While graphic-analysis experts are able to spot the differences between authentic
signatures and frauds, a lay person at the counter of a departmental store is unable to
see such subtleties.
Use of Personal Identification Number (PIN) and password have evolved over
the past 3 decades to provide means of authentication of people for accessing funds,
database or buildings. These are being used at banks and ATM, for telephonic access
to financial and data, for accessing computers and database, and as a digital signature
to authenticate an electronic document. While this technique has the advantage that it
is easy to be automated, there are several shortcomings. Authentic users may forget
their PIN, and it has been demonstrated repeatedly that it is possible to deduce the
PIN from other seemingly unrelated information of the user.
In the recent past, biometrics techniques have been developed for machine
based verification of the identity of a person. Biometric authentication is based on
using some physiological or behavioural characteristic of a subject to authenticate that
particular subject [12]. Verification is defined as comparing an entity provided by the
user to a biometric template stored in the database.
Biometrics based verification techniques such as the use of DNA are suitable
for very high level of confidence, these techniques are not feasible for routine
applications such as logging into the computer, or accessing funds or paying at the
grocery store. Biometrics based techniques that are exceedingly being used include
the use of fingerprints, hand geometry and iris scan.
Even though the use of the anatomical measurements of the individual has
often been considered to be extremely robust for identifying an individual, these have
their own limitation. All traditional biometrics measures have certain limitations
associated to them [12]. DNA cannot be used in certain applications due to issues of
contamination, sensitivity, cumbersomeness and privacy; ear-shape as a biometric
measure has a problem of non unique features; facial biometrics have problems with
aging, face disguise and variable imaging conditions; hand and finger geometry can
be easily copied. Although fingerprints are very unique but they also have the
problem of fake fingers, storage and imaging conditions problems. Iris biometrics is
intrusive and has issues of unreliability. Speech biometrics has the limitation of
mechanical variance due to the microphone and dependence on subjects’ health [12].
The other major concern with the anatomical based biometrics is that these can be
copied by the impostor using deceit or force, and once copied, the authentic user
would be faced with life-long loss of identity.
To overcome some of the above mentioned shortcomings, researchers have
attempted to develop non-anatomical ‘biometrics’. Biometrics such as keystroke and
gait analysis are based on the behaviour of the individual [12] but the reliability is
highly questionable. The other shortcoming in each of these is that these do not give
the user any control.
This paper describes a machine based verification of identity that overcomes
the above mentioned difficulties. The system is based on the use of traditional
signatures, but without the user leaving a visual trace of the signature. The system
does not require any photograph, or any other physical or visual trace of the signature.
The unpenned signature verifier (USV) – captures the dynamics of the drawing of the
signature, which is much more difficult to copy even by an expert forger [10]. The
other advantage of this technique is that the data required to authenticate the USV is
small enough to be stored within an electronic document or on a smart-card.
190