Applied Intelligence

, Volume 48, Issue 5, pp 1189–1199 | Cite as

Online signature verification by spectrogram analysis

Article
  • 87 Downloads

Abstract

The concept of electronic signatures emerged decades ago, however they are still not prevalent due to lack of reliable infrastructure. Although the signatures are hard to perfectly imitate, it is simple with an image editing software to copy the original signature and paste on a document. On the other hand, technological developments of touchscreens may create a new era by utilizing simple interfaces which would be recording and validating the electronic signatures with biometric features. Therefore, in this paper, we propose a novel online signature analysis methodology for touchscreens that starts with signing an interface consisting of a signature silhouette. The frequency spectrum along the signing process is stealthily extracted and spectrograms are created by short-time Fourier transforms. Since the spectrograms are found as RGB images, providing valuable information about frequency vs time, grid histograms are formed by quantization for the real signature sample. Given the discrimination purposes, a fuzzified surface is designed for computing closeness of grid histograms.

Keywords

Electronic signature Biometrics Forensics Frequency Fourier transforms Spectrogram Grid histogram 

Notes

Acknowledgements

The work and the contribution were supported by the project “SP/2017 Smart Solutions in Ubiquitous Computing Environments”, University of Hradec Kralove, Faculty of Informatics and Management.

References

  1. 1.
    Baltzakis H, Papamarkos N (2001) A new signature verification technique based on a two-staged neural network classifier. Eng Appl Artif Intell 14:95–103CrossRefGoogle Scholar
  2. 2.
    Biswas S, Kim T, Bhattacharyya D (2010) Features extraction and verification of signature image using clustering technique. Int J Smart Home 4(3):43–56Google Scholar
  3. 3.
    Nguyen V, Blumenstein M, Leedham G (2009) Global features for the off-line signature verification problem. In: 10th international conference on document analysis and recognition, 2009. ICDAR’09. IEEEGoogle Scholar
  4. 4.
    Madasu VK, Lovell BC (2008) An automatic Off-Line signature verification and forgery detection system. In: Pattern recognition technologies and applications, recent advances, pp 63–89Google Scholar
  5. 5.
    Qiao Y, Liu J, Tang X (2007) Offline signature verification using online handwriting registration. In: IEEE conference on computer vision and pattern recognition CVPR ’07. MinneapolisGoogle Scholar
  6. 6.
    Al-Omari YM, Abdullah SNHS, Omar K (2011) State-of-the-art in offline signature verification system. In: 2011 international conference on pattern analysis and intelligent robotics (ICPAIR). IEEEGoogle Scholar
  7. 7.
    Arya MS, Inamdar VS (2010) A preliminary study on various off-line hand written signature verification approaches. Int J Comput Appl 1(9):50–56Google Scholar
  8. 8.
    Ulgen F, Akamatsu N, Iwasa T (1996) The hypercube separation algorithm: a fast and efficient algorithm for on-line handwritten character recognition, vol 6Google Scholar
  9. 9.
    Xiao XH, Leedham G (1999) Signature verification by neural networks with selective attention, vol 11, pp 213–223Google Scholar
  10. 10.
    Pal S, Alireza A, Pal U, Blumenstein M (2011) Off-line signature identification using background and foreground information. In: International conference on digital image computing techniques and applications (DICTA)Google Scholar
  11. 11.
    Wang N (2009) Signature identification based on pixel distribution probability and mean similarity measure with concentric circle segmentation. In: ICCIT’09. Fourth international conference on computer sciences and convergence information technology, 2009Google Scholar
  12. 12.
    Pal S, Pal U, Blumenstein M (2012) Off-line English and Chinese signature identification using foreground and background features. In: The 2012 international joint conference on neural networks (IJCNN). IEEE, pp 1–7Google Scholar
  13. 13.
