Hierarchical Dictionary Learning and Sparse Coding for Static Signature Verification

Hierarchical Dictionary Learning and Sparse Coding for Static Signature Verification

Hierarchical Dictionary Learning and Sparse Coding for Static Signature Verification Elias N. Zois Marianna Papagiannopoulou, Dimitrios University of West Attica Tsourounis and George Economou Agiou Spiridonos Str., 12243 Egaleo, Greece University of Patras [email protected] http://www.upcv.upatras.gr substantial amount of research efforts towards the Abstract modeling and verification of signatures [4-14] provide evidence that the handwritten signature is a member of a An assortment of review papers as well as newly quoted popular behavioral club for affirming the identity or literature indicates that usually, the most important link in consent of a person in cases like forensics and/or the chain of designing signature verification systems administration. Thus, it is considered to be a dynamic and (SV's) is the feature extraction one. These methods are open research topic. divided in two main categories. The first one, includes The offline or static SV addresses motionless images as handcrafted features which are methods smanually a result of a scanning procedure. In this case, computer engineered by scientists to be optimal for certain type of vision and pattern recognition (CVPR) systems complete information extraction-summarization from signature the task of authenticating an individual, by means of images. Examples of this kind include global-local and/or his/hers signature, with potential applications to a non- grid-texture oriented features. The second feature invasive, friendly and secure interface for security oriented category addresses signature modeling and verification e-society applications [15]. Static SV's are reported to with the use of dedicated features, usually learned directly perform inferior when compared to systems which exploit from raw signature image data. Typical representatives dynamic information (i.e. as a function of time) [16, 17]. include Deep Learning (DL) as well as Bag of Visual However, their use may sometimes be compulsory Words (BoW) or Histogram of Templates (HOT). Recently, specifically in forensic cases of interest [18, 19]. This sparse representation (SR) methods (dictionary learning makes the offline signature verification problem a and coding) have been introduced for signature modeling challenging and hard one [20]. and verification with promising results. In this paper, we The problem that a SV system typically addresses is to propose an extension of the SR framework by introducing discriminate genuine samples against the following types the idea of embedding the atoms of a dictionary in a of forgery [21]: a) Random: defined as genuine signatures of a writer different from the authentic author, b) directed tree. This is demonstrated with an l0 tree- structured sparse regularization norm. The efficiency of Simple/Casual/Zero Effort: defined as signature samples the proposed method is shown by conducting experiments that are formed by an imitator who owns the name of the with two popular datasets namely the CEDAR and MCYT- genuine writer or samples that are formed by someone who 75. knows the original signatures but his efforts are without practicing, c) Simulated/Skilled: samples that are formed by an experienced imitator or a calligrapher after 1. Introduction practicing unrestricted number of times and d) Disguised: samples that actually are not a forgery, but instead they are The handwritten signature is a specific outcome of the outcome of an effort of a genuine author to imitate handwriting and hence a part of the behavioral biometric his/her own signature in such a way that he/she can deny it traits family. Signatures are considered to be the product at a later time. of a personal motoric pattern formed from a combination The most crucial step in the design of a SV system relies of letters and/or a sophisticated flourish [1, 2]. The on the feature extraction algorithm that assigns any signature trace, depicted usually onto a sheet of paper or signature image into a multidimensional vector space. an electronic device is considered to be the joint outcome Since signatures are carriers of intrinsic ambiguity, of a person's specific motoric procedure and his/hers expressed with the term variability or with the inverse term taught scripting customs. In addition, the signature stability, the feature extraction stage ideally must retain all production process conveys information related also to the essential intrapersonal information, which is vital for his/her writing system and psychophysical state [3]. A the subsequent verification stage. Review papers as well as 545 recent research efforts [20] state that the offline feature This is done by introducing the idea of embedding the extraction methods may be distributed into two major atoms of a dictionary in a directed tree in both dictionary categories: a) handcrafted features which are outcomes of learning and SR stages. Justification of this key-concept methods created for other image related applications; idea comes from