Skip to main content

Online Signature-Based Biometric Recognition

  • Chapter
  • First Online:
Book cover Biometric-Based Physical and Cybersecurity Systems

Abstract

This chapter covers the online signature-based biometric recognition system, which includes fingerprint scanning, facial geometry, footprint scanning, retina and iris patterns, DNA, and heartbeat scans. It covers the background knowledge of signature verification system along with its classification. A systematic comparison between online and offline signature verification system is also included. Basics of biometric recognition in terms of security, exploring definitions of the various parameters that can be used in the security perspective, are also covered (Obaidat and Boudriga, Security of e-Systems and Computer Networks. Cambridge University Press, 2007; Obaidat and Sadoun, IEEE Trans Syst Man Cybernetics Part B, 27(2):261–269, 1997). An in-depth discussion about the online signature-based authentication methods is also presented. Finally, some case studies have been discussed to demonstrate the concept.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. M.S. Obaidat, N. Boudriga, Security of e-Systems and Computer Networks (Cambridge University Press, 2007)

    Google Scholar 

  2. M.S. Obaidat, B. Sadoun, Verification of computer users using keystroke dynamics. IEEE Trans. Syst. Man Cybernetics, Part B 27(2), 261–269 (1997)

    Article  Google Scholar 

  3. M.V. Kanawade, S.S. Katariya, Signature verification & recognition – case study. Int. J. Electron. Commun. Instrumentation Eng. Res. Dev. (IJECIERD) 3(1), 77–86 (2013)

    Google Scholar 

  4. B. Zhang, M. Fu, H. Yan, Handwritten signature verification based on neural ‘gas’ based vector quantization. in IEEE International Joint Conference on Neural Net-works, 1998, pp. 1862–1864

    Google Scholar 

  5. Sansone, Vento, Signature verification: Increasing performance by a multi-stage system. Pattern Anal. Applic. 3, 169–181 (2000)

    Article  Google Scholar 

  6. E.J.R. Justino, F. Bortolozzi, R. Sabourin, Off-line signature verification using HMM for random, simple and skilled forgeries. in ICDAR 2001, International Conference on Document Analysis and Recognition, vol. 1, 2001, pp. 105–110

    Google Scholar 

  7. J.F. Vélez, Á. Sánchez, A.B. Moreno, Robust off-line signature verification using compression networks and positional cuttings. in Proceedings of 2003 I.E. Workshop on Neural Networks for Signal Processing, vol. 1, 2003, pp. 627–636

    Google Scholar 

  8. A. Fallah, M. Jamaati, A. Soleamani, A new online signature verification system based on combining Mellin transform, MFCC and neural network. DSP 21(2), 404–416 (2011)

    Google Scholar 

  9. L. Findlater, J.O. Wobbrock, D. Wigdor, Typing on flat glass: examining ten-finger expert typing patterns on touch surfaces. in Proceedings of the 2011 annual conference on Human factors in computing systems, CHI ’11, 2011, pp. 2453–2462

    Google Scholar 

  10. N. Sae-Bae et al., Biometric-rich gestures: a novel approach to authentication on multi-touch devices. in CHI ’12, 2012, pp. 977–986

    Google Scholar 

  11. S. Prabhakar, S. Pankanti, A.K. Jain, Biometric recognition: Security and privacy concerns. IEEE Secur. Priv. Mag. 1, 33–42 (2003)

    Article  Google Scholar 

  12. S. Kulkarni, N. Takawale, A comparative study of biometric techniques. Int. J. Innovative Res. Comput. Commun. Eng. 4(1), 879–883 (2016)

    Google Scholar 

  13. Z. Riha, V. Matyas, Biometric authentication system. FIMU, 4–44 (2000)

    Google Scholar 

  14. S.D. DiptiVerma, Static signature recognition system for user authentication based two level cog, Hough transform and neural network. Int. J. Eng. Sci. Emerg. Technol. 6(3), 335–343 (2013)

    Google Scholar 

  15. G. Agam, S. Suresh, Warping based offline signature recognition. Inf. Forensics and Secur. 2(3), 430–437 (2007)

    Article  Google Scholar 

  16. F.Z. Marcos, signature recognition state–of–the–art. IEEE A&E Syst. Mag., 28–32 (2005)

    Google Scholar 

  17. J. Wen, B. Fang, and T. Jhang, Offline signature verification: a new rotation invariant approach, pp. 3583–3586

    Google Scholar 

  18. B. Jayasekara, A. Jayasiri, L. Udawatta, An evolving signature recognition system. in First International Conference on Industrial and Information Systems, ICIIS 2006, 2006, pp. 529–534

    Google Scholar 

  19. J. Zheng, G. Zhu, On-Lin handwriting signature recognition based on wavelet energy feature matching. in Proceedings of the 6th World Congress on Intelligent Control and Automation, 2006, pp. 9885–9888

    Google Scholar 

  20. Survey on Dynamic Signature Recognition: A sign of the times – Part 2, Biometric Technology Today, 2009, pp. 1–2

    Google Scholar 

  21. J. Fierrez, HMM-based on-line signature verification: Feature extraction and signature modeling. Pattern Recogn. Lett. 28, 2325–2334 (2007)

    Article  Google Scholar 

  22. T.Q. Ton, T. Nhu, HMM based online signature verification. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET) 4(4), 1448–1451 (2015)

    Google Scholar 

  23. V.M. Patel, N.K. Ratha, R. Chellappa, Cancelable biometrics: A review. IEEE Signal Proc. Mag. 2015

    Google Scholar 

  24. N.K. Ratha, J.H. Connel, R. Bolle, Enhancing security and privacy in biometrics-based authentication systems. IBM Syst. J. 40(3), 614–634 (2001)

    Article  Google Scholar 

  25. N. Ratha, S. Chikkerur, J. Connell, R. Bolle, Generating cancelable fingerprint templates. IEEE Trans. Pattern Anal. Mach. Intell. 29(4), 561–572 (2007)

    Article  Google Scholar 

  26. R.M. Bolle, J.H. Connel, N.K. Ratha, Biometrics perils and patches. Pattern Recogn. 35(12), 2727–2738 (2002)

    Article  Google Scholar 

  27. M. Savvides, B. Kumar, P. Khosla, Cancelable biometric filters for face recognition, in International Conference on Pattern Recognition, vol. 3, (2004), pp. 922–925

    Google Scholar 

  28. K. Takahashi, S. Hirata, Cancelable biometrics with provable security and its application to fingerprint verification. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(1), 233–244 (2011)

    Article  Google Scholar 

  29. S. Hirata, K. Takahashi, Cancelable biometrics with perfect secrecy for correlation-based matching. in Advances in Biometrics, ser. Lecture Notes in Computer Science, ed. by M. Tistarelli, M. Nixon, vol. 5558, (Springer, Berlin/Heidelberg, 2009), pp. 868–878

    Chapter  Google Scholar 

  30. W. Xu, Q. He, Y. Li, T. Li, Cancelable voiceprint templates based on knowledge signatures, in International Symposium on Electronic Commerce and Security, (2008), pp. 412–415

    Google Scholar 

  31. J. Camenisch, M. Stadler, Efficient group signature schemes for large groups, in International Cryptology Conference on Advances in Cryptology, (Springer, London, UK, 1997), pp. 410–424

    Chapter  Google Scholar 

  32. J. Zuo, N. Ratha, J. Connell, Cancelable iris biometric. in International Conference on Pattern Recognition, 2008, pp. 1–4,

    Google Scholar 

  33. T. Boult, Robust distance measures for face-recognition supporting revocable biometric tokens. in International Conference on Automatic Face and Gesture Recognition, 2006, pp. 560–566

    Google Scholar 

  34. T. Boult, W. Scheirer, R. Woodworth, Revocable fingerprint biotokens: accuracy and security analysis. in IEEE Conference on Computer Vision and Pattern Recognition, 2007, pp. 1–8

    Google Scholar 

  35. M.M. Ashish, G.R. Sinha, Biometric template protection. J. Biostat. Biometric App. 1(2), 202 (2016)

    Google Scholar 

  36. Unique Identification Authority of India. Multipurpose National Identity Card

    Google Scholar 

  37. Y. Sutcua, Q. Lib, M. Memon, How to Protect Biometric Templates, pp. 1–11

    Google Scholar 

  38. T. Kanade, A. Jain, N.K. Ratha, AVBPA 2005, LNCS (Springer, Berlin/Heidelberg, 2005), pp. 523–532

    Google Scholar 

  39. E.S. Bigun, J. Bigun, B. Duc, S. Fischer, Expert conciliation for multi modal person authentication systems by bayesian statistics. in Proceedings of AVBPA, Springer, LNCS-1206, 1997, pp. 291–300

    Google Scholar 

  40. J. Kittler, M. Hatef, R. Duin, J. Matas, On combining classifiers. IEEE Trans. Pattern Anal. Machine Intell. 20, 226–239 (1998)

    Article  Google Scholar 

  41. A.K. Jain, A. Ross, S. Prabhakar, An introduction to biometric recognition. IEEE Trans. Circuits Syst. Video Technol. 14, 4–20 (2004)

    Article  Google Scholar 

  42. R. Plamondon, G. Lorette, Automatic signature verification and writer identification – the state of the art. Pattern Recogn. 22, 107–131 (1989)

    Article  Google Scholar 

  43. A. Lumini, L. Nanni, An improved BioHashing for human authentication. Pattern Recogn. 40, 1057–1065 (2007)

    Article  Google Scholar 

  44. A.T.B. Jin, D.N.C. Ling, A. Goh, Biohashing: Two factor authentication featuring fingerprint data and tokenised random number. Pattern Recogn. 37(11), 2245–2255 (2004)

    Article  Google Scholar 

  45. A.T.B. Jin, D.N.C. Ling, Cancelable biometrics featuring with to kenised random number. Pattern Recogn. Lett. 26(10), 1454–1460 (2005)

    Article  Google Scholar 

  46. A.T.B. Jin, D.N.C. Ling, A. Goh, Personalised cryptographic key generation based on face hashing. Comput. Secur. J. 23(7), 606–614 (2004)

    Article  Google Scholar 

  47. T. Connie, A. Teoh, M. Goh, D. Ngo, Palm hashing: A novel approach for dual factor authentication. Pattern Anal. Appl. 7(3), 255–268 (2004)

    Article  MathSciNet  Google Scholar 

  48. Y.H. Pang, A.T.B. Jin, D.N.C. Ling, Cancelable palmprint authentication system. Int. J. Signal Process. 1(2), 98–104 (2005)

    Google Scholar 

  49. D. Maio, L. Nanni, MultiHashing, human authentication featuring biometrics data and to kenised random number: a case study FVC2004. Neurocomputing, 2006, to appear

    Google Scholar 

  50. I. Nakanishi et al., DWT Domain On-Line Signature Verification, 2011, pp. 184–196

    Google Scholar 

  51. https://www.biosig-id.com/industry/biosig-id-banking-or-ecommerce

  52. J.A. Du Preez, B. Herbst, J. Coetzer, Offline signature verification using the Discrete Radon Transform and a Hidden Markov Model. EURASIP J. Appl. Signal Processing 4, 559–571 (2004)

    Google Scholar 

  53. M.C. Fairhurst, Signature verification revised: Promoting practical exploitation of biometric technology. Electron. Commun. Eng. J. 9(6), 273–280 (1997)

    Article  Google Scholar 

  54. T.G. Zimmerman et al., Retail applications of signature verification. Biometric Report

    Google Scholar 

  55. J.B. Ciulla, Ethics effectiveness: The nature of good leadership, in The Nature of Leadership, 2nd edn., (SAGE, Los Angeles, CA, 2012), pp. 508–540

    Google Scholar 

  56. U. Pal et al., Signature-based biometric authentication. in Computational Intelligence in Digital Forensics: Forensic Investigation and Applications, 2014, pp. 285–314

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Tanwar, S., Obaidat, M.S., Tyagi, S., Kumar, N. (2019). Online Signature-Based Biometric Recognition. In: Obaidat, M., Traore, I., Woungang, I. (eds) Biometric-Based Physical and Cybersecurity Systems. Springer, Cham. https://doi.org/10.1007/978-3-319-98734-7_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-98734-7_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-98733-0

  • Online ISBN: 978-3-319-98734-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics