Abstract
This chapter covers the online signature-based biometric recognition system, which includes fingerprint scanning, facial geometry, footprint scanning, retina and iris patterns, DNA, and heartbeat scans. It covers the background knowledge of signature verification system along with its classification. A systematic comparison between online and offline signature verification system is also included. Basics of biometric recognition in terms of security, exploring definitions of the various parameters that can be used in the security perspective, are also covered (Obaidat and Boudriga, Security of e-Systems and Computer Networks. Cambridge University Press, 2007; Obaidat and Sadoun, IEEE Trans Syst Man Cybernetics Part B, 27(2):261–269, 1997). An in-depth discussion about the online signature-based authentication methods is also presented. Finally, some case studies have been discussed to demonstrate the concept.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
M.S. Obaidat, N. Boudriga, Security of e-Systems and Computer Networks (Cambridge University Press, 2007)
M.S. Obaidat, B. Sadoun, Verification of computer users using keystroke dynamics. IEEE Trans. Syst. Man Cybernetics, Part B 27(2), 261–269 (1997)
M.V. Kanawade, S.S. Katariya, Signature verification & recognition – case study. Int. J. Electron. Commun. Instrumentation Eng. Res. Dev. (IJECIERD) 3(1), 77–86 (2013)
B. Zhang, M. Fu, H. Yan, Handwritten signature verification based on neural ‘gas’ based vector quantization. in IEEE International Joint Conference on Neural Net-works, 1998, pp. 1862–1864
Sansone, Vento, Signature verification: Increasing performance by a multi-stage system. Pattern Anal. Applic. 3, 169–181 (2000)
E.J.R. Justino, F. Bortolozzi, R. Sabourin, Off-line signature verification using HMM for random, simple and skilled forgeries. in ICDAR 2001, International Conference on Document Analysis and Recognition, vol. 1, 2001, pp. 105–110
J.F. Vélez, Á. Sánchez, A.B. Moreno, Robust off-line signature verification using compression networks and positional cuttings. in Proceedings of 2003 I.E. Workshop on Neural Networks for Signal Processing, vol. 1, 2003, pp. 627–636
A. Fallah, M. Jamaati, A. Soleamani, A new online signature verification system based on combining Mellin transform, MFCC and neural network. DSP 21(2), 404–416 (2011)
L. Findlater, J.O. Wobbrock, D. Wigdor, Typing on flat glass: examining ten-finger expert typing patterns on touch surfaces. in Proceedings of the 2011 annual conference on Human factors in computing systems, CHI ’11, 2011, pp. 2453–2462
N. Sae-Bae et al., Biometric-rich gestures: a novel approach to authentication on multi-touch devices. in CHI ’12, 2012, pp. 977–986
S. Prabhakar, S. Pankanti, A.K. Jain, Biometric recognition: Security and privacy concerns. IEEE Secur. Priv. Mag. 1, 33–42 (2003)
S. Kulkarni, N. Takawale, A comparative study of biometric techniques. Int. J. Innovative Res. Comput. Commun. Eng. 4(1), 879–883 (2016)
Z. Riha, V. Matyas, Biometric authentication system. FIMU, 4–44 (2000)
S.D. DiptiVerma, Static signature recognition system for user authentication based two level cog, Hough transform and neural network. Int. J. Eng. Sci. Emerg. Technol. 6(3), 335–343 (2013)
G. Agam, S. Suresh, Warping based offline signature recognition. Inf. Forensics and Secur. 2(3), 430–437 (2007)
F.Z. Marcos, signature recognition state–of–the–art. IEEE A&E Syst. Mag., 28–32 (2005)
J. Wen, B. Fang, and T. Jhang, Offline signature verification: a new rotation invariant approach, pp. 3583–3586
B. Jayasekara, A. Jayasiri, L. Udawatta, An evolving signature recognition system. in First International Conference on Industrial and Information Systems, ICIIS 2006, 2006, pp. 529–534
J. Zheng, G. Zhu, On-Lin handwriting signature recognition based on wavelet energy feature matching. in Proceedings of the 6th World Congress on Intelligent Control and Automation, 2006, pp. 9885–9888
Survey on Dynamic Signature Recognition: A sign of the times – Part 2, Biometric Technology Today, 2009, pp. 1–2
J. Fierrez, HMM-based on-line signature verification: Feature extraction and signature modeling. Pattern Recogn. Lett. 28, 2325–2334 (2007)
T.Q. Ton, T. Nhu, HMM based online signature verification. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET) 4(4), 1448–1451 (2015)
V.M. Patel, N.K. Ratha, R. Chellappa, Cancelable biometrics: A review. IEEE Signal Proc. Mag. 2015
N.K. Ratha, J.H. Connel, R. Bolle, Enhancing security and privacy in biometrics-based authentication systems. IBM Syst. J. 40(3), 614–634 (2001)
N. Ratha, S. Chikkerur, J. Connell, R. Bolle, Generating cancelable fingerprint templates. IEEE Trans. Pattern Anal. Mach. Intell. 29(4), 561–572 (2007)
R.M. Bolle, J.H. Connel, N.K. Ratha, Biometrics perils and patches. Pattern Recogn. 35(12), 2727–2738 (2002)
M. Savvides, B. Kumar, P. Khosla, Cancelable biometric filters for face recognition, in International Conference on Pattern Recognition, vol. 3, (2004), pp. 922–925
K. Takahashi, S. Hirata, Cancelable biometrics with provable security and its application to fingerprint verification. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(1), 233–244 (2011)
S. Hirata, K. Takahashi, Cancelable biometrics with perfect secrecy for correlation-based matching. in Advances in Biometrics, ser. Lecture Notes in Computer Science, ed. by M. Tistarelli, M. Nixon, vol. 5558, (Springer, Berlin/Heidelberg, 2009), pp. 868–878
W. Xu, Q. He, Y. Li, T. Li, Cancelable voiceprint templates based on knowledge signatures, in International Symposium on Electronic Commerce and Security, (2008), pp. 412–415
J. Camenisch, M. Stadler, Efficient group signature schemes for large groups, in International Cryptology Conference on Advances in Cryptology, (Springer, London, UK, 1997), pp. 410–424
J. Zuo, N. Ratha, J. Connell, Cancelable iris biometric. in International Conference on Pattern Recognition, 2008, pp. 1–4,
T. Boult, Robust distance measures for face-recognition supporting revocable biometric tokens. in International Conference on Automatic Face and Gesture Recognition, 2006, pp. 560–566
T. Boult, W. Scheirer, R. Woodworth, Revocable fingerprint biotokens: accuracy and security analysis. in IEEE Conference on Computer Vision and Pattern Recognition, 2007, pp. 1–8
M.M. Ashish, G.R. Sinha, Biometric template protection. J. Biostat. Biometric App. 1(2), 202 (2016)
Unique Identification Authority of India. Multipurpose National Identity Card
Y. Sutcua, Q. Lib, M. Memon, How to Protect Biometric Templates, pp. 1–11
T. Kanade, A. Jain, N.K. Ratha, AVBPA 2005, LNCS (Springer, Berlin/Heidelberg, 2005), pp. 523–532
E.S. Bigun, J. Bigun, B. Duc, S. Fischer, Expert conciliation for multi modal person authentication systems by bayesian statistics. in Proceedings of AVBPA, Springer, LNCS-1206, 1997, pp. 291–300
J. Kittler, M. Hatef, R. Duin, J. Matas, On combining classifiers. IEEE Trans. Pattern Anal. Machine Intell. 20, 226–239 (1998)
A.K. Jain, A. Ross, S. Prabhakar, An introduction to biometric recognition. IEEE Trans. Circuits Syst. Video Technol. 14, 4–20 (2004)
R. Plamondon, G. Lorette, Automatic signature verification and writer identification – the state of the art. Pattern Recogn. 22, 107–131 (1989)
A. Lumini, L. Nanni, An improved BioHashing for human authentication. Pattern Recogn. 40, 1057–1065 (2007)
A.T.B. Jin, D.N.C. Ling, A. Goh, Biohashing: Two factor authentication featuring fingerprint data and tokenised random number. Pattern Recogn. 37(11), 2245–2255 (2004)
A.T.B. Jin, D.N.C. Ling, Cancelable biometrics featuring with to kenised random number. Pattern Recogn. Lett. 26(10), 1454–1460 (2005)
A.T.B. Jin, D.N.C. Ling, A. Goh, Personalised cryptographic key generation based on face hashing. Comput. Secur. J. 23(7), 606–614 (2004)
T. Connie, A. Teoh, M. Goh, D. Ngo, Palm hashing: A novel approach for dual factor authentication. Pattern Anal. Appl. 7(3), 255–268 (2004)
Y.H. Pang, A.T.B. Jin, D.N.C. Ling, Cancelable palmprint authentication system. Int. J. Signal Process. 1(2), 98–104 (2005)
D. Maio, L. Nanni, MultiHashing, human authentication featuring biometrics data and to kenised random number: a case study FVC2004. Neurocomputing, 2006, to appear
I. Nakanishi et al., DWT Domain On-Line Signature Verification, 2011, pp. 184–196
https://www.biosig-id.com/industry/biosig-id-banking-or-ecommerce
J.A. Du Preez, B. Herbst, J. Coetzer, Offline signature verification using the Discrete Radon Transform and a Hidden Markov Model. EURASIP J. Appl. Signal Processing 4, 559–571 (2004)
M.C. Fairhurst, Signature verification revised: Promoting practical exploitation of biometric technology. Electron. Commun. Eng. J. 9(6), 273–280 (1997)
T.G. Zimmerman et al., Retail applications of signature verification. Biometric Report
J.B. Ciulla, Ethics effectiveness: The nature of good leadership, in The Nature of Leadership, 2nd edn., (SAGE, Los Angeles, CA, 2012), pp. 508–540
U. Pal et al., Signature-based biometric authentication. in Computational Intelligence in Digital Forensics: Forensic Investigation and Applications, 2014, pp. 285–314
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Tanwar, S., Obaidat, M.S., Tyagi, S., Kumar, N. (2019). Online Signature-Based Biometric Recognition. In: Obaidat, M., Traore, I., Woungang, I. (eds) Biometric-Based Physical and Cybersecurity Systems. Springer, Cham. https://doi.org/10.1007/978-3-319-98734-7_10
Download citation
DOI: https://doi.org/10.1007/978-3-319-98734-7_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-98733-0
Online ISBN: 978-3-319-98734-7
eBook Packages: EngineeringEngineering (R0)