WO1994009448A1 - Verifying the authenticity of an entity - Google Patents
Verifying the authenticity of an entity Download PDFInfo
- Publication number
- WO1994009448A1 WO1994009448A1 PCT/GB1993/002123 GB9302123W WO9409448A1 WO 1994009448 A1 WO1994009448 A1 WO 1994009448A1 GB 9302123 W GB9302123 W GB 9302123W WO 9409448 A1 WO9409448 A1 WO 9409448A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- representation
- entity
- feature
- representations
- features
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
- G07C9/35—Individual registration on entry or exit not involving the use of a pass in combination with an identity check by means of a handwritten signature
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/30—Writer recognition; Reading and verifying signatures
Definitions
- the present invention relates to methods and apparatus for verifying the authenticity of a representation of an entity and particularly to verification of handwritten signatures.
- Many proposals have been made to provide automatic verification of signals representing static features of signatures but, as far as is known, all have produced results which lead to a significant proportion of rejections of authentic signatures and acceptances of false signatures.
- a paper entitled "On-line Signature Verification Incorporating the Direction of Pen Movement" by M. Yoshimura, Y. Kato, S. Matsuda and I. Yashimura, IEICE Transactions, Vol. E 74, No.
- a signature verification technique which includes dynamic programming (DP) applied to a dynamic feature of a signature, in that the DP algorithm employs the coordinates of points in a signature at sample times.
- DP dynamic programming
- Such information is only available when a signature is written and therefore cannot be applied to signatures already written on documents.
- a descriptive technique for signatures is the subject of a paper entitled "Structural Description and Classification of Signature Images" by M. Ammar, Y. Yoshida and T. Fukumura, Pattern Recognition, Vol. 23, No. 7, 1990, pages 697 to 709. In this technique horizontal and vertical projections of signatures are used to segment signatures vertically and horizontally as steps in constructing the description.
- a method of verifying the authenticity of a representation of an entity comprising the steps of selecting at least one static feature of members of a set of authentic representations of the entity, the feature consisting of a plurality of values, selecting a corresponding static feature of an unauthenticated representation of the entity, the corresponding feature consisting of a plurality of values, comparing the feature of the unauthenticated representation with the corresponding feature of each of the authentic representations by carrying out groups of value comparisons in which at least one value of a first of the features is compared with a range of values of a second of the features, said range extending over values which include a second feature value which corresponds to the said one first feature value, and determining from each group of comparisons a minimum distance, deriving from the minimum distances a characteristic distance between the unauthenticated representation and the set of authentic representations, and determining from the characteristic distance the authenticity of the unauthenticated representation of the entity.
- a method of selecting a set of authentic representations of an entity comprising selecting at least one static feature of members of a set of genuine representations of an entity, the feature consisting of a plurality of values, comparing the feature of each representation with the corresponding feature of each other representation by carrying out groups of value comparisons in which at least one value of a first of the features is compared with a range of values of a second of the features, said range extending over values which include a second feature value which corresponds to the said one first feature value, and determining from each group of comparisons a minimum distance, deriving characteristic distances between each representation and the other representations, and rejecting a previously determined number of representations with the highest characteristic distances.
- the entity may for example be a person's signature and the representations of the entity are then representations of signatures.
- the authenticity of a representation may be determined by comparing the characteristic distance derived with a previously set threshold. This threshold may be derived from the average of the characteristic distances for the selected set of authentic representations, as disclosed in the second aspect of the invention.
- an advantage of the invention is that a form of DP is applied to static features to enhance authentication.
- single feature values are compared with appropriate ranges of values of a corresponding feature but the full DP technique including deriving cumulative distances can also be used.
- a cumulative distance may be determined for each comparison of one or more features of one representation with corresponding features of another representation using the minimum distances derived from comparing one or more pairs of corresponding features. The characteristic distance may then be derived by averaging the cumulative distances.
- a static feature of an entity is a feature which is apparent from a visual representation of the entity. The static feature used 1s a feature comprised of a number of values.
- a projection profile may be a summary of the representation projected onto an axis, where the representation is an image of the entity.
- the representation of the entity is created when the entity is created or later.
- the representation of the entity may be created from a digitised image of the entity, such as by scanning a signature.
