Browse > Article
http://dx.doi.org/10.6109/jkiice.2017.21.12.2298

Online Signature Verification Method using General Handwriting Data  

Heo, Gyeongyong (School of Electrical, Electronic & Communication Eng., Dong-Eui University)
Kim, Seong-Hoon (Department of Software, Kyungpook National University)
Woo, Young Woon (School of Creative Software Eng., Dong-Eui University)
Abstract
Online signature verification is one of the simple and efficient method of identity verification and has less resistance than other biometric technologies. In training to build a verification model, negative samples are required to build the model, but in most practical applications it is not easy to get negative samples - forgery signatures. In this paper, proposed is a method using someone else's signatures as negative samples. In verification, shape-based features extracted from the time-sequenced signature data are extracted and a support vector machine is used to verify. SVM tries to map a feature vector to a high dimensional space and to draw a linear boundary in the high dimensional space. SVM is one of the best classifiers and has been applied to various applications. Using general handwriting data, i.e., someone else's signatures which have little in common with positive samples improved the verification rate experimentally, which means that signature verification without negative samples is possible.
Keywords
Online Signature Verification; Forgery; Support Vector Machine; General Handwriting;
Citations & Related Records
Times Cited By KSCI : 4  (Citation Analysis)
연도 인용수 순위
1 L. M. