REMOTE HANDWRITTEN SIGNATURE AUTHENTICATION

Jarrod Trevathan, Alan McCabe

2005

Abstract

This paper presents a secure real-time remote user authentication system based on dynamic handwritten signature verification. The system allows users to establish their identities to other parties in real-time via a trusted verification server. The system can be used to gain remote access to restricted content on a server or to verify a signature on a legal document. State of the art dynamic verification techniques are combined with proven cryptographic methods to develop a secure model for remote handwritten signature verification.

References

  1. Diffie, W. and Hellman, M.E. (1976). New Directions in Cryptography. IEEE Transactions on Information Theory, 22, 644-654.
  2. ElGamal, T. (1985). A Public Key Cryptosystem and a Signature Scheme based on Discrete Logarithms. IEEE Transactions on Information Theory 31, pp. 469-472.
  3. Gupta, G. and McCabe, A. (1997). A Review of Dynamic Handwritten Signature Verification. Computer Science Department, James Cook University.
  4. Jain, A., Prabhakar, S. and Ross A. (1998). BiometricsBased Web Access. Technical Report TR98-33, Michigan State University.
  5. McCabe, A. (2000). Markov Modelling of Simple Directional Features for Efficient and Effective Handwriting Verification. R. Mizoguchi and J. Slaney (Eds.). PRICAI 2000, LNAI 1886, p. 801.
  6. McCabe, A. (1997). Implementation and Analysis of a Handwritten Signature Verification Technique. Honours Thesis, James Cook University.
  7. McCabe, A. (2004). Cooperating Statistical Models for Handwritten Signature Verification. PhD Thesis, James Cook University.
  8. Rivest, R., Shamir, A. and Adleman, L. (1978) A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, 21 (2), pp. 120-126.
  9. Techweb. (1998). Net-Based Fingerprint Security Arrives, http://www.techweb.com/wire/story/TWB1998020 6S0006
  10. Schneier, B. (1994). A Primer on Authentication and Digital Signatures, Computer Security Journal, v 10, n. 2, pp. 63-71.
  11. Schneier, B. (1996). Applied Cryptography. J. 2nd Edition, Wiley and Sons, Inc. USA.
  12. Stephen, G. (1994). String Searching Algorithms. World Scientific, Lecture notes in Computing - Vol. 3.
Download


Paper Citation


in Harvard Style

Trevathan J. and McCabe A. (2005). REMOTE HANDWRITTEN SIGNATURE AUTHENTICATION . In Proceedings of the Second International Conference on e-Business and Telecommunication Networks - Volume 1: ICETE, ISBN 972-8865-32-5, pages 335-339. DOI: 10.5220/0001419203350339


in Bibtex Style

@conference{icete05,
author={Jarrod Trevathan and Alan McCabe},
title={REMOTE HANDWRITTEN SIGNATURE AUTHENTICATION},
booktitle={Proceedings of the Second International Conference on e-Business and Telecommunication Networks - Volume 1: ICETE,},
year={2005},
pages={335-339},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001419203350339},
isbn={972-8865-32-5},
}


in EndNote Style

TY - CONF
JO - Proceedings of the Second International Conference on e-Business and Telecommunication Networks - Volume 1: ICETE,
TI - REMOTE HANDWRITTEN SIGNATURE AUTHENTICATION
SN - 972-8865-32-5
AU - Trevathan J.
AU - McCabe A.
PY - 2005
SP - 335
EP - 339
DO - 10.5220/0001419203350339