STUDY OF POSSIBILITY OF ON-PEN MATCHING FOR BIOMETRIC HANDWRITING VERIFICATION

Size: px
Start display at page:

Download "STUDY OF POSSIBILITY OF ON-PEN MATCHING FOR BIOMETRIC HANDWRITING VERIFICATION"

Transcription

1 STUDY OF POSSIBILITY OF ON-PEN MATCHING FOR BIOMETRIC HANDWRITING VERIFICATION Tobias Scheidat, Claus Vielhauer, and Jana Dittmann Faculty of Computer Science, Otto-von-Guericke University Magdeburg, Universitätsplatz 2, Magdeburg, Germany {tobias.scheidat claus.vielhauer ABSTRACT In this article the possibility of a biometric on-pen matching for dynamic handwriting-based user authentication is proposed. The approach is based on a digitizer pen originally designed to sample handwritten notes. In a first step the general ability with respect to recognition accuracy is studied to use the digitizer pen (also de-noted as smart pen) for biometric dynamic handwriting acquisition. The evaluation show that the digitizer pen results in similar outcomes as special online signature tablets regarding the chosen measurement, the equal error rate (EER). The second step considers a conceptional study of embedding an authentication algorithm within smart cards, which could be integrated into the pen hardware, thus allowing for on-card matching. In this second analysis, the focus is to study the feasibility of implementing a reference verification algorithm on-card with respect to its computational complexity. The suggested approach will further allow future authentication scenarios, whereby biometrics, secret knowledge and personal possession can be combined. While the possession aspect is maintained due to the fact that the entire authentication system is integrated in the smart pen and remains in ownership of users, the factor of secret knowledge can be integrated by alternative handwritten contents such as personal identification numbers, generally called semantics. 1. INTRODUCTION AND MOTIVATION The automatic authentication of information and persons is a recent topic in IT security. Currently there are three main methods for automatic user authentication: secret knowledge, personal possession and biometrics. While secret knowledge uses information only known by the authorized person to secure authorization, the personal possession is based on a unique token. A problem of both methods is the fact that the authentication object, knowledge or token, can be lost, theft or taken over to other persons. A solution for this drawback can be provided by biometric user authentication. Here the authentication object is directly linked physically or by behaviour with its owner. Static biometrics are based on a person s body parts (e.g. fingerprint, iris) whereas dynamic biometrics use typical behaviour of a person (e.g. handwriting, speech). A combination of two or more authentication methods or of more than one instance of one method can be used to improve authentication performance and/or security. For example a well known combination of authentication objects is the usage of personal identification number (secret knowledge) and smart card (personal possession) to secure banking activities. Another approach to combine authentication methods, which will be addressed in this paper, is the fusion of possession and biometrics. In related work, Henninger and Franke suggest an on-card matching based on the combination of handwritten signature and smart card, where the reference data are stored on the smart card [1]. The current authentication data is sampled via a sensor device which is connected to the authentication host system. In the next step the biometric information is transferred to the smart card in order to compare reference data and authentication data on the smart card and the decision result is given back to the host system. Using this authentication scheme the reference data never leave the token in possession of its owner. The approaches mentioned above are only a small exemplary selection out of the variety of applications. Contrarily to the approach presented in [1] in this article we suggest a biometric authentication based on integration of the processes of data acquisition, feature extraction and classification on the sensor device, a smart pen, in possession of the user. For our studies we assume that the reference data is stored on the smart pen. One advantage of our method is that reference and authentication data are acquired by the smart pen and will never leave it, solely the authentication result is transferred to the host system. Therefore the study described in this article is parted in two sections: Firstly, we study the possibility to use a digitizer pen for biometric data acquisition which was originally developed to digitize handwritten notes and sketches. Based on sampled dynamic handwriting data, we show that biometric user authentication is feasible for this type of sensor technology. Secondly, we discus the usage of a digitizer pen for on-pen matching based on one reference algorithm, the Biometric Hash method introduced by Vielhauer et al. in [2]. It is assumed that a digitizer pen either provides a microcomputer system for an on-pen matching or that it is possible to integrate additional microcomputer hardware, which can be based on smart card technology. The aim of such on-pen matching is the combination of biometrics and personal possession in order to improve authentication performance and user acceptance. By usage of alternative written content instead of signature (e.g. PIN, password) an additional factor of secret knowledge can be integrated into the described biometric authentication scheme EURASIP 184

2 This paper is structured as follows: In the second section, a general introduction to biometric user authentication and the function of the specific digitizer pen, which has been the focus of our studies, are given. The third section describes the evaluation methodology and database to prove the usability of the smart pen with respect to biometric authentication. To do so, the evaluation results are compared with results determined on commonly used handwriting acquisition hardware for signature verification. The possibility of the application of digitizer pens for on-pen matching is discussed in section four with respect to computational complexity. Finally, the fifth section concludes the article and gives an overview of future work. 2. BIOMETRIC USER AUTHENTICATION General fundamentals of biometric user authentication and a classification scheme for dynamic handwriting acquisition sensors are described in this section, including a short introduction to the smart pen used for these studies. Furthermore the general idea of combining biometrics and personal possession is discussed in the third subsection. 2.1 Fundamentals A biometric system generally operates in two different modes: enrolment and authentication. Before a person can use a biometric system for authentication purposes, he or she has to be registered during the enrolment process. As shown in figure 1, the biometric trait is acquired within an acquisition process and afterwards the feature extraction determines a feature vector which represents the trait within the biometric system. In the next step, the identity of the person is linked to the feature vector which is stored in the system s database as reference data. behavioral/ physiological trait behavioral/ physiological trait enrolment process data acquisition data acquisition feature extraction authentication process feature extraction database matching decision Figure 1 Scheme of enrolment and authentication process result Verification and identification are the two methods for biometric authentication. While verification validates the correctness of a given identity claim by biometric information, identification determines an identity out of a closed group of already registered persons using biometrics. For authentication, the biometric trait is acquired and its feature vector is determined in the same way as during the enrolment process. The matching module compares both, reference data and currently presented authentication data and calculates a similarity value. This matching score is basis for decision whether a person is the one he or she claims to be (verification) or who the person is (identification). 2.2 Sensors for handwriting acquisition A sensor for dynamic handwriting can be based on acquisition functionality which is integrated in the pen, in the writing surface or a hybrid scheme based on both. The pen presented by Plamondon in [3] is an example for a standalone pen, which contains all acquisition components. If a PDA is used as dynamic handwriting acquisition device, its functionality is based only on a pressure sensitive surface. Other devices such as graphical tablets which are developed for computer graphic applications use for example electromagnetic resonance for interaction between special pen and tablet for data acquisition and thus represent hybrid sensors. For the study described in this article, the Logitech io Digital Personal Pen TM (hereafter io pen) was analyzed. Because the io pen needs a special paper for data acquisition it is another hybrid device which bases on both, surface and pen functionality. This combination of digitizer pen and special paper is able to acquire and store the handwriting data autonomously and independently from additional hardware. For post-processing, the data has to be transferred to a host system via cable or wireless connection. Originally, the io pen was developed for collection and transfer of analogue handwriting documents such as notes or sketches into digital data. Complementary to these original design goals, the io pen was examined by us for its ability to be used as biometric acquisition and authentication device. The pen architecture is based on the principle of a ballpoint pen in its appearance and handling with additional sensor for digital handwriting acquisition. Its functionality is based on a special paper printed with a unique grid of points as shown in figure mm 0.1 mm Figure 2 Grid points of special paper The underlying technique of paper and pen was developed by Anoto [4]: A digital camera integrated in the pen head captures a point matrix of 6 x 6. By tiny displacements of the grid points, a determination of pen position is possible and additionally a sensor within the pen determines the pressure during the writing process. The data is processed by an on-pen image processing system, several pages of handwriting can be stored on the pen and transferred to a PC in batch mode. 2.3 Combination of biometrics and possession One advantage of the combination of biometrics and personal possession is that the user keeps the biometric reference data on an own private device, e.g. smart card or even smart pen. For authentication, the user has to present both the device and the biometric trait, whereby the reference data are compared to the current acquired data. A potential attacker would have to steal the token and present a biometric trait in an adequate quality to get positive authentication EURASIP 185

