Ijraset Journal For Research in Applied Science and Engineering Technology
Authors: Tanuja Bhadarge
DOI Link: https://doi.org/10.22214/ijraset.2025.66598
Certificate: View Certificate
Signatures are considered a tool for identification in the case of bank statements, bank cheques, property papers, etc. So, signature forgery is commonly seen for personal gain or benefit. Examining a large number of manual documents can consume a lot of time and effort. Also, signatures provide us with a very small quantity of alphabets or content, so it is usually difficult to identify the characteristics. Consequently, there is a massive growth in the digital era in biometric personal verification and authentication systems, which are based on physical unique characteristics (DNA, fingerprints, hand geometry, face, or ear) or behavioral patterns (voice, etc.). Until now, various digital methods have been proposed for signature verification. In this paper, we present a comprehensive survey of signature verification systems. The topics related to handwriting identification, its other categories, and analysis problems are also described. The comparison of all the digital methods is shown on the basis of EER, FAR, FRR, accuracy, and time required.
I. INTRODUCTION
Handwriting is a neuromuscular task that involves 30 bones and more than 40 muscles. It is an acquired skill. The timing and movements of the hand are different for every individual. That’s why handwriting and signatures are considered unique characteristics of an individual. Document examination is a discipline that seeks to determine the history of a document through technical or scientific processes [1]. Albert S. Osborn is mainly credited with launching handwriting identification. Handwriting identification is a discriminatory process that is done by comparing writings. The examination of a document is conducted to determine the origin, the production process, and the source. The manual analysis of any writing is carried out in two steps: Firstly, the class characteristics of the writing are compared, which are the common characteristics (size, slant, alignment, etc.) of the writing. The second step includes individual characteristics (letter design, initial and terminal strokes, embellishments, etc.) that are unique to each writing. A survey was conducted in [12], in which the forensic document examiners were compared with the non-examiners. And the analysis report says that for document examination, expertise is required.
Signature forgery is seen in cases related to bank checks and legal documents. The main problem for forensic handwriting examination is the specializations of criminals [6]. The signatures are performed in different languages, which makes the analysis difficult. It takes a lot of time and effort to manually review a big number of documents. Therefore, in an effort to address this issue, researchers began developing several digital techniques for signature verification. There are two signature verification systems used:
Offline signature verification can be carried out using two different approaches. One approach is writer-dependent signature verification, where features are extracted from genuine and forged signatures for each writer. Then compare the test signature sample with its own training sample. The demerit of this approach is that the expert has to extract the features for each new writer. The second approach, writer-independent signature verification, is used by forensic examiners. This approach is thought to be the most practical since it is not necessary to extract features for each writer in order to verify the signature. In this case, general features are built from some writers chosen randomly. Automatic Signature Verification, the state of art paper, has shown various techniques, features, and verification processes used by different systems [29] [30].
This paper is organized as follows: Section II discusses different types of forgeries; Section III introduces the methodology followed for the signature verification system. Section IV introduces functioning estimation metrics; Section V introduces different methods of signature verification systems; Section VI gives a comparison of different digital methods and a discussion; and Section VII concludes the paper.
II. TYPES OF FORGERIES
The main task of a forensic expert is to detect whether the signature is genuine or forged. Forgery in the signature verification system is broadly classified into three parts. Fig. 1. represents the types of forgeries.
Fig. 1: Types of forgeries
III. METHODOLOGY FOLLOWED FOR SIGNATURE VERIFICATION
Most signature verification systems consist of four main steps: data acquisition, pre-processing, feature extraction, and verification. An overview of this is shown in Fig. 2.
Fig. 2: Overview of signature verification system.
A. Data Acquisition
Data for signature verification is obtained using scanners and cameras so that the data is present in digital format. In dynamic systems, the signatures are directly stored on the tablet.
B. Pre-processing
The treatment of the signatures obtained. In static signatures, typical pre-processing involves noise removal by filters, resizing, normalizing, thinning, and smearing. In dynamic signatures, pre-processing involves filtering, noise reduction, and smoothing.
C. Feature Extraction
The crucial step for signature verification. In the feature extraction step, the system extracts the characteristics from the given sample and records them in order to produce details in the form of observation data. The accuracy of the verification depends on the feature extraction. Feature extraction methods can be classified into two types: function features and parameter features.
D. Verification
The extracted features are stored in a knowledge base. Any person’s signature depends on several factors, including their characteristics and their mental and emotional condition. The criteria for verification are set on the basis of the variation of the features. For high-security applications like military, etc., a high value is used, while for other applications such as banking, a moderate value is used. After fixing the value, test samples are used to be matched to verify if a given signature is genuine or forged.
