Detection and Verification System of Handwriting and Signature Using Raspberry Picopy 220426094934
Detection and Verification System of Handwriting and Signature Using Raspberry Picopy 220426094934
A Partial Fulfillment
Od the Requirements for the Degree
Bachelor of Science in Computer Engineering
By
Alecxis T. Caringal
Cear S. Medina III
Joao Roumil Vergara
Co-researcher
Engr. Jeremiah Dearborn Gangoso
December 2021
Dedication
It is with the deepest gratitude and warmest affection that we dedicate this proposed
Supportive Classmates,
Treasured Friends,
Acknowledgement
We, the researchers would like to express our heartfelt gratitude to each one who
To our dear parents, Mr. & Mrs. Caringal, Mr. & Mrs. Medina, and Mr. and Mrs.
Vergara, thank you, for the undying love and financial support that you have provided us
from the start until the end. You are our inspiration.
To our siblings and relatives, thank you for helping our parents in providing our
times, for cooperation and friendship. We will always remember the times we shared.
To our co-researcher Engr. Jeremiah Dearborn Gangoso, thank you for sharing
with us your expertise and for guiding us throughout our proposed development. Your
help and encouragement played a great role in the success of this research. We hope
that you will continue to inspire and support other students in the future.
To our area Head and Thesis Adviser, Engr. Rodolfo Doromal Jr., thank you for
all the guidance, corrections, and reminders that you have been giving us during the
project development.
Most importantly, we would like to thank the Lord for giving us wisdom. The
blessings and providing us with support from the people around us. To God, be all the
glory.
Abstract
System of Handwriting and Signature using Raspberry Pi. Its main core is the
Raspberry Pi, responsible for the image processing and giving command to the
components. Unit component are the Camera module used to capture input images.
The prototype will be tested for its functionality, reliability, and accuracy. The
results of the assessment will be shown that the design project is both operational and
functional. The program code in C Language, PHP, and Python language works as
successfully combining the device’s hardware and software, the researchers will be able
Table of Contents
Preliminaries Page
Title Page …………………………………………………………………. i
Dedication …………………………………………………………………. ii
Acknowledgment…………………………...……………………………… iii
Abstract ……………………………………………………………………. iv
Table of Contents ……………………………………………………….…. v
Chapter 1: INTRODUCTION
a. Background of the Project ……………………………….…….…… 1
b. Rationale……………………………….………………….….…....… 2
c. Objectives…………………………….……………….….…...…....… 3
d. Significance of the Study………………...…………………….…… 4
e. Scope and Limitations………………...…………………….…….… 5
f. Definition of Terms ………………...…………………….…….…… 5
Chapter 3: METHODOLOGY
a. Theoretical Basis…………………………………………...…...…... 25
b. Project Design and Materials ……………………………………… 28
c. Fabrication and Construction Procedure………………………… 34
d. Operation and Testing Procedure ………………………………… 38
e. Evaluation Instrument……………………………………………… 39
f. Comparative Analysis and Advantage…………………………… 40
Chapter 1
INTRODUCTION
essential and must be kept confidential and secure. There is a growing interest in
security systems that use the Internet of Things (IoT). Furthermore, signature
issues for a number of years. In his report, Sagar (2020) highlighted the two most
data and acting as an unsupervised algorithm. Artificial Neural Network (ANN) has
pattern recognition, and prediction in various fields. Artificial Neural Network (ANN)
are a type of Machine Learning model that has become competitive with standard
because the strokes of the signature are generated organically by the wrist
movement. Only the person who made the signature understands how it was
created. Considering that signature is difficult to duplicate, the equal error rate was
In line with this, the researchers would like to propose a detection and
system. Additionally, the researchers are also eager to gain more knowledge
a. Rationale
The core concept proposed by this project would be the Detection and
Verification of Handwritten Signature using Artificial Neural Network (ANN) for image
from other detection and verification systems because a camera will be used to scan
signatures rather than having an LCD touchscreen for writing and processing.
