A New Forgery Scenario Based on Regaining Dynamics of Signature
We present in this paper a new forgery scenario for dynamic signature verification systems. In this scenario, we assume that the forger has got access to a static version of the genuine signature, is using a dedicated software to automatically recover dynamics of the signature and is using these regained signatures to break the verification system. We also show that automated procedures can be built to regain signature dynamics, making some simple assumptions on how signatures are performed. We finally report on the evaluation of these procedures on the MCYT-100 signature database on which regained versions of the signatures are generated. This set of regained signatures is used to evaluate the rejection performance of a baseline dynamic signature verification system. Results show that the regained forgeries generate much more false acceptation in comparison to the random and low-force forgeries available in the MCYT-100 database. These results clearly show that such kind of forgery attacks can potentially represent a critical security breach for signature verification systems.
KeywordsDynamic Signature Forgery Attack Instantaneous Speed Segment Detection Genuine Signature
- 3.Vielhauer, C.: Biometric User Authentication for IT Security. Springer, Heidelberg (2006)Google Scholar
- 4.Zoebisch, F., Vielhauer, C.: A test tool to support brut-force online and offline signature forgery tests on mobile devices. In: ICME. Proc. of the IEEE Int’l Conf. on Multimedia and Expo 2003, Baltimore, USA, vol. 3, pp. 225–228 (2006)Google Scholar