A Review of Biometric Template Protection Techniques for Online Handwritten Signature Application
(*) Corresponding author
the author of the article can submit here a request for assignment of a DOI number to this resource!
Cost of the service: euros 10,00 (for a DOI)
Handwritten signature biometric is considered as a noninvasive and nonintrusive process by the majority of the users. Furthermore, it has a high legal value for document authentication, as well as being dependent on by both commercial transactions and governmental institutions. Signature verification requires storing templates in the database, which threatens the security of the system from being stolen, to being vulnerable to the template playback attack that may give an attacker an invalid access to the system. Moreover, an individual cannot use his / her signature with two applications or more, otherwise, a cross matching problem will occur. The aforementioned problems can be avoided by using biometric template protection techniques for the online signature, which have been reviewed and discussed in this paper considering both protections and verification. Furthermore, the verification elaboration comprises of capture devices, pre-processing, feature extraction and classification methods.
Copyright © 2013 Praise Worthy Prize - All rights reserved.
L. O’Gorman, Comparing Passwords, Tokens, and Biometrics for User Authentication, in Proc,IEEE, Vol.91, n.12, , pp. 2021–2040. Dec 2003
N. K. Ratha, J. H. Connell, and R. M. Bolle, Enhancing Security and Privacy in Biometrics Based Authentication Systems, IBM Systems Journal, vol. 40, n. 3, pp. 614–634, 2001.
S.M.S. Ahmad, B. M. Ali and W.A.W. Adnan ,Technical Issues and Challenges of Biometric Applications as Access Control Tools of Information Security,” international journal of innovative computing, information and control, vol. 8, n. 11, pp.7983-7999 Nov. 2012.
E. Maiorana, Biometric Template Protection for Signature Based Authentication Systems, PhD dissertation, applied electronic, University Roma Tre, Rome, Italy, 2009.
A. K. Jain and A. Kumar, Biometrics of Next Generation: an overview, to Appear in Second Generation Biometrics Springer, 2010.
E. Maiorana, P. Campisi, J. Fierrez, J. Ortega-Garcia and A.Neri, Cancelable Templates for Sequence-based Biometrics with Application to On-line Signature Recognition, IEEE Transaction on system, man and cybernetics-part A: system and human, vol. 40, n.3, pp. 525–538, May. 2010.
M. Tanaka and A. Bargiela, Deriving a Subspace Model for Personal Authentication in Biometrics –Dynamic Signature Case–, in Proc. CIMCA-IAWTIC'06 – Vo.1, Washington, DC, USA.pp.239-245, 2005.
M.C. Fairhurst and E. Kaplani , Biometric on the Internet and Perceptual Analysis of Handwritten Signature for Biometric Authentication , in IEE Proc.-Vis. Image Signal Process., Vol.150, n.6, pp.389-394. Dec.2003.
S. Pal, S. Chanda, U. Pal, K. Franke and M. Blumenstein, Off-line Signature Verification Using G-SURF, in Proc. ISDA 27-29, Kochi, India pp.586-591, 2012.
F. A. Fernandez, J. F. Aguilar, F. d. Valle, J. O. Garcia, “On-line Signature Verification using Tablet PC,” in Proc. ISPA 15-17, Zagreb, Croatia, pp. 245-250, Sept. 2005.
J. R. Kwapisz, G. M. Weiss and S. A. Moore, Cell Phone-Based Biometric Identification, IEEE, 978-1-4244-7580-3/10/$26.00, 2010.
S. Elliott, A. Hunt, Dynamic Signature Forgery and Signature Strength Perception Assessment, IEEE Aerospace and Electronic Systems Magazine, Vol. 23, n.6, 2008.
A. K. Jain, K. Nandakumaand A. Nagar, Biometric Template Security, EURASIP Journal on Advances Signal Processing, Vol. 2008, Article ID 579416, pp. 1-17, 2008.
A. B. J. Teoh, A. Goh, and D. C. L. Ngo, Random Multispace Quantization as an Analytic Mechanism for Biohashing of Biometric and Random Identity Inputs, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 28, n. 12, pp. 1892–1901, Dec. 2006.
F. Farooq, R. M. Bolle, J. Tsai-Yang, and N. K. Ratha, Anonymous and Revocable Fingerprint Recognition, in Proc. CVPR ’07, pp.1–7, 2007.
C. Lee and J. Kim, Cancelable Fingerprint Templates using Minutiae-based Bit-strings , Journal of Network and Computer Applications,Vol.33,n.3,pp.236-246, May, 2010.
E. J. C. Kelkboom, On the Performance of Helper Data Template Protection Schemes, Ph.D. dissertation, University of Twente, Netherlands, 2010.
