A Real-Time In-Air Signature Biometric Technique Using a Mobile Device Embedding an Accelerometer

In this article an in-air signature biometric technique is proposed. Users would authenticate themselves by performing a 3-D gesture invented by them holding a mobile device embedding an accelerometer. All the operations involved in the process are carried out inside the mobile device, so no additional devices or connections are needed to accomplish this task. In the article, 34 different users have invented and repeated a 3-D gesture according to the biometric technique proposed. Moreover, three forgers have attempted to falsify each of the original gestures. From all these in-air signatures, an Equal Error Rate of 2.5% has been obtained by fusing the information of gesture accelerations of each axis X-Y-Z at decision level. The authentication process consumes less than two seconds, measured directly in a mobile device, so it can be considered as “real-time”.

[1]  Sharath Pankanti,et al.  BIOMETRIC IDENTIFICATION , 2000 .

[2]  A. de Santos Sierra,et al.  A fuzzy DNA-based algorithm for identification and authentication in an Iris Detection System , 2008, 2008 42nd Annual IEEE International Carnahan Conference on Security Technology.

[3]  Sean R. Eddy,et al.  Biological sequence analysis: Preface , 1998 .

[4]  S. Chiba,et al.  Dynamic programming algorithm optimization for spoken word recognition , 1978 .

[5]  Shigeyuki Sakazawa,et al.  Arm Swing Identification Method with Template Update for Long Term Stability , 2007, ICB.

[6]  Anil K. Jain,et al.  On-line signature verification, , 2002, Pattern Recognit..

[7]  Webb Miller An Introduction to Bioinformatics Algorithms. Neil C. Jones and Pavel A. Pevzner , 2006 .

[8]  N. Ramaraj,et al.  Enhancing the Efficiency of Regression Testing through Intelligent Agents , 2007, International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007).

[9]  Arun Ross,et al.  Handbook of Biometrics , 2007 .

[10]  P. Suganthi,et al.  Mobile Phones Security Using Biometrics , 2007, International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007).

[11]  Christopher Verplaetse,et al.  Inertial Proprioceptive Devices: Self-Motion-Sensing Toys and Tools , 1996, IBM Syst. J..

[12]  Stan Z. Li,et al.  Advances in Biometrics, International Conference, ICB 2007, Seoul, Korea, August 27-29, 2007, Proceedings , 2007, ICB.

[13]  Yanggon Kim,et al.  Pupil and Iris Localization for Iris Recognition in Mobile Phones , 2006, Seventh ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD'06).

[14]  Arun Ross,et al.  Information fusion in biometrics , 2003, Pattern Recognit. Lett..

[15]  Raymond N. J. Veldhuis,et al.  Biometric Authentication for a Mobile Personal Device , 2006 .

[16]  Hirokazu Manabe,et al.  Security Evaluation of Biometrics Authentications for Cellular Phones , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.