3 One application for this scheme is the protection of data against unauthorized access on USB flash drives or hard disks (e.g. [5]). The data stored on the device is protected by an integrated fingerprint sensor for example. In most cases both the hardware and software used for authentication are integrated within the devices, thus the authentication of the user is carried out independently from any host system and its operating system to which the USB hardware is attached. The biometric on-pen matching suggested here is based on the idea to realize the authentication on the same device which is used for data acquisition. The reference data remains stored on the io pen and only the authentication result is transferred to the host system. Of course the communication of authentication results between io pen and host system requires additional security mechanisms, e.g. based on crytography, which is not be further elaborated in this paper. In application scenarios where each potential user owns an individual digitizer pen, his/her biometric data will never leave the secure environment of a personal possession neither for enrolment process nor for authentication. In addition with a handwritten content based on secret knowledge (e.g. password) the security can be improved further more. 3. USER AUTHENTICATION USING IO PEN DATA The evaluation database for studying the usability of io pen sensor data for biometric purposes in comparison to a dedicated biometric signature tablet are described in this section, along with our evaluation methodology. Further, the results in terms of EER determined on both handwriting sensors devices are presented and discussed. 3.1 Evaluation database The database is composed of two subsets; one containing data sampled from the io pen and the other one is based on a signature tablet. During the data collection sessions for the database, each of these samples has been recorded simultaneously on both sensors by using the io pen for writing on the pressure sensitive signature tablet (multiple-sensor scenario). Due to different technical characteristics of the sensors, the resulting signal data representations are different too. Figure 3 presents two offline representation examples based on the io pen (a) and the signature tablet (b). In the figures, the pressure is visualized by line width (wider lines representing higher pressure levels) and as can be seen, the pressure signal provided by the io pen is higher than the one determined from the signature tablet. The sensors pressure sensitivity is also different: While the io pen reaches the maximum pressure after pen down very fast and keeps the level high, the tablet s pressure fluctuates even more during writing process. The maximum pressure level determined within the writing process for the io pen is 126 (at a max. resolution 126) while the maximum pressure measured by the tablet is 97 (max. resolution 255). Another significant difference is the sampling rate, where the pen has a value of approximately 40 points per second and the signature tablet s rate is 400 points per second. For the samples shown in figure 3 the total number of sampled points is 179 for the io pen and 1409 for the signature tablet. (a) (b) Figure 3 Two representations of one handwriting sample: (a) acquired on io pen, (b) acquired on signature tablet Because of the nature of handwriting, it is possible to change the written content, for example by exchanging a compromised content by another one. Such alternative contents are so-called semantics. In dynamic biometric handwriting, the factor of secret knowledge is already integrated as individual behavior of each person during writing process. This means a possible attacker has to copy the visual appearance of writing as well as the behavior of the real owner during writing process. For improvement of security, further secret knowledge can be added by a secret handwriting content such PIN or password. Therefore we use five different semantics in our test scenario: The Signature was chosen as an individual handwritten pattern of a person which is used since hundreds of years for authentication purpose. The given personal identification number (Given PIN) is the predefined sequence of the five digits Contrary to the later, the Secret PIN is a non-given sequence of five digits in order to provide secret knowledge in handwriting content. The semantic Where is the answer to the question Where are you from?, where users were asked to write city of birth or place of residence. The Symbol denotes an individual sketch of users and thus alos contains secret knowledge by appearance of the sketch as well as in the order of the strokes during writing. 3.2 Evaluation algorithm Basis of evaluation is the Biometric Hash algorithm, in the version as recently suggested in [6]. This method uses five discrete signals based on measurements of horizontal and vertical pen position x(t) and y(t), pen tip pressure p(t) and pen azimuth and altitude angles, Θ(t) and Φ(t) respectively, which are taken from the sensor. Using these five signals, the feature extraction module calculates one statistical feature vector for each handwriting sample. For user verification, stored reference vectors are compared to feature vectors calculated from the actual verification signals against some decision threshold value. While the original method suggests a 69-dimensional feature vector, in this evaluation, seven features based on angle signals have been omitted, because they are not supported by the two sensors, thus our feature vector results in 62 dimensions. For more information about the Biometric Hash algorithm the interested reader is referred to the literature (see [2], [6]). 3.3 Evaluation methodology Currently, the initial database contains data of 15 test subjects, where every donor has given 10 samples of each of the five semantics simultaneously on both sensors. For each person and each semantic, 5 samples were used to build the reference data. The verification was carried out based on the comparison of a user s reference and the remaining 5 samples. For random forgery tests, the references of each of the 2007 EURASIP 186

4 15 users were compared against all verification samples of all other users. In order to compare the authentication performances based on the two sensors data sets, biometric error rates are used. While the false non match rate (FNMR) is determined as ratio between rejected authorized users and entire number of authentication attempts, the false match rate (FMR) is the ratio of the accepted non-authorized users to the total number of attempts. The value where both error rates, FNMR and FMR, are identical, is the so-called equal error rate (EER). In biometric research the EER is a commonly used, straightforward measure to compare the authentication performance of different systems or algorithms, we thus refer to EER in our further comparison of the sensors. 3.4 Test results Table 1 shows the results of the evaluation parted by the EERs for io pen and signature tablet for each semantic class. The best value of each semantic is printed in bold. As can be seen from the table, no sensor seems to lead to significantly better error rates than the other one for all five semantics: While for semantic Signature, the io pen determines an EER of , the EER calculated for signature tablet amounts a better value of Also for Given PIN, the tablet results in better EER (0.1378) than the io pen (0.1678). For the remaining semantics, the verification algorithm determines the better results on the data acquired by io pen. The best overall EER is calculated for semantic Symbol acquired on the io pen (0.0286). The lowest ERR for the signature tablet (0.0354) is determined on the Signature data set. Table 1 EERs determined by single sensors and semantics Single sensors Semantics EER io pen EER signure tablet Signature Given PIN Secret PIN Where Symbol The difference between semantics Given PIN and Secret PIN is the fact, that Given PIN is identical for all users while for Secret PIN, the digits themselves and the order of digits are user specific. Thus, the discriminatory power in case of Given PIN is only based on the individual way of writing of each user, whereas the discriminatory power of Secret PIN is additionally influenced by the chosen digits and their order. Table 1 shows that this additional information leads to a better result for both, io pen and signature tablet (see rows Given PIN and Secret PIN): The EERs of Secret PIN are significantly smaller than ERRs of Given PIN. The overall results discussed in this subsection and presented in table 1, indicate that the concept of using an io pen based handwriting sensor, originally designed to digitize handwritten notes, for biometric verification purposes appears feasible with respect to the recognition accuracy. The authentication performance of the io pen is similar or even better than those of the signature tablet which was especially developed for biometric applications for the reference algorithm used in our experiments. 4. ON-PEN MATCHING After the first step, which has shown that data obtained from io pen can be used for biometric authentication, this section discusses the integration potential of the Biometric Hash verification algorithm within the io pen in order to carry out the verification process on the device and without any help of external systems. Lacking any detailed technical information of the io pen's hardware components, this first analysis based on a similar small computational device - a smart card. In order to study the ability to integrate the Biometric Hash algorithm within a smart card, a comparison of complexity is carried out. As comparative algorithm, an established method implemented on smart cards was selected, the RSA key (1024 bits) generation algorithm. Knowing that this algorithm can be executed on smart cards with a specified runtime, our goal is to estimate the expected runtime for a biometric verification process by comparison of complexity of both algorithms. The complexity measure used for our study is the cyclomatic complexity introduced by McCabe in [7], to measure the complexity of a software module. Based on this measurement, the complexity of both the Biometric Hash algorithm and the RSA key generation method are determined. In our studies, we assume that it is feasible to integrate the Biometric Hash algorithm into a smart card environment if its complexity (significantly) smaller than the complexity of RSA key generation method. The cyclomatic complexity M is determined by measuring the number of linearly independent paths through the source code. It is based on a graph where the instructions of the underlying source code are represented as nodes. If one instruction can be executed immediately after another one, the corresponding nodes of these two instructions are connected by an edge. Based on the graph, the cyclomatic complexity M, can be calculated depending on the number of connected components p. The general case of an arbitrary p is given by the following equation: M 1 (G) = e n + 2p. (1) Within the graph, the number of edges is denoted by e and n is the number of nodes. In the event that p is equal to one, the complexity can be determined by equation (2): M 2 (G) = 1 + b, (2) where b is the total number of conditions and loops (e.g. IF, WHILE, FOR). Based on an IF condition, figure 4 shows an example for the determination of cyclomatic complexities M 1 and M 2, using equations (1) and (2) respectively. The complexity determination of the Biometric Hash algorithm included the algorithms for the three process steps: feature extraction, feature post-processing and matching. In our study, for the Biometric Hash a cyclomatic complexity of approximately 500 was determined, whereas the complexity of a RSA key generation algorithm amounts approximately to Regarding the fact that the complexity is 9 times smaller for the Biometric Hash than for RSA key generation, 2007 EURASIP 187

5 the integration of the handwriting algorithm seems to be possible. Based on these results and the information that the generation of a 1024 bit RSA key will require 2.5 seconds processing time on a exemplary smart card (ST19WK08 [8]), a runtime of approximately 0.3 seconds can be estimated for a verification using the Biometric Hash method. true IF false M 1(G) = e n + 2p M 1(G) = M 1(G) = 2 M 2(G) = 1 + b M 2(G) = M 2(G) = 2 Figure 4 Example for cyclomatic complexity determination 5. CONCLUSIONS AND FUTURE WORK In this paper, a method was proposed to combine biometrics, personal possession and secret knowledge for user authentication purposes, based on the scheme of on-card matching adopted to a smart pen scenario. A digitizer pen was chosen, which was originally developed to digitize handwritten notes and sketches. The data sampled by this pen were used for simulation of biometric verification processes and the results were compared to those determined from data sampled by a special biometric signature tablet using a reference verification algorithm: Biometric Hash. In order to add the factor of secret knowledge, the usage of alternative handwritten contents in addition to signature was suggested. In our first experiments, we observe an EER of for the traditional handwriting semantic Signature by the smart pen. This result is slightly worse than those, obtained by a dedicated signature tablet where, using the same algorithm, the EER yields for signatures. However, for all semantics based on secret knowledge (Secret PIN, Where and Symbol), the io pen based data sets deliver better results compared to the signature tablet. The best verification result was determined on io pen s semantic Symbol with an EER of as compared to for the dedicated signature tablet. These results generally encourage the use of the io pen as biometric handwriting sensor. Further, a conceptional analysis was carried out to study the potential for integration of the reference verification algorithm from our evaluation within the pen hardware. Because of lacking of detailed information about the on-pen computer system, a similar small computer device was chosen for our study: the smart card. Based on the encouraging verification results, a comparative consideration of the complexity of our reference handwriting verification algorithm (Biometric Hash) and a typical method integrated on smart cards (RSA key generation for 1024 bits key length) was carried out. Outcomes of this theoretical comparison are encouraging because the cyclomatic complexity introduced by McCabe in [7] calculated for the Biometric Hash algorithm was 9 times smaller than the complexity of the RSA key generation process. Of course besides a practical implementation of our concept, one important point of future work is to acquire biometric data of additional users to check the results on a more representative database. Particularly, the significance of the differences between the results determined by the two different sensors should be studied in more detail. While in this paper, we have concentrated on on-pen verification, other points of interest in our future work will be design approaches for the on-pen enrollment. Further, the potential of data fusion obtained by io pen and signature tablet, which may be acquired at the same time during the data acquisition, will be studied in our future work. This may allow for increased recognition accuracy and two peer authentication. 6. ACKNOWLEDGEMENTS The work described in this paper has been supported in part by the European Commission through the IST Programme under Contract IST BIOSECURE. The content of this publication is the sole responsibility of the University Magdeburg and their co-authors and can in no way be taken to reflect the views of the European Union. We thank the COST 2101 Action "Biometrics for Identity Documents and Smart Cards" to support the Eusipco 2007 Special Session "Multimodal Biometrics and Smart Cards". We would particularly like to thank Maik Schott for implementation of the interface between io pen and our handwriting acquisition tool and for determination of the cyclomatic complexities. REFERENCES [1] O. Henniger and K. Franke, Biometric User Authentication on Smart Cards by Means of Handwritten Signatures, in Biometric Authentication, First International Conference, ICBA 2004, Hong Kong, China, Proceedings. Lecture Notes in Computer Science Vol Springer, pp , 2004 [2] C. Vielhauer, R. Steinmetz, and A. Mayerhöfer, Biometric Hash based on Statistical Features of Online Signatures, in Proc. of the IEEE International Conference on Pattern Recognition (ICPR), Quebec City, Canada, Vol. 1, pp , [3] R. Plamondon, Apparatus and Method for Digitizing and Segmenting a Handwriting Movement based on Curvilinear and Angular Velocities, United States Patent, No. 5,077,802, Dec. 31, 1991 [4] Anoto, [5] SanDisk, [6] C. Vielhauer, Biometric User Authentication for IT Security: From Fundamentals to Handwriting, Springer, New York, [7] T.J. McCabe, A complexity measurement, IEEE Transactions on Software Engineering, vol. 2, , [8] STMicroelectronics, literature/bd/10357/st19wk08.pdf 2007 EURASIP 188

