Handwriting identification and verification using artificial intelligence-assisted textural features

Intelligent process control and automation systems require verification authentication through digital or handwritten signatures. Digital copies of handwritten signatures have different pixel intensities and spatial variations due to the factors of the surface, writing object, etc. On the verge of this fluctuating drawback for control systems, this manuscript introduces a Spatial Variation-dependent Verification (SVV) scheme using textural features (TF). The handwritten and digital signatures are first verified for their pixel intensities for identification point detection. This identification point varies with the signature’s pattern, region, and texture. The identified point is spatially mapped with the digital signature for verifying the textural feature matching. The textural features are extracted between two successive identification points to prevent cumulative false positives. A convolution neural network aids this process for layered analysis. The first layer is responsible for generating new identification points, and the second layer is responsible for selecting the maximum matching feature for varying intensity. This is non-recurrent for the different textures exhibited as the false factor cuts down the iterated verification. Therefore, the maximum matching features are used for verifying the signatures without high false positives. The proposed scheme’s performance is verified using accuracy, precision, texture detection, false positives, and verification time.

overall efficiency of 93.4% of the learning process for forensic students.However, some characteristics remained problematic to forge.(e.g., loops or angles and commencements or terminations).
Houtinezhad et al. 30 developed a feature extraction fusion (FEF) based writer-independent signature verification method.Canonical correlation analysis (CCA) is used here to analyze the discriminative features presented in a signature.The proposed method enhances the performance and reliability of systems by increasing accuracy by 86% in the verification process.Limitations include relying on a single reported visual representation and lacking further data for authentic and forged signatures.
Zhou et al. 31 proposed the Dual-Fuzzy (DF-CNN) for handwritten image recognition.This study shows the calculation process, including estimates for forward propagation, backward propagation, and changing parameters.The DF-CNN's optimization method is given so that its best results can be found.The DF-CNN and its optimization method are used to solve a real problem: recognizing writing numbers.The calculation process and the comparison show that the suggested new model and method are both feasible and beneficial.However, the sample images used in this study are small in numbers.
Ponce-Hernandez et al. 32 suggested the Fuzzy Vault Scheme Based on Fixed-Length Templates for Dynamic Signature Verification.Fifteen global parts of the signature are used to make the models.The success of the suggested system is measured using three databases: a private collection of signatures and the public databases MCYT and BioSecure.The testing results show that the evaluation performance is higher than existing models.The high time inefficiency of this technique arises from the fact that it must assess several candidates' polynomials for each authentication attempt.
Abdul-Haleem 33 created an offline signature verification system that utilized a combination of local ridge characteristics and additional features derived by using the two-level Haar wavelet transformation.Each wavelet sub-band image is divided into overlapping blocks, local characteristics and wavelet energies retrieved from each block.For verification, the system's FRR was 0.025% and its FAR was 0.03%.The varying choices of block lengths and overlapping ratios have a significant impact on the recognition rate.
According to the various researcher's, handwriting is recognized by applying various neural networks and machine learning techniques.These techniques consume high computation time and face difficulties while identifying the different writing styles.Some methods require substantial data, challenges with dimensionality reduction or the need for optimal wavelet selection as listed in Table 1.Among all the literatures reviewed above the three existing methods such as SV-SNN 21 , AVN 16 , and SVSV 28 are enclosed for comparison purpose.The research difficulties are overcome by applying the spatial variation-dependent verification scheme.

