Benchmarking desktop and mobile handwriting across COTS devices: The e-BioSign biometric database

نویسندگان

  • Ruben Tolosana
  • Ruben Vera-Rodriguez
  • Julian Fierrez
  • Aythami Morales
  • Javier Ortega-Garcia
چکیده

This paper describes the design, acquisition process and baseline evaluation of the new e-BioSign database, which includes dynamic signature and handwriting information. Data is acquired from 5 different COTS devices: three Wacom devices (STU-500, STU-530 and DTU-1031) specifically designed to capture dynamic signatures and handwriting, and two general purpose tablets (Samsung Galaxy Note 10.1 and Samsung ATIV 7). For the two Samsung tablets, data is collected using both pen stylus and also the finger in order to study the performance of signature verification in a mobile scenario. Data was collected in two sessions for 65 subjects, and includes dynamic information of the signature, the full name and alpha numeric sequences. Skilled forgeries were also performed for signatures and full names. We also report a benchmark evaluation based on e-BioSign for person verification under three different real scenarios: 1) intra-device, 2) inter-device, and 3) mixed writing-tool. We have experimented the proposed benchmark using the main existing approaches for signature verification: feature- and time functions-based. As a result, new insights into the problem of signature biometrics in sensor-interoperable scenarios have been obtained, namely: the importance of specific methods for dealing with device interoperability, and the necessity of a deeper analysis on signatures acquired using the finger as the writing tool. This e-BioSign public database allows the research community to: 1) further analyse and develop signature verification systems in realistic scenarios, and 2) investigate towards a better understanding of the nature of the human handwriting when captured using electronic COTS devices in realistic conditions.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Connection Interface Designing for Grid and Mobile Devices

There area lot of mobile computer devices with a variety of applications and users Tend to use them more. Due to the limitations of mobile devices, running most of the procedures are impossible. To resolve this problem, mobile devices can be connected to the grid, to use the facilities of grid. On the other hand the communication mechanisms are different for each device and they cannot be c...

متن کامل

Connection Interface Designing for Grid and Mobile Devices

There area lot of mobile computer devices with a variety of applications and users Tend to use them more. Due to the limitations of mobile devices, running most of the procedures are impossible. To resolve this problem, mobile devices can be connected to the grid, to use the facilities of grid. On the other hand the communication mechanisms are different for each device and they cannot be c...

متن کامل

BioSecure DS2: A Score-level Quality-dependent and Cost-sensitive Multimodal Biometric Test Bed

This paper presents a test bed for evaluating, comparing and benchmarking fusion algorithms for multimodal biometric authentication. It consists of a database designed to benchmark quality-dependent and conventional fusion algorithms. These two types of algorithms are different because only the former one uses quality measures to derive the fused score. These auxiliary measurements describe the...

متن کامل

Data mining in mobile ECG based biometric identification

This paper investigates the robustness of performing biometric identification in a mobile environment using electrocardiogram (ECG) signals. We implemented our proposed biometric sample extraction technique to test the usability across classifiers. Subjects in MIT-BIH Normal Sinus Rhythm Database (NSRDB) were used to validate the reliability and stability of the subject recognition methods. Dis...

متن کامل

Transparent Handwriting Verification for Mobile Devices

The popularity of mobile devices and the evolving nature of the services and information they can delivery make them increasingly desirable targets for misuse. The ability to provide effective authentication of the user becomes imperative if protection against misuse of personally and financially sensitive information is to be provided. Traditional measures, such as the PIN, although commensura...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره 12  شماره 

صفحات  -

تاریخ انتشار 2017