Skip to main content

eSignature Verification on Web Using Statistical Mining Approach

  • Conference paper
  • First Online:
Web Technologies and Applications (APWeb 2003)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2642))

Included in the following conference series:

  • 537 Accesses

Abstract

This research is related to the field of biometrics. The biometrics research consists of fingerprint scans, retina scans, voiceprint analyses, and so on [1]. Although an electronic signature (eSignature) does not actually come from human, it comes from an indirect tissue (i.e. handwriting) of a human. For instance, a handwritten signature will be collected from a cardholder when filling out the application form of credit card and formularized from a normal signature to an electronic signature. This eSignature will then be transmitted and stored into XML document in a data center. We will extract the eSignature that is a group of numbers from the database. This group of numbers is a factor in preceding the Online Analytical Mining (OLAM) [2]. We use the Internet as a network channel. We will also use the XML-RPC [6] to implement the active rules and apply OLAM to verify incoming eSignatures.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. E.D. Zwicky, S. Cooper, & D.B. Chapman, “Internet and Web Security — Building Internet Firewalls”, O’Reilly 2nd Edition 2000, pp 591–627.

    Google Scholar 

  2. Joseph Fong, H.K. Wong, & Anthony Fong, “Online Analytical Mining Web-Pages Tick Sequences”, Journal of Data Warehousing, Vol. 5, No. 4, Fall 2000, pp 59–68.

    Google Scholar 

  3. “The GIF Controversy: A Software Developer’s Perspective”, Last revision February 2, 2002. Web shortcut to this page: lzw.info. Parts are quoted with permission from CompuServe Information Service. Parts are excerpted from the PNG specification.

    Google Scholar 

  4. South China Morning Post, Hong Kong, March 9 2002, Page 2.

    Google Scholar 

  5. B. Erickson & F. Romano, “Professional Digital Photography”, Prentice Hall PTR, 1999, pp 54–127.

    Google Scholar 

  6. J. Fong and S.K. Cheung, “Online Analytical Mining for eSignature”, Proceedings of the IASTED International Conference — Information Systems and Databases 2002 Tokyo Japan, ACTA Press, ISBN 0-88986-362-8, ISSN 1482-793X, pp 287–292.

    Google Scholar 

  7. “XML-RPC”, UserLand Software, Inc., http://www.xmlrpc.com, 1998–2002.

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Fong, J., Cheung, S.K., Kwan, I. (2003). eSignature Verification on Web Using Statistical Mining Approach. In: Zhou, X., Orlowska, M.E., Zhang, Y. (eds) Web Technologies and Applications. APWeb 2003. Lecture Notes in Computer Science, vol 2642. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36901-5_30

Download citation

  • DOI: https://doi.org/10.1007/3-540-36901-5_30

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-02354-8

  • Online ISBN: 978-3-540-36901-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics