Implementation and analysis of a handwritten signature verification technique
File version
Version of Record (VoR)
Author(s)
Trevathan, Jarrod
Griffith University Author(s)
Primary Supervisor
Other Supervisors
Editor(s)
Hernando, J
FernandezMedina, E
Malek, M
Date
Size
File type(s)
Location
Barcelona, Spain
Abstract
There is considerable interest in authentication based on handwritten signature verification because it is superior to many other biometric authentication techniques such as finger prints or retinal patterns, which are reliable but much more intrusive. The paper details a number of experiments using a signature verfication technique which is unlike any other reported in literature. Specifically, characters are used to represent various features of a signature image allowing the use of existing and proven string distance metrics to determine distances between signatures. Extensive testing shows that our proposed system is comparable with, and in many aspects better than the highest quality signature verfication techniques presented in literature.
Journal Title
Conference Title
Proceedings of the Second International Conference on Security and Cryptography - SECRYPT
Book Title
Edition
Volume
Issue
Thesis Type
Degree Program
School
Publisher link
Patent number
Funder(s)
Grant identifier(s)
Rights Statement
Rights Statement
© SciTePress 2007. This is an Open Access article distributed under the terms of the Creative Commons Attribution-NonCommercial-NoDerivs 4.0 International (CC BY-NC-ND 4.0) License, which permits unrestricted, non-commercial use, distribution and reproduction in any medium, providing that the work is properly cited.
Item Access Status
Note
Access the data
Related item(s)
Subject
Science & Technology
Computer Science, Artificial Intelligence
Computer Science, Information Systems
Engineering, Electrical & Electronic
Persistent link to this record
Citation
McCabe, A; Trevathan, J, Implementation and analysis of a handwritten signature verification technique, Proceedings of the Second International Conference on Security and Cryptography - SECRYPT, 2007, pp. 48-58