Article. Electronic Signature Forensics. Copyright Topaz Systems Inc. All rights reserved.



Similar documents
Article. Robust Signature Capture Using SigPlus Software. Copyright Topaz Systems Inc. All rights reserved.

How To Choose An Electronic Signature

Software Developer Guide

Electronic Signature Article

Article. Electronic Notary Practices. Copyright Topaz Systems Inc. All rights reserved.

Support Vector Machines for Dynamic Biometric Handwriting Classification

Checking signatures at postal vote openings

Dissecting Electronic Signatures for the Life Sciences

Electronic Signature Capture with Authentication

Signature Verification Why xyzmo offers the leading solution.

10. SIGNATURE EVALUATION

Developer s Guide. Revised January 17, Boardwalk, Suite 205, San Marcos, CA (760)

Biometric Authentication using Online Signatures

Strategic White Paper

Efficient on-line Signature Verification System

IBM esignature overview

ECE 533 Project Report Ashish Dhawan Aditi R. Ganesan

Moving Towards an Electronic Real Estate Transaction

In addition, a decision should be made about the date range of the documents to be scanned. There are a number of options:

Improving Online Security with Strong, Personalized User Authentication

THE LAW OF THE REPUBLIC OF ARMENIA ON ELECTRONIC DOCUMENT AND ELECTRONIC SIGNATURE CHAPTER 1. GENERAL PROVISIONS. Article 1. The subject of the Law

Business Issues in the implementation of Digital signatures

Products. Digital Document for DNA A Single, Browser-based Electronic Content Management System That Reduces Costs and Streamlines Processes

Brand Guide for Licensees of Shippensburg University of Pennsylvania

Two-Factor Authentication over Mobile: Simplifying Security and Authentication

Multimodal Biometric Recognition Security System

Assignment 1 Biometric authentication

Module 1: Introduction to Designing Security

Keywords image processing, signature verification, false acceptance rate, false rejection rate, forgeries, feature vectors, support vector machines.

NEW YORK STATE TEACHER CERTIFICATION EXAMINATIONS

Lab Answer Key for Module 6: Configuring and Managing Windows SharePoint Services 3.0. Table of Contents Lab 1: Configuring and Managing WSS 3.

White Paper: Five Global Trends Shaping the Future of Workforce Management Solutions

Application-Specific Biometric Templates

Case Study. The Healthcare Industry. Copyright Topaz Systems Inc. All rights reserved.

PTE ACADEMIC SECURE

WhitePaper. Private Cloud Computing Essentials

Steps to Migrating to a Private Cloud

Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime

Handwriting Analysis 2005, 2004, 2002, 1993 by David A. Katz. All rights reserved.

U.S. FDA Title 21 CFR Part 11 Compliance Assessment of SAP Records Management

Detecting Credit Card Fraud

Digital Evidence Search Kit

ELECTRONIC SIGNATURES AND ASSOCIATED LEGISLATION

Product description. Generate and sign PDF documents from within any application

Lab Answer Key for Module 9: Active Directory Domain Services. Table of Contents Lab 1: Exploring Active Directory Domain Services 1

Pipeliner CRM Phaenomena Guide Getting Started with Pipeliner Pipelinersales Inc.

ORACLE PROCESS MANUFACTURING QUALITY MANAGEMENT

Contact person: Doru Oraselu

DIGITAL FORENSICS SPECIALIZATION IN BACHELOR OF SCIENCE IN COMPUTING SCIENCE PROGRAM

How-To Guide. Crystal Report Demo. Copyright Topaz Systems Inc. All rights reserved.

Signature verification using Kolmogorov-Smirnov. statistic

Visual-based ID Verification by Signature Tracking

Adeoye Temitope Onaolamipo School of Computer Science, Mathematics & Information Technology Houdegbe North America University Republic of Benin

Extended Validation SSL

CINSAY RELEASE NOTES. Cinsay Product Updates and New Features V2.1

Quick Start User Guide

Education Software Installer 2015

Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human

TEACHING POSITIONS Hofstra University, Chemistry Department 2005-PRESENT CUNY John Jay College, Science Department

E-Booking at London International Airport

Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud

Multimedia Document Authentication using On-line Signatures as Watermarks

IBM Software Information Management. Scaling strategies for mission-critical discovery and navigation applications

Rapid Bottleneck Identification A Better Way to do Load Testing. An Oracle White Paper June 2009

Internet Advertising: Is Your Browser Putting You at Risk?

Disguised Writings By Steve Cain Board Certified Forensic Document Examiner

Part II Management Accounting Decision-Making Tools

ORACLE FINANCIAL SERVICES PROFITABILITY MANAGEMENT

Chapter 5 Understanding Input. Discovering Computers Your Interactive Guide to the Digital World

Pipeliner CRM Phaenomena Guide Opportunity Management Pipelinersales Inc.

AUTHENTIFIERS. Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes

The Graphosign signature

FORENSIC DOCUMENT EXAMINATION CERTIFICATION

Chapter 5 Objectives. Chapter 5 Input

Biometrics in Physical Access Control Issues, Status and Trends White Paper

Controlling Desktop Software Expenditures

Enhanced LIC Pencil Filter

Dell Enterprise Reporter 2.5. Configuration Manager User Guide

Cloud Computing in a GxP Environment: The Promise, the Reality and the Path to Clarity

State of Arizona Policy Authority Office of the Secretary of State

3D PASSWORD. Snehal Kognule Dept. of Comp. Sc., Padmabhushan Vasantdada Patil Pratishthan s College of Engineering, Mumbai University, India

Intland s Medical Template

Biocryptology is an encryption-based. entry to a network or the Internet that. are vulnerable to third parties through

CURRICULUM GUIDE. When this Forensics course has been completed successfully, students should be able to:

IBM Security QRadar Risk Manager

DESIGN OF DIGITAL SIGNATURE VERIFICATION ALGORITHM USING RELATIVE SLOPE METHOD

BPM and Simulation. A White Paper. Signavio, Inc. Nov Katharina Clauberg, William Thomas

Forensic Science Club

Forensic Science: Crime Scene Basics. T. Trimpe

An Oracle White Paper February Rapid Bottleneck Identification - A Better Way to do Load Testing

Method of training blind students to the construction of graphic images with the application of Autocad 2D

Transcription:

Article Electronic Signature Forensics Copyright Topaz Systems Inc. All rights reserved. For Topaz Systems, Inc. trademarks and patents, visit www.topazsystems.com/legal.

Table of Contents Overview... 3 Background... 3 Scope of the Study... 3 Results of the Evaluation... 3 2 www.topazsystems.com Back to Top

Overview Excerpts from a report by: William J. Flynn, B.S., D-ABFDE Handwriting and Signature Examinations, Affiliated Forensic Laboratories, Inc. Background Over the past 90 years, forensic document examiners in the US have continuously developed tools and methodologies which allow them to produce highly accurate (and legally accepted) handwriting and signature comparisons. Over this time period, many technological and legal events have affected the forensic community. An example of a paradigm shift in the handwriting world occurred when the writing instrument of choice changed from a nibbed pen (such as a fountain pen) to the ballpoint pen in 1945. Because the ballpoint pen uses highly viscous ink and a non-flexing tip, it produces a writing line with little or no shading (stress). Forensic document examiners in the late 1940's had to adapt their analysis techniques in order to account for the loss of this traditionally important data. A rapid change to e-commerce and esignatures will represent another paradigm shift for the forensic community. Because I have been a forensic document examiner for more than 31 years and also have a BS in Computer Science, I have been acutely aware of the need to develop working tools which can be used to provide the same level of confidence in esignature verification as is now expected in "normal" signature comparisons. My purpose in working with Topaz has been to help develop these electronic signature examination tools. Scope of the Study During the course of the study, I visually compared the captured signatures to their original ink versions using SigAnalyze software on my lab's computers. All of the original signatures were examined using magnification loupes and a binocular microscope (also in my laboratory). The purpose of this evaluation was to determine if Topaz Systems' software would provide sufficient information to permit a forensic analyst to authenticate digitally captured signatures by comparing them to either original (non-captured) signatures, other digitally captured exemplar signatures, or some combination of the two. Results of the Evaluation Although an original (ink on paper) signature will always provide the best 3-dimensional view of the writing, the actual speed of the strokes can only be inferred in a subjective way. All digital 3 www.topazsystems.com Back to Top

