Finger or Stylus: Their Impact on the Performance of Online Signature Verification Systems
|
|
- Monica Daniel
- 5 years ago
- Views:
Transcription
1 MACRo th International Conference on Recent Achievements in Mechatronics, Automation, Computer Science and Robotics Finger or Stylus: Their Impact on the Performance of Online Signature Verification Systems Margit ANTAL 1, András BANDI 2 1 Department of Mathematics-Informatics, Faculty of Technical and Human Sciences, Sapientia University, Tg. Mureş, manyi@ms.sapientia.ro 2 Student, Department of Electrical Engineering, Faculty of Technical and Human Sciences, Sapientia University, Tg. Mureş, andras_bandi1994@yahoo.com Manuscript received September 10, 2017, revised October 12, Abstract: The widespread use of smartphones and the ability of these devices to digitize signatures have made it possible to sign electronic documents in this way. In this paper we compared two on-line signature databases in terms of verification performance: the MCYT containing signatures drawn by stylus pen, and MOBISIG containing finger drawn signatures. Performance evaluations were performed using both local and global systems. In the case of global systems, we evaluated the performance of a novel information theory features set. Little improvement was achieved by this feature set. There were large differences between the two databases in terms of performance. Finger drawn signatures collected by mobile device were proved inferior to signatures collected by digitizing tablet and its stylus. Keywords: behavioral biometrics, on-line signature, touchscreen, informationtheory-based features, performance evaluation. 1. Introduction The touchscreen allows the acquisition of signatures, which can be drawn even with the finger. In this paper we study the performance of signature verification system using on-line signatures collected through mobile devices, where the signatures were drawn by finger. State-of-the art global (feature-based) and local (time functions based) verification systems were evaluated for two on-line signature databases: the MCYT and the MOBISIG. The MCYT database [1] was collected by using a high resolution digitizing tablet and its stylus. The MOBISIG database [2] was collected by using an Android tablet and the subjects finger. Huge performance degradation was found in the case of finger-drawn signatures collected on touchscreen compared to stylus-drawn signatures collected on digitizing tablet. The performance degradation characterized both global and /macro
2 12 M. Antal, A. Bandi local systems, but it was higher in the case of the local system. This type of performance degradation has already been reported by Tolosana et al. [3] for e- BioSign biometric database and Martinez et al. [4] for DooDB database. The rest of this paper is organized as follows. In section 2 we review researches which report performance evaluations on finger-drawn signatures. Section 3 presents the local and global systems used for signature verification. First, the local signature verification system with the used time functions is presented, then the new information theory related features are described, and finally the global system with the used features. In section 4 the experiments are described: the databases, the evaluation protocol, and the results in terms of EER (Equal Error Rate) and error curves. Finally, section 5 draws the conclusions. 2. Related work There are only a few studies reporting performance evaluations on finger drawn signatures. One of the first studies reporting performance evaluation results on such signatures is the semester thesis of Pascal Bissig [5]. Unfortunately, the study reports only random forgery type evaluation. The reported results cannot be reproduced because their dataset is not publicly available. The first publicly available database DooDB, containing finger drawn signatures was collected by the Biometric Recognition Group ATVS. Martinez et al. [4] report benchmark results using a local system based on Dynamic Time Warping (DTW) and several time series. Although the random forgery type evaluations resulted in low error rates, these errors are too high for skilled forgery evaluations. In a later study [6], these results were improved by using Gaussian Mixture Models (GMM). Finger drawn signatures collected on mobile devices were studied by Sae-Bae et al. [7]. However, they were only able to report only random forgery evaluation results because the database contains only genuine signatures. This database is also private. A recent study by Tolosana et al.[3] reports benchmark results on the new e- BioSign database, which contains signatures and handwriting information acquired by using several acquisition devices, both digitizing tablets and mobile devices. On two devices data were collected using both stylus and the finger. A significant performance gap was reported between stylus and finger drawn signatures. The performance deterioration is over 10% when using the finger instead of stylus.
3 Finger or Stylus: Their Impact on the Perf. of On-line Sign. Ver. Syst Methods In this section we describe the local and the global systems used for signature verification. 3.1 Local system Local systems work with time-functions extracted from the signatures. In this paper we used the following eight time-functions: x(t), y(t), x (t), y (t), x (t), y (t), p(t) and p (t). The x(t), y(t) are the coordinate time series, x (t), y (t) are the horizontal and vertical speed time series, x (t), y (t) are the horizontal and vertical acceleration time series, and p(t), p (t) are the pressure and its first derivative time series. Fig. 1. shows these time series for a genuine signature from the MOBISIG database. Signatures were compared using the Dynamic Time Warping (DTW)[8] algorithm, which is able to compare time sequences having unequal lengths. We created an eight-dimensional time series for each signature using the eight timefunctions. The distance returned by the DTW algorithm was converted to a 1 similarity score using the formula Similarity(S i, S j ) =, where S 1+DTW(S i,s j ) i and S j are the two 8-dimensional time sequences corresponding to the two compared signatures. Figure 1: Local features (time-functions) for a genuine signature from the MOBISIG database.
4 14 M. Antal, A. Bandi 3.2 Global system Information theory features Permutation entropy features have already been investigated by Rosso et al. [9] for signature verification. They proposed Shannon entropy, statistical complexity, and the Fisher information computed from the Bandt and Pope histogram. This type of histogram was computed from horizontal and vertical coordinates of signatures. We detected two major problems in this publication. The first is that they reported their results erroneously. We have already reported this problem in an earlier publication [10]. Another major problem is regarding the computation of permutation entropy, which omits repeated consecutive values. This deficiency was admitted by the authors in a later paper [11]. We propose to compute Shannon entropy and Fisher information from a new type of histogram which takes into consideration repeated consecutive values. In a time series we have three types of relation between two consecutive points: less, equal, and greater (x i+1 < x i, x i+1 = x i, x i+1 > x i ). For three consecutive points there are nine relations depicted in Fig. 2 (e.g. the 4. relation has the following meaning: x i = x i+1 and x i+1 > x i+2 ). Figure 2: Relations between three consecutive points. Let us consider the following time series X = {1,2,2,3,3,1,2,1,3,4}. In the first step we associate the N = 9 codes (see Fig. 1.) with the consecutive triplets resulting in the following eight coded triplets: {8,6,8,4,3,7,3,9} (1,2,2 8; 2,2,3 6; 2,3,3 8; 3,3,1 4; 3,1,2 3; 1,2,1 7; 2,1,3 3; 1,3,4 9). Then, we compute the normalized frequencies associated with these nine codes (see Eq. 1).
5 Finger or Stylus: Their Impact on the Perf. of On-line Sign. Ver. Syst. 15 f(1) = 0, f(2) = 0, f(3) = 2 8, f(4) = 1 8, f(5) = 0, f(6) = 1 8, f(7) = 1 8, f(8) = 2 8, f(9) = 1 8. (1) Shannon entropy is defined in Eq. 2. N S[P] = p i ln(p i ) (2) i=1 where P = {p i ; i = 1,, N} with i p i = 1 is a discrete probability distribution. The normalized Shannon entropy is defined in Eq. 3. H[P] = S[P], (3) S max where the entropy is maximal when the probabilities are equal, thus S max = ln N. For our time series X we have H[X] = 9 i=1 f(i) ln f(i)) = ln 9 Fisher information was computed using the formula (Eq. 4.) proposed by Rosso [9], but instead of the Bandt & Pope histogram we used our histogram s normalized frequencies. N 1 F[P] = 1 2 [ p i+1 p i ] 2 (4) i= Global features In our global system we used 15 state-of-the-art (see Table 1) and 12 information theory based features (see Table 2). Some of the state-of-the-art features were selected from the set of 100 global features proposed by Fierrez- Aguilar et al. [12] Table 1: State-of-the-art global features. No. Feature description No. Feature description 1 Signature total duration 9 Sign changes of y = dy/dt 2 Average velocity 10 Sign changes of y = dy /dt 3 Average pressure 11 Average v x 4 Max velocity (v max ) 12 Average v y 5 Average pointwise velocity 13 Sign changes of p = dp/dt 6 Average pointwise acceleration 14 Sign changes of p = dp /dt 7 Sign changes of x = dx/dt 15 Number of sampled points 8 Sign changes of x = dx /dt
6 16 M. Antal, A. Bandi Table 2: Information theory based features. No. Feature description No. Feature description 1 Entropy of x(t) 7 Entropy of x (t) 2 Entropy of y(t) 8 Entropy of y (t) 3 Entropy of p(t) 9 Entropy of p (t) 4 Fisher of x(t) 10 Fisher of x (t) 5 Fisher of y(t) 11 Fisher of y (t) 6 Fisher of p(t) 12 Fisher of p(t) In a global system, signatures are represented as feature vectors. Therefore, from each signature a fixed number (D) of features are extracted, which constitute a feature vector: S i = {f 1 i, f 2 i,, f D i }, i = 1.. N. Our global system works as follows: in the training phase we construct a template from a fixed number of N signatures. During template construction, we calculate the maximum and minimum for each feature: {min (f i j ), max (f i j )}, j = 1, D. These values are i=1,n i=1,n used for min-max normalization of the feature vectors belonging to the template. Furthermore, these values are stored together with the template and are used in the verification phase for normalizing the signature to be verified. The normalization was applied for each user separately, in this way we did not take into account other users data. For evaluation we used three types of anomaly detector: Euclidean, Manhattan and k-nearest neighbor (k-nn) detectors. We described these detectors in an earlier paper [13]. 4. Experimental work 4.1 Databases We used the publicly available MCYT-100 subset from the MCYT database, which contains signatures from 100 subjects captured with a digitizing tablet and its stylus [1]. The important details of this database are summarized in Table 3. The second database used in this study is our MOBISIG database [2] which contains signatures from 83 subjects captured with a Nexus 9 tablet with Android 6.0 operating system. There are two important differences between these two databases: (i) the sampling frequency is constant in the case of MCYT database (100 Hz), whereas it is event-based in the case of the MOBISIG database (approximately 60 Hz); (ii) signatures in MCYT database were drawn by using a
7 Finger or Stylus: Their Impact on the Perf. of On-line Sign. Ver. Syst. 17 stylus pen, whereas those in the MOBISIG database were drawn by the fingertip of the subjects. Table 3: Basic characteristics of the MCYT and MOBISIG databases MCYT MOBISIG Device WACOM, INTUOS A6 Nexus 9 tablet, Android 6.0 USB. Drawing Stylus (pen) Finger Frequency 100 Hz (periodic sampling) Approx. 60 Hz (event based sampling) Coordinates x: , y: x: , y: Used raw data x(t), y(t), p(t) x(t), y(t), p(t) Sessions NA 3 Subjects 100 (44 women, 56 men) 83 (34 women, 49 men) Samples 25 genuine, 25 forgery Sess1: 15 genuine Sess2: 15 genuine, 10 forgery Sess3: 15 genuine, 10 forgery 4.2 Evaluation protocol We used the same evaluation protocol for both databases. We evaluated separately the skilled forgery and random forgery cases. Skilled forgery evaluation used the collected skilled forgery samples, whereas random forgery evaluation used randomly selected samples from the dataset. The evaluation was repeated three times using the first 5, 10 and 15 genuine samples for training. The next 20, 15, and 10 genuine samples were used for positive score computations, and all the available skilled forgery samples for negative score computations (skilled forgery case). In the random forgery case for each subject we selected as negative samples the first sample from every other subject (N-1 samples, N is the number of subjects in a database). The same evaluation protocol was followed for both global and local system, except that in the case of the local system, on the MOBISIG database, we always used the 15 genuine samples from the second session for positive score computations. Two types of Equal Error Rates (EER) were computed. Global EER (EER g ) was computed using a common genuine and forgery score lists for all the subjects of a database. This type of EER is based on a global threshold. User specific EER was computed by using user specific threshold (EER u ). In this case both mean (μ) and standard deviation (σ) are reported.
