Cancellable Biometrics for On-line Signature Recognition

Author(s):  
Emanuele Maiorana ◽  
Patrizio Campisi ◽  
Alessandro Neri

With the widespread diffusion of biometrics-based recognition systems, there is an increasing awareness of the risks associated with the use of biometric data. Significant efforts are therefore being dedicated to the design of algorithms and architectures able to secure the biometric characteristics, and to guarantee the necessary privacy to their owners. In this work we discuss a protected on-line signature-based biometric recognition system, where the considered biometrics are secured by applying a set of non-invertible transformations, thus generating modified templates from which retrieving the original information is computationally as hard as random guessing it. The advantages of using a protection method based on non-invertible transforms are exploited by presenting three different strategies for the matching of the transformed templates, and by proposing a multi-biometrics approach based on score-level fusion to improve the performances of the considered system. The reported experimental results, evaluated on the public MCYT signature database, show that the achievable recognition rates are only slightly affected by the proposed protection scheme, which is able to guarantee the desired security and renewability for the considered biometrics.

Author(s):  
Abdel-Karim Al-Tamimi ◽  
Asseel Qasaimeh ◽  
Kefaya Qaddoum

Despite recent developments in offline signature recognition systems, there is however limited focus on the recognition problem facet of using an inadequate sample size for training that could deliver reliable and easy to use authentication systems. Signature recognition systems are one of the most popular biometric authentication systems. They are regarded as non-invasive, socially accepted, and adequately precise. Research on offline signature recognition systems still has not shown competent results when a limited number of signatures are used. This paper describes our proposed practical offline signature recognition system using the oriented FAST and rotated BRIEF (ORB) feature extraction algorithm. We focus on the practicality of the proposed system, which requires only the minimum number of signatures per user to achieve a high level of fidelity. We manifest the practicality of our approach with a signature database of 300 signatures from 100 different individuals, implying that only two signatures are needed per person to train the proposed system. Our proposed solution achieves a 91% recognition rate with a median matching time of only 7 ms.


2009 ◽  
Vol 1 (4) ◽  
pp. 40-57 ◽  
Author(s):  
Emanuele Maiorana ◽  
Patrizio Campisi ◽  
Alessandro Neri

In this article, the authors propose a protected on-line signature based biometric authentication system, where the original signature templates are protected by transforming them in a non-invertible way. Recovering the original biometrics from the stored data is thus computationally as hard as random guessing them. The transformed templates are compared employing a Dynamic Time Warping (DTW) matching strategy. The reported experimental results, evaluated on the public MCYT signature database, show that the achievable recognition rates are only slightly affected by the proposed protection scheme, which is able to guarantee the desired security and renewability for the considered biometrics.


Author(s):  
Jose Alberto ◽  
Crispin Zavala ◽  
Ocotlan Diaz ◽  
Gennadiy Burlak ◽  
Alberto Ochoa ◽  
...  

2014 ◽  
Vol 989-994 ◽  
pp. 4742-4746
Author(s):  
Halmurat Dilmurat ◽  
Kurban Ubul

Data collection is the first step in handwritten character recognition systems, and the data quality collected effects the whole systems efficiency. As the necessary subsystem of on-line handwritten character/word recognition system, a Uyghur handwritten character collection system is designed and implemented with Visual C++ based on the nature of Uyghur handwriting. Uyghur handwritings is encoded by 8 direction tendency and stored in extension stroke file. And they are collected based on the content of Text Prompt File. From experimental results, it can be concluded that the handwriting collection system indicates its strong validity and efficiency during the collection of Uyghur handwriting.


2014 ◽  
Vol 14 (2) ◽  
pp. 92-97
Author(s):  
Desislava Boyadzhieva ◽  
Georgi Gluhchev

Abstract A combined method for on-line signature verification is presented in this paper. Moreover, all the necessary steps in developing a signature recognition system are described: signature data pre-processing, feature extraction and selection, verification and system evaluation. NNs are used for verification. The influence of the signature forgery type (random and skilled) over the verification results is investigated as well. The experiments are carried out on SUsig database which consists of genuine and forgery signatures of 89 users. The average accuracy is 98.46%.


