Writer verification based on a single handwriting word samples

被引:12
|
作者
Bensefia, Ameur [1 ]
Paquet, Thierry [2 ]
机构
[1] Khalifa City Womens Coll, Higher Coll Technol, Abu Dhabi 41012, U Arab Emirates
[2] Normandi Univ, UniRouen, UniLehavre, INSARouen,LITIS, St Etienne, France
关键词
Verification; Authentication; Writer recognition; Edition distance; Levenshtein distance; Wagner-Fisher algorithm; Graphemes; IAM database; ROC curves; AUTOMATIC SIGNATURE VERIFICATION; IDENTIFICATION; STATE;
D O I
10.1186/s13640-016-0139-0
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The writer recognition task has received a lot of interests during the last decade due to it wide range of applications. This task includes writer identification and/or writer verification. However, all the researches assumed that they dispose of a large amount of text to identify or authenticate the writer, which is never the case in real-life applications. In this paper, we present an original approach for the writer authentication task based on the analysis of a unique sample of a handwriting word. We used the Levenshtein edit distance based on Fisher-Wagner algorithm to estimate the cost of transforming one handwritten word into another. Such method has been successfully applied for signature authentication and voice recognition. In order to apply it to handwriting words, we developed a segmentation module to generate the graphemes; considered as elementary components for each word. We evaluated this approach on part of the IAM database (100 writers), where half of them provided three samples only of the same word. The obtained results are very promising since we succeed to accept correctly in 87 % of cases when we used the whole database (100 writers) and up to 92 % when we used 40 writers.
引用
收藏
页数:9
相关论文
共 50 条
  • [1] Writer verification based on a single handwriting word samples
    Ameur Bensefia
    Thierry Paquet
    [J]. EURASIP Journal on Image and Video Processing, 2016
  • [2] Writer Verification of Arabic Handwriting
    Srihari, Sargur N.
    Ball, Gregory R.
    [J]. PROCEEDINGS OF THE 8TH IAPR INTERNATIONAL WORKSHOP ON DOCUMENT ANALYSIS SYSTEMS, 2008, : 28 - 34
  • [3] Handwriting analysis for writer verification
    Bensefia, A
    Paquet, T
    Heutte, L
    [J]. NINTH INTERNATIONAL WORKSHOP ON FRONTIERS IN HANDWRITING RECOGNITION, PROCEEDINGS, 2004, : 196 - 201
  • [4] Automatic handwriting analysis for writer identification and verification
    Bennour, Akram
    [J]. PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND NEW TECHNOLOGIES (ICSENT '18), 2018,
  • [5] Sub-word based Arabic Handwriting Analysis for Writer Identification
    Maliki, Makki
    Al-Jawad, Naseer
    Jassim, Sabah
    [J]. MOBILE MULTIMEDIA/IMAGE PROCESSING, SECURITY, AND APPLICATIONS 2013, 2013, 8755
  • [6] Online writer verification using kanji handwriting
    Nakamura, Yoshikazu
    Kidode, Masatsugu
    [J]. MULTIMEDIA CONTENT REPRESENTATION, CLASSIFICATION AND SECURITY, 2006, 4105 : 207 - 214
  • [7] Writer verification in forensic handwriting examination: a pilot study
    Parziale, Antonio
    Santoro, Adolfo
    Marcelli, Angelo
    [J]. PROCEEDINGS OF 2016 15TH INTERNATIONAL CONFERENCE ON FRONTIERS IN HANDWRITING RECOGNITION (ICFHR), 2016, : 447 - 452
  • [8] Online Signature Verification Method Based on the Acceleration Signals of Handwriting Samples
    Bunke, Horst
    Csirik, Janos
    Gingl, Zoltan
    Griechisch, Erika
    [J]. PROGRESS IN PATTERN RECOGNITION, IMAGE ANALYSIS, COMPUTER VISION, AND APPLICATIONS, 2011, 7042 : 499 - +
  • [9] PCA and LDA as Dimension Reduction for Individuality of Handwriting in Writer Verification
    Ramlee, Rimashadira
    Muda, Azah Kamilah
    Ahmad, Sharifah Sakinah Syed
    [J]. 2013 13TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS (ISDA), 2013, : 104 - 108
  • [10] PCA versus LDA as Dimension Reduction for Individuality of Handwriting in Writer Verification
    Ramlee, Rimashadira
    Muda, Azah Kamilah
    Ahmad, Sharifah Sakinah Syed
    [J]. JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2014, 9 (06): : 367 - 375