Feature Selection by User Specific Feature Mask on a Biometric Hash Algorithm for Dynamic Handwriting

Feature Selection by User Specific Feature Mask on a Biometric Hash Algorithm for Dynamic Handwriting Feature Selection by User Specific Feature Mask on a Biometric Hash Algorithm for Dynamic Handwriting Karl Kümmel, Tobias Scheidat, Christian Arndt and Claus Vielhauer Brandenburg University of Applied

More information

Multimodal Biometrics for Voice and Handwriting

Multimodal Biometrics for Voice and Handwriting Multimodal Biometrics for Voice and Handwriting Claus Vielhauer and Tobias Scheidat School of Computer Science, Department of Technical and Business Information Systems, Advanced Multimedia and Security

More information

On-line Signature Verification on a Mobile Platform

On-line Signature Verification on a Mobile Platform On-line Signature Verification on a Mobile Platform Nesma Houmani, Sonia Garcia-Salicetti, Bernadette Dorizzi, and Mounim El-Yacoubi Institut Telecom; Telecom SudParis; Intermedia Team, 9 rue Charles Fourier,

More information

Online Signature Verification Technique

Online Signature Verification Technique Volume 3, Issue 1 ISSN: 2320-5288 International Journal of Engineering Technology & Management Research Journal homepage: www.ijetmr.org Online Signature Verification Technique Ankit Soni M Tech Student,

More information

Handwriting Biometric Hash Attack: A Genetic Algorithm with User Interaction for Raw Data Reconstruction

Handwriting Biometric Hash Attack: A Genetic Algorithm with User Interaction for Raw Data Reconstruction Handwriting Biometric Hash Attack: A Genetic Algorithm with User Interaction for Raw Data Reconstruction Karl Kümmel 1, Claus Vielhauer 1,2, Tobias Scheidat 1,2, Dirk Franke 2, and Jana Dittmann 2 1 Brandenburg

More information

CHAPTER 5 FEASIBILITY STUDY ON 3D BIOMETRIC AUTHENTICATION MECHANISM

CHAPTER 5 FEASIBILITY STUDY ON 3D BIOMETRIC AUTHENTICATION MECHANISM 107 CHAPTER 5 FEASIBILITY STUDY ON 3D BIOMETRIC AUTHENTICATION MECHANISM 5.1 AUTHENTICATION MECHANISMS Authentication is the process of establishing whether a peer is who or what it claims to be in a particular

More information

BIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition

BIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition BIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition Hiren D. Joshi Phd, Dept. of Computer Science Rollwala Computer Centre

More information

Handwriting: Feature Correlation Analysis for Biometric Hashes

Handwriting: Feature Correlation Analysis for Biometric Hashes EURASIP Journal on Applied Signal Processing 2004:4, 542 558 c 2004 Hindawi Publishing Corporation Handwriting: Feature Correlation Analysis for Biometric Hashes Claus Vielhauer Multimedia Communications

More information

An Efficient on-line Signature Verification System Using Histogram Features

An Efficient on-line Signature Verification System Using Histogram Features RESEARCH ARTICLE OPEN ACCESS An Efficient on-line Signature Verification System Using Histogram Features Mr.Abilash S 1, Mrs.M.Janani, M.E 2 ME Computer Science and Engineering,Department of CSE, Annai

More information

A study of the Graphical User Interfaces for Biometric Authentication System

A study of the Graphical User Interfaces for Biometric Authentication System A study of the Graphical User Interfaces for Biometric Authentication System Hiroshi Dozono 1, Takayuki Inoue 1, Masanori Nakakun 2 i 1 Faculty of Science and Engineering, Saga University, 1-Honjyo Saga,

More information

CIS 4360 Secure Computer Systems Biometrics (Something You Are)

CIS 4360 Secure Computer Systems Biometrics (Something You Are) CIS 4360 Secure Computer Systems Biometrics (Something You Are) Professor Qiang Zeng Spring 2017 Previous Class Credentials Something you know (Knowledge factors) Something you have (Possession factors)

More information

Keywords Wavelet decomposition, SIFT, Unibiometrics, Multibiometrics, Histogram Equalization.

Keywords Wavelet decomposition, SIFT, Unibiometrics, Multibiometrics, Histogram Equalization. Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure and Reliable

More information

A Combined Method for On-Line Signature Verification

A Combined Method for On-Line Signature Verification BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 14, No 2 Sofia 2014 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2014-0022 A Combined Method for On-Line

More information

BIOMETRIC TECHNOLOGY: A REVIEW

BIOMETRIC TECHNOLOGY: A REVIEW International Journal of Computer Science and Communication Vol. 2, No. 2, July-December 2011, pp. 287-291 BIOMETRIC TECHNOLOGY: A REVIEW Mohmad Kashif Qureshi Research Scholar, Department of Computer

More information

Gurmeet Kaur 1, Parikshit 2, Dr. Chander Kant 3 1 M.tech Scholar, Assistant Professor 2, 3

Gurmeet Kaur 1, Parikshit 2, Dr. Chander Kant 3 1 M.tech Scholar, Assistant Professor 2, 3 Volume 8 Issue 2 March 2017 - Sept 2017 pp. 72-80 available online at www.csjournals.com A Novel Approach to Improve the Biometric Security using Liveness Detection Gurmeet Kaur 1, Parikshit 2, Dr. Chander

More information

BIOMETRIC MECHANISM FOR ONLINE TRANSACTION ON ANDROID SYSTEM ENHANCED SECURITY OF. Anshita Agrawal

BIOMETRIC MECHANISM FOR ONLINE TRANSACTION ON ANDROID SYSTEM ENHANCED SECURITY OF. Anshita Agrawal BIOMETRIC MECHANISM FOR ENHANCED SECURITY OF ONLINE TRANSACTION ON ANDROID SYSTEM 1 Anshita Agrawal CONTENTS Introduction Biometric Authentication Fingerprints Proposed System Conclusion References 2 INTRODUCTION

More information

An Overview of Biometric Image Processing

An Overview of Biometric Image Processing An Overview of Biometric Image Processing CHAPTER 2 AN OVERVIEW OF BIOMETRIC IMAGE PROCESSING The recognition of persons on the basis of biometric features is an emerging phenomenon in our society. Traditional

More information

Electronic Signature Systems

Electronic Signature Systems Electronic Signature Systems A Guide for IT Personnel Copyright Topaz Systems Inc. All rights reserved. For Topaz Systems, Inc. trademarks and patents, visit www.topazsystems.com/legal. Table of Contents

