Signature Verification using SVM Classifier

Authors

  • Advait Joshi Department of ECE, B N M Institute of Technology, Bangalore, Karnataka, India Author
  • Arjun G Department of ECE, B N M Institute of Technology, Bangalore, Karnataka, India Author
  • Divyam Arora Department of ECE, B N M Institute of Technology, Bangalore, Karnataka, India Author
  • Dr. Keerti Kulkarni Department of ECE, B N M Institute of Technology, Bangalore, Karnataka, India Author

DOI:

https://doi.org/10.32628/CSEIT241061164

Abstract

This review examines the use of Support Vector Machine (SVM) classification for automated handwritten signature verification, a vital aspect of biometric authentication and fraud detection. Addressing challenges like intra-class variations and inter-class similarities, the system leverages MATLAB's SVM framework with image preprocessing techniques, including dimensional standardization (100x100 pixels), grayscale conversion, and vector transformation for feature extraction. Using a linear kernel, the SVM effectively constructs optimal hyperplanes to distinguish genuine signatures from forgeries with high accuracy and computational efficiency. The system excels in handling variations in signature styles and writing pressure, demonstrating robust performance through empirical testing and comparisons with recent studies. Future improvements could explore advanced feature extraction, alternative kernel functions, and deep learning integration to enhance reliability in real-world applications. This review underscores SVM's effectiveness as a reliable tool for biometric authentication.

Downloads

Download data is not yet available.

References

Tomislav Fotak, Miroslav Bača, Petra Koruga” Handwritten signature identification using basic concepts of graph theory”, Varaždin, Croatia, 2010.

A. Piyush Shanker, A.N. Rajagopalan, “Offline signature verification using DTW “, 2017.

Anil K. Jain, Arun Ross, Salil Prabhakar,”An Introduction to biometric recognition”, 2004. DOI: https://doi.org/10.1109/TCSVT.2003.818349

Nalini K. Ratha, Jonathan Connell, Ruud M. Bolle, “An analysis of minutiae matching strength“2001. DOI: https://doi.org/10.1007/3-540-45344-X_32

Battista Biggio,Giorgio Fumera,Paolo Russu, Luca Didaci, and Fabio Roli “Adversarial Biometric Recognition: A review on biometric system security from the adversarial machine- learning perspective”, 2015. DOI: https://doi.org/10.1109/MSP.2015.2426728

Christian Szegedy, Wojciech Zaremba,”Intriguing Properties of Neural Networks “, 2014.

Ian J. Goodfellow, Jonathon Shlens & Christian SzegedyGoogle Inc., Mountain View, CA “Explaining and Harnessing Adversarial Examples”, 2015.

Aleksander Madry, Dimitris Tsipras, “Towards Deep Learning Models Resistant to Adversarial Attacks”, 2018.

M.S. Haroon, H.M. Ali, “Ensemble Adversarial Training: Attacks and Defenses", 2023.

Nicholas Carlini, David Wagner, “Adversarial Examples Are Not Easily Detected: Bypassing Ten Detection Methods”, 2017. DOI: https://doi.org/10.1145/3128572.3140444

Downloads

Published

30-11-2024

Issue

Section

Research Articles