signature captures will also display the captured signature at a lower resolution than could be seen in an examination of the original signature. The Topaz software, however, provides far more forensically valuable data about the dynamics of the writing than could ever be determined from an examination of the original. Data is not information. All of the captured data is useless until it is logically organized and analyzed. In order to provide a means of quickly and accurately evaluating the dynamic data, the Topaz software [presents in a unique and patent pending way the segment timing, speed of signature data and]... the exact sequence of movements made by the author during the original signature execution. In my preliminary testing, I found this system (namely, the representations of signature dynamics and the sequence of movements) to provide a wealth of forensically valuable information. Forgeries by tracing or simulation take far longer to produce than genuine signatures. These dramatic differences in the dynamics of the forgery samples (made by the undersigned) were immediately obvious in my side-by-side comparisons using SigAnalyze. Even when attempts were made to speed up the forgery process, it was not possible to reproduce the segment timings to coincide with those in the genuine signatures. The combination of the high sample rate signature captures and the [unique, patent-pending]... line representations of the segment speeds, made it very easy to detect differences between normal signatures and attempted simulations or tracings. In general, a forgery can be accurate and slow or fast but inaccurate. The... [genuine] captured signatures displayed the natural changes in speed which would be expected in normally executed writings. In all of the attempts made by the undersigned to accurately reproduce the subjects' signatures, however, there was far less difference in the segments timings than was true in the natural signatures. This slow drawing effect is a well-known phenomenon in the forensic document community. Because the forgeries may be attempted as a rapid series of movements (which typically fail to graphically depict the victim's signature style), it is equally important that as high a capture rate as possible be employed in the digitizing process. This captured data must accurately represent the writing shapes, sizes, connecting strokes, and proportions of the original signature. In other words, a forgery which is done rapidly (in the hope of re-creating the victim's dynamic writing pattern) will typically have a much different graphical appearance than a true signature. The high resolution of the Topaz system appears to be sufficient to show these graphical differences between a rapidly-made forgery and rapidly-made genuine signature. 4 www.topazsystems.com Back to Top

It was not possible to produce a simulation or tracing or a subject's signature which would have both the graphical appearance of a genuine signature and an authentic signature's segment timings. The beauty of a signature as a form of identification is that it is dynamic, not static. All other proposed forms of biometric identification such as retinal scans and fingerprints rely on the exact matching of fixed data. Signature identification, however, depends upon pattern recognition principles because no two signatures are exactly alike. In my opinion, this may be the single most important reason to use signatures to identify an individual through a computer linkage. Because of the pattern of fluctuations found in a normal signature, any digital signature that is fraudulently captured or stolen can only be used once. The second usage of a "stolen" signature would prove it is non-genuine since it would be an exact (or near-exact) match to a signature used for an earlier transaction. This is in direct contrast to a stolen fingerprint file which would be expected to be exactly the same on each transaction. William J. Flynn Questioned Document Examiner 1 Moshe Kam, Gabriel Fielding and Robert Conn, "Writer Identification by Professional Document Examiners," Journal of Forensic Sciences, Vol. 42, No. 5 (Sept 1997): pp. 778-786 Editor's Comments and Notes: 1. The Topaz SigAnalyze software and SigPlus electronic signature capture system are patented. All rights are reserved. [ ] and... marks are an indication of editing. 2. Topaz SigAnalyze software is available only to forensic document examiners. 3. Topaz signatures provide both forensic and biometric electronic signature data for analysis. This is very valuable information for handwriting analysis. The Topaz system records the original electronic signature that was converted at a high sample rate utilizing patented hardware tablets and patent-pending methods for highly accurate measurement of time associated with each point. With Topaz, biometric measurements can be made at any time from the original forensic data. 4. Some electronic signature capture systems discard the original data through a 1-way transformation and record only summary biometric measurements at the point of signature capture. This provides limited information to the document examiner. Topaz recommends the use of the SigPlus ActiveX control for electronic signature capture to ensure that you are not losing valuable data. Important Notice: This software or any or all additional documentation, guidelines, or examples do not constitute a warranty about the performance, security, or legal acceptability of the SigPlus control in any specific use or implementation. To the extent that SigPlus is used to achieve regulatory or other specific objectives within an industry, you must consult competent experts or regulatory officials together with your own plan to achieve your desired business objectives using the Topaz electronic signature tools. 5 www.topazsystems.com Back to Top