The ANN will be trained and developed using sample image datasets created
specifically for the study. The ANN model, user interface and camera and LCD
Combining the theories listed, the challenges and issues found led the
proponents to suggest a design project that would detect handwritten signatures and
b. Objectives
The main objective of this study is to design a system that can recognize and
a) Raspberry Pi,
c) Camera module.
d) User Interface
e) ANN model
2. Develop the software User Interface (UI) and to determine the ANN
This proposed project will focus on designing a model that will detect forgery
This will encourage and build interest in developing a signature security system in
banks, finance, insurance, and others in which proper authenticity is at its core. Also,
Future Researchers This design project may serve as reference material for
Networks.
reference resource in software engineering and digital signal processing topics such
as neural networks and digital system design using a combination of Python with the
The project aims to detect and verify hand-written signatures through the
camera module of Raspberry Pi. An Artificial Neural Network (ANN) model will be
selected and trained for this purpose, using 3000 samples for training, testing, and
researchers and other individuals they have selected. Various ANN algorithms
applicable to the objectives of the study will be tested during initial training, and the
algorithm that provides the best performance in terms of reliability will be selected
existing signatures in the database for the duration of system development. The
project will not include training and recognizing new samples of signatures because
it will require continuous training and updating of the ANN model for an indefinite
period of time.
d. Definition of Terms
The following definitions are commonly used listed and are conceptually
Artificial Neural Networks Deep learning algorithm which can take an input
image comprised of a node layer, containing an input layer, one or more hidden
Chapter 2
recognition and verification systems are discussed in this paper. The references include
books, magazines, online databases, scientific articles that have appeared in legitimate
verification, Raspberry Pi, forgery detection, Artificial Neural Networks, and Machine
Learning, as well as Related readings and literature. It contains readings related to the
study’s legal foundation, direct or indirect effects on the government thrusts, and
The section shows the related writing and concentrates on completely fathoming
and comprehending the key ideas of parts to be utilized in this investigation. The
referred to writing and studies include the comprehension of the improvement of the
forgery detection system and give fundamental data of pertinent ends, which fills in as
the guide for the gathering of inquiries about the proposal of this exploration venture.
a. Conceptual Literature
Signature Verification
al states that signature verification system is determined by what kinds of data the
model is trained on forgeries and genuine signatures, but testing on different forgeries
and genuine signatures during testing signature verification is one of the most
et. al. and Zhang et. al. first train one network in a writer-independent fashion to learn
features and then use these features for the second level of classifier for each individual
user [11,29,12]. Early work in this field was devoted to finding good feature
representations of signatures.
box, that construct a rectangular box encompassing the signatures that reduces the
While advances in machine learning have allowed for reliable performance in the
loan, property, and other legal documents. It is a biometric measure. Describes the
confirming the identity of a user using the handwritten signature of the user as a form of
voice verification, is that handwritten signature has already been the most widely
accepted biometric for identity verification in society for years. The long history of trust
in signature verification means that people are very willing to accept a signature-based
signature to get a binary image and then calculate the global and texture features points
and maintain a feature vector. All calculations are done based on these feature points.
The feature vector obtained from the global and surface features is compared with the
feature vector of the incoming testing signature. Based on the values obtained, the
network will decide the appropriateness of the signature. The suggested scheme
discriminates between original and forged signatures using an artificial neural network
(ANN) to train and verify signatures. The method takes care of simple and random
forgeries, and the skilled forgeries are also eliminated to a greater extent.
Raspberry Pi
with great capabilities similar to a PC, In their study IoT based Biometrics
determining the authenticity of signature using the raspberry pi board. Where they
Rohan et al (2021) block diagram as figure above, explain the usage of raspberry
board, a low-cost device that could improve programming skills and hardware
regular computer, but it is still equipped with a complete Linux distribution operating
system that can provide all the expected abilities that implies, at low-power
consumption.
Figure 3: Raspberry Pi board series
Khoo et al, discussed also the different model types of raspberry pi, in which in
the signature algorithm of isdsr on raspberry pi, in which they describe raspberry pi as a
Iot device, an embedded board. using a similar model raspberry pi 3 they integrate the
board to send datas and secure routing nodes and verifying signature verification
algorithms.
Sadikot, H. S. (2018) Raspberry Pi’s performances are compared with some current IoT
platforms on a general level by computing power, size and overall costs of the solutions.
computer board, with support for a great number of input and output peripherals, and
network communication is the perfect platform for interfacing with many different
genuine and counterfeit signatures. That there are factors that affect detection on the
original and unoriginal documents. And its importance in legal documents, bank checks,
doctors’ prescriptions that can lead to huge consequences if not done accurately.
