Automatic Signature Verification in the Mobile Cloud Scenario: Survey and Way Ahead

On-line signature verification is typically carried out with the use of digitizing tablets specifically designed for the aim. So far, stand-alone systems have been mainly inspected, but the current distributed/cloud scenario and the amount of mobile devices in everyday life is calling for a new challenge. Within this scenario, signatures are acquired around the world with different kinds of devices and processed on multiple platforms in order to be veri-fied. Through the paper, the different phases of the signature ver-ification process in the new scenario are presented and the most valuable results are discussed considering the following aspects: accessibility and usability, interoperability, security and perfor-mance. Achievements as well as weakness are focused to high-light promising directions for further research and technology development.

[1]  Suh-Yin Lee,et al.  On-line signature verification using LPC cepstrum and neural networks , 1997, IEEE Trans. Syst. Man Cybern. Part B.

[2]  Julian Fiérrez,et al.  Dynamic Signature Verification on Smart Phones , 2013, PAAMS.

[3]  Anil K. Jain,et al.  Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.

[4]  D. S. Guru,et al.  Interval valued symbolic representation of writer dependent features for online signature verification , 2017, Expert Syst. Appl..

[5]  G. Pirlo,et al.  Signature Verification by Multiple Reference Sets , 2008 .

[6]  Giuseppe Pirlo,et al.  Automatic Signature Verification: The State of the Art , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[7]  Julian Fierrez,et al.  Benchmarking Touchscreen Biometrics for Mobile Authentication , 2018, IEEE Transactions on Information Forensics and Security.

[8]  Huixiang Zhang,et al.  AN ONLINE MOBILE SIGNATURE VERIFICATION SYSTEM BASED ON HOMOMORPHIC ENCRYPTION , 2017 .

[9]  Sargur N. Srihari,et al.  On-Line and Off-Line Handwriting Recognition: A Comprehensive Survey , 2000, IEEE Trans. Pattern Anal. Mach. Intell..

[10]  Sharath Pankanti,et al.  Biometrics: a tool for information security , 2006, IEEE Transactions on Information Forensics and Security.

[11]  P. Bhattarakosol,et al.  Authenticating User Using Keystroke Dynamics and Finger Pressure , 2009, 2009 6th IEEE Consumer Communications and Networking Conference.

[12]  Chonho Lee,et al.  A survey of mobile cloud computing: architecture, applications, and approaches , 2013, Wirel. Commun. Mob. Comput..

[13]  Arun Ross,et al.  A Thin-Plate Spline Calibration Model For Fingerprint Sensor Interoperability , 2008, IEEE Transactions on Knowledge and Data Engineering.

[14]  Andrzej Czyzewski,et al.  Handwritten Signature Verification System Employing Wireless Biometric Pen , 2019, Intelligent Methods and Big Data in Industrial Applications.

[15]  Giuseppe Pirlo,et al.  Characteristics of Constrained Handwritten Signatures: An Experimental Investigation , 2015 .

[16]  Ralf Steinmetz,et al.  Biometric hash based on statistical features of online signatures , 2002, Object recognition supported by user interaction for service robots.

[17]  Anil K. Jain,et al.  Biometric Template Protection: Bridging the performance gap between theory and practice , 2015, IEEE Signal Processing Magazine.

[18]  Margit Antal,et al.  Finger or Stylus: Their Impact on the Performance of On-line Signature Verification Systems , 2017, MACRo.

[19]  Gonzalo Bailador,et al.  Time series distances measures to analyze in-air signatures to authenticate users on mobile phones , 2011, 2011 Carnahan Conference on Security Technology.

[20]  Alex X. Liu,et al.  Behavior Based Human Authentication on Touch Screen Devices Using Gestures and Signatures , 2017, IEEE Transactions on Mobile Computing.

[21]  Arun Ross,et al.  Accuracy evaluation of handwritten signature verification: Rethinking the random-skilled forgeries dichotomy , 2017, 2017 IEEE International Joint Conference on Biometrics (IJCB).

[22]  Patrizio Campisi,et al.  Fuzzy Commitment for Function Based Signature Template Protection , 2010, IEEE Signal Processing Letters.

