Finger or Stylus: Their Impact on the Performance of Online Signature Verification Systems

Size: px
Start display at page:

Download "Finger or Stylus: Their Impact on the Performance of Online Signature Verification Systems"

Transcription

1 MACRo th International Conference on Recent Achievements in Mechatronics, Automation, Computer Science and Robotics Finger or Stylus: Their Impact on the Performance of Online Signature Verification Systems Margit ANTAL 1, András BANDI 2 1 Department of Mathematics-Informatics, Faculty of Technical and Human Sciences, Sapientia University, Tg. Mureş, manyi@ms.sapientia.ro 2 Student, Department of Electrical Engineering, Faculty of Technical and Human Sciences, Sapientia University, Tg. Mureş, andras_bandi1994@yahoo.com Manuscript received September 10, 2017, revised October 12, Abstract: The widespread use of smartphones and the ability of these devices to digitize signatures have made it possible to sign electronic documents in this way. In this paper we compared two on-line signature databases in terms of verification performance: the MCYT containing signatures drawn by stylus pen, and MOBISIG containing finger drawn signatures. Performance evaluations were performed using both local and global systems. In the case of global systems, we evaluated the performance of a novel information theory features set. Little improvement was achieved by this feature set. There were large differences between the two databases in terms of performance. Finger drawn signatures collected by mobile device were proved inferior to signatures collected by digitizing tablet and its stylus. Keywords: behavioral biometrics, on-line signature, touchscreen, informationtheory-based features, performance evaluation. 1. Introduction The touchscreen allows the acquisition of signatures, which can be drawn even with the finger. In this paper we study the performance of signature verification system using on-line signatures collected through mobile devices, where the signatures were drawn by finger. State-of-the art global (feature-based) and local (time functions based) verification systems were evaluated for two on-line signature databases: the MCYT and the MOBISIG. The MCYT database [1] was collected by using a high resolution digitizing tablet and its stylus. The MOBISIG database [2] was collected by using an Android tablet and the subjects finger. Huge performance degradation was found in the case of finger-drawn signatures collected on touchscreen compared to stylus-drawn signatures collected on digitizing tablet. The performance degradation characterized both global and /macro

2 12 M. Antal, A. Bandi local systems, but it was higher in the case of the local system. This type of performance degradation has already been reported by Tolosana et al. [3] for e- BioSign biometric database and Martinez et al. [4] for DooDB database. The rest of this paper is organized as follows. In section 2 we review researches which report performance evaluations on finger-drawn signatures. Section 3 presents the local and global systems used for signature verification. First, the local signature verification system with the used time functions is presented, then the new information theory related features are described, and finally the global system with the used features. In section 4 the experiments are described: the databases, the evaluation protocol, and the results in terms of EER (Equal Error Rate) and error curves. Finally, section 5 draws the conclusions. 2. Related work There are only a few studies reporting performance evaluations on finger drawn signatures. One of the first studies reporting performance evaluation results on such signatures is the semester thesis of Pascal Bissig [5]. Unfortunately, the study reports only random forgery type evaluation. The reported results cannot be reproduced because their dataset is not publicly available. The first publicly available database DooDB, containing finger drawn signatures was collected by the Biometric Recognition Group ATVS. Martinez et al. [4] report benchmark results using a local system based on Dynamic Time Warping (DTW) and several time series. Although the random forgery type evaluations resulted in low error rates, these errors are too high for skilled forgery evaluations. In a later study [6], these results were improved by using Gaussian Mixture Models (GMM). Finger drawn signatures collected on mobile devices were studied by Sae-Bae et al. [7]. However, they were only able to report only random forgery evaluation results because the database contains only genuine signatures. This database is also private. A recent study by Tolosana et al.[3] reports benchmark results on the new e- BioSign database, which contains signatures and handwriting information acquired by using several acquisition devices, both digitizing tablets and mobile devices. On two devices data were collected using both stylus and the finger. A significant performance gap was reported between stylus and finger drawn signatures. The performance deterioration is over 10% when using the finger instead of stylus.

3 Finger or Stylus: Their Impact on the Perf. of On-line Sign. Ver. Syst Methods In this section we describe the local and the global systems used for signature verification. 3.1 Local system Local systems work with time-functions extracted from the signatures. In this paper we used the following eight time-functions: x(t), y(t), x (t), y (t), x (t), y (t), p(t) and p (t). The x(t), y(t) are the coordinate time series, x (t), y (t) are the horizontal and vertical speed time series, x (t), y (t) are the horizontal and vertical acceleration time series, and p(t), p (t) are the pressure and its first derivative time series. Fig. 1. shows these time series for a genuine signature from the MOBISIG database. Signatures were compared using the Dynamic Time Warping (DTW)[8] algorithm, which is able to compare time sequences having unequal lengths. We created an eight-dimensional time series for each signature using the eight timefunctions. The distance returned by the DTW algorithm was converted to a 1 similarity score using the formula Similarity(S i, S j ) =, where S 1+DTW(S i,s j ) i and S j are the two 8-dimensional time sequences corresponding to the two compared signatures. Figure 1: Local features (time-functions) for a genuine signature from the MOBISIG database.

4 14 M. Antal, A. Bandi 3.2 Global system Information theory features Permutation entropy features have already been investigated by Rosso et al. [9] for signature verification. They proposed Shannon entropy, statistical complexity, and the Fisher information computed from the Bandt and Pope histogram. This type of histogram was computed from horizontal and vertical coordinates of signatures. We detected two major problems in this publication. The first is that they reported their results erroneously. We have already reported this problem in an earlier publication [10]. Another major problem is regarding the computation of permutation entropy, which omits repeated consecutive values. This deficiency was admitted by the authors in a later paper [11]. We propose to compute Shannon entropy and Fisher information from a new type of histogram which takes into consideration repeated consecutive values. In a time series we have three types of relation between two consecutive points: less, equal, and greater (x i+1 < x i, x i+1 = x i, x i+1 > x i ). For three consecutive points there are nine relations depicted in Fig. 2 (e.g. the 4. relation has the following meaning: x i = x i+1 and x i+1 > x i+2 ). Figure 2: Relations between three consecutive points. Let us consider the following time series X = {1,2,2,3,3,1,2,1,3,4}. In the first step we associate the N = 9 codes (see Fig. 1.) with the consecutive triplets resulting in the following eight coded triplets: {8,6,8,4,3,7,3,9} (1,2,2 8; 2,2,3 6; 2,3,3 8; 3,3,1 4; 3,1,2 3; 1,2,1 7; 2,1,3 3; 1,3,4 9). Then, we compute the normalized frequencies associated with these nine codes (see Eq. 1).