    Suryawanshi R, Kale S, Pawar R, Kadam S, Ghule VR (2016) Offline signature cognition and verification using artificial neural network. Int J Adv Res Comput Commun Eng 5(3):352–354Google Scholar
  14. 14.
    Nebti S, Boukerram A (2013) Handwritten characters recognition based on nature-inspired computing and neuro-evolution. Appl Intell 38(2):146–159CrossRefGoogle Scholar
  15. 15.
    Hamadene A, Chibani Y (2016) One-class writer-independent offline signature verification using feature dissimilarity thresholding. IEEE Trans Inf Forensics Secur 11(6):1226–1238CrossRefGoogle Scholar
  16. 16.
    Eskander GS, Sabourin R, Granger E (2014) A bio-cryptographic system based on offline signature images. Inf Sci 259:170–191CrossRefGoogle Scholar
  17. 17.
    Tolosana R, Vera-Rodriguez R, Fierrez J, Ortega-Garcia J (2015) Feature-based dynamic signature verification under forensic scenarios. In: 2015 International workshop on biometrics and forensics (IWBF). IEEEGoogle Scholar
  18. 18.
    Plamondon R, Pirlo G, Impedovo D (2014) Online signature verification. In: Handbook of document image processing and recognition. Springer, London, pp 917–947Google Scholar
  19. 19.
    Sharma A, Sundaram S (2016) A novel online signature verification system based on GMM features in a DTW framework. IEEE Trans Inf Forensics Secur. doi: 10.1109/TIFS.2016.2632063
  20. 20.
    Forhad N, Poon B, Amin MA, Yan H (2015) Online signature verification for multi-modal authentication using smart phone. In: Proceedings of the international multiconference of engineers and computer scientistsGoogle Scholar
  21. 21.
    Bhateja AK, Chaudhury S, Saxena PK (2014) A robust online signature based cryptosystem. In: 2014 14th International conference on frontiers in handwriting recognition (ICFHR). IEEEGoogle Scholar
  22. 22.
    Kumar S, BH VP (2015) Embedded platform for online signature verification. IJSEAT 3(4):126–131CrossRefGoogle Scholar
  23. 23.
    Lopez-Garcia M, Ramos-Lara R, Miguel-Hurtado O, Canto-Navarro E (2014) Embedded system for biometric online signature verification. IEEE Trans Ind Inf 10(1):491–501CrossRefGoogle Scholar
  24. 24.
    Sae-Bae N, Memon N (2014) Online signature verification on mobile devices. IEEE Trans Inf Forensics Secur 9(6):933–947CrossRefGoogle Scholar
  25. 25.
    Liu Y, Yang Z, Yang L (2015) Online signature verification based on DCT and sparse representation. IEEE transactions on cybernetics 45(11):2498–2511CrossRefGoogle Scholar
  26. 26.
    Cpaka K, Zalasiński M. (2014) On-line signature verification using vertical signature partitioning. Expert Syst Appl 41(9):4170–4180CrossRefGoogle Scholar
  27. 27.
    Manjunatha KS, Manjunath S, Guru DS, Somashekara MT (2016) Online signature verification based on writer dependent features and classifiers. Pattern Recogn Lett 80:129–136CrossRefGoogle Scholar
  28. 28.
    Alpar O (2016) Frequency spectrograms for biometric keystroke authentication using neural network based classifier. Knowl-Based Syst 116:163–171CrossRefGoogle Scholar
  29. 29.
    Alpar O, Krejcar O (2016) Hidden frequency feature in electronic signatures. In: International conference on industrial, engineering and other applications of applied intelligent systems. Springer International Publishing, Morioka, pp 145–156Google Scholar
  30. 30.
    Alpar O (2014) Keystroke recognition in user authentication using ANN based RGB histogram technique. Eng Appl Artif Intell 32:213–217CrossRefGoogle Scholar
  31. 31.
    Alpar O (2015) Intelligent biometric pattern password authentication systems for touchscreens, vol 42Google Scholar
  32. 32.
    Alpar O, Krejcar O (2015) Biometric swiping on touchscreens. In: Computer information systems and industrial management. Springer International Publishing, pp 193–203Google Scholar
  33. 33.
    Alpar O, Krejcar O (2015) Pattern password authentication based on touching location. In: Intelligent data engineering and automated learning–IDEAL 2015. Springer International Publishing, pp 395–403Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2017

Authors and Affiliations

  1. 1.Center for Basic and Applied Research, Faculty of Informatics and ManagementUniversity of Hradec KraloveHradec KraloveCzech Republic

Personalised recommendations