Abstract
In this paper we focus our research on user identification rather than user verification by analyzing handwritten signature and haptic information such as pressure. For analysis, a multilayer perception (MLP) neural network is adopted. In order to verify the proposed method, 16 users’ signatures were measured with haptic information. We successfully identified users at an average success rate of 81%.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Singh, S., Cabraal, A., Demosthenous, C., Astbrink, G., Furlong, M.: Password Sharing: Implications for Security Design based on Social Practice. In: Proc. ACM CHI 2007 Conference on Human Factors in Computing Systems 2007, pp. 895–904 (2007)
Joyce, R., Gupta, G.: Identify Authentication based on Keystroke Latencies. Communications of the ACM 33(2), 168–176 (1990)
Monrose, F., Rubin, A.: Authentication via keystroke Dynamics. In: Proc 4th ACM Conference of Computer and Communication Security, pp. 48–56 (1997)
Site accessed (January 2008), http://www.sensable.com/haptic-phantom-omni.htm
Monrose, F., Reiter, M.K., Wetzel, S.: Password Hardening based on Keystroke Dynamics. In: Proc. 6th ACM Conference of Computer and Communication Security, pp. 73–82 (1999)
Lee, J., Choi, S., Moon, B.: An Evolutionary Keystroke Authentication based on Ellipsoidal Hypothesis Space. In: Proc. 9th Annual Conference on Genetic and Evolutionary Computation (GECCO), pp. 2090–2097 (2007)
Jiang, C., Shieh, S., Liu, J.: Keystroke Statistical Learning Model for Web Authentication. In: Proc. 2nd ACM Symposium on Information, Computer and Communications Security, pp. 359–361 (2007)
Pusara, M., Brodley, C.: User Re-authentication via Mouse Movements. In: Proc. ACM Workshop on Visualization and Data Mining for Computer Security 2004, pp.1–8 (2004)
Gamboa, H., Fred, A.: An Identity Authentication System based on Human Computer Interaction Behaviour. In: Proc. 3rd International Workshop on Pattern Recognition in Information Systems, pp. 46–55 (2003)
Witten, I., Frank, E.: Data Mining: Practical Machine Learning Tools and Techniques, 2nd edn. Morgan Kaufmann, San Francisco (2005)
Orozco, M., Asfaw, Y., Shirmohammadi, S., Adler, A., El Saddik, A.: Haptic-Based Biometrics: A Feasibility Study. In: Proc. Symposium on Haptic Interfaces for Virtual Environment and Teleoperator Systems, pp. 256–271 (2006)
El Saddik, A., Orozco, M., Asfaw, Y., Shirmohammadi, S., Adler, A.: A Novel Biometric System for Identification and Verification of Haptics Users. IEEE Transaction on Instrumentation and Measurement 56(3) (June 2007)
Malek, B., Orozco, M., El Saddik, A.: Novel Shoulder-Surfing Resistant Haptic-based Graphical Password. In: Proceedings of the Eurohaptics 2006 conference, Paris, France (July 2006)
Orozco, M., Malek, B., Eid, M., El Saddik, A.: Haptic-Based Sensible Graphical Password. In: Proc. Virtual Concept 2006, Playa Del Carmen, Mexico (November 2006)
Rosenblatt, F.: A probabilistic Model for Information Storage and Organization in the Brain. Psychological Review 65, 386–408 (1958)
Rosenblatt, F.: Principles of Neurodynamics. In: Perceptrons and the Theory of Brain Mechanisms, Spartan books, Washington, D.C (1961)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Alsulaiman, F.A., Cha, J., El Saddik, A. (2008). User Identification Based on Handwritten Signatures with Haptic Information. In: Ferre, M. (eds) Haptics: Perception, Devices and Scenarios. EuroHaptics 2008. Lecture Notes in Computer Science, vol 5024. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-69057-3_12
Download citation
DOI: https://doi.org/10.1007/978-3-540-69057-3_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-69056-6
Online ISBN: 978-3-540-69057-3
eBook Packages: Computer ScienceComputer Science (R0)