REMOTE HANDWRITTEN SIGNATURE AUTHENTICATION
Jarrod Trevathan, Alan McCabe
2005
Abstract
This paper presents a secure real-time remote user authentication system based on dynamic handwritten signature verification. The system allows users to establish their identities to other parties in real-time via a trusted verification server. The system can be used to gain remote access to restricted content on a server or to verify a signature on a legal document. State of the art dynamic verification techniques are combined with proven cryptographic methods to develop a secure model for remote handwritten signature verification.
References
- Diffie, W. and Hellman, M.E. (1976). New Directions in Cryptography. IEEE Transactions on Information Theory, 22, 644-654.
- ElGamal, T. (1985). A Public Key Cryptosystem and a Signature Scheme based on Discrete Logarithms. IEEE Transactions on Information Theory 31, pp. 469-472.
- Gupta, G. and McCabe, A. (1997). A Review of Dynamic Handwritten Signature Verification. Computer Science Department, James Cook University.
- Jain, A., Prabhakar, S. and Ross A. (1998). BiometricsBased Web Access. Technical Report TR98-33, Michigan State University.
- McCabe, A. (2000). Markov Modelling of Simple Directional Features for Efficient and Effective Handwriting Verification. R. Mizoguchi and J. Slaney (Eds.). PRICAI 2000, LNAI 1886, p. 801.
- McCabe, A. (1997). Implementation and Analysis of a Handwritten Signature Verification Technique. Honours Thesis, James Cook University.
- McCabe, A. (2004). Cooperating Statistical Models for Handwritten Signature Verification. PhD Thesis, James Cook University.
- Rivest, R., Shamir, A. and Adleman, L. (1978) A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, 21 (2), pp. 120-126.
- Techweb. (1998). Net-Based Fingerprint Security Arrives, http://www.techweb.com/wire/story/TWB1998020 6S0006
- Schneier, B. (1994). A Primer on Authentication and Digital Signatures, Computer Security Journal, v 10, n. 2, pp. 63-71.
- Schneier, B. (1996). Applied Cryptography. J. 2nd Edition, Wiley and Sons, Inc. USA.
- Stephen, G. (1994). String Searching Algorithms. World Scientific, Lecture notes in Computing - Vol. 3.
Paper Citation
in Harvard Style
Trevathan J. and McCabe A. (2005). REMOTE HANDWRITTEN SIGNATURE AUTHENTICATION . In Proceedings of the Second International Conference on e-Business and Telecommunication Networks - Volume 1: ICETE, ISBN 972-8865-32-5, pages 335-339. DOI: 10.5220/0001419203350339
in Bibtex Style
@conference{icete05,
author={Jarrod Trevathan and Alan McCabe},
title={REMOTE HANDWRITTEN SIGNATURE AUTHENTICATION},
booktitle={Proceedings of the Second International Conference on e-Business and Telecommunication Networks - Volume 1: ICETE,},
year={2005},
pages={335-339},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001419203350339},
isbn={972-8865-32-5},
}
in EndNote Style
TY - CONF
JO - Proceedings of the Second International Conference on e-Business and Telecommunication Networks - Volume 1: ICETE,
TI - REMOTE HANDWRITTEN SIGNATURE AUTHENTICATION
SN - 972-8865-32-5
AU - Trevathan J.
AU - McCabe A.
PY - 2005
SP - 335
EP - 339
DO - 10.5220/0001419203350339