Biometric Authentication using Online Signature



Similar documents
IMDA Systems: Digital Signature Verification

Keywords image processing, signature verification, false acceptance rate, false rejection rate, forgeries, feature vectors, support vector machines.

Method of Combining the Degrees of Similarity in Handwritten Signature Authentication Using Neural Networks

Biometric Authentication using Online Signatures

Multimedia Document Authentication using On-line Signatures as Watermarks

SIGNATURE VERIFICATION

ECE 533 Project Report Ashish Dhawan Aditi R. Ganesan

Biometrics is the use of physiological and/or behavioral characteristics to recognize or verify the identity of individuals through automated means.

Efficient on-line Signature Verification System

Signature Verification Why xyzmo offers the leading solution.

Visual-based ID Verification by Signature Tracking

A NEW SYSTEM FOR SECURE HANDWRITTEN SIGNING OF DOCUMENTS

On-line signature verication

3)Skilled Forgery: It is represented by suitable imitation of genuine signature mode.it is also called Well-Versed Forgery[4].

Support Vector Machines for Dynamic Biometric Handwriting Classification

May For other information please contact:

Spanish Certification Body. Challenges on Biometric Vulnerability Analysis on Fingerprint Devices. New. Technical Manager September 2008

An Enhanced Countermeasure Technique for Deceptive Phishing Attack

Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and

Identity authentication using improved online signature verification method

International Journal of Advanced Information in Arts, Science & Management Vol.2, No.2, December 2014

Multimodal Biometric Recognition Security System

Article. Robust Signature Capture Using SigPlus Software. Copyright Topaz Systems Inc. All rights reserved.

Handwritten Signature Verification using Neural Network

VoiceSign TM Solution. Voice Signature Overview

ELECTRONIC SIGNATURES AT BANK REPUBLIC SEARCHING THE ORIGINAL COPY OF ELECTRONICALLY SIGNED DOCUMENT CARE FOR THE ENVIRONMENT

DESIGN OF DIGITAL SIGNATURE VERIFICATION ALGORITHM USING RELATIVE SLOPE METHOD

Article. Electronic Notary Practices. Copyright Topaz Systems Inc. All rights reserved.

Biometric Authentication Platform for a Safe, Secure, and Convenient Society

Alternative Biometric as Method of Information Security of Healthcare Systems

Agilent MicroLab Software with Spectroscopy Configuration Manager and Spectroscopy Database Administrator (SCM/SDA)

STATIC SIGNATURE RECOGNITION SYSTEM FOR USER AUTHENTICATION BASED TWO LEVEL COG, HOUGH TRANSFORM AND NEURAL NETWORK

Strategic White Paper

NFC & Biometrics. Christophe Rosenberger

Digital Identity Management

Analysis of Multimodal Biometric Fusion Based Authentication Techniques for Network Security

Entrust Certificate Services. Java Code Signing. User Guide. Date of Issue: December Document issue: 2.0

Authentication Scheme for ATM Based On Biometric K. Kavitha, II-MCA IFET COLLEGE OF ENGINEERING DEPARTMENT OF COMPUTER APPLICATIONS

This method looks at the patterns found on a fingertip. Patterns are made by the lines on the tip of the finger.

BehavioSec participation in the DARPA AA Phase 2

Implement best practices by using FileMaker Pro 7 as the backbone of your 21 CFR 11 compliant system.

Voice Authentication for ATM Security

Version 1.0. ASAM CS Single Sign-On

Detecting Credit Card Fraud

Arkansas Department of Information Systems Arkansas Department of Finance and Administration

Comparative Analysis of Handwritten, Biometric and Digital Signature

Authentication protocol for fingerprint feature extraction and IBC in monitoring systems

Biometrics, Tokens, & Public Key Certificates

Security of Identity Management. Professor Brian Collins

Automated Regional Justice Information System (ARJIS) Acceptable Use Policy for Facial Recognition

Oracle WebCenter Content

Online signature API. Terms used in this document. The API in brief. Version 0.20,

CoSign for 21CFR Part 11 Compliance

Implementation of biometrics, issues to be solved

Full Compliance Contents

Practical Challenges in Adopting PIV/PIV-I

Development of Attendance Management System using Biometrics.

Statistical Analysis of Signature Features with Respect to Applicability in Off-line Signature Verification

A Conceptual Model of Practitioner Authentication Prior to Providing Telemedicine Services in Developing Countries

Aman Chadha et al, Int. J. Comp. Tech. Appl., Vol 2 (5),

ScreenMaster RVG200 Paperless recorder FDA-approved record keeping. Measurement made easy

Hospital Certified Electronic Health Record (EHR) Technology Questionnaire

ERROR TOLERANCE TECHNIQUES FOR BINDING CRYPTOGRAPHIC KEY WITH BIOMETRICS

Three Factor Scheme for Biometric-Based Cryptographic Key Regeneration Using Iris

De-duplication The Complexity in the Unique ID context

Image Authentication Scheme using Digital Signature and Digital Watermarking

Application-Specific Biometric Templates

Seminar report Digital Signature Submitted in partial fulfillment of the requirement for the award of degree Of Computer Science

International Journal of Innovative Research in Computer and Communication Engineering

Online Trading System Project Specifications Distributed Objects CSPP 51024

Cryptographic key generation using handwritten signature

FACE RECOGNITION BASED ATTENDANCE MARKING SYSTEM

Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human

Securing Electronic Medical Records using Biometric Authentication

Finger Vein digital biometric signature: use cases

Proposed framework for Securities trading using wireless technology.

Automatic Extraction of Signatures from Bank Cheques and other Documents

Web Services Credit Card Errors A Troubleshooter

User Authentication Methods for Mobile Systems Dr Steven Furnell

documents Supplier handbook - Introduction to Digital Signature - Rome, January 2012

USER AUTHENTICATION USING ON-LINE SIGNATURE AND SPEECH

APGO GUIDANCE ON DOCUMENT AUTHENTICATION. Table of Contents

Signature Region of Interest using Auto cropping

SAVING $4.8 MILLION DOLLARS, MORE THAN DOUBLE THE SYSTEM COST INCLUDING ALL OF THE ENHANCEMENTS

Securing Electronic Medical Records Using Biometric Authentication

AS DNB banka. DNB Link specification (B2B functional description)

Automatic Biometric Student Attendance System: A Case Study Christian Service University College

B U S I N E S S G U I D E

Guidance for Industry. 21 CFR Part 11; Electronic Records; Electronic Signatures. Electronic Copies of Electronic Records

Chapter 15 User Authentication

Design of Two Tier Security ATM System with Multimodal Biometrics By Means of Fuzzy Logic

Software Developer Guide

Fighting product clones through digital signatures

TERMS OF USE FOR PUBLIC LAW CORPORATION PERSONAL CERTIFICATES FOR QUALIFIED DIGITAL SIGNATURE

Minnesota State Colleges and Universities System Guideline Chapter 5 Administration

AGENDA ITEM : ELECTRONIC SIGNATURE

Smart Cards and Biometrics in Privacy-Sensitive Secure Personal Identification Systems

Journal of Electronic Banking Systems

Enhanced Cloud Security through KFAC

FDA Title 21 CFR Part 11:Electronic Records; Electronic Signatures; Final Rule (1997)

Transcription:

University of Trento Department of Mathematics

Outline Introduction An example of authentication scheme Performance analysis and possible improvements

Outline Introduction An example of authentication scheme Performance analysis and possible improvements

Outline Introduction An example of authentication scheme Performance analysis and possible improvements

Identification plays a fundamental role in an increasingly interconnected society. There are three broad identification modes, based on 1. something you know; 2. something you have; 3. something you are. biometric recognition

Identification plays a fundamental role in an increasingly interconnected society. There are three broad identification modes, based on 1. something you know; 2. something you have; 3. something you are. biometric recognition

Identification plays a fundamental role in an increasingly interconnected society. There are three broad identification modes, based on 1. something you know; 2. something you have; 3. something you are. biometric recognition

Identification plays a fundamental role in an increasingly interconnected society. There are three broad identification modes, based on 1. something you know; 2. something you have; 3. something you are. biometric recognition

Identification plays a fundamental role in an increasingly interconnected society. There are three broad identification modes, based on 1. something you know; 2. something you have; 3. something you are. biometric recognition

Identification plays a fundamental role in an increasingly interconnected society. There are three broad identification modes, based on 1. something you know; 2. something you have; 3. something you are. biometric recognition

Handwritten Signature The signature is captured using a digital table like It extracts from the signature some information like: time stamp, pressure, coordinates x and y,... velocity, acceleration...

