Chapter 45
Chapter 45
Chapter 45
Result
5 real signatures and 20 fake signatures are used in the experiment, with 5 real
signatures serving as the reference signatures.
Here are some potential results and findings of a signature verification and detection
process using Siamese Networks.
Accuracy: Siamese networks have been shown to achieve high accuracy rates in
signature verification tasks. The specific accuracy achieved will depend on the
quality and size of the dataset used for training and validation. Accuracy: The
percentage of accurately classified data samples over all the data is known as
accuracy. Accuracy can be calculated by the following equation. [43]
Accuracy = (TP+TN)/(TP+FP+TN+FN)
Speed: Siamese networks can be relatively fast for signature verification, as they
only need to compare pairs of signatures rather than analyzing entire signature
images. However, the speed may be impacted by the size and complexity of the
Siamese network architecture.
Potential for bias: Siamese networks may be susceptible to bias if the training data
is not diverse enough. For example, if the training data is heavily skewed towards
1
signatures from one demographic, the system may not perform as well on signatures
from other demographics.
We have gained the verified signature by applying the above algorithms. In this
output, our project shows a message like “Signature is verified” if the signature
image of user is matched with the image that was stored on the database. Besides
the verified message we have also gained the identification information of the user
like User’s name, Age and email address.
2
Fig 6.2: Unverified Signature Image
When the user’s signature doesn’t match with the signature stored on the database
then the project shows a message that is “Signature is not verified”.
Discussion
Throughout the last thirty years, numerous approaches for verifying signatures
have been proposed. The two methods utilized to extract the pertinent data/features
from the signatures are global features based and local features. These
characteristics are covered. The system must be tested using the available 5
authentic and 20 fake signatures during implementation to obtain the performance
curves. Testing with each test signature and storing the score values took hours.
3
This grew to be a serious issue. Hence, a Deep Learning is built with all of the test
signatures to tackle this problem. Once created, it was simple to compute the
performance curves by just clicking the run button.
4
Chapter 5
Conclusion
5
Future work