Skip to main content
Erschienen in: Soft Computing 9/2019

30.11.2017 | Methodologies and Application

Enhanced quantum-based neural network learning and its application to signature verification

verfasst von: Om Prakash Patel, Aruna Tiwari, Rishabh Chaudhary, Sai Vidyaranya Nuthalapati, Neha Bharill, Mukesh Prasad, Farookh Khadeer Hussain, Omar Khadeer Hussain

Erschienen in: Soft Computing | Ausgabe 9/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this paper, an enhanced quantum-based neural network learning algorithm (EQNN-S) which constructs a neural network architecture using the quantum computing concept is proposed for signature verification. The quantum computing concept is used to decide the connection weights and threshold of neurons. A boundary threshold parameter is introduced to optimally determine the neuron threshold. This parameter uses min, max function to decide threshold, which assists efficient learning. A manually prepared signature dataset is used to test the performance of the proposed algorithm. To uniquely identify the signature, several novel features are selected such as the number of loops present in the signature, the boundary calculation, the number of vertical and horizontal dense patches, and the angle measurement. A total of 45 features are extracted from each signature. The performance of the proposed algorithm is evaluated by rigorous training and testing with these signatures using partitions of 60–40 and 70–30%, and a tenfold cross-validation. To compare the results derived from the proposed quantum neural network, the same dataset is tested on support vector machine, multilayer perceptron, back propagation neural network, and Naive Bayes. The performance of the proposed algorithm is found better when compared with the above methods, and the results verify the effectiveness of the proposed algorithm.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Bajaj R, Chaudhury S (1997) Signature verification using multiple neural classifiers. Pattern Recognit 30(1):1–7CrossRef Bajaj R, Chaudhury S (1997) Signature verification using multiple neural classifiers. Pattern Recognit 30(1):1–7CrossRef
Zurück zum Zitat Bhattacharya I, Ghosh P, Biswas S (2013) Offline signature verification using pixel matching technique. Procedia Technol 30:970–977CrossRef Bhattacharya I, Ghosh P, Biswas S (2013) Offline signature verification using pixel matching technique. Procedia Technol 30:970–977CrossRef
Zurück zum Zitat Buryne PD, Forre R (1986) Signature verification with elastic image matching. In: International Carnahan conference on security technology Gothenburg, Sweden, August. IEEE, pp 12–14 Buryne PD, Forre R (1986) Signature verification with elastic image matching. In: International Carnahan conference on security technology Gothenburg, Sweden, August. IEEE, pp 12–14
Zurück zum Zitat Chan L-H, Salleh S-H, Ting C-M (2009) PCA, LDA and neural network for face identification. In: 4th IEEE conference on industrial electronics and applications, Xian, China, IEEE, pp 1256–1259 Chan L-H, Salleh S-H, Ting C-M (2009) PCA, LDA and neural network for face identification. In: 4th IEEE conference on industrial electronics and applications, Xian, China, IEEE, pp 1256–1259
Zurück zum Zitat Dimauro G, Impedovo S, Pirlo G, Salzo A (1997) A multi-expert signature verification system for bankcheck processing. IJPRAI 11(5):827–844 Dimauro G, Impedovo S, Pirlo G, Salzo A (1997) A multi-expert signature verification system for bankcheck processing. IJPRAI 11(5):827–844
Zurück zum Zitat Ferrer M, Vargas J, Morales A, Ordonez A (2012) Robustness of offline signature verification based on gray level features. IEEE Trans Inf Forensics Secur 7(3):966–977CrossRef Ferrer M, Vargas J, Morales A, Ordonez A (2012) Robustness of offline signature verification based on gray level features. IEEE Trans Inf Forensics Secur 7(3):966–977CrossRef
