Download - Fraud Detection Using Signature Recognition
![Page 1: Fraud Detection Using Signature Recognition](https://reader034.vdocuments.site/reader034/viewer/2022050713/58e7b01a1a28abbb4e8b49d5/html5/thumbnails/1.jpg)
Faculty of Engineering Technology and ResearchIsroli-Afwa, Bardoli.
Guided By:-Prof. Bhagyasri G. Patel
Fraud Detection using Signature Recognition
Prepared By:- Dhruvin L. Bhalodiya (120840131021) Akshay R. Panchal (120840131027) Santosh M. Ladani (120840131053) Tejraj G. Thakor (130843131018)
![Page 2: Fraud Detection Using Signature Recognition](https://reader034.vdocuments.site/reader034/viewer/2022050713/58e7b01a1a28abbb4e8b49d5/html5/thumbnails/2.jpg)
CONTENTSABSTRACT
INTRODUCTION
SYSTEM WORK-FLOW
SOFTWARE REQUIREMENT
PROJECT SCHEDULE
UML DIAGRAMS
IMPLEMENTATION
TESTING
RESULTS
APPLICATION
LIMITATION
CANCLUSION
REFERENCES
• RANDOM FORGERY• GENUINE FORGERY
![Page 3: Fraud Detection Using Signature Recognition](https://reader034.vdocuments.site/reader034/viewer/2022050713/58e7b01a1a28abbb4e8b49d5/html5/thumbnails/3.jpg)
Abstract The signature of person is an important biometric of a human being
which can be used to authenticate human identity. The problem arises when someone decide to imitate our signature and steal our identity.
The Image of human signature is collected by camera of mobile phone which can extract dynamic and spatial information of the signature based on Image processing techniques like Convert to gray scale, Noise Removal, Normalization, Border Elimination and Feature Extraction techniques.
The signature matching is depending on SVM. The SVM classifier is trained with sample images in database obtained from those individuals whose signatures have to be authenticated by the system. In our proposed system SQLite database as a back-end and Android platform as a front-end.
![Page 4: Fraud Detection Using Signature Recognition](https://reader034.vdocuments.site/reader034/viewer/2022050713/58e7b01a1a28abbb4e8b49d5/html5/thumbnails/4.jpg)
INTRODUCTION• Now days , many fraud things happens if any unknown
person wants to imitate person’s identity.
• If a person sign name of the checking account holder to check without account holder’s permission, then this is considered signature forgery.
• So signature Verification is essential in day-to - day life.
![Page 5: Fraud Detection Using Signature Recognition](https://reader034.vdocuments.site/reader034/viewer/2022050713/58e7b01a1a28abbb4e8b49d5/html5/thumbnails/5.jpg)
Types of Forgery1. Random forgery:
2. Blind forgery:Own style without any knowledge of spelling.
3. Skilled forgery: Experience in coping the signature.
Randomly sign. with person’s own style.
![Page 6: Fraud Detection Using Signature Recognition](https://reader034.vdocuments.site/reader034/viewer/2022050713/58e7b01a1a28abbb4e8b49d5/html5/thumbnails/6.jpg)
Training Signature Image
Image PreprocessingGray ScaleNoise RemovalBorder EliminationImage Normalization
Feature ExtractionParameter ExtractionGlobal ExtractionLocal Extraction
Feature ExtractionParameter ExtractionGlobal ExtractionLocal Extraction
Test Signature Image
Image PreprocessingGray ScaleNoise RemovalBorder EliminationImage Normalization
Recognition and Verification Process
Genuine or Forgery
Feature Database(SQLite)
SYSTEM WORK-FLOW
![Page 7: Fraud Detection Using Signature Recognition](https://reader034.vdocuments.site/reader034/viewer/2022050713/58e7b01a1a28abbb4e8b49d5/html5/thumbnails/7.jpg)
DATA ACQUISITIONCapture Signature Image from Camera.