N. K. Ratha, S. Chikkerur, J. H. Connell, and R. M. Bolle, Generating Cancelable Fingerprint Templates, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol.29, n.4,pp.561–572, April 2007.
A. Cavoukian and A. Stoianov, Biometric Encryption: a Positive-sum Technology that Achieves Strong Authentication, Security and Privacy, Tech. Rep., Office of the Information and Privacy Commissioner of Ontario, Toronto, Ontario, Canada, March 2007.
A. Vetro and N. Memon, Biometric System Security, in Proc. of the 2nd International. Conference on Biometrics, Seoul, South Korea, August 2007.
L. H.wei, W. Yao, “A New Fuzzy Fingerprint Vault Using Multivariable Linear Function based on Lorenz Chaotic System, in Proc. CSAE, Vol.1, Zhangjiajie, pp. 531-534, May 2012.
H. Al-Assam and S. Jassim, Robust Biometric Based Key Agreement and Remote Mutual Authentication, in Proc. of 11th international conference on trust, security and privacy in computing and communications, Liverpool, United Kingdom, pp.59-65, 2012.
K. Nandakumar, A. K. Jain and S. Pankanti , Fingerprint-based Fuzzy Vault: Implementation and Performance, IEEE Transaction on information forensics security, vol. 2, n. 4,pp.744-757, Dec, 2007.
M. Lafkih, M. Mikram, S. Ghouzali and M. El Haziti , Security Analysis of Key Binding Biometric Cryptosystems, in Proc. ICISP, LNCS, Vol. 7340, © Springer-Verlag Berlin Heidelberg, pp. 269–281, 2012.
A. Juels and M. Wattenberg, A Fuzzy Commitment Scheme, in Proc. of 6th ACM conference on computer and communications security (ACM CCS ’99), Singapore. pp. 28–36, Nov. 1999.
X. Boyen, Reusable Cryptographic Fuzzy Extractors, in Proc. CCS '04 Proceedings of the 11th ACM conference on Computer and communications security, New York, NY, USA, pp.82-91, 2004.
J. Bringer H. Chabannea and B. Kindarjia, The Best of Both Worlds: Applying Secure Sketches to Cancelable Biometrics, Science of computer programming, Vol. 74, pp.43-51, Oct.2008.
I. Buhan, J. Doumen, P. Hartel, and R. Veldhuis, Fuzzy Extractors for Continuous Distributions, in Proc.of the 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS ’07), Singapore,pp. 353–355, March 2007.
Q. Li and E.-C. Chang, Robust, Short and Sensitive Authentication Tags using Secure Sketch, in Proc. of the 8th Multimedia and Security Workshop (MM and Sec ’06), Geneva, Switzerland, pp.56–61, 2006.
C. Vielhauer, R. Steinmetza and A. Mayerhofer, Biometric Hash Based on Statistical Features of Online Signatures, in Proc. International conference on pattern recognition (ICPR), Vol. 1, pp.123–126, 2002.
H. Feng, C.W. Chan, Private Key Generation from On-line Handwritten Signatures, Information Management and Computer Security, pp: 159–164, 2002.
M. Freire-Santos, J. Fierrez-Aguilara and J. Ortega-Garcia, Cryptographic Key Generation Using Handwritten Signature, SPIE Defense and Security Symposium, Biometric Technologies for Human Identification, Vol. 6202, pp. 225–231, 2006.
W. J. Scheirer and T. E. Boult, Cracking Fuzzy Vault and Biometric Encryption, in Proc. IEEE Biometric Symp, pp. 1–6, 2007.
W.K. Yip, A. Goh, D.C.L. Ngo, and A.B.J. Teoh, Generation of Replaceable Cryptographic Keys from Dynamic Handwritten Signatures, in Proc ICB06, pp. 509–515, 2006.
A. Goh, and D.C.L. Ngo, Computation of Cryptographic Keys from Face Biometrics, in Proc. 7th IFIP-TC6 TC11 International Conference, CMS , Torino, Italy, pp. 1-13, Oct. 2003.
Y.C. Chang, W. Zhang and T. Chen, Biometric-based Cryptographic Key Generation, in Proc. IEEE, ICME '04, Vol.3, Taiwan,pp. 2203– 2206, 2004.
M. R. Freire, J. Fierrez and J. Ortega-Garcia, Dynamic Signature Verification Template Protection using Helper Data,” in Proc. IEEE, ICASSP, pp.1713-1716, 2008.
Shu Lin and Daniel J. Costello, Error Control Coding, Prentice-Hall, Inc., second edition, Upper Saddle River, NJ, USA, 2004.
E. Maiorana and P. Campisi, Fuzzy Commitment for Function based Signature Template Protection, IEEE Signal Process. Lett., Vol. 17, n. 3, pp. 249–252, Mar. 2010.
A. Juels and M. Wattenberg, A Fuzzy Commitment Scheme, in Proc. 6th ACM conference on computer and communications security (CCS '99), Singapore, pp.28 – 36, 1999.
E. Maiorana, M. Martinez-Diaz, P. Campisi, J. Ortega-Garcia and A. Neri, Template Protection for HMM-based On-line Signature Authentication, in Proc. IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Anchorage, USA, June 2008.
Y. He, K. H. Yap, L. Chen, and L. P. Chau, A Novel Hybrid Model Framework to Blind Color Image Deconvolution, IEEE Trans. Syst., Man, Cybern. A, Syst., Humans, Vol. 38, n. 4, pp. 867–880, Jul. 2008.
E. A. Rúa, E. Maiorana, J. L. A. Castro and P. Campisi, Biometric Template Protection using Universal Background Mode: an Application to Online Signature,” IEEE transaction on information forensics and security, Vol. 7, n. 1, pp. 269- 282, Feb, 2012.
M. Martinez-Diaz, J. Fierrez, J. Ortega-Garcia ,Universal Background Models for Dynamic Signature Verification, in Proc. IEEE, BTA, Crystal City, USA, pp.1 – 6, Sept.2007.
E. Maiorana, D. Blasi, P. Campisi, Biometric Template Protection using Turbo Codes and Modulation Constellations, in Proc. Information Forensics and Security (WIFS), Tenerife, Spain, pp. 25-30, Dec. 2012.
Y. Cui X. Zhang and J. Ma, Simulation Analysis of Turbo Code using SCILAB,” in Proc. IEEE, OSSC , Beijing, pp.32-36, Oct. 2011.
D. Impedovo and G. Pirlo, Automatic Signature Verification: The State of the Art, IEEE transactions on systems, man , and cybernetics-part c: application and reviews, Vol.38, n.5, pp.609-635, Sept.2008.
D.Y. Yeung, H. Chang, Y. Xiong, S. George, R. Kashi, T. Matsumoto, and G. Rigoll , SVC2004: First International Signature Verification Competition, in Proc. of the international conference on biometric authentication (ICBA), Hong Kong, pp. 15-17, July 2004.
X.-H. Xiao and G. Leedham, Signature Verification using a Modiﬁed Bayesian Network, Pattern Recognit. ,Vol. 35, n. 5, pp. 983–995, May 2002.
Z. Dan and C. Xu , The Recognition of Handwritten Digits based on BP Neural Network and the Implementation on Android, in Proc. IEEE, ISDEA, Hong Kong, pp.1498-1501, Jan.2013.
C. M. Bishop, Pattern Recognition and Machine Learning, in Information Science and Statistics, Springer, ISBN-10: 0-387-31073-8, pp.225-233, 2006.
J. Ortega-Garcia, J. Fierrez-Aguilar, D. Simon, J. Gonzalez, M. Faundez-Zanuy, V. Espinosa, A. Satue, I. Hernaez, J.-J. Igarza, C. Vivaracho, D. Escudero, and Q.-I. Moro, MCYT Baseline Corpus: A Biomodal Biometric Database,” in Proc. IEEE, vision, image and signal processing, Vol.150, n.6, pp. 395–401, 2003.
Aravinth, J., Valarmathy, S., Score-level fusion technique for multi-modal biometric recognition using ABC-based neural network, (2013) International Review on Computers and Software (IRECOS), 8 (8), pp. 1889-1900.
Tahmasebi, A., Pourghassem, H., A novel decision level fusion algorithm for dynamic signature identification system, (2012) International Review on Computers and Software (IRECOS), 7 (1), pp. 143-148.
Alsous, E., Nezam, F., Monadjemi, S.A., Neamatbakhsh, N., A novel GA based approach to Farsi and Arabic signature verification, (2010) International Review on Computers and Software (IRECOS), 5 (1), pp. 44-51.
T. Ahmad, J. Hu and S Wang, String-based Cancelable Fingerprint Templates, in Proc. of the 6th IEEE Conference on Industrial Electronics and Applications (ICIEA), pp. 1028-1033, 2011.
C. Lee, J. Kim, Cancelable Fingerprint Templates using Minutiae-based Bit-strings, Journal of Network and Computer Applications,Vol.33,n.3,pp.236-246,2010.
W. Yang, J. Hu and S. Wang, A Finger-Vein Based Cancellable Biocryptosystem, Network and System Security, Lecture Notes in Computer Science, Vol. 7873, pp. 784-790, 2013.
C. Lee, J.-Y. Choi, K.-A. Toh, S. Lee, Alignment-free cancelable fingerprint templates based on local minutiae information, IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics, vol. 37, n.4, pp. 980-992, 2007.
- There are currently no refbacks.
Please send any question about this web site to email@example.com
Copyright © 2005-2023 Praise Worthy Prize