature samples and forged signature samples.
They suggested a new formulation that includes knowledge of        3- Evaluating and testing the deployed model to make classifi-
the professional forgeries from a subset of users in the feature   cation and verification on the Arabic signature dataset.
learning process, which aims to capture visual sign that distin-   The paper is organized as follows: Section II. presents the
guish real signatures and forgeries regardless of the user. In     proposed method, Section III. presents the results and discus-
Gideon et al. [17] handwritten signature forgery detection is      sions, and Section IV. presents the conclusion.
explored on English signature dataset. The forgery signature
system used the static features which involves image pro-                        II. PROPOSED METHOD
cessing techniques to analyses the accuracy of the signatures
based on a CNN. Poddar et al. [18] used a method special-          This paper introduced a method for offline handwritten sig-
ize in the signature as biometric feature to discern forgery       nature recognition, by using a deep learning concept. The
in signature. It used a Convolution Neural Network (CNN)           proposed method implemented a model architecture based on
for signature forgery detection and relies on Crest-Trough         CNN [1]. Features of CNN network is proposed to extract
method, speeded up robust features (SURF) algorithm and            depth and high descriptive cues from signature images, by
Harris corner detection algorithm; this system got an accuracy     using multiple CNN layers. Max pooling layer is proposed
of 85-89% for forgery detection and 90-94% for signature           to interpose between CNN layers to select good and most
recognition. Ghanim et al. [19] introduced SVM and CNN             representative features each time. The extracted features are
classifiers independently for offline Arabic handwritten recog-    flattened into one feature vector. Then, the fully connect
nition method, by implementing multistage cascading system.        layer (Dens network layer) with 128 neurons is proposed for
This approach began with applying the Hierarchical Agglom-         features mapping and to make classifier learns from these
erative Clustering (HAC) technique to divide the database          features. Dropout layer of 20% is proposed here to overcome
into partially interrelated clusters. The inter-relations support  overfitting problem. At last of model architecture, Softmax
representing the database as a big search tree model and help      classifier is proposed to recognize real signatures from forged
to reduce the recognition complexity in matching for each          signatures. The framework of the proposed method is depicted
test image with a cluster, and higher recognition accuracy of      in Fig. 1.
90%. Upadhyay et al. [20] introduced offline signature veri-
   77   78   79   80   81   82   83   84   85   86   87