8 18 M. Antal, A. Bandi 4.3 Results Table 4 summarizes the performances for the global system, whereas Table 5 shows the same performances for the local system. These tables present the evaluations in the case of using 15 samples for template creation. The rest of the results can be seen at Table 4: Global system performance results (EER in %) for different feature sets. 15 training samples, 10 positive test samples, 20 negative test samples, and Euclidean detector. Skilled Forgery MOBISIG MCYT EER g EER u : μ(σ) EER g EER u : μ(σ) (1) Inf.th (11.94) (9.17) (2) St. o.t. art (8.48) (6.40) (1)+(2) Both (8.71) (5.79) Random Forgery MOBISIG MCYT EER g EER u : μ(σ) EER g EER u : μ(σ) (1) Inf.th (6.18) (6.51) (2) St. o.t. art (4.74) (3.53) (1)+(2) Both (3.82) (3.45) Table 5: Local system performance results (EER in %) for different time series. 15 training samples. DTW algorithm. Skilled Forgery MOBISIG MCYT EER g EER u : μ(σ) EER g EER u : μ(σ) xy (12.63) (5.02) x y (10.26) (3.88) x y (17.06) (3.78) xyx y x y (11.37) (3.78) xyx y x y pp (9.10) (3.72) Random Forgery MOBISIG MCYT EER g EER u : μ(σ) EER g EER u : μ(σ) xy (1.00) (1.01) x y (0.00) (0.18) x y (3.36) (0.37)
9 Finger or Stylus: Their Impact on the Perf. of On-line Sign. Ver. Syst. 19 xyx y x y (0.09) (0.15) xyx y x y pp (0.63) (0.15) Detection Error Trade-off (DET) curves [14] were created using the Matlab package available at NIST 1. Fig. 3. shows the results obtained for skilled forgery type evaluation of the two databases. In order to show the discrimination ability of a feature set, separate curves are shown for using information theory features (12), state-of-the-art features (15), and both types of features together (27). Fig. 4. shows the same error curves for random forgery type evaluation. Figure 3: Verification performance results for the MCYT and MOBISIG databases. Skilled forgeries case. 1
10 20 M. Antal, A. Bandi Figure 4: Verification performance results for the MCYT and MOBISIG databases. Random Forgeries case. 5. Conclusions In this paper we have compared - in terms of verification performance - two on-line signature databases, the MCYT database, which was collected using a high quality digitizing tablet with a stylus for drawing the signatures, and MOBISIG, which used a mobile device (Nexus 9 tablet with Android 6.0 operating system) and finger for data collection. The performance gaps between the two databases are highly significant, especially for skilled forgery type evaluation. Error rates for finger-drawn signatures are almost twice as high as for stylus-drawn signatures in the case of global systems (skilled forgery case). The local features were more strongly influenced by the signature drawing modality. In this case the error rates for the MOBISIG database were five or six times higher than for the MCYT database. The discrepancy between EER g and EER u has been observed by other researchers [4]. However, in the case of local systems there are unusually large differences. Despite the fact that we have taken into account the successive equal values in the time series, information theoretical features have resulted in little improvement (around 1%) in the performance of the global system.
11 Finger or Stylus: Their Impact on the Perf. of On-line Sign. Ver. Syst. 21 Acknowledgements The work of András BANDI was supported by a Student Research Grant offered by Accenture Romania. The work of Margit ANTAL was partially supported by the Sapientia Foundation Institute for Scientific Research. References [1] J. Ortega-Garcia et al., MCYT baseline corpus: a bimodal biometric database, IEE Proc. - Vision, Image, Signal Process., vol. 150, no. 6, pp , [2] M. Antal, The MOBISIG on-line signature database. Tirgu Mures, [3] R. Tolosana, R. Vera-Rodriguez, J. Fierrez, A. Morales, and J. Ortega- Garcia, Benchmarking desktop and mobile handwriting across COTS devices: The e-biosign biometric database., PLoS One, vol. 12, no. 5, [4] M. Martinez-Diaz, J. Fierrez, and J. Galbally, The DooDB Graphical Password Database: Data Analysis and Benchmark Results, Access, IEEE, vol. 1, pp , [5] P. Bissig, Signature Verification on Finger Operated Touchscreen Devices, ETH Zürich, Distributed Computer Group, [6] M. Martinez-Diaz, J. Fierrez, and J. Galbally, Graphical Password- Based User Authentication With Free-Form Doodles, IEEE Trans. Human-Machine Syst., vol. 46, no. 4, pp , Aug [7] S.-B. Napa and N. Memon, Online Signature Verification on Mobile Devices, Inf. Forensics Secur. IEEE Trans., vol. 9, no. 6, pp , Jun [8] DTW algorithm. [Online]. Available: [Accessed: 12- Oct-2017]. [9] O. A. Rosso, R. Ospina, and A. C. Frery, Classification and Verification of Handwritten Signatures with Time Causal Information Theory Quantifiers, PLoS One, vol. 11, no. 12, [10] M. Antal and L. Z. Szabo, Some remarks on a set of information theory features used for on-line signature verification, in th International Symposium on Digital Forensic and Security (ISDFS), 2017, pp [11] L. Zunino, F. Olivares, F. Scholkmann, and O. A. Rosso, Permutation entropy based time series analysis: Equalities in the input signal can lead
12 22 M. Antal, A. Bandi to false conclusions, Phys. Lett. A, vol. 381, no. 22, pp , Jun [12] J. Fierrez-Aguilar, L. Nanni, J. Lopez-Peñalba, J. Ortega-Garcia, and D. Maltoni, An On-line Signature Verification System Based on Fusion of Local and Global Information, in Proceedings of the 5th International Conference on Audio- and Video-Based Biometric Person Authentication, 2005, pp [13] M. Antal and L. Z. Szabo, On-line verification of finger drawn signatures, in 2016 IEEE 11th International Symposium on Applied Computational Intelligence and Informatics (SACI), 2016, pp [14] A. Martin, G. Doddington, T. Kamm, M. Ordowski, and M. Przybocki, The DET Curve in Assessment of Detection Task Performance, Proc. Eurospeech 97, pp , 1997.
ISSN Vol.07,Issue.12, August-2015, Pages:
ISSN 2348 2370 Vol.07,Issue.12, August-2015, Pages:2349-2355 www.ijatir.org Online Signature Verification on Mobile Devices MENDRA SHIRISHA 1, P. ASHOK KUMAR 2 1 PG Scholar, Dept of ECE, Samskruti College
More informationRepositorio Institucional de la Universidad Autónoma de Madrid.
