Academia.eduAcademia.edu

Application of hidden Markov models for signature verification

1995, Pattern recognition

Pergamon Pattern Recognition, Vol. 28, No. 2, pp. 161 170, 1995 Elsevier Science Ltd Copyright ) 1995 Pattern Recognition Society Printed in Great Britain. All rights reserved 0031 3203 95 9.50+.00 00313203(94)000921 APPLICATION OF HIDDEN MARKOV MODELS FOR ...

Pattern Recognition, Vol. 28, No. 2, pp. 161 170, 1995 Elsevier Science Ltd Copyright ~) 1995 Pattern Recognition Society Printed in Great Britain. All rights reserved 0031 3203/95 $9.50+.00 Pergamon 0031-3203(94)00092-1 APPLICATION OF HIDDEN MARKOV MODELS FOR SIGNATURE VERIFICATION L. YANG, B. K. WIDJAJA and R. PRASAD t Telecommunications and Traffic-Control Systems Group, Delft University of Technology, P.O. Box 5031, 2600 GA Delft, The Netherlands (Received 22 June 1993; in revised form 27 July 1994; received for publication 5 August 1994) Abstract--This paper describesa technique for on-line signature verificationusing Hidden Markov Models (HMMs). Signatures are captured and digitized in real-time using a graphic tablet. For each signature a HMM is constructed using a set of sample signatures described by the normalized directional angle function of the distance along the signature trajectory. The Baum-Welch algorithm is used for both training and classification.Experimental results based on 496 signatures from 31 subjects are presented which show that HMM technique is very potential for signature verification. HMMs Baum-Welch algorithm Signature verification Forward probability 1. INTRODUCTION Multimedia has now become one of the most attractive applied research subjects in the field of telecommunications. Many applications have already started to affect the real life, such as facsimile, videophone and tele-writing systems. I1~Some of the present operations both in business and daily life will experience dramatic change and tremendous improvement in efficiency and other aspects by the introduction of tele-writing systems. For instance, tele-working and tele-banking will make it possible to have business done while the people involved are in other locations. These are expected to be realized in the near future with the continuous improvement on user-machine interfaces and the enhancement of machine intelligence. Writing tablet introduced for improving man and machine communications plays a very important role in the field. One of a few available commercial prototypes is pencomputers which are designed to enable the input of handwritten script for computer systems. One very interesting and potential application is to build tele-banking systems using writing tablets as the man-machine interfaces of the automatic systems. With customers' information stored in a central database accessible by all authorized terminals of the systems, bank operation is expected to be more efficient and customer friendly. This kind of system requires highly reliable ability of machine interpretation and verification of handwriting, apart from sophisticated hardware and telecommunication facility. Reliable automatic signature verification would be of great use in many other application areas in law +Author to whom all correspondence should be addressed. Backward probability enforcement, industry security control and so on. Lately, a lot of effort has been focused on investigation of automatic signature verification methods. In general, automatic signature verification can be done in two fashions: off-line and on-line. The two methods differ in the form by which the input data are captured, tn the off-line situation, signatures prewritten on paper are considered. Because it is difficult to extract individual features from static images or to detect imitations, off-line signature verification is fisually more difficult than on-line verification.121 Most of the systems proposed for signature verification are on-line systems which extract signature features based on position, velocity, acceleration and pressure signals of the pen tip, among others. The comparison algorithms used in those systems are mostly dynamic time warping and regional correlation. Those systems have shown a various degree of success in signature verification.12'3) Other techniques like Fourier transform have also been applied for signature verification with some success/4) Recently, neural network has also been applied for signature verification,tS) In addition to signature verification, signature recognition has also been investigated by several researchers, e.g. Lorette. t6~ In this paper an approach for on-line signature verification is proposed. We attempt to apply the well known speech recognition technique, Hidden Markov Models (HMMs), to the problems of on-line signature verification. HMMs have been successfully used for speech recognition.