![Page 8: Fraud Detection Using Signature Recognition](https://reader034.vdocuments.site/reader034/viewer/2022050713/58e7b01a1a28abbb4e8b49d5/html5/thumbnails/8.jpg)
IMAGE PROCESSING
![Page 9: Fraud Detection Using Signature Recognition](https://reader034.vdocuments.site/reader034/viewer/2022050713/58e7b01a1a28abbb4e8b49d5/html5/thumbnails/9.jpg)
Gray scale Conversion Image smoothing
Color Image Gray Scale Image
Average Method: (R+G+B / 3).
![Page 10: Fraud Detection Using Signature Recognition](https://reader034.vdocuments.site/reader034/viewer/2022050713/58e7b01a1a28abbb4e8b49d5/html5/thumbnails/10.jpg)
Noise Removal Images corrupted due to positive and negative
stemming from decoding errors or noisy channels.
Median filter
Color to Gray Scale Noise Removal Image
![Page 11: Fraud Detection Using Signature Recognition](https://reader034.vdocuments.site/reader034/viewer/2022050713/58e7b01a1a28abbb4e8b49d5/html5/thumbnails/11.jpg)
Border Elimination Detecting sharp changes in Image Brightness to
capture important property of images.
Vertical and Horizontal ProjectionCanny Edge Detection Algorithm
Border Eliminate image
![Page 12: Fraud Detection Using Signature Recognition](https://reader034.vdocuments.site/reader034/viewer/2022050713/58e7b01a1a28abbb4e8b49d5/html5/thumbnails/12.jpg)
image NormalizationSignature height and width may vary due to theirregularities in the image scanning.
Normalized Image
Linear normalization of a grayscale image is
![Page 13: Fraud Detection Using Signature Recognition](https://reader034.vdocuments.site/reader034/viewer/2022050713/58e7b01a1a28abbb4e8b49d5/html5/thumbnails/13.jpg)
FEATURE EXTRACTION
![Page 14: Fraud Detection Using Signature Recognition](https://reader034.vdocuments.site/reader034/viewer/2022050713/58e7b01a1a28abbb4e8b49d5/html5/thumbnails/14.jpg)
Features Extraction :- Similar characteristics of images that
accurately retrieve features.
Parameter Extraction
Global
Extraction
Local
Extraction
Types of Feature Extraction
![Page 15: Fraud Detection Using Signature Recognition](https://reader034.vdocuments.site/reader034/viewer/2022050713/58e7b01a1a28abbb4e8b49d5/html5/thumbnails/15.jpg)
1. Parameter Extraction :- I. Horizontal projectionII. Vertical projectionIII. Center of gravityIV. Height and Width
2. Global Extraction :- I. Aspect ratio II. Histogram.
3. Local Extraction:- Properties of signatures image in specific part.
![Page 16: Fraud Detection Using Signature Recognition](https://reader034.vdocuments.site/reader034/viewer/2022050713/58e7b01a1a28abbb4e8b49d5/html5/thumbnails/16.jpg)
1. Parameter Extraction
Vertical Projection
1.Horizontal Projection
Horizontal ProjectionOriginal Image
Original Image
2. Vertical Projection
![Page 17: Fraud Detection Using Signature Recognition](https://reader034.vdocuments.site/reader034/viewer/2022050713/58e7b01a1a28abbb4e8b49d5/html5/thumbnails/17.jpg)
SOFTWARE REQUIREMENT Software Requirement :-
Front End – Eclipse IDE(Android) Back End – SQLite Database
Hardware Requirement :- Android Version 2.3.0(Ginegerbread) 512 MB RAM 2 Megapixel Camera 1 GHz Processor
Technology Requirement :- Eclipse IDE OpenCV for image processing SQLite Database
