A New System for Secure Handwritten Signing of Documents
نویسندگان
چکیده
Handwritten Signature Verification (HSV) is a natural and trusted method for user identity verification. HSV can be classified into two main categories: offline and online HSV. Offline systems take handwritten signatures from scanned documents, while online systems use specific hardware (e.g., pen tablets) to register pen movements during the act of signing. Online HSV systems may embed signatures (including the signature dynamics) into digital documents. Unfortunately, during their lifetime documents may be repeatedly printed and scanned, and digital to paper conversions may result in loosing the signature dynamics. The main contribution of this work is a new HSV system for secure handwritten signing of documents. First, we illustrate how to verify handwritten signatures so that signature dynamics can be processed during verification of every type of document (both paper and digital documents). Secondly, we show how to embed features extracted from handwritten signatures within the documents themselves, so that no remote signature database is needed. To accomplish the embedding task, we make use of 2D barcodes. The main challenge here is to be able to store the signature dynamics within the limited capacity of barcodes. Thirdly, we propose a method for the verification of signature dynamics which is compatible to a wide range of mobile devices so that no special hardware is needed. The main challenge here is to achieve a high verification performance, despite constrains due to the limited computational resources and pressure accuracy of mobile phones. We address the trade-off between discrimination capabilities of the system and the storage size of the signature model. Towards this end, we report the results of an experimental evaluation of our system on different signature datasets.
منابع مشابه
Connected Component Based Word Spotting on Persian Handwritten image documents
Word spotting is to make searchable unindexed image documents by locating word/words in a doc-ument image, given a query word. This problem is challenging, mainly due to the large numberof word classes with very small inter-class and substantial intra-class distances. In this paper, asegmentation-based word spotting method is presented for multi-writer Persian handwritten doc-...
متن کاملComparative Analysis of Handwritten, Biometric and Digital Signature
Information and communication technologies have influenced a whole variety of business processes in the past few years. New emerging methods and techniques are trying to find their place and application in enterprises. This is the case of documents’ signing, too. Handwritten signature has been used as a traditional method for centuries. However, it seems today that it cannot provide a satisfact...
متن کاملUsing the W3C WebCrypto API for Document Signing
This paper focuses on digitally signing documents as a specific use case for making secure hardware available to a web application. We explore the current options available to implementers and the drawbacks associated with each option. Then we look at the emerging Web Cryptography API developed by the W3C and discover missing functionality needed to implement this use case. Finally, we suggest ...
متن کاملOnline Handwritten Signature Verification Using Hidden Markov Models
Most people are used to signing documents and because of this, it is a trusted and natural method for user identity verification, reducing the cost of password maintenance and decreasing the risk of eBusiness fraud. In the proposed system, identity is securely verified and an authentic electronic signature is created using biometric dynamic signature verification. Shape, speed, stroke order, of...
متن کاملUnconditionally Secure Signature Schemes Revisited
Unconditionally secure signature (USS) schemes provide the ability to electronically sign documents without the reliance on computational assumptions needed in traditional digital signatures. Unlike digital signatures, USS schemes require both different signing and different verification algorithms for each user in the system. Thus, any viable security definition for a USS scheme must carefully...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IJCSA
دوره 12 شماره
صفحات -
تاریخ انتشار 2015