Dynamic Signature Verification System
ABSTRACT
In this paper we propose a
client/server based dynamic signature verification systems for the applications
requiring user authentication on the WWW. Both client and server side models
are proposed. The signature database and the matching process is implemented
through the incremental training algorithm and recall process of neural network
based Recognition Engine. Client extracts the dynamic features such as changes
in speed, pressure and timing that occur during the act of signing locally. The
pattern is an encrypted by client software for security and sent to the server
for subsequent processing (i.e. tanning/recall).
Contents
Title Page
No.
Abstract
1 Introduction 1
2 Dynamic signature
verification System 3
3 Signature
Technology 5
4 Proposed client-server model 7
5 Feature
Extraction 9
6 Comparison
Process 10
7 Advantages
of DSVS 11
8 Applications of DSVS 11
9 DSVS:Strength
and Weakness 12
10 Conclusion 13
References 14
A
PAPER
ON
“DYNAMIC SIGNATURE VERIFICATION SYSTEM USING NEURAL NETWORK”
1. Introduction
Signature verification is a process used to recognize an
individual's handwritten signature. Dynamic signature verification technology
uses the behavioral biometrics of the handwritten signature to confirm the
identity of a computer user. This is done by analyzing the shape, speed,
stroke, pen pressure and timing information during the act of signing. Natural
and intuitive, the technology is easy to explain and trust. As a replacement
for a password or a PIN number, dynamic signature verification is a biometric
technology that is used to positively identify a person from their handwritten
signature. There is an important distinction between simple signature
comparisons and dynamic signature verification. Both can be computerized, but a
simple comparison only takes into account what the signature looks like.
Dynamic
Signature verification takes into
account how the signature was made. With dynamic signature verification it if
not the shape or the look of the signature that is meaningful; it if the
changes in speed, pressure and timing that occurred during the act of signing.
Only the original signer can recreate the changes in timing and X, Y and Z
(pressure). A pasted bitmap, a copy machine or an expert forger maybe able to
duplicate what a signature looks like, but it is virtually impossible to
duplicate the timing changes have in X, Y, Z (pressure). The practiced and
natural motion of the original signer would require repeating the pattern
shown. There will always be slight variation in a person's handwritten signature,
but the consistency created by natural motion and practice over time creates a
recognizable pattern that makes the handwritten signature a natural for
biometric identification.
Signature verification is natural and intuitive. The technology easy to explain
and trust. The primary advantage that signature verification system has over
other types of biometric technologies is that signatures are already accepted
as the common method of identity verification. This history of trust means that
people
are very willing to accept a
signature based verification system. Dynamic signature verification technology
uses the behavioral biometrics of the handwritten signature to confirm the identity
of a computer user. Unlike the older technologies of password and key cards -
which are often shared or easily forgotten, lost and stolen – Dynamic signature
verification provides simple and natural methods for increased
computer security and trusted
document authorization.
2. Dynamic Signature Verification System(DSVS)
DSVS brings handwritten signatures to the information age. The
technology uses the behavioral biometrics of a handwritten signature to confirm
the identity of a computer user. Enterprise-wide and over the internet-unlike a
password, PIN number or keycards which are often shared and could be easily
lost ,stolen or forgotten, DSVS
provides increased security and
trusted document authorization. DSVS may be used to create application for E-commerce,
and this application could include non-refutable documents personally signed
electronic documents that can be trusted as temper- proof. DSVS offers a secure
and natural solution-today-for private communication, data privacy, access control,
document authorization, online shopping, electronic payments, member registration,
online banking and more.
DSVS may be implemented as technology that requires integration
into a client or server application. Software for client or server
communication can be provided and at each client side a digitizing tablet is
required. The user provides sample signatures at start up enrollment, creating
a biometric template that is sorted in a commercially
available database and on a
secured DSVS server. During use, to confirm user’s identity, the encrypted data
from a subsequently written signature is compared, at the server, with the
secured template. The DSVS server users a powerful recognition engine based on neural
network.
ÿ An incremental learning algorithm may be used to take of such
deviation in signature patterns over time. Some of the features used are shown
in figure 2.2.the technology incorporates a learning function, which automatically
absorbs and
reflects natural changes in a signature
over time.