Proposed spatial variation-dependent verification (SVV) scheme
Problem statement A person's handwriting evolves and changes, making it a behavioral biometric.It requires cooperation between the brain's motor effectors (the hands) and the body's sensory organs (the eyes).The coordination of these systems enables humans to create intricate ink patterns and sequences.To create reliable writer identification This study proposes a SVV scheme using TF.First, the pixel intensities used to identify identification points in handwritten and digital signatures are checked for accuracy.This distinguishing feature varies depending on the signature's design, location, and texture.To confirm the matching of textural features, the selected spot is digitally signed and placed on a spatial map.The derived textural characteristics are used between two consecutive identification locations to avoid accumulating false positives.A CNN aids this layered analytical method.The first layer produces New Identification, while the second layer chooses the most optimal matching feature for intensity changes.The proposed SVV scheme defines the Identification and verification of handwriting signatures to ensure better textural feature extraction in centralized intelligent process control systems.The handwritten texts generally contain a unique writing style for each individual.Distribution of these handwritten signatures is used for defining writing style.The influencing textural features, such as pixel intensities and spatial variations, are detected by handwriting verification synchronized for identifying the writer's sex and writing style.It ensures the handwritten and digital signatures for identification point detection.In a heterogeneous environment, the handwritten image H image is serving input through the device for recognition and verification, for writer identity Wr .Figure 1 presents the proposed scheme's process.
The texture detection is modeled for the feature-matching process and the handwritten signatures are verified for heterogeneous writers in that the control system consists of female F , male M, and other genders O .The handwritten and digital signatures are verified using two successive identification points based on a convolutional neural network.Identification points are distinguishing characteristics of an individual's handwriting signatures.They are essential for validating and identifying between different authors.Detecting these different signals ensures signature verification accuracy and precision.Matching identifying points reduces FP , which contributes to more reliable findings.
Let P represent the process control system consisting of K H image handwritten signatures in the available control system for handwriting verification the input device in d generates a handwritten signature is expressed as: Equation (1) computes SV (.) as the spatial variations, varying pixel intensities, VT is the time for verify- ing the handwritten signature with input devices as per Eq. ( 2).The variable T g is the handwritten or digital signature generation time, T i is the overall time for identifying handwriting and T m is the identification point and feature matching time. (1) . www.nature.com/scientificreports/N < H image is to satisfy all the digital and handwritten signatures from the input device verified at any time VT .This authentication controls the anonymous changes the hacker or any other person performs during the confidential process.The authentication process is a security featurre that ensures the reliability of the network and the information that is being processed by allowing only authorised and legitimate changes while detecting and mitigating unauthorised or malicious changes.This is extremely crucial in systems that use AI to maintain process correctness and reliability.The spatial variation estimation process is illustrated in Fig. 2.
The input is first segregated along x and y∀ ∈ O 1 to O N occurs for T g alone ∈ P provided is high/low, depending on the observed T g .F 1 to F N is validated for extracting the variations and the spatial lookups match the input with the stored ones.Consider the approximate total of n = 2500 for the special textural feature of letters.For the digital copies of handwritten signatures using identification points, as in Eq. ( 3): Equation ( 4), idf p (x) denotes identification point's detection in a CNN for generating new: Equation ( 5), α i means stored digital signature, x i means extracted features, and FP means false positive: Equation (6) shows, b i = a(x i = 1/Wr 1 ) indicates the ith textural feature computation with a probability of a male writer b i = {0, 1} ; a i = b(x i = 1/Wr 2 ) is the ith textural feature computation with a probability of a female writer a i = {0, 1} and a i b i = ab(x i = 1/Wr 3 ) indicates the ith textural feature computation with a probability of other gender writers a i b i = {0, 1} .If β represents identifying special characters.The number of features of hand- written text L is the serving inputs to the devices and the identification points in CNN are expressed as in Eq. ( 7): In this first layer, the generating new identification points and their varying features are analyzed using CNN with the already stored digital signature.The CNN process for identification points is presented in Fig. 3.
The input ∀ is validated for a i b i across T i ; conceals T g and T m such that SV (.) is detected.In the SV (.) detec- tion process, x is the key factor for detecting identification points present as (α i + x i ) that causes FP .Therefore, the β from different i instances are validated for preventing FP and generates h(x) output with precise identifica- tion points (Fig. 3).The detection of identification points are eligible to match textural feature with the K H image P depending on the authentication using L as in Eq. ( 8): (2) The writers identify the identification point to verify the textural feature matching, if N < H image then H image N .This process is distinct for the N = H image , N > H image and N < H image conditions, if N < H image is modeled as a layered analysis for identifying handwriting based on verification time is similar for all the writers irrespective of N and VT .In essence, Case 1 and Case 2 are utilized to categorize and address various operating circumstances within the proposed SVV-TF.They aid in the definition of how the system adjusts and manages identification points for proper verification.Case 1 describes a situation in which the number of created identification points equals the count of handwritten signatures.It's a circumstance in which each generated point may be identical using a specific signature, resulting in a simple and effective verification method.Case 2 refers to situations in which the total quantity of computed identification points is smaller compared to the count of handwritten signatures.This situation is further subdivided into scenarios in which the number of points in respect to the total amount of signatures is even or odd.Specific algorithms are used to manage these cases, ensuring reliable verification despite the fact the total quantity of elements and signature differ.
Case 1 The H image count is the same as the no. of generated identification points.Analysis 1 This is the ideal case for all the writers where the efficiency of the generated identification point is not matched K H image P then completely cut down the iterated verification.Here, the first level is responsible for processing and generating new identification points based on N or H image .F F represents the false factor identified by the input device that serves as the root of the second layer.The notion of false factor most likely refers to inaccuracies or erroneous information added throughout the identification as well as verification procedure.The F F denotes situations in which the system wrongly recognizes an individual or fails to identify their identification points.Reduced F F is critical for increasing handwriting recognition system accuracy and dependability.
The output of F F as K H image 1 , K H image 2 , . . .K H image P is assigned to the individual writers.In the textural feature extraction, ∀N = H image , the pursuing writer's handwriting is matched with the already stored signatures in the following manner shown in Eq. ( 9): where δ is the generated point selection based on the writing style of the writer, is identified without false factor and matches its spatial variations and pixel intensities a F F i and b F F i with stored signatures.Case 2 The H image the count is less than the identification point generated (i.e.) N < H image .Analysis 2 The role of digital or handwritten signatures and Identification of the writer makes it reliable for reducing the chances of a security vulnerability without maximizing the computation complexity.Therefore, N < H image such that H image N = even or odd for which the selection point satisfies maximum matching, point selection considering the above cases through the CNN is presented in Fig. 4.
The first layer's input (i.e.) h(1) to h(x) is fed as input for idf p provided the analysis is performed in T m alone.This reduces the actual time required for preventing (N − H) occurrence ∀F f .Therefore with the available and K H image the possibilities of L&δ are validated for (N − H) and F f .In this possibility, δ ∈ a i b i and δ / ∈ a i b i is classified as output.The selection points ∀δ ∈ a i b i are used for confining SV (.) (Fig. 4).In this case = odd/even , after the sequential feature matching waiting for the handwriting signature verification (VR) and then performing system operation.This process is estimated as [(VR − L)/|F f | + 1] and |FP| is the maximum ( 8) Equation (11) indicates the minimum possible computation required for handwritten Identification and verification.In this series, the handwritten signature verification process time as varying by the above condition T g and VT instance.The matching process for signature verification is illustrated in Fig. 5.
The CNN-classified outputs are used for v int differentiation from K H image such that any of V int ⊕ α N achieves P ∈ Idf .Depending on the availability, the even/ odd classification is observed from which a N ⊕ b N is performed.In the above process is the maximum (i.e.) a i b i = 1 , then matching is successful (Fig. 5).In Fig. 6, the analysis of T g and T m , and x i for the varying is presented.
In the proposed scheme the T g and T m demands are variable depending on the β occurrence.If β occurrence is high, then (N − H) becomes invariable such that h(x) increases.Therefore the SV (.) is suppressed under con- trolled CNN layers.Precisely the first layer denies the FP due to a i b i / ∈ 1 and hence T g is restricted then T m .The x i increases with the β for which δ and matching are precise.Based in the available and SV (.) classification, the α i is distributed.The distributions are classified for (N − H) and F f such that either of δ(∈ a i b i or / ∈ a i b i ) is the output.If the output is an FP , then x i increases and therefore, CNN's layer 1 process is repeated.An analysis of FP, a i and b i for the varying h is presented in Fig. 7.
The analysis of FP varies with L as the δ ∈ a i b i > δ / ∈ a i b i .In this process, β are omitted to satisfying a i b i = 1∀a N ⊕ b N = 1 .Therefore as FP increases, the L increases for confining them in consecutive iterations.As the iterations from layer 2 to layer 1 of the CNN are confined (repeated) the a i > b i occurs (randomly), else the variations are less such that a i < b i is the actual output (Refer to Fig. 7).The analysis of SV (.) for varying F f and h is presented in Fig. 8.
The proposed scheme identifies FP∀α i / ∈ {0, 1} such that SV occurs.This is due to the h occurrence, and therefore, new L is required for confining FP .Therefore the considered VT is used for confining SV (.) for L N−H and F f variations.Therefore the considered intervals of T i (without T m ) is used for preventing FP that does not require SV (.) balancing (Fig. 8).( 10) Now, the point selection count is reduced to varying intensity v int where S =