2012 ◽  
Vol 433-440 ◽  
pp. 4159-4164
Author(s):  
Hong Bin Zhen ◽  
Xiao Feng Zhang ◽  
Lian Suo Qi ◽  
Jing Huang

For specific mission and unique configure of Shipboard Electrical Power Systems (SEPS), their relay protection schemes are different from Terrestrial Electrical Power Systems (TEPS). With development of system capacity and network topology, the traditional three-step current protection method can not meet protection demands, which has the feature of off-line setting. Based on the characteristic and requirement of SEPS, a new short-delay adaptive current protection scheme is proposed, which can automatically adjust current settings of short-delay protection on-line according to the system operation state. Simulation results of typical instance verify the feasibility and validity to improve protection performance.


1991 ◽  
Vol 30 (01) ◽  
pp. 53-64 ◽  
Author(s):  
R. Schosser ◽  
C. Weiss ◽  
K. Messmer

This report focusses on the planning and realization of an interdisciplinary local area network (LAN) for medical research at the University of Heidelberg. After a detailed requirements analysis, several networks were evaluated by means of a test installation, and a cost-performance analysis was carried out. At present, the LAN connects 45 (IBM-compatible) PCs, several heterogeneous mainframes (IBM, DEC and Siemens) and provides access to the public X.25 network and to wide-area networks for research (EARN, BITNET). The network supports application software that is frequently needed in medical research (word processing, statistics, graphics, literature databases and services, etc.). Compliance with existing “official” (e.g., IEEE 802.3) and “de facto” standards (e.g., PostScript) was considered to be extremely important for the selection of both hardware and software. Customized programs were developed to improve access control, user interface and on-line help. Wide acceptance of the LAN was achieved through extensive education and maintenance facilities, e.g., teaching courses, customized manuals and a hotline service. Since requirements of clinical routine differ substantially from medical research needs, two separate networks (with a gateway in between) are proposed as a solution to optimally satisfy the users’ demands.


Author(s):  
V. Jagan Naveen ◽  
K. Krishna Kishore ◽  
P. Rajesh Kumar

In the modern world, human recognition systems play an important role to   improve security by reducing chances of evasion. Human ear is used for person identification .In the Empirical study on research on human ear, 10000 images are taken to find the uniqueness of the ear. Ear based system is one of the few biometric systems which can provides stable characteristics over the age. In this paper, ear images are taken from mathematical analysis of images (AMI) ear data base and the analysis is done on ear pattern recognition based on the Expectation maximization algorithm and k means algorithm.  Pattern of ears affected with different types of noises are recognized based on Principle component analysis (PCA) algorithm.


2021 ◽  
pp. 1-9
Author(s):  
Bandana Sen ◽  
Aloke Kar

The present study provides a snapshot of the level of degradation of economic and living conditions of middle-class households of Kolkata and its neighbourhood during ‘lockdown’. It is based on an on-line survey of households of students of five purposively-selected colleges carried out during the second half of May 2020. The survey reveals that inflow of regular normal income had ceased altogether for over 40% of the sample households. About 15% of the households suffered from outright job loss or complete denial or withholding of wages and salaries payments of their members in paid employment and another about 27% reported complete closure of small businesses run by them. The normal-times income had altogether ceased for over a half of the households of the lowest income group. Predictably, the worst hit group was the wage labourers. Over four-fifths households with their prime earning member in wage employment reported job and earnings related problems, with over a fourth reporting job losses. Households with self-employed prime earners too were severely affected, with about three-fourths of them reporting such problems. Even the households with regular-salaried prime earners were badly hit. About a half of them reported job and earnings related problems. The results suggest that food grains distribution through the Public Distribution System (PDS) played a decisive role in averting an imminent famine-like situation. About 60% of the sample households were found to have procured food stuff from the PDS. Among the wage-labourers’ households, well over 80% reported dependence on the PDS, with ostensibly a large proportion of them receiving food altogether free. Despite free food grains distribution, about 5% of the sample households could not arrange three meals a day for all its members.


Sign in / Sign up

Export Citation Format

Share Document