Zurück zum Zitat Gupta AK, Singh YP (2011) Analysis of bidirectional associative memory of neural network method in the string recognition. In: International conference on computational intelligence and communication networks (CICN), Gwalior, India, 2011. IEEE, pp 172–176 Gupta AK, Singh YP (2011) Analysis of bidirectional associative memory of neural network method in the string recognition. In: International conference on computational intelligence and communication networks (CICN), Gwalior, India, 2011. IEEE, pp 172–176
Zurück zum Zitat Han K-H, Kim J-H (2002) Quantum-inspired evolutionary algorithm for a class of combinatorial optimization. IEEE Trans Evol Comput 6(6):580–593CrossRef Han K-H, Kim J-H (2002) Quantum-inspired evolutionary algorithm for a class of combinatorial optimization. IEEE Trans Evol Comput 6(6):580–593CrossRef
Zurück zum Zitat Kruthi C, Shet DC (2014) Offline signature verification using support vector machine. In: Fifth international conference on signal and image processing (ICSIP), Bangalore, India, 2014. IEEE, pp 3–8 Kruthi C, Shet DC (2014) Offline signature verification using support vector machine. In: Fifth international conference on signal and image processing (ICSIP), Bangalore, India, 2014. IEEE, pp 3–8
Zurück zum Zitat Kuzuno H, Tonami S (2015) Detection of sensitive information leakage in Android applications using signature generation. Int J Space Based Situated Comput 5(1):53–62CrossRef Kuzuno H, Tonami S (2015) Detection of sensitive information leakage in Android applications using signature generation. Int J Space Based Situated Comput 5(1):53–62CrossRef
Zurück zum Zitat Lu T-C, Yu G-R, Juang J-C (2013) Quantum-based algorithm for optimizing artificial neural networks. IEEE Trans Neural Netw Learn Syst 24(8):1266–1278CrossRef Lu T-C, Yu G-R, Juang J-C (2013) Quantum-based algorithm for optimizing artificial neural networks. IEEE Trans Neural Netw Learn Syst 24(8):1266–1278CrossRef
Zurück zum Zitat Nakamura S, Duolikun D, Enokido T, Takizawa M (2016) A read-write abortion protocol to prevent illegal information flow in role-based access control systems. Int J Space Based Situated Comput 6(1):43–53CrossRef Nakamura S, Duolikun D, Enokido T, Takizawa M (2016) A read-write abortion protocol to prevent illegal information flow in role-based access control systems. Int J Space Based Situated Comput 6(1):43–53CrossRef
Zurück zum Zitat Pansare A, Bhatia S (2012) Handwritten signature verification using neural network. Int J Appl Inf Syst 1(2):44–49 Pansare A, Bhatia S (2012) Handwritten signature verification using neural network. Int J Appl Inf Syst 1(2):44–49
Zurück zum Zitat Patel OP, Tiwari A (2014) Quantum inspired binary neural network algorithm. In: International conference on information technology (ICIT), Bhubaneswar, India, 2014. IEEE, pp 270–274 Patel OP, Tiwari A (2014) Quantum inspired binary neural network algorithm. In: International conference on information technology (ICIT), Bhubaneswar, India, 2014. IEEE, pp 270–274
Zurück zum Zitat Qi Y, Hunt BR (1994) Signature verification using global and grid features. Pattern Recognit 27(12):1621–1629CrossRef Qi Y, Hunt BR (1994) Signature verification using global and grid features. Pattern Recognit 27(12):1621–1629CrossRef
Zurück zum Zitat Qiu L, Sun X, Xu J (2017) Categorical quantum cryptography for access control in cloud computing. Soft Comput: 1–8 Qiu L, Sun X, Xu J (2017) Categorical quantum cryptography for access control in cloud computing. Soft Comput: 1–8