~7~The application of the method to on-line character recognition was also investigated and the experimental results have shown that the method is very promising/s'9) The advantage of modelling signatures with HMMs is that it is possible to accept variability in signing and at the same time capture the individual features of the signatures. In the proposed 161 162 L. YANG et al. method, signatures are described by the normalized directional angle function of the distance along the signature trajectory. Lorette t6~ used initial angle and total cumulated angle of a signature jointly with other measurements to form a feature vector describing a signature for signature recognition. By applying data analysis and clustering techniques, the feature space was partitioned into clusters corresponding to signature classes. Whereas, we try to incorporate dynamic sequence information of signing by extracting normalized angles (features) along signature trajectory and model the generation of this sequence by HMMs. For each class of signatures, a HMM is constructed using a set of sample signatures and stored as the reference of that class. We have used the Baum-Welch algorithm for both training and classification. To verify a signature, the probability that an unknown signature was generated by a particular HMM is computed. Based on a threshold a decision on whether to accept the signature as authentic or to reject as forgery is made. Our primary research has shown that the HMM approach is very potential for signature verification, t~°~ This paper includes further research on the topic. The paper mainly focused on the issues on processing of signatures in order to apply HMMs. Section 2 presents a brief discussion on the general aspects of HMM and issues of model training and application for classification. We discuss the extraction of features for modelling signatures with HMM, the signature verification process and threshold problem in Section 3. Experimental results are described in detail in Section 4. Finally conclusions are given in Section 5. 2. H I D D E N MARKOV MODELS The HMM models a doubly stochastic process governed by an underlying Markov chain with a finite number of states and a set of random functions each of which is associated with one state. At discrete instants of time, the process is in one of the states and generates an observation symbol according to the random function corresponding to the current state. The model is hidden in the sense that all that can be seen is a sequence of observations. The underlying state obeexvations \T/ oblervatione \TI which generated each symbol is hidden. The HMMs applied here are based on one proposed for speech recognition by Levinson et al. ~ ~ We restrict ourselves to the consideration of processes whose observation sequence are drawn from a discrete finite alphabet according to discrete probability distribution functions associated with the states. A HMM may have different structure. It is possible to constrain a HMM such that only certain desired state transitions are allowed. An example of left-to-right HMM is shown in Fig. 1, where the five circles represent the states of the model and states are not permitted to transit back to the previous states. At a discrete time instant t, the model stays in one of the states and generates an observation. At instant t + 1, the model either remains in the same state or moves to a new state according to the state transition probabilities. This continues until a final terminating state is reached at time T. The model can generate any observation symbol of a finite alphabet from each state governed by observation probabilities. The model is initialized by initial probabilities of occupying states att=l. Quantitatively, a HMM is described as following using the same notation as used by Levinson et al. ~ ~ • set of N states {q~,q2,...,qN}; • a state transition matrix A = {ao}, where aij is the transition probability from state ql to state qj: aij=Pr(q~att+llq~att), l<i,j<N; • set of M discrete symbols {v~,v2..... Vu}; • an observation probability matrix B = ( b j k } , where b~k is the probability of generating symbol Vk from state qj, and • the initial probability distribution for the states H = {rtj},j = 1,2 ..... N; rtj = Pr(qj at t = 1). In general, to use HMMs for pattern recognition, there are two problems: (i) classification--compute the probability that a HMM generated a test observation sequence representing an unknown pattern; (ii) trainin9 of the models--estimate the model parameters based on a training set of observation sequences of each pattern. observations observations \l; \TI Fig. l. Left-to-right HMM with five states. observations \T; Application of Hidden Markov Models 163 2.1. Classification problem ~. Given an observation sequence O = {O1,02 . . . . . Or} representing an u n k n o w n pattern from some vocabulary W = {wl, w: ..... wv}, where each O t is some Vke { U I , U 2 . . . . . / ) M } ' and a set of V models M 1 , M 2 . . . . . M v each of which for one vocabulary word, the classification of an u n k n o w n pattern requires the computation of Pr~(OIMO for 1 _< i_< V. An u n k n o w n pattern is classified as w~ iff Pri >-Pr~ for 1 < j _< V. An efficient method to calculate Pr(O]M) is to use forward and backward probability, known as the forward-backward algorithm3 ~~ Denote 'forward' and 'backward' probability a s o~t(i ) and f,(i), respectively. They are given by: ~'+'(J)=[ ~ ct'(i)ao] l < t <_ T - - 1 (1) oq(j)ft(j) -bjk ~ t~Ot = vk r ~,(J)f,(J) t=l ffi . . . . . . (5) 1 Pr(OIM) ct, (i)f I (i). A detailed description of the algorithm and discussions on implementation issues can be found in literature." 