© S. Cha8/8/2002CSIS Automatic Detection of Handwriting forgery Dr. Sung-Hyuk Cha & Dr. Charlies C....

22
© S. Cha 8/8/2002 CSIS CSIS Automatic Detection of Handwriting forgery Dr. Sung-Hyuk Cha & Dr. Charlies C. Tappert School of Computer Science & Information Systems

Transcript of © S. Cha8/8/2002CSIS Automatic Detection of Handwriting forgery Dr. Sung-Hyuk Cha & Dr. Charlies C....

Page 1: © S. Cha8/8/2002CSIS Automatic Detection of Handwriting forgery Dr. Sung-Hyuk Cha & Dr. Charlies C. Tappert School of Computer Science & Information Systems.

© S. Cha8/8/2002

CSISCSIS

Automatic Detection of

Handwriting forgery Dr. Sung-Hyuk Cha & Dr. Charlies C. Tappert

School of Computer Science & Information Systems

Page 2: © S. Cha8/8/2002CSIS Automatic Detection of Handwriting forgery Dr. Sung-Hyuk Cha & Dr. Charlies C. Tappert School of Computer Science & Information Systems.

© S. Cha8/8/2002

CSISCSIS

Analysis of Handwriting

Recognition Examination Personality identification(Graphology)

On-line Off-line Writer VerificationWriter Identification

Natural Writing Forgery Disguised Writing

Handwriting Analysis TaxonomyHandwriting Analysis Taxonomy

Page 3: © S. Cha8/8/2002CSIS Automatic Detection of Handwriting forgery Dr. Sung-Hyuk Cha & Dr. Charlies C. Tappert School of Computer Science & Information Systems.

© S. Cha8/8/2002

CSISCSIS

• Background

• Differences b/w authentic handwriting & forgery

• Measure of Wrinkliness

• Automatic Forgery Detection Model

• Conclusion

OverviewOverview

Page 4: © S. Cha8/8/2002CSIS Automatic Detection of Handwriting forgery Dr. Sung-Hyuk Cha & Dr. Charlies C. Tappert School of Computer Science & Information Systems.

© S. Cha8/8/2002

CSISCSIS

To determine the Validity of

Individuality in Handwriting

Legal MotivationLegal Motivation

Frye vs. US (1923)scientific community

Daubert vs. Merrell Dow(1993) testing,

peer review, error rates

U.S. vs. Starzecpyzel(1995)

“skilled” testimony

GE vs. Joiner (1997)

weight of evidence

Kumho vs.Carmichael(1999)

reliability standard

Page 5: © S. Cha8/8/2002CSIS Automatic Detection of Handwriting forgery Dr. Sung-Hyuk Cha & Dr. Charlies C. Tappert School of Computer Science & Information Systems.

© S. Cha8/8/2002

CSISCSIS

Each person writes differently.

Individuality of HandwritingIndividuality of Handwriting

Page 6: © S. Cha8/8/2002CSIS Automatic Detection of Handwriting forgery Dr. Sung-Hyuk Cha & Dr. Charlies C. Tappert School of Computer Science & Information Systems.

© S. Cha8/8/2002

CSISCSIS

(b) Forgeries of (a)

(a) Authentic handwriting samples from one writer

Authentic vs. ForgeriesAuthentic vs. Forgeries

Page 7: © S. Cha8/8/2002CSIS Automatic Detection of Handwriting forgery Dr. Sung-Hyuk Cha & Dr. Charlies C. Tappert School of Computer Science & Information Systems.

© S. Cha8/8/2002

CSISCSIS3 Differences b/w authentic & forgery3 Differences b/w authentic & forgery

1. Shape

2. Pressure

3. Speed

Page 8: © S. Cha8/8/2002CSIS Automatic Detection of Handwriting forgery Dr. Sung-Hyuk Cha & Dr. Charlies C. Tappert School of Computer Science & Information Systems.

© S. Cha8/8/2002

CSISCSISAngular and Magnitude Type Angular and Magnitude Type Element String Element String

Angular Magnitude

Image Stroke Direction Stroke Width

Page 9: © S. Cha8/8/2002CSIS Automatic Detection of Handwriting forgery Dr. Sung-Hyuk Cha & Dr. Charlies C. Tappert School of Computer Science & Information Systems.

© S. Cha8/8/2002

CSISCSIS

w1 w2 w3 w4 w5 w6 w7

5 3 6 5 4 5 5

min(wi) = 3

w1

w2

w3

w4

w5

w6

w7 w8 w9 w10

4.24 4.24 4.24 4.242.83 4.24 4.24

2.83

2.83

2.83

min(wi) = 2.83

Stroke Width ExtractionStroke Width Extraction

(a) Vertical & horizontal stroke width (b) Diagonal stroke width

Page 10: © S. Cha8/8/2002CSIS Automatic Detection of Handwriting forgery Dr. Sung-Hyuk Cha & Dr. Charlies C. Tappert School of Computer Science & Information Systems.

© S. Cha8/8/2002

CSISCSISFractal: Fractal: How Long is a Coastline? How Long is a Coastline?

Page 11: © S. Cha8/8/2002CSIS Automatic Detection of Handwriting forgery Dr. Sung-Hyuk Cha & Dr. Charlies C. Tappert School of Computer Science & Information Systems.

© S. Cha8/8/2002

CSISCSISFractal: Fractal: How wrinkly is the Coastline of Britain? How wrinkly is the Coastline of Britain?

Page 12: © S. Cha8/8/2002CSIS Automatic Detection of Handwriting forgery Dr. Sung-Hyuk Cha & Dr. Charlies C. Tappert School of Computer Science & Information Systems.

