USER AUTHENTICATION USING ON-LINE SIGNATURE AND SPEECH

Ensuring the security of medical records is becoming an increasingly important problem as modern technology is integrated into existing medical services. As a consequence of the adoption of electronic medical records in the health care sector, it is becoming more and more common for a health professional to edit and view a patient’s record using a tablet PC. In order to protect the patient’s privacy, as required by governmental regulations in the United States, a secure authentication system to access patient records must be used. Biometric-based access is capable of providing the necessary security. On-line signature and voice modalities seem to be the most convenient for the users in such authentication systems because a tablet PC comes equipped with the associated sensors/hardware. This thesis analyzes the performance of combining the use of on-line signature and voice biometrics in order to perform robust user authentication. Signatures are verified using the dynamic programming technique of string matching. Voice is verified using a commercial, off the shelf, software development kit. In order to improve the authentication performance, we combine information from both on-line signature and voice biometrics. After suitable normalization of scores, fusion is performed at the matching score level. A prototype bimodal authentication system for accessing medical records has been designed and evaluated on a truly multimodal database of 100 users, resulting in an average equal error rate of 0.72%.

[1]  Hao Feng,et al.  Online signature verification using a new extreme points warping technique , 2003, Pattern Recognit. Lett..

[2]  Seiichiro Hangai,et al.  Writer verification using altitude and direction of pen movement , 2000, Proceedings 15th International Conference on Pattern Recognition. ICPR-2000.

[3]  Alisher Kholmatov,et al.  Biometric identity verification using on-line & off-line signature verification , 2003 .

[4]  Sharath Pankanti,et al.  Biometric Recognition: Security and Privacy Concerns , 2003, IEEE Secur. Priv..

[5]  C. N. Liu,et al.  Automatic signature verification based on accelerometry , 1977 .

[6]  Alan F. Blackwell,et al.  The memorability and security of passwords – some empirical results , 2000 .

[7]  Arun Ross,et al.  Learning user-specific parameters in a multibiometric system , 2002, Proceedings. International Conference on Image Processing.

[8]  David G. Stork,et al.  Pattern Classification , 1973 .

[9]  Luminita Vasiu,et al.  Biometric Recognition - Security and Privacy Concerns , 2004, ICETE.

[10]  Arun Ross,et al.  Information fusion in biometrics , 2003, Pattern Recognit. Lett..

[11]  Arun Ross,et al.  Multimodal biometrics: An overview , 2004, 2004 12th European Signal Processing Conference.

[12]  Anil K. Jain,et al.  On-line signature verification, , 2002, Pattern Recognit..

[13]  L. Belitsky Protecting the privacy of patients' health information. , 2003, The Alabama nurse.

[14]  L. Yang,et al.  Application of hidden Markov models for signature verification , 1995, Pattern Recognit..

[15]  Shigeo Abe DrEng Pattern Classification , 2001, Springer London.

[16]  Gerard V. Trunk,et al.  A Problem of Dimensionality: A Simple Example , 1979, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[17]  Jr. J.P. Campbell,et al.  Speaker recognition: a tutorial , 1997, Proc. IEEE.

[18]  Réjean Plamondon,et al.  Automatic signature verification and writer identification - the state of the art , 1989, Pattern Recognit..

[19]  D. A. Reynolds,et al.  The effects of handset variability on speaker recognition performance: experiments on the Switchboard corpus , 1996, 1996 IEEE International Conference on Acoustics, Speech, and Signal Processing Conference Proceedings.

[20]  C. N. Liu,et al.  Automatic Signature Verification: System Description andField TestResults , 1979 .

[21]  Vickie A Miracle,et al.  Rights of Patients , 2004, Dimensions of critical care nursing : DCCN.

[22]  Paul Miller,et al.  Analyzing genetic discrimination in the workplace , 2002 .

[23]  M. Kam,et al.  Signature authentication by forensic document examiners. , 2001, Journal of forensic sciences.

[24]  Arun Ross,et al.  Score normalization in multimodal biometric systems , 2005, Pattern Recognit..

[25]  Hong Chang,et al.  SVC2004: First International Signature Verification Competition , 2004, ICBA.

[26]  Luan Ling Lee Neural approaches for human signature verification , 1996, Proceedings of Third International Conference on Signal Processing (ICSP'96).

[27]  Lee Luan Ling Neural approaches for human signature verification , 1995, ICDAR.

[28]  Frederick Jelinek,et al.  Statistical methods for speech recognition , 1997 .

[29]  Loris Nanni,et al.  An On-Line Signature Verification System Based on Fusion of Local and Global Information , 2005, AVBPA.

[30]  Arun Ross,et al.  Multibiometric systems , 2004, CACM.

[31]  Douglas A. Reynolds,et al.  A Tutorial on Text-Independent Speaker Verification , 2004, EURASIP J. Adv. Signal Process..

[32]  K. Zimmermann,et al.  Signature recognition through spectral analysis , 1987, ICASSP '87. IEEE International Conference on Acoustics, Speech, and Signal Processing.

[33]  Douglas A. Reynolds,et al.  Robust text-independent speaker identification using Gaussian mixture speaker models , 1995, IEEE Trans. Speech Audio Process..

[34]  Berrin A. Yanikoglu,et al.  Biometric Authentication Using Online Signatures , 2004, ISCIS.