Performance analysis
Imagery data from Ref. 34    range is varied for analysing accuracy, precision, feature detection, false positives, and verification time.In the comparative study, the methods SV-SNN 21 , AVN 16 , and SVSV 28 are enclosed with the proposed SVV-TF scheme.Sample input and output representing the key processes of the above discussion are tabulated in Tables 2 and 3.The signatures that are used for the analysis are from the authors.

Accuracy
In Fig. 9, the term "intensity factor" most likely refers to the varied pixel intensities or brightness levels in a handwriting or digital signature.These changes in the intensity of pixels are inspected and analyzed within the framework of the process of identifying and confirming the handwriting, helping to recognize various textural aspects.The intensity factor may have an effect on the handwriting recognition system's accuracy and precision.The spatial variation in handwritten signatures is identified with P i=1 T g − 1 − T m T i , the pixel intensities of the signature texture and outputs in point selection.

Precision
The variations in pixel intensities are identified for verifying the textural feature matching by performing the precise system operation based on the given handwritten signatures for identifying the difference between the stored digital signature and the current signature.In the first layer, the identification point is detected for recognizing the acute writer, and its writing style is deployed for identifying the spatial variations represented in Fig. 10.Therefore, the first and second levels are analyzed for accurate handwriting verification due to the surface and writing object changes being high precision for verifying the textural feature matching.

Texture detection
The textural features are analyzed and matched to improve handwriting signature quality for precise Identification; in this scheme, we detect the spatial variations and different pixel intensities based on the identification  point illustrated in Fig. 11.Such that N < H image is to satisfy all the digital and handwritten signatures from the input device that can be verified at any time VT, and a false positive occurs due to identifying spatial variations and pixel intensities in the pursuing signature.

False positives
This proposed scheme detects the variations in pixel intensities using the textural feature extraction performed in the given input signature to prevent false factors at different time intervals.The verification of signature and identification point for the individuals from the texture feature matching output and then N = H image , N > H image and N < H image is computed using precise spatial variation and pixel intensity identification for time requirements.For instance, it achieves fewer false positives, as presented in Fig. 12.

Verification time
It helps to satisfy less verification time for the pixel intensities and feature matching process compared to the other factors, as represented in Fig. 13.The pixel intensities are recurrently analyzed to match the process control system's textural features and identification points.Based on the CNN, generating new identification points is performed to select the maximum matching feature for varying pixel intensity and analyzed for improving identification point detection.The handwriting verification process is similar for all the writers irrespective of N and VT.

False acceptance rate (FAR)
In biometrics and authenticating systems, the false acceptance rate metric (FAR) is often calculated to assess the rate at which the system wrongly accepts an impostor's effort as a valid user.The total number of incorrect acceptances or signature matches called the total number of instances the system accepted an impostor's exertion wrongly.The overall number of fraudulent efforts as the entire number of fraudulent tries.www.nature.com/scientificreports/A high FAR in Fig. 14 implies that the system is accepting an unusually large number of unauthorised or fraudulent attempts is calculated using Eq. ( 12).

False rejection rate (FRR) analysis
The FRR is an important indicator that indicates the system's ability to accept valid signatures accurately.A minimal FRR is beneficial since it suggests that valid users are rarely rejected by the system.If the system wrongly rejects a real signature, it is considered a false rejection.A high FRR in Fig. 15, implies that the system is wrongly refusing many legitimate signatures, thus can be aggravating for users using Eq. ( 13).It is critical to evaluate and analyse FRR on a regular basis to guarantee that the signature authentication method provides an optimal user experience while preserving security.

Equal error rate (EER)
The EER depicted in Fig. 16 is the region on the receiver operating characteristic curve in which the FAR and FRR are identical.The EER is a significant indicator since it reflects the operational point where the system's efficiency strikes a balance between the danger of accepting an impostor wrongly and the risk of denying a legitimate user   improperly.The EER is the ROC curve point at which FAR equals FRR.A lesser EER reflects a greater degree of precision system alongside fewer errors.The above discussion of the comparative analysis is briefed in Tables 4 and 5, respectively, for features and intensity factors.

