IMPLEMENTATION AND ANALYSIS OF A HANDWRITTEN SIGNATURE VERIFICATION TECHNIQUE

Alan McCabe, Jarrod Trevathan

Abstract

There is considerable interest in authentication based on handwritten signature verification because it is superior to many other biometric authentication techniques such as finger prints or retinal patterns, which are reliable but much more intrusive. The paper details a number of experiments using a signature verfication technique which is unlike any other reported in literature. Specifically, characters are used to represent various features of a signature image allowing the use of existing and proven string distance metrics to determine distances between signatures. Extensive testing shows that our proposed system is comparable with, and in many aspects better than the highest quality signature verfication techniques presented in literature.

References

  1. Dimauro, G., Impedovo, S., and Pirlo, G. (1994). Component-Oriented Algorithms for Signature Verification. International Journal of Pattern Recognition and Artificial Intelligence. Vol 8, No 3, 771-793.
  2. Gupta, G.K., and Joyce, R.C. (1997a). A Sudy of Shape in Dynamic Handwritten Signature Verification. Submitted for publication.
  3. Gupta, G.K., and Joyce, R.C. (1997b). A Sudy of Some Pen Motion Features in Dynamic Handwritten Signature Verification. Submitted for publication.
  4. McCabe, A. (2000). Markov Modelling of Simple Directional Features for Effective and Efficient Handwriting Verification. R. Mizoguchi and J. Slaney (Eds.): PRICAI 2000, LNAI 1886, 801(1-12).
  5. McCabe, A. and Trevathan, J. (2007). Pre-processing time dependent signals in a noisy environment, In Proceedings of the 4th International Conference on Information Technology - New Generations, 393-397.
  6. Nelson, W., Turin, W. and Hastie, T. (1994). Statistical Methods for On-line Signature Verification., In International Journal of Pattern Recognition and Artificial Intelligence, vol. 8, No. 3, 749-770.
  7. Trevathan, J. and McCabe, A. (2005). Remote Handwritten Signature Authentication, In Proceedings of the 2nd International Conference on e-Businees and Telecommunications Engineers, 335-339.
  8. Wagner, R. A. and Fischer, M. J. (1974). The String-toString Correction Problem. Journal of the ACM. Vol 21, No 8, 168-173.
Download


Paper Citation


in Harvard Style

McCabe A. and Trevathan J. (2007). IMPLEMENTATION AND ANALYSIS OF A HANDWRITTEN SIGNATURE VERIFICATION TECHNIQUE . In Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007) ISBN 978-989-8111-12-8, pages 48-58. DOI: 10.5220/0002121500480058


in Bibtex Style

@conference{secrypt07,
author={Alan McCabe and Jarrod Trevathan},
title={IMPLEMENTATION AND ANALYSIS OF A HANDWRITTEN SIGNATURE VERIFICATION TECHNIQUE},
booktitle={Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007)},
year={2007},
pages={48-58},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002121500480058},
isbn={978-989-8111-12-8},
}


in EndNote Style

TY - CONF
JO - Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007)
TI - IMPLEMENTATION AND ANALYSIS OF A HANDWRITTEN SIGNATURE VERIFICATION TECHNIQUE
SN - 978-989-8111-12-8
AU - McCabe A.
AU - Trevathan J.
PY - 2007
SP - 48
EP - 58
DO - 10.5220/0002121500480058