Advanced Intelligent Fuzzy Systems Modeling Technologies for Smart Cities
View this Special IssueResearch Article  Open Access
Shi Qiu, Fengchang Fei, Ying Cui, "Offline Signature Authentication Algorithm Based on the Fuzzy Set", Mathematical Problems in Engineering, vol. 2021, Article ID 5554341, 8 pages, 2021. https://doi.org/10.1155/2021/5554341
Offline Signature Authentication Algorithm Based on the Fuzzy Set
Abstract
There exists a problem that it is difficult to identify the authenticity of offline signatures. Firstly, a segmentation model is established based on the theory of fuzzy sets to extract signatures completely. Secondly, statistical shape model (SSM) and variance distance discretization of intraclass signatures are introduced for stability analysis and quantification. Finally, multilayer classifiers are constructed to realize signature authentication. The algorithm has low false detection rate and short authentication time.
1. Introduction
Handwritten signature authentication plays an important role in many fields [1]. Handwritten signature is a behavioral feature acquired for a period of time, and it belongs to the individual behavioral biological feature. With the rapid development of the information industry and service industry, signature authentication has attracted wide attention and has been widely used in many fields, such as financial security and identity authentication.
Signature authentication can be classified into offline and online. Offline authentication relies on static image information such as shape and texture [2]. Online authentication contains more information than offline authentication. It can be judged by dynamic information in the signature process, such as writing order, pen pressure, and writing speed [3]. Research studies on online authentication have been carried out for a long time, and good results have been achieved. Owing to the lack of dynamic signature information and available information in most cases, offline signature authentication is more difficult, but the demand for offline authentication is huge in practical applications. Offline signature authentication based on the image usually includes preprocessing, feature extraction, and signature authentication. Preprocessing mainly includes gray histogram enhancement [4], signature extraction [5], edge information enhancement [6], and image size normalization [7]. Feature extraction includes gradient [8], SIFT [9], posetoriented grid features [10], entropy [11], biological features [12], HOG features [13], histogram [14], LBP [15], and wavelet [16]. Signature authentication mainly includes SVM [17], KNN [18], neural network [19], deep learning [20], hidden Markov model [21], and artificial immune system [22].
Research studies on offline signature authentication are mainly focused on the following: (1) how can the mechanism of separating the signature from the background be constructed to extract signature information completely? (2) How can effective signature image features be extracted? (3) How can a perfect authentication mechanism be established? In order to solve these problems, we are going to construct a robust offline signature authentication model: (1) a signature extraction framework based on the fuzzy set is proposed. (2) A signature stability authentication mechanism is constructed to select stable features. (3) According to the stability of the signature, a multilevel authentication system is established to realize the signature authentication accurately.
2. Algorithm
Signatures can be affected by emotions, posture, fatigue, and other factors from psychological analysis, which can lead to fluctuations in my signature to a certain extent [23]. These differences can challenge signature authentication. Figure 1 shows the overlapping images of five signatures from two signers with different stabilities. It appears that the stability of Figure 1(a) is stronger than that of Figure 1(b). The stability of signature authentication classifiers can affect the performance of signature authentication classifiers.
(a)
(b)
Thus, we construct a multilevel signature authentication system. The flowchart is shown in Figure 2. (1) Signature images can be extracted to preprocess based on the theory of fuzzy sets. (2) SSM model and variance distance algorithm can be constructed to analyze the stability of quantized signatures. All signature samples can be divided into stability and instability. (3) For stable samples, we combine with the advantages of the hybrid extreme learning machine and sparse representation to construct a HCSV classifier for authentication. For unstable samples, template matching is used to authenticate them.
2.1. Signature Extraction Algorithm Based on the Fuzzy Set
Complete signature extraction is the precondition of subsequent operations. Different intensities in the process of signature result in different gray values on the image. So, it is difficult to extract it completely. Therefore, we introduce the theory of fuzzy sets to analyze it. Interval type2 fuzzy set (IT2FS) can effectively deal with data uncertainty. It has attracted wide attention of scholars owing to the superiority of the processing effect. Gonzalez et al. [24] used IT2FS to extract the image boundary. Shi et al. [25] established a model based on the IT2FS to achieve specific shape segmentation. Dhar and Kundu [26] fused IT2FS and Bat to realize segmentation threshold calculation. How we measure the uncertain information represented by the IT2FS is the focus of current research.
