Table of Contents Author Guidelines Submit a Manuscript
Wireless Communications and Mobile Computing
Volume 2018, Article ID 5412925, 10 pages
https://doi.org/10.1155/2018/5412925
Research Article

A Mobile Computing Method Using CNN and SR for Signature Authentication with Contour Damage and Light Distortion

1School of Electrical and Control Engineering, Xi’an University of Science and Technology, Xi’an, China
2School of Software, Beijing Institute of Technology, China
3Department of Computer Information and Security, Sejong University, Republic of Korea
4School of Information Engineering, Yangzhou University, Yangzhou 225127, China

Correspondence should be addressed to Mei Wang; nc.ude.tsux@mgnaw and Yujie Li; moc.liamg@iljyzy

Received 21 November 2017; Accepted 21 March 2018; Published 25 June 2018

Academic Editor: Haider Abbas

Copyright © 2018 Mei Wang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Abstract

A signature is a useful human feature in our society, and determining the genuineness of a signature is very important. A signature image is typically analyzed for its genuineness classification; however, increasing classification accuracy while decreasing computation time is difficult. Many factors affect image quality and the genuineness classification, such as contour damage and light distortion or the classification algorithm. To this end, we propose a mobile computing method of signature image authentication (SIA) with improved recognition accuracy and reduced computation time. We demonstrate theoretically and experimentally that the proposed golden global-local (G-L) algorithm has the best filtering result compared with the methods of mean filtering, medium filtering, and Gaussian filtering. The developed minimum probability threshold (MPT) algorithm produces the best segmentation result with minimum error compared with methods of maximum entropy and iterative segmentation. In addition, the designed convolutional neural network (CNN) solves the light distortion problem for detailed frame feature extraction of a signature image. Finally, the proposed SIA algorithm achieves the best signature authentication accuracy compared with CNN and sparse representation, and computation times are competitive. Thus, the proposed SIA algorithm can be easily implemented in a mobile phone.

1. Introduction

Artificial intelligence influences the information technology being developed in today’s world. People use artificial intelligence digital information technology almost anywhere and at any time. This supports daily social life and economic activities and contributes greatly to the sustainable growth of the economy and solves various social problems [1]. A signature is a commonly used human feature for identity authentication [24]. Artificial intelligence approaches to signature authentication have been evolving from offline methods to online methods to meet modern demands.

Regarding offline methods, researchers have developed signature recognition methods using a fusion algorithm involving distance and centroid orientation [5]. Additionally, the single optimized dehazing method has been proposed to estimate atmospheric light and remove the haze from an image [6], and methods to ensure consistency of signature verification have been proposed [710]. Dissimilarity normalization, shape features, and complex network spectrums have also been developed to assist in signature verification [1114]. In addition, scientists presented a multitask metric learning recognition method that uses true and fake samples to calculate the similarity and dissimilarity of a signature [15]. Fine geometric structures were encoded by using a mesh template and splitting the area of the subset of features to analyze and verify a signature [16, 17].

Regarding online methods, scientists have utilized fast Fourier transform (FFT) [18] and dynamic time warping (DTW) [19] methods for on-air signature verification based on video, leading to the discrete cosine transform developed for online signature verification [20]. Researchers have also developed a signature alignment verification method to obtain a best match effect on the basis of a Gaussian mixture algorithm [21]. Scientists have further developed various image-processing approaches, such as image descattering, color restoration, and image quality assessments that support signature verification activities.

Current state-of-the-art methods include deep learning and artificial intelligence. Recently, the convolutional neural network (CNN) method has become a popular research topic in many applications. Additionally, researchers have proposed deep probabilistic neural networks and optimal parameters determined by particle swarm optimization (PSO) as a signature method design. In more modern applications, the traditional template signature has been replaced by the hidden signature to minimize the mean misalignment. Scientists have applied CNN to establish a fast level set algorithm to solve the color distortion problem for wound image intensity correction and segmentation processing, which could have applications in signature verification [22].

Deep CNN was originally developed for object classification, and reinforcement learning was developed to detect abnormal information [23]. For signature image authentication (SIA), scientists have proposed the improved CNN method to process distorted samples and decrease the distortion [24, 25]. Sparse representation (SR) has been proposed for a separate feature-level fusion to integrate multiple feature representation [26]. Also, the local SR was proposed to improve robustness in cases of partial occlusion, deformation, and rotation in visual tracking [27]. The hierarchical SR was developed for synthetic aperture radar image classification [28]. In addition, researchers have developed the probabilistic class structure [29] and the sparse exponent batch processing method [30] combined with artificial intelligence methods for signature verification.

Meanwhile, mobile systems have been developing rapidly, and the above methods have not considered signature authentication applications for mobile systems, especially mobile phones. Based on the lack of such research, this paper addresses the problems of contour damage and light distortion as well as the classification accuracy of signature images. A combination of CNN and SR is proposed as a potential signature authentication method for mobile phones.

The organization of this paper is as follows: Section 2 presents the basic design for the signature authentication system, the golden global-local (G-L) filtering algorithm to solve the contour damage problem, the minimum probability threshold (MPT) segmentation algorithm to obtain the minimum error result, the CNN design for decreasing the light distortion, and the SIA algorithm to increase the recognition accuracy and obtain better speed performance. Section 3 discusses the experiments and comparisons. Finally, Section 4 concludes the paper.

2. Materials And Methods

The proposed system collects signature image samples using a mobile phone with the CamScanner app. Then ACDSee software is used for image cutting creating an image size of 64 × 128 pixels. Furthermore, MATLAB is used to conduct the CNN training and the SR method design. Finally, the SIA result is obtained and presented as output.

We design the signature authentication system scheme as shown in Figure 1. First, true signature images are collected by the mobile phone. Then, the signature verification system is applied on the basis of the deduced golden G-L filtering algorithm, the proposed MPT algorithm, and the proposed SIA algorithm. Finally, the application program of the SIA is installed in a mobile phone.

Figure 1: Signature authentication scheme.
2.1. Derivation Of Golden G-L Filtering Algorithm For Contour Damage Mending

In order to mend the contour damage, remove noise, and smooth the signature image, a filtering process is needed first. Filtering is a convolution process of the input signature image with a core. Commonly used filtering methods are Gaussian filtering and mean filtering.

However, the Gaussian filtering effect should be improved, while mean filtering lacks scaling properties in variance and rotation symmetry. Therefore, we developed the golden G-L filtering algorithm below.

An original signature image, , occupies the total area . The global mean gray value of image iswhere is the gray value of a pixel and are the coordinates of a pixel, and and are the row number and the column number of the original signature image , respectively.

The gray value variance of the original signature image iswhere is the global mean gray value of image , is the local mean gray value of a pixel, and and were defined previously.

In order to obtain a better filtering effect, we define the G-L mean parameter by a combination of the mean filtering method with a golden section number .

The local neighbor area of a pixel is selected to be five rows and five columns, so it occupies the local area . The local mean gray value of image is thenwhere the pixel coordinates are and is the gray value of a pixel.

According to experiments we conducted, a new parameter of the G-L mean gray value is defined below.where , , is the golden section number (), and are the global area and the local area of a pixel, respectively, and , , and represent pixel coordinates.

The G-L mean is defined as the weighted sum of the global mean gray value and the local mean gray value with the golden section , and the local mean gray value is the main component of the G-L mean .

Thus, we determine the pixel positions where the gray values are equal to . where are the coordinates of a pixel of the original signature image , is the gray value of a pixel, is the global mean gray value of image , and are the pixel coordinates where the gray value is equal to .

Then, we design the improved Gaussian template as below.Finally, the G-L filtering algorithm can be described on the basis of the defined parameter and the improved Gaussian template as outlined in Table 1.

Table 1: Deduced golden G-L filtering algorithm for mending contour damage of signature image.

Note that salt and pepper noise is added to the original signature image in Step 5. This operation is used for mending any contour damage in the signature.

The deduced golden G-L filtering algorithm has scaling advantages in variance and rotation symmetry as well as the contour damage mending effect. This is because of the combination of the mean filtering, the Gaussian filtering and golden section of the global and local information, and the mending operation using salt and pepper noise, respectively.