[23]  Hai Huang,et al.  You Are How You Touch: User Verification on Smartphones via Tapping Behaviors , 2014, 2014 IEEE 22nd International Conference on Network Protocols.

[24]  Ramón Blanco-Gonzalo,et al.  Usability evaluation of biometrics in mobile environments , 2013, 2013 6th International Conference on Human System Interactions (HSI).

[25]  Anil K. Jain,et al.  Soft Biometric Traits for Continuous User Authentication , 2010, IEEE Transactions on Information Forensics and Security.

[26]  Yasushi Yamazaki,et al.  Smart Device-Based Multimodal Biometric Authentication with the Function for Environment Recognition , 2015, 2015 Third International Symposium on Computing and Networking (CANDAR).

[27]  Andreas Uhl,et al.  A survey on biometric cryptosystems and cancelable biometrics , 2011, EURASIP J. Inf. Secur..

[28]  Jacques P. Swanepoel,et al.  Feature Weighted Support Vector Machines for Writer-Independent On-Line Signature Verification , 2014, 2014 14th International Conference on Frontiers in Handwriting Recognition.

[29]  Judith Liu-Jimenez,et al.  Performance evaluation of handwritten signature recognition in mobile environments , 2014, IET Biom..

[30]  Judith Liu-Jimenez,et al.  Usability analysis of dynamic signature verification in mobile environments , 2013, 2013 International Conference of the BIOSIG Special Interest Group (BIOSIG).

[31]  On the Applicability of Off-Line Signatures to the Fuzzy Vault Construction , 2007, Ninth International Conference on Document Analysis and Recognition (ICDAR 2007).

[32]  Valentín Cardeñoso-Payo,et al.  BioSecure Signature Evaluation Campaign (ESRA'2011): evaluating systems on quality-based categories of skilled forgeries , 2011, 2011 International Joint Conference on Biometrics (IJCB).

[33]  Bruno Crispo,et al.  Multimodal smartphone user authentication using touchstroke, phone-movement and face patterns , 2017, 2017 IEEE Global Conference on Signal and Information Processing (GlobalSIP).

[34]  Marcin Zalasinski,et al.  A new method for signature verification based on selection of the most important partitions of the dynamic signature , 2018, Neurocomputing.

[35]  H. N. Prakash,et al.  Online Signature Verification and Recognition: An Approach Based on Symbolic Representation , 2009, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[36]  Giuseppe Pirlo,et al.  Adaptive Score Normalization for Output Integration in Multiclassifier Systems , 2012, IEEE Signal Processing Letters.

[37]  Réjean Plamondon,et al.  Automatic signature verification and writer identification - the state of the art , 1989, Pattern Recognit..

[38]  Munam Ali Shah,et al.  Online Signature Verification: A Survey on Authentication in Smartphones , 2016, UNet.

[39]  Hassiba Nemmour,et al.  SVM Combination for an Enhanced Prediction of Writers' Soft Biometrics , 2017 .

[40]  Julian Fiérrez,et al.  Sensor Interoperability and Fusion in Signature Verification: A Case Study Using Tablet PC , 2005, IWBRS.

[41]  Julian Fiérrez,et al.  Preprocessing and Feature Selection for Improved Sensor Interoperability in Online Biometric Signature Verification , 2015, IEEE Access.

[42]  Claus Vielhauer Biometric User Authentication for it Security - From Fundamentals to Handwriting , 2006, Advances in Information Security.

[43]  Bernadette Dorizzi,et al.  On-line Signature Verification on a Mobile Platform , 2010, MobiCASE.

[44]  Giulio Sandini,et al.  Tactile Sensing—From Humans to Humanoids , 2010, IEEE Transactions on Robotics.

[45]  Julian Fiérrez,et al.  Towards mobile authentication using dynamic signature verification: Useful features and performance evaluation , 2008, 2008 19th International Conference on Pattern Recognition.

[46]  Julian Fierrez,et al.  Benchmarking desktop and mobile handwriting across COTS devices: The e-BioSign biometric database , 2017, PloS one.

[47]  Lei Yang,et al.  Unlocking Smart Phone through Handwaving Biometrics , 2015, IEEE Transactions on Mobile Computing.

[48]  Jugal K. Kalita,et al.  Authentication of Smartphone Users Using Behavioral Biometrics , 2016, IEEE Communications Surveys & Tutorials.

[49]  Giuseppe Pirlo,et al.  Interoperability of Biometric Systems: Analysis of Geometric Characteristics of Handwritten Signatures , 2015, ICIAP Workshops.

[50]  Shaheed Zulfikar,et al.  Security Issues and Challenges of Mobile Cloud Computing , 2013 .

[51]  Raul Sánchez-Reillo,et al.  Accessibility evaluation of a mobile biometric recognition system , 2016, 2016 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA).

[52]  Raul Sánchez-Reillo,et al.  Signature analysis in the context of mobile devices , 2016, Image Vis. Comput..

[53]  Madhu Sudan,et al.  A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..

[54]  Jiri Matas,et al.  P-N learning: Bootstrapping binary classifiers by structural constraints , 2010, 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition.

[55]  Raul Sanchez-Reillo,et al.  Analysis on the resolution of the different signals in an on-line handwritten signature verification system applied to portable devices , 2010, 44th Annual 2010 IEEE International Carnahan Conference on Security Technology.

[56]  Nalini K. Ratha,et al.  An Analysis of Minutiae Matching Strength , 2001, AVBPA.

[57]  Bernadette Dorizzi,et al.  Guide to Biometric Reference Systems and Performance Evaluation , 2009 .

[58]  J. Ortega-Garcia,et al.  Cancelable Biometrics for HMM-based Signature Recognition , 2008, 2008 IEEE Second International Conference on Biometrics: Theory, Applications and Systems.

[59]  Andrew Beng Jin Teoh,et al.  Generation of Replaceable Cryptographic Keys from Dynamic Handwritten Signatures , 2006, ICB.

[60]  Hong Yan,et al.  On-line signature verification based on dynamic segmentation and global and local matching , 1995 .

[61]  Julian Fiérrez,et al.  Variable-length template protection based on homomorphic encryption with application to signature biometrics , 2016, 2016 4th International Conference on Biometrics and Forensics (IWBF).

[62]  Mauro Barni,et al.  Privacy Protection in Biometric-Based Recognition Systems: A marriage between cryptography and signal processing , 2015, IEEE Signal Processing Magazine.

[63]  Enrique Cantó,et al.  Embedded System for Biometric Online Signature Verification , 2014, IEEE Transactions on Industrial Informatics.

[64]  Julian Fiérrez,et al.  Multi-biometric template protection based on Homomorphic Encryption , 2017, Pattern Recognit..

[65]  Nasir D. Memon,et al.  Online Signature Verification on Mobile Devices , 2014, IEEE Transactions on Information Forensics and Security.

[66]  Miguel Angel Ferrer-Ballester,et al.  On-line signature recognition through the combination of real dynamic data and synthetically generated static data , 2015, Pattern Recognit..

[67]  Miguel Angel Ferrer-Ballester,et al.  Behaviour of dynamic and static feature dependences in constrained signatures , 2015, 2015 13th International Conference on Document Analysis and Recognition (ICDAR).

[68]  Dawn Xiaodong Song,et al.  Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication , 2012, IEEE Transactions on Information Forensics and Security.

[69]  Arun Ross,et al.  Biometric template selection and update: a case study in fingerprints , 2004, Pattern Recognit..

[70]  Julian Fiérrez,et al.  Increasing the robustness of biometric templates for dynamic signature biometric systems , 2015, 2015 International Carnahan Conference on Security Technology (ICCST).

[71]  Bernadette Dorizzi,et al.  On line signature verification: Fusion of a Hidden Markov Model and a neural network via a support vector machine , 2002, Proceedings Eighth International Workshop on Frontiers in Handwriting Recognition.

[72]  Vishal M. Patel,et al.  Efficient and Low Latency Detection of Intruders in Mobile Active Authentication , 2018, IEEE Transactions on Information Forensics and Security.

[73]  Xiaohong Guan,et al.  Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication , 2016, IEEE Transactions on Information Forensics and Security.

[74]  Julian Fiérrez,et al.  Update strategies for HMM-based dynamic signature biometric systems , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).

[75]  René Mayrhofer,et al.  Smartphone-Based Gait Recognition: From Authentication to Imitation , 2017, IEEE Transactions on Mobile Computing.