![Page 18: Fraud Detection Using Signature Recognition](https://reader034.vdocuments.site/reader034/viewer/2022050713/58e7b01a1a28abbb4e8b49d5/html5/thumbnails/18.jpg)
Work-Flow of Project
![Page 19: Fraud Detection Using Signature Recognition](https://reader034.vdocuments.site/reader034/viewer/2022050713/58e7b01a1a28abbb4e8b49d5/html5/thumbnails/19.jpg)
GRAPHICAL REPRESENTATION OF WORK-FLOW PROJECT
![Page 20: Fraud Detection Using Signature Recognition](https://reader034.vdocuments.site/reader034/viewer/2022050713/58e7b01a1a28abbb4e8b49d5/html5/thumbnails/20.jpg)
UML DIAGRAMS
![Page 21: Fraud Detection Using Signature Recognition](https://reader034.vdocuments.site/reader034/viewer/2022050713/58e7b01a1a28abbb4e8b49d5/html5/thumbnails/21.jpg)
1. USE-CASE DIAGRAM
User
Login
User_Name
Delete Sign_Image
Password
Upload Sign_Image
Intiatalize
Update Sign_Image
Global Feature
Camera
Image_Processing
Local Feature
Validation
Gallery
Matching
Feature Extract
Signature Recognition
SystemConversion to Gray Scale Normalize
Tested Image Normal Image
<<include>><<include>>
<<extend>> <<extend>>
<<include>> <<include>>
<<extend>><<extend>>
<<extend>><<extend>>
![Page 22: Fraud Detection Using Signature Recognition](https://reader034.vdocuments.site/reader034/viewer/2022050713/58e7b01a1a28abbb4e8b49d5/html5/thumbnails/22.jpg)
2. SEQUENCE DIAGRAMUser Signature Recognition
System
2: Check credential of User
3 : Login Successfully
4 : Upload Sign_Image
5:Image Processing
6 : Feature Extraction
7 : Matching
![Page 23: Fraud Detection Using Signature Recognition](https://reader034.vdocuments.site/reader034/viewer/2022050713/58e7b01a1a28abbb4e8b49d5/html5/thumbnails/23.jpg)
3. ACTIVITY DIAGRAM
Login
Select Image
Login Failed
Image Processing
[From]
[From]
Camera
Gallery
I) For Login:-
![Page 24: Fraud Detection Using Signature Recognition](https://reader034.vdocuments.site/reader034/viewer/2022050713/58e7b01a1a28abbb4e8b49d5/html5/thumbnails/24.jpg)
II) IMAGE PROCESSING AND VERIFICATION
Image
Convert to Gray Scale
Remove Noise
Normalize Image
Feature Extraction
Normal Image Tested Image
Signature Matching
Validation
If Noise
No Noise
Genuine Forger
If Match
No MatchValid Not Valid
![Page 25: Fraud Detection Using Signature Recognition](https://reader034.vdocuments.site/reader034/viewer/2022050713/58e7b01a1a28abbb4e8b49d5/html5/thumbnails/25.jpg)
4. E- R DIAGRAM
![Page 26: Fraud Detection Using Signature Recognition](https://reader034.vdocuments.site/reader034/viewer/2022050713/58e7b01a1a28abbb4e8b49d5/html5/thumbnails/26.jpg)
5. DATA FLOW DIAGRAM(DFD)
• Level 0 (Context Level) :
![Page 27: Fraud Detection Using Signature Recognition](https://reader034.vdocuments.site/reader034/viewer/2022050713/58e7b01a1a28abbb4e8b49d5/html5/thumbnails/27.jpg)
Level 1 :
User ApplicationCapture Image
ImageProcessing
Feature Extraction
Open
Signature Image Extracted By
Matching Signature
Validate Signature
Select Option1.0 1.1 1.3
1.41.51.6
Database
Signature Match
Check Validation
Process To
![Page 28: Fraud Detection Using Signature Recognition](https://reader034.vdocuments.site/reader034/viewer/2022050713/58e7b01a1a28abbb4e8b49d5/html5/thumbnails/28.jpg)
LEVEL 2 :
Image Noise from Image
Gray Scale Image
Normalization
Conversion To
Remove
Normalize Image By
Image Processing
Process2.0 2.1
2.2 2.3
2.4
Feature Extraction Local Feature
