Part of the SpringerBriefs in Computer Science book series (BRIEFSCOMPUTER)


The most relevant work related to sketch-based authentication systems is discussed in this chapter. There are three primary areas of focus: terminology, graphical authentication systems, and biometric systems. All the terminology introduced not only occurs within this brief, but throughout the literature. These definitions are introduced first so that the likelihood of misinterpretation is minimal. Graphical authentication mechanisms may be based on global cognitive recognition, local regions of interest, or relatively simple drawings. This brief only focuses on the latter. Biometrics, which may conceivably be considered a completely independent topic, are thought to provide the best possible security. For all intents and purposes, graphical authentication and biometric security are completely separate problems. However, after understanding the intricate details for each problem, the recognition problem associated with graphical passwords fused with biometric information is more easily comprehensible.


Passwords Authentication Security Graphics Biometrics 


  1. 1.
    M. I. Bernstein. Computer recognition of on-line, hand-written characters. Memorandum RM-3753-ARPA, The RAND Corporation, Santa Monica, California, October 1964.Google Scholar
  2. 2.
    S. Chiasson, P. C. Van Oorschot, and R. Biddle. Graphical password authentication using cued click points. 12th European Symposium on Research in Computer Society, pages 359–374, 2007.Google Scholar
  3. 3.
    S. Chiasson, A. Forget, R. Biddle, and P. C. Van Oorschot. Influencing users towards better passwords: Persuasive cued click-points. British Computer Society Conference on Human-Computer Interaction, 1:121–130, 2008.Google Scholar
  4. 4.
    S-B. Cho. Neural-network classifiers for recognizing totally unconstrained handwritten numerals. IEEE Trans. on Neural Networks, 8:43–53, 1997.CrossRefGoogle Scholar
  5. 5.
    D. Davis, F. Monrose, and M. K. Reiter. On user choice in graphical password schemes. Proc. of the 13th USENIX Security Symposium, pages 151–164, 2004.Google Scholar
  6. 6.
    A. De Angeli, L. Coventry, G. Johnson, and K. Renaud. Is a picture really worth a thousand words? exploring the feasibility of graphical authentication systems. Int’l Journal of Human Computer Studies, 63(1–2):128–152, 2005.CrossRefGoogle Scholar
  7. 7.
    R. Dhamija and A. Perrig. Déjà vu: A user study using images for authentication. Proc. of the 9th USENIX Security Symposium, pages 45–58, 2000.Google Scholar
  8. 8.
    P. Dunphy and J. Yan. Do background images improve “draw a secret” graphical passwords? Proc. of the 14th ACM Conf. on Computer and Communications Security, pages 36–47, 2007.Google Scholar
  9. 9.
    M. Faundez-Zanuy. Signature Recognition State-of-the-art. IEEE Aerospace and Electronic Systems Magazine, pages 28–32, July 2005.Google Scholar
  10. 10.
    M. Fuandez-Zanuy. Biometric Security Technology. IEEE Aerospace and Electronic Systems Magazine, 21(6):15–26, June 2006.Google Scholar
  11. 11.
    Y. Gao and M. K. H. Leung. Face recognition using line edge map. IEEE Transactions on Pattern Analysis and Machine Intelligence, 24:764–779, 2002.CrossRefGoogle Scholar
  12. 12.
    H. Gao, X. Guo, X. Chen, L. Wang, and X. Liu. Yet another graphical password strategy. Proc. of the Annual Computer Security Applications Conference, pages 121–129, 2008.Google Scholar
  13. 13.