2.2. Proposed MPT Algorithm For Minimum Error Segmentation

To achieve the minimum error binary segmentation of a signature image, we propose the MPT algorithm on the basis of signature image analysis and the developed optimal threshold for binary segmentation.

Image segmentation sets all pixel values to 0 or 1 while the pixel positions remain invariant. This operation simplifies postprocessing. Using this technique, the binary threshold influences the result dramatically. For example, Figure 2 shows the gray signature image and the histogram as well as the influence of a threshold on the segmentation results.

Figure 2: Gray signature image and the histogram program as well as the influence of a threshold on the segmentation result.

For a signature image, the gray degree histogram has two peaks. One is for the background of the signature, and the other is for the signature itself. Between these two peaks, there must be a minimum point where the gray degree value corresponds to the minimum histogram value. We select this minimum gray degree value to be the threshold for binary segmentation of the filtered image . To ensure the minimum error segmentation of a signature image, the proposed MPT algorithm is described in Table 2.

Table 2: Proposed MPT segmentation algorithm with minimum error.
2.3. CNN Design For Decreasing Light Distortion

To ignore the light distortion and extract the frame construction and the special details of a signature, a CNN structure is designed, as shown in Figure 3. The CNN has the obvious advantages of local sensing, a hierarchical structure, and integration of the feature extraction and the classification. It is mainly used to verify the two-dimensional graph invariance if displacement, zoom, and other forms of distortion occur. This CNN structure is designed specifically for solving any light distortion problems.

Figure 3: Designed CNN to solve the light distortion problem and extract the detailed frame features of a signature.

First, the true 64 × 128 signature image is used as the input for CNN training. Second, we design the six convolution kernels (9 × 9) for the first stage of feature extraction of the true signature. The convolution layer C1 is composed of six images (56 × 120). Third, the sampling kernel S1 is selected with a size of 2 × 2 to obtain the pooling layer P1 which serves as the first part of the inputs to the SR classifier. Then, we design three convolution kernels (5 × 5) for feature extraction by the second stage.

The pooling layer is mapped to the convolution layer to extract the second level of features , which serves as the second part of the inputs of the SR. In the pooling layers and , the different images focus on different types of features. Some focus on the signature frame, some focus on the key points of a signature, and others focus on the changing areas of a signature. The designed CNN extracts relatively complete features from the original signature features. In this signature authentication system, the image features and work together and serve as the inputs of the SR. This CNN is applied to extract the frame construction and the special details of a signature, and eliminates any light distortion problems in a signature image.

2.4. Proposed SIA Algorithm To Increase The Recognition Accuracy

In this section, we design the SIA algorithm based on CNN and SR for signature authentication. The SIA algorithm is described in Table 3.

Table 3: SIA algorithm for signature authentication.

The SR uses the least number of suitable features for reconstruction of the most complete information. Therefore, the speed of the SR classifier is relatively high. The difficulty with the SR method is to determine the solution of the optimal objective function. Thus, we must solve the two problems of obtaining the supercomplete dictionary and the nontrivial solution for sparse coefficients.

After the true signature image template SR is reconstructed, the test signature can be classified as true if the difference between the test signature image TSI and the reconstructed true signature image template SR is smaller than the error parameter . Otherwise, the test signature is classified as false.

3. Experiments And Analysis

In this section, we demonstrate three experiments of the G-L algorithm, the MPT algorithm, and the SIA algorithm followed by comparisons and discussion. The training and testing datasets of signatures are collected from 300 students. The students include 150 males and 150 females. The true signature number is 300 and the false signature number is also 300.

3.1. G-L Algorithm and MPT Algorithm Experiments

In Section 2.1, a new filtering algorithm, G-L, is developed, and the novel segmentation algorithm MPT is proposed in Section 2.2. Figure 4 shows the original signature image of the true signature and the fake signature. Figure 5 presents comparisons of the G-L filtering algorithm and the MPT segmentation algorithm to traditional methods.

Figure 4: Original signature images: (a) true and (b) fake.
Figure 5: Experimental result comparisons of traditional methods and developed methods: (a) the filtering and (b) the segmentation.