Repositorio Institucional de la Universidad Autónoma de Madrid https://repositorio.uam.es Esta es la versión de autor de la comunicación de congreso publicada en: This is an author produced version of
More informationIncorporating Touch Biometrics to Mobile One-Time Passwords: Exploration of Digits
Incorporating Touch Biometrics to Mobile One-Time Passwords: Exploration of Digits Ruben Tolosana, Ruben Vera-Rodriguez, Julian Fierrez and Javier Ortega-Garcia BiDA Lab- Biometrics and Data Pattern Analytics
More informationOn the effects of sampling rate and interpolation in HMM-based dynamic signature verification
On the effects of sampling rate and interpolation in HMM-based dynamic signature verification M. Martinez-Diaz, J. Fierrez, M. R. Freire, J. Ortega-Garcia Biometrics Recognition Group - ATVS, Esc. Politecnica
More informationOutline. Incorporating Biometric Quality In Multi-Biometrics FUSION. Results. Motivation. Image Quality: The FVC Experience
Incorporating Biometric Quality In Multi-Biometrics FUSION QUALITY Julian Fierrez-Aguilar, Javier Ortega-Garcia Biometrics Research Lab. - ATVS Universidad Autónoma de Madrid, SPAIN Loris Nanni, Raffaele
More informationOn-line Signature Verification on a Mobile Platform
On-line Signature Verification on a Mobile Platform Nesma Houmani, Sonia Garcia-Salicetti, Bernadette Dorizzi, and Mounim El-Yacoubi Institut Telecom; Telecom SudParis; Intermedia Team, 9 rue Charles Fourier,
More informationHistogram-based matching of GMM encoded features for online signature verification
Histogram-based matching of GMM encoded features for online signature verification Vivek Venugopal On behalf of Abhishek Sharma,Dr. Suresh Sundaram Multimedia Analytics Laboratory, Electronics and Electrical
More informationA Combined Method for On-Line Signature Verification
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 14, No 2 Sofia 2014 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2014-0022 A Combined Method for On-Line
More informationAn Efficient on-line Signature Verification System Using Histogram Features
RESEARCH ARTICLE OPEN ACCESS An Efficient on-line Signature Verification System Using Histogram Features Mr.Abilash S 1, Mrs.M.Janani, M.E 2 ME Computer Science and Engineering,Department of CSE, Annai
More informationEvaluation of Brute-Force Attack to Dynamic Signature Verification Using Synthetic Samples
29 th International Conference on Document Analysis and Recognition Evaluation of Brute-Force Attack to Dynamic Signature Verification Using Synthetic Samples Javier Galbally, Julian Fierrez, Marcos Martinez-Diaz,
More informationCustomized Data Filtering For Mobile Signature Verification
Customized Data Filtering For Mobile Signature Verification Seungsoo Nam 1, Hosung Park, Changho Seo 1 and Daeseon Choi 1 Department of Conversions Science, Kongju National University, Korea. Department
More informationPreprocessing and Feature Selection for Improved Sensor Interoperability in Online Biometric Signature Verification
Received April 15, 2015, accepted May 2, 2015, date of publication May 8, 2015, date of current version May 20, 2015. Digital Object Identifier 10.1109/ACCESS.2015.2431493 Preprocessing and Feature Selection
More informationA Study on the Consistency of Features for On-line Signature Verification
A Study on the Consistency of Features for On-line Signature Verification Center for Unified Biometrics and Sensors State University of New York at Buffalo Amherst, NY 14260 {hlei,govind}@cse.buffalo.edu
More informationIncorporating Image Quality in Multi-Algorithm Fingerprint Verification
Incorporating Image Quality in Multi-Algorithm Fingerprint Verification Julian Fierrez-Aguilar 1, Yi Chen 2, Javier Ortega-Garcia 1, and Anil K. Jain 2 1 ATVS, Escuela Politecnica Superior, Universidad
More informationOff-line Signature Verification Using Contour Features
Off-line Signature Verification Using Contour Features Almudena Gilperez, Fernando Alonso-Fernandez, Susana Pecharroman, Julian Fierrez, Javier Ortega-Garcia Biometric Recognition Group - ATVS Escuela
More informationEnhanced Online Signature Verification System
Enhanced Online Signature Verification System Joslyn Fernandes 1, Nishad Bhandarkar 2 1 F/8, Malinee Apt., Mahakali Caves Road, Andheri east, Mumbai 400093. 2 303, Meena CHS. LTD., 7 bungalows, Andheri
More informationIMPLEMENTATION OF ONLINE SIGNATURE VERIFICATION USING MATLAB AND GSM
IMPLEMENTATION OF ONLINE SIGNATURE VERIFICATION USING MATLAB AND GSM C. Prem Reddy, D. Santhosh Kumar and K. Srilatha Department of Electronics and Communication Engineering, Sathyabama University, Chennai,
More informationProbabilistic Model for Dynamic Signature Verification System
Research Journal of Applied Sciences, Engineering and Technology 3(): 3-34, SSN: 4-7467 Maxwell Scientific Organization, Submitted: August 6, Accepted: September 7, Published: November 5, Probabilistic
More informationBiometrics Technology: Hand Geometry
Biometrics Technology: Hand Geometry References: [H1] Gonzeilez, S., Travieso, C.M., Alonso, J.B., and M.A. Ferrer, Automatic biometric identification system by hand geometry, Proceedings of IEEE the 37th
More informationMultimodal Fusion Vulnerability to Non-Zero Effort (Spoof) Imposters
Multimodal Fusion Vulnerability to Non-Zero Effort (Spoof) mposters P. A. Johnson, B. Tan, S. Schuckers 3 ECE Department, Clarkson University Potsdam, NY 3699, USA johnsopa@clarkson.edu tanb@clarkson.edu
More informationOnline Signature Verification Technique
Volume 3, Issue 1 ISSN: 2320-5288 International Journal of Engineering Technology & Management Research Journal homepage: www.ijetmr.org Online Signature Verification Technique Ankit Soni M Tech Student,
More informationImage retrieval based on bag of images
University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2009 Image retrieval based on bag of images Jun Zhang University of Wollongong
