Handwritten Biometric Systems and Their Robustness Evaluation: a Survey
نویسنده
چکیده
Handwriting has been a popular biometric modality for decades in the fields of forensics and security. In forensic analysis, criminal justice usually relies on a writer identifier in conjunction with an expert to determine the authorship of handwritten materials, for example, threat letters. While in security applications, handwriting verification systems are expected to verify whether a user is indeed the one as he or she claims. For security purposes, it is a relatively new idea to use handwriting for biometric key generation (BKG). BKG uses error-corrected feature values to generate cryptographic keys. It has stronger security requirements than verification systems in that it assumes the internal information to be exposed to adversaries while leaking no useful information about users’ biometric. In this paper, we first describe several techniques in the field of writer identification and verification since 1993 [1]. Then we explain the common ways of evaluating writer identification systems and writer verification systems. Next, we discuss several biometric cryptographic key generation schemes and techniques on how they are usually evaluated. Finally, we discuss some papers addressing the shortcomings in considering the robustness in the context of BKG systems. In these papers, the authors propose several new techniques in evaluating the robustness of the handwritten biometric systems and show that adversaries might be more destructive than they are usually reported in the literature.
منابع مشابه
Evaluation of biometric systems: a study of users' acceptance and satisfaction
This paper presents a modality-independent evaluation methodology to study users’ acceptance and satisfaction of biometric systems. It uses a survey questionnaire for data collection, and some data-mining tools for their analysis. We have applied it on two biometric systems developed in our research laboratory. The results from this survey show the necessity of taking users’ point of view when ...
متن کاملAccessibility Evaluation in Biometric Hybrid Architecture for Protecting Social Networks Using Colored Petri Nets
In the last few decades, technological progress has been made important information systems that require high security, Use safe and efficient methods for protecting their privacy. It is a major challenge to Protecting vital data and the ability to threaten attackers. And this has made it important and necessary to be sensitive to the authentication and identify of individuals in confidential n...
متن کاملAccessibility Evaluation in Biometric Hybrid Architecture for Protecting Social Networks Using Colored Petri Nets
In the last few decades, technological progress has been made important information systems that require high security, Use safe and efficient methods for protecting their privacy. It is a major challenge to Protecting vital data and the ability to threaten attackers. And this has made it important and necessary to be sensitive to the authentication and identify of individuals in confidential n...
متن کاملGeometric Robust Multimodal Biometric Watermarking Scheme for Copyright Protection of Digital Images
This paper proposes a copyright protection system using multimodal biometrics for content protection of digital images. Two biometric traits, one physiological (face) and one behavioral (offline handwritten signature) of the legitimate owner are used as watermarks. These watermarks are embedded at different levels of resolution to the high frequency wavelet coefficients through optimal control ...
متن کاملUnimodal & Multimodal Biometric Recognition Techniques A Survey
Biometric recognition refers to an automatic recognition of individuals based on a feature vector(s) derived from their physiological and/or behavioral characteristic. Biometric recognition systems should provide a reliable personal recognition schemes to either confirm or determine the identity of an individual. These features are used to provide an authentication for computer based security s...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009