1) For left-to-right models, the re-estimation is based on a set of Q observation sequences which all start at state q l(nl = 1). The re-estimation procedure is then modified to handle multiple observation sequences and aimed to adjust the model parameters such that the following is maximized: t2 (2 [I Pr(O(k)lM)= 1-I Prt" N f , ( i ) = ~ a~jbj(O,+Of,+l(j) j k=l T - l - > t ->1, (2) (7) k=l 1 setting ~1(i) = nibi(O 0 for all i, and fir(J) = 1 for allj. Equations (1) and (2) can be used to calculate Pr(OI M) which is given by: The modified re-estimation formulae are given by: t2 T - l E2 k=l ~:tk(t)aij bj(O tk+ 1)fl, + 1(J) t-1 (8) aij = N Q (3) k=l ~,U)f,U) for 1 ~ < t ~ < T - 1 . bjk = k= a ,~o, = ~ Q T 2.2. Training problem The training process can be generally described as the following steps: (i) make an initial guess of M; (ii) use some re-estimation algorithm and O to derive a new model M' with the property that Pr(OIM') -> Pr(OIM); (iii) replace M by M' and repeat the re-estimation. The re-estimation process iterates until the increase in Pr (OIM) is small enough. Here, we consider the B a u m Welch algorithm which guarantees to increase Pr(OIM) with the re-estimated A, B and n until the optimal point is reached. (~ 1) In this algorithm, the forward and backward probabilities are used to solve the problem of training by parameter estimation. Given some estimate of M and an observation sequence O, a new estimate ofa~j is computed as the ratio of the expected number of transitions from state q~ to qj, to the expected n u m b e r of transitions out of state qi, conditioned on O. A new value of bjk is estimated as the ration of frequency of occurrence of vk in state qj to the frequency of occurrence of any symbol in state qj. In terms of forward-backward probabilities, the parameters are computed as: T t=l O i=1j=1 Z T- 1 N ~ ~t,(i)a#bj(O,÷l)f,+,(j) Pr(OIM)= E 1 u,(i)aijbj(O,+ Oft+ ,(J) t=l aij = (6) (4) T-1 ct,(i)ft(i) t=l k=l 3. S I G N A T U R E (9) t=l VERIFICATION APPLYING HMM 3.1. Description of signatures In order to apply H M M s for signature verification, it is very important to find appropriate description for signatures which are independent of translation, rotation and scaling of a signature. Here, a signature is captured in real time using a writing tablet. The absolute angular direction of a signature as a function of the distance s along the signature trajectory, denoted as O(s), is used to represent a signature. In the digitized form, a signature is encoded as a sequence of absolute angles: 01,02,..., 0 i. An example is shown in Fig. 2. The rotation invariance is realized by subtracting the starting angle from 0 i. Then, we get a sequence of angles (0i - 01) which is independent of rotation. The effect of size variance of signatures is eliminated by normalization. Each signature is uniformly divided into K number of segments. The length of the segments are slightly different from each other due to the length difference in tablet quantization vectors. The n u m b e r K is the observation length of signatures for use in HMMs. The normalized angle of a segment, denoted as q~(k), k = 1, 2 . . . . . K, is derived as follows. Assume segment k consists of n samples provided by the tablet and the distance between the samples is st(I = i + 1..... i + n). L. YANGet al. 164 "~__0_I÷1 Fig. 2. Encoding of a signature. The angle ~b(k)of this segment is given by: (k)=arctan| -- _--|. L,Y+, s,,,,ooso,,,,_j (10) The normalized angle is then quantized into 16 levels as: q~*(k) = Q[q~(k)], k = 1,2 .... K. (11) The simple quantization scheme has been justified by Veltman and Prasad. (9) Each of the 16 levels is represented by a symbol called a pen-down symbol. The pen-ups within a signature are eliminated by linear interpolation. Those pen-ups are detected using a threshold. When the distance between two consecutive points exceeds the threshold, pen-up is assumed. The threshold is selected as the possible largest distance between any two consecutive sample points captured by the tablet. To distinguish the interpolated trace from the ordinal trace, another 16 symbols have been introduced, called pen-up symbols. The pen-up symbols have exactly the same values as the pen-down symbols, but with different token. Thus, a signature is described by a sequence of observation (~b*(k)) of length K, each of which is