Skip to main content

Presentation Attacks in Signature Biometrics: Types and Introduction to Attack Detection

  • Chapter
  • First Online:
Handbook of Biometric Anti-Spoofing

Abstract

Authentication applications based on the use of biometric methods have received a lot of interest during the last years due to the breathtaking results obtained using personal traits such as face or fingerprint. However, it is important not to forget that these biometric systems have to withstand different types of possible attacks. This work carries out an analysis of different Presentation Attack (PA) scenarios for on-line handwritten signature verification. The main contributions of the present work are: (1) short overview of representative methods for Presentation Attack Detection (PAD) in signature biometrics; (2) to describe the different levels of PAs existing in on-line signature verification regarding the amount of information available to the attacker, as well as the training, effort and ability to perform the forgeries; and (3) to report an evaluation of the system performance in signature biometrics under different PAs and writing tools considering freely available signature databases. Results obtained for both BiosecurID and e-BioSign databases show the high impact on the system performance regarding not only the level of information that the attacker has but also the training and effort performing the signature. This work is in line with recent efforts in the Common Criteria standardization community towards security evaluation of biometric systems, where attacks are rated depending on, among other factors, time spent, effort and expertise of the attacker, as well as the information available and used from the target being attacked.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://atvs.ii.uam.es/atvs/eBioSign-DS1.html.

  2. 2.

    https://atvs.ii.uam.es/atvs/biosecurid_sonof_db.html.

References

  1. Meng W, Wong DS, Furnell S, Zhou J (2015) Surveying the development of biometric user authentication on mobile phones. IEEE Commun Surv Tutor 17:1268–1293

    Article  Google Scholar 

  2. Zhang DD (2013) Automated biometrics: technologies and systems. Springer Science & Business Media, Berlin

    Google Scholar 

  3. Jain AK, Nandakumar K, Ross A (2016) 50 Years of biometric research: accomplishments, challenges, and opportunities. Pattern Recognit Lett 79:80–105

    Article  Google Scholar 

  4. Taigman Y, Yang M, Ranzato MA, Wolf L (2014) Deepface: closing the gap to human-level performance in face verification. In: The IEEE conference on computer vision and pattern recognition (CVPR)

    Google Scholar 

  5. Impedovo D, Pirlo G (2008) Automatic signature verification: the state of the art. IEEE Trans Syst Man Cybern Part C (Appl Rev) 38(5):609–635

    Article  Google Scholar 

  6. Hadid A, Evans N, Marcel S, Fierrez J (2015) Biometrics systems under spoofing attack: an evaluation methodology and lessons learned. IEEE Signal Process Mag 32(5):20–30

    Article  Google Scholar 

  7. Tolosana R, Vera-Rodriguez R, Ortega-Garcia J, Fierrez J (2015) Preprocessing and feature selection for improved sensor interoperability in online biometric signature verification. IEEE Access 3:478–489

    Article  Google Scholar 

  8. Tolosana R, Vera-Rodriguez R, Fierrez J, Morales A, Ortega-Garcia J (2017) Benchmarking desktop and mobile handwriting across COTS devices: the e-Biosign biometric database. PLoS ONE 12(5):e0176792

    Article  Google Scholar 

  9. Galbally J, Gomez-Barrero M, Ross A (2017) Accuracy evaluation of handwritten signature verification: rethinking the random-skilled forgeries dichotomy. In Proceedings of IEEE international joint conference on biometrics, pp 302–310

    Google Scholar 

  10. Gomez-Barrero M, Galbally J, Morales A, Fierrez J (2017) Privacy-preserving comparison of variable-length data with application to biometric template protection. IEEE Access 5:8606–8619

    Article  Google Scholar 

  11. Tolosana R, Vera-Rodriguez R, Ortega-Garcia J, Fierrez J (2015) Increasing the robustness of biometric templates for dynamic signature biometric systems. In: Proceedings of 49th annual international Carnahan conference on security technology

    Google Scholar 

  12. Nagel RN, Rosenfeld A (1977) Computer detection of freehand forgeries. IEEE Trans Comput C-26:895–905

    Article  Google Scholar 

  13. Eden M (1961) On the formalization of handwriting. Structure of language and its mathematical aspects (Proceedings of symposia in applied mathematics), vol 12. American Mathematical Society, Providence, pp 83–88

    Google Scholar 

  14. Guo JK, Doermann D, Rosenfeld A (2001) Forgery detection by local correspondence. Int J Pattern Recognit Artif Intell 15

    Article  Google Scholar 

  15. Madasu VK, Lovell BC (2008) An automatic off-line signature verification and forgery detection system. In: Verma B, Blumenstein M (eds) Pattern recognition technologies and applications: recent advances. IGI Global, USA, pp 63–88

    Google Scholar 

  16. Brault JJ, Plamondon R (1993) A complexity measure of handwritten curves: modeling of dynamic signature forgery. IEEE Trans Syst Man Cybern 23:400–413

    Article  Google Scholar 

  17. Gomez-Barrero M, Galbally J, Fierrez J, Ortega-Garcia J, Plamondon R (2015) Enhanced on-line signature verification based on skilled forgery detection using sigma-lognormal features. In: Proceedings of IEEE/IAPR international conference on biometrics. ICB, pp 501–506

    Google Scholar 

  18. Sanchez-Reillo R, Quiros-Sandoval HC, Goicochea-Telleria I, Ponce-Hernandez W (2017) Improving presentation attack detection in dynamic handwritten signature biometrics. IEEE Access 5:20463–20469

    Article  Google Scholar 

  19. O’Reilly C, Plamondon R (2009) Development of a sigma-lognormal representation for on-line signatures. Pattern Recognit 42(12):3324–3337

    Article  Google Scholar 

  20. Fierrez J, Morales A, Vera-Rodriguez R, Camacho D (2018) Multiple classifiers in biometrics. part 1: fundamentals and review. Inf Fusion 44:57–64

    Article  Google Scholar 

  21. Doddington G, Liggett W, Martin A, Przybocki M, Reynolds D (1998) Sheeps, goats, lambs and wolves: a statistical analysis of speaker performance in the NIST 1998 speaker recognition evaluation. In: Proceedings of international conference on spoken language processing

    Google Scholar 

  22. Yager N, Dunstone T (2010) The biometric menagerie. IEEE Trans Pattern Anal Mach Intell 32(2):220–230

    Article  Google Scholar 

  23. Houmani N, Garcia-Salicetti S (2016) On hunting animals of the biometric menagerie for online signature. PLoS ONE 11(4):e0151691

    Article  Google Scholar 

  24. Ortega-Garcia J, et al. (2003) MCYT baseline corpus: a bimodal biometric database. IEE Proc Vis Image Signal Process Spec Issue Biom Internet 150(6):395–401

    Article  Google Scholar 

  25. Ballard L, Lopresti D, Monroe F (2007) Forgery quality and its implication for behavioural biometric security. IEEE Trans Syst Man Cybern Part B 37(5):1107–1118

    Article  Google Scholar 

  26. Vielhauer C, Zbisch F (2003) A test tool to support brute-force online and offline signature forgery tests on mobile devices. In: Proceedings of international conference on multimedia and expo, vol 3, pp 225–228

    Google Scholar 

  27. Alonso-Fernandez F, Fierrez J, Gilperez A, Galbally J, Ortega-Garcia J (2009) Robustness of signature verification systems to imitators with increasing skills. In: Proceedings of 10th international conference on document analysis and recognition, pp 728–732

    Google Scholar 

  28. Ferrer MA, Diaz M, Carmona-Duarte C, Morales A (2017) A behavioral handwriting model for static and dynamic signature synthesis. IEEE Trans Pattern Anal Mach Intell 39(6):1041–1053

    Article  Google Scholar 

  29. Fierrez-Aguilar J, Alonso-Hermira N, Moreno-Marquez G, Ortega-Garcia J (2004) An off-line signature verification system based on fusion of local and global information. In: Proceedings of European conference on computer vision, workshop on biometric authentication, BIOAW, LNCS, vol. 3087. Springer, Berlin, pp 295–306

    Chapter  Google Scholar 

  30. Tolosana R, Vera-Rodriguez R, Ortega-Garcia J, Fierrez J (2015) Update strategies for HMM-based dynamic signature biometric systems. In: Proceedings of 7th IEEE international workshop on information forensics and security, WIFS

    Google Scholar 

  31. Fierrez J, Galbally J, Ortega-Garcia J, et al. (2010) BiosecurID: a multimodal biometric database. Pattern Anal Appl 13(2):235–246

    Article  MathSciNet  Google Scholar 

  32. Galbally J, Diaz-Cabrera M, Ferrer MA, Gomez-Barrero M, Morales A, Fierrez J (2015) On-line signature recognition through the combination of real dynamic data and synthetically generated static data. Pattern Recognit 48:2921–2934

    Article  Google Scholar 

  33. Martinez-Diaz M, Fierrez J, Hangai S (2015) Signature features. In: Li SZ, Jain A (eds) Encyclopedia of biometrics. Springer, Berlin, pp 1375–1382

    Chapter  Google Scholar 

  34. Martinez-Diaz M, Fierrez J, Hangai S (2015) Signature matching. In: Li SZ, Jain A (eds) Encyclopedia of biometrics. Springer, Berlin, pp 1382–1387

    Chapter  Google Scholar 

  35. Tolosana R, Vera-Rodriguez R, Fierrez J, Ortega-Garcia J (2018) Exploring recurrent neural networks for on-line handwritten signature biometrics. IEEE Access 6:5128–5138

    Article  Google Scholar 

  36. Liu Y, Yang Z, Yang L (2014) Online signature verification based on DCT and sparse representation. IEEE Trans Cybern 45:2498–2511

    Article  Google Scholar 

  37. Diaz M, Fischer A, Ferrer MA, Plamondon R (2016) Dynamic signature verification system based on one real signature. IEEE Trans Cybern 48:228–239

    Article  Google Scholar 

  38. Martinez-Diaz M, Fierrez J, Krish RP, Galbally J (2014) Mobile signature verification: feature robustness and performance comparison. IET Biom 3(4):267–277

    Article  Google Scholar 

  39. Tekampe N, Merle A, Bringer J, Gomez-Barrero M, Fierrez J, Galbally J (2016) Toward Common Criteria evaluations of biometric systems. BEAT public deliverable D6.5. https://www.beat-eu.org/project/deliverables-public/d6-5-toward-common-criteria-evaluations-of-biometric-systems

Download references

Acknowledgements

This work has been supported by projects: Bio-Guard (Ayudas Fundación BBVA a Equipos de Investigación Científica 2017), UAM-CecaBank, and by TEC2015-70627-R (MINECO/FEDER). Ruben Tolosana is supported by a FPU Fellowship from the Spanish MECD.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ruben Tolosana .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Tolosana, R., Vera-Rodriguez, R., Fierrez, J., Ortega-Garcia, J. (2019). Presentation Attacks in Signature Biometrics: Types and Introduction to Attack Detection. In: Marcel, S., Nixon, M., Fierrez, J., Evans, N. (eds) Handbook of Biometric Anti-Spoofing. Advances in Computer Vision and Pattern Recognition. Springer, Cham. https://doi.org/10.1007/978-3-319-92627-8_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-92627-8_19

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-92626-1

  • Online ISBN: 978-3-319-92627-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics