Advertisement

Authentication based on feature of hand-written signature

  • Zhu Shu-ren  (朱树人)Email author
Article

Abstract

The typical features of the coordinate and the curvature as well as the recorded time information were analyzed in the hand-written signatures. In the hand-written signature process 10 biometric features were summarized: the amount of zero speed in direction x and direction y, the amount of zero acceleration in direction x and direction y, the total time of the hand-written signatures, the total distance of the pen traveling in the hand-written process, the frequency for lifting the pen, the time for lifting the pen, the amount of the pressure higher or lower than the threshold values. The formulae of biometric features extraction were summarized. The Gauss function was used to draw the typical information from the above-mentioned biometric features, with which to establish the hidden Markov mode and to train it. The frame of double authentication was proposed by combing the signature with the digital signature. Web service technology was applied in the system to ensure the security of data transmission. The training practice indicates that the hand-written signature verification can satisfy the needs from the office automation systems.

Key words

behavioral biostatistics feature hand-written signature hidden Markov mode signature verification 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [1]
    JAIN A K, HONG L, PANKANTI S. Biometrics identification[J]. Communications of the ACM, 2000, 43(2): 91–98.Google Scholar
  2. [2]
    SCHNEIER B. Inside risks: The uses and abuses of biometrics[J]. Communications of the ACM, 1999, 42(8): 136–143.Google Scholar
  3. [3]
    RATHA N K, CONNELL J H, BOK R M. Enhancing security and privacy in biometrics-based authentication systems[J]. IBM Systems Journal, 2001, 40(3): 614–634.Google Scholar
  4. [4]
    ZHU Shu-ren. The Theory and Application of Behavior Biostatistics Features Authentication[M]. Changsha: National University of Defence Technology, 2002. (in Chinese)Google Scholar
  5. [5]
    ZHANG Dong-xia. The on-line hand-written characters identify system based on ANN and HMM[J]. Control & Automation, 2005, 21(8): 44–46. (in Chinese)Google Scholar
  6. [6]
    LU Hao-ru. The summarize of hand-written characters identify[J]. Computer Application and Software, 1994, 11(2): 1–8. (in Chinese)Google Scholar
  7. [7]
    SABOURIN R, JEAN-PIERRE D. Off-line signature verification using directional PDF and neural networks[J]. Pattern Recognition, 2000, 29(6): 415–424.Google Scholar
  8. [8]
    MITAL D P, CHOO P H, WEE K L. Computerized signature verification system[J]. IEEE Control Systems Magazine, 1988, 24(5): 54–57.Google Scholar
  9. [9]
    COLMENAREZ A, FREY B, HUANG T S. A probabilistic framework for embedded face and facial expression recognition[J]. IEEE Computer Vision and Pattern Recognition, 1999, 20(3): 592–597.Google Scholar
  10. [10]
    COLOMBO C, BIMBO A D. Real time head tracking from the deformation of eye contours using a piecewise affine camera[J]. Pattern Recognition Letters, 1999, 20(7): 721–730.Google Scholar
  11. [11]
    PLAMONDON R, LORETTE G. Automatic signature verification and writer identification: The state of the art[J]. Pattern Recognition, 2002, 22(4): 107–131.Google Scholar
  12. [12]
    PLAMONDON R, SARGUR N S. On-line and off-line handwriting recognition: A comprehensive survey[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2003, 22(3): 63–84.Google Scholar
  13. [13]
    KIAT H K, HEIKO S, LEEDHAM G. Codebooks for signature verification and handwriting recognition[J]. Information Systems, 2002, 22(2): 44–48.Google Scholar
  14. [14]
    ZHU Shu-ren, DENG Ting-ting. Fuzzy matching routing filter in content-based publish-subscribe[J]. Journal of Central South University: Science and Technology, 2007, 38(1): 138–142. (in Chinese)Google Scholar
  15. [15]
    ZHU Shu-ren, LI Wei-qin. Design and implementation of self-protection agent for network-based intrusion detection system[J]. Journal of Central South University of Technology, 2003, 10(1): 69–73.Google Scholar
  16. [16]
    PUDIL P, NOVOVICOVA J, KITTLER J. Floating search methods in feature selection[J]. Pattern Recognition Letters, 1994, 15(11): 1119–1125.Google Scholar
  17. [17]
    JIN A T B, LING D N C, GOH A. Boihashing: Two factor authentication featuring fingerprint data and tokenised random number[J]. Pattern Recognition, 2004, 37(11): 2245–2255.Google Scholar
  18. [18]
    MIZUKAMI Y, YOSHIMURA M, MIIKE H. An off-line signature verification system using an extracted displacement function[J]. Pattern Recognition, 2003, 36(1): 91–101.zbMATHGoogle Scholar
  19. [19]
    JUSTINO E J R, BORTOLOZZI F, SABOURIN R. A comparison of SVM and HMM classifiers in the off-line signature verification[J]. Pattern Recognition Letters, 2005, 26(9): 1377–1385.Google Scholar
  20. [20]
    BARON R, PLAMONDON R. Acceleration measurement with an instrumented pen for signature verification and handwriting analysis[J]. IEEE Transactions on Instrumentation and Measurement, 1989, 38(6): 1132–1138.Google Scholar
  21. [21]
    HE Lei, GOVINDARAJU V. A comparative study on the consistency of features in on-line signature verification[J]. Pattern Recognition Letters, 2005, 26(15): 2483–2489.Google Scholar

Copyright information

© Central South University Press, Sole distributor outside Mainland China: Springer 2007

Authors and Affiliations

  1. 1.School of Information ScienceGuangdong University of Business StudiesGuangzhouChina
  2. 2.School of ComputerBeijing University of Aeronautics and AstronauticsBeijingChina

Personalised recommendations