one of the 32 symbols. Figure 3 presents some examples of quantized signatures applying different number of symbols. In the case of using merely pen-down symbols, the interpolated portion of the trace between pen-ups is treated as ordinary part of the signature and, therefore, a signature becomes one continuous trajectory. However, when pen-down symbols and pen-up symbols are used combined, the pen-up part is recorded by the pen-up symbols. Figure 3(a) is the original signature captured by a tablet. In Fig. 3(b)-(d), the signatures described using 16 pen-down and 16 pen-up symbols, 8 pen-doWn and pen-up symbols and 4 pen-down and 4 pen-up symbols are presented, respectively. Figure 3(e)-(g) show the quantized signatures applying 32 pen-down symbols, 16 pen-down symbols and 8 pendown symbols, respectively. It can be seen that the signature is greatly distorted when too few number of symbols are used. The distortion is in an accumulative fashion and it will directly influence the performance of the method. It is also seen that the distortion is more severe in the case of using pen-down plus pen-up symbols than pen-down symbols only for the same total number of symbols is used. This is obvious because the former situation actually uses half of the total symbols in quantization. In our primary research, we have observed that using pen-up symbols can improve the performance of the method in certain circumstance. It means that the introduction of pen-up symbols compensates the effect of distortion to certain extent. More discussion on this issue can be found in Section 4. The increase of number of symbols will greatly increase the time needed for model training. If the number is chosen too large, the time used in model training may become impractical. Therefore, a certain compromise between the degree of distortion allowed and the time cost for model training needs to be made in deciding the number of symbols to use. 3.2. Signature verification The proposed signature verification system works as follows. The signers sign their names with a pen on a tablet that captures the information of signatures. Based on a number of sample signatures of a signer, a H M M is trained applying equations (4)-(6) or (8)-(9). The derived model is used as the important and unique feature of the signatures and it is stored as the reference of that signer. The average probability (or mean) of the Application of Hidden Markov Models 165 (a) (b) (e) (e) (0 i i.a--1 i I --..., ---, (d) (g) Fig. 3. (a) Original signature; the signature quantized using: (b) 16, (c) 8, and (d) 4 pen-down and pen-up symbols. (e) 32, (f) 16, and (g) 8 pen-down symbols. training signatures being generated by the model, denoted a s / 5 is also stored. Whenever someone claims to be a particular person and writes his signature on the tablet, the system retrieves the reference of the claimed signer and calculate the probability (P,) that the signature is generated by the particular model. A decision is made on whether the signature is authentic or forged using a threshold do. If P, is below the threshold the signature is rejected as a forgery. There are generally two types of error which may occur in the signature verification process: false rejection (FR), the error which arises when an authentic signature is rejected; false acceptance (FA), the error for accepting a forgery. The level of the two error rates are dependent on the threshold chosen. In this paper, d o is chosen to be dependent on /5 obtained using the training signatures as: do . . . . . . . . , = 6. fi, ........ ~, (12) where the factor 6 is determined in experiments. The value of 6 is dependent on the deviation of P, from its mean/5. For each signer, 6 can be determined accor- ding to the probability deviation behaviour. Figure 4 plots the mean and deviation of - l o g ( P , ) of both genuine and forgery signatures of the training signatures of 31 signers in the database used in our experiments (only simple forgery was considered, see Section 4 for more information on the experiment considerations). In Fig. 4, the points marked with • and [] are the mean and standard deviation of genuine signatures of all the signers, respectively, while the points marked with • and O are the mean and standard deviation of forgeries, respectively. It can be observed that for most of the signers, the differences between the mean probabilities of genuine signatures and forgeries are fairly large. On the other hand, the standard deviations of probabilities of genuine signatures of all signers are relatively very small and more or less consistent. Based on these observations, we decided to use an uniformed 6 in our system in order to simplify the problem. According to our experimental results, a 6-state left-to-right H M M shows a relation between 6 and error rates as in Fig. 5. It is reasonable to chose 6 to be 0.85 where FR and FA equals. But, it 166 L. YANG et al. ~-., 14oo • . *, I, "6 l=oo C ", i >e looo ,' o' 2 ~..