Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014, Article ID 381469, 8 pages
http://dx.doi.org/10.1155/2014/381469
Research Article

Online Handwritten Signature Verification Using Neural Network Classifier Based on Principal Component Analysis

1Department of Computer and Communication Systems Engineering, Universiti Putra Malaysia, 43400 Serdang, Selangor, Malaysia
2Department of Systems and Networking, Universiti Tenaga Nasional, Jalan IKRAM-Uniten, 43000 Kajang, Malaysia

Received 28 January 2014; Accepted 12 June 2014; Published 14 July 2014

Academic Editor: Jian Li

Copyright © 2014 Vahab Iranmanesh et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. A. K. Jain, A. Ross, and S. Pankanti, “Biometrics: a tool for information security,” IEEE Transactions on Information Forensics and Security, vol. 1, no. 2, pp. 125–143, 2006. View at Publisher · View at Google Scholar · View at Scopus
  2. W. S. Wijesoma, K. W. Yue, K. L. Chien, and T. K. Chow, “Online handwritten signature verification for electronic commerce over the internet,” in Web Intelligence: Research and Development, vol. 2198 of Lecture Notes in Computer Science, pp. 227–236, Springer, 2001. View at Google Scholar
  3. S. Nanavati, M. Thieme, and R. Nanavati, “Other leading behavioral biometrics,” in Biometrics: Identity Verification in a Networked World, chapter 9, pp. 123–131, John Wiley & Sons, New York, NY, USA, 2002. View at Google Scholar
  4. Y. M. Al-Omari, S. N. H. S. Abdullah, and K. Omar, “State-of-the-art in offline signature verification system,” in Proceedings of the International Conference on Pattern Analysis and Intelligent Robotics (ICPAIR '11), vol. 1, pp. 59–64, June 2011. View at Publisher · View at Google Scholar · View at Scopus
  5. S. N. Yanushkevich, “Synthetic biometrics: a survey,” in Proceedings of the International Joint Conference on Neural Networks (IJCNN '06), pp. 676–683, Vancouver, Canada, July 2006. View at Scopus
  6. A. K. Jain, P. Flynn, and A. A. Ross, Handbook of Biometrics, Springer, 2008.
  7. K. Nandakumar, A. K. Jain, and A. Nagar, “Biometric template security,” EURASIP Journal on Advances in Signal Processing, vol. 2008, Article ID 579416, 2008. View at Publisher · View at Google Scholar · View at Scopus
  8. E. Maiorana, P. Campisi, J. Fierrez, J. Ortega-Garcia, and A. Neri, “Cancelable templates for sequence-based biometrics with application to on-line signature recognition,” IEEE Transactions on Systems, Man, and Cybernetics A: Systems and Humans, vol. 40, no. 3, pp. 525–538, 2010. View at Publisher · View at Google Scholar · View at Scopus
  9. E. A. Rua, E. Maiorana, J. L. A. Castro, and P. Campisi, “Biometric template protection using universal background models: An application to online signature,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 1, pp. 269–282, 2012. View at Publisher · View at Google Scholar · View at Scopus
  10. E. Grosso, L. Pulina, and M. Tistarelli, “Modeling biometric template update with ant colony optimization,” in Proceedings of the 5th IAPR International Conference on Biometrics (ICB '12), pp. 506–511, New Delhi, India, April 2012. View at Publisher · View at Google Scholar · View at Scopus
  11. F. H. Álvarez and L. H. Encinas, “Security efficiency analysis of a biometric fuzzy extractor for iris templates,” in Computational Intelligence in Security for Information Systems, vol. 63 of Advances in Intelligent and Soft Computing, pp. 163–170, Springer, Berlin, Germany, 2009. View at Publisher · View at Google Scholar
  12. A. Nagar, K. Nandakumar, and A. K. Jain, “Biometric template transformation: a security analysis,” in Media Forensics and Security II, 75410, vol. 7541 of Proceedings of SPIE, San Jose, Calif, USA, January 2010. View at Publisher · View at Google Scholar · View at Scopus
  13. S. Rashidi, A. Fallah, and F. Towhidkhah, “Feature extraction based DCT on dynamic signature verification,” Scientia Iranica, vol. 19, no. 6, pp. 1810–1819, 2012. View at Publisher · View at Google Scholar · View at Scopus
  14. V. Iranmanesh, S. M. S Ahmad, W. A. W. Adnan, F. L. Malallah, and S. Yussof, “Online signature verification using neural network and pearson correlation features,” in Proceedings of the IEEE Conference on Open Systems, pp. 18–21, 2014. View at Publisher · View at Google Scholar