5 Finger or Stylus: Their Impact on the Perf. of On-line Sign. Ver. Syst. 15 f(1) = 0, f(2) = 0, f(3) = 2 8, f(4) = 1 8, f(5) = 0, f(6) = 1 8, f(7) = 1 8, f(8) = 2 8, f(9) = 1 8. (1) Shannon entropy is defined in Eq. 2. N S[P] = p i ln(p i ) (2) i=1 where P = {p i ; i = 1,, N} with i p i = 1 is a discrete probability distribution. The normalized Shannon entropy is defined in Eq. 3. H[P] = S[P], (3) S max where the entropy is maximal when the probabilities are equal, thus S max = ln N. For our time series X we have H[X] = 9 i=1 f(i) ln f(i)) = ln 9 Fisher information was computed using the formula (Eq. 4.) proposed by Rosso [9], but instead of the Bandt & Pope histogram we used our histogram s normalized frequencies. N 1 F[P] = 1 2 [ p i+1 p i ] 2 (4) i= Global features In our global system we used 15 state-of-the-art (see Table 1) and 12 information theory based features (see Table 2). Some of the state-of-the-art features were selected from the set of 100 global features proposed by Fierrez- Aguilar et al. [12] Table 1: State-of-the-art global features. No. Feature description No. Feature description 1 Signature total duration 9 Sign changes of y = dy/dt 2 Average velocity 10 Sign changes of y = dy /dt 3 Average pressure 11 Average v x 4 Max velocity (v max ) 12 Average v y 5 Average pointwise velocity 13 Sign changes of p = dp/dt 6 Average pointwise acceleration 14 Sign changes of p = dp /dt 7 Sign changes of x = dx/dt 15 Number of sampled points 8 Sign changes of x = dx /dt

6 16 M. Antal, A. Bandi Table 2: Information theory based features. No. Feature description No. Feature description 1 Entropy of x(t) 7 Entropy of x (t) 2 Entropy of y(t) 8 Entropy of y (t) 3 Entropy of p(t) 9 Entropy of p (t) 4 Fisher of x(t) 10 Fisher of x (t) 5 Fisher of y(t) 11 Fisher of y (t) 6 Fisher of p(t) 12 Fisher of p(t) In a global system, signatures are represented as feature vectors. Therefore, from each signature a fixed number (D) of features are extracted, which constitute a feature vector: S i = {f 1 i, f 2 i,, f D i }, i = 1.. N. Our global system works as follows: in the training phase we construct a template from a fixed number of N signatures. During template construction, we calculate the maximum and minimum for each feature: {min (f i j ), max (f i j )}, j = 1, D. These values are i=1,n i=1,n used for min-max normalization of the feature vectors belonging to the template. Furthermore, these values are stored together with the template and are used in the verification phase for normalizing the signature to be verified. The normalization was applied for each user separately, in this way we did not take into account other users data. For evaluation we used three types of anomaly detector: Euclidean, Manhattan and k-nearest neighbor (k-nn) detectors. We described these detectors in an earlier paper [13]. 4. Experimental work 4.1 Databases We used the publicly available MCYT-100 subset from the MCYT database, which contains signatures from 100 subjects captured with a digitizing tablet and its stylus [1]. The important details of this database are summarized in Table 3. The second database used in this study is our MOBISIG database [2] which contains signatures from 83 subjects captured with a Nexus 9 tablet with Android 6.0 operating system. There are two important differences between these two databases: (i) the sampling frequency is constant in the case of MCYT database (100 Hz), whereas it is event-based in the case of the MOBISIG database (approximately 60 Hz); (ii) signatures in MCYT database were drawn by using a

7 Finger or Stylus: Their Impact on the Perf. of On-line Sign. Ver. Syst. 17 stylus pen, whereas those in the MOBISIG database were drawn by the fingertip of the subjects. Table 3: Basic characteristics of the MCYT and MOBISIG databases MCYT MOBISIG Device WACOM, INTUOS A6 Nexus 9 tablet, Android 6.0 USB. Drawing Stylus (pen) Finger Frequency 100 Hz (periodic sampling) Approx. 60 Hz (event based sampling) Coordinates x: , y: x: , y: Used raw data x(t), y(t), p(t) x(t), y(t), p(t) Sessions NA 3 Subjects 100 (44 women, 56 men) 83 (34 women, 49 men) Samples 25 genuine, 25 forgery Sess1: 15 genuine Sess2: 15 genuine, 10 forgery Sess3: 15 genuine, 10 forgery 4.2 Evaluation protocol We used the same evaluation protocol for both databases. We evaluated separately the skilled forgery and random forgery cases. Skilled forgery evaluation used the collected skilled forgery samples, whereas random forgery evaluation used randomly selected samples from the dataset. The evaluation was repeated three times using the first 5, 10 and 15 genuine samples for training. The next 20, 15, and 10 genuine samples were used for positive score computations, and all the available skilled forgery samples for negative score computations (skilled forgery case). In the random forgery case for each subject we selected as negative samples the first sample from every other subject (N-1 samples, N is the number of subjects in a database). The same evaluation protocol was followed for both global and local system, except that in the case of the local system, on the MOBISIG database, we always used the 15 genuine samples from the second session for positive score computations. Two types of Equal Error Rates (EER) were computed. Global EER (EER g ) was computed using a common genuine and forgery score lists for all the subjects of a database. This type of EER is based on a global threshold. User specific EER was computed by using user specific threshold (EER u ). In this case both mean (μ) and standard deviation (σ) are reported.

8 18 M. Antal, A. Bandi 4.3 Results Table 4 summarizes the performances for the global system, whereas Table 5 shows the same performances for the local system. These tables present the evaluations in the case of using 15 samples for template creation. The rest of the results can be seen at Table 4: Global system performance results (EER in %) for different feature sets. 15 training samples, 10 positive test samples, 20 negative test samples, and Euclidean detector. Skilled Forgery MOBISIG MCYT EER g EER u : μ(σ) EER g EER u : μ(σ) (1) Inf.th (11.94) (9.17) (2) St. o.t. art (8.48) (6.40) (1)+(2) Both (8.71) (5.79) Random Forgery MOBISIG MCYT EER g EER u : μ(σ) EER g EER u : μ(σ) (1) Inf.th (6.18) (6.51) (2) St. o.t. art (4.74) (3.53) (1)+(2) Both (3.82) (3.45) Table 5: Local system performance results (EER in %) for different time series. 15 training samples. DTW algorithm. Skilled Forgery MOBISIG MCYT EER g EER u : μ(σ) EER g EER u : μ(σ) xy (12.63) (5.02) x y (10.26) (3.88) x y (17.06) (3.78) xyx y x y (11.37) (3.78) xyx y x y pp (9.10) (3.72) Random Forgery MOBISIG MCYT EER g EER u : μ(σ) EER g EER u : μ(σ) xy (1.00) (1.01) x y (0.00) (0.18) x y (3.36) (0.37)

9 Finger or Stylus: Their Impact on the Perf. of On-line Sign. Ver. Syst. 19 xyx y x y (0.09) (0.15) xyx y x y pp (0.63) (0.15) Detection Error Trade-off (DET) curves [14] were created using the Matlab package available at NIST 1. Fig. 3. shows the results obtained for skilled forgery type evaluation of the two databases. In order to show the discrimination ability of a feature set, separate curves are shown for using information theory features (12), state-of-the-art features (15), and both types of features together (27). Fig. 4. shows the same error curves for random forgery type evaluation. Figure 3: Verification performance results for the MCYT and MOBISIG databases. Skilled forgeries case. 1

10 20 M. Antal, A. Bandi Figure 4: Verification performance results for the MCYT and MOBISIG databases. Random Forgeries case. 5. Conclusions In this paper we have compared - in terms of verification performance - two on-line signature databases, the MCYT database, which was collected using a high quality digitizing tablet with a stylus for drawing the signatures, and MOBISIG, which used a mobile device (Nexus 9 tablet with Android 6.0 operating system) and finger for data collection. The performance gaps between the two databases are highly significant, especially for skilled forgery type evaluation. Error rates for finger-drawn signatures are almost twice as high as for stylus-drawn signatures in the case of global systems (skilled forgery case). The local features were more strongly influenced by the signature drawing modality. In this case the error rates for the MOBISIG database were five or six times higher than for the MCYT database. The discrepancy between EER g and EER u has been observed by other researchers [4]. However, in the case of local systems there are unusually large differences. Despite the fact that we have taken into account the successive equal values in the time series, information theoretical features have resulted in little improvement (around 1%) in the performance of the global system.