Global Feature
Extract
3.0 3.1
3.2
![Page 29: Fraud Detection Using Signature Recognition](https://reader034.vdocuments.site/reader034/viewer/2022050713/58e7b01a1a28abbb4e8b49d5/html5/thumbnails/29.jpg)
6. CLASS DIAGRAM
![Page 30: Fraud Detection Using Signature Recognition](https://reader034.vdocuments.site/reader034/viewer/2022050713/58e7b01a1a28abbb4e8b49d5/html5/thumbnails/30.jpg)
IMPLEMENTATION Capture Images
![Page 31: Fraud Detection Using Signature Recognition](https://reader034.vdocuments.site/reader034/viewer/2022050713/58e7b01a1a28abbb4e8b49d5/html5/thumbnails/31.jpg)
GRAY SCALE IMAGE
![Page 32: Fraud Detection Using Signature Recognition](https://reader034.vdocuments.site/reader034/viewer/2022050713/58e7b01a1a28abbb4e8b49d5/html5/thumbnails/32.jpg)
EDGE DETECTION IMAGE
![Page 33: Fraud Detection Using Signature Recognition](https://reader034.vdocuments.site/reader034/viewer/2022050713/58e7b01a1a28abbb4e8b49d5/html5/thumbnails/33.jpg)
MAIN SCREEN
![Page 34: Fraud Detection Using Signature Recognition](https://reader034.vdocuments.site/reader034/viewer/2022050713/58e7b01a1a28abbb4e8b49d5/html5/thumbnails/34.jpg)
MATCH SIGNATURE
![Page 35: Fraud Detection Using Signature Recognition](https://reader034.vdocuments.site/reader034/viewer/2022050713/58e7b01a1a28abbb4e8b49d5/html5/thumbnails/35.jpg)
RESULT OF MATCH SIGNATURE
![Page 36: Fraud Detection Using Signature Recognition](https://reader034.vdocuments.site/reader034/viewer/2022050713/58e7b01a1a28abbb4e8b49d5/html5/thumbnails/36.jpg)
RESULT
![Page 37: Fraud Detection Using Signature Recognition](https://reader034.vdocuments.site/reader034/viewer/2022050713/58e7b01a1a28abbb4e8b49d5/html5/thumbnails/37.jpg)
APPLICATIONS OF SIGNATURE RECOGNITION
1. Banking
2. Passport verification system.
3.Provides authentication to a candidates in public examination from their signatures.
![Page 38: Fraud Detection Using Signature Recognition](https://reader034.vdocuments.site/reader034/viewer/2022050713/58e7b01a1a28abbb4e8b49d5/html5/thumbnails/38.jpg)
LIMITATION• Signature Image stored Temporarily.
• Matching of Signature image based on dynamic Euclidian distance. So variation may be possible.
![Page 39: Fraud Detection Using Signature Recognition](https://reader034.vdocuments.site/reader034/viewer/2022050713/58e7b01a1a28abbb4e8b49d5/html5/thumbnails/39.jpg)
REFERENCES[1] Ashish Dhawan, Aditi R. Ganesan, “Handwritten Signature Verification”, The University of Wisconsin.
[2] Brooks, F. (1995) The Mythical Man Month, Addison-Wesley.
[3] Dr. S. Adebayo Daramola, Prof. T. Samuel Ibiyemi, “Offline Signature Using Hidden Markov Model(HMM)”, International Journal of Computer Application, Nigeria, November-2010.
[4] K.A. Vala, N. P. Joshi, “A Survey on Offline Signature Recognition and Verification Schemes”, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, Gujarat, India, March-2014.
[5] Madhuri Yadav, Alok Kumar, Tushar Patnaik, Bhupendra Kumar, “A Survey on Offline Signature Verification”, International Journal of Engineering and Innovative Technology (IJEIT), January-2013.
![Page 40: Fraud Detection Using Signature Recognition](https://reader034.vdocuments.site/reader034/viewer/2022050713/58e7b01a1a28abbb4e8b49d5/html5/thumbnails/40.jpg)
THANK YOU……………