The developed G-L filtering algorithm with added salt and pepper noise has the best filtering effect compared to traditional mean filtering, medium filtering, and Gaussian filtering. The developed G-L filtering algorithm decreases the influence of signature contour damage.

The proposed MPT segmentation algorithm produces a better segmentation effect than the traditional methods of maximum entropy and iterative segmentation and has the minimum segmentation error.

3.2. SIA Algorithm Experiment

For the new SIA signature authentication algorithm, 90 true signature images and 72 false signature images for each user are considered. Two-thirds of the samples of true and false images are used for CNN training, and the remaining one-third samples are used for CNN testing. Then, and obtained from the CNN are selected as the inputs of the SR. Figure 6 shows the signature features and . , and retain the frame features and the special detail features of the signature, ignoring any light distortion of the signature image.

Figure 6: Image features obtained from the designed CNN: (a) and (b) .

For the SR of the SIA, the overcomplete dictionary and the sparse coefficients are essential. They are shown in Figures 7 and 8, respectively.

Figure 7: The first 64 overcomplete dictionaries of the SR.
Figure 8: Sparse coefficients of the SR with 24 total channels.

The process and result interface of the signature recognition system is shown in Figure 9. First, the CNN is trained using the training samples and the test samples. Then, the six signature frame features and the 18 detailed features are obtained, and the total 24 image features (which avoid the light distortion problem) serve as the inputs of the SR.

Figure 9: Signature authentication process and results.

Finally, the dictionary and the sparse coefficients N of the true signature are calculated, and the true signature template SR can be reconstructed. In Figure 9, a signature is input to the system to be judged as true or false by the proposed SIA algorithm. The right part shows the sparse coefficients of the 8th chancel of the SR, the central part is the first 36 dictionaries of the SIZE, and the left pan shows the signature authentication result.

3.3. Comparisons and Discussion

Based on the theoretical analysis and the experiments, the comparison of traditional filtering methods and the developed golden G-L filtering algorithm is given in Table 4, the comparison of traditional segmentation methods and the developed MPT segmentation algorithm is given in Table 5, and the performance comparison of the traditional signature authentication methods and the proposed SIA algorithm is given in Table 6. The performance comparisons are shown in Table 7.

Table 4: Signature authentication comparisons.
Table 5: Signature authentication comparisons.
Table 6: Comparison of signature authentication algorithms.
Table 7: Performance comparisons.

From Table 4, the proposed golden G-L filtering algorithm has the best signature contour damage mending and filtering result compared with the traditional methods of mean filtering, medium filtering, and Gaussian filtering. From Table 5, the developed MPT segmentation algorithm has the minimum segmentation error and produces the best signature segmentation compared with the traditional maximum entropy and iterative methods. From Table 6, the performance comparison results indicate that the proposed SIA algorithm has the highest signature authentication accuracy and acceptable time consumption performance compared with the traditional single CNN method and single SR method.

4. Conclusions

It is theoretically and experimentally verified that the proposed golden G-L algorithm has the best filtering result compared with the traditional methods of mean filtering, medium filtering, and Gaussian filtering in the case where the original signature contour is damaged. Meanwhile, the developed MPT algorithm has the best segmentation results with minimum error compared with the maximum entropy and iterative segmentation methods. In addition, the designed CNN can solve the light distortion problem for the feature extraction of the frame features and the detailed features of signature images. Finally, the proposed SIA algorithm achieves the highest average signature authentication accuracy of 97%. In contrast, the average accuracies of the single CNN method and the single SR method are 95% and 94%, respectively. Consumption times are 0.8, 1.0, and 0.7 s, respective to the proposed SIA, CNN, and SR. Future work will focus on balancing and/or improving the performance between the signature authentication accuracy and the computation time of the proposed SIA algorithm.

Conflicts of Interest

The authors declare that they have no conflicts of interest.

Acknowledgments

This research was sponsored by the Natural Science Foundation of China (61300179), Key Scientific and Technological Project of Shaanxi Province (2016GY-040), and the Science Foundation of Xi’an University of Science and Technology (104-6319900001). We also thank Master students Huan Li and Min Sun for their support of data set collection.