11 Finger or Stylus: Their Impact on the Perf. of On-line Sign. Ver. Syst. 21 Acknowledgements The work of András BANDI was supported by a Student Research Grant offered by Accenture Romania. The work of Margit ANTAL was partially supported by the Sapientia Foundation Institute for Scientific Research. References [1] J. Ortega-Garcia et al., MCYT baseline corpus: a bimodal biometric database, IEE Proc. - Vision, Image, Signal Process., vol. 150, no. 6, pp , [2] M. Antal, The MOBISIG on-line signature database. Tirgu Mures, [3] R. Tolosana, R. Vera-Rodriguez, J. Fierrez, A. Morales, and J. Ortega- Garcia, Benchmarking desktop and mobile handwriting across COTS devices: The e-biosign biometric database., PLoS One, vol. 12, no. 5, [4] M. Martinez-Diaz, J. Fierrez, and J. Galbally, The DooDB Graphical Password Database: Data Analysis and Benchmark Results, Access, IEEE, vol. 1, pp , [5] P. Bissig, Signature Verification on Finger Operated Touchscreen Devices, ETH Zürich, Distributed Computer Group, [6] M. Martinez-Diaz, J. Fierrez, and J. Galbally, Graphical Password- Based User Authentication With Free-Form Doodles, IEEE Trans. Human-Machine Syst., vol. 46, no. 4, pp , Aug [7] S.-B. Napa and N. Memon, Online Signature Verification on Mobile Devices, Inf. Forensics Secur. IEEE Trans., vol. 9, no. 6, pp , Jun [8] DTW algorithm. [Online]. Available: [Accessed: 12- Oct-2017]. [9] O. A. Rosso, R. Ospina, and A. C. Frery, Classification and Verification of Handwritten Signatures with Time Causal Information Theory Quantifiers, PLoS One, vol. 11, no. 12, [10] M. Antal and L. Z. Szabo, Some remarks on a set of information theory features used for on-line signature verification, in th International Symposium on Digital Forensic and Security (ISDFS), 2017, pp [11] L. Zunino, F. Olivares, F. Scholkmann, and O. A. Rosso, Permutation entropy based time series analysis: Equalities in the input signal can lead

12 22 M. Antal, A. Bandi to false conclusions, Phys. Lett. A, vol. 381, no. 22, pp , Jun [12] J. Fierrez-Aguilar, L. Nanni, J. Lopez-Peñalba, J. Ortega-Garcia, and D. Maltoni, An On-line Signature Verification System Based on Fusion of Local and Global Information, in Proceedings of the 5th International Conference on Audio- and Video-Based Biometric Person Authentication, 2005, pp [13] M. Antal and L. Z. Szabo, On-line verification of finger drawn signatures, in 2016 IEEE 11th International Symposium on Applied Computational Intelligence and Informatics (SACI), 2016, pp [14] A. Martin, G. Doddington, T. Kamm, M. Ordowski, and M. Przybocki, The DET Curve in Assessment of Detection Task Performance, Proc. Eurospeech 97, pp , 1997.

ISSN Vol.07,Issue.12, August-2015, Pages:

ISSN Vol.07,Issue.12, August-2015, Pages: ISSN 2348 2370 Vol.07,Issue.12, August-2015, Pages:2349-2355 www.ijatir.org Online Signature Verification on Mobile Devices MENDRA SHIRISHA 1, P. ASHOK KUMAR 2 1 PG Scholar, Dept of ECE, Samskruti College

More information

Repositorio Institucional de la Universidad Autónoma de Madrid.

Repositorio Institucional de la Universidad Autónoma de Madrid. Repositorio Institucional de la Universidad Autónoma de Madrid https://repositorio.uam.es Esta es la versión de autor de la comunicación de congreso publicada en: This is an author produced version of

More information

Incorporating Touch Biometrics to Mobile One-Time Passwords: Exploration of Digits

Incorporating Touch Biometrics to Mobile One-Time Passwords: Exploration of Digits Incorporating Touch Biometrics to Mobile One-Time Passwords: Exploration of Digits Ruben Tolosana, Ruben Vera-Rodriguez, Julian Fierrez and Javier Ortega-Garcia BiDA Lab- Biometrics and Data Pattern Analytics

More information

On the effects of sampling rate and interpolation in HMM-based dynamic signature verification

On the effects of sampling rate and interpolation in HMM-based dynamic signature verification On the effects of sampling rate and interpolation in HMM-based dynamic signature verification M. Martinez-Diaz, J. Fierrez, M. R. Freire, J. Ortega-Garcia Biometrics Recognition Group - ATVS, Esc. Politecnica

More information

Outline. Incorporating Biometric Quality In Multi-Biometrics FUSION. Results. Motivation. Image Quality: The FVC Experience

Outline. Incorporating Biometric Quality In Multi-Biometrics FUSION. Results. Motivation. Image Quality: The FVC Experience Incorporating Biometric Quality In Multi-Biometrics FUSION QUALITY Julian Fierrez-Aguilar, Javier Ortega-Garcia Biometrics Research Lab. - ATVS Universidad Autónoma de Madrid, SPAIN Loris Nanni, Raffaele

More information

On-line Signature Verification on a Mobile Platform

On-line Signature Verification on a Mobile Platform On-line Signature Verification on a Mobile Platform Nesma Houmani, Sonia Garcia-Salicetti, Bernadette Dorizzi, and Mounim El-Yacoubi Institut Telecom; Telecom SudParis; Intermedia Team, 9 rue Charles Fourier,

More information

Histogram-based matching of GMM encoded features for online signature verification

Histogram-based matching of GMM encoded features for online signature verification Histogram-based matching of GMM encoded features for online signature verification Vivek Venugopal On behalf of Abhishek Sharma,Dr. Suresh Sundaram Multimedia Analytics Laboratory, Electronics and Electrical

More information

A Combined Method for On-Line Signature Verification

A Combined Method for On-Line Signature Verification BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 14, No 2 Sofia 2014 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2014-0022 A Combined Method for On-Line