In the article of Ghanim et al, shared that signatures forgery are often manually
detected by experts, but still high accuracy is not always achieved. There are many
difficulties in the manual forgery detection due to variations in handwriting style and
effective role in verifying signatures with high accuracy and in differentiating between
phase to determine whether input image is a genuine or fraud. The final optimized
approach uses the HOG features and applies the SVM classifier. The experiment
features are proposed and the other type of feature is statistical features based on
in their paper proposed an automatic off-line signature verification and forgery detection
system based on fuzzy modeling the system uses the Takagi–Sugeno (TS) model
characteristics of the signature. The system has been tested on a large database of
Adithya et al. (2019) State that a forgery of signature is quite common, and in
need of identification and verification since it is vital in security and resource access
control. Adithya et al also state, there are three types of forgery: random forgery, simple
or casual forgery, expert or skilled or simulated forgery. In the paper of Adithya et al,
forgery, random forgery, simple forgery, and skilled forgery. Arathi et al paper approach
a method of converting images to time series data, which they defined as linear
Centered at the most recent Chandra et al (2016) Discussed the usage of neural
networks in their paper for offline signature verification system. Prior to integrating
neural networks Chandra et al’s paper utilized feature engineering to extract necessary
data for training and testing on neural network as explained the usage of neural network
as nodes for machine learning in order to detect, between forgery and genuine
signatures.
vast network of neurons in a brain. Inspired by an animals’ central nervous system (the
brain in particular) that is capable of machine learning and pattern recognition. They are
presented as a system of interconnected neurons that can compute values from inputs
by being provided information from the network. An ANN is configured for a specific
that can exhibit complex, global behavior that is determined by the connections among
function the same way the human brain performs a given task of interest. For example,
"the human brain is big and highly efficient. The human brain is like an information-
processing machine that has a variety of complex signal computing operations”, that
can be easily coordinated to perform a task. The main element of this brain is the
problems on a daily basis. A typical example of a neural network function is the human
brain that is connected to send and receive signals for human action. An illustration of
inspired computer program designed to simulate the way in which the human brain
processes information by detecting the patterns and relationships in data and learning,
in their paper basic concepts of artificial neural network. which discussed the concepts
summing the total of inputs multiplied by the weights of datas presently the pattern will
be recognized.
Artificial neural network (ANN) is a computational model that consists of several
processing elements that receive inputs and deliver outputs based on their predefined
activation functions. The network should be first trained to learn the hidden patterns in
the input data represented in the model as the weights of the connections. It can then
Machine Learning
that Machine learning can be stated as general learning (which is person independent)
or special learning (which is person-dependent). In the case of general learning the goal
is to learn from a large population of genuine and forged signature samples. The focus
problem where the input consists of the difference between a pair of signatures.
This implies gathering batch samples of data, that will be separated into training
batches, and testing batches for the system is able to learn to distinguish and verify
signatures. This procedure has been applied thus vary to vary by machine learning
techniques.
Srinivasan et al. (2006) states that machine learning as general learning (which
case of general learning the goal is to learn from a large population of genuine and
forgery and genuine signatures. The paper consists of learning a two-class classification
problem where the input consists of the difference between a pair of signatures.
learning to train the model, feature extraction and computation. where their paper
model.
Centered at the most recent Mshir et al. (2020) discuss some of the deep
extract input image features to examine the image pixel as matrix, As their paper
signature verification.
Chandra et al, Neural Computing figure above show the pattern of genuine
signature, to be trained on the neural network model. Machine learning within Weka
constitutes a model for training data by applying different strategies. In their paper
which a model can choose the data points (for example, records obtained from a
systematic search) it would like to learn from and thereby drastically reduce the total
unlike for other security system as password can be forgotten which happens often in
attained increasing importance mainly due to the efficiency of present day computers. In
addition, the times of simulation and testing in the ANN application are minimal. And the
verification system based on ANN is able to learn different kinds of signature datasets,
by using only geometrical offline features. Moreover, the use of large databases is not
required to show the capability of learning for this sort of problem, we have chosen only
five genuine signatures and three forged ones for training, and we get very good results.
However, for real practice use, larger training data can increase the robustness of the
system. After training, the best classification accuracies were achieved. The
classification ratio exceeds 93%, although the threshold, the parameter deciding the
forged. The system is robust and can detect random, simple and semi-skilled forgeries.