ÿ Recognition engine uses the timing of changes in pressure, shape,
direction, speed and velocity in the Dynamic signature verification Process, while
all other verification
algorithms ignored pressures. Biometric
identity data is stored in a secured location and is not transported. Less
sophisticated architecture may require that the individual's identity data be transported
and stored with each copy of every document or transaction, and that the verification
is done at the client side. When the recommended
DSVS client/server architecture is
utilized the biometric data is secure. With DSVS the identity data is stored,
and verification occurs only on a secure server.
ÿ DSVS offers a real-time one-toone security solution without passwords
E for government, legal, medical, banking, access control, Data privacy, personalized
document approval, online shopping and more. DSVS is the electronic signature
for today's networked and online world.
3. Signature Technology
Signature identification systems analyze two different areas of an
individual's signature: the specific features of the signature and specific
features of the process of signing one's signature. Features that are taken
into account and measured include speed, pen pressure, directions, stroke
length, and the point in the time when the pen is lifted from the paper.
Signature identification devices also can analyze the" static" image
of one's signature. In using the “static” image method, the signature identification
device captures the image of one's signature and saves it for feature comparisons
to the stored template.
To account for the change in one's signature over time, signature identification
systems adopt to any slight variances
over time. The way dynamic signature identification system accomplices revealed
is by recording the time, history or pressure, velocity, location and
acceleration of the pen each time a person uses the system.
4. Proposed Client -- Server Model
The proposed client and server models are shown in figure 4.1 and
figure 4.2 respectively. The client extracts the dynamic features such as
changes in speed, pressure and timing that occurred during the act of signing
locally. The pattern is then encrypted by client software for security and sent
to the server for subsequent processing (i.e. Training/Recall).
The design of signature
verification systems requires solutions to five types of problems
A. Data acquisition
D. Comparison process
B. Preprocessing
E. Performance evaluation
C. Feature extraction
A static signature verification system receives a 2D image as
input from the Camera or scanners. Such a system requires a lot of memory and
computing power to process the images. The major algorithmic challenge is the
required invariance to the current disposition of the writer: no two signatures
are fully identical, even after transformation. A dynamic signature
verification system gets its input from a digitizer or other, usually pen
based, dynamic input device. The signature is then represented as one or
several time-varying signals. In other words, the verification system focuses
on how the signatures being
written rather than how the signature was written. This provides a better means
to grasp the individuality of the writer but fails to recognize the writing
itself. Intuitively, this must be correct, being fully in line with science
fiction literature: “the irregularity of the hammer blows used by each artisan followed
characteristic patterns to an extent that the maker can be identified without
question by sampling that pattern. Collectors developed the method to verify
authentically. It’s as definite as an eye print, more positive than any skin-print
anomaly,”-Herbert The performance of a signature verification system is
generally evaluated according to the error representation of a two class
pattern recognition problem, that is, with the type 1 (FRR-false rejection
rate) and type 2(FAR-false acceptance rate) errors. as the ideal case (i.e., 0
percent on both errors) is questionable to exist, a choice has to be made
depending on the application between one of the two error rates equal to zero
or the minimization of the total error, FRR+FAR .For entry systems, the false
rejection is the most important; for security systems, the false acceptance is
most important.
5. Feature Extraction:
· The acquisition stage provides values of pressure exerted against a
measure of time using an instrumented digital pen sensitive to pressure. A
localized low pass Sum Filter of order 15 is applied to eliminate frequencies
greater than 50 Hz (which could be considered as noise).
· Normalization is then conducted to standardize the values of the pressure
extracted between 0 and 1. The feature extraction stage consists of two
processes. A new technique of segmentation divides the time series data into specifically
defined segments. Characteristics like a shape and curves of the graph, high
and low points, stationary points and gradient of the graph are similar ones
normalization has been done. The improve segmenting method is based on the
algorithm to segment the time data graph into major curves. This is done by
calculating the difference of pressure exerted between every two points. If the
drop of pressure is more equal to 0.035, then a segmenting point is discovered.
The first step verifying a signature is done here. If the amount of segments produced
by a test signature is very different from the genuine signature being compared
to, the test signature is rejected. In the second process, we use time series
modeling with Auto Regressive (AR) technique to calculate the AR coefficient
from all the segments. Autoregressive (AR) models have proven to be superiors
to Fourier methods due to the ability of AR models to handle short segments of
data while giving better frequency resolution and smoother power.