More information

Signature Verification Why xyzmo offers the leading solution

Signature Verification Why xyzmo offers the leading solution Dynamic (Biometric) Signature Verification The signature is the last remnant of the hand-written document in a digital world, and is considered an acceptable and trustworthy means of authenticating all

More information

6. Multimodal Biometrics

6. Multimodal Biometrics 6. Multimodal Biometrics Multimodal biometrics is based on combination of more than one type of biometric modalities or traits. The most compelling reason to combine different modalities is to improve

More information

A Biometric Authentication System That Automatically Generates Feature Points

A Biometric Authentication System That Automatically Generates Feature Points A Biometric Authentication System That Automatically Generates Feature Points Hiroshi Dozono 1, Youki Inaba 1, Masanori Nakakuni 2 1 Faculty of Science and Engineering, Saga University, 1-Honjyo Saga,

More information

Security Evaluation of Online Signature Verification System using Webcams

Security Evaluation of Online Signature Verification System using Webcams Security Evaluation of Online Signature Verification System using Webcams T.Venkatesh Research Scholar, K.L.University, A.P.,India Balaji.S Professor, K.L.University, A.P.,India. Chakravarthy A S N Professor,

More information

Multifactor Biometric Sketch Authentication

Multifactor Biometric Sketch Authentication Multifactor Biometric Sketch Authentication Arslan Brömme and Stephan Al-Zubi Computer Vision Group Department of Simulation and Graphics Otto-von-Guericke University of Magdeburg, Germany {arslan.broemme,stephan}@isg.cs.uni-magdeburg.de

More information

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1 Enhancing Security in Identity Documents Using QR Code RevathiM K 1, Annapandi P 2 and Ramya K P 3 1 Information Technology, Dr.Sivanthi Aditanar College of Engineering, Tiruchendur, Tamilnadu628215, India

More information

FVC2004: Third Fingerprint Verification Competition

FVC2004: Third Fingerprint Verification Competition FVC2004: Third Fingerprint Verification Competition D. Maio 1, D. Maltoni 1, R. Cappelli 1, J.L. Wayman 2, A.K. Jain 3 1 Biometric System Lab - DEIS, University of Bologna, via Sacchi 3, 47023 Cesena -

More information

Identification, authentication, authorisation. Identification and authentication. Authentication. Authentication. Three closely related concepts:

Identification, authentication, authorisation. Identification and authentication. Authentication. Authentication. Three closely related concepts: Identification, authentication, authorisation Three closely related concepts: Identification and authentication WSPC, Chapter 6 Identification: associating an identity with a subject ( Who are you? ) Authentication:

More information

Shape Feature Extraction for On-line Signature Evaluation

Shape Feature Extraction for On-line Signature Evaluation Shape Feature Extraction for On-line Signature Evaluation Jungpil Shin School of Computer Science and Engineering The University of Aizu Fukushima, Japan e-mail: jpshin@u-aizu.ac.jp Weichen Lin School

More information

CSE 565 Computer Security Fall 2018

CSE 565 Computer Security Fall 2018 CSE 565 Computer Security Fall 2018 Lecture 9: Authentication Department of Computer Science and Engineering University at Buffalo 1 Lecture Outline Definition of entity authentication Solutions password-based

More information

Intruders, Human Identification and Authentication, Web Authentication

Intruders, Human Identification and Authentication, Web Authentication Intruders, Human Identification and Authentication, Web Authentication David Sanchez Universitat Pompeu Fabra 06-06-2006 Lecture Overview Intruders and Intrusion Detection Systems Human Identification

More information

ICT 6541 Applied Cryptography Lecture 8 Entity Authentication/Identification

ICT 6541 Applied Cryptography Lecture 8 Entity Authentication/Identification ICT 6541 Applied Cryptography Lecture 8 Entity Authentication/Identification Hossen Asiful Mustafa Introduction Entity Authentication is a technique designed to let one party prove the identity of another

More information

POLYBIO Multibiometrics Database: Contents, description and interfacing platform

POLYBIO Multibiometrics Database: Contents, description and interfacing platform POLYBIO Multibiometrics Database: Contents, description and interfacing platform Anixi Antonakoudi 1, Anastasis Kounoudes 2 and Zenonas Theodosiou 3 1 Philips College, 4-6 Lamias str. 2001, P.O. Box 28008,

More information

CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018

CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018 CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018 Previous Class Credentials Something you know (Knowledge factors) Something you have (Possession factors)

More information

Biometrics. Overview of Authentication

Biometrics. Overview of Authentication May 2001 Biometrics The process of verifying that the person with whom a system is communicating or conducting a transaction is, in fact, that specific individual is called authentication. Authentication

More information

Biometric Technologies Signature

Biometric Technologies Signature Biometric Signature Solutions Presented at the Open House The Standards Institution of Israel 1 WonderNet The leading provider of digital signature solutions Over 5 million current users Cutting edge technologies:

More information

An Efficient Secure Multimodal Biometric Fusion Using Palmprint and Face Image

An Efficient Secure Multimodal Biometric Fusion Using Palmprint and Face Image International Journal of Computer Science Issues, Vol. 2, 2009 ISSN (Online): 694-0784 ISSN (Print): 694-084 49 An Efficient Secure Multimodal Biometric Fusion Using Palmprint and Face Image Nageshkumar.M,

More information

Keystroke Dynamics: Low Impact Biometric Verification

Keystroke Dynamics: Low Impact Biometric Verification Keystroke Dynamics: Low Impact Biometric Verification Tom Olzak September 2006 Biometrics has long been one of the solutions touted by security vendors to meet multifactor authentication objectives. However,

More information

Restricting Unauthorized Access Using Biometrics In Mobile

Restricting Unauthorized Access Using Biometrics In Mobile Restricting Unauthorized Access Using Biometrics In Mobile S.Vignesh*, M.Narayanan# Under Graduate student*, Assistant Professor# Department Of Computer Science and Engineering, Saveetha School Of Engineering

More information

A Study on the Consistency of Features for On-line Signature Verification

A Study on the Consistency of Features for On-line Signature Verification A Study on the Consistency of Features for On-line Signature Verification Center for Unified Biometrics and Sensors State University of New York at Buffalo Amherst, NY 14260 {hlei,govind}@cse.buffalo.edu

More information

Biometrics problem or solution?