© S. Cha8/8/2002

CSISCSIS

(a) Number of in the boundary = 69

(b) Number of in the boundary = 32

(a) (b)

Fractal: Fractal: How wrinkly is Handwriting? How wrinkly is Handwriting?

Page 13: © S. Cha8/8/2002CSIS Automatic Detection of Handwriting forgery Dr. Sung-Hyuk Cha & Dr. Charlies C. Tappert School of Computer Science & Information Systems.

© S. Cha8/8/2002

CSISCSIS

)2log(/.___

.___log

reslowinboundary

reshighinboundarysWrinklines

1085.1)2log(/)32

69log( sWrinklines

Fractal: Fractal: Measure of WrinklinessMeasure of Wrinkliness

Page 14: © S. Cha8/8/2002CSIS Automatic Detection of Handwriting forgery Dr. Sung-Hyuk Cha & Dr. Charlies C. Tappert School of Computer Science & Information Systems.

© S. Cha8/8/2002

CSISCSIS

(d-e) ascender & descender

Computational FeaturesComputational Features

Page 15: © S. Cha8/8/2002CSIS Automatic Detection of Handwriting forgery Dr. Sung-Hyuk Cha & Dr. Charlies C. Tappert School of Computer Science & Information Systems.

© S. Cha8/8/2002

CSISCSIS

(f) stroke width

(g-i) projected histogram and gradient histogram

Computational FeaturesComputational Features

Page 16: © S. Cha8/8/2002CSIS Automatic Detection of Handwriting forgery Dr. Sung-Hyuk Cha & Dr. Charlies C. Tappert School of Computer Science & Information Systems.

© S. Cha8/8/2002

CSISCSIS

sample1 by x

),...,,( 11121

xd

xx fff ),...,,( 22221

xd

xx fff ),...,,( 11121

xd

xx fff ),...,,( 21yyy x

dxx fff

sample2 by x sample1 by x Forgery of x by y

Feature Extractor

)),(),...,,(),,(( 2121212211

xd

xd

xxxx ffdffdffd

Distance computing

)),(),...,,(),,(( 1112211

yyy xd

xd

xxxx ffdffdffd

d-dimensionalwithin-authentic-

handwritingdistance set

d-dimensionalbetween-authentic-

handwriting & forgery distance set

Automatic Forgery Detection ModelAutomatic Forgery Detection Model

Page 17: © S. Cha8/8/2002CSIS Automatic Detection of Handwriting forgery Dr. Sung-Hyuk Cha & Dr. Charlies C. Tappert School of Computer Science & Information Systems.

© S. Cha8/8/2002

CSISCSIS

.49 .70 .71 .13 .47 .32 .21

.49 .75 .70 .26 .54 .35 .18

.49 .67 .74 .23 .48 .32 .22

.72 .33 .47 .66 .60 .42 .10

.74 .33 .48 .60 .59 .45 .10

.79 .36 .54 .60 .59 .52 .09

.30 .61 .66 .70 .71 .57 .10

.42 .72 .64 .67 .74 .53 .10

.40 .75 .67 .75 .70 .54 .11

.30 .60 .59 .66 .60 .36 .10

.32 .60 .59 .60 .59 .39 .10

.30 .66 .60 .60 .59 .34 .09

cent slant wid zone side-h bot-h grad

Feature distances

AAAAAA

FFFFFF

Truth

Inputs & TruthInputs & Truth

Page 18: © S. Cha8/8/2002CSIS Automatic Detection of Handwriting forgery Dr. Sung-Hyuk Cha & Dr. Charlies C. Tappert School of Computer Science & Information Systems.

© S. Cha8/8/2002

CSISCSIS

Original/Forgery?

Distancecompu-tation

Feature extraction

),...,,( 21x

dxx fff

),...,,( 21y

dyy fff

),( 11yx ff

),( 22yx ff

),( yd

xd ff

Authentic sample from a known source

Handwritingsample in question

Artificial Neural NetworkArtificial Neural Network

Page 19: © S. Cha8/8/2002CSIS Automatic Detection of Handwriting forgery Dr. Sung-Hyuk Cha & Dr. Charlies C. Tappert School of Computer Science & Information Systems.

© S. Cha8/8/2002

CSISCSISDistributions and ErrorsDistributions and Errors

between authentic & forgerydistance

within authenticdistance

forgery identified authentic

authenticidentified as

forgery

Decisionboundary

d ( , )

d ( , )

Page 20: © S. Cha8/8/2002CSIS Automatic Detection of Handwriting forgery Dr. Sung-Hyuk Cha & Dr. Charlies C. Tappert School of Computer Science & Information Systems.

© S. Cha8/8/2002

CSISCSIS

withinclass

betweenclass 60180

Random selectionRandom selection

dichotomizer

s’-error d’-error

dichotomizer

s-error d-error

estimateestimate

Design of ExperimentDesign of Experiment

Page 21: © S. Cha8/8/2002CSIS Automatic Detection of Handwriting forgery Dr. Sung-Hyuk Cha & Dr. Charlies C. Tappert School of Computer Science & Information Systems.

© S. Cha8/8/2002

CSISCSISConclusionConclusion

• Authentic handwriting and forgery handwritten word images were collected.

• Differences b/w authentic handwriting and forgery

• Measure of Wrinkliness

• Automatic Forgery Detection Model using the dichotomy approach.

• Further quantitative study with more samples is necessary.

Page 22: © S. Cha8/8/2002CSIS Automatic Detection of Handwriting forgery Dr. Sung-Hyuk Cha & Dr. Charlies C. Tappert School of Computer Science & Information Systems.

© S. Cha8/8/2002

CSISCSIS

The EndThank you.

http://www.csis.pace.edu/~scha/handwriting.html