Improvements
The metrics accuracy, precision, and detection are leveraged by 12.29%, 12.65%, and 15.5% in order.The metrics false positives and verification time are less than 13.01% and 10.99%.The accuracy, measures the overall correctness of the predictions made by each model.SVV-TF demonstrates the highest accuracy at 95.587%, indicating that it has the highest rate of correct predictions.Precision, the next metric, reflects the ratio of true positives to

Improvements
The metrics accuracy, precision, and detection are leveraged by 12.14%, 12.85%, and 15.92% in order.The metrics false positives and verification time are less than 9.1% and 10.85%.SVV-TF makes accurate predictions more consistently than the other models.Precision, another crucial metric, signifies the ratio of true positives to the combined total of true and false positives.SVV-TF takes the lead with a precision of 0.9579%, highlighting its exceptional ability to minimize false positives.Detection rate, assesses the models' proficiency in identifying instances of interest.Here, SVV-TF demonstrates remarkable performance with a detection rate of 95.443%, indicating its superior capacity to detect relevant instances accurately.False positives, representing instances incorrectly predicted as positive, are kept impressively low by SVV-TF at 0.081%.This further underscores its precision and effectiveness in making accurate predictions.The verification time measures each model's time to perform its task.In this regard, SVV-TF is the quickest, requiring only 0.869 s.Additionally, there's a recommendation to investigate online handwriting recognition and develop techniques for detecting forged or fraudulent handwriting.Transfer learning and domain adaptation techniques could be explored to adapt the model to different handwriting styles.Efficiency and scalability for real-world deployment, as well as considering security and privacy concerns, are emphasized.Lastly, establishing standardized benchmarks and evaluation metrics would facilitate fair comparisons between different handwriting identification and verification approaches.These directions hold the potential for significant application advancements related to authentication, security, and accessibility.

Figure 3 .
Figure 3. CNN process for identification points.

Figure 6 .
Figure 6.T g , T m , and x i analysis.

Figure 7 .
Figure 7. Analysis of FP, a i , and b i .

Handwriting
Writers or writing Identification is figuring out who wrote a paper by analysing handwriting, text, and images.It has shown promise in many areas, such as digital forensics, crime investigations, finding out who wrote experienced papers, etc.It's difficult to determine who wrote the text when the image is complicated, especially when there are different types of handwriting.The data are collected from the signature verification Kaggle 34 and the handwritten gender dataset35  .Offline signature verification or biometric signature verification works with scanned signatures, and online signature verification works with videos of the writing process.Compared to classical biometric-based handwritten signature identification is less accurate, and security issues will arise.The proposed artificial intelligence and textural features attain high accuracy in handwriting identification.If the pixel intensities do not match the available textural features, the second layer is repeated from the new spatial variation for new pattern recognition.It enhances the accuracy of the varying feature inputs and training images.The metrics accuracy, precision, and detection are leveraged by 12.29%, 12.65%, and 15.5%.The metrics false positives and verification time are less than 13.01% and 10.99%.To guide future research, several promising avenues are suggested.These include extending the model's capabilities to handle multiple languages, exploring advanced feature extraction methods, and incorporating temporal aspects of handwriting.

Table 1 .
Detailed analysis of existing related work.www.nature.com/scientificreports/systems, scientists have studied the behavioral side of writing styles, or "handwriting biometrics".For decades, scientists have studied handwriting as a proxy for personality.Multiple disciplines have a common fascination with a person's handwriting.Forensic scientists, psychologists, and palaeographers are all examples.Both the character style and the literary style vary considerably from one another.Authorship of a handwritten document may be determined by a procedure called handwriting identification.Three stages are involved in establishing authorship from the handwritten text: data collecting and preprocessing, feature extraction, and classification.Obtaining features that accurately represent the many types of handwriting is the primary challenge in handwriting recognition.Although several feature extraction methods have been shown in the research and put into practice for handwriting recognition, the literature does not provide enough information to fully analyze the significance of every given feature in handwriting recognition.

Table 3 .
Matching and verification.

Table 4 .
Comparative analysis (features).www.nature.com/scientificreports/ the combined total of true and false positives.SVV-TF also excels with a precision of 0.9644%, indicating that it has the lowest rate of false positives among all the models.Detection rate, evaluates the models' ability to identify instances of interest accurately.SVV-TF leads with a detection rate of 94.785%, signifying its proficiency in correctly detecting the relevant instances.False positives, represent instances incorrectly predicted as positive.SVV-TF exhibits the lowest false positive rate at 0.0586%, indicating that it makes the fewest mistakes.The verification time measures how long each model takes to perform its task.SVV-TF is the quickest, taking only 0.831 s.