- apparatus for verifying the authenticity of a representation of an entity comprising means for selecting at least one static feature of members of a set of authentic representations of an entity, the feature consisting of a plurality of values, means for selecting a corresponding static feature of an unauthenticated representation of the entity, the corresponding feature consisting of a plurality of values, means for comparing the feature of the unauthenticated representation with the corresponding feature of each of the authentic representations by carrying out groups of value comparisons in which at least one value of a first of the features is compared with a range of values of a second of the features, said range extending over values which include a second feature value which corresponds to the said first feature value, and determining from each group of comparisons a minimum distance, means for deriving from the minimum distances a characteristic distance between the unauthenticated representation and the set of authentic representations, and means for determining from the characteristic distance the authenticity of the unauthenticated representation of the entity.
- apparatus for selecting a set of authentic representations of an entity comprising means for selecting at least one static feature of members of a set of genuine representations of an entity, the feature consisting of a plurality of values, means for comparing the feature of each representation with the corresponding feature of each of the other representations by carrying out groups of comparisons in which at least one value of a first of the features is compared with a range of values of a second of the features, said range extending over values which include a second feature value which corresponds to the said one first feature value, and determining from each group of comparisons a minimum distance, means for deriving from the minimum distances a characteristic distance between the one representation and the other representations, and means for rejecting a . previously determined number of representations with the highest characteristic distances in selecting the said set of authentic representations.
- the means for obtaining a representation of the entity may comprise a scanner, for example a scanner for scanning cheques to verify representations in the form of signatures.
- a scanner for example a scanner for scanning cheques to verify representations in the form of signatures.
- a method of verifying the authenticity of a signature comprising the steps of obtaining a projection profile of the signature which is to be verified, and comparing the profile, or a characteristic thereof, with a corresponding profile, or characteristic, of an authentic signature, or a group of authentic signatures.
- the present invention also includes apparatus corresponding to the method of the fifth aspect, and corresponding methods and apparatus for selecting a group of authentic signatures from a group of genuine signatures.
- Figure 1 is a diagram of apparatus for verifying a signature
- Figure 2 is a flow chart for verifying a person's signature
- Figure 3 is a flow chart for selecting the projection profiles from a signature
- Figure 4 shows a digitised representation of a signature and two projection profiles created from the signature
- Figure 5 is a flow chart for selecting the best signatures for use during verification
- Figure 6 Is a flow chart for selecting a threshold for use during verification
- Figure 7 is a flow chart for finding the characteristic distance between a test signature and a set of reference signatures
- Figure 8 is a flow chart for calculating the cumulative distance between one signature and another.
- Figure 1 is a block diagram of apparatus for enrolling new users and verifying the signatures of previously enrolled users.
- the signatures are then represented as a stored matrix of picture elements (pixels).
- the user enters an identification (a User I.D.) into the identification unit 2 which may be, for example, a keypad or a smartcard and card reader.
- a processor 3 processes the signatures and a display 4 is used to prompt the user for information and to display results.
- FIG. 2 A flow chart of a method both for enrolling new users and verifying the signatures of previously enrolled users is shown in Figure 2.
- the processor 3 and the display 4 prompts for the mode of operation and ask for the user's identification. If the enrolment procedure (test 12) is to be followed an enrolment count is set to zero (operation 13 ).
- the input device creates a representation of a signature made by the user.
- projection profiles of the signature are extracted.
- Test 16 determines whether the enrolment (A) or verification (B) procedure is followed.
- Test 19 determines whether the enrolment is complete by comparing the enrolment count with a previously determined number of signatures. The number of signatures depends on the accuracy required weighed against the time taken to process the signatures. If the enrolment is not complete the stages 14 to 19 are repeated until test 19 is satisfied. Operation 20 selects the best signatures from the set of captured signatures and is described more fully in Figure 5. Operation 21, described in detail in Figure 6, generates a threshold value for use in the verification process. If the threshold is lower than a previously set minimum, as determined by test 22, operation 23 raises the threshold artificially and moves to operation 25.
- Operation 25 stores the selected set of authenticated reference signatures under the user's identification number and the enrolment procedure ends. If the verification procedure is to be followed then at test 16 the system moves to point B. Operation 27 retrieves the previously authenticated reference signatures stored under that user identifier during operation 25. Operation 28, described more fully in Figure 7, finds the characteristic distance between the test signature to be verified (the unauthenticated captured signature) and the set of reference signatures retrieved in operation 27.
- a cumulative distance between a test (the unauthenticated) signature and a reference (an authentic) signature is derived and the characteristic distance is and average of the cumulative distances between the test signature and a set of authentic reference signatures.
- Operation 29 selects the level of security, for example low, medium or high. It is the level of security which determines the number of false acceptances or rejections; with a high level of security there will be more false rejections and fewer false acceptances. The level of security may be determined by the application or may be set at a permanent level.
