containing a set of algorithms which compare two
strings of symbols extracted from the two signatures:
the input signature from the authentication phase and
the specimen signatures from the registration phase.
The pen signals are translated into these symbols
arrays called “invariants “which have attached a cost
and are used in several algorithms like the
„Levenshtein” algorithm (Andrei, Rusu, Diaconescu
and Dinescu, 2011).
We compute the performance coefficients FAR
and FRR for each user registered in the database,
using 5 signatures declared as being genuine, and we
consider them to be specimens. Then, for each user,
we send all the remaining genuine signatures to be
authenticated, computing the FRR coefficient. For
all subjects in the database, to compute the FAR, we
send for authentication all the signatures that were
captured as forgeries for a subject.
The performance coefficients obtained when
using the collected database before any of the post-
processing procedures presented above are: FRR
19.44% and FAR 2.29%. By removing the
acquisition errors and the operating errors, the FRR
decreased with 2.29 percentages, meaning that there
will be more with 2.29 percentages genuine
signatures accepted correctly. The FAR also
decreased with 0.45 percentages, meaning that more
forgery attempts will be rejected correctly. By
applying also z-score for data standardization over
the post-processed dataset, we obtain the same value
for FRR while the value for FAR decreased with
another 0.57 percentages. The above results prove
that, in order to build a strong data collection of
dynamic signatures, you need to make sure that the
signatures of a user are consistent; otherwise there
will be negative effects in the evaluation process.
We observed that, the additional method applied
for eliminating the set of signatures acquired in the
first session (Table 1) of the acquisition process,
further improves results: FRR decreased with 2.56
percentages. This is due to the fact that the signer
was not fully accustomed to the signing pen in the
first day of acquisition. After applying all post-
processing procedures mentioned above, over the
data collection, the performance coefficients
improved: FRR decreased with approximately 5
percentages, while FAR decreased with
approximately 1 percentage.
5 CONCLUSIONS
In this paper we presented our methods to achieve a
major step in evaluating performances of online
signature authentication systems: data collection.
We described our acquisition process, acquisition
device and acquisition application. We presented our
approach used to collect genuine signatures and
forgeries. We applied post-processing methods on
the collected database. Besides, using the raw
databases and also the post-processed database we
report the performance results of our dynamic
signature verification system. The obtained results
support the claim that signature data collecting
strategies have an impact over the performance
coefficients of an authentication system.
In future works, it is interesting to study how the
performance results will change if we use forgeries
collected from professional forgers which would be
motivated to break the system and also signatures
which are collected over a long period of time.
REFERENCES
Rusu, S., Dinescu, A., Diaconescu, S., 2011. Systems and
methods for assessing the authenticity of dynamic
handwritten signature. World Intellectual Property
Organization WO/2011/112113.
Bernadette, D., Chollet, G., Petrovska-Delacrétaz, D.,
2009. Guide to Biometric Reference Systems and
Performance Evaluation. In London: Springer-Verlag
London, pp. 125-166.
Yeung, D. Y., Chang, H., Xiong,Y., George, S., Kashi, R.,
Matsumoto, T., Rigoll, G., 2004. SVC2004: First
International Signature Verification Competition. In
Springer LNCS, Volume 3072, pp. 16-22.
Houmani, N., Mayoue, A., Garcia-Salicetti, S., Dorizzi,
B., Khalil, M. I., Moustafa, M. N., Abbas, H.,
Muramatsu, D., Yanıkoğlu, Berrin, Kholmatov,
Alisher, Martinez-Diaz, M., Fierrez, J., Ortega-Garcia,
J., Roure Alcobe, J., Fabregas, J., Faundez-Zanuy, M.,
Pascual-Gaspar, J. M., Carednoso-Payo, V.,
Vivaracho-Pascual, C., 2011. BioSecure signature
evaluation campaign (BSEC’2009): evaluating online
signature algorithms depending on the quality of
signatures. In: Pattern Recognition, Volume 45, Issue
3, pp. 993-1003.
Larsen, R. J., Marx, M. L., 2006. An Introduction to
Mathematical Statistics and Its Applications. 4th ed.
Prentice Hall, pp. 308-869.
Andrei, V., Rusu, M. S., Diaconescu S., Dinescu, A.,
2011. Securing On-line Payment using Dynamic
Signature Verification. LISS (3) 2011, pp. 58-65.
WEBIST2012-8thInternationalConferenceonWebInformationSystemsandTechnologies
254