Implementation and analysis of a handwritten signature verification technique

Loading...
Thumbnail Image
File version

Version of Record (VoR)

Author(s)
McCabe, Alan
Trevathan, Jarrod
Griffith University Author(s)
Primary Supervisor
Other Supervisors
Editor(s)

Hernando, J

FernandezMedina, E

Malek, M

Date
2007
Size
File type(s)
Location

Barcelona, Spain

Abstract

There is considerable interest in authentication based on handwritten signature verification because it is superior to many other biometric authentication techniques such as finger prints or retinal patterns, which are reliable but much more intrusive. The paper details a number of experiments using a signature verfication technique which is unlike any other reported in literature. Specifically, characters are used to represent various features of a signature image allowing the use of existing and proven string distance metrics to determine distances between signatures. Extensive testing shows that our proposed system is comparable with, and in many aspects better than the highest quality signature verfication techniques presented in literature.

Journal Title
Conference Title

Proceedings of the Second International Conference on Security and Cryptography - SECRYPT

Book Title
Edition
Volume
Issue
Thesis Type
Degree Program
School
Publisher link
Patent number
Funder(s)
Grant identifier(s)
Rights Statement
Rights Statement

© SciTePress 2007. This is an Open Access article distributed under the terms of the Creative Commons Attribution-NonCommercial-NoDerivs 4.0 International (CC BY-NC-ND 4.0) License, which permits unrestricted, non-commercial use, distribution and reproduction in any medium, providing that the work is properly cited.

Item Access Status
Note
Access the data
Related item(s)
Subject

Science & Technology

Computer Science, Artificial Intelligence

Computer Science, Information Systems

Engineering, Electrical & Electronic

Persistent link to this record
Citation

McCabe, A; Trevathan, J, Implementation and analysis of a handwritten signature verification technique, Proceedings of the Second International Conference on Security and Cryptography - SECRYPT, 2007, pp. 48-58