    C. Geng and X. Jiang. Face recognition using sift features. 16th IEEE Int’l Conf. on Image Processing, pages 3313–3316, 2009.Google Scholar
  14. 14.
    J. Goldberg and J. Hagman. Doodling our way to better authentication. Proc. of the ACM Conference on Human Factors in Computing Systems, pages 868–869, 2002.Google Scholar
  15. 15.
    D. S. Guru and H. N. Prakash. Online Signature Verification and Recognition: An Approach Based on Symbolic Representation. IEEE Transactions on Pattern Analysis and Machine Intelligence, 31(6):1059–1073, June 2009.CrossRefGoogle Scholar
  16. 16.
    M. Hamdani, A.E.-D. Mousa, and H. Ney. Open vocabulary arabic handwriting recognition using morphologycal decomposition. Int’l Conf. on Document Analysis and Recogntion, pages 280–284, 2013.Google Scholar
  17. 17.
    N. M. Herbst and C. N. Liu. Signature verification method and apparatus utilizing both acceleration and pressure characteristics. U.S. Patent 4 128 829, 1978.Google Scholar
  18. 18.
    G. F. Houle, D. B. Aragon, R. W. Smith, M. Shridhar, and D. Kimura. A multi-layered corroboration based check reader. In J. J. Hull and S. L. Taylor, editors, Document Analysis System II, pages 137–174. World Scientific, 1998.Google Scholar
  19. 19.
    A. Jain, L. Hong, and Y. Kulkarni. A multimodal biometric system using fingerprint, face, and speech. 2nd Int’l Conf. on AVBPA, pages 182–187, 1999.Google Scholar
  20. 20.
    A. K. Jain, F. D. Griess, and S. D. Connell. On-line signature verification. Pattern Recognition, 35:2963–2972, 2002.CrossRefzbMATHGoogle Scholar
  21. 21.
    A. K. Jain, A. Ross, and S. Prabhakar. An introduction to biometric recognition. IEEE Trans. on Circuits and Systems for Video Technology, 14(1):4–20, Jan. 2004.CrossRefGoogle Scholar
  22. 22.
    I. Jermyn, A. Mayer, F. Monrose, M. Reiter, and A. Rubin. The design and analysis of graphical passwords. Proc. of the 8th USENIX Security Symposium, pages 1–14, 1999.Google Scholar
  23. 23.
    R. S. Kashi, Jianying Hu, and W. L. Nelson. On-line handwritten signature verification using hidden markov model features. Proc. of the 4th Int’l. Conf. on Document Analysis and Recognition, 1:253–257, 1997.Google Scholar
  24. 24.
    C. Kaufman, R. Perlman, and M. Speciner. Network security: private communication in a public world. Prentice Hall, 2nd edition, 2002.Google Scholar
  25. 25.
    A. Kholmatov and B. Yanikoglu. Identity authentication using improved online signature verification method. Pattern Recognition Letters, 26:2400–2408, 2005.CrossRefGoogle Scholar
  26. 26.
    A. Kosmala, J. Rottland, and G. Rigoll. An investigation of the use of trigraphs for large vocabulary cursive handwriting recognition. IEEE Int’l Conf. on Acoustics, Speech, and Signal Processing, pages 3373–3376, 1997.Google Scholar
  27. 27.
    C. Liu, F. Yin, Q. Wang, and D. Wang. Icdar 2011 chinese handwriting recognition competition. Int’l Conf. on Document Analysis and Recognition, pages 1464–1469, 2011.Google Scholar
  28. 28.
    D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar. \textitHandbook of fingerprint recognition. Springer, Berlin, 2003.zbMATHGoogle Scholar
  29. 29.
    M. M. Mehdi. Optimized word segmentation for the word based cursive handwriting recognition. 2013 European Modelling Symposium, pages 299–304, 2013.Google Scholar
  30. 30.
    A. Nagar, K. Nandakumar, and A. K. Jain. Multibiometric cryptosystem based on feature level fusion. IEEE Trans. on Information Forensics and Security, 7(1):255–268, 2012.CrossRefGoogle Scholar
