Skip to main content

2019 | OriginalPaper | Buchkapitel

10. Online Signature-Based Biometric Recognition

verfasst von : Sudeep Tanwar, Mohammad S. Obaidat, Sudhanshu Tyagi, Neeraj Kumar

Erschienen in: Biometric-Based Physical and Cybersecurity Systems

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This chapter covers the online signature-based biometric recognition system, which includes fingerprint scanning, facial geometry, footprint scanning, retina and iris patterns, DNA, and heartbeat scans. It covers the background knowledge of signature verification system along with its classification. A systematic comparison between online and offline signature verification system is also included. Basics of biometric recognition in terms of security, exploring definitions of the various parameters that can be used in the security perspective, are also covered (Obaidat and Boudriga, Security of e-Systems and Computer Networks. Cambridge University Press, 2007; Obaidat and Sadoun, IEEE Trans Syst Man Cybernetics Part B, 27(2):261–269, 1997). An in-depth discussion about the online signature-based authentication methods is also presented. Finally, some case studies have been discussed to demonstrate the concept.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat M.S. Obaidat, N. Boudriga, Security of e-Systems and Computer Networks (Cambridge University Press, 2007) M.S. Obaidat, N. Boudriga, Security of e-Systems and Computer Networks (Cambridge University Press, 2007)
2.
Zurück zum Zitat M.S. Obaidat, B. Sadoun, Verification of computer users using keystroke dynamics. IEEE Trans. Syst. Man Cybernetics, Part B 27(2), 261–269 (1997)CrossRef M.S. Obaidat, B. Sadoun, Verification of computer users using keystroke dynamics. IEEE Trans. Syst. Man Cybernetics, Part B 27(2), 261–269 (1997)CrossRef
3.
Zurück zum Zitat M.V. Kanawade, S.S. Katariya, Signature verification & recognition – case study. Int. J. Electron. Commun. Instrumentation Eng. Res. Dev. (IJECIERD) 3(1), 77–86 (2013) M.V. Kanawade, S.S. Katariya, Signature verification & recognition – case study. Int. J. Electron. Commun. Instrumentation Eng. Res. Dev. (IJECIERD) 3(1), 77–86 (2013)
4.
Zurück zum Zitat B. Zhang, M. Fu, H. Yan, Handwritten signature verification based on neural ‘gas’ based vector quantization. in IEEE International Joint Conference on Neural Net-works, 1998, pp. 1862–1864 B. Zhang, M. Fu, H. Yan, Handwritten signature verification based on neural ‘gas’ based vector quantization. in IEEE International Joint Conference on Neural Net-works, 1998, pp. 1862–1864
5.
Zurück zum Zitat Sansone, Vento, Signature verification: Increasing performance by a multi-stage system. Pattern Anal. Applic. 3, 169–181 (2000)CrossRef Sansone, Vento, Signature verification: Increasing performance by a multi-stage system. Pattern Anal. Applic. 3, 169–181 (2000)CrossRef
6.
Zurück zum Zitat E.J.R. Justino, F. Bortolozzi, R. Sabourin, Off-line signature verification using HMM for random, simple and skilled forgeries. in ICDAR 2001, International Conference on Document Analysis and Recognition, vol. 1, 2001, pp. 105–110 E.J.R. Justino, F. Bortolozzi, R. Sabourin, Off-line signature verification using HMM for random, simple and skilled forgeries. in ICDAR 2001, International Conference on Document Analysis and Recognition, vol. 1, 2001, pp. 105–110
7.
Zurück zum Zitat J.F. Vélez, Á. Sánchez, A.B. Moreno, Robust off-line signature verification using compression networks and positional cuttings. in Proceedings of 2003 I.E. Workshop on Neural Networks for Signal Processing, vol. 1, 2003, pp. 627–636 J.F. Vélez, Á. Sánchez, A.B. Moreno, Robust off-line signature verification using compression networks and positional cuttings. in Proceedings of 2003 I.E. Workshop on Neural Networks for Signal Processing, vol. 1, 2003, pp. 627–636
8.
Zurück zum Zitat A. Fallah, M. Jamaati, A. Soleamani, A new online signature verification system based on combining Mellin transform, MFCC and neural network. DSP 21(2), 404–416 (2011) A. Fallah, M. Jamaati, A. Soleamani, A new online signature verification system based on combining Mellin transform, MFCC and neural network. DSP 21(2), 404–416 (2011)
9.
Zurück zum Zitat L. Findlater, J.O. Wobbrock, D. Wigdor, Typing on flat glass: examining ten-finger expert typing patterns on touch surfaces. in Proceedings of the 2011 annual conference on Human factors in computing systems, CHI ’11, 2011, pp. 2453–2462 L. Findlater, J.O. Wobbrock, D. Wigdor, Typing on flat glass: examining ten-finger expert typing patterns on touch surfaces. in Proceedings of the 2011 annual conference on Human factors in computing systems, CHI ’11, 2011, pp. 2453–2462
10.
Zurück zum Zitat N. Sae-Bae et al., Biometric-rich gestures: a novel approach to authentication on multi-touch devices. in CHI ’12, 2012, pp. 977–986 N. Sae-Bae et al., Biometric-rich gestures: a novel approach to authentication on multi-touch devices. in CHI ’12, 2012, pp. 977–986
11.
Zurück zum Zitat S. Prabhakar, S. Pankanti, A.K. Jain, Biometric recognition: Security and privacy concerns. IEEE Secur. Priv. Mag. 1, 33–42 (2003)CrossRef S. Prabhakar, S. Pankanti, A.K. Jain, Biometric recognition: Security and privacy concerns. IEEE Secur. Priv. Mag. 1, 33–42 (2003)CrossRef
12.
Zurück zum Zitat S. Kulkarni, N. Takawale, A comparative study of biometric techniques. Int. J. Innovative Res. Comput. Commun. Eng. 4(1), 879–883 (2016) S. Kulkarni, N. Takawale, A comparative study of biometric techniques. Int. J. Innovative Res. Comput. Commun. Eng. 4(1), 879–883 (2016)
13.
Zurück zum Zitat Z. Riha, V. Matyas, Biometric authentication system. FIMU, 4–44 (2000) Z. Riha, V. Matyas, Biometric authentication system. FIMU, 4–44 (2000)
14.
Zurück zum Zitat S.D. DiptiVerma, Static signature recognition system for user authentication based two level cog, Hough transform and neural network. Int. J. Eng. Sci. Emerg. Technol. 6(3), 335–343 (2013) S.D. DiptiVerma, Static signature recognition system for user authentication based two level cog, Hough transform and neural network. Int. J. Eng. Sci. Emerg. Technol. 6(3), 335–343 (2013)
15.
Zurück zum Zitat G. Agam, S. Suresh, Warping based offline signature recognition. Inf. Forensics and Secur. 2(3), 430–437 (2007)CrossRef G. Agam, S. Suresh, Warping based offline signature recognition. Inf. Forensics and Secur. 2(3), 430–437 (2007)CrossRef
16.
Zurück zum Zitat F.Z. Marcos, signature recognition state–of–the–art. IEEE A&E Syst. Mag., 28–32 (2005) F.Z. Marcos, signature recognition state–of–the–art. IEEE A&E Syst. Mag., 28–32 (2005)
17.
Zurück zum Zitat J. Wen, B. Fang, and T. Jhang, Offline signature verification: a new rotation invariant approach, pp. 3583–3586 J. Wen, B. Fang, and T. Jhang, Offline signature verification: a new rotation invariant approach, pp. 3583–3586
18.
Zurück zum Zitat B. Jayasekara, A. Jayasiri, L. Udawatta, An evolving signature recognition system. in First International Conference on Industrial and Information Systems, ICIIS 2006, 2006, pp. 529–534 B. Jayasekara, A. Jayasiri, L. Udawatta, An evolving signature recognition system. in First International Conference on Industrial and Information Systems, ICIIS 2006, 2006, pp. 529–534
19.
Zurück zum Zitat J. Zheng, G. Zhu, On-Lin handwriting signature recognition based on wavelet energy feature matching. in Proceedings of the 6th World Congress on Intelligent Control and Automation, 2006, pp. 9885–9888 J. Zheng, G. Zhu, On-Lin handwriting signature recognition based on wavelet energy feature matching. in Proceedings of the 6th World Congress on Intelligent Control and Automation, 2006, pp. 9885–9888
20.
Zurück zum Zitat Survey on Dynamic Signature Recognition: A sign of the times – Part 2, Biometric Technology Today, 2009, pp. 1–2 Survey on Dynamic Signature Recognition: A sign of the times – Part 2, Biometric Technology Today, 2009, pp. 1–2
21.
Zurück zum Zitat J. Fierrez, HMM-based on-line signature verification: Feature extraction and signature modeling. Pattern Recogn. Lett. 28, 2325–2334 (2007)CrossRef J. Fierrez, HMM-based on-line signature verification: Feature extraction and signature modeling. Pattern Recogn. Lett. 28, 2325–2334 (2007)CrossRef
22.
Zurück zum Zitat T.Q. Ton, T. Nhu, HMM based online signature verification. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET) 4(4), 1448–1451 (2015) T.Q. Ton, T. Nhu, HMM based online signature verification. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET) 4(4), 1448–1451 (2015)
23.
Zurück zum Zitat V.M. Patel, N.K. Ratha, R. Chellappa, Cancelable biometrics: A review. IEEE Signal Proc. Mag. 2015 V.M. Patel, N.K. Ratha, R. Chellappa, Cancelable biometrics: A review. IEEE Signal Proc. Mag. 2015
24.
Zurück zum Zitat N.K. Ratha, J.H. Connel, R. Bolle, Enhancing security and privacy in biometrics-based authentication systems. IBM Syst. J. 40(3), 614–634 (2001)CrossRef N.K. Ratha, J.H. Connel, R. Bolle, Enhancing security and privacy in biometrics-based authentication systems. IBM Syst. J. 40(3), 614–634 (2001)CrossRef
25.
Zurück zum Zitat N. Ratha, S. Chikkerur, J. Connell, R. Bolle, Generating cancelable fingerprint templates. IEEE Trans. Pattern Anal. Mach. Intell. 29(4), 561–572 (2007)CrossRef N. Ratha, S. Chikkerur, J. Connell, R. Bolle, Generating cancelable fingerprint templates. IEEE Trans. Pattern Anal. Mach. Intell. 29(4), 561–572 (2007)CrossRef
26.
Zurück zum Zitat R.M. Bolle, J.H. Connel, N.K. Ratha, Biometrics perils and patches. Pattern Recogn. 35(12), 2727–2738 (2002)CrossRef R.M. Bolle, J.H. Connel, N.K. Ratha, Biometrics perils and patches. Pattern Recogn. 35(12), 2727–2738 (2002)CrossRef
27.
Zurück zum Zitat M. Savvides, B. Kumar, P. Khosla, Cancelable biometric filters for face recognition, in International Conference on Pattern Recognition, vol. 3, (2004), pp. 922–925 M. Savvides, B. Kumar, P. Khosla, Cancelable biometric filters for face recognition, in International Conference on Pattern Recognition, vol. 3, (2004), pp. 922–925
28.
Zurück zum Zitat K. Takahashi, S. Hirata, Cancelable biometrics with provable security and its application to fingerprint verification. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(1), 233–244 (2011)CrossRef K. Takahashi, S. Hirata, Cancelable biometrics with provable security and its application to fingerprint verification. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(1), 233–244 (2011)CrossRef
29.
Zurück zum Zitat S. Hirata, K. Takahashi, Cancelable biometrics with perfect secrecy for correlation-based matching. in Advances in Biometrics, ser. Lecture Notes in Computer Science, ed. by M. Tistarelli, M. Nixon, vol. 5558, (Springer, Berlin/Heidelberg, 2009), pp. 868–878CrossRef S. Hirata, K. Takahashi, Cancelable biometrics with perfect secrecy for correlation-based matching. in Advances in Biometrics, ser. Lecture Notes in Computer Science, ed. by M. Tistarelli, M. Nixon, vol. 5558, (Springer, Berlin/Heidelberg, 2009), pp. 868–878CrossRef
30.
Zurück zum Zitat W. Xu, Q. He, Y. Li, T. Li, Cancelable voiceprint templates based on knowledge signatures, in International Symposium on Electronic Commerce and Security, (2008), pp. 412–415 W. Xu, Q. He, Y. Li, T. Li, Cancelable voiceprint templates based on knowledge signatures, in International Symposium on Electronic Commerce and Security, (2008), pp. 412–415
31.
Zurück zum Zitat J. Camenisch, M. Stadler, Efficient group signature schemes for large groups, in International Cryptology Conference on Advances in Cryptology, (Springer, London, UK, 1997), pp. 410–424CrossRef J. Camenisch, M. Stadler, Efficient group signature schemes for large groups, in International Cryptology Conference on Advances in Cryptology, (Springer, London, UK, 1997), pp. 410–424CrossRef
32.
Zurück zum Zitat J. Zuo, N. Ratha, J. Connell, Cancelable iris biometric. in International Conference on Pattern Recognition, 2008, pp. 1–4, J. Zuo, N. Ratha, J. Connell, Cancelable iris biometric. in International Conference on Pattern Recognition, 2008, pp. 1–4,
33.
Zurück zum Zitat T. Boult, Robust distance measures for face-recognition supporting revocable biometric tokens. in International Conference on Automatic Face and Gesture Recognition, 2006, pp. 560–566 T. Boult, Robust distance measures for face-recognition supporting revocable biometric tokens. in International Conference on Automatic Face and Gesture Recognition, 2006, pp. 560–566
34.
Zurück zum Zitat T. Boult, W. Scheirer, R. Woodworth, Revocable fingerprint biotokens: accuracy and security analysis. in IEEE Conference on Computer Vision and Pattern Recognition, 2007, pp. 1–8 T. Boult, W. Scheirer, R. Woodworth, Revocable fingerprint biotokens: accuracy and security analysis. in IEEE Conference on Computer Vision and Pattern Recognition, 2007, pp. 1–8
35.
Zurück zum Zitat M.M. Ashish, G.R. Sinha, Biometric template protection. J. Biostat. Biometric App. 1(2), 202 (2016) M.M. Ashish, G.R. Sinha, Biometric template protection. J. Biostat. Biometric App. 1(2), 202 (2016)
36.
Zurück zum Zitat Unique Identification Authority of India. Multipurpose National Identity Card Unique Identification Authority of India. Multipurpose National Identity Card
37.
Zurück zum Zitat Y. Sutcua, Q. Lib, M. Memon, How to Protect Biometric Templates, pp. 1–11 Y. Sutcua, Q. Lib, M. Memon, How to Protect Biometric Templates, pp. 1–11
38.
Zurück zum Zitat T. Kanade, A. Jain, N.K. Ratha, AVBPA 2005, LNCS (Springer, Berlin/Heidelberg, 2005), pp. 523–532 T. Kanade, A. Jain, N.K. Ratha, AVBPA 2005, LNCS (Springer, Berlin/Heidelberg, 2005), pp. 523–532
39.
Zurück zum Zitat E.S. Bigun, J. Bigun, B. Duc, S. Fischer, Expert conciliation for multi modal person authentication systems by bayesian statistics. in Proceedings of AVBPA, Springer, LNCS-1206, 1997, pp. 291–300 E.S. Bigun, J. Bigun, B. Duc, S. Fischer, Expert conciliation for multi modal person authentication systems by bayesian statistics. in Proceedings of AVBPA, Springer, LNCS-1206, 1997, pp. 291–300
40.
Zurück zum Zitat J. Kittler, M. Hatef, R. Duin, J. Matas, On combining classifiers. IEEE Trans. Pattern Anal. Machine Intell. 20, 226–239 (1998)CrossRef J. Kittler, M. Hatef, R. Duin, J. Matas, On combining classifiers. IEEE Trans. Pattern Anal. Machine Intell. 20, 226–239 (1998)CrossRef
41.
Zurück zum Zitat A.K. Jain, A. Ross, S. Prabhakar, An introduction to biometric recognition. IEEE Trans. Circuits Syst. Video Technol. 14, 4–20 (2004)CrossRef A.K. Jain, A. Ross, S. Prabhakar, An introduction to biometric recognition. IEEE Trans. Circuits Syst. Video Technol. 14, 4–20 (2004)CrossRef
42.
Zurück zum Zitat R. Plamondon, G. Lorette, Automatic signature verification and writer identification – the state of the art. Pattern Recogn. 22, 107–131 (1989)CrossRef R. Plamondon, G. Lorette, Automatic signature verification and writer identification – the state of the art. Pattern Recogn. 22, 107–131 (1989)CrossRef
43.
Zurück zum Zitat A. Lumini, L. Nanni, An improved BioHashing for human authentication. Pattern Recogn. 40, 1057–1065 (2007)CrossRef A. Lumini, L. Nanni, An improved BioHashing for human authentication. Pattern Recogn. 40, 1057–1065 (2007)CrossRef
44.
Zurück zum Zitat A.T.B. Jin, D.N.C. Ling, A. Goh, Biohashing: Two factor authentication featuring fingerprint data and tokenised random number. Pattern Recogn. 37(11), 2245–2255 (2004)CrossRef A.T.B. Jin, D.N.C. Ling, A. Goh, Biohashing: Two factor authentication featuring fingerprint data and tokenised random number. Pattern Recogn. 37(11), 2245–2255 (2004)CrossRef
45.
Zurück zum Zitat A.T.B. Jin, D.N.C. Ling, Cancelable biometrics featuring with to kenised random number. Pattern Recogn. Lett. 26(10), 1454–1460 (2005)CrossRef A.T.B. Jin, D.N.C. Ling, Cancelable biometrics featuring with to kenised random number. Pattern Recogn. Lett. 26(10), 1454–1460 (2005)CrossRef
46.
Zurück zum Zitat A.T.B. Jin, D.N.C. Ling, A. Goh, Personalised cryptographic key generation based on face hashing. Comput. Secur. J. 23(7), 606–614 (2004)CrossRef A.T.B. Jin, D.N.C. Ling, A. Goh, Personalised cryptographic key generation based on face hashing. Comput. Secur. J. 23(7), 606–614 (2004)CrossRef
47.
Zurück zum Zitat T. Connie, A. Teoh, M. Goh, D. Ngo, Palm hashing: A novel approach for dual factor authentication. Pattern Anal. Appl. 7(3), 255–268 (2004)MathSciNetCrossRef T. Connie, A. Teoh, M. Goh, D. Ngo, Palm hashing: A novel approach for dual factor authentication. Pattern Anal. Appl. 7(3), 255–268 (2004)MathSciNetCrossRef
48.
Zurück zum Zitat Y.H. Pang, A.T.B. Jin, D.N.C. Ling, Cancelable palmprint authentication system. Int. J. Signal Process. 1(2), 98–104 (2005) Y.H. Pang, A.T.B. Jin, D.N.C. Ling, Cancelable palmprint authentication system. Int. J. Signal Process. 1(2), 98–104 (2005)
49.
Zurück zum Zitat D. Maio, L. Nanni, MultiHashing, human authentication featuring biometrics data and to kenised random number: a case study FVC2004. Neurocomputing, 2006, to appear D. Maio, L. Nanni, MultiHashing, human authentication featuring biometrics data and to kenised random number: a case study FVC2004. Neurocomputing, 2006, to appear
50.
Zurück zum Zitat I. Nakanishi et al., DWT Domain On-Line Signature Verification, 2011, pp. 184–196 I. Nakanishi et al., DWT Domain On-Line Signature Verification, 2011, pp. 184–196
52.
Zurück zum Zitat J.A. Du Preez, B. Herbst, J. Coetzer, Offline signature verification using the Discrete Radon Transform and a Hidden Markov Model. EURASIP J. Appl. Signal Processing 4, 559–571 (2004) J.A. Du Preez, B. Herbst, J. Coetzer, Offline signature verification using the Discrete Radon Transform and a Hidden Markov Model. EURASIP J. Appl. Signal Processing 4, 559–571 (2004)
53.
Zurück zum Zitat M.C. Fairhurst, Signature verification revised: Promoting practical exploitation of biometric technology. Electron. Commun. Eng. J. 9(6), 273–280 (1997)CrossRef M.C. Fairhurst, Signature verification revised: Promoting practical exploitation of biometric technology. Electron. Commun. Eng. J. 9(6), 273–280 (1997)CrossRef
54.
Zurück zum Zitat T.G. Zimmerman et al., Retail applications of signature verification. Biometric Report T.G. Zimmerman et al., Retail applications of signature verification. Biometric Report
55.
Zurück zum Zitat J.B. Ciulla, Ethics effectiveness: The nature of good leadership, in The Nature of Leadership, 2nd edn., (SAGE, Los Angeles, CA, 2012), pp. 508–540 J.B. Ciulla, Ethics effectiveness: The nature of good leadership, in The Nature of Leadership, 2nd edn., (SAGE, Los Angeles, CA, 2012), pp. 508–540
56.
Zurück zum Zitat U. Pal et al., Signature-based biometric authentication. in Computational Intelligence in Digital Forensics: Forensic Investigation and Applications, 2014, pp. 285–314 U. Pal et al., Signature-based biometric authentication. in Computational Intelligence in Digital Forensics: Forensic Investigation and Applications, 2014, pp. 285–314
Metadaten
Titel
Online Signature-Based Biometric Recognition
verfasst von
Sudeep Tanwar
Mohammad S. Obaidat
Sudhanshu Tyagi
Neeraj Kumar
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-319-98734-7_10