Skip to main content
Log in

Authentication based on feature of hand-written signature

  • Published:
Journal of Central South University of Technology Aims and scope Submit manuscript

Abstract

The typical features of the coordinate and the curvature as well as the recorded time information were analyzed in the hand-written signatures. In the hand-written signature process 10 biometric features were summarized: the amount of zero speed in direction x and direction y, the amount of zero acceleration in direction x and direction y, the total time of the hand-written signatures, the total distance of the pen traveling in the hand-written process, the frequency for lifting the pen, the time for lifting the pen, the amount of the pressure higher or lower than the threshold values. The formulae of biometric features extraction were summarized. The Gauss function was used to draw the typical information from the above-mentioned biometric features, with which to establish the hidden Markov mode and to train it. The frame of double authentication was proposed by combing the signature with the digital signature. Web service technology was applied in the system to ensure the security of data transmission. The training practice indicates that the hand-written signature verification can satisfy the needs from the office automation systems.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. JAIN A K, HONG L, PANKANTI S. Biometrics identification[J]. Communications of the ACM, 2000, 43(2): 91–98.

    Article  Google Scholar 

  2. SCHNEIER B. Inside risks: The uses and abuses of biometrics[J]. Communications of the ACM, 1999, 42(8): 136–143.

    Article  Google Scholar 

  3. RATHA N K, CONNELL J H, BOK R M. Enhancing security and privacy in biometrics-based authentication systems[J]. IBM Systems Journal, 2001, 40(3): 614–634.

    Article  Google Scholar 

  4. ZHU Shu-ren. The Theory and Application of Behavior Biostatistics Features Authentication[M]. Changsha: National University of Defence Technology, 2002. (in Chinese)

    Google Scholar 

  5. ZHANG Dong-xia. The on-line hand-written characters identify system based on ANN and HMM[J]. Control & Automation, 2005, 21(8): 44–46. (in Chinese)

    Google Scholar 

  6. LU Hao-ru. The summarize of hand-written characters identify[J]. Computer Application and Software, 1994, 11(2): 1–8. (in Chinese)

    Google Scholar 

  7. SABOURIN R, JEAN-PIERRE D. Off-line signature verification using directional PDF and neural networks[J]. Pattern Recognition, 2000, 29(6): 415–424.

    Google Scholar 

  8. MITAL D P, CHOO P H, WEE K L. Computerized signature verification system[J]. IEEE Control Systems Magazine, 1988, 24(5): 54–57.

    Article  Google Scholar 

  9. COLMENAREZ A, FREY B, HUANG T S. A probabilistic framework for embedded face and facial expression recognition[J]. IEEE Computer Vision and Pattern Recognition, 1999, 20(3): 592–597.

    Google Scholar 

  10. COLOMBO C, BIMBO A D. Real time head tracking from the deformation of eye contours using a piecewise affine camera[J]. Pattern Recognition Letters, 1999, 20(7): 721–730.

    Article  Google Scholar 

  11. PLAMONDON R, LORETTE G. Automatic signature verification and writer identification: The state of the art[J]. Pattern Recognition, 2002, 22(4): 107–131.

    Google Scholar 

  12. PLAMONDON R, SARGUR N S. On-line and off-line handwriting recognition: A comprehensive survey[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2003, 22(3): 63–84.

    Google Scholar 

  13. KIAT H K, HEIKO S, LEEDHAM G. Codebooks for signature verification and handwriting recognition[J]. Information Systems, 2002, 22(2): 44–48.

    Google Scholar 

  14. ZHU Shu-ren, DENG Ting-ting. Fuzzy matching routing filter in content-based publish-subscribe[J]. Journal of Central South University: Science and Technology, 2007, 38(1): 138–142. (in Chinese)

    Google Scholar 

  15. ZHU Shu-ren, LI Wei-qin. Design and implementation of self-protection agent for network-based intrusion detection system[J]. Journal of Central South University of Technology, 2003, 10(1): 69–73.

    Article  Google Scholar 

  16. PUDIL P, NOVOVICOVA J, KITTLER J. Floating search methods in feature selection[J]. Pattern Recognition Letters, 1994, 15(11): 1119–1125.

    Article  Google Scholar 

  17. JIN A T B, LING D N C, GOH A. Boihashing: Two factor authentication featuring fingerprint data and tokenised random number[J]. Pattern Recognition, 2004, 37(11): 2245–2255.

    Article  Google Scholar 

  18. MIZUKAMI Y, YOSHIMURA M, MIIKE H. An off-line signature verification system using an extracted displacement function[J]. Pattern Recognition, 2003, 36(1): 91–101.

    Article  MATH  Google Scholar 

  19. JUSTINO E J R, BORTOLOZZI F, SABOURIN R. A comparison of SVM and HMM classifiers in the off-line signature verification[J]. Pattern Recognition Letters, 2005, 26(9): 1377–1385.

    Article  Google Scholar 

  20. BARON R, PLAMONDON R. Acceleration measurement with an instrumented pen for signature verification and handwriting analysis[J]. IEEE Transactions on Instrumentation and Measurement, 1989, 38(6): 1132–1138.

    Article  Google Scholar 

  21. HE Lei, GOVINDARAJU V. A comparative study on the consistency of features in on-line signature verification[J]. Pattern Recognition Letters, 2005, 26(15): 2483–2489.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhu Shu-ren PhD  (朱树人).

Additional information

Foundation item: Project(03JJY3102) supported by the Natural Science Foundation of Human Province, China

Rights and permissions

Reprints and permissions

About this article

Cite this article

Zhu, Sr. Authentication based on feature of hand-written signature. J Cent. South Univ. Technol. 14, 563–567 (2007). https://doi.org/10.1007/s11771-007-0108-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11771-007-0108-y

Key words

Navigation