More informationAn Application of the 2D Gaussian Filter for Enhancing Feature Extraction in Off-line Signature Verification
2011 International Conference on Document Analysis and Recognition An Application of the 2D Gaussian Filter for Enhancing Feature Extraction in Off-line Signature Verification Vu Nguyen and Michael Blumenstein
More informationDYNAMIC SIGNATURE VERIFICATION FOR PORTABLE DEVICES
UNIVERSIDAD AUTÓNOMA DE MADRID ESCUELA POLITÉCNICA SUPERIOR DYNAMIC SIGNATURE VERIFICATION FOR PORTABLE DEVICES TRABAJO DE FIN DE MÁSTER Author: Marcos Martínez Díaz Ingeniero de Telecomunicación, UAM
More informationFeature Selection by User Specific Feature Mask on a Biometric Hash Algorithm for Dynamic Handwriting
Feature Selection by User Specific Feature Mask on a Biometric Hash Algorithm for Dynamic Handwriting Karl Kümmel, Tobias Scheidat, Christian Arndt and Claus Vielhauer Brandenburg University of Applied
More informationMultimodal Biometrics for Voice and Handwriting
Multimodal Biometrics for Voice and Handwriting Claus Vielhauer and Tobias Scheidat School of Computer Science, Department of Technical and Business Information Systems, Advanced Multimedia and Security
More informationOFFLINE SIGNATURE VERIFICATION USING SUPPORT LOCAL BINARY PATTERN
OFFLINE SIGNATURE VERIFICATION USING SUPPORT LOCAL BINARY PATTERN P.Vickram, Dr. A. Sri Krishna and D.Swapna Department of Computer Science & Engineering, R.V. R & J.C College of Engineering, Guntur ABSTRACT
More informationRepositorio Institucional de la Universidad Autónoma de Madrid. https://repositorio.uam.es. Pattern Recognition 40.4, (2007):
Repositorio Institucional de la Universidad Autónoma de Madrid https://repositorio.uam.es Esta es la versión de autor del artículo publicado en: This is an author produced version of a paper published
More informationOFFLINE SIGNATURE VERIFICATION
International Journal of Electronics and Communication Engineering and Technology (IJECET) Volume 8, Issue 2, March - April 2017, pp. 120 128, Article ID: IJECET_08_02_016 Available online at http://www.iaeme.com/ijecet/issues.asp?jtype=ijecet&vtype=8&itype=2
More informationNOVATEUR PUBLICATIONS INTERNATIONAL JOURNAL OF INNOVATIONS IN ENGINEERING RESEARCH AND TECHNOLOGY [IJIERT] ISSN: VOLUME 2, ISSUE 1 JAN-2015
Offline Handwritten Signature Verification using Neural Network Pallavi V. Hatkar Department of Electronics Engineering, TKIET Warana, India Prof.B.T.Salokhe Department of Electronics Engineering, TKIET
More informationRobotic Arm Motion for Verifying Signatures
Robotic Arm Motion for Verifying Signatures Moises Diaz 1 Miguel A. Ferrer 2 Jose J. Quintana 2 1 Universidad del Atlantico Medio, Spain 2 Instituto para el Desarrollo Tecnológico y la Innovación en Comunicaciones
More informationPerformance Analysis of Remote Desktop Virtualization based on Hyper-V versus Remote Desktop Services
MACRo2015 - International Conference on Recent Achievements in Mechatronics, Automation, Computer Science and Robotics Performance Analysis of Remote Desktop Virtualization based on Hyper-V versus Remote
More informationInvestigating Multi-touch Gestures as a Novel Biometric Modality
Investigating Multi-touch Gestures as a Novel Biometric Modality Napa Sae-Bae, Nasir Memon, and Katherine Isbister Computer Science Department, NYU-Poly Six Metrotech Center, Brooklyn, NY, 11201 Email:
More informationGraphical Password-Based User Authentication With Free-Form Doodles
IEEE TRANSACTIONS ON HUMAN-MACHINE SYSTEMS, VOL. 46, NO. 4, AUGUST 2016 607 Graphical Password-Based User Authentication With Free-Form Doodles Marcos Martinez-Diaz, Julian Fierrez, and Javier Galbally
More informationMobile signature verification: feature robustness and performance comparison
Published in IET Biometrics Received on 20th October 2013 Revised on 1st May 2014 Accepted on 2nd May 2014 ISSN 2047-4938 Mobile signature verification: feature robustness and performance comparison Marcos
More informationOnline Handwritten Signature Verification 2
Chapter 6 1 Online Handwritten Signature Verification 2 Sonia Garcia-Salicetti, Nesma Houmani, Bao Ly-Van, Bernadette Dorizzi, 3 Fernando Alonso-Fernandez, Julian Fierrez, Javier Ortega-Garcia, 4 Claus
More informationK-Nearest Neighbor Classification Approach for Face and Fingerprint at Feature Level Fusion
K-Nearest Neighbor Classification Approach for Face and Fingerprint at Feature Level Fusion Dhriti PEC University of Technology Chandigarh India Manvjeet Kaur PEC University of Technology Chandigarh India
More informationFake Biometric System For Fingerprint, Iris, and face using QDA and SIFT
Fake Biometric System For Fingerprint, Iris, and face using QDA and SIFT 1 Gummadidala Ravi Babu, 2 Nagandla Prasad 1 (M.Tech),DECS, Sai Thirumala NVR engineering College, Narasaraopeta, AP, INDIA. 2 Asst
More informationHierarchical Shape Primitive Features for Online Text-independent Writer Identification
2009 10th International Conference on Document Analysis and Recognition Hierarchical Shape Primitive Features for Online Text-independent Writer Identification Bangy Li, Zhenan Sun and Tieniu Tan Center
More information6. Multimodal Biometrics
6. Multimodal Biometrics Multimodal biometrics is based on combination of more than one type of biometric modalities or traits. The most compelling reason to combine different modalities is to improve
More informationAN ONLINE MOBILE SIGNATURE VERIFICATION SYSTEM BASED ON HOMOMORPHIC ENCRYPTION. Received January 2017; revised May 2017
International Journal of Innovative Computing, Information and Control ICIC International c 2017 ISSN 1349-4198 Volume 13, Number 5, October 2017 pp. 1623 1635 AN ONLINE MOBILE SIGNATURE VERIFICATION SYSTEM
More informationSemi-Supervised PCA-based Face Recognition Using Self-Training
Semi-Supervised PCA-based Face Recognition Using Self-Training Fabio Roli and Gian Luca Marcialis Dept. of Electrical and Electronic Engineering, University of Cagliari Piazza d Armi, 09123 Cagliari, Italy