We propose a new method for calculating interval twodimensional fuzzy entropy. On the basis of satisfying the definition of the fuzzy set and considering the influence of membership degree’s fuzziness and mean value on entropy, the uncertainty information represented by the IT2FS is measured comprehensively and objectively.
Four axioms should be satisfied for the classical interval twotype fuzzy entropy : R1: if A is a nonfuzzy set, then = 0 R2: , is the complement of A R3: if fuzzy B is more than A: when , ; when , R4: when , = 1
and are the upper approximation set and the lower approximation set of A.
Burillo and Bustince [27] established interval type2 fuzzy entropy as
Fully considering the fuzziness of membership degree, the difference between upper and lower bounds of membership degree is proportional to the value of entropy, but the influence of the mean value of membership degree is not considered, and R3 and R4 are not satisfied.
Zeng and Li [28] established interval type2 fuzzy entropy as
Four axioms are satisfied, and the influence of membership degree mean is fully considered, but the influence of the fuzziness of membership degree itself about interval type2 fuzzy entropy is not considered.
We revise the above two interval type2 fuzzy entropies:
The influence of membership degree’s fuzziness on interval type2 fuzzy entropy is considered while satisfying the interval type2 fuzzy entropy theorem, and IT2FS is used to measure the uncertainty information comprehensively. The corresponding gray value at the minimum of this function is used to realize the accurate image segmentation.
In order to ensure the unity of the objective function, we normalize the real handwritten signature sample . The signature center line is made as the center, and the resolution of the signature image is unified to 256 × 128 by the nearest neighbor interpolation algorithm. On this basis, the signature center line is extracted. According to the characteristics of the signature, it should satisfy the following: (1) the center line must be continuous, and the handwriting cannot break as far as possible. (2) Center line preserves the signature framework. (3) The cross section of handwriting should be as little distorted as possible. In this paper, the algorithm proposed in [29] is used to extract the center line.
2.2. The Stability Model
The analysis of stability is the premise of signature authentication, which can be divided into signature stability and feature stability. Different algorithms are used to authenticate it by quantization stability. For signature stability and feature stability, we use the following methods to authenticate the signature stability.
Calculate the average model of N true signature features:
Calculate the deviation between each real sample and the average sample:
Calculate the covariance matrix:
Calculate the covariance matrix of eigenvalue and eigenvector :where represents the main changes of the real signature shape model. The larger the value of is, the more obvious the change of the shape model of the real signature is. We choose to approximate the change of signature samples and reduce the number of signatures.
Let ; is the contribution rate of the kth feature. The selection of t should satisfy the following constraints:
Calculate the weight coefficient of the main deformation parameters :
When SSM [30] is used to analyze the signature and feature stability, it is necessary to quantify its stability. We quantify the stability of signatures by using the square difference dispersion of the deformation parameter . Given is the true set of signature images, the mean value of class and intraclass variance can be calculated:
The intraclass variance distance dispersion SD_{k} of each signer can be obtained for stability analysis:
2.3. Signature Authentication
According to different signature stabilities, different authentication algorithms are constructed. For stable signatures, handwritten signature needs to be classified by efficient algorithms because it has few sample data. The ELM (extreme learning machine) algorithm [31] has the advantages of less training parameters and faster classification speed and is suitable for small sample datasets. The SRC (sparse representation classifier) [32] can sparsely represent features, reduce the storage of signature data, omit the pretraining stage of signature authentication, and reduce the complexity of the algorithm.
