Signing Documents by Hand: Model for Multi-Factor Authentication

  • Sergey Bezzateev
  • Natalia Voloshina
  • Vadim Davydov
  • Tamara Minaeva
  • Nikolay RudavinEmail author
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11118)


The importance of verification of the user could not be neglected in the technological world of today. In this work, we focus on the Multi-Factor Authentication (MFA) system with a first factor as the user signature and with his fingerprint as a second biometrical factor. This authentication information about the user is further utilized to calculate a signature of the signed document. Obtained signature is embedded into the document as a digital watermark by using syndrome based steganographic algorithm for weighted container WF5.



This work was partly financially supported by Russian Foundation for Basic Research in 2017 (grant 17-07-00849-A).


  1. 1.
    Khan, S.H., Akbar, M.A., Shahzad, F., Farooq, M., Khan, Z.: Secure biometric template generation for multi-factor authentication. Pattern Recognit. 48(2), 458–472 (2015)CrossRefGoogle Scholar
  2. 2.
    Ometov, A., Bezzateev, S., Mäkitalo, N., Andreev, S., Mikkonen, T., Koucheryavy, Y.: Multi-factor authentication: a survey. Cryptography 2(1), 1 (2018)CrossRefGoogle Scholar
  3. 3.
    Weir, M., Aggarwal, S., De Medeiros, B., Glodek, B.: Password cracking using probabilistic context-free grammars. In: 2009 30th IEEE Symposium on Security and Privacy, pp. 391–405. IEEE (2009)Google Scholar
  4. 4.
    De Luca, A., Hang, A., Von Zezschwitz, E., Hussmann, H.: I feel like I’m taking selfies all day! Towards understanding biometric authentication on smartphones. In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, pp. 1411–1414. ACM (2015)Google Scholar
  5. 5.
    Grankin, M., Khavkina, E., Ometov, A.: Research of MEMS accelerometers features in mobile phone. In: Proceedings of the 12th Conference of Open Innovations Association FRUCT, pp. 31–36 (2012)Google Scholar
  6. 6.
    Maltoni, D., Maio, D., Jain, A.K., Prabhakar, S.: Handbook of fingerprint recognition. Springer, London (2009). Scholar
  7. 7.
    Ometov, A., Bezzateev, S.: Multi-factor authentication: a survey and challenges in V2X applications. In: Proceedings of 9th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), pp. 129–136. IEEE (2017)Google Scholar
  8. 8.
    Bas, P., Furon, T., Cayre, F., Doërr, G., Mathon, B.: Watermarking Security: Fundamentals. Springer, Secure Designs and Attacks. Springer, Singapore (2016). Scholar
  9. 9.
    Xu, H., Zhou, Y., Lyu, M.R.: Towards continuous and passive authentication via touch biometrics: an experimental study on smartphones. In: Proceedings of Symposium on Usable Privacy and Security, SOUPS. vol. 14, pp. 187–198 (2014)Google Scholar
  10. 10.
    Bezzateev, S., Voloshina, N., Zhidanov, K.: Multi-level significant bit (MLSB) embedding based on weighted container model and weighted F5 concept. In: Abraham, A., Wegrzyn-Wolska, K., Hassanien, A.E., Snasel, V., Alimi, A.M. (eds.) Proceedings of the Second International Afro-European Conference for Industrial Advancement AECIA 2015. AISC, vol. 427, pp. 293–303. Springer, Cham (2016). Scholar
  11. 11.
    Voloshina, N., Zhidanov, K., Bezzateev, S.: Optimal weighted watermarking for still images. In: Proceedings of XIV International Symposium on Problems of Redundancy in Information and Control Systems (REDUNDANCY), pp. 98–102. IEEE (2014)Google Scholar
  12. 12.
    Topaz Systems INC.: [company website]. Accessed 25 May 2018
  13. 13.
    Wacom Business Solutions: [company website]. Accessed 25 May 2018
  14. 14.
    Comsigntrust: [company website]. Accessed 25 May 2018
  15. 15.
    eSign: [company website]. Accessed 25 May 2018
  16. 16.
    Gandra, M., Seabra, R., Lima, F.P.: A low-cost, versatile data logging system for ecological applications. Limnol. Ocean. Methods 13(3), 115–126 (2015)Google Scholar
  17. 17.
    Grunthaner, M.P., Richards, P.W., Hotelling, S.P.: Frustrated total internal reflection and capacitive sensing (2018), uS Patent 9,891,759Google Scholar
  18. 18.
    Kevenaar, T.: Protection of biometric information. In: Tuyls, P., Skoric, B., Kevenaar, T. (eds.) Security with Noisy Data. Springer, London (2007). Scholar
  19. 19.
    Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. SIAM J. Comput. 38(1), 97–139 (2008)MathSciNetCrossRefGoogle Scholar
  20. 20.
    Schnorr, C.P.: Efficient signature generation by smart cards. J. Cryptol. 4(3), 161–174 (1991)CrossRefGoogle Scholar
  21. 21.
    Bezzateev, S., Voloshina, N., Zhidanov, K.: Weighted digital watermarking approaches comparison. In: Proceedings of International Symposium on Problems of Redundancy in Information and Control Systems (RED), pp. 172–174. IEEE (2016)Google Scholar
  22. 22.
    Fridrich, J., Long, M.: Steganalysis of LSB encoding in color images. In: 2000 IEEE International Conference on Multimedia and Expo, ICME 2000, vol. 3, pp. 1279–1282. IEEE (2000)Google Scholar
  23. 23.
    Anand, K., Sharma, E.R.: Comparison of LSB and MSB based image steganography. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 4(8), 906–909 (2014)Google Scholar
  24. 24.
    Bezzateev, S., Shekhunova, N.: Class of generalized Goppa codes perfect in weighted Hamming metric. Des. Codes Cryptography 1(66), 391–399 (2013)MathSciNetCrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2018

Authors and Affiliations

  1. 1.ITMO UniversitySt. PetersburgRussia

Personalised recommendations