Handwritten signatures are one of the most socially accepted biometric traits. Signatures are commonly used in financial and legal agreements since more than a century. In education, signatures are used for attendance control, either to lectures or exams, but not for (automatic) authentication. With the rapid deployment of dynamic signature recognition, this technology is ready to be used for student authentication. Also, the use of this technology can be extended to different administrative services within the education system, in order to add a higher security level to the traditional procedures of authentication (e.g., visually checking the face and/or signature on the person identity card). Nowadays, signatures can be easily captured by means of electronic devices (e.g. pen tablets, PDAs, grip pens, smartphones, etc.). For this reason, the popularity of this biometric trait is rapidly increasing in the last few years. Even more, signatures can be made using the finger as the writing tool on smartphones. In this paper, we analyse two scenarios for student authentication using their signatures: i) an office scenario with a high quality pen tablet specifically designed to acquire signatures (i.e., Wacom device), and ii) a mobile scenario where users sign on their smartphones with the finger improving this way the usability. For this experimental study we make use of e-BioSign database, which was captured using various modern pen tablet devices and smartphones. The database contains signatures from 70 users including students and educators, captured in two sessions in different days. The experiments on automatic authentication using dynamic signatures are conducted considering two different types of forgeries, namely: i) random forgeries (the case where an impostor uses his own signature claiming to be another person), and ii) skilled forgeries (where impostors imitate the signature of other persons).
[1]
Julian Fiérrez,et al.
E-biosign: stylus- and finger-input multi-device database for dynamic signature recognition
,
2015,
3rd International Workshop on Biometrics and Forensics (IWBF 2015).
[2]
Julian Fiérrez,et al.
The DooDB Graphical Password Database: Data Analysis and Benchmark Results
,
2013,
IEEE Access.
[3]
Julian Fiérrez,et al.
Signature Databases and Evaluation
,
2009,
Encyclopedia of Biometrics.
[4]
Julian Fiérrez,et al.
Preprocessing and Feature Selection for Improved Sensor Interoperability in Online Biometric Signature Verification
,
2015,
IEEE Access.
[5]
Carlos Vivaracho-Pascual,et al.
On the Use of Mobile Phones and Biometrics for Accessing Restricted Web Services
,
2012,
IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[6]
Alejandro F. Frangi,et al.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
,
2022
.
[7]
Michael C. Fairhurst,et al.
Biosecure reference systems for on-line signature verification: A study of complementarity
,
2007,
Ann. des Télécommunications.
[8]
Anil K. Jain,et al.
On-line signature verification,
,
2002,
Pattern Recognit..
[9]
Valentín Cardeñoso-Payo,et al.
BioSecure signature evaluation campaign (BSEC'2009): Evaluating online signature algorithms depending on the quality of signatures
,
2012,
Pattern Recognit..