  15. F. L. Malallah, S. M. S. Ahmad, W. A. W. Ahmad, V. Iranmanesh, and S. Yussof, “Online signature template protection by shuffling and one time pad schemes with neural network verification,” in Proceedings of the International Conference on Computer Science and Computational Mathematics (ICCSCM '13), pp. 53–59, 2013.
  16. D. Impedovo and G. Pirlo, “Automatic signature verification: The state of the art,” IEEE Transactions on Systems, Man and Cybernetics C, vol. 38, no. 5, pp. 609–635, 2008. View at Publisher · View at Google Scholar · View at Scopus
  17. A. Kholmatov and B. Yanikoglu, “Identity authentication using improved online signature verification method,” Pattern Recognition Letters, vol. 26, no. 15, pp. 2400–2408, 2005. View at Publisher · View at Google Scholar · View at Scopus
  18. L. Wan and Z. Lin, “Signature sample synthesis,” Encyclopedia of Biometrics, pp. 1205–1210, 2009. View at Google Scholar
  19. T. Wilkin and O. S. Yin, “State of the art: signature verification system,” in Proceedings of the 7th International Conference on Information Assurance and Security (IAS '11), pp. 110–115, December 2011. View at Publisher · View at Google Scholar · View at Scopus
  20. B. Li, K. Wang, and D. Zhang, “On-line signature verification based on PCA (principal component analysis) and MCA (minor component analysis),” in Biometric Authentication, vol. 3072 of Lecture Notes in Computer Science, pp. 540–546, 2004. View at Publisher · View at Google Scholar
  21. I. A. Ismail, T. El danf, M. A. Ramadan, and A. H. Samak, “Automatic signature recognition and verification using principal components analysis,” in Proceedings of the 5th International Conference on Computer Graphics, Imaging and Visualisation, Modern Techniques and Applications (CGIV '08), pp. 356–361, IEEE, Penang, Malaysia, August 2008. View at Publisher · View at Google Scholar · View at Scopus
  22. N. Xu, Y. Guo, L. Cheng, X. Wu, and J. Zhao, “A method for online signature verification based on neural network,” in Proceedings of the IEEE 3rd International Conference on Communication Software and Networks (ICCSN '11), pp. 357–360, Xi'an, China, May 2011. View at Publisher · View at Google Scholar · View at Scopus
  23. A. U. Khan, T. K. Bandopadhyaya, and S. Sharma, “Comparisons of stock rates prediction accuracy using different technical indicators with backpropagation neural network and genetic algorithm based backpropagation neural network,” in Proceedings of the 1st International Conference on Emerging Trends in Engineering and Technology (ICETET '08), pp. 575–580, July 2008. View at Publisher · View at Google Scholar · View at Scopus
  24. A. H. Monahan, “Nonlinear principal component analysis by neural networks: theory and application to the Lorenz system,” Journal of Climate, vol. 13, no. 4, pp. 821–835, 2000. View at Publisher · View at Google Scholar · View at Scopus
  25. S. M. S. Ahmad, A. Shakil, A. R. Ahmad, M. A. Muhamad, and R. M. Anwar, “SIGMA—a Malaysian signature’s database,” in Proceedings of the IEEE/ACS International Conference on Computer Systems and Applications, pp. 919–920, March 2008.
  26. M. Suganthy and P. Ramamoorthy, “Principal component analysis based feature extraction, morphological edge detection and localization for fast iris recognition,” Journal of Computer Science, vol. 8, no. 9, pp. 1428–1433, 2012. View at Publisher · View at Google Scholar · View at Scopus
  27. N. Xu, L. Cheng, Y. Guo, X. Wu, and J. Zhao, “A method for online signature verification based on neural network,” in Proceedings of the IEEE 3rd International Conference on Communication Software and Networks (ICCSN '11), pp. 357–360, Xi'an, China, May 2011. View at Publisher · View at Google Scholar · View at Scopus
  28. A. Shukla, J. Dhar, C. Prakash, D. Sharma, R. K. Anand, and S. Sharma, “Intelligent biometric system using PCA and R-LDA,” in Proceedings of the WRI Global Congress on Intelligent Systems (GCIS '09), vol. 1, pp. 267–272, Xiamen, China, May 2009. View at Publisher · View at Google Scholar · View at Scopus