More informationFingerprint and on-line signature verification competitions at ICB 2009
Fingerprint and on-line signature verification competitions at ICB 2009 Bernadette Dorizzi, Raffaele Cappelli, Matteo Ferrara, Dario Maio, Davide Maltoni, Nesma Houmani, Sonia Garcia-Salicetti, Aurelien
More informationOnline Handwritten Signature Verification System
Master Thesis Electrical Engineering September 2017 Online Handwritten Signature Verification System using Gaussian Mixture Model and Longest Common Sub-Sequences Shashidhar Sanda Sravya Amirisetti Department
More informationFVC2004: Third Fingerprint Verification Competition
FVC2004: Third Fingerprint Verification Competition D. Maio 1, D. Maltoni 1, R. Cappelli 1, J.L. Wayman 2, A.K. Jain 3 1 Biometric System Lab - DEIS, University of Bologna, via Sacchi 3, 47023 Cesena -
More informationThe Expected Performance Curve: a New Assessment Measure for Person Authentication
R E S E A R C H R E P O R T I D I A P The Expected Performance Curve: a New Assessment Measure for Person Authentication Samy Bengio 1 Johnny Mariéthoz 2 IDIAP RR 03-84 March 10, 2004 submitted for publication
More informationThe Expected Performance Curve: a New Assessment Measure for Person Authentication
The Expected Performance Curve: a New Assessment Measure for Person Authentication Samy Bengio Johnny Mariéthoz IDIAP CP 592, rue du Simplon4 192 Martigny, Switzerland {bengio,marietho}@idiap.ch Abstract
More informationA Biometric Authentication System That Automatically Generates Feature Points
A Biometric Authentication System That Automatically Generates Feature Points Hiroshi Dozono 1, Youki Inaba 1, Masanori Nakakuni 2 1 Faculty of Science and Engineering, Saga University, 1-Honjyo Saga,
More informationOnline Text-independent Writer Identification Based on Temporal Sequence and Shape Codes
2009 10th International Conference on Document Analysis and Recognition Online Text-independent Writer Identification Based on Temporal Sequence and Shape Codes Bangy Li and Tieniu Tan Center for Biometrics
More informationEfficient Rectification of Malformation Fingerprints
Efficient Rectification of Malformation Fingerprints Ms.Sarita Singh MCA 3 rd Year, II Sem, CMR College of Engineering & Technology, Hyderabad. ABSTRACT: Elastic distortion of fingerprints is one of the
More informationHANDWRITTEN signature is a form of personal identification
1 Offline signature authenticity verification through unambiguously connected skeleton segments Jugurta Montalvão, Luiz Miranda, and Jânio Canuto arxiv:1711.03082v1 [cs.cv] 8 Nov 2017 Abstract A method
More informationSynthetic Generation of Handwritten Signatures Based on Spectral Analysis
Synthetic Generation of Handwritten Signatures Based on Spectral Analysis Javier Galbally, Julian Fierrez, Marcos Martinez-Diaz, and Javier Ortega-Garcia Biometric Recognition Group ATVS, ES, Universidad
More informationSecurity Evaluation of Online Signature Verification System using Webcams
Security Evaluation of Online Signature Verification System using Webcams T.Venkatesh Research Scholar, K.L.University, A.P.,India Balaji.S Professor, K.L.University, A.P.,India. Chakravarthy A S N Professor,
More informationIndirect Attacks on Biometric Systems
Indirect Attacks on Biometric Systems Dr. Julian Fierrez (with contributions from Dr. Javier Galbally) Biometric Recognition Group - ATVS Escuela Politécnica Superior Universidad Autónoma de Madrid, SPAIN
More informationA Novel Extreme Point Selection Algorithm in SIFT
A Novel Extreme Point Selection Algorithm in SIFT Ding Zuchun School of Electronic and Communication, South China University of Technolog Guangzhou, China zucding@gmail.com Abstract. This paper proposes
More informationUse of Extreme Value Statistics in Modeling Biometric Systems
Use of Extreme Value Statistics in Modeling Biometric Systems Similarity Scores Two types of matching: Genuine sample Imposter sample Matching scores Enrolled sample 0.95 0.32 Probability Density Decision
More informationSignature Recognition by Pixel Variance Analysis Using Multiple Morphological Dilations
Signature Recognition by Pixel Variance Analysis Using Multiple Morphological Dilations H B Kekre 1, Department of Computer Engineering, V A Bharadi 2, Department of Electronics and Telecommunication**
More informationOffline Signature verification and recognition using ART 1
Offline Signature verification and recognition using ART 1 R. Sukanya K.Malathy M.E Infant Jesus College of Engineering And Technology Abstract: The main objective of this project is signature verification
More informationAN EFFICIENT BINARIZATION TECHNIQUE FOR FINGERPRINT IMAGES S. B. SRIDEVI M.Tech., Department of ECE
AN EFFICIENT BINARIZATION TECHNIQUE FOR FINGERPRINT IMAGES S. B. SRIDEVI M.Tech., Department of ECE sbsridevi89@gmail.com 287 ABSTRACT Fingerprint identification is the most prominent method of biometric
More informationHandwritten Text Recognition
Handwritten Text Recognition M.J. Castro-Bleda, Joan Pasto Universidad Politécnica de Valencia Spain Zaragoza, March 2012 Text recognition () TRABHCI Zaragoza, March 2012 1 / 1 The problem: Handwriting
More informationSTUDY OF POSSIBILITY OF ON-PEN MATCHING FOR BIOMETRIC HANDWRITING VERIFICATION
STUDY OF POSSIBILITY OF ON-PEN MATCHING FOR BIOMETRIC HANDWRITING VERIFICATION Tobias Scheidat, Claus Vielhauer, and Jana Dittmann Faculty of Computer Science, Otto-von-Guericke University Magdeburg, Universitätsplatz
More informationWriter Authentication Based on the Analysis of Strokes
Writer Authentication Based on the Analysis of Strokes Kun Yu, Yunhong Wang, Tieniu Tan * NLPR, Institute of Automation, Chinese Academy of Sciences, Beijing, 00080 P.R.China ABSTRACT This paper presents
More informationOn the Vulnerability of Palm Vein Recognition to Spoofing Attacks
On the Vulnerability of Palm Vein Recognition to Spoofing Attacks Pedro Tome and Sébastien Marcel Idiap Research Institute Centre du Parc, Rue Marconi 9, CH-9 Martigny, Switzerland {pedro.tome, sebastien.marcel}@idiap.ch
