Advertisement

Gaussian Mixture Models for CHASM Signature Verification

  • Andreas Humm
  • Jean Hennebert
  • Rolf Ingold
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4299)

Abstract

In this paper we report on first experimental results of a novel multimodal user authentication system based on a combined acquisition of online handwritten signature and speech modalities. In our project, the so-called CHASM signatures are recorded by asking the user to utter what he is writing. CHASM actually stands for Combined Handwriting and Speech Modalities where the pen and voice signals are simultaneously recorded. We have built a baseline CHASM signature verification system for which we have conducted a complete experimental evaluation. This baseline system is composed of two Gaussian Mixture Models sub-systems that model independently the pen and voice signal. A simple fusion of both sub-systems is performed at the score level. The evaluation of the verification system is conducted on CHASM signatures taken from the MyIDea multimodal database, accordingly to the protocols provided with the database. This allows us to draw our first conclusions in regards to time variability impact, to skilled versus unskilled forgeries attacks and to some training parameters. Results are also reported for the two sub-systems evaluated separately and for the global system.

Keywords

Gaussian Mixture Model Dynamic Time Warping Time Variability Equal Error Rate Universal Background Model 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Dempster, A.P., Laird, N.M., Rubin, D.B.: Maximum likelihood from incomplete data via the em algorithm. Journal of Royal Statistical Society 39(1), 1–38 (1977)MATHMathSciNetGoogle Scholar
  2. 2.
    Dumas, B., et al.: Myidea - multimodal biometrics database, description of acquisition protocols. In: Proc. of Third COST 275 Workshop (COST 275), Hatfield, UK, October 27-28, pp. 59–62 (2005)Google Scholar
  3. 3.
    Fuentes, M., et al.: Identity verification by fusion of biometric data: On-line signature and speech. In: Proc. COST 275 Workshop on The Advent of Biometrics on the Internet, Rome, Italy, November 2002, pp. 83–86 (2002)Google Scholar
  4. 4.
    Garcia-Salicetti, S., et al.: Biomet: a multimodal person authentication database including face, voice, fingerprint, hand and signature modalities. In: Kittler, J., Nixon, M.S. (eds.) AVBPA 2003. LNCS, vol. 2688. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  5. 5.
    Hennebert, J., Dumas, B., Pugin, C., Evéquoz, F., Humm, A., Petrovska-Delacrétaz, D.: MyIDea home page (2005), http://diuf.unifr.ch/go/myidea
  6. 6.
    Humm, A., Hennebert, J., Ingold, R.: Combined handwriting and speech modalities for user authentication. Technical Report 06-05, University of Fribourg, Department of Informatics (2006)Google Scholar
  7. 7.
    Jain, A., Nandakumar, K., Ross, A.: Score normalization in multimodal biometric systems. Pattern Recognition 38, 2270–2285 (2005)CrossRefGoogle Scholar
  8. 8.
    Krawczyk, S., Jain, A.K.: Securing electronic medical records using biometric authentication. In: Kanade, T., Jain, A., Ratha, N.K. (eds.) AVBPA 2005. LNCS, vol. 3546, pp. 1110–1119. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  9. 9.
    Leclerc, F., Plamondon, R.: Automatic signature verification: the state of the art–1989-1993. Int’l J. Pattern Recog. and Artif. Intel. 8(3), 643–660 (1994)CrossRefGoogle Scholar
  10. 10.
    Lee, L., Berger, T., Aviczer, E.: Reliable on-line human signature verification systems. IEEE Trans. Pattern Anal. and Mach. Intel. 18(6), 643–647 (1996)CrossRefGoogle Scholar
  11. 11.
    Ly-Van, B., Blouet, R., Renouard, S., Garcia-Salicetti, S., Dorizzi, B., Chollet, G.: Signature with text-dependent and text-independent speech for robust identity verification. In: Proc. MMUA, pp. 13–18 (December 2003)Google Scholar
  12. 12.
    Ly Van, B., Garcia-Salicetti, S., Dorizzi, B.: Fusion of hmm’s likelihood and viterbi path for on-line signature verification. In: Biometrics Authentication Workshop, Prague, May 15 (2004)Google Scholar
  13. 13.
    Martin, A., Doddington, G., Kamm, T., Ordowski, M., Przybocki, M.: The det curve in assesment of detection task performance. In: Eurospeech 1997, Rhodes, Greece, pp. 1895–1898 (1997)Google Scholar
  14. 14.
    Rabiner, L., Juang, B.-H.: Fundamentals Of Speech Recognition. Prentice-Hall, Englewood Cliffs (1993)Google Scholar
  15. 15.
    Reynolds, D.: Automatic speaker recognition using gaussian mixture speaker models. The Lincoln Laboratory Journal 8(2), 173–191 (1995)Google Scholar
  16. 16.
    Reynolds, D.: An overview of automatic speaker recognition technology. In: Proc. IEEE ICASSP, vol. 4, pp. 4072–4075 (2002)Google Scholar
  17. 17.
    Richiardi, J., Drygajlo, A.: Gaussian mixture models for on-line signature verification. In: Proc. 2003 ACM SIGMM workshop on Biometrics methods and applications, pp. 115–122 (2003)Google Scholar
  18. 18.
    Vielhauer, C.: Biometric User Authentication for IT Security. Springer, Heidelberg (2006)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Andreas Humm
    • 1
  • Jean Hennebert
    • 1
  • Rolf Ingold
    • 1
  1. 1.Université de FribourgFribourgSwitzerland

Personalised recommendations