[76]  Robert Sabourin,et al.  Improving Signature-Based Biometric Cryptosystems Using Cascaded Signature Verification-Fuzzy Vault (SV-FV) Approach , 2014, 2014 14th International Conference on Frontiers in Handwriting Recognition.

[77]  Nitesh Saxena,et al.  Wave-to-Access: Protecting Sensitive Mobile Device Services via a Hand Waving Gesture , 2013, CANS.

[78]  Rama Chellappa,et al.  Continuous User Authentication on Mobile Devices: Recent progress and remaining challenges , 2016, IEEE Signal Processing Magazine.

[79]  Julian Fiérrez,et al.  Cancelable Templates for Sequence-Based Biometrics with Application to On-line Signature Recognition , 2010, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[80]  Giuseppe Pirlo,et al.  Multidomain Verification of Dynamic Signatures Using Local Stability Analysis , 2015, IEEE Transactions on Human-Machine Systems.

[81]  Duncan S. Wong,et al.  Touch Gestures Based Biometric Authentication Scheme for Touchscreen Mobile Phones , 2012, Inscrypt.

[82]  Xiaoqing Ding,et al.  On-line signature verification using direction sequence string matching , 2002, Other Conferences.

[83]  Georgios Kambourakis,et al.  Introducing touchstroke: keystroke-based authentication system for smartphones , 2016, Secur. Commun. Networks.

[84]  Réjean Plamondon,et al.  Online Signature Verification , 2014, Handbook of Document Image Processing and Recognition.

[85]  Matt Wolff Behavioral Biometric Identification on Mobile Devices , 2013, HCI.

[86]  Raul Sanchez-Reillo,et al.  Improving Presentation Attack Detection in Dynamic Handwritten Signature Biometrics , 2017, IEEE Access.

[87]  Jianying Hu,et al.  User interface for a PCS smart phone , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.

[88]  Julian Fiérrez,et al.  Mobile signature verification: feature robustness and performance comparison , 2014, IET Biom..

[89]  Marc Parizeau,et al.  A Comparative Analysis of Regional Correlation, Dynamic Time Warping, and Skeletal Tree Matching for Signature Verification , 1990, IEEE Trans. Pattern Anal. Mach. Intell..

[90]  Shantanu Rane,et al.  Standardization of Biometric Template Protection , 2014, IEEE MultiMedia.

[91]  Lei Tang,et al.  A novel video-based system for in-air signature verification , 2017, Comput. Electr. Eng..

[92]  Oscar Miguel-Hurtado,et al.  Analysis of handwritten signature performances using mobile devices , 2011, 2011 Carnahan Conference on Security Technology.

[93]  Mark Stamp,et al.  Handbook of Information and Communication Security , 2010, Handbook of Information and Communication Security.

[94]  MARTA GOMEZ-BARRERO,et al.  Privacy-Preserving Comparison of Variable-Length Data With Application to Biometric Template Protection , 2017, IEEE Access.

[95]  Gonzalo Bailador,et al.  Analysis of pattern recognition techniques for in-air signature biometrics , 2011, Pattern Recognit..

[96]  Suraiya Jabin,et al.  Authentic mobile-biometric signature verification system , 2016, IET Biom..

[97]  Julian Fiérrez,et al.  E-biosign: stylus- and finger-input multi-device database for dynamic signature recognition , 2015, 3rd International Workshop on Biometrics and Forensics (IWBF 2015).

[98]  Valentín Cardeñoso-Payo,et al.  BioSecure signature evaluation campaign (BSEC'2009): Evaluating online signature algorithms depending on the quality of signatures , 2012, Pattern Recognit..

[99]  Steven Furnell,et al.  Surveying the Development of Biometric User Authentication on Mobile Phones , 2015, IEEE Communications Surveys & Tutorials.

[100]  Athanasios V. Vasilakos,et al.  Security and privacy challenges in mobile cloud computing: Survey and way ahead , 2017, J. Netw. Comput. Appl..

[101]  Raul Sánchez-Reillo,et al.  Handwritten signature recognition in mobile scenarios: Performance evaluation , 2012, 2012 IEEE International Carnahan Conference on Security Technology (ICCST).