Skip to main content
Top
Published in: International Journal on Document Analysis and Recognition (IJDAR) 1/2019

11-02-2019 | Original Paper

Online signature verification based on string edit distance

Authors: Kaspar Riesen, Roman Schmidt

Published in: International Journal on Document Analysis and Recognition (IJDAR) | Issue 1/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Handwritten signatures are widely used and well-accepted biometrics for personal authentication. The accuracy of signature verification systems has significantly improved in the last decade, making it possible to rely on machines in particular cases or to support human experts. Yet, based on only few genuine references, signature verification is still a challenging task. The present paper provides a comprehensive comparison of two prominent string matching algorithms that can be readily used for signature verification. Moreover, it evaluates a recent cost model for string matching which turns out to be particularly well suited for the task of signature verification. On three benchmarking data sets, we show that this model outperforms the two standard models for string matching with statistical significance.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
Multimodal systems combine algorithms from different categories.
 
2
Often the DTW algorithm is endowed with a Sakoe–Chiba band [24] in order to exclude unusual warping paths and speed up the computation.
 
3
The Euclidean distance could be replaced by any other Minkowski metric
 
4
We perform our evaluation on a 3.5 GHz Intel Core i7 with 16 GB RAM.
 
Literature
1.
go back to reference Ansari, A., Hanmandlu, M., Kour, J., Singh, A.: Online signature verification using segment-level fuzzy modelling. IET Biom. 3(3), 113–127 (2014)CrossRef Ansari, A., Hanmandlu, M., Kour, J., Singh, A.: Online signature verification using segment-level fuzzy modelling. IET Biom. 3(3), 113–127 (2014)CrossRef
2.
go back to reference Bansal, M., Hanmandlu, M., Kumar, P.: Iris based authentication using local principal independent components. Optik-Int. J. Light Electron Opt. 127(11), 4808–4814 (2016)CrossRef Bansal, M., Hanmandlu, M., Kumar, P.: Iris based authentication using local principal independent components. Optik-Int. J. Light Electron Opt. 127(11), 4808–4814 (2016)CrossRef
3.
go back to reference Fierrez, J., Ortega-Garcia, J., Ramos, D., Gonzales-Rodriguez, J.: Hmm-based on-line signature verification: feature extraction and signature modeling. Pattern Recognit. Lett. 28(16), 2325–2334 (2007)CrossRef Fierrez, J., Ortega-Garcia, J., Ramos, D., Gonzales-Rodriguez, J.: Hmm-based on-line signature verification: feature extraction and signature modeling. Pattern Recognit. Lett. 28(16), 2325–2334 (2007)CrossRef
4.
go back to reference Guru, D., Prakash, H.: Online signature verification and recognition: an approach based on symbolic representation. IEEE Trans. Pattern Anal. Mach. Intell. 31(6), 1059—1073 (2009) Guru, D., Prakash, H.: Online signature verification and recognition: an approach based on symbolic representation. IEEE Trans. Pattern Anal. Mach. Intell. 31(6), 1059—1073 (2009)
5.
go back to reference Ibrahim, M., Kyan, M., Guang, L.: On-line signature verification using global features. In: 2009 Canadian Conference on Electrical and Computer Engineering (2009) Ibrahim, M., Kyan, M., Guang, L.: On-line signature verification using global features. In: 2009 Canadian Conference on Electrical and Computer Engineering (2009)
6.
go back to reference Impedovo, D., Pirlo, G.: Automatic signature verification: the state of the art’. IEEE Trans. Syst. Man Cybern. 38(5), 609–635 (2008)CrossRef Impedovo, D., Pirlo, G.: Automatic signature verification: the state of the art’. IEEE Trans. Syst. Man Cybern. 38(5), 609–635 (2008)CrossRef
7.
go back to reference Kholmatov, A., Yanikoglu, B.: Identity authentication using improved online signature verification method. Pattern Recognit. Lett. 26(15), 1400–2408 (2005)CrossRef Kholmatov, A., Yanikoglu, B.: Identity authentication using improved online signature verification method. Pattern Recognit. Lett. 26(15), 1400–2408 (2005)CrossRef
8.
go back to reference Kholmatov, A., Yanikoglu, B.: SUSIG: an on-line signature database, associated protocols and benchmark results. Pattern Anal. Appl. 12(3), 227–236 (2009)MathSciNetCrossRef Kholmatov, A., Yanikoglu, B.: SUSIG: an on-line signature database, associated protocols and benchmark results. Pattern Anal. Appl. 12(3), 227–236 (2009)MathSciNetCrossRef
9.
go back to reference Levenshtein, V.: Binary codes capable of correcting deletions, insertions and reversals. Sov. Phys. Dokl. 10(8), 707–710 (1966)MathSciNet Levenshtein, V.: Binary codes capable of correcting deletions, insertions and reversals. Sov. Phys. Dokl. 10(8), 707–710 (1966)MathSciNet
10.
go back to reference Liwicki, M., Blumenstein, M., van den Heuvel, E., Berger, C., Stoel, R.D., Found, B., Chen, X., Malik, M.I.: Sigcomp11: Signature verification competition for on- and offline skilled forgeries. In: Proc. 11th Int. Conference on Document Analysis and Recognition (2011) Liwicki, M., Blumenstein, M., van den Heuvel, E., Berger, C., Stoel, R.D., Found, B., Chen, X., Malik, M.I.: Sigcomp11: Signature verification competition for on- and offline skilled forgeries. In: Proc. 11th Int. Conference on Document Analysis and Recognition (2011)
11.
go back to reference Martinez-Diaz, M., Fierrez, J., Krish, R., Galbally, J.: Mobile signature verification: feature robustness and performance comparison. IET Biom. 3(4), 267–277 (2014)CrossRef Martinez-Diaz, M., Fierrez, J., Krish, R., Galbally, J.: Mobile signature verification: feature robustness and performance comparison. IET Biom. 3(4), 267–277 (2014)CrossRef
12.
go back to reference Mehdi, S., Arakala, A., Davis, S., Horadam, K.: Retina verification system based on biometric graph matching. IEEE Trans. Image Process. 22(9), 3625–3635 (2013)CrossRef Mehdi, S., Arakala, A., Davis, S., Horadam, K.: Retina verification system based on biometric graph matching. IEEE Trans. Image Process. 22(9), 3625–3635 (2013)CrossRef
13.
go back to reference Mehdi Lajevardi, S., Arakala, A., Davis, S., Horadam, K.: Hand vein authentication using biometric graph matching. IET Biom. 3(4), 302–313 (2014)CrossRef Mehdi Lajevardi, S., Arakala, A., Davis, S., Horadam, K.: Hand vein authentication using biometric graph matching. IET Biom. 3(4), 302–313 (2014)CrossRef
14.
go back to reference Nanni, L., Lumini, A.: Ensemble of parzen window classifiers for on-line signature verification. Neurocomputing 68, 217–224 (2005)CrossRef Nanni, L., Lumini, A.: Ensemble of parzen window classifiers for on-line signature verification. Neurocomputing 68, 217–224 (2005)CrossRef
15.
go back to reference O’Gorman, L.: Comparing passwords, tokens, and biometrics for user authentication. Proc. IEEE 91(12), 2021–2040 (2003)CrossRef O’Gorman, L.: Comparing passwords, tokens, and biometrics for user authentication. Proc. IEEE 91(12), 2021–2040 (2003)CrossRef
16.
go back to reference Oka, M., Kato, K., Xu, Y., Liang, L., Wen, F.: Scribble-a-secret: Similarity-based password authentication using sketches. In: In Proc. of the 19th International Conference on Pattern Recognition, pp. 1–4 (2008) Oka, M., Kato, K., Xu, Y., Liang, L., Wen, F.: Scribble-a-secret: Similarity-based password authentication using sketches. In: In Proc. of the 19th International Conference on Pattern Recognition, pp. 1–4 (2008)
17.
go back to reference Ortega-Garcia J. andFierrez-Aguilar, J., Simon, D., Gonzalez, J., Faundez, M., Espinosa, V., Satue A. andHernaez, I., Igarza, J.J., Vivaracho, C., Escudero, D., Moro, Q.I.: Mcyt baseline corpus: A bimodal biometric database. IEEE Proc. Vis. Image Signal Process. Spec. Issue Biom. Internet 150(6), 395–401 (2003) Ortega-Garcia J. andFierrez-Aguilar, J., Simon, D., Gonzalez, J., Faundez, M., Espinosa, V., Satue A. andHernaez, I., Igarza, J.J., Vivaracho, C., Escudero, D., Moro, Q.I.: Mcyt baseline corpus: A bimodal biometric database. IEEE Proc. Vis. Image Signal Process. Spec. Issue Biom. Internet 150(6), 395–401 (2003)
18.
go back to reference Plamondon, R., Pirlo, G., Impedovo, D.: On-line Signature Verification, chap. 27, pp. 917–947. Springer (2014) Plamondon, R., Pirlo, G., Impedovo, D.: On-line Signature Verification, chap. 27, pp. 917–947. Springer (2014)
19.
go back to reference Plamondon, R., Srihari, S.N.: Online and off-line handwriting recognition: a comprehensive survey. IEEE Trans. PAMI 22(1), 63–84 (2000)CrossRef Plamondon, R., Srihari, S.N.: Online and off-line handwriting recognition: a comprehensive survey. IEEE Trans. PAMI 22(1), 63–84 (2000)CrossRef
20.
go back to reference Riesen, K., Hanne, T., Schmidt, R.: Sketch-based user authentication with a novel string edit distance model. IEEE Trans. Syst. Man Cybern. Syst. PP(99) (2016) Riesen, K., Hanne, T., Schmidt, R.: Sketch-based user authentication with a novel string edit distance model. IEEE Trans. Syst. Man Cybern. Syst. PP(99) (2016)
21.
go back to reference Roth, J., Liu, X., Metaxas, D.: On continuous user authentication via typing behavior. IEEE Trans. Image Process. 23(10), 4611–4624 (2014)MathSciNetCrossRefMATH Roth, J., Liu, X., Metaxas, D.: On continuous user authentication via typing behavior. IEEE Trans. Image Process. 23(10), 4611–4624 (2014)MathSciNetCrossRefMATH
22.
go back to reference Sae-Bae, N., Memon, N.: Online signature verification on mobile devices. IEEE Trans. Inf. Forensics Secur. 9(6), 933—947 (2014) Sae-Bae, N., Memon, N.: Online signature verification on mobile devices. IEEE Trans. Inf. Forensics Secur. 9(6), 933—947 (2014)
23.
go back to reference Sakoe, H., Chiba, S.: Dynamic programming algorithm optimization for spoken word recognition. Trans. Acoust. Speech Signal Process. 26, 43–49 (1978) Sakoe, H., Chiba, S.: Dynamic programming algorithm optimization for spoken word recognition. Trans. Acoust. Speech Signal Process. 26, 43–49 (1978)
24.
go back to reference Sakoe, H., Chiba, S.: Dynamic programming algorithm optimization for spoken word recognition. IEEE Trans. Acoust. Speech Signal Process. 26, 43–49 (1978)CrossRefMATH Sakoe, H., Chiba, S.: Dynamic programming algorithm optimization for spoken word recognition. IEEE Trans. Acoust. Speech Signal Process. 26, 43–49 (1978)CrossRefMATH
25.
go back to reference Stajano, F.: No more passwords. In: In Proc. Security Protocols Workshop, pp. 49–81 (2011) Stajano, F.: No more passwords. In: In Proc. Security Protocols Workshop, pp. 49–81 (2011)
27.
go back to reference Vivaracho-Pascual, C., Faundez-Zanuy, M., Pascual, J.M.: An efficient low cost approach for on-line signature recognition based on length normalization and fractional distances. Pattern Recognit. 42(1), 183–193 (2009)CrossRefMATH Vivaracho-Pascual, C., Faundez-Zanuy, M., Pascual, J.M.: An efficient low cost approach for on-line signature recognition based on length normalization and fractional distances. Pattern Recognit. 42(1), 183–193 (2009)CrossRefMATH
28.
go back to reference Wong, W., Teoh, A., Kho, Y., Wong, M.: Kernel PCA enabled bit-string representation for minutiae-based cancellable fingerprint template. Pattern Recognit. 51, 197–208 (2016)CrossRef Wong, W., Teoh, A., Kho, Y., Wong, M.: Kernel PCA enabled bit-string representation for minutiae-based cancellable fingerprint template. Pattern Recognit. 51, 197–208 (2016)CrossRef
29.
go back to reference Yanikoglu, B., Kholmatov, A.: Online signature verification using fourier descriptors. Eur. J. Adv. Signal Process. (1–14) (2009) Yanikoglu, B., Kholmatov, A.: Online signature verification using fourier descriptors. Eur. J. Adv. Signal Process. (1–14) (2009)
Metadata
Title
Online signature verification based on string edit distance
Authors
Kaspar Riesen
Roman Schmidt
Publication date
11-02-2019
Publisher
Springer Berlin Heidelberg
Published in
International Journal on Document Analysis and Recognition (IJDAR) / Issue 1/2019
Print ISSN: 1433-2833
Electronic ISSN: 1433-2825
DOI
https://doi.org/10.1007/s10032-019-00316-1

Other articles of this Issue 1/2019

International Journal on Document Analysis and Recognition (IJDAR) 1/2019 Go to the issue

Premium Partner