Biometrics problem or solution? Biometrics problem or solution? Summary Biometrics are a security approach that offers great promise, but also presents users and implementers with a number of practical problems. Whilst some of these

More information

The Design of Fingerprint Biometric Authentication on Smart Card for

The Design of Fingerprint Biometric Authentication on Smart Card for The Design of Fingerprint Biometric Authentication on Smart Card for PULAPOT Main Entrance System Computer Science Department, Faculty of Technology Science and Defence Universiti Pertahanan Nasional Malaysia

More information

Touchless Fingerprint recognition using MATLAB

Touchless Fingerprint recognition using MATLAB International Journal of Innovation and Scientific Research ISSN 2351-814 Vol. 1 No. 2 Oct. 214, pp. 458-465 214 Innovative Space of Scientific Research Journals http://www.ijisr.issr-journals.org/ Touchless

More information

Exploring Similarity Measures for Biometric Databases

Exploring Similarity Measures for Biometric Databases Exploring Similarity Measures for Biometric Databases Praveer Mansukhani, Venu Govindaraju Center for Unified Biometrics and Sensors (CUBS) University at Buffalo {pdm5, govind}@buffalo.edu Abstract. Currently

More information

Sumy State University Department of Computer Science

Sumy State University Department of Computer Science Sumy State University Department of Computer Science Lecture 1 (part 2). Access control. What is access control? A cornerstone in the foundation of information security is controlling how resources are

More information

IJESRT. Scientific Journal Impact Factor: (ISRA), Impact Factor: 1.852

IJESRT. Scientific Journal Impact Factor: (ISRA), Impact Factor: 1.852 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY INTELLEGENT APPROACH FOR OFFLINE SIGNATURE VERIFICATION USING CHAINCODE AND ENERGY FEATURE EXTRACTION ON MULTICORE PROCESSOR Raju

More information

Keywords security model, online banking, authentication, biometric, variable tokens

Keywords security model, online banking, authentication, biometric, variable tokens Volume 4, Issue 11, November 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Authentication

More information

NOVATEUR PUBLICATIONS INTERNATIONAL JOURNAL OF INNOVATIONS IN ENGINEERING RESEARCH AND TECHNOLOGY [IJIERT] ISSN: VOLUME 2, ISSUE 1 JAN-2015

NOVATEUR PUBLICATIONS INTERNATIONAL JOURNAL OF INNOVATIONS IN ENGINEERING RESEARCH AND TECHNOLOGY [IJIERT] ISSN: VOLUME 2, ISSUE 1 JAN-2015 Offline Handwritten Signature Verification using Neural Network Pallavi V. Hatkar Department of Electronics Engineering, TKIET Warana, India Prof.B.T.Salokhe Department of Electronics Engineering, TKIET

More information

Performance Analysis of Fingerprint Identification Using Different Levels of DTCWT

Performance Analysis of Fingerprint Identification Using Different Levels of DTCWT 2012 International Conference on Information and Computer Applications (ICICA 2012) IPCSIT vol. 24 (2012) (2012) IACSIT Press, Singapore Performance Analysis of Fingerprint Identification Using Different

More information

: BIOMETRIC AUTHENTICATION TOOL FOR USER IDENTIFICATION

: BIOMETRIC AUTHENTICATION TOOL FOR USER IDENTIFICATION 2006-287: BIOMETRIC AUTHENTICATION TOOL FOR USER IDENTIFICATION Mario Garcia, Texas A&M University-Corpus Christi American Society for Engineering Education, 2006 Page 11.277.1 Biometric Authentication

More information

Integration and Fusion Aspects of Speech and Handwriting Media

Integration and Fusion Aspects of Speech and Handwriting Media Integration and Fusion Aspects of Speech and Handwriting Media Sascha Schimke, Thomas Vogel, Claus Vielhauer, Jana Dittmann Department of Computer Science, ITI Research Group on Multimedia and Security,

More information

Secure and Private Identification through Biometric Systems

Secure and Private Identification through Biometric Systems Secure and Private Identification through Biometric Systems 1 Keshav Rawat, 2 Dr. Chandra Kant 1 Assistant Professor, Deptt. of Computer Science & Informatics, C.U. Himachal Pradesh Dharamshala 2 Assistant

More information

Palmprint Recognition Using Transform Domain and Spatial Domain Techniques

Palmprint Recognition Using Transform Domain and Spatial Domain Techniques Palmprint Recognition Using Transform Domain and Spatial Domain Techniques Jayshri P. Patil 1, Chhaya Nayak 2 1# P. G. Student, M. Tech. Computer Science and Engineering, 2* HOD, M. Tech. Computer Science

More information

Hierarchical Shape Primitive Features for Online Text-independent Writer Identification

Hierarchical Shape Primitive Features for Online Text-independent Writer Identification 2009 10th International Conference on Document Analysis and Recognition Hierarchical Shape Primitive Features for Online Text-independent Writer Identification Bangy Li, Zhenan Sun and Tieniu Tan Center

More information

Implementation of the USB Token System for Fingerprint Verification

Implementation of the USB Token System for Fingerprint Verification Implementation of the USB Token System for Fingerprint Verification Daesung Moon, Youn Hee Gil, Sung Bum Pan, and Yongwha Chung Biometrics Technology Research Team, ETRI, Daejeon, Korea {daesung, yhgil,

More information

Biometric quality for error suppression

Biometric quality for error suppression Biometric quality for error suppression Elham Tabassi NIST 22 July 2010 1 outline - Why measure quality? - What is meant by quality? - What are they good for? - What are the challenges in quality computation?

More information

Multibiometric: Feature Level Fusion Using FKP Multi-Instance biometric

Multibiometric: Feature Level Fusion Using FKP Multi-Instance biometric www.ijcsi.org 252 Multibiometric: Feature Level Fusion Using FKP Multi-Instance biometric Harbi AlMahafzah 1, Mohammad Imran 2, and H.S. Sheshadri 3 1 P.E.T. Foundation Research, University of Mysore,

More information

OFFLINE SIGNATURE VERIFICATION

OFFLINE SIGNATURE VERIFICATION International Journal of Electronics and Communication Engineering and Technology (IJECET) Volume 8, Issue 2, March - April 2017, pp. 120 128, Article ID: IJECET_08_02_016 Available online at http://www.iaeme.com/ijecet/issues.asp?jtype=ijecet&vtype=8&itype=2

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: Fingerprint Recognition using Robust Local Features Madhuri and

More information

Ujma A. Mulla 1 1 PG Student of Electronics Department of, B.I.G.C.E., Solapur, Maharashtra, India. IJRASET: All Rights are Reserved

Ujma A. Mulla 1 1 PG Student of Electronics Department of, B.I.G.C.E., Solapur, Maharashtra, India. IJRASET: All Rights are Reserved Generate new identity from fingerprints for privacy protection Ujma A. Mulla 1 1 PG Student of Electronics Department of, B.I.G.C.E., Solapur, Maharashtra, India Abstract : We propose here a novel system

More information

Online Signature Verification using Dynamic Properties

Online Signature Verification using Dynamic Properties International Journal of Scientific Research in Research Paper. Computer Science and Engineering Vol.5, Issue.6, pp.33-38, December (2017) E-ISSN: 2320-7639 Online Signature Verification using Dynamic

More information

Protecting Information Assets - Week 10 - Identity Management and Access Control. MIS 5206 Protecting Information Assets

Protecting Information Assets - Week 10 - Identity Management and Access Control. MIS 5206 Protecting Information Assets Protecting Information Assets - Week 10 - Identity Management and Access Control MIS5206 Week 10 Identity Management and Access Control Presentation Schedule Test Taking Tip Quiz Identity Management and

