Variation Detection applied in User Signature Verification

Behavior studies have been conducted by scientists and philosophers who approach subjects such as star and planet trajectories, society organizations, living beings evolution and human language. With the advent of computer, new challenges have been observed in order to explore and understand the behavior variations of interactions with systems. Motivated by those challenges, this work proposes a new approach to automatically cluster, detect and identify behavior patterns. In order to validate this approach, we have modeled the knowledge embedded in interactions of handwriting signatures. The generated knowledge models were, afterwards, employed to verify signatures. Obtained results were compared to other related approaches presented in SVC2004, the First International Signature Verification Competition.

[1]  Maria Ines Lopes Brosso Users continuous authentication in computers networks (Autenticação contínua de usuários em redes de computadores) , 2006 .

[2]  Bill N. Schilit,et al.  Disseminating active map information to mobile hosts , 1994, IEEE Network.

[3]  C. E. SHANNON,et al.  A mathematical theory of communication , 1948, MOCO.

[4]  Anderson Luiz Fernandes Perez,et al.  Análise do perfil do usuário de serviços de telefonia utilizando técnicas de mineração de dados , 2006 .

[5]  E. Ashley,et al.  Better decisions through science: exercise testing scores. , 2003, Progress in cardiovascular diseases.

[6]  Richard L. Tweedie,et al.  Markov Chains and Stochastic Stability , 1993, Communications and Control Engineering Series.

[7]  Analía Amandi,et al.  User profiling for Web page filtering , 2005, IEEE Internet Computing.

[8]  Weibo Gong,et al.  User profiling for computer security , 2004, Proceedings of the 2004 American Control Conference.

[9]  Gregory D. Abowd,et al.  Charting past, present, and future research in ubiquitous computing , 2000, TCHI.

[10]  Stephen Grossberg,et al.  ART 2-A: An adaptive resonance algorithm for rapid category learning and recognition , 1991, Neural Networks.

[11]  Samuel Kaski,et al.  Self organization of a massive document collection , 2000, IEEE Trans. Neural Networks Learn. Syst..

[12]  Li Wei,et al.  Compression-based data mining of sequential data , 2007, Data Mining and Knowledge Discovery.

[13]  Gregory D. Abowd,et al.  Towards a Better Understanding of Context and Context-Awareness , 1999, HUC.

[14]  Analía Amandi,et al.  Modeling user interests by conceptual clustering , 2006, Inf. Syst..

[15]  Ki Hwan Yum,et al.  A PROactive Request Distribution (PRORD) Using Web Log Mining in a Cluster-Based Web Server , 2006, 2006 International Conference on Parallel Processing (ICPP'06).

[16]  Rodrigo Fernandes de Mello,et al.  A self-organizing neural network for detecting novelties , 2007, SAC '07.

[17]  Eamonn J. Keogh,et al.  Exact indexing of dynamic time warping , 2002, Knowledge and Information Systems.

[18]  Arieh Ben-Naim,et al.  Entropy Demystified: The Second Law Reduced To Plain Common Sense , 2007 .

[19]  Maria da Graça Campos Pimentel,et al.  Automatically sharing web experiences through a hyperdocument recommender system , 2003, HYPERTEXT '03.

[20]  Noam Chomsky,et al.  A Review of B. F. Skinner's Verbal Behavior , 1980 .

[21]  Miroslav Skrbek,et al.  Signature Dynamics on a Mobile Electronic Signature Platform , 2003, GI Jahrestagung.

[22]  Maria Celeste Galilei The Private Life Of Galileo , 2010 .

[23]  Berrin A. Yanikoglu,et al.  Identity authentication using improved online signature verification method , 2005, Pattern Recognit. Lett..

[24]  Sargur N. Srihari,et al.  Offline Signature Verification And Identification Using Distance Statistics , 2004, Int. J. Pattern Recognit. Artif. Intell..

[25]  D. E. Brown,et al.  Theory of Markov Processes. , 1962 .