References

  1. H. Lu, Y. Li, Y. Zhang, M. Chen, S. Serikawa, and H. Kim, “Underwater Optical Image Processing: a Comprehensive Review,” Mobile Networks & Applications, vol. 2017, pp. 1–12, 2017. View at Google Scholar
  2. A. Singh, P. Singh, A. Amini, and F. Marvasti, “Twin tree hierarchy: a regularized approach to construction of signature matrices for overloaded CDMA,” Wireless Communications and Mobile Computing, vol. 16, no. 17, pp. 3070–3088, 2016. View at Publisher · View at Google Scholar · View at Scopus
  3. L. Yuan, Q. Ran, and T. Zhao, “Image authentication based on double-image encryption and partial phase decryption in nonseparable fractional Fourier domain,” Optics & Laser Technology, vol. 88, pp. 111–120, 2017. View at Publisher · View at Google Scholar · View at Scopus
  4. H. Wang, Y. Qin, Y. Huang, Z. Wang, and Y. Zhang, “Multiple-image encryption and authentication in interference-based scheme by aid of space multiplexing,” Optics & Laser Technology, vol. 95, pp. 63–71.
  5. K. S. Manjunatha, S. Manjunath, D. S. Guru, and M. T. Somashekara, “Online signature verification based on writer dependent features and classifiers,” Pattern Recognition Letters, vol. 80, pp. 129–136, 2016. View at Publisher · View at Google Scholar · View at Scopus
  6. S. Serikawa and H. Lu, “Underwater image dehazing using joint trilateral filter,” Computers and Electrical Engineering, vol. 40, no. 1, pp. 41–50, 2014. View at Publisher · View at Google Scholar · View at Scopus
  7. S. Lai, L. Jin, and W. Yang, “Toward high-performance online HCCR: A CNN approach with DropDistortion, path signature and spatial stochastic max-pooling,” Pattern Recognition Letters, vol. 89, pp. 60–66, 2017. View at Publisher · View at Google Scholar · View at Scopus
  8. E. N. Zois, L. Alewijnse, and G. Economou, “Offline signature verification and quality characterization using poset-oriented grid features,” Pattern Recognition, vol. 54, pp. 162–177, 2016. View at Publisher · View at Google Scholar · View at Scopus
  9. A. Sharma and S. Sundaram, “An enhanced contextual DTW based system for online signature verification using Vector Quantization,” Pattern Recognition Letters, vol. 84, pp. 22–28, 2016. View at Publisher · View at Google Scholar · View at Scopus
  10. Y. Fang, W. Kang, Q. Wu, and L. Tang, “A novel video-based system for in-air signature verification,” Computers & Electrical Engineering, vol. 57, pp. 1–14, 2017. View at Google Scholar
  11. M. Wang, W.-Y. Chen, and X. D. Li, “Hand gesture recognition using valley circle feature and Hu's moments technique for robot movement control,” Measurement, vol. 94, pp. 734–744, 2016. View at Publisher · View at Google Scholar · View at Scopus
  12. B. Kovari and H. Charaf, “A study on the consistency and significance of local features in off-line signature verification,” Pattern Recognition Letters, vol. 34, no. 3, pp. 247–255, 2013. View at Publisher · View at Google Scholar · View at Scopus
  13. J. Canuto, B. Dorizzi, J. Montalvão, and L. Matos, “On the infinite clipping of handwritten signatures,” Pattern Recognition Letters, vol. 79, pp. 38–43, 2016. View at Publisher · View at Google Scholar · View at Scopus
  14. R. Plamondon, C. O'Reilly, J. Galbally, A. Almaksour, and É. Anquetil, “Recent developments in the study of rapid human movements with the kinematic theory: Applications to handwriting and signature synthesis,” Pattern Recognition Letters, vol. 35, no. 1, pp. 225–235, 2014. View at Publisher · View at Google Scholar · View at Scopus
  15. A. Soleimani, B. N. Araabi, and K. Fouladi, “Deep Multitask Metric Learning for Offline Signature Verification,” Pattern Recognition Letters, vol. 80, pp. 84–90, 2016. View at Publisher · View at Google Scholar · View at Scopus
  16. A. B. De Oliveira, P. R. Da Silva, and D. A. C. Barone, “A novel 2D shape signature method based on complex network spectrum,” Pattern Recognition Letters, vol. 63, article no. 6248, pp. 43–49, 2015. View at Publisher · View at Google Scholar · View at Scopus
  17. M. Wang, L. Guo, and W.-Y. Chen, “Blink detection using Adaboost and contour circle for fatigue recognition,” Computers and Electrical Engineering, vol. 58, pp. 502–512, 2017. View at Publisher · View at Google Scholar · View at Scopus
  18. M. Wang, W. Qu, and W.-Y. Chen, “Hybrid sensing and encoding using pad phone for home robot control,” Multimedia Tools and Applications, pp. 1–14, 2017. View at Publisher · View at Google Scholar · View at Scopus
  19. M. Wang, S. Zhang, Y. Lv, and H. Lu, “Anxiety Level Detection Using BCI of Miner’s Smart Helmet,” Mobile Networks and Applications, pp. 1–8, 2017. View at Publisher · View at Google Scholar · View at Scopus
  20. Y. Liu, Z. Yang, and L. Yang, “Online Signature Verification Based on DCT and Sparse Representation,” IEEE Transactions on Cybernetics, vol. 45, no. 11, pp. 2498–2511, 2015. View at Publisher · View at Google Scholar · View at Scopus
  21. P. Porwik, R. Doroz, and T. Orczyk, “Signatures verification based on PNN classifier optimised by PSO algorithm,” Pattern Recognition, vol. 60, pp. 998–1014, 2016. View at Publisher · View at Google Scholar · View at Scopus
  22. H. Lu, Y. Li, T. Uemura et al., “FDCNet: filtering deep convolutional network for marine organism classification,” Multimedia Tools and Applications, pp. 1–14, 2017. View at Publisher · View at Google Scholar · View at Scopus
  23. N. Kaothanthong, J. Chun, and T. Tokuyama, “Distance interior ratio: A new shape signature for 2D shape retrieval,” Pattern Recognition Letters, vol. 78, pp. 14–21, 2016. View at Publisher · View at Google Scholar · View at Scopus
  24. X. Xia, Z. Chen, F. Luan, and X. Song, “Signature alignment based on GMM for on-line signature verification,” Pattern Recognition, vol. 65, pp. 188–196, 2017. View at Publisher · View at Google Scholar · View at Scopus
  25. S. Ma, G. Chen, W. Wu, L. Song, X. Tian, and X. Wang, “Identifying effective initiators in OSNs: from the spectral radius perspective,” Wireless Communications and Mobile Computing, vol. 16, no. 18, pp. 3340–3359, 2016. View at Publisher · View at Google Scholar · View at Scopus
  26. G. Goswami, P. Mittal, A. Majumdar, M. Vatsa, and R. Singh, “Group sparse representation based classification for multi-feature multimodal biometrics,” Information Fusion, vol. 32, no. 1, pp. 3–12, 2016. View at Publisher · View at Google Scholar · View at Scopus
  27. H. Liu, S. Li, and L. Fang, “Robust Object Tracking Based on Principal Component Analysis and Local Sparse Representation,” IEEE Transactions on Instrumentation and Measurement, vol. 64, no. 11, pp. 2863–2875, 2015. View at Publisher · View at Google Scholar · View at Scopus
  28. B. Hou, B. Ren, G. Ju, H. Li, L. Jiao, and J. Zhao, “SAR image classification via hierarchical sparse representation and multisize patch features,” IEEE Geoscience and Remote Sensing Letters, vol. 13, no. 1, pp. 33–37, 2016. View at Publisher · View at Google Scholar · View at Scopus
  29. Y. Shao, N. Sang, C. Gao, and L. Ma, “Probabilistic class structure regularized sparse representation graph for semi-supervised hyperspectral image classification,” Pattern Recognition, vol. 63, pp. 102–114, 2017. View at Publisher · View at Google Scholar · View at Scopus
  30. J. H. Cheon and M.-K. Lee, “Improved batch verification of signatures using generalized sparse exponents,” Computer Standards & Interfaces, vol. 40, pp. 42–52, 2015. View at Publisher · View at Google Scholar · View at Scopus