In order to fully consider the effectiveness for a given period of time, we combine the advantages of the ELM and SRC to design a hierarchical offline handwritten Chinese signature authentication scheme, as shown in Figure 3. Firstly, the ELM based on the deterministic threshold of signature authentication is used to realize the firstlevel rough classification of the signature samples, which are ready to be tested. Then, a sparse representation dictionary for the false signature and real signature is designed and implemented. The signature authentication that cannot be identified in the first step is identified by solving the sparse coefficients.
Firstlevel classification: in order to solve the classification problem of authentic and false data with less similarity between signature data, we design an ELM structure as follows: the input layer and the hidden layer of the signature sample data and the output layer of the authentication certainty of the signature sample data are used to obtain the authenticity of the signatures, which are ready to be tested.
There is a single hidden layer neural network for the signature image with N hidden layer nodes:where V is the determination of the authentication signatures; is the output weight; is the input weight; • is the inner product; is the offset of the ith hidden layer unit; and the threshold V_{T} is set to determine the accuracy of the results. When , it shows that the classification of the algorithm is reliable and can output the results directly. On the contrary, it shows that the classification reliability of the algorithm is low, and the samples need to be sent to the next level classifier for further discrimination.
Secondlevel classification: in order to solve the problem that the firstlevel classifier cannot effectively identify the authentication of samples with high similarity, a supercomplete signature dictionary is designed. All signatures of the same writer are collected as samples and classified into two categories: . 0 denotes the fake signature samples, and 1 denotes the real signature samples. Then, all samples can be expressed as . represents the matrix composed of samples arranged in the ith class. The test sample of the signature can be sparsely represented aswhere the nonzero term corresponding to belongs to the real signature. The problem of solving the sparse coefficients of the linear combination of models is the classification of signature authentication.
The solution of sparse coefficients of the signature classification is a process of reconstructing test signature samples by linear combination of all atoms in the constructed supercomplete signature dictionary. The problem of solving X by the model can be transformed intowhere represents the norm operation. Equation (15) is transformed into an NPhard problem because the constructed D is a supercomplete dictionary of true and false signatures.
At this time, is easier to solve than the norm, and is more sparse than the norm. Therefore, we use the norm to solve the classification problem of authentic and false signatures and then use the minimum residual method in the sparse classification to authenticate signatures.
For the unstable signature model, we use classical Kmeans clustering to cluster discrete unstable signature samples into templates and then use clustering centers as template matching.
Input M sample datasets for , and input Kclustering categories , where .
Energy function is constant by iteration calculation, where .
3. Experiment and Result Analysis
We construct English and Chinese databases, which are composed of the number of real signatures, the number of skilled fake signatures, and the number of unskilled fake signatures. Database 1 is from [33]. In order to verify the algorithm performance, we collect practical data to construct databases 2 and 3. The database is shown in Table 1. The proposed algorithm is written by VC++ software and WIN7 operation platform. The data ratio of the test set and training set is 1 : 1.

The proposed algorithm is related to the quantity and quality of the dataset. Currently, only Chinese and English signatures have been tested, and some results have been achieved. The proposed algorithm can be applied into other languages.
3.1. The Comparison of Signature Extraction Algorithms
In order to assess the algorithm performance, we introducewhere M is the area overlap degree; A is the gold standard for signatures extracted manually through vision; B is the result of algorithm extraction; and is the number of pixels representing the corresponding region. The bigger the M value is, the better the segmentation effect is.
According to Table 2, the signature can be extracted by all the algorithms involved. Otsu algorithm [5] establishes segmentation threshold according to the distribution of the gray histogram, which can quickly realize signature extraction. Continuity algorithm [34] extracts signatures one by one according to the continuity of signatures. EIT2FS algorithm [26] establishes a model with full consideration of noise interference based on the IT2FS. Our algorithm improves the interval type2 fuzzy entropy. It satisfies the interval type2 fuzzy entropy theorem and considers the influence of the membership degree’s fuzziness on the interval type2 fuzzy entropy so that IT2FS can represent the uncertainty information more comprehensively. Although the extraction time is longer than the algorithm in [5], the M value is the highest.