the intuition that the structure of any examples of this branch include methods with global-local problem regarding spatial arrangement of image pixels and/or grid-texture oriented features [22-24] and b) encourages the search for relationships between dictionary signature verification dedicated features, learned directly elements [37]. Structured sparsity has been a main from images, with representatives Deep Learning (DL) research area for quite a long time [37-44]. For the [9,25,26] as well as Bag of Visual Words (BoW) [27, 28] purpose of this work, we address a special type of or Histogram of Templates (HOT) [29]. structured sparsity, which we will define hereafter as Methods which learn features directly from image hierarchical sparse coding (HSC). In HSC the dictionary pixels, serving as initial data, have also appeared in the atoms are embedded in a directed and rooted tree T which literature with noteworthy results. In general, these is fixed and known beforehand while the sparsity patterns methods exploit any spatial associations of pixels that exist expressed by the representation matrix A are subject to into the static signature images. Early attempts include the the constraint of being members of a connected and rooted use of Restricted Boltzmann Machines (RBMs) in [30] and sub-tree of T [38, 39, 45]. Convolutional Neural Networks (CNNs) in [31]. Lately, in The conducted experiments with the use of HSC for SV [25] Soleimani et al. has proposed the use of Deep Neural tree employ a l0 tree-structured sparse regularization norm Networks for Multitask Metric Learning by employing a which has been found to be useful in a number of cases. distance metric between pairs of signatures in which LBP's For comparison purposes, the pooling operation on the were used as an intermediate feature vector. Also quite representation matrix A was chosen to be similar to the recently, Hafemman et al. in a series of publications, one presented in [22, 23]. To the best of the author's proposed methods for learning features from images. knowledge, this is a new and novel work that exploits a Specifically, the authors in [32] introduced their type of structured sparsity (SS), namely the hierarchical formulation for learning features from the genuine sparsity dedicated for offline signature verification. signatures of a development dataset, and then utilized them Codebooks have been also proposed for offline SV by in order to test another set of users. In [33], the authors utilizing first order HOG's and then coding each feature to analyzed the learned feature space and optimized their the nearest word in the codebook with K-means [46]. This CNN architecture, obtaining state-of-the-art results on the is clearly not our case since we apply hierarchical GPDS dataset. Finally in [20], the previously described dictionary learning from signature patches instead of K- formulations were extended with supplementary means feature cluster algorithms for creating the experiments on two other datasets (MCYT and CEDAR), codebook. We justify the use of this method as it is said providing a richer explanation of the method and the that "whenever using k-means to get a dictionary, if you experimental protocol, as well as a novel formulation that replace it with sparse coding it’ll often work better" [47]. leverages knowledge of skilled forgeries for feature The remaining of this paper is organized as follows: learning. Section 2 quotes the necessary elements of hierarchical Quite recently also, another method for static SV has sparse dictionary coding and representation. Section 3 been presented with the use of parsimonial coding summarizes the method and presents the feature extraction techniques. Specifically, sparse representation methods by while section 4 describes the conducted experiments and means of the KSVD and OMP were tested successfully to the corresponding experimental results. Finally, section 6 local patches of signature images followed by average draws the conclusions. pooling [22]. This was justified by the fact that signatures being a particular class of image signals exhibit a degenerate structure and lie on a low dimensional 2. Elements of hierarchical sparse coding subspace. On the other, sparse representation is well suited for handling this kind of problem by approximating this 2.1. Terminology subspace with the sparsity principle and an overcomplete Following the notation proposed of Jenatton et al. [37] set of basis signals. The concept of representing pixel vectors are represented with bold lower case letters ( x ) intensities as linear combinations of few dictionary while matrices with upper case ones ( X ). The l -norm for elements (or atoms) is a popular technique in a number of q 1 q image processing, as well as machine learning applications m q q ≥1 of a vector x ∈ Rm as: xx where x [34-36]. q ()i=1 i i In this paper, we propose a novel extension of the designates the i-th component of x and classic SR conceptual framework to the structured SR. 546 xxx max (i )= lim ( ) .

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    11 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us