More information

FINGERPRINT RECOGNITION FOR HIGH SECURITY SYSTEMS AUTHENTICATION

FINGERPRINT RECOGNITION FOR HIGH SECURITY SYSTEMS AUTHENTICATION International Journal of Electronics, Communication & Instrumentation Engineering Research and Development (IJECIERD) ISSN 2249-684X Vol. 3, Issue 1, Mar 2013, 155-162 TJPRC Pvt. Ltd. FINGERPRINT RECOGNITION

More information

Writer Authentication Based on the Analysis of Strokes

Writer Authentication Based on the Analysis of Strokes Writer Authentication Based on the Analysis of Strokes Kun Yu, Yunhong Wang, Tieniu Tan * NLPR, Institute of Automation, Chinese Academy of Sciences, Beijing, 00080 P.R.China ABSTRACT This paper presents

More information

DOUBLE CHECKING: MULTIMODAL, INTEGRATIVE & CONTINUOUS VERIFICATION TECHNOLOGY OF SIGNATURE & FINGER PRINT IDENTIFICATION

DOUBLE CHECKING: MULTIMODAL, INTEGRATIVE & CONTINUOUS VERIFICATION TECHNOLOGY OF SIGNATURE & FINGER PRINT IDENTIFICATION DOUBLE CHECKING: MULTIMODAL, INTEGRATIVE & CONTINUOUS VERIFICATION TECHNOLOGY OF SIGNATURE & FINGER PRINT IDENTIFICATION 1 V.Rajesh, 2 V.Shyamsundar, 3 R.Naveenraj, 4 Mr.N.Karthik, 1,2,3 UG Scholars, Sri

More information

Authentication Objectives People Authentication I

Authentication Objectives People Authentication I Authentication Objectives People Authentication I Dr. Shlomo Kipnis December 15, 2003 User identification (name, id, etc.) User validation (proof of identity) Resource identification (name, address, etc.)

More information

Opinion 02/2012 on facial recognition in online and mobile services

Opinion 02/2012 on facial recognition in online and mobile services ARTICLE 29 DATA PROTECTION WORKING PARTY 00727/12/EN WP 192 Opinion 02/2012 on facial recognition in online and mobile services Adopted on 22 March 2012 This Working Party was set up under Article 29 of

More information

Biometric Online Signature Verification with added Security of unique ID

Biometric Online Signature Verification with added Security of unique ID ISSN(Online): 23198753 ISSN (Print): 23476710 Biometric Online Signature Verification with added Security of unique ID Anjali Deshpande 1, Shivani Pandita 2 P.G. Student, Department of Electronics and

More information

Fusion of Hand Geometry and Palmprint Biometrics

Fusion of Hand Geometry and Palmprint Biometrics (Working Paper, Dec. 2003) Fusion of Hand Geometry and Palmprint Biometrics D.C.M. Wong, C. Poon and H.C. Shen * Department of Computer Science, Hong Kong University of Science and Technology, Clear Water

More information

Smart Card and Biometrics Used for Secured Personal Identification System Development

Smart Card and Biometrics Used for Secured Personal Identification System Development Smart Card and Biometrics Used for Secured Personal Identification System Development Mădălin Ştefan Vlad, Razvan Tatoiu, Valentin Sgârciu Faculty of Automatic Control and Computers, University Politehnica

More information

Charter Pacific Biometrics Acquisition

Charter Pacific Biometrics Acquisition Charter Pacific Biometrics Acquisition Charter Pacific Biometrics Acquisition Charter Pacific has executed a Share Purchase Agreement to acquire 100% of Microlatch. Charter Pacific/Microlatch has a patent

More information

Offline Signature Verification using Grid based and Centroid based Approach

Offline Signature Verification using Grid based and Centroid based Approach Offline Signature Verification using Grid based and Centroid based Approach Sayantan Roy Department of Computer Science Engineering ISM Dhanbad Jharkhand ABSTRACT Now a day s Signature verification is

More information

A Case Study on Multi-instance Finger Knuckle Print Score and Decision Level Fusions

A Case Study on Multi-instance Finger Knuckle Print Score and Decision Level Fusions International Journal of Scientific & Engineering Research, Volume 3, Issue 11, November-2012 A Case Study on Multi-instance Finger Knuckle Print Score and Decision Level Fusions ABSTRACT Harbi AlMahafzah,

More information

ONLINE SIGNATURE VERIFICATION TECHNIQUES

ONLINE SIGNATURE VERIFICATION TECHNIQUES ONLINE SIGNATURE VERIFICATION TECHNIQUES A THESIS SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF Master of Technology In Telematics and Signal Processing By KIRAN KUMAR GURRALA

More information

MODULE NO.28: Password Cracking

MODULE NO.28: Password Cracking SUBJECT Paper No. and Title Module No. and Title Module Tag PAPER No. 16: Digital Forensics MODULE No. 28: Password Cracking FSC_P16_M28 TABLE OF CONTENTS 1. Learning Outcomes 2. Introduction 3. Nature

More information

Multimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint

Multimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint Multimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint Navdeep Bajwa M.Tech (Student) Computer Science GIMET, PTU Regional Center Amritsar, India Er. Gaurav Kumar M.Tech (Supervisor)

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 5, Sep Oct 2017

International Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 5, Sep Oct 2017 RESEARCH ARTICLE OPEN ACCESS Iris and Palmprint Decision Fusion to Enhance Human Ali M Mayya [1], Mariam Saii [2] PhD student [1], Professor Assistance [2] Computer Engineering Tishreen University Syria

More information

Hardening Fingerprint Authentication Systems Using Intel s SGX Enclave Technology. Interim Progress Report

Hardening Fingerprint Authentication Systems Using Intel s SGX Enclave Technology. Interim Progress Report Hardening Fingerprint Authentication Systems Using Intel s SGX Enclave Technology Interim Progress Report DELL-EMC Envision the Future Competition 2018 Table of Contents List of Figures... 3 List of tables...

More information

On-line One Stroke Character Recognition Using Directional Features

On-line One Stroke Character Recognition Using Directional Features On-line One Stroke Character Recognition Using Directional Features Blind for review process 1 1 Blind for review process Abstract. This paper presents a method based on directional features for recognizing

More information

Biometric Security Roles & Resources

Biometric Security Roles & Resources Biometric Security Roles & Resources Part 1 Biometric Systems Skip Linehan Biometrics Systems Architect, Raytheon Intelligence and Information Systems Outline Biometrics Overview Biometric Architectures

More information

Authentication Methods

Authentication Methods CERT-EU Security Whitepaper 16-003 Authentication Methods D.Antoniou, K.Socha ver. 1.0 20/12/2016 TLP: WHITE 1 Authentication Lately, protecting data has become increasingly difficult task. Cyber-attacks

More information

Signature Verification: Why xyzmo offers the leading solution

Signature Verification: Why xyzmo offers the leading solution Signature Verification: Why xyzmo offers the leading solution Dynamic (Biometric) Signature Verification The signature is the last remnant of the hand-written document in a digital world, and is considered

More information

IJITKM Volume 7 Number 1 December 2013 pp (ISSN )