- Test 30 compares the characteristic distance with the threshold set during enrolment, with an offset for the level of security made if required. If the characteristic distance is greater than the adjusted threshold the signature is rejected as a forgery (operation 31); if it is lower than the adjusted threshold then the signature is accepted as authentic (operation 32).
- FIG. 3 is a more detailed description of operation 15, in which projection profiles of the signatures are extracted.
- a projection profile is a feature which is a function of the representation of the signature and is comprised of a plurality of values.
- Operation 35 pre-processes the representation of the signature, which is usually a pixel matrix. This pre-processing may centre or scale the representation as necessary, and may also include other image analysis necessary to reduce the noise in the image.
- Operation 36 produces a horizontal projection profile and operation 37 produces a vertical projection profile for the pixel matrix representing the signature.
- the horizontal projection profile H at a point y on the vertical axis is given by
- Figure 4 shows a digitised representation of a signature 41, and the horizontal projection profile 42 and the vertical projection profile 43 derived therefrom.
- FIG 5 which shows in detail operation 20, selects the best signatures from the previously captured signatures.
- Operation 50 sets the reference signature pointer to the first signature captured.
- Operation 51 sets the test signature pointer also to the first signature captured.
- Operation 52 sets the running average distance for the reference signature to zero.
- Test 53 compares the reference signature pointer with the test signature pointer and if the two are equal, which at this stage will be the case, increments the test signature pointer by one (operation 56).
- Test 57 determines whether all of the captured signatures have been used. If this is not the case the system moves back to test 53. Since the reference signature pointer and the test signature pointer are no longer equal, the system moves on to operation 54.
- Operation 54 calculates the cumulative distance between the reference signature and the test signature and is described more fully in Figure 8.
- the running average distance is calculated from the cumulative distance in operation 55.
- the test pointer is advanced by one in operation 56 and stages 53 to 57 are repeated until the last signature captured has been used (test 57).
- the final running average distance becomes the characteristic distance and operation 58 assigns the new characteristic distance to the reference signature.
- Operation 59 advances the reference pointer by one and stages 51 to 60 are repeated until every captured signatures has been compared with every other signature.
- Operation 61 rejects those reference signatures with the highest characteristic distance, as these will be those signatures which differ most from the remaining signatures. The number of signatures rejected depends on the number of signatures captured. If five signatures are captured and the two signatures with the highest cumulative distance will be rejected, the remaining three reference signatures will form the basis of the verification procedure.
- Figure 6 which describes in detail operation 21, generates a threshold value for use in the verification process, based on the reference signatures remaining after operation 61.
- Operation 62 sets the maximum cumulative distance between the reference signature and the test signature to zero.
- Operation 63 sets the reference signature pointer to the first remaining signature.
- Operation 64 sets the test signature pointer to the first remaining signature.
- Test 65 compares the reference signature pointer with the test signature pointer and if the two are equal, which at this stage will be the case, increments the test signature pointer by one (operation 69).
- Test 70 determines whether the test signature pointer is pointing to the last remaining signature. If this is not the case the system moves back to test 65. Since the reference signature pointer and the test signature pointer are no longer equal, the system moves on to operation 66.
- Operation 66 calculates the cumulative distance between the reference signature and the test signature and is described more fully in Figure 7.
- Test 67 compares the distance returned by operation 66 with the maximum value. If the cumulative distance is greater than the maximum cumulative distance operation 68 sets the new maximum to that distance returned by operation 66.
- Operation 69 advances the test pointer by one and stages 65 to 70 are repeated until all of the signatures have been used.
- Operation 71 advances the reference signature pointer by one and stages 65 to 72 are repeated until every signature has been compared with every other signature. The threshold value is then set to the maximum cumulative distance recorded by operation 68.
- Figure 7 shows in detail operation 28, which finds the characteristic distance between a test signature and a set of reference signatures, and in particular an unauthenticated signature and a set of authenticated signatures.
- Operation 74 sets the reference signature pointer the first of a set of references signatures retrieved during operation 27 and sets the running average distance to zero.
- Operation 75 calculates the cumulative distance between the test signature and the first reference signature and operation 76 calculates the running average distance from the cumulative distance.
- Operation 77 advances the reference signature pointer by one and stages 75 to 78 are repeated until test 78 determines that all the reference signatures have been used.
- the running average distance then indicates the characteristic distance between the test signature and the set of reference signatures (operation 79).