In addition AR methods need only
one or more cycle of sinusoidal-type activity to be
Present in the segment to produce
good spectral peaks and they also provide the ability to observe small shifts
in peak frequencies, which are not easily observed with furrier derived
spectra. The AR model coefficient can be easily estimated by solving recursively
using Levinson- Durbin or Burg method. These coefficients are the used obtain the
power spectral density (PSD) values to represent each segment. Combination of
all PSD values from all the segments represents the signature.
The landing and verification stage is made up of a neural network
topology known as multi-layer perception or M L P implemented as a part of
recognition engine. M L P uses the incremental back propagation algorithm to
train the network. Training is equivalent to finding proper weights for all the
connections such that a desired output is generated for a corresponding input. Using
MLP in the context of a classifier requires all output nodes to be set to 0 except
for the node that is marked to correspond to the class the input is from (output
equal to 1).
7. Advantages
ÿ Natural and intuitive
ÿ Commonly accepted for authentication
ÿ Less intrusive than iris, fingerprint, etc.
8. Applications of DSVS
Applications of signature
identification systems have been slow in their adoption by the financial
industry due to the low false rejected rates that banks and other financial
institutions required. Although it has been reported that Chase Manhattan Bank
was on the first bank to taste a signature identification application. Other
applications of
signature identification includes:
ÿ Internal revenue service (IRS) has utilized signature identification
in electronically file tax returns.
ÿ Employment Services in England to verify an individual
that is claiming benefits.
ÿ Pharmaceutical companies are using it to reduce the overall cost and
administration of drug regularly submissions to the FDA.
9. DSVS: Strengths and Weakness
ÿ DSVS has several strengths. Because of the large amount of data
present in the signature scan template, as well as the difficulty in mimicking
the behavior of signing, signature scan technology is highly resistant to impostor
attempts .As a result of the low false acceptance rates (FAR), a measure of
likelihood that a user claiming a false identity will be accepted, deplorers
can have a high confidence level that successfully
matched users who they claim to be.
Signature scan also benefit from its ability to leverage existing processes and
hardware, such as signature capture tablets and systems based on the public key
infrastructure PKI are popular method for data
encryption. Since most people are
accustomed to providing their signatures during customer interactions, the
technology is considered less invasive that some other biometrics.
ÿ However, signatures scan has several weaknesses. Signature scan is
designed to verify subjects based on the threats of their unique signature. As
a result, individuals who do not sign their names in a consistent manner may
have difficulty enrolling and verifying in signature scan. During enrolment subjects
must provide a series of signatures that are similar enough that the system can
locate large percentages of the common characteristics between the enrolment
signatures. During verification enough
Characteristics must remain constant
to determine with confidence that the authorized
person signed. As a result, individuals
with muscular illness and people who sometimes sign with only their initials
might result in a higher false rejection rate (FRR), which measures the likelihood
that a system will incorrectly reject an authorized user. Since many users are
UN accustomed to signing on a tablet, some subject’s signatures may differ to
their signatures on ink and paper, increasing the
Potential for false rejection.
ÿ The major problem faced with this technology is differentiating between
the consistent parts of the signature and the behavioral parts of the signature
that vary
with each signing. An individual’s
signature is never entirely the same every time it is
signed and can vary substantially
over an individual’s lifetime. Allowing for these variations in the system
while providing the best protection against possible
forgers is an apparent hurdle faced
by this technology.
10. Conclusion
ÿ Signature identification will continue to develop and improve within
the biometric industry because of one major advantage:
public acceptance.
ÿ Even if the individual’s biometric measure remains solely on the card
carried by the individual, a considerable level of security and privacy concern
exists.
ÿ If the measure were to be stored by the third party, even if only for
the purposes of backup, then a much higher level of security and privacy
concern exists. A central repository for such biometric identifiers would present
opportunities for social control that are the staff of antiutopian novels.
Reference
1. Zhao et al, On-line signature verification by adaptively weighted DP matching,
IEICE Trans. Informat. Syst.
2. G. Lorette and R. Plamondon,
Dynamic approaches to handwritten signature verification, Computer processing
of handwriting, World Scientific, 1990, 21-47.
3. http\www.biomatrics.com
4. Nalwa V.S., Automatic On-line
Signature Verification, Proceed. Of the IEEE, 85(2), 1997, 213-239.
5. G. K. Gupta and R. C. Joyce, A
Simple Approach to Dynamic Hand-Written Signature Verification, 1995.
No comments:
Post a Comment