3.2. The Stability Analysis
We use the SSM algorithm and variance distance dispersion to measure the signature stability according to the sample. As shown in Figure 4, SD_{k} of signer 1 is smaller than that of signer 2, and the fluctuation is small. It can be concluded that the stability of signer 1 is higher than that of signer 2.
(a)
(b)
In order to test the effectiveness of signature stability analysis, we introduce acceptance rate (FAR) and rejection rate (FRR) as evaluation criteria:
We have compared the signature sets of five signers. FWA is the number of forged signatures wrongly accepted. FRR is the number of genuine signatures wrongly rejected. N is the total samples. We use KNN (method 1) separately and KNN (method 2) clustering based on stability analysis. The effect is shown in Table 3. It can be seen that the clustering effect of the algorithm can be improved by the data of stability analysis.

3.3. Signature Authentication
Because the signature samples are restricted by privacy and other factors, it is impossible to obtain a large number of samples. Thus, we compare our algorithm with the mainstream algorithms in all datasets on the premise of small sample size as shown in Table 4. The SVM algorithm [17] requires a large number of data samples, and the authentication effect is not good under the condition of small samples. Compared with the SVM, KNN algorithm [18] has better data requirements, but its complexity is higher. SRC [32] extracts features sparsely and better. ELM algorithm [31] realizes fast classification for small samples. BP algorithm [19] can construct a neural network structure to realize signature authenticity identification. The proposed algorithm establishes a twolevel classifier, which identifies the authentication one by one according to its stability, and achieves the best result.

4. Conclusion
Owing to the problem that it is difficult to authenticate offline signatures, an offline signature authentication method is proposed, which is suitable for multilanguages. Firstly, a segmentation model is constructed based on the theory of fuzzy set to extract the signature completely. Then, stability analysis and quantification model are proposed to identify the stability of data and features. Finally, a twolevel classifier structure is constructed to authenticate signatures one by one. In the future, we will build databases in different languages, analyze the characteristics of different languages, and realize fast signature recognition.
Data Availability
All the used data are included within the paper. Previously reported data were used to support this study and are available at https://cedar.buffalo.edu/NIJ/data/. These prior studies (and datasets) are cited at relevant places within the text as reference [33].
Conflicts of Interest
The authors declare that they have no conflicts of interest.
Acknowledgments
This work was supported by the Postdoctoral Science Foundation of China (Grant no. 2020M682144), the Science and Technology Fund of Jiangxi Education Department (Grant no. GJJ161552), the Natural Science Foundation of Jiangxi Science and Technology Department (Grant no. 20171BAB202032), Basic Research Project of Engineering University of PAP (Grant no. WJY202145), and the Open Project Program of the State Key Lab of CAD and CG (Grant no. A2026), Zhejiang University.
References
 R. Tolosana, R. VeraRodriguez, J. Fierrez, and J. OrtegaGarcia, “Exploring recurrent neural networks for online handwritten signature biometrics,” IEEE Access, vol. 6, pp. 5128–5138, 2018. View at: Publisher Site  Google Scholar
 M. Liwicki, K. Riesen, R. Ingold et al., “Offline signature verification by combining graph edit distance and triplet networks,” in Proceedings of the Joint IAPR International Workshop, S + SSPR 2018, Beijing, China, August 2018. View at: Publisher Site  Google Scholar
 L. Yang, X. Jin, and Q. Jiang, “Online handwritten signature verification based on the most stable feature and partition,” Cluster Computing, vol. 22, pp. 1–11, 2018. View at: Google Scholar