IJITKM Volume 7 Number 1 December 2013 pp (ISSN ) Biometric Recognition Challenges Dr. Chander Kant, Archana Toky Assistant Professor, Deptt. of computer Science & Appl. K.U. Kurukshetra Faculty, Deptt. Of Computer Science, Govt. College for women, Hisar

More information

A BIOMETRIC FUSION OF HAND AND FINGER VEIN APPROACH FOR AN EFFICIENT PERSONAL AUTHENTICATION IN HEALTH CARE

A BIOMETRIC FUSION OF HAND AND FINGER VEIN APPROACH FOR AN EFFICIENT PERSONAL AUTHENTICATION IN HEALTH CARE A BIOMETRIC FUSION OF HAND AND FINGER VEIN APPROACH FOR AN EFFICIENT PERSONAL AUTHENTICATION IN HEALTH CARE N S Priya 1, A Lenin Fred 2 1 Assistant Professor, Department of Computer Science and Engineering,

More information

Off-line signature verification: a comparison between human and machine performance

Off-line signature verification: a comparison between human and machine performance Off-line signature verification: a comparison between human and machine performance J. Coetzer B.M. Herbst J.A. du Preez Mathematical Sciences, jcoetzer@sun.ac.za Mathematical Sciences, herbst@dip.sun.ac.za

More information

Multimodal Fusion Vulnerability to Non-Zero Effort (Spoof) Imposters

Multimodal Fusion Vulnerability to Non-Zero Effort (Spoof) Imposters Multimodal Fusion Vulnerability to Non-Zero Effort (Spoof) mposters P. A. Johnson, B. Tan, S. Schuckers 3 ECE Department, Clarkson University Potsdam, NY 3699, USA johnsopa@clarkson.edu tanb@clarkson.edu

More information

A Novel Approach to Improve the Biometric Security using Liveness Detection

A Novel Approach to Improve the Biometric Security using Liveness Detection Volume 8, No. 5, May June 2017 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at www.ijarcs.info ISSN No. 0976-5697 A Novel Approach to Improve the Biometric

More information

Computer Security 3e. Dieter Gollmann. Security.di.unimi.it/1516/ Chapter 4: 1

Computer Security 3e. Dieter Gollmann. Security.di.unimi.it/1516/ Chapter 4: 1 Computer Security 3e Dieter Gollmann Security.di.unimi.it/1516/ Chapter 4: 1 Chapter 4: Identification & Authentication Chapter 4: 2 Agenda User authentication Identification & authentication Passwords

More information

Lecture 9. Authentication & Key Distribution

Lecture 9. Authentication & Key Distribution Lecture 9 Authentication & Key Distribution 1 Where are we now? We know a bit of the following: Conventional (symmetric) cryptography Hash functions and MACs Public key (asymmetric) cryptography Encryption

More information

Undergraduate programme in Computer sciences

Undergraduate programme in Computer sciences What is authentication? Security Engineering MSc in Computer Science EIT Master on Security and Privacy Lecture 12 Authentication Massacci Fabio It is the process of verifying a claimed identity by r for

More information

Biometric user authentication on smart cards by means of handwritten signatures

Biometric user authentication on smart cards by means of handwritten signatures Biometric user authentication on smart cards by means of handwritten signatures Olaf Henniger a, Katrin Franke b a Fraunhofer Institute for Secure Telecooperation Rheinstr. 75, 64295 Darmstadt, Germany

More information

Biometric Data Acquisition using MATLAB GUIs

Biometric Data Acquisition using MATLAB GUIs Biometric Data Acquisition using MATLAB GUIs Robert C. Schultz, Robert W. Ives U.S. Naval Academy, Electrical Engineering Department Annapolis, MD 21402-5025 rschultz@usna.edu, ives@usna.edu Abstract -

More information

User Signature Identification and Image Pixel Pattern Verification

User Signature Identification and Image Pixel Pattern Verification Global Journal of Pure and Applied Mathematics. ISSN 0973-1768 Volume 13, Number 7 (2017), pp. 3193-3202 Research India Publications http://www.ripublication.com User Signature Identification and Image

More information

Biometric Cryptosystem Using Online Signatures

Biometric Cryptosystem Using Online Signatures Biometric Cryptosystem Using Online Signatures Alisher Kholmatov and Berrin Yanikoglu Sabanci University Faculty of Engineering and Natural Sciences Istanbul 34956, Turkey alisher@su.sabanciuniv.edu, berrin@sabanciuniv.edu

More information

Digital Signature Generation using Fingerprint, Password and Smart Card

Digital Signature Generation using Fingerprint, Password and Smart Card Digital Signature Generation using Fingerprint, Password and Smart Card FAWAD AHMED and MOHAMMED YAKOOB SIYAL School of Electrical and Electronic Engineering Nanyang Technological University 50 Nanyang

More information

Information Security Identification and authentication. Advanced User Authentication II

Information Security Identification and authentication. Advanced User Authentication II Information Security Identification and authentication Advanced User Authentication II 2016-01-29 Amund Hunstad Guest Lecturer, amund@foi.se Agenda for lecture I within this part of the course Background

More information

Enhanced Online Signature Verification System

Enhanced Online Signature Verification System Enhanced Online Signature Verification System Joslyn Fernandes 1, Nishad Bhandarkar 2 1 F/8, Malinee Apt., Mahakali Caves Road, Andheri east, Mumbai 400093. 2 303, Meena CHS. LTD., 7 bungalows, Andheri

More information

Role of Biometrics in Cybersecurity. Sam Youness

Role of Biometrics in Cybersecurity. Sam Youness Role of Biometrics in Cybersecurity Sam Youness Agenda Biometrics basics How it works Biometrics applications and architecture Biometric devices Biometrics Considerations The road ahead The Basics Everyday

More information

Zodiac Max OPERATOR GUIDE

Zodiac Max OPERATOR GUIDE Zodiac Max OPERATOR GUIDE February 2015 Table of Contents INTRODUCTION... 5 PC Requirements... 6 USB Driver Installation... 7 ZODIAC SINGLE-STATION SOFTWARE... 8 Software Installation... 8 Communications

More information

Evaluation of Brute-Force Attack to Dynamic Signature Verification Using Synthetic Samples

Evaluation of Brute-Force Attack to Dynamic Signature Verification Using Synthetic Samples 29 th International Conference on Document Analysis and Recognition Evaluation of Brute-Force Attack to Dynamic Signature Verification Using Synthetic Samples Javier Galbally, Julian Fierrez, Marcos Martinez-Diaz,

More information

An Algorithm for Feature Level Fusion in Multimodal Biometric System

An Algorithm for Feature Level Fusion in Multimodal Biometric System An Algorithm for Feature Level Fusion in Multimodal Biometric System 1 S.K.Bhardwaj 1 Research Scholar, Singhania University, Jhunjhunu, Rajasthan (India) Abstract The increasing demand for high secure

More information

BioPassport TM Enterprise Server

BioPassport TM Enterprise Server BioPassport TM Enterprise Server The BioPassport Enterprise AD Server is the intelligence behind all of IdentAlink s biometric modules. Password management for a network or application can cost hundreds

More information