Zurück zum Zitat Ren Y, Wang H, Du J, Ma L (2016) Code-based authentication with designated verifier. Int J Grid Util Comput 7(1):61–67CrossRef Ren Y, Wang H, Du J, Ma L (2016) Code-based authentication with designated verifier. Int J Grid Util Comput 7(1):61–67CrossRef
Zurück zum Zitat Sanmorino A, Yazid S (2012) A survey for handwritten signature verification. In: 2nd International conference on uncertainty reasoning and knowledge engineering (URKE), Jakarta, Indonesia, 2012. IEEE, pp 54–57 Sanmorino A, Yazid S (2012) A survey for handwritten signature verification. In: 2nd International conference on uncertainty reasoning and knowledge engineering (URKE), Jakarta, Indonesia, 2012. IEEE, pp 54–57
Zurück zum Zitat Sarikaya R, Hinton GE, Deoras A (2014) Application of deep belief networks for natural language understanding. IEEE/ACM Trans Audio Speech Lang Process 22(4):778–784CrossRef Sarikaya R, Hinton GE, Deoras A (2014) Application of deep belief networks for natural language understanding. IEEE/ACM Trans Audio Speech Lang Process 22(4):778–784CrossRef
Zurück zum Zitat Sartakhti JS, Afrabandpey H, Saraee M (2017) Simulated annealing least squares twin support vector machine (SA-LSTSVM) for pattern classification. Soft Comput 21(15):4361–4373CrossRef Sartakhti JS, Afrabandpey H, Saraee M (2017) Simulated annealing least squares twin support vector machine (SA-LSTSVM) for pattern classification. Soft Comput 21(15):4361–4373CrossRef
Zurück zum Zitat Shanker AP, Rajagopalan A (2007) Off-line signature verification using DTW. Pattern Recognit Lett 28(12):1407–1414CrossRef Shanker AP, Rajagopalan A (2007) Off-line signature verification using DTW. Pattern Recognit Lett 28(12):1407–1414CrossRef
Zurück zum Zitat Sun X, Tian H, Wang Y, Ren Y (2014) Toward quantum-resistant strong designated verifier signature. Int J Grid Util Comput 5(2):80–86CrossRef Sun X, Tian H, Wang Y, Ren Y (2014) Toward quantum-resistant strong designated verifier signature. Int J Grid Util Comput 5(2):80–86CrossRef
Zurück zum Zitat Wang T, Wang Y (2010) Pattern classification with ordered features using mrmr and neural networks. In: International conference on information, networking and automation, ICINA 2010, Kunming, China, 2010, pp 2128–2131 Wang T, Wang Y (2010) Pattern classification with ordered features using mrmr and neural networks. In: International conference on information, networking and automation, ICINA 2010, Kunming, China, 2010, pp 2128–2131
Zurück zum Zitat Wang Y, Ma J, Lu X, Lu D, Zhang L (2016) Efficiency optimisation signature scheme for time-critical multicast data origin authentication. Int J Grid Util Comput 7(1):1–11CrossRef Wang Y, Ma J, Lu X, Lu D, Zhang L (2016) Efficiency optimisation signature scheme for time-critical multicast data origin authentication. Int J Grid Util Comput 7(1):1–11CrossRef
Zurück zum Zitat Wilkinson TS, Pender DA, Goodman JW (1991) Use of synthetic discriminant functions for handwritten-signature verification. Appl Opt 30(23):3345–3353CrossRef Wilkinson TS, Pender DA, Goodman JW (1991) Use of synthetic discriminant functions for handwritten-signature verification. Appl Opt 30(23):3345–3353CrossRef
Metadaten
Titel
Enhanced quantum-based neural network learning and its application to signature verification
verfasst von
Om Prakash Patel
Aruna Tiwari
Rishabh Chaudhary
Sai Vidyaranya Nuthalapati
Neha Bharill
Mukesh Prasad
Farookh Khadeer Hussain
Omar Khadeer Hussain
Publikationsdatum
30.11.2017
Verlag
Springer Berlin Heidelberg
Erschienen in
Soft Computing / Ausgabe 9/2019
Print ISSN: 1432-7643
Elektronische ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-017-2954-3

Weitere Artikel der Ausgabe 9/2019

Soft Computing 9/2019 Zur Ausgabe

Premium Partner