More informationTRAINING ON-LINE HANDWRITING RECOGNIZERS USING SYNTHETICALLY GENERATED TEXT
TRAINING ON-LINE HANDWRITING RECOGNIZERS USING SYNTHETICALLY GENERATED TEXT Daniel Martín-Albo, Réjean Plamondon * and Enrique Vidal PRHLT Research Center Universitat Politècnica de València * Laboratoire
More informationISSN Vol.04,Issue.08, July-2016, Pages:
WWW.IJITECH.ORG ISSN 2321-8665 Vol.04,Issue.08, July-2016, Pages:1504-1510 Detection and Rectification of Distorted Fingerprints S. SOFIA SULTANA 1, P. D. CHIDHAMBARA RAO 2 1 PG Scholar, Dept of CSE, Kottam
More informationShort Survey on Static Hand Gesture Recognition
Short Survey on Static Hand Gesture Recognition Huu-Hung Huynh University of Science and Technology The University of Danang, Vietnam Duc-Hoang Vo University of Science and Technology The University of
More informationA Fast Personal Palm print Authentication based on 3D-Multi Wavelet Transformation
A Fast Personal Palm print Authentication based on 3D-Multi Wavelet Transformation * A. H. M. Al-Helali, * W. A. Mahmmoud, and * H. A. Ali * Al- Isra Private University Email: adnan_hadi@yahoo.com Abstract:
More informationUsing Support Vector Machines to Eliminate False Minutiae Matches during Fingerprint Verification
Using Support Vector Machines to Eliminate False Minutiae Matches during Fingerprint Verification Abstract Praveer Mansukhani, Sergey Tulyakov, Venu Govindaraju Center for Unified Biometrics and Sensors
More informationarxiv: v1 [cs.cv] 5 Oct 2016
A new algorithm for identity verification based on the analysis of a handwritten dynamic signature arxiv:1610.01578v1 [cs.cv] 5 Oct 2016 Krzysztof Cpałka a, Marcin Zalasiński a,1,, Leszek Rutkowski a a
More informationISSN Vol.04,Issue.15, October-2016, Pages:
WWW.IJITECH.ORG ISSN 2321-8665 Vol.04,Issue.15, October-2016, Pages:2901-2907 Detection and Rectification of Distorted Fingerprints P.MOUNIKA 1, S. RAJESHWAR 2 1 PG Scholar, Dept of CSE(SE), Arjun College
More informationFingerprint Recognition using Texture Features
Fingerprint Recognition using Texture Features Manidipa Saha, Jyotismita Chaki, Ranjan Parekh,, School of Education Technology, Jadavpur University, Kolkata, India Abstract: This paper proposes an efficient
More informationKeywords Wavelet decomposition, SIFT, Unibiometrics, Multibiometrics, Histogram Equalization.
Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure and Reliable
More informationBiometrics Technology: Multi-modal (Part 2)
Biometrics Technology: Multi-modal (Part 2) References: At the Level: [M7] U. Dieckmann, P. Plankensteiner and T. Wagner, "SESAM: A biometric person identification system using sensor fusion ", Pattern
More informationOnline Text-Independent Writer Identification Based on Stroke s Probability Distribution Function
Online Text-Independent Writer Identification Based on Stroke s Probability Distribution Function Bangyu Li, Zhenan Sun, and Tieniu Tan Center for Biometrics and Security Research, National Lab of Pattern
More informationInternational Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 5, Sep Oct 2017
RESEARCH ARTICLE OPEN ACCESS Iris and Palmprint Decision Fusion to Enhance Human Ali M Mayya [1], Mariam Saii [2] PhD student [1], Professor Assistance [2] Computer Engineering Tishreen University Syria
More informationGraph Matching Iris Image Blocks with Local Binary Pattern
Graph Matching Iris Image Blocs with Local Binary Pattern Zhenan Sun, Tieniu Tan, and Xianchao Qiu Center for Biometrics and Security Research, National Laboratory of Pattern Recognition, Institute of
More informationHandwriting Biometric Hash Attack: A Genetic Algorithm with User Interaction for Raw Data Reconstruction
Handwriting Biometric Hash Attack: A Genetic Algorithm with User Interaction for Raw Data Reconstruction Karl Kümmel 1, Claus Vielhauer 1,2, Tobias Scheidat 1,2, Dirk Franke 2, and Jana Dittmann 2 1 Brandenburg
More informationA study of the Graphical User Interfaces for Biometric Authentication System
A study of the Graphical User Interfaces for Biometric Authentication System Hiroshi Dozono 1, Takayuki Inoue 1, Masanori Nakakun 2 i 1 Faculty of Science and Engineering, Saga University, 1-Honjyo Saga,
More informationDynamic Stroke Information Analysis for Video-Based Handwritten Chinese Character Recognition
Dynamic Stroke Information Analysis for Video-Based Handwritten Chinese Character Recognition Feng Lin and Xiaoou Tang Department of Information Engineering The Chinese University of Hong Kong Shatin,
More information5. Signature Recognition & Keystroke Dynamics
5. Signature Recognition & Keystroke Dynamics Signature verification is an important research area in the field of authentication of a person as well as documents in e-commerce and banking. We can generally
More information10-701/15-781, Fall 2006, Final
-7/-78, Fall 6, Final Dec, :pm-8:pm There are 9 questions in this exam ( pages including this cover sheet). If you need more room to work out your answer to a question, use the back of the page and clearly
More informationMultiple-Person Tracking by Detection
http://excel.fit.vutbr.cz Multiple-Person Tracking by Detection Jakub Vojvoda* Abstract Detection and tracking of multiple person is challenging problem mainly due to complexity of scene and large intra-class
More informationAccelerometer Gesture Recognition
Accelerometer Gesture Recognition Michael Xie xie@cs.stanford.edu David Pan napdivad@stanford.edu December 12, 2014 Abstract Our goal is to make gesture-based input for smartphones and smartwatches accurate
More informationExploring Similarity Measures for Biometric Databases
Exploring Similarity Measures for Biometric Databases Praveer Mansukhani, Venu Govindaraju Center for Unified Biometrics and Sensors (CUBS) University at Buffalo {pdm5, govind}@buffalo.edu Abstract. Currently
More informationIEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS PART A: SYSTEMS AND HUMANS, VOL. 40, NO. 3, MAY /$26.
IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS PART A: SYSTEMS AND HUMANS, VOL. 40, NO. 3, MAY 200 525 Cancelable Templates for Sequence-Based Biometrics with Application to On-line Signature Recognition
More informationHill-Climbing Attack to an Eigenface-Based Face Verification System
Hill-limbing Attack to an Eigenface-ased Face Verification System Javier Galbally, Julian Fierrez, and Javier Ortega-Garcia iometric Recognition Group ATVS, EPS, UAM / Francisco Tomas y Valiente 11, 2849
More informationUtilization of Matching Score Vector Similarity Measures in Biometric Systems
Utilization of Matching Se Vector Similarity Measures in Biometric Systems Xi Cheng, Sergey Tulyakov, and Venu Govindaraju Center for Unified Biometrics and Sensors University at Buffalo, NY, USA xicheng,tulyakov,govind@buffalo.edu
More informationRobust biometric image watermarking for fingerprint and face template protection
Robust biometric image watermarking for fingerprint and face template protection Mayank Vatsa 1, Richa Singh 1, Afzel Noore 1a),MaxM.Houck 2, and Keith Morris 2 1 West Virginia University, Morgantown,
More informationGurmeet Kaur 1, Parikshit 2, Dr. Chander Kant 3 1 M.tech Scholar, Assistant Professor 2, 3
Volume 8 Issue 2 March 2017 - Sept 2017 pp. 72-80 available online at www.csjournals.com A Novel Approach to Improve the Biometric Security using Liveness Detection Gurmeet Kaur 1, Parikshit 2, Dr. Chander
More informationKeystroke Biometric Studies with Short Numeric Input on Smartphones
Keystroke Biometric Studies with Short Numeric Input on Smartphones Michael J. Coakley 1, John V. Monaco 2, and Charles C. Tappert 1 1 Seidenberg School of CSIS, Pace University, Pleasantville, NY 10570
More informationAdapted Fusion Schemes for Multimodal Biometric Authentication. Dr. Julian Fierrez Advisor: Javier Ortega-Garcia. Madrid, November 2006.
Adapted Fusion Schemes for Multimodal Biometric Authentication Dr. Julian Fierrez Advisor: Javier Ortega-Garcia ATVS Grupo de Reconocimiento Biométrico Escuela Politécnica Superior Universidad Autónoma
More informationToward Part-based Document Image Decoding
2012 10th IAPR International Workshop on Document Analysis Systems Toward Part-based Document Image Decoding Wang Song, Seiichi Uchida Kyushu University, Fukuoka, Japan wangsong@human.ait.kyushu-u.ac.jp,
More informationA Distance-Based Classifier Using Dissimilarity Based on Class Conditional Probability and Within-Class Variation. Kwanyong Lee 1 and Hyeyoung Park 2
A Distance-Based Classifier Using Dissimilarity Based on Class Conditional Probability and Within-Class Variation Kwanyong Lee 1 and Hyeyoung Park 2 1. Department of Computer Science, Korea National Open
More informationThe Approach of Mean Shift based Cosine Dissimilarity for Multi-Recording Speaker Clustering
The Approach of Mean Shift based Cosine Dissimilarity for Multi-Recording Speaker Clustering 1 D. Jareena Begum, 2 K Rajendra Prasad, 3 M Suleman Basha 1 M.Tech in SE, RGMCET, Nandyal 2 Assoc Prof, Dept
More informationKeystroke Dynamics Performance Enhancement With Soft Biometrics
Keystroke Dynamics Performance Enhancement With Soft Biometrics Syed Zulkarnain Syed Idrus Universiti Malaysia Perlis 01000 Kangar, Perlis, Malaysia syzul@unimap.edu.my Christophe Rosenberger Université
More informationSYMBOLIC FEATURES IN NEURAL NETWORKS
SYMBOLIC FEATURES IN NEURAL NETWORKS Włodzisław Duch, Karol Grudziński and Grzegorz Stawski 1 Department of Computer Methods, Nicolaus Copernicus University ul. Grudziadzka 5, 87-100 Toruń, Poland Abstract:
More informationHill-Climbing Attack Based on the Uphill Simplex Algorithm and Its Application to Signature Verification
Hill-Climbing Attack Based on the Uphill Simplex Algorithm and Its Application to Signature Verification Marta Gomez-Barrero, Javier Galbally, Julian Fierrez, and Javier Ortega-Garcia Biometric Recognition
More informationFeature-level Fusion for Effective Palmprint Authentication
Feature-level Fusion for Effective Palmprint Authentication Adams Wai-Kin Kong 1, 2 and David Zhang 1 1 Biometric Research Center, Department of Computing The Hong Kong Polytechnic University, Kowloon,
More informationFingerprint Mosaicking by Rolling with Sliding
Fingerprint Mosaicking by Rolling with Sliding Kyoungtaek Choi, Hunjae Park, Hee-seung Choi and Jaihie Kim Department of Electrical and Electronic Engineering,Yonsei University Biometrics Engineering Research
More informationComparative Evaluation of Feature Normalization Techniques for Speaker Verification
Comparative Evaluation of Feature Normalization Techniques for Speaker Verification Md Jahangir Alam 1,2, Pierre Ouellet 1, Patrick Kenny 1, Douglas O Shaughnessy 2, 1 CRIM, Montreal, Canada {Janagir.Alam,
More information