IV. FUNCTIONING ESTIMATION METRICS
A signature verification system's analysis report is determined by how well it can identify fake signatures. Several presentation valuation metrics are applied to many signature verification systems on the basis of which the estimation is made, and they are compared. These metrics contain false acceptance rate (FAR), false rejection rate (FRR), equal error rate (ERR), accuracy, and time required. False Acceptance Rate (FAR) is the number of times the system accepts a forged signature as the original signature. False Rejection Rate (FRR) is the number of times the system rejected the original signature. When the false acceptance rate (FAR) and false rejection rate (FRR) are equal in the system, then it is known as the equal error rate (EER). This is the point at which we can say that the system has equal chances of accepting and rejecting the forged and original signatures. After evaluation of the total samples (FAR, FRR, and EER), accuracy and time required are calculated.
V. METHODS FOR SIGNATURE VERIFICATION SYSTEM
Numerous computer-assisted systems, tools, software, or methods are used; a few of them are described below:
VI. COMPARISON AND DISCUSSION
The table below consists of different methods used for signature verification. The writers have described the efficiency of the systems in various forms. They had used different kinds of error rates depending on the sample set. The table consists of complete data from various systems with their error rates. For the system to be used, the error rate should be the lowest.
Sr. no |
Approach |
FRR |
FAR |
Accuracy |
Time Required |
EER |
1 |
Wanda Workbench |
- |
- |
92% |
- |
- |
2 |
Genetic Algorithm |
- |
- |
73.50% |
- |
- |
3 |
Support Vector Classifier Model |
- |
- |
95.83% |
- |
- |
4 |
Open layered framework |
- |
- |
- |
41 sec |
- |
5 |
Fourier descriptor - Distance measure |
1.60% |
2.60% |
- |
- |
- |
6 |
CEDAR -FOX Software |
- |
- |
98.71% |
- |
- |
7 |
Online Signature Verification using string matching |
2.80% |
1.60% |
- |
- |
- |
8 |
Multiple algorithm method |
- |
- |
- |
- |
5.90% |
9 |
Two stage neural network classifier |
9.80% |
3% |
80.80% |
- |
- |
10 |
Graphology and Graphometry |
3.60% |
13.29% |
- |
- |
- |
11 |
Pixel matching technique |
0.12% |
0.12% |
- |
- |
- |
12 |
Verification using multi network classifier |
6.65% |
5.65% |
- |
- |
- |
13 |
Verification using grid approach |
5.35% |
8.65% |
- |
- |
- |
14 |
Multi-expert system for dynamic signature |
18% |
31% |
- |
- |
0.40% |
15 |
Verification using textural and allographic features (Individual) |
- |
- |
- |
- |
10.20% |
16 |
HMM online signature verification |
- |
- |
- |
- |
0.43% |
17 |
HMM offline signature verification |
9.00% |
10.50% |
- |
- |
12.60% |
18 |
HMM with cross validation |
0.96% |
0.41% |
- |
- |
0.68% |
19 |
Fuzzy Vault |
57.30% |
0.75% |
- |
- |
- |
20 |
EDM-Geometric centre |
14.58% |
9.39% |
- |
- |
- |
Though a lot of research is going on in this field, there are still challenges in this area. The signatures can be done in various languages and patterns, so making a database for these is not practically possible.
In this paper, we have summarized the systems, software, or methods used for digital signature verification. There are many approaches used in this area, but accuracy in the case of skilled forgeries is still required. The accuracy of the existing system shows good results, but every system shows limitations. So, to minimize the error, additional research is needed in the signature verification system. In the future, the fusion of various classifiers can be used for verification results.
[1] Harralson HH, Miller LS. Huber and Headrick\'s Handwriting Identification: Facts and Fundamentals. CRC press; 2017 Dec 14. [2] Franke K, Köppen M. A computer-based system to support forensic studies on handwritten documents. Int J Doc Anal Recogn. 2001;3:218-31. [3] Chatzisterkotis T. An examination of quantitative methods for Forensic Signature Analysis and the admissibility of signature verification system as legal evidence [Doctoral dissertation]. University of Kent (United Kingdom); 2015. [4] Black DA. Forged signatures more skillfully written than the true signatures. J Crim L Criminol Police Sci. 1962;53:109. [5] Araujo RSA, Cavalcanti GD, Carvalho Filho ECDB. On-line verification for signatures of different sizes. In: Tenth international workshop on frontiers in handwriting recognition. Suvisoft; 2006. p. 1-4. [6] Krasiuk IP. Problems of forensic handwriting examination in the analysis of signatures and short notes. Nauk Visnyk. 2022;27(1):72. [7] Fairhurst MC, Kaplani E, Guest RM. Complexity measures in handwritten signature verification. In: HCI. 2001. p. 305-9. [8] Manning KA, Srihari SN. Computer-assisted handwriting analysis: Interaction with legal issues in US courts. In: International Workshop on Computational Forensics. Berlin, Heidelberg: Springer Berlin Heidelberg; 2009. p. 137-49. [9] Franke KY, Schomaker LRB, Veenhuis C, Vuurpijl LG, Erp MV, Guyon I. WANDA: A common ground for forensic handwriting examination and writer identification. [10] Jayasekara B, Jayasiri A, Udawatta L. An evolving signature recognition system. In: First international conference on industrial and information systems. IEEE; 2006. p. 529-34. [11] Anagha R, Kumar C. Signature recognition and forgery detection. Authorea Preprints. 2023. [12] Franke K, Köppen M. A computer-based system to support forensic studies on handwritten documents. Int J Doc Anal Recogn. 2001;3:218-31. [13] Leedham SSG, Srihari S. A survey of computer methods in forensic handwritten document examination. In: Proceeding the Eleventh International Graphonomics Society Conference. Scottsdale, Arizona; 2003. p. 278-81. [14] Ismail IA, Ramadan MA, El-Danaf TS, Samak AH. An efficient off-line signature identification method based on fourier descriptor and chain codes. Int J Comput Sci Netw Secur. 2010;10(5):29-35. [15] Jain AK, Griess FD, Connell SD. On-line signature verification. Pattern Recognit. 2002;35(12):2963-72. [16] Bertolini D, Oliveira LS, Justino E, Sabourin R. Reducing forgeries in writer-independent off-line signature verification through ensemble of classifiers. Pattern Recognit. 2010;43(1):387-96. [17] Baltzakis H, Papamarkos N. A new signature verification technique based on a two-stage neural network classifier. Eng Appl Artif Intell. 2001;14(1):95-103. [18] Oliveira LS, Justino E, Freitas C, Sabourin R. The graphology applied to signature verification. In: 12th conference of the international graphonomics society. 2005. p. 286-90. [19] Bhattacharya I, Ghosh P, Biswas S. Offline signature verification using pixel matching technique. Procedia Technol. 2013;10:970-7. [20] Qi Y, Hunt BR. A multiresolution approach to computer verification of handwritten signatures. IEEE Trans Image Process. 1995;4(6):870-4. [21] Bovino L, Impedovo S, Pirlo G, Sarcinella L. Multi-Expert Verification of Hand-Written Signatures. In: ICDAR. 2003. Vol. 3, p. 932-6. [22] Bulacu M, Schomaker L. Text-independent writer identification and verification using textural and allographic features. IEEE Trans Pattern Anal Mach Intell. 2007;29(4):701-17. [23] Fierrez J, Ortega-Garcia J, Ramos D, Gonzalez-Rodriguez J. HMM-based on-line signature verification: Feature extraction and signature modeling. Pattern Recognit Lett. 2007;28(16):2325-33. [24] Coetzer J, Herbst BM, Du Preez JA. Off-line signature verification: A comparison between human and machine performance. In: Tenth International Workshop on Frontiers in Handwriting Recognition. Suvisoft; 2006. [25] El-Yacoubi A, Justino EJR, Sabourin R, Bortolozzi F. Off-line signature verification using HMMs and cross-validation. In: Neural Networks for Signal Processing X. IEEE Signal Processing Society Workshop; 2000. Vol. 2, p. 859-68. [26] Freire-Santos M, Fierrez-Aguilar J, Ortega-Garcia J. Cryptographic key generation using handwritten signature. In: Biometric technology for human identification III. SPIE; 2006. Vol. 6202, p. 225-31. [27] Majhi B, Reddy YS, Babu DP. Novel features for off-line signature verification. Int J Comput Commun Control. 2006;1(1):17-24. [28] Gonzalez-Rodriguez J, Fierrez-Aguilar J, Ramos-Castro D, Ortega-Garcia J. Bayesian analysis of fingerprint, face and signature evidences with automatic biometric systems. Forensic Sci Int. 2005;155(2-3):126-40. [29] Impedovo D, Pirlo G. Automatic signature verification: The state of the art. IEEE Trans Syst Man Cybern C Appl Rev. 2008;38(5):609-35. [30] Dimauro G, Impedovo S, Lucchese MG, Modugno R, Pirlo G. Recent advancements in automatic signature verification. In: Ninth International Workshop on Frontiers in Handwriting Recognition. IEEE; 2004. p. 179-84. [31] Morales A, Morocho D, Fierrez J, Vera-Rodriguez R. Signature authentication based on human intervention: performance and complementarity with automatic systems. IET Biom. 2017;6(4):307-15. [32] Chalechale A, Naghdy G, Premaratne P, Mertins A. Document image analysis and verification using cursive signature. In: 2004 IEEE International Conference on Multimedia and Expo (ICME). IEEE; 2004. Vol. 2, p. 887-90.
Copyright © 2025 Tanuja Bhadarge. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Paper Id : IJRASET66598
Publish Date : 2025-01-20
ISSN : 2321-9653
Publisher Name : IJRASET
DOI Link : Click Here