<~ '10 C ¢g t= ¢U i-., ', / ID 1=o ,, ," ..9".~ i ' ta i .~. .,¢' .~ '.~, ~,. . . .~.. ~ ~..~ . ~ ~t~,; \ ' t i . . . . IL~-i' ' ; ~ <;' t (1(30 ti , , oli : e. 6 .:, -i : " . ~ ~- ° .. o • .: . ... ~ ! l-."J,= ~ I ",..7 <c. %' t7 i • :E 4OO • i ' 2 i 4 ' i 6 ' ] 8 i \ r I 10 ' I 12 ' I 14 ' I 16 ' I 18 ' I 20 ' I 22 ' I 24 ' I 26 ' I ' 28 F ' 30 Signer No. Fig. 4. Mean (11) and standard deviation ([]) of -1og(Pr) of genuine signatures of each signer; mean ( e ) and standard deviation (O) of - log(Pr) of forgeries. 100 ~(~) gO 70 "\ File R i g O r / eO 50 40 30 20 10 0 0.~ ci.4 o.5 o.e 0.7 0.8 0.9 1 1.1 12 1.3 Fig. 5. Error rates vs threshold of a 6-state left-to-right HMM. is expected that if more elaborate 6 is selected for each signer, the performance should be improved, to a certain extent. Further, we observed in the experiments that the mean and standard deviation of P,(thus the choice of 6) is influenced by the number of signatures used in training when the number of training signatures used is too small, say 4. If the training is based on sufficient number of signatures (above 7), the influence becomes hardly observable. 4. IMPLEMENTATION AND EXPERIMENTAL RESULTS An experimental system using H M M s for signature verification was implemented on a personal computer (486 DX2 33MHz processor) connected with a graphic tablet (DSD 703 Digitizer, electromagnetic). The tablet captures the trajectory of handwriting in spatial sampling fashion and provides the x - y coordinates of the samples. The tablet has an effective working area of 19 cm x 14cm with resolution of 2100 x 1536 points. The maximal data transmission rate to the computer is 4800 coordinate pairs per second. The recognition software system is implemented in PASCAL. The experiments were carried out based on a data base containing 496 signatures of 31 signers. Each of the signers was asked to write his/her signature 16 times of which 8 times were used for model training and the other 8 times for verification test. For each signer, a H M M was generated based on his/her training signatures and the model training was done off-line. To evaluate the performance of the system the authentic signatures of each signer and the other signatures of the remaining 30 signers which were considered as forgeries were tested over each corresponding model. The overall average error rate of false rejection and false acceptance were evaluated. First, several model structures were investigated in order to obtain the most suitable model for the problem. The models chosen are listed as following and also shown in Fig. 6: Application of Hidden Markov Models 167 (a) (d) (b) (e) (¢) Fig. 6. Different model structure: (a) LTR-1; (b) LTR-2; (c) LTR-3; (d) parallel; (e) generalized. (a) LTR- 1: only left-to-right transitions are allowed. (b) LTR-2: only left-to-right transitions and single skips of states are allowed. (c) LTR-3: only left-to-right transitions and no skips of states are allowed. (d) Parallel: only left-to-right transitions are allowed in which some states are parallel to each other. (e) Generalized: transitions from any states to any other states wilt be possible. In the experiments, the number of states used is 6 and the observation length is 300. The overall false acceptance and false rejection error rates were measured for the test signatures. The results are shown in Table 1. It is clear that the constrained models performed better than the generalized model. Among the constrained models, it is observed that the LTR-1 model gives the best performance. There is a clear trend that the leftto-right model with less restriction gives better performance than those with more restriction. This implies that the increase of freedom in the restricted model may allow more inherent variance in the signatures of a signer and at the same time can still reasonably model the unique characteristics of a signer and, however, too much freedom in the model may increase the probability of accepting false signatures. The reason that left-to-right model gives better performance than the generalized model may be that the left-to-right model captures the dynamic characteristics of signing in a better way. Left-to-right models inherently impose a temporal order to the HMM since lower numbered states corresponds to observations occurring prior to those to higher numbered states. The progressive nature of the states sequence reflects a certain dynamic characteristics. We chose LTR-1 model structure for our further experiments. The performance under different number of states was also evaluated. With the number of states varying from 2 to 9, we obtain the results shown in Fig. 7, setting the observation length at 300. In spite of a statistic fluctuation, a slow steadily improvement of performance is observed as the number of states increases. However, the increase of the number of states does not show significant influence on the performance when certain