 H. H. Le and N. T. Do, “Offline handwritten signature verification using local and global features,” Annals of Mathematics and Artificial Intelligence, vol. 75, no. 12, pp. 231–247, 2015. View at: Google Scholar
 G. HafemannL, R. Sabourin, and L. S. Oliveira, “Writerindependent feature learning for offline signature verification using deep convolutional neural networks,” in Proceedings of the 2016 International Joint Conference on Neural Networks (IJCNN), pp. 2576–2583, IEEE, Vancouver, Canada, July 2016. View at: Google Scholar
 J. Hu, Z. Guo, Z. Fan, and Y. Chen, “Offline signature verification using local features and decision trees,” International Journal of Pattern Recognition and Artificial Intelligence, vol. 31, no. 3, Article ID 1753001, 2017. View at: Publisher Site  Google Scholar
 M. Sharif, M. A. Khan, M. Faisal et al., “A framework for offline signature verification system: best features selection approach,” Pattern Recognition Letters, vol. 139, 2018. View at: Google Scholar
 N. Bouadjenek, H. Nemmour, and Y. Chibani, “Age, gender and handedness prediction from handwriting using gradient features,” in Proceedings of the 2015 13th International Conference on Document Analysis and Recognition (ICDAR), pp. 1116–1120, IEEE, Tunis, Tunisia, August 2015. View at: Google Scholar
 R. Kaur and M. P. Choudhary, “Handwritten signature verification based on surf features using HMM,” International Journal of Computer Science Trends and Technology (IJCST), vol. 3, no. 1, pp. 187–195, 2015. View at: Google Scholar
 E. N. Zois, L. Alewijnse, and G. Economou, “Offline signature verification and quality characterization using posetoriented grid features,” Pattern Recognition, vol. 54, pp. 162–177, 2016. View at: Publisher Site  Google Scholar
 O. A. Rosso, R. Ospina, and A. C. Frery, “Classification and verification of handwritten signatures with time causal information theory quantifiers,” PLoS One, vol. 11, no. 12, Article ID e0166868, 2016. View at: Publisher Site  Google Scholar
 N. Li, J. Liu, Q. Li et al., “Online signature verification based on biometric features,” in Proceedings of the 2016 49th Hawaii International Conference on System Sciences (HICSS), pp. 5527–5534, IEEE, Koloa, HI, USA, January 2016. View at: Google Scholar
 Ç. Z. G. TaşkiranM, “Offline signature identification via HOG features and artificial neural networks,” in Proceedings of the 2017 IEEE 15th International Symposium on Applied Machine Intelligence and Informatics (SAMI), IEEE, Herľany, Slovakia, January 2017. View at: Google Scholar
 N. Bouadjenek, H. Nemmour, and Y. Chibani, “Fuzzy integrals for combining multiple SVM and histogram features for writer’s gender prediction,” IET Biometrics, vol. 6, no. 6, pp. 429–437, 2017. View at: Publisher Site  Google Scholar
 B. S. Thakare and H. R. Deshmukh, “A combined feature extraction model using SIFT and LBP for offline signature verification system,” in Proceedings of the 2018 3rd International Conference for Convergence in Technology (I2CT), pp. 1–7, IEEE, Pune, India, April 2018. View at: Google Scholar
 S. Shariatmadari, S. Almaadeed, Y. Akbari et al., “Offline Persian signature verification using waveletbased fractal dimension and oneclass Gaussian process,” in Proceedings of the 2018 NASA/ESA Conference on Adaptive Hardware and Systems (AHS), pp. 168–173, IEEE, EdinBurgh, UK, August 2018. View at: Google Scholar
 Y. Guerbai, Y. Chibani, and B. Hadjadji, “The effective use of the oneclass SVM classifier for handwritten signature verification based on writerindependent parameters,” Pattern Recognition, vol. 48, no. 1, pp. 103–113, 2015. View at: Publisher Site  Google Scholar
 H. Hezil, R. Djemili, and H. Bourouba, “Signature recognition using binary features and KNN,” International Journal of Biometrics, vol. 10, no. 1, pp. 1–15, 2018. View at: Publisher Site  Google Scholar
