Eliminating Forgers Based on Intra Trial Variability in Online Signature Verification Using Handglove and Photometric Signals

نویسندگان

  • Andrews Samraj
  • Shohel Sayeed
  • Chu Kiong Loo
  • Nikos E. Mastorokis
چکیده

The novel reinforcement to the data glove based dynamic signature verification system, using the Photometric measurement values collected simultaneously from photo plethysmography (PPG) during the signing process is the emerging technology. Skilled forgers try to attempt the genuine signatures in many numbers of trials. The wide gap in the Euclidian distances between forgers and the genuine template features prohibits them from successful forging. This has been proved by our repeated experiments on various subjects using the above combinational features. In addition the intra trial features captured during the forge attempts also differs widely in the case of forgers and are not consistent that of a genuine signature. This is caused by the pulse characteristics and degree of bilateral hand dimensional similarity, and the degrees of pulse delay. Since this economical and simple optical-based technology is offering an improved biometric security, it is essential to look for other reinforcements such the variability factor considerations which we proved of worth considering.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Use of the Shearlet Transform and Transfer Learning in Offline Handwritten Signature Verification and Recognition

Despite the growing growth of technology, handwritten signature has been selected as the first option between biometrics by users. In this paper, a new methodology for offline handwritten signature verification and recognition based on the Shearlet transform and transfer learning is proposed. Since, a large percentage of handwritten signatures are composed of curves and the performance of a sig...

متن کامل

تصدیق امضای پویا و احراز هویت مبتنی بر استخراج نقاط غالب پایدار و تقطیع الگوهای امضا

One of the basic problems in signature verification is variability and differences apparent on patterns of signature even for an individual. Signature segmentation to basic components, in addition to the access to the stable features, the hidden differences are revealed between genuine and forgery patterns. In this paper, signature patterns of two-dimensional are segmented by using dominant poi...

متن کامل

Off-line Chinese-based Signature Verification Using a Threshold Self-organizing Map

We propose an approach using a radial segmentation method and Kohonen’s SOM (self-organizing map) to resolve the off-line Chinese-based signature verification problem. The radial segmentation method extracts features of a signature in a consistent manner regardless pen thickness, size and rotation. The threshold SOM trains only on genuine signatures of an individual. Verification is achieved by...

متن کامل

UTSig: A Persian Offline Signature Dataset

The crucial role of datasets in signature verification systems has motivated researchers to collect signature samples. However, with regard to the distinct characteristics of Persian signature, existing offline signature datasets cannot be used in Persian systems. This paper presents a new and public Persian offline signature dataset, UTSig, which consists of 8280 images from 115 classes that e...

متن کامل

An ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure

Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication.  This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • J. Information Security

دوره 1  شماره 

صفحات  -

تاریخ انتشار 2010