The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] online signature verification(2hit)

1-2hit
  • Enhanced Cancelable Biometrics for Online Signature Verification

    Daigo MURAMATSU  Manabu INUMA  Junji SHIKATA  Akira OTSUKA  

     
    LETTER-Analog Signal Processing

      Vol:
    E93-A No:6
      Page(s):
    1254-1259

    Cancelable approaches for biometric person authentication have been studied to protect enrolled biometric data, and several algorithms have been proposed. One drawback of cancelable approaches is that the performance is inferior to that of non-cancelable approaches. In this paper, we propose a scheme to improve the performance of a cancelable approach for online signature verification. Our scheme generates two cancelable dataset from one raw dataset and uses them for verification. Preliminary experiments were performed using a distance-based online signature verification algorithm. The experimental results show that our proposed scheme is promising.

  • Hill-Climbing Attacks and Robust Online Signature Verification Algorithm against Hill-Climbing Attacks

    Daigo MURAMATSU  

     
    PAPER

      Vol:
    E93-D No:3
      Page(s):
    448-457

    Attacks using hill-climbing methods have been reported as a vulnerability of biometric authentication systems. In this paper, we propose a robust online signature verification algorithm against such attacks. Specifically, the attack considered in this paper is a hill-climbing forged data attack. Artificial forgeries are generated offline by using the hill-climbing method, and the forgeries are input to a target system to be attacked. In this paper, we analyze the menace of hill-climbing forged data attacks using six types of hill-climbing forged data and propose a robust algorithm by incorporating the hill-climbing method into an online signature verification algorithm. Experiments to evaluate the proposed system were performed using a public online signature database. The proposed algorithm showed improved performance against this kind of attack.