We have no clear idea about its performance in case of very skilled forgeries because
we are not skillful imitating signatures to the extent being considered as skilled
forgeries.
fusion of local and global analysis of input images has been described. Slant directions
of the signature strokes and those of the envelopes of the dilated signature images are
used as features for recognition. Global analysis is based on extracting features for the
whole preprocessed signature image and a statistical distance measure. Local analysis
is based on extracting features per height-wide blocks and left-to-right Hidden Markov
Models. Experimental results are given on a subcorpus of the large MCYT signature
performance on random and skilled forgeries is given for user-dependent and user-
shown to outperform the system based on global analysis in all reported cases. The two
proposed systems are also shown to give complementary recognition information which
is exploited with a simple fixed fusion strategy based on the sum rule. Relative
quite abstract and the scalar values taken to weigh the feature vector to aid the
classification, based upon the degree of importance, can be changed according to the
inferences drawn from stage to stage. This is a novel attempt in this design and has
given satisfactory results as seen by its ability to attain better classification efficiency
and help in finer training. The system verification rate that stands at 94.27 % may be
invariants, some global properties and neural networks. Both systems used a three-step
process; in the first step, the signature is separated from its image background. Second
step performs normalization and digitization of the original signature. Moment invariants
and some global properties which are used as input features for the neural network
(NN) are obtained in the third step. Our recognition system exhibited 100% success rate
by identifying correctly all the signatures that it was trained for. However, it exhibited
poor performance when it was presented with signatures that it was not trained for
earlier. We did not consider this a “high risk” case because recognition step is always
followed by verification step and these kinds of false positives can be easily caught by
the verification system. Generally, the failure to recognize/verify a signature was due to
signature images. The extracted features are used to train a neural network using error
back propagation training algorithm. The network could classify all genuine and forged
signatures correctly. When the network was presented with signature samples from
database different than the ones used in training phase, out of 300 such signatures (150
genuine and 150 forged) it could recognize 248 signatures correctly. Hence, the correct
recognition system exhibited 100% success rate by identifying correctly all the
signatures that it was trained for. However, it exhibited poor performance when it was
presented with signatures that it was not trained for earlier. We did not consider this a
“high risk” case because recognition step is always followed by verification step and
these kinds of false positives can be easily caught by the verification system. Generally,
the failure to recognize/verify a signature was due to poor image quality and high
Chapter III
RESEARCH METHODOLOGY
This chapter includes the project design, project development, operation, and
a. Theoretical Basis
A conceptual model was built and outlined below based on the literature,
principles, theories, and studies, and ideas taken into consideration in the proposed
project. The thesis analysis will be performed in three stages. The figure represents the
identifies the knowledge needed in order to develop and conceptualize the study.
module and LCD development will be gathered from related studies, literature, and
The process stage presents all the necessary procedures to be taken in the
development of the study. It includes designing, implementing the design, testing and
System, which is the result of applying key knowledge, software, and hardware
concepts into the major project development process outlined for the study.
Operational Framework
have a singular module, where the system overall operates, using a Raspberry Pi model
3b as the central processor, in order to communicate between the camera input and
Block Diagram
The block diagram of the design project is shown in figure 12. The block diagram
consists of three parts: the Raspberry Pi Camera Module, TFT LCD Touch Screen, and
the Raspberry Pi 3 Model B. The Raspberry Pi Camera Module and LCD Touch Screen
will serve as input for the user. It starts detecting handwritten signatures whenever the
user displays a document. A preview of the document image will be displayed on the
TFT LCD Touch Screen. If the Camera Module detects a handwritten signature, the
TFT LCD Touch will then ask the user to verify the handwritten signature.
HARDWARE COMPONENTS
Raspberry Pi 3 Model B
This powerful credit-card sized single board computer can be used for many
applications that has a more powerful processor, 10x faster than the first generation.
Additionally, it adds wireless LAN & Bluetooth connectivity making it the ideal solution
for powerful connected designs. Additionally it adds wireless LAN connectivity, with a
1.2 GHz 64-bit quad core ARM Cortex-A53 processor, on-board 802.11n Wi-Fi,
on for Raspberry Pi, featuring a fixed focus lens. It's capable of 2592 x 1944-pixel static
images, and also supports 1080p30, 720p60 and 640x480p60/90 video. It is plugged
directly into the CSI connector on the Raspberry Pi. It's able to deliver a crystal clear
5MP resolution image, or 1080p HD video recording at 30fps with latest v1.3. The
module attaches to Raspberry Pi, by way of a 15 pin Ribbon Cable, to the dedicated 15
pin MIPI Camera Serial Interface (CSI), which was designed especially for interfacing to
cameras. The CSI bus is capable of extremely high data rates, and it exclusively carries
load. The primary function of a power supply is to convert electric current from a source
to the correct voltage, current, and frequency to power the load. As a result, power
(Source: Internet)
A TFT touch screen is a gadget that combines a TFT LCD with a touch
technology overlay on top of it. This will serve as an interface of the design project.
(Source: Internet)
External Storage (16gb Flash Drive)
A Flash drive is a small and portable storage device that connects to computers
and other devices using a USB Type-A plug that is built onto the drive. The way flash
drives work is similar to solid-state drives, or SSDs. This external storage will be utilized
as a carrier of the raspberry pi OS, and the storage of inputs and output data.
SOFTWARE COMPONENTS
Python
design philosophy emphasizes code readability with its use of significant indentation. Its
write clear, logical code for small and large-scale projects. In which the researchers will
be utilizing to generate, configure artificial neural networks in order to train and test
signature data.
Embedded C
Raspberry pi main programming language in order to communicate between
language. The researchers will prepare an algorithm for the camera module, lcd touch
SQL
language used in programming and designed for managing data held in a relational
management system essentially used for web data storage. In this case, the
researchers will develop a standard database for recording, storage of completed data
of signatures.
In order to achieve and meet the objectives of the study, the following step-by-
step procedure is to be conducted during the fabrication and construction of the project
prototype. Listed below were the procedures that will be taken to ensure the proper
operation:
In this stage, the researchers will identify the different technical features of the
system. The researchers will have to observe the different existing problems of
signature forgery. After this, the gathered information will be analyzed to come up with
In this stage, the researchers will identify the technical features of the Detection
and Verification of Handwritten Signature based on the actual observation of the related
studies stated. After this, the gathered information will be analyzed to come up with
electronics theories.
In this step, the researchers will have to gather information about the different computer
and electronics concepts to properly design the hardware circuit layout and the
algorithm of the system. At the point of time, the researchers should be knowledgeable
on the hardware design of the Detection and Verification of Handwritten Signature. Also,
for the software development, the researchers should know the basic concept of
the local market. The researchers will have to check the shipping time and the hardware
Step 4: Select suitable components for use in the development of the hardware
components.
The researchers will have to identify appropriate components to be used in the
be use as the main component of the system. The system will be powered by a 25V DC
The researchers will have to come up with the blueprint of the plan of each
module. The circuit diagram and layout should be finalized and ready for
implementation. At this point, the model should be available for fabrication. The circuit
Step 6: Determine the production methods that will be appropriate for camera
module.
In this step, the researcher will create a circuit diagram for the hardware module.
Signature. Proper placement of optical camera will be visible since it will process the
input.
In this phase fabrication of the hardware, modules will take place. The researcher
will have to determine the proper approach in the fabrication of the hardware module.
The sustainability of the modules for outdoor use will carefully scrutinized and will be
fabricated appropriately. Dimension is very crucial in the design and fabrication of the
hardware module. Also, for the algorithm, program source code and dataset in Image
processing for the Detection and Verification of Handwritten Signature will be developed
and test. Furthermore, integration of the different hardware modules and program will
take place.
Step 7: Train the model for recognizing and verifying handwritten signatures
Training the model for recognizing and verifying handwritten signature using
prepared image samples of the researchers, in order to control and examine the overall
system. The Researchers will prepare around 3,000 signatures, on the limit of 85% -
Step 8: Make adjustments on the parameters if needed on the program code for
In this step, Adjusting and tweaking the parameters to ensure the desired
outcome of the model is met, if necessary, revise the selection of the neural network to
Step 9: Apply all integration necessary for recognition and verification of hand-
written signatures.
will examine the hardware module, camera, flash drive, TFT LCD touchscreen. and
At this stage, the system will be tested and analyzed. The device will be tested
by the researcher and evaluated by the testing respondents after it was completed. The
researcher will test the system's reliability on a daily basis. This stage will describe test
Step 10: Install the prototype in the assigned area and conduct preliminary
testing.
The researcher will have to test the system repeatedly to ensure its functionality.
The following is the procedure for testing the operation of the system: 1) Raspberry Pi
connected to the Camera. 2) The researcher will have to make sure that the Detection
Step 11: Determine the performance and accuracy of the system in terms of a)
model. The number of forecasts when the expected value is identical to the actual value
will be the percentage of model accuracy. It is binary (true/false), and during the training
phase, accuracy will be frequently graphed and monitored. However, the value is
The loss is determined for both training and validation, and it is used to
determine how well the model performs for these two sets.
Step 12: Perform thorough testing of the system prior to its actual
implementation
The researcher will conduct through testing of the prototype functionalities. The
that it performs according to design requirements. The researchers will have to make
sure that relevant feedbacks, comments and suggestions mentioned by evaluators will
be given actions.
For the operation and testing procedure of the system, separate testing will be
performed.
Device Testing
controlled setting where the participants of the study are the researchers
signature. That will assess the model accuracy and model loss.
Listed below were the procedures taken to ensure the proper operation:
connections.
more accurate and precise, before assembling the system the researchers will
prepare around one thousand five hundred data inputs, of the same signature, to
be trained by the system. and tweak the data features. Once the system is
e. Evaluation Instrument
A machine learning method will be optimized using a model accuracy and loss
will be use determine how well the design project forecasts. It will be used to
generally calculated as a percentage once the model parameters have been computed.
It's a metric for how close the algorithm forecast is to the actual data. The loss will be
calculated during training and validation, and its meaning will be determined by the
model's performance in these two sets. It's the total number of mistakes committed in
each training or validation set for each example. The loss value indicates how well or
This design project proposal will target high percentage of accuracy and low
percentage of loss. Having a high percentage of accuracy and the low percentage of
loss will determine that the project design will only make minor errors on a tiny portion of
This research will use Artificial Neural Networks to recognize patterns between
genuine and forgery as there are many machines learning approaches to signature
verification systems. Artificial Neural Network is more beneficial to distinguish since the
image detection. to ensure the accuracy and precision requirements are met.
References
https://ieeexplore.ieee.org/document/9243649
https://www.semanticscholar.org/paper/Signature-verification-and-forgery-
detection-system-Yusof-Madasu/b2438165a1db82edbfbedc02ea9f6bfeca8a34aa
https://www.ibm.com/cloud/learn/neural-networks
IBM Cloud Education. (2020, August 17). What are neural networks? IBM.
Srihari, S. N., Srinivasan, H., Chen, S., & Beal, M. J. (2008). Machine learning for
through machine learning. In 2018 5th IEEE Uttar Pradesh Section International
IEEE.
Poddar, J., Parikh, V., & Bharti, S. K. (2020). Offline signature recognition and
forgery detection using deep learning. Procedia Computer Science, 170, 610-617.
verification and forgery detection using fuzzy modeling. Pattern Recognition, 38(3), 341-
356.
Adithya, D. R., Anagha, V. L., Niharika, M. R., Srilakshmi, N., & Aditya, S. K.
Mshir, S., & Kaya, M. (2020, June). Signature recognition using machine
Hameed, M. M., Ahmad, R., Kiah, M. L. M., & Murtaza, G. (2021). Machine
Rohan, D. H., Yusro, M., & Djatmiko, W. (2021, March). Development of a tool
for determining the authenticity of signature using the raspberry pi board. In IOP
Conference Series: Materials Science and Engineering (Vol. 1098, No. 4, p. 042086).
IOP Publishing.
Khoo, W. J. (2018). Machine learning for disease detection using raspberry pi
Kojima, H., & Yanai, N. (2017, November). Performance evaluation for the
Chandra, S., & Maheskar, S. (2016, March). Offline signature verification based
on geometric feature extraction using artificial neural network. In 2016 3rd international
Srinivasan, H., Srihari, S. N., & Beal, M. J. (2006). Machine learning for signature
Mshir, S., & Kaya, M. (2020, June). Signature recognition using machine
Mhatre, M. S., Siddiqui, F., Dongre, M., & Thakur, P. (2015). A review paper on
Samant, R. M., Shilwant, M., Sarsambi, B., & Shelke, M. (2017). Signature
van de Schoot, R., de Bruin, J., Schram, R., Zahedi, P., de Boer, J., Weijdema,
F., ... & Oberski, D. L. (2021). An open source machine learning framework for efficient
Karouni, A., Daya, B., & Bahlak, S. (2011). Offline signature recognition using
(2004, May). An off-line signature verification system based on fusion of local and global
Kumar, P., Singh, S., Garg, A., & Prabhat, N. (2013). Hand written signature