 P. Maji, S. Chatterjee, S. Chakraborty et al., “Effect of Euler number as a feature in gender recognition system from offline handwritten signature using neural networks,” in Proceedings of the 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom), pp. 1869–1873, IEEE, New Delhi, India, March 2015. View at: Google Scholar
 S. Qiu, J. Luo, S. Yang, M. Zhang, and W. Zhang, “A moving target extraction algorithm based on the fusion of infrared and visible images,” Infrared Physics & Technology, vol. 98, pp. 285–291, 2019. View at: Publisher Site  Google Scholar
 J. Coetzer, B. M. Herbst, and J. A. du Preez, “Offline signature verification using the discrete radon transform and a hidden Markov model,” EURASIP Journal on Applied Signal Processing, vol. 2004, pp. 559–571, 2004. View at: Publisher Site  Google Scholar
 C. Boufenar, M. Batouche, and M. Schoenauer, “An artificial immune system for offline isolated handwritten Arabic character recognition,” Evolving Systems, vol. 9, no. 1, pp. 25–41, 2018. View at: Publisher Site  Google Scholar
 M. Diaz, M. A. Ferrer, G. Pirlo et al., “Offline signature stability by optical flow: feasibility study of predicting the verifier performance,” in Proceedings of the 2015 International Carnahan Conference on Security Technology (ICCST), pp. 341–345, IEEE, Taipei, Taiwan, September 2015. View at: Google Scholar
 C. I. Gonzalez, P. Melin, J. R. Castro, O. Castillo, and O. Mendoza, “Optimization of interval type2 fuzzy systems for image edge detection,” Applied Soft Computing, vol. 47, pp. 631–643, 2016. View at: Publisher Site  Google Scholar
 J. Shi, J. Wu, M. Anisetti, E. Damiani, and G. Jeon, “An interval type2 fuzzy active contour model for auroral oval segmentation,” Soft Computing, vol. 21, no. 9, pp. 2325–2345, 2017. View at: Publisher Site  Google Scholar
 S. Dhar and M. K. Kundu, “A novel method for image thresholding using interval type2 fuzzy set and Bat algorithm,” Applied Soft Computing, vol. 63, pp. 154–166, 2018. View at: Publisher Site  Google Scholar
 P. Burillo and H. Bustince, “Entropy on intuitionistic fuzzy sets and on intervalvalued fuzzy sets,” Fuzzy Sets and Systems, vol. 78, no. 3, pp. 305–316, 1996. View at: Publisher Site  Google Scholar
 W. Zeng and H. Li, “Relationship between similarity measure and entropy of interval valued fuzzy sets,” Fuzzy Sets and Systems, vol. 157, no. 11, pp. 1477–1484, 2006. View at: Publisher Site  Google Scholar
 H. Daher, V. Eglin, S. Bres, and N. Vincents, “A new approach for centerline extraction in handwritten strokes: an application to the constitution of a code book,” in Proceedings of the Ninth IAPR International Workshop onDocument Analysis Systems, pp. 425–432, Boston, MA, USA, June 2010. View at: Google Scholar
 J. Ma, F. Lin, S. Wesarg et al., “A novel Bayesian model incorporating deep neural network and statistical shape model for Pancreas segmentation,” in Proceedings of the International Conference on Medical Image Computing and ComputerAssisted Intervention, pp. 480–487, Springer, Granada, Spain, September 2018. View at: Google Scholar
 Z. M. Yaseen, R. C. Deo, A. Hilal et al., “Predicting compressive strength of lightweight foamed concrete using extreme learning machine model,” Advances in Engineering Software, vol. 115, pp. 112–125, 2018. View at: Publisher Site  Google Scholar
 L. Gan, J. Xia, P. Du, and J. Chanussot, “Multiple feature Kernel sparse representation classifier for hyperspectral imagery,” IEEE Transactions on Geoscience and Remote Sensing, vol. 56, no. 9, pp. 5343–5356, 2018. View at: Publisher Site  Google Scholar
 https://cedar.buffalo.edu/NIJ/data/.
 M. K. Sharma and V. P. Dhaka, “Pixel plot and trace based segmentation method for bilingual handwritten scripts using feedforward neural network,” Neural Computing and Applications, vol. 27, no. 7, pp. 1817–1829, 2016. View at: Publisher Site  Google Scholar
Copyright
Copyright © 2021 Shi Qiu et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.