More information

An Efficient on-line Signature Verification System Using Histogram Features

An Efficient on-line Signature Verification System Using Histogram Features RESEARCH ARTICLE OPEN ACCESS An Efficient on-line Signature Verification System Using Histogram Features Mr.Abilash S 1, Mrs.M.Janani, M.E 2 ME Computer Science and Engineering,Department of CSE, Annai

More information

Evaluation of Brute-Force Attack to Dynamic Signature Verification Using Synthetic Samples

Evaluation of Brute-Force Attack to Dynamic Signature Verification Using Synthetic Samples 29 th International Conference on Document Analysis and Recognition Evaluation of Brute-Force Attack to Dynamic Signature Verification Using Synthetic Samples Javier Galbally, Julian Fierrez, Marcos Martinez-Diaz,

More information

Customized Data Filtering For Mobile Signature Verification

Customized Data Filtering For Mobile Signature Verification Customized Data Filtering For Mobile Signature Verification Seungsoo Nam 1, Hosung Park, Changho Seo 1 and Daeseon Choi 1 Department of Conversions Science, Kongju National University, Korea. Department

More information

Preprocessing and Feature Selection for Improved Sensor Interoperability in Online Biometric Signature Verification

Preprocessing and Feature Selection for Improved Sensor Interoperability in Online Biometric Signature Verification Received April 15, 2015, accepted May 2, 2015, date of publication May 8, 2015, date of current version May 20, 2015. Digital Object Identifier 10.1109/ACCESS.2015.2431493 Preprocessing and Feature Selection

More information

A Study on the Consistency of Features for On-line Signature Verification

A Study on the Consistency of Features for On-line Signature Verification A Study on the Consistency of Features for On-line Signature Verification Center for Unified Biometrics and Sensors State University of New York at Buffalo Amherst, NY 14260 {hlei,govind}@cse.buffalo.edu

More information

Incorporating Image Quality in Multi-Algorithm Fingerprint Verification

Incorporating Image Quality in Multi-Algorithm Fingerprint Verification Incorporating Image Quality in Multi-Algorithm Fingerprint Verification Julian Fierrez-Aguilar 1, Yi Chen 2, Javier Ortega-Garcia 1, and Anil K. Jain 2 1 ATVS, Escuela Politecnica Superior, Universidad

More information

Off-line Signature Verification Using Contour Features

Off-line Signature Verification Using Contour Features Off-line Signature Verification Using Contour Features Almudena Gilperez, Fernando Alonso-Fernandez, Susana Pecharroman, Julian Fierrez, Javier Ortega-Garcia Biometric Recognition Group - ATVS Escuela

More information

Enhanced Online Signature Verification System

Enhanced Online Signature Verification System Enhanced Online Signature Verification System Joslyn Fernandes 1, Nishad Bhandarkar 2 1 F/8, Malinee Apt., Mahakali Caves Road, Andheri east, Mumbai 400093. 2 303, Meena CHS. LTD., 7 bungalows, Andheri

More information

IMPLEMENTATION OF ONLINE SIGNATURE VERIFICATION USING MATLAB AND GSM

IMPLEMENTATION OF ONLINE SIGNATURE VERIFICATION USING MATLAB AND GSM IMPLEMENTATION OF ONLINE SIGNATURE VERIFICATION USING MATLAB AND GSM C. Prem Reddy, D. Santhosh Kumar and K. Srilatha Department of Electronics and Communication Engineering, Sathyabama University, Chennai,

More information

Probabilistic Model for Dynamic Signature Verification System

Probabilistic Model for Dynamic Signature Verification System Research Journal of Applied Sciences, Engineering and Technology 3(): 3-34, SSN: 4-7467 Maxwell Scientific Organization, Submitted: August 6, Accepted: September 7, Published: November 5, Probabilistic

More information

Biometrics Technology: Hand Geometry

Biometrics Technology: Hand Geometry Biometrics Technology: Hand Geometry References: [H1] Gonzeilez, S., Travieso, C.M., Alonso, J.B., and M.A. Ferrer, Automatic biometric identification system by hand geometry, Proceedings of IEEE the 37th

More information

Multimodal Fusion Vulnerability to Non-Zero Effort (Spoof) Imposters

Multimodal Fusion Vulnerability to Non-Zero Effort (Spoof) Imposters Multimodal Fusion Vulnerability to Non-Zero Effort (Spoof) mposters P. A. Johnson, B. Tan, S. Schuckers 3 ECE Department, Clarkson University Potsdam, NY 3699, USA johnsopa@clarkson.edu tanb@clarkson.edu

More information

Online Signature Verification Technique

Online Signature Verification Technique Volume 3, Issue 1 ISSN: 2320-5288 International Journal of Engineering Technology & Management Research Journal homepage: www.ijetmr.org Online Signature Verification Technique Ankit Soni M Tech Student,

More information

Image retrieval based on bag of images

Image retrieval based on bag of images University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2009 Image retrieval based on bag of images Jun Zhang University of Wollongong

More information

An Application of the 2D Gaussian Filter for Enhancing Feature Extraction in Off-line Signature Verification

An Application of the 2D Gaussian Filter for Enhancing Feature Extraction in Off-line Signature Verification 2011 International Conference on Document Analysis and Recognition An Application of the 2D Gaussian Filter for Enhancing Feature Extraction in Off-line Signature Verification Vu Nguyen and Michael Blumenstein

More information

DYNAMIC SIGNATURE VERIFICATION FOR PORTABLE DEVICES

DYNAMIC SIGNATURE VERIFICATION FOR PORTABLE DEVICES UNIVERSIDAD AUTÓNOMA DE MADRID ESCUELA POLITÉCNICA SUPERIOR DYNAMIC SIGNATURE VERIFICATION FOR PORTABLE DEVICES TRABAJO DE FIN DE MÁSTER Author: Marcos Martínez Díaz Ingeniero de Telecomunicación, UAM

More information

Feature Selection by User Specific Feature Mask on a Biometric Hash Algorithm for Dynamic Handwriting

Feature Selection by User Specific Feature Mask on a Biometric Hash Algorithm for Dynamic Handwriting Feature Selection by User Specific Feature Mask on a Biometric Hash Algorithm for Dynamic Handwriting Karl Kümmel, Tobias Scheidat, Christian Arndt and Claus Vielhauer Brandenburg University of Applied

More information

Multimodal Biometrics for Voice and Handwriting

Multimodal Biometrics for Voice and Handwriting Multimodal Biometrics for Voice and Handwriting Claus Vielhauer and Tobias Scheidat School of Computer Science, Department of Technical and Business Information Systems, Advanced Multimedia and Security

More information

OFFLINE SIGNATURE VERIFICATION USING SUPPORT LOCAL BINARY PATTERN

OFFLINE SIGNATURE VERIFICATION USING SUPPORT LOCAL BINARY PATTERN OFFLINE SIGNATURE VERIFICATION USING SUPPORT LOCAL BINARY PATTERN P.Vickram, Dr. A. Sri Krishna and D.Swapna Department of Computer Science & Engineering, R.V. R & J.C College of Engineering, Guntur ABSTRACT

More information

Repositorio Institucional de la Universidad Autónoma de Madrid. https://repositorio.uam.es. Pattern Recognition 40.4, (2007):

Repositorio Institucional de la Universidad Autónoma de Madrid. https://repositorio.uam.es. Pattern Recognition 40.4, (2007): Repositorio Institucional de la Universidad Autónoma de Madrid https://repositorio.uam.es Esta es la versión de autor del artículo publicado en: This is an author produced version of a paper published

More information

OFFLINE SIGNATURE VERIFICATION

OFFLINE SIGNATURE VERIFICATION International Journal of Electronics and Communication Engineering and Technology (IJECET) Volume 8, Issue 2, March - April 2017, pp. 120 128, Article ID: IJECET_08_02_016 Available online at http://www.iaeme.com/ijecet/issues.asp?jtype=ijecet&vtype=8&itype=2

More information

NOVATEUR PUBLICATIONS INTERNATIONAL JOURNAL OF INNOVATIONS IN ENGINEERING RESEARCH AND TECHNOLOGY [IJIERT] ISSN: VOLUME 2, ISSUE 1 JAN-2015

NOVATEUR PUBLICATIONS INTERNATIONAL JOURNAL OF INNOVATIONS IN ENGINEERING RESEARCH AND TECHNOLOGY [IJIERT] ISSN: VOLUME 2, ISSUE 1 JAN-2015 Offline Handwritten Signature Verification using Neural Network Pallavi V. Hatkar Department of Electronics Engineering, TKIET Warana, India Prof.B.T.Salokhe Department of Electronics Engineering, TKIET

More information

Robotic Arm Motion for Verifying Signatures

Robotic Arm Motion for Verifying Signatures Robotic Arm Motion for Verifying Signatures Moises Diaz 1 Miguel A. Ferrer 2 Jose J. Quintana 2 1 Universidad del Atlantico Medio, Spain 2 Instituto para el Desarrollo Tecnológico y la Innovación en Comunicaciones

More information

Performance Analysis of Remote Desktop Virtualization based on Hyper-V versus Remote Desktop Services

Performance Analysis of Remote Desktop Virtualization based on Hyper-V versus Remote Desktop Services MACRo2015 - International Conference on Recent Achievements in Mechatronics, Automation, Computer Science and Robotics Performance Analysis of Remote Desktop Virtualization based on Hyper-V versus Remote

More information

Investigating Multi-touch Gestures as a Novel Biometric Modality

Investigating Multi-touch Gestures as a Novel Biometric Modality Investigating Multi-touch Gestures as a Novel Biometric Modality Napa Sae-Bae, Nasir Memon, and Katherine Isbister Computer Science Department, NYU-Poly Six Metrotech Center, Brooklyn, NY, 11201 Email:

More information

Graphical Password-Based User Authentication With Free-Form Doodles

Graphical Password-Based User Authentication With Free-Form Doodles IEEE TRANSACTIONS ON HUMAN-MACHINE SYSTEMS, VOL. 46, NO. 4, AUGUST 2016 607 Graphical Password-Based User Authentication With Free-Form Doodles Marcos Martinez-Diaz, Julian Fierrez, and Javier Galbally

More information

Mobile signature verification: feature robustness and performance comparison

Mobile signature verification: feature robustness and performance comparison Published in IET Biometrics Received on 20th October 2013 Revised on 1st May 2014 Accepted on 2nd May 2014 ISSN 2047-4938 Mobile signature verification: feature robustness and performance comparison Marcos

More information

Online Handwritten Signature Verification 2

Online Handwritten Signature Verification 2 Chapter 6 1 Online Handwritten Signature Verification 2 Sonia Garcia-Salicetti, Nesma Houmani, Bao Ly-Van, Bernadette Dorizzi, 3 Fernando Alonso-Fernandez, Julian Fierrez, Javier Ortega-Garcia, 4 Claus

More information

K-Nearest Neighbor Classification Approach for Face and Fingerprint at Feature Level Fusion

K-Nearest Neighbor Classification Approach for Face and Fingerprint at Feature Level Fusion K-Nearest Neighbor Classification Approach for Face and Fingerprint at Feature Level Fusion Dhriti PEC University of Technology Chandigarh India Manvjeet Kaur PEC University of Technology Chandigarh India

More information

Fake Biometric System For Fingerprint, Iris, and face using QDA and SIFT

Fake Biometric System For Fingerprint, Iris, and face using QDA and SIFT Fake Biometric System For Fingerprint, Iris, and face using QDA and SIFT 1 Gummadidala Ravi Babu, 2 Nagandla Prasad 1 (M.Tech),DECS, Sai Thirumala NVR engineering College, Narasaraopeta, AP, INDIA. 2 Asst

More information

Hierarchical Shape Primitive Features for Online Text-independent Writer Identification

Hierarchical Shape Primitive Features for Online Text-independent Writer Identification 2009 10th International Conference on Document Analysis and Recognition Hierarchical Shape Primitive Features for Online Text-independent Writer Identification Bangy Li, Zhenan Sun and Tieniu Tan Center

More information

6. Multimodal Biometrics

6. Multimodal Biometrics 6. Multimodal Biometrics Multimodal biometrics is based on combination of more than one type of biometric modalities or traits. The most compelling reason to combine different modalities is to improve

More information

AN ONLINE MOBILE SIGNATURE VERIFICATION SYSTEM BASED ON HOMOMORPHIC ENCRYPTION. Received January 2017; revised May 2017

AN ONLINE MOBILE SIGNATURE VERIFICATION SYSTEM BASED ON HOMOMORPHIC ENCRYPTION. Received January 2017; revised May 2017 International Journal of Innovative Computing, Information and Control ICIC International c 2017 ISSN 1349-4198 Volume 13, Number 5, October 2017 pp. 1623 1635 AN ONLINE MOBILE SIGNATURE VERIFICATION SYSTEM

More information

Semi-Supervised PCA-based Face Recognition Using Self-Training

Semi-Supervised PCA-based Face Recognition Using Self-Training Semi-Supervised PCA-based Face Recognition Using Self-Training Fabio Roli and Gian Luca Marcialis Dept. of Electrical and Electronic Engineering, University of Cagliari Piazza d Armi, 09123 Cagliari, Italy

More information

Fingerprint and on-line signature verification competitions at ICB 2009

Fingerprint and on-line signature verification competitions at ICB 2009 Fingerprint and on-line signature verification competitions at ICB 2009 Bernadette Dorizzi, Raffaele Cappelli, Matteo Ferrara, Dario Maio, Davide Maltoni, Nesma Houmani, Sonia Garcia-Salicetti, Aurelien

More information

Online Handwritten Signature Verification System

Online Handwritten Signature Verification System Master Thesis Electrical Engineering September 2017 Online Handwritten Signature Verification System using Gaussian Mixture Model and Longest Common Sub-Sequences Shashidhar Sanda Sravya Amirisetti Department

More information

FVC2004: Third Fingerprint Verification Competition

FVC2004: Third Fingerprint Verification Competition FVC2004: Third Fingerprint Verification Competition D. Maio 1, D. Maltoni 1, R. Cappelli 1, J.L. Wayman 2, A.K. Jain 3 1 Biometric System Lab - DEIS, University of Bologna, via Sacchi 3, 47023 Cesena -

More information

The Expected Performance Curve: a New Assessment Measure for Person Authentication

The Expected Performance Curve: a New Assessment Measure for Person Authentication R E S E A R C H R E P O R T I D I A P The Expected Performance Curve: a New Assessment Measure for Person Authentication Samy Bengio 1 Johnny Mariéthoz 2 IDIAP RR 03-84 March 10, 2004 submitted for publication

More information

The Expected Performance Curve: a New Assessment Measure for Person Authentication

The Expected Performance Curve: a New Assessment Measure for Person Authentication The Expected Performance Curve: a New Assessment Measure for Person Authentication Samy Bengio Johnny Mariéthoz IDIAP CP 592, rue du Simplon4 192 Martigny, Switzerland {bengio,marietho}@idiap.ch Abstract

More information

A Biometric Authentication System That Automatically Generates Feature Points

A Biometric Authentication System That Automatically Generates Feature Points A Biometric Authentication System That Automatically Generates Feature Points Hiroshi Dozono 1, Youki Inaba 1, Masanori Nakakuni 2 1 Faculty of Science and Engineering, Saga University, 1-Honjyo Saga,

More information

Online Text-independent Writer Identification Based on Temporal Sequence and Shape Codes

Online Text-independent Writer Identification Based on Temporal Sequence and Shape Codes 2009 10th International Conference on Document Analysis and Recognition Online Text-independent Writer Identification Based on Temporal Sequence and Shape Codes Bangy Li and Tieniu Tan Center for Biometrics

More information

Efficient Rectification of Malformation Fingerprints

Efficient Rectification of Malformation Fingerprints Efficient Rectification of Malformation Fingerprints Ms.Sarita Singh MCA 3 rd Year, II Sem, CMR College of Engineering & Technology, Hyderabad. ABSTRACT: Elastic distortion of fingerprints is one of the

More information

HANDWRITTEN signature is a form of personal identification

HANDWRITTEN signature is a form of personal identification 1 Offline signature authenticity verification through unambiguously connected skeleton segments Jugurta Montalvão, Luiz Miranda, and Jânio Canuto arxiv:1711.03082v1 [cs.cv] 8 Nov 2017 Abstract A method

More information

Synthetic Generation of Handwritten Signatures Based on Spectral Analysis

Synthetic Generation of Handwritten Signatures Based on Spectral Analysis Synthetic Generation of Handwritten Signatures Based on Spectral Analysis Javier Galbally, Julian Fierrez, Marcos Martinez-Diaz, and Javier Ortega-Garcia Biometric Recognition Group ATVS, ES, Universidad

More information

Security Evaluation of Online Signature Verification System using Webcams

Security Evaluation of Online Signature Verification System using Webcams Security Evaluation of Online Signature Verification System using Webcams T.Venkatesh Research Scholar, K.L.University, A.P.,India Balaji.S Professor, K.L.University, A.P.,India. Chakravarthy A S N Professor,

More information

Indirect Attacks on Biometric Systems

Indirect Attacks on Biometric Systems Indirect Attacks on Biometric Systems Dr. Julian Fierrez (with contributions from Dr. Javier Galbally) Biometric Recognition Group - ATVS Escuela Politécnica Superior Universidad Autónoma de Madrid, SPAIN

More information

A Novel Extreme Point Selection Algorithm in SIFT

A Novel Extreme Point Selection Algorithm in SIFT A Novel Extreme Point Selection Algorithm in SIFT Ding Zuchun School of Electronic and Communication, South China University of Technolog Guangzhou, China zucding@gmail.com Abstract. This paper proposes

More information

Use of Extreme Value Statistics in Modeling Biometric Systems

Use of Extreme Value Statistics in Modeling Biometric Systems Use of Extreme Value Statistics in Modeling Biometric Systems Similarity Scores Two types of matching: Genuine sample Imposter sample Matching scores Enrolled sample 0.95 0.32 Probability Density Decision

More information

Signature Recognition by Pixel Variance Analysis Using Multiple Morphological Dilations

Signature Recognition by Pixel Variance Analysis Using Multiple Morphological Dilations Signature Recognition by Pixel Variance Analysis Using Multiple Morphological Dilations H B Kekre 1, Department of Computer Engineering, V A Bharadi 2, Department of Electronics and Telecommunication**

More information

Offline Signature verification and recognition using ART 1

Offline Signature verification and recognition using ART 1 Offline Signature verification and recognition using ART 1 R. Sukanya K.Malathy M.E Infant Jesus College of Engineering And Technology Abstract: The main objective of this project is signature verification

More information

AN EFFICIENT BINARIZATION TECHNIQUE FOR FINGERPRINT IMAGES S. B. SRIDEVI M.Tech., Department of ECE

AN EFFICIENT BINARIZATION TECHNIQUE FOR FINGERPRINT IMAGES S. B. SRIDEVI M.Tech., Department of ECE AN EFFICIENT BINARIZATION TECHNIQUE FOR FINGERPRINT IMAGES S. B. SRIDEVI M.Tech., Department of ECE sbsridevi89@gmail.com 287 ABSTRACT Fingerprint identification is the most prominent method of biometric

More information

Handwritten Text Recognition

Handwritten Text Recognition Handwritten Text Recognition M.J. Castro-Bleda, Joan Pasto Universidad Politécnica de Valencia Spain Zaragoza, March 2012 Text recognition () TRABHCI Zaragoza, March 2012 1 / 1 The problem: Handwriting

More information

STUDY OF POSSIBILITY OF ON-PEN MATCHING FOR BIOMETRIC HANDWRITING VERIFICATION

STUDY OF POSSIBILITY OF ON-PEN MATCHING FOR BIOMETRIC HANDWRITING VERIFICATION STUDY OF POSSIBILITY OF ON-PEN MATCHING FOR BIOMETRIC HANDWRITING VERIFICATION Tobias Scheidat, Claus Vielhauer, and Jana Dittmann Faculty of Computer Science, Otto-von-Guericke University Magdeburg, Universitätsplatz

More information

Writer Authentication Based on the Analysis of Strokes

Writer Authentication Based on the Analysis of Strokes Writer Authentication Based on the Analysis of Strokes Kun Yu, Yunhong Wang, Tieniu Tan * NLPR, Institute of Automation, Chinese Academy of Sciences, Beijing, 00080 P.R.China ABSTRACT This paper presents

More information

On the Vulnerability of Palm Vein Recognition to Spoofing Attacks

On the Vulnerability of Palm Vein Recognition to Spoofing Attacks On the Vulnerability of Palm Vein Recognition to Spoofing Attacks Pedro Tome and Sébastien Marcel Idiap Research Institute Centre du Parc, Rue Marconi 9, CH-9 Martigny, Switzerland {pedro.tome, sebastien.marcel}@idiap.ch

More information

TRAINING ON-LINE HANDWRITING RECOGNIZERS USING SYNTHETICALLY GENERATED TEXT

TRAINING ON-LINE HANDWRITING RECOGNIZERS USING SYNTHETICALLY GENERATED TEXT TRAINING ON-LINE HANDWRITING RECOGNIZERS USING SYNTHETICALLY GENERATED TEXT Daniel Martín-Albo, Réjean Plamondon * and Enrique Vidal PRHLT Research Center Universitat Politècnica de València * Laboratoire

More information

ISSN Vol.04,Issue.08, July-2016, Pages:

ISSN Vol.04,Issue.08, July-2016, Pages: WWW.IJITECH.ORG ISSN 2321-8665 Vol.04,Issue.08, July-2016, Pages:1504-1510 Detection and Rectification of Distorted Fingerprints S. SOFIA SULTANA 1, P. D. CHIDHAMBARA RAO 2 1 PG Scholar, Dept of CSE, Kottam

More information

Short Survey on Static Hand Gesture Recognition

Short Survey on Static Hand Gesture Recognition Short Survey on Static Hand Gesture Recognition Huu-Hung Huynh University of Science and Technology The University of Danang, Vietnam Duc-Hoang Vo University of Science and Technology The University of

More information

A Fast Personal Palm print Authentication based on 3D-Multi Wavelet Transformation

A Fast Personal Palm print Authentication based on 3D-Multi Wavelet Transformation A Fast Personal Palm print Authentication based on 3D-Multi Wavelet Transformation * A. H. M. Al-Helali, * W. A. Mahmmoud, and * H. A. Ali * Al- Isra Private University Email: adnan_hadi@yahoo.com Abstract:

More information

Using Support Vector Machines to Eliminate False Minutiae Matches during Fingerprint Verification

Using Support Vector Machines to Eliminate False Minutiae Matches during Fingerprint Verification Using Support Vector Machines to Eliminate False Minutiae Matches during Fingerprint Verification Abstract Praveer Mansukhani, Sergey Tulyakov, Venu Govindaraju Center for Unified Biometrics and Sensors

More information

arxiv: v1 [cs.cv] 5 Oct 2016

arxiv: v1 [cs.cv] 5 Oct 2016 A new algorithm for identity verification based on the analysis of a handwritten dynamic signature arxiv:1610.01578v1 [cs.cv] 5 Oct 2016 Krzysztof Cpałka a, Marcin Zalasiński a,1,, Leszek Rutkowski a a

More information

ISSN Vol.04,Issue.15, October-2016, Pages:

ISSN Vol.04,Issue.15, October-2016, Pages: WWW.IJITECH.ORG ISSN 2321-8665 Vol.04,Issue.15, October-2016, Pages:2901-2907 Detection and Rectification of Distorted Fingerprints P.MOUNIKA 1, S. RAJESHWAR 2 1 PG Scholar, Dept of CSE(SE), Arjun College

More information

Fingerprint Recognition using Texture Features

Fingerprint Recognition using Texture Features Fingerprint Recognition using Texture Features Manidipa Saha, Jyotismita Chaki, Ranjan Parekh,, School of Education Technology, Jadavpur University, Kolkata, India Abstract: This paper proposes an efficient

More information

Keywords Wavelet decomposition, SIFT, Unibiometrics, Multibiometrics, Histogram Equalization.

Keywords Wavelet decomposition, SIFT, Unibiometrics, Multibiometrics, Histogram Equalization. Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure and Reliable

More information

Biometrics Technology: Multi-modal (Part 2)

Biometrics Technology: Multi-modal (Part 2) Biometrics Technology: Multi-modal (Part 2) References: At the Level: [M7] U. Dieckmann, P. Plankensteiner and T. Wagner, "SESAM: A biometric person identification system using sensor fusion ", Pattern

More information

Online Text-Independent Writer Identification Based on Stroke s Probability Distribution Function

Online Text-Independent Writer Identification Based on Stroke s Probability Distribution Function Online Text-Independent Writer Identification Based on Stroke s Probability Distribution Function Bangyu Li, Zhenan Sun, and Tieniu Tan Center for Biometrics and Security Research, National Lab of Pattern

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 5, Sep Oct 2017

International Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 5, Sep Oct 2017 RESEARCH ARTICLE OPEN ACCESS Iris and Palmprint Decision Fusion to Enhance Human Ali M Mayya [1], Mariam Saii [2] PhD student [1], Professor Assistance [2] Computer Engineering Tishreen University Syria

More information

Graph Matching Iris Image Blocks with Local Binary Pattern

Graph Matching Iris Image Blocks with Local Binary Pattern Graph Matching Iris Image Blocs with Local Binary Pattern Zhenan Sun, Tieniu Tan, and Xianchao Qiu Center for Biometrics and Security Research, National Laboratory of Pattern Recognition, Institute of

More information

Handwriting Biometric Hash Attack: A Genetic Algorithm with User Interaction for Raw Data Reconstruction

Handwriting Biometric Hash Attack: A Genetic Algorithm with User Interaction for Raw Data Reconstruction Handwriting Biometric Hash Attack: A Genetic Algorithm with User Interaction for Raw Data Reconstruction Karl Kümmel 1, Claus Vielhauer 1,2, Tobias Scheidat 1,2, Dirk Franke 2, and Jana Dittmann 2 1 Brandenburg

More information

A study of the Graphical User Interfaces for Biometric Authentication System

A study of the Graphical User Interfaces for Biometric Authentication System A study of the Graphical User Interfaces for Biometric Authentication System Hiroshi Dozono 1, Takayuki Inoue 1, Masanori Nakakun 2 i 1 Faculty of Science and Engineering, Saga University, 1-Honjyo Saga,

More information

Dynamic Stroke Information Analysis for Video-Based Handwritten Chinese Character Recognition

Dynamic Stroke Information Analysis for Video-Based Handwritten Chinese Character Recognition Dynamic Stroke Information Analysis for Video-Based Handwritten Chinese Character Recognition Feng Lin and Xiaoou Tang Department of Information Engineering The Chinese University of Hong Kong Shatin,

More information

5. Signature Recognition & Keystroke Dynamics

5. Signature Recognition & Keystroke Dynamics 5. Signature Recognition & Keystroke Dynamics Signature verification is an important research area in the field of authentication of a person as well as documents in e-commerce and banking. We can generally

More information

10-701/15-781, Fall 2006, Final

10-701/15-781, Fall 2006, Final -7/-78, Fall 6, Final Dec, :pm-8:pm There are 9 questions in this exam ( pages including this cover sheet). If you need more room to work out your answer to a question, use the back of the page and clearly

More information

Multiple-Person Tracking by Detection

Multiple-Person Tracking by Detection http://excel.fit.vutbr.cz Multiple-Person Tracking by Detection Jakub Vojvoda* Abstract Detection and tracking of multiple person is challenging problem mainly due to complexity of scene and large intra-class

More information

Accelerometer Gesture Recognition

Accelerometer Gesture Recognition Accelerometer Gesture Recognition Michael Xie xie@cs.stanford.edu David Pan napdivad@stanford.edu December 12, 2014 Abstract Our goal is to make gesture-based input for smartphones and smartwatches accurate

More information

Exploring Similarity Measures for Biometric Databases

Exploring Similarity Measures for Biometric Databases Exploring Similarity Measures for Biometric Databases Praveer Mansukhani, Venu Govindaraju Center for Unified Biometrics and Sensors (CUBS) University at Buffalo {pdm5, govind}@buffalo.edu Abstract. Currently

More information

IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS PART A: SYSTEMS AND HUMANS, VOL. 40, NO. 3, MAY /$26.

IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS PART A: SYSTEMS AND HUMANS, VOL. 40, NO. 3, MAY /$26. IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS PART A: SYSTEMS AND HUMANS, VOL. 40, NO. 3, MAY 200 525 Cancelable Templates for Sequence-Based Biometrics with Application to On-line Signature Recognition

More information

Hill-Climbing Attack to an Eigenface-Based Face Verification System

Hill-Climbing Attack to an Eigenface-Based Face Verification System Hill-limbing Attack to an Eigenface-ased Face Verification System Javier Galbally, Julian Fierrez, and Javier Ortega-Garcia iometric Recognition Group ATVS, EPS, UAM / Francisco Tomas y Valiente 11, 2849

More information

Utilization of Matching Score Vector Similarity Measures in Biometric Systems

Utilization of Matching Score Vector Similarity Measures in Biometric Systems Utilization of Matching Se Vector Similarity Measures in Biometric Systems Xi Cheng, Sergey Tulyakov, and Venu Govindaraju Center for Unified Biometrics and Sensors University at Buffalo, NY, USA xicheng,tulyakov,govind@buffalo.edu

More information

Robust biometric image watermarking for fingerprint and face template protection

Robust biometric image watermarking for fingerprint and face template protection Robust biometric image watermarking for fingerprint and face template protection Mayank Vatsa 1, Richa Singh 1, Afzel Noore 1a),MaxM.Houck 2, and Keith Morris 2 1 West Virginia University, Morgantown,

More information

Gurmeet Kaur 1, Parikshit 2, Dr. Chander Kant 3 1 M.tech Scholar, Assistant Professor 2, 3

Gurmeet Kaur 1, Parikshit 2, Dr. Chander Kant 3 1 M.tech Scholar, Assistant Professor 2, 3 Volume 8 Issue 2 March 2017 - Sept 2017 pp. 72-80 available online at www.csjournals.com A Novel Approach to Improve the Biometric Security using Liveness Detection Gurmeet Kaur 1, Parikshit 2, Dr. Chander

More information

Keystroke Biometric Studies with Short Numeric Input on Smartphones

Keystroke Biometric Studies with Short Numeric Input on Smartphones Keystroke Biometric Studies with Short Numeric Input on Smartphones Michael J. Coakley 1, John V. Monaco 2, and Charles C. Tappert 1 1 Seidenberg School of CSIS, Pace University, Pleasantville, NY 10570

More information

Adapted Fusion Schemes for Multimodal Biometric Authentication. Dr. Julian Fierrez Advisor: Javier Ortega-Garcia. Madrid, November 2006.

Adapted Fusion Schemes for Multimodal Biometric Authentication. Dr. Julian Fierrez Advisor: Javier Ortega-Garcia. Madrid, November 2006. Adapted Fusion Schemes for Multimodal Biometric Authentication Dr. Julian Fierrez Advisor: Javier Ortega-Garcia ATVS Grupo de Reconocimiento Biométrico Escuela Politécnica Superior Universidad Autónoma

More information

Toward Part-based Document Image Decoding

Toward Part-based Document Image Decoding 2012 10th IAPR International Workshop on Document Analysis Systems Toward Part-based Document Image Decoding Wang Song, Seiichi Uchida Kyushu University, Fukuoka, Japan wangsong@human.ait.kyushu-u.ac.jp,

More information

A Distance-Based Classifier Using Dissimilarity Based on Class Conditional Probability and Within-Class Variation. Kwanyong Lee 1 and Hyeyoung Park 2

A Distance-Based Classifier Using Dissimilarity Based on Class Conditional Probability and Within-Class Variation. Kwanyong Lee 1 and Hyeyoung Park 2 A Distance-Based Classifier Using Dissimilarity Based on Class Conditional Probability and Within-Class Variation Kwanyong Lee 1 and Hyeyoung Park 2 1. Department of Computer Science, Korea National Open

More information

The Approach of Mean Shift based Cosine Dissimilarity for Multi-Recording Speaker Clustering

The Approach of Mean Shift based Cosine Dissimilarity for Multi-Recording Speaker Clustering The Approach of Mean Shift based Cosine Dissimilarity for Multi-Recording Speaker Clustering 1 D. Jareena Begum, 2 K Rajendra Prasad, 3 M Suleman Basha 1 M.Tech in SE, RGMCET, Nandyal 2 Assoc Prof, Dept

More information

Keystroke Dynamics Performance Enhancement With Soft Biometrics

Keystroke Dynamics Performance Enhancement With Soft Biometrics Keystroke Dynamics Performance Enhancement With Soft Biometrics Syed Zulkarnain Syed Idrus Universiti Malaysia Perlis 01000 Kangar, Perlis, Malaysia syzul@unimap.edu.my Christophe Rosenberger Université

More information

SYMBOLIC FEATURES IN NEURAL NETWORKS

SYMBOLIC FEATURES IN NEURAL NETWORKS SYMBOLIC FEATURES IN NEURAL NETWORKS Włodzisław Duch, Karol Grudziński and Grzegorz Stawski 1 Department of Computer Methods, Nicolaus Copernicus University ul. Grudziadzka 5, 87-100 Toruń, Poland Abstract:

More information

Hill-Climbing Attack Based on the Uphill Simplex Algorithm and Its Application to Signature Verification

Hill-Climbing Attack Based on the Uphill Simplex Algorithm and Its Application to Signature Verification Hill-Climbing Attack Based on the Uphill Simplex Algorithm and Its Application to Signature Verification Marta Gomez-Barrero, Javier Galbally, Julian Fierrez, and Javier Ortega-Garcia Biometric Recognition

More information

Feature-level Fusion for Effective Palmprint Authentication

Feature-level Fusion for Effective Palmprint Authentication Feature-level Fusion for Effective Palmprint Authentication Adams Wai-Kin Kong 1, 2 and David Zhang 1 1 Biometric Research Center, Department of Computing The Hong Kong Polytechnic University, Kowloon,

More information

Fingerprint Mosaicking by Rolling with Sliding

Fingerprint Mosaicking by Rolling with Sliding Fingerprint Mosaicking by Rolling with Sliding Kyoungtaek Choi, Hunjae Park, Hee-seung Choi and Jaihie Kim Department of Electrical and Electronic Engineering,Yonsei University Biometrics Engineering Research

More information

Comparative Evaluation of Feature Normalization Techniques for Speaker Verification

Comparative Evaluation of Feature Normalization Techniques for Speaker Verification Comparative Evaluation of Feature Normalization Techniques for Speaker Verification Md Jahangir Alam 1,2, Pierre Ouellet 1, Patrick Kenny 1, Douglas O Shaughnessy 2, 1 CRIM, Montreal, Canada {Janagir.Alam,

More information