number of states is reached. It is shown that the selection of 6 states in the model is reasonable. Table 1. Error rates of different models. Type of error rates (%) Model structure LTR-1 LTR-2 LTR-3 Parallel Generalized False acceptance 6.45 8.47 False rejection 1.18 11.69 1.41 2.54 0.78 5.24 14.11 1.87 Average 3.815 5.17 6.55 3.89 7.445 168 L. YANG et al. Increasing the number of states will greatly increase the time needed to train a model. The experimental results showed that the performance of the model is deteriorated using too small number of states, i.e. less than 4. It is expected that a greater number of states should be used with greater observation length in a model. Investigation on performance with different observation lengths was carried out by varying the observation length from 100 to 500, while the number of states was chosen as 6. The experimental results are shown in Fig. 8. It is observed that at very low observation length, say 100, the performance is very poor. This is because that too short an observation length will lead to very rough description of a signature and, consequently, the inaccuracy in the signatures resulted in a large false acceptance of signatures. As the observation length increases, more details of signatures are captured. 10 As shown in the figure, it is suitable to choose the observation length to be 300. Larger numbers of observations may slightly improve the performance. However from time consumption point of view in model training, the gain may not be worth. As the number of observation length increases, the time used for a model training is increased tremendously. It is observed that at higher observation length, the error rates may even increase. This may be due to the fact we mentioned earlier that for a greater observation length the model should incorporate with a greater number of states. However, an optimal solution to observation length is to adapt observation length according to the length of signatures and at the same time eliminate the influence of size variation. In general, it is reasonable that for short signatures a smaller observation length can be used than that for long signatures. To determine the length of observation for each signature class indi- Error rates ( % ) 9 / 8 j J t / f F ~ s e /.m:xx~tm'me / t/1 7 . \ 6 5 4 3 r~ectlon 2 1 0 6 a S ,i e 7 S 0 N u m b e r of s l a t e s Fig. 7. Error rates vs number of states. 18 Error rates ( % ) 16 14 '\ \ \ \ 12 \ \ \ \ 10 8 \ \ \ \~ False acceptance 6 \ 4 False rejection 2 0 1OO 150 200 250 300 350 400 4,50 500 Observation length Fig. 8. Error rates vs observation length. Application of Hidden Markov Models 169 Table 2. Error rates with different number of symbols. Total symbols 32 32 16 16 8 8 4 4 Number of symbols Pen-down symbols Pen-up symbols 32 16 16 8 8 4 4 2 -16 -8 -4 -2 vidually, an appropriate solution is to chose the observation length in experiments according to the performance of signature verification. To find an optimal value for each signature class requires tremendous time. In our future research, an adaptive observation length will be considered and the results will be reported in the near future. Section 3.1 has shown that the number of symbols used has great impact on the way signatures are described. It is very useful to see how it influences the performance of signature verification. The performance applying the number of symbols of 4, 8, 16 and 32 were evaluated both in the cases of using only pen-down symbols and pen-down plus pen-up symbols. When pen-down and pen-up symbols are used combined, it means that half of the indicated number of symbols are pen-down symbols and half of it are pen-up symbols. Table 2 presents the results obtained in our experiments. It is shown that the introduction of pen-up symbols indeed improves the performance when the distortion introduced is not too large. As the number of symbols decreases, the performance became deteriorated in both cases and, especially, the advantage of using pen-up symbols is diminished. It can be seen that the performance may even become worse using pen-down plus pen-up symbols than using only pen-down symbols at some point. As shown in Section 3.1, when too few number of symbols is used, signatures are severely distorted resulting in poor performance. 