Personal Authentication Using Signature Recognition

In this paper, a problem of personal authentication through the use of signature recognition is described. The methods of verification include both online (or dynamic) and off-line (static) signature verification algorithms. The dynamic methods covered, are based on the analysis of the shape, speed, stroke, pen pressure and timing information. While the static methods involve general shape recognition techniques. The paper gives a brief historical overview of the existing methods and presents some of the recent research in the field.

[1]  Suh-Yin Lee,et al.  On-line signature verification using LPC cepstrum and neural networks , 1997, IEEE Trans. Syst. Man Cybern. Part B.

[2]  Toby Berger,et al.  Reliable On-Line Human Signature Verification Systems , 1996, IEEE Trans. Pattern Anal. Mach. Intell..

[3]  Wen C. Lin,et al.  Experimental Investigation of Automatic Signature Verification , 1974, IEEE Trans. Syst. Man Cybern..

[4]  Robert Sabourin,et al.  An extended-shadow-code based approach for off-line signature verification. I. Evaluation of the bar mask definition , 1994, Proceedings of the 12th IAPR International Conference on Pattern Recognition, Vol. 3 - Conference C: Signal Processing (Cat. No.94CH3440-5).

[5]  Robert Sabourin,et al.  Evaluation of a training method and of various rejection criteria for a neural network classifier used for off-line signature verification , 1994, Proceedings of 1994 IEEE International Conference on Neural Networks (ICNN'94).

[6]  Yingyong Qi,et al.  Signature verification using global and grid features , 1994, Pattern Recognit..

[7]  Andrzej Pacut,et al.  Recognition of human signatures , 2001, IJCNN'01. International Joint Conference on Neural Networks. Proceedings (Cat. No.01CH37222).

[8]  R. Plamondon The handwritten signature as a biometric identifier: psychophysical model and system design , 1995 .

[9]  Takamichi Nakamoto,et al.  Active odor sensing system , 1997, ISIE '97 Proceeding of the IEEE International Symposium on Industrial Electronics.

[10]  Jr. J.P. Campbell,et al.  Speaker recognition: a tutorial , 1997, Proc. IEEE.

[11]  E. R. Brocklehurst Computer Methods of Signature Verification , 1985 .

[12]  Ronny Martens,et al.  On-line signature verification by dynamic time-warping , 1996, Proceedings of 13th International Conference on Pattern Recognition.

[13]  Azriel Rosenfeld,et al.  Computer Detection of Freehand Forgeries , 1977, IEEE Transactions on Computers.

[14]  Ronny Martens,et al.  Dynamic programming optimisation for on-line signature verification , 1997, Proceedings of the Fourth International Conference on Document Analysis and Recognition.

[15]  Hyeonjoon Moon,et al.  The FERET evaluation methodology for face-recognition algorithms , 1997, Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition.

[16]  Haris Baltzakis,et al.  Off-line signature verification using multiple neural network classification structures , 1997, Proceedings of 13th International Conference on Digital Signal Processing.

[17]  Brigitte Wirtz,et al.  Parameter reduction and personalized parameter selection for automatic signature verification , 1995, Proceedings of 3rd International Conference on Document Analysis and Recognition.

[18]  John Daugman,et al.  High Confidence Visual Recognition of Persons by a Test of Statistical Independence , 1993, IEEE Trans. Pattern Anal. Mach. Intell..

[19]  Raul Sánchez-Reillo Hand geometry pattern recognition through Gaussian mixture modelling , 2000, Proceedings 15th International Conference on Pattern Recognition. ICPR-2000.

[20]  Hyeonjoon Moon,et al.  The FERET verification testing protocol for face recognition algorithms , 1998, Proceedings Third IEEE International Conference on Automatic Face and Gesture Recognition.

[21]  J. Ashbourn Practical implementation of biometrics based on hand geometry , 1994 .

[22]  Pietro Perona,et al.  Visual Identification by Signature Tracking , 2003, IEEE Trans. Pattern Anal. Mach. Intell..

[23]  Xu-Hong Xiao,et al.  A hierarchical on-line Chinese signature verification system , 1995, Proceedings of 3rd International Conference on Document Analysis and Recognition.

[24]  Joseph W. Goodman,et al.  Slope histogram detection of forged handwritten signatures , 1991, Other Conferences.

[25]  Robert Sabourin,et al.  Structural Interpretation of Handwritten Signature Images , 1994, Int. J. Pattern Recognit. Artif. Intell..

[26]  Emile H. L. Aarts,et al.  On-line signature verification with hidden Markov models , 1998, Proceedings. Fourteenth International Conference on Pattern Recognition (Cat. No.98EX170).

[27]  Hidetoshi Miike,et al.  An off-line signature verification system using an extracted displacement function , 2002, Pattern Recognit. Lett..

[28]  Brigitte Wirtz Stroke-based time warping for signature verification , 1995, Proceedings of 3rd International Conference on Document Analysis and Recognition.

[29]  F. Prêteux,et al.  Off-line signature verification by local granulometric size distributions , 1997 .

[30]  Jaihie Kim,et al.  Applying personalized weights to a feature set for on-line signature verification , 1995, Proceedings of 3rd International Conference on Document Analysis and Recognition.

[31]  Flávio Bortolozzi,et al.  Off-line signature verification using HMM for random, simple and skilled forgeries , 2001, Proceedings of Sixth International Conference on Document Analysis and Recognition.

[32]  Yuan Yan Tang,et al.  Off-line signature verification by the tracking of feature and stroke positions , 2003, Pattern Recognit..

[33]  Rama Chellappa,et al.  Human and machine recognition of faces: a survey , 1995, Proc. IEEE.

[34]  Teruo Fukumura,et al.  Off-Line Preprocessing and Verification of Signatures , 1988, Int. J. Pattern Recognit. Artif. Intell..

[35]  Takamichi Nakamoto,et al.  Odor sensing system using neural network pattern recognition , 1992, Proceedings of the 1992 International Conference on Industrial Electronics, Control, Instrumentation, and Automation.

[36]  Alan Wee-Chung Liew,et al.  Lip contour extraction using a deformable model , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[37]  D. J. Hamilton,et al.  Low cost dynamic signature verification system , 1995 .

[38]  Sharath Pankanti,et al.  An identity-authentication system using fingerprints , 1997, Proc. IEEE.

[39]  L. Yang,et al.  Application of hidden Markov models for signature verification , 1995, Pattern Recognit..

[40]  Daisuke Sakamoto,et al.  Dynamic biometric person authentication using pen signature trajectories , 2002, Proceedings of the 9th International Conference on Neural Information Processing, 2002. ICONIP '02..

[41]  Vishvjit S. Nalwa,et al.  Automatic On-line Signature Verification , 1997 .

[42]  Azriel Rosenfeld,et al.  Local correspondence for detecting random forgeries , 1997, Proceedings of the Fourth International Conference on Document Analysis and Recognition.