  31. 31.
    PASSFACES CORPORATION. The science behind passfaces., 2009.
  32. 32.
    H. Pesch, J. Hamdani, M. Forster, and H. Ney. Analysis of preprocessing techniques for latin handwriting recognition. Int’l Conf. on Frontiers in Handwriting Recognition,[AQ1] pages 280–284, 2012.Google Scholar
  33. 33.
    R. Plamondon and G. Lorette. Automatic Signature Verification and Write Identification—The State of the Art. Pattern Recognition, 22(2):107–131, 1989.CrossRefGoogle Scholar
  34. 34.
    N. K. Rantha, S. Chikkerur, J. H. Connell, and R. M. Bolle. Generating cancelable fingerprint templates. IEEE Trans. on Pattern Analysis and Machine Intelligence, 29(4), April 2007.Google Scholar
  35. 35.
    K. V. Renaud. Guidelines for designing graphical authentication mechanism interfaces. Int’l Journal of Information and Computer Security, 3(1):60–85, 2009.CrossRefGoogle Scholar
  36. 36.
    K. V. Renaud. On user involvement in production of images used in visual authentication. Journal of Visual Languages & Computing, 20(1):1–15, 2009.CrossRefGoogle Scholar
  37. 37.
    A. Ross and A. K. Jain. Multimodal biometrics: an overview. Proc. of 12th EUSIPCO, pages 1221–1224, 2004.Google Scholar
  38. 38.
    A. Ross, K. Nandakumar, and A. K. Jain. \textitHandbook of multi biometrics. Spinger-Verlag, New York, 2006.Google Scholar
  39. 39.
    M. Savvides, B. V. K. Vijaya Kumar, and P. K. Khosla. Cancelable biometric filters for face recognition. Procs of the 17Th. Int’l Conf. on Pattern Recognition, pages 922–925, August 2004.Google Scholar
  40. 40.
    Y. Taigman, M. Yang, M. Ranzato, and L. Wolf. Deepface: closing the gap to human-level performance in face verification. IEEE Conf. on Computer Vision and Pattern Recognition, pages 1701–1708, 2014.Google Scholar
  41. 41.
    H. Tao and C. Adams. Pass-go: A proposal to improve the usability of graphical passwords. Int’l Journal of Network Security, 7(2):273–292, 2008.Google Scholar
  42. 42.
    C. Varenhorst. Passdoodles: A lightweight authentication method. MIT Research Science Institute, July 2004.Google Scholar
  43. 43.
    S. Weidenbeck, J. Waters, J. Birget, A. Brodskiy, and N. Memon. Authentication using graphical passwords: Basic results. Proc. of the 11th Int’l Conf. on Human-Computer Interaction, 2005.Google Scholar
  44. 44.
    S. Weidenbeck, J. Waters, J. Birget, A. Brodskiy, and N. Memon. Authentication using graphical passwords: Effects of tolerance and image choice. Proc. of the 1st Symposium on Usable Privacy and Security, pages 1–12, 2005.Google Scholar
  45. 45.
    S. Weidenbeck, J. Waters, J. Birget, A. Brodskiy, and N. Memon. Passpoints: Design and longitudinal evaluation of a graphical password system. Int’l Journal of Human Computer Studies, 63(1–2):102–127, 2005.CrossRefGoogle Scholar
  46. 46.
    F. Yin, Q. Wang, and X. Zhang. Icdar 2013 chinese handwriting recognition competition. Int’l Conf. on Document Analysis and Recognition, pages 1464–1470, 2013.Google Scholar
  47. 47.
    H. Zhou, A. Mian, L. Wei, and D. Creighton. Recent advances on single modal and multimodal face recognition: a survey. IEEE Transactions on Human-Machine Systems, PP(99):1–16, 2014.Google Scholar

Copyright information

© The Author(s) 2014

Authors and Affiliations

  1. 1.Department of Electrical and Computer EngineeringNorth Carolina State UniversityRaleighUSA
  2. 2.US Army Research OfficeDurhamUSA

Personalised recommendations