5. CONCLUSIONS We have presented in this paper a method for online signature verification applying HMM technique. The signature features are taken as the normalized angular direction as the function of the distance from the starting point of the signature. The experimental results show good signature verification performance against substitution forgery. The overall error rates of 1.75~o and 4.44~ofor false rejection and false acceptance, respectively, were observed. Generally speaking, leftto-right HMMs capture the information of signing better than other model structures. The selection of the number of states, number of symbols and observation length is made with compromise between performance and time cost in model training. The use of pen-up Error rates (~) False acceptance False rejection 7.55 4.44 8.1 4.26 16.01 16.43 36.02 38.91 1.21 1.75 1.04 4.03 1.21 3.23 3.23 4.44 symbols improves the performance to a certain extent. When the number of symbols chosen decreases, the improvement is diminished. At some point, the performance is even worse. The performance may be further improved using some better discrimination method instead of a simple uniform threshold. Our further attention will be focused on the system given satisfactory performance against skilled forgery by combining dynamic information of signature, i.e. pressure, velocity and/or acceleration, etc., in the verification system. REFERENCES 1. J.C. Arnbak, J. H. Bons and J. W. Vieveen, Graphical correspondence in electronic-mail networks using personal computers, IEEE Selected Areas in Commun. 7(2), 257-267 (1989). 2. R. Plamondon and G. Lorette, Automatic signature verification and writer identification--the state of the art, Pattern Recognition 22(2), 107-131 (1989). 3. M. Parizeau and R. Plamondon, A comparative analysis of regional correlation, dynamic time warping, and skeletal tree matching for signature verification,IEEE Trans. PAMI 12(7), 710-717 (1990). 4. C. F. Lam and D. Kamins, Signature verificationthrough spectral analysis,Pattern Recognition 22(1),39-44 (1989). 5. H. Chang, J. Wang and H. Suen, Dynamic handwritten Chinese signature verification, Proc. 2nt Int. Conf. on Document Analysis and Recognition pp. 258-261, Tsukuba, Japan (October 1993). 6. G. Lorette, On-line handwritten signature recognition based on data analysis and clustering,Proc. 7th Int. Conf. Pattern Recognition 2, 1284-1287 (1984). 7. S. E. Levinson, L. R. Rabiner and M. M. Sondhi, On the application of vector quantization and hidden Markov models to speaker-independent,isolated word recognition, Bell Syst. Tech. Jnl. 62, 1075-1105 (1983). 8. A. Kundu, Y. He and P. Bahl, Recognition of handwritten word: first and second order hidden Markov model based approach, Pattern Recognition 22(3), 283-297 (1989). 9. S. R. Veltman and R. Prasad, Hidden Markov models applied to on-line handwritten isolated character recognition, IEEE Trans. on Image Processing 3(3), 314 318 (1994). 10. L. Yang, B. K. Widjaja and R. prasad, On-line signature verification applying hidden Markov models, Proc. 8th Scandinavian Conf. on Image Analysis pp. 1311-1316, Tromso, Norway (1993). 11. S. E. Levinson, L.R. Rabiner and M. M. Sondhi, An introduction to the application of the theory of probabilistic Functions of a Markov process to automatic speech recognition, Bell Syst. Tech. J. 62, 1035-1074 (1983). 170 L. YANG et al. About the Author--LIPING YANG received the B.S. degree in electrical engineering from Hunan University, P.R. China, in 1982. She started graduate studies in electrical engineering at Delft University of Technology, The Netherlands, in 1990. She is currently a Research Assistant in this university and working towards her Ph.D. degree. Her current research interests include analysis and recognition of handwriting, signature verification, image processing and multi-media communications. About the Author--MICHAEL B. K. WIDJAJA was born in The Hague, The Netherlands on 19 June 1970. He received the M.Sc.E.E. degree from Delft University of Technology, The Netherlands. He has done research on signature verification applying Hidden Markov Models. His interests are in signal processing, pattern recognition and communication systems. About the Author--RAMJEE PRASAD, since February 1988, has been with the Telecommunications and Traffic Control Systems Group, Delft University of Technology, The Netherlands, where he is actively involved in the area of personal radio and multi-media communications. He has published over 150 technical papers. Prof. Prasad is listed in the U.S. Who's Who in the world. He was organizer and Interim Chairman of IEEE Vehicle Technology/Communications Society Chapter, Benelux Section. Now he is elected chairman of the joint chapter. He is also founder of the IEEE Symposium on Communications Vehicle Technology (SCVT) in the Benelux and he was the Symposium chairman of SCVT'93. He is one of the Editor-in Chief of a new journal on "Wireless Personal Communications" and also a member of the editorial board of the other international journals including IEEE Communication Magazine. He is the technical Program Chairman of PIMRC'94 International Symposium to be held in The Hague, The Netherlands during 19-23 September 1994 and also of the Third Communication Theory Mini-Conference in conjunction with GLOBECOM'94 to be held in San Francisco, California during 27-30 November 1994. He is a Fellow of IEE, a Fellow of the Institute of Electronics & Telecommunication Engineers, a Senior Member of IEEE and a Member of the New York Academy of Science and of NERG (The Netherlands Electronics and Radio Society).