- Figure 8 describes in detail a method of calculating the cumulative distance between a test signature and a reference signature, (operations 54, 66 & 75).
- the method uses the projection profiles which were derived in operation 15.
- a cost g(i,j) at a point (i,j) is defined as the difference d between the amplitudes of the respective projection profiles and the cost of moving to that point from adjacent points, and is given by,
- d(i,j-l) + d(i,j) g(i,j) min g(1-l , -1 ) + 2d(i ,j) (3) g(i-l,j) + d(i,j)
- H r (1), H t (j , V r (1) and V t (j) are values of the horizontal and vertical projection profiles at points i and j, and d(i,j) is the difference between the amplitudes of the respective projection profiles.
- Operation 80 sets the reference pointer i to the start of the horizontal and vertical projection profiles of the reference signature and test pointer j to the start of the horizontal and vertical projection profiles of the test signature.
- Operation 81 sets the distance g(0,0) to twice d(0,0) and operation 82 advances the reference pointer by one.
- Equation 3 is a recursive equation and if a value for a point g(i+m,j+n) has not been previously determined, either by the operation 81 or from a previous calculation, then g(i+m,j+n) is set to infinity. This means that any point which falls outside of the window and which is used in determining g(i,j) according to equation 3 is given a value of infinity in operation 85.
- An alternative method is to set all g(i,j) to infinity except for the seed point (g(0,0)) during operation 81 and redetermine those g(i,j) necessary during operation 85.
- Operation 86 advances the test pointer by one and stages 84 to 87 are repeated until the test pointer is outside the window (test 87). If a 10 point window is used then stages 84 to 86 will be repeated 10 times. Stages 82 to 88 are repeated until test 88 indicates that the reference signature has been scanned through completely. Finally, operation 89 searches back through the last window for the lowest minimum distance g(i,j), which is then assigned as the cumulative distance between the two signatures.
- the number of values of a representation of an entity which are compared with one value of a representation of a corresponding entity, and from which the minimum distance is derived may be varied.
- Other dynamic programming techniques may be used on the projection profiles and in particular the methods of determining minimum distances may be altered.
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Human Computer Interaction (AREA)
- Multimedia (AREA)
- Theoretical Computer Science (AREA)
- Collating Specific Patterns (AREA)
Abstract
Description
Claims
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP93922603A EP0664913A1 (en) | 1992-10-16 | 1993-10-14 | Verifying the authenticity of an entity |
JP6509769A JPH08502376A (en) | 1992-10-16 | 1993-10-14 | Confirming the authenticity of an entity |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB9221785A GB2271657A (en) | 1992-10-16 | 1992-10-16 | Signature verification |
GB9221785.0 | 1992-10-16 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO1994009448A1 true WO1994009448A1 (en) | 1994-04-28 |
Family
ID=10723571
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/GB1993/002123 WO1994009448A1 (en) | 1992-10-16 | 1993-10-14 | Verifying the authenticity of an entity |
Country Status (4)
Country | Link |
---|---|
EP (1) | EP0664913A1 (en) |
JP (1) | JPH08502376A (en) |
GB (1) | GB2271657A (en) |
WO (1) | WO1994009448A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2323268A (en) * | 1997-03-17 | 1998-09-23 | Clive Humphrey Jenkins | Card for cleaning card operated lottery and gaming machines |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1998025227A1 (en) * | 1996-12-04 | 1998-06-11 | Dew Engineering And Development Limited | Biometric security encryption system |
US5930380A (en) * | 1997-02-11 | 1999-07-27 | Lucent Technologies, Inc. | Method and apparatus for verifying static signatures using dynamic information |
JPH10261082A (en) * | 1997-03-19 | 1998-09-29 | Kiyadeitsukusu:Kk | Registered signature data preparing method for computer signature collating system |
US6160903A (en) * | 1998-04-24 | 2000-12-12 | Dew Engineering And Development Limited | Method of providing secure user access |
DE19936097A1 (en) | 1999-07-30 | 2001-02-08 | Giesecke & Devrient Gmbh | Method, device and system for biometric authentication of a person |
EP1345163B2 (en) | 2002-03-15 | 2010-12-29 | Computer Sciences Corporation | Methods for analysis of writing in documents |
JP5697705B2 (en) * | 2012-06-29 | 2015-04-08 | 揮市 三崎 | Handwriting appraisal support method and handwriting appraisal support program |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CA1181176A (en) * | 1980-10-27 | 1985-01-15 | John C. Elsey | Fingerprint minutiae matcher |
-
1992
- 1992-10-16 GB GB9221785A patent/GB2271657A/en not_active Withdrawn
-
1993
- 1993-10-14 WO PCT/GB1993/002123 patent/WO1994009448A1/en not_active Application Discontinuation
- 1993-10-14 JP JP6509769A patent/JPH08502376A/en active Pending
- 1993-10-14 EP EP93922603A patent/EP0664913A1/en not_active Withdrawn
Non-Patent Citations (5)
Title |
---|
C. N. LIU: "REFERENCE DESIGN PROCEDURE FOR SIGNATURE VERIFICATION", IBM TECHNICAL DISCLOSURE BULLETIN., vol. 21, no. 1, June 1978 (1978-06-01), NEW YORK US, pages 1978 - 1979 * |
DAI YING ET AL.: "AUTOMATIC RECOGNITION OF PROVINCE NAME ON THE LICENSE PLATE OF MOVING VEHICLE", PROC. OF THE 9TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION, 14-17 NOVEMBER 1988, ROME, IT, pages 927 - 929, XP000013089 * |
MAAN AMMAR ET AL.: "STRUCTURAL DESCRIPTION AND CLASSIFICATION OF SIGNATURE IMAGES", PATTERN RECOGNITION., vol. 23, no. 7, 1990, OXFORD, GB, pages 697 - 710, XP000142362 * |
MITSU YOSHIMURA ET AL.: "On-line Signature Verification Incorporating the Direction of Pen Movement", TRANSACTIONS OF THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS OF JAPAN, vol. E64, no. 7, July 1991 (1991-07-01), TOKYO JP, pages 2083 - 2091, XP000263062 * |
P. DE BRUYNE AND R. FORRÉ: "Signature Verification with Elastic Matching", 1986 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY: ELECTRONIC CRIME COUNTERMEASURES, AUGUST 12-14 1986, GOTHENBURG, SE, pages 113 - 118 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2323268A (en) * | 1997-03-17 | 1998-09-23 | Clive Humphrey Jenkins | Card for cleaning card operated lottery and gaming machines |
Also Published As
Publication number | Publication date |
---|---|
EP0664913A1 (en) | 1995-08-02 |
GB2271657A (en) | 1994-04-20 |
JPH08502376A (en) | 1996-03-12 |
GB9221785D0 (en) | 1992-12-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US4286255A (en) | Signature verification method and apparatus | |
US6028949A (en) | Method of verifying the presence of an eye in a close-up image | |
US5982914A (en) | Identification of individuals from association of finger pores and macrofeatures | |
US6424728B1 (en) | Method and apparatus for verification of signatures | |
EP0483391B1 (en) | Automatic signature verification | |
AU2002348288B2 (en) | Image identification system | |
EP1357520B1 (en) | Method for verifying users and updating database, and face verification system using the same | |
US5610993A (en) | Method of co-centering two images using histograms of density change | |
JPH08507398A (en) | High accuracy online dynamic signature verification system | |
US5267324A (en) | Image comparison method | |
US4901358A (en) | Method of comparing a handwriting with a reference writing | |
US5995953A (en) | Method for verification of signatures and handwriting based on comparison of extracted features | |
US5261008A (en) | Fingerprint verification method | |
JPH08305798A (en) | Method for finding of reference character element by using character pattern element by handwriting of identical person | |
KR20010031613A (en) | Method and system for checking digital signature | |
WO1994009448A1 (en) | Verifying the authenticity of an entity | |
JPH07311850A (en) | Method and apparatus for discrimination | |
JPH07302327A (en) | Method and device for detecting image of object | |
CN115019364A (en) | Identity authentication method and device based on face recognition, electronic equipment and medium | |
KR101912433B1 (en) | Apparatus and method for detecting fake fingerprint | |
JPH087788B2 (en) | Signature verification method | |
CA2304475A1 (en) | Method and apparatus for authenticating ic card | |
JPH1063789A (en) | Learning method for discriminant function | |
JP2003108935A (en) | Device for issuing authentication medium and personal collation device | |
JPH06195511A (en) | Binarization threshold value determining device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): JP US |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): AT BE CH DE DK ES FR GB GR IE IT LU MC NL PT SE |
|
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 1993922603 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref country code: US Ref document number: 1995 416716 Date of ref document: 19950411 Kind code of ref document: A Format of ref document f/p: F |
|
WWP | Wipo information: published in national office |
Ref document number: 1993922603 Country of ref document: EP |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 1993922603 Country of ref document: EP |