Handwritten Signature The signature is captured using a digital table like It extracts from the signature some information like: time stamp, pressure, coordinates x and y,... velocity, acceleration...

POSITIVE ASPECTS: people are familiar with the use of signatures in their daily life; analysis requires no invasive measurements. NEGATIVE ASPECTS: an individual signature is never entirely the same and can vary substantially over an individual s lifetime. A user s biometric cannot be changed like a password.

POSITIVE ASPECTS: people are familiar with the use of signatures in their daily life; analysis requires no invasive measurements. NEGATIVE ASPECTS: an individual signature is never entirely the same and can vary substantially over an individual s lifetime. A user s biometric cannot be changed like a password.

POSITIVE ASPECTS: people are familiar with the use of signatures in their daily life; analysis requires no invasive measurements. NEGATIVE ASPECTS: an individual signature is never entirely the same and can vary substantially over an individual s lifetime. A user s biometric cannot be changed like a password.

POSITIVE ASPECTS: people are familiar with the use of signatures in their daily life; analysis requires no invasive measurements. NEGATIVE ASPECTS: an individual signature is never entirely the same and can vary substantially over an individual s lifetime. A user s biometric cannot be changed like a password.

POSITIVE ASPECTS: people are familiar with the use of signatures in their daily life; analysis requires no invasive measurements. NEGATIVE ASPECTS: an individual signature is never entirely the same and can vary substantially over an individual s lifetime. A user s biometric cannot be changed like a password.

Typical Verification Process

Our Algorithm The algorithm consists of 3 main steps 1. Training: step necessary to compute time thresholds and the values used during the binarization phase; 2. Enrollment: the steps the algorithm follows when a new user is enrolled into the system; 3. Authentication: the steps the algorithm follows when a user needs to verify his gesture.

Our Algorithm The algorithm consists of 3 main steps 1. Training: step necessary to compute time thresholds and the values used during the binarization phase; 2. Enrollment: the steps the algorithm follows when a new user is enrolled into the system; 3. Authentication: the steps the algorithm follows when a user needs to verify his gesture.

Our Algorithm The algorithm consists of 3 main steps 1. Training: step necessary to compute time thresholds and the values used during the binarization phase; 2. Enrollment: the steps the algorithm follows when a new user is enrolled into the system; 3. Authentication: the steps the algorithm follows when a user needs to verify his gesture.

Training For this step we need a training database, representative of the population we want to enrol into the system. The tablet extracts some or all of the following data per gesture: spatial coordinates X and Y ; a time-stamp, T ; pressure, P; event type, E event ID - different touch events have different ID when they are simultaneously in contact with the device.

Training For this step we need a training database, representative of the population we want to enrol into the system. The tablet extracts some or all of the following data per gesture: spatial coordinates X and Y ; a time-stamp, T ; pressure, P; event type, E event ID - different touch events have different ID when they are simultaneously in contact with the device.

Training For this step we need a training database, representative of the population we want to enrol into the system. The tablet extracts some or all of the following data per gesture: spatial coordinates X and Y ; a time-stamp, T ; pressure, P; event type, E event ID - different touch events have different ID when they are simultaneously in contact with the device.

Feature Extraction Starting from this data, we computed a total of 63 features for each gesture. ID Description ID Description ID Description 1 Number of Sample 19,21,23,25 Y Local Acceleration 49 Height 2 Time Duration 26-27 X and Y Absolute Mean Velocity 50 Y Maximum 3 Aspect Ratio 28-29 X and Y Initial Value 51 Y Minimum 4-5 X and Y Areas 30-31 X and Y Final Value 52 Y Mean 6 X Mean Velocity 32-35 Statistic Moments M1,1,M1,2,M2,1, M0,3 53 Pressure Mean 7 X Mean Acceleration 37-40 X Local Area 54 Pressure Maximum 8 Y Mean Velocity 41-44 Y Local Area 55 Pressure Minimum 9 Y Mean Acceleration 45 Width 56-57 X and Y Maximum Velocity 10,12,14,16 X Local Velocity 46 X Maximum 58-61 Pressure Local Area 11,13,15,17 X Local Acceleration 47 X Minimun 62 X Peak Number 18,20,22,24 Y Local Velocity 48 X Mean 63 Y Peak Number

Training From the training database we calculate the following values: four time thresholds th 1, th 2, th 3, th 4 (Time Threshold Control); three medians m 1, M, m 2 for each feature (Binarization process)

Training From the training database we calculate the following values: four time thresholds th 1, th 2, th 3, th 4 (Time Threshold Control); three medians m 1, M, m 2 for each feature (Binarization process)

Training From the training database we calculate the following values: four time thresholds th 1, th 2, th 3, th 4 (Time Threshold Control); three medians m 1, M, m 2 for each feature (Binarization process)

Enrollment 5 biometric measurements are recorded for each user; The mean time duration T is compared to the four time thresholds computed during the training stage, obtaining Fascia temp. For each feature the median value is compared to m 1, M, m 2 in order to assign it one of the following strings {1011, 1111, 0111, 0101} obtaining the vector B. The same process is applied to each of the five feature vectors, obtaining the vectors b 1, b 2, b 3, b 4, b 5

Enrollment 5 biometric measurements are recorded for each user; The mean time duration T is compared to the four time thresholds computed during the training stage, obtaining Fascia temp. For each feature the median value is compared to m 1, M, m 2 in order to assign it one of the following strings {1011, 1111, 0111, 0101} obtaining the vector B. The same process is applied to each of the five feature vectors, obtaining the vectors b 1, b 2, b 3, b 4, b 5

Enrollment 5 biometric measurements are recorded for each user; The mean time duration T is compared to the four time thresholds computed during the training stage, obtaining Fascia temp. For each feature the median value is compared to m 1, M, m 2 in order to assign it one of the following strings {1011, 1111, 0111, 0101} obtaining the vector B. The same process is applied to each of the five feature vectors, obtaining the vectors b 1, b 2, b 3, b 4, b 5

Enrollment 5 biometric measurements are recorded for each user; The mean time duration T is compared to the four time thresholds computed during the training stage, obtaining Fascia temp. For each feature the median value is compared to m 1, M, m 2 in order to assign it one of the following strings {1011, 1111, 0111, 0101} obtaining the vector B. The same process is applied to each of the five feature vectors, obtaining the vectors b 1, b 2, b 3, b 4, b 5

Enrollment 5 biometric measurements are recorded for each user; The mean time duration T is compared to the four time thresholds computed during the training stage, obtaining Fascia temp. For each feature the median value is compared to m 1, M, m 2 in order to assign it one of the following strings {1011, 1111, 0111, 0101} obtaining the vector B. The same process is applied to each of the five feature vectors, obtaining the vectors b 1, b 2, b 3, b 4, b 5

Enrollment

Stored templates The system saves the following data: m 1, M, m 2 HD 1, the sum between the binarized vector B and the code word obtain for each user s HD 2, the correction capability vector Hash Fascia temp

Stored templates The system saves the following data: m 1, M, m 2 HD 1, the sum between the binarized vector B and the code word obtain for each user s HD 2, the correction capability vector Hash Fascia temp

Authentication The authentication process is organized into two steps: 1. Time threshold control 2. Feature analysis

Authentication The authentication process is organized into two steps: 1. Time threshold control 2. Feature analysis

Time threshold control Figure : Scheme representing how the time threshold will be used.

Feature analysis

Performance Evaluation Evaluating a verification system requires the analysis of two types of errors: 1. False Acceptance Rate (FAR): rate of incorrectly accepted forgeries 2. False Rejection Rate (FRR): rate of genuine signatures that are incorrectly rejected by the system

Results Different choices of time thresholds and code correction capability lead to different percentages. Allowing the user to have a second signature attempt in case the first one fails to authenticate, the best results achieved with the used database are: FAR = 1.91% FRR = 6.66%

Results Different choices of time thresholds and code correction capability lead to different percentages. Allowing the user to have a second signature attempt in case the first one fails to authenticate, the best results achieved with the used database are: FAR = 1.91% FRR = 6.66%

Possible improvements Many modifications are possible that can enhance the performance of the previous algorithm. For example, one can change the extracted set of features; the encoding scheme; the binarization process (in order to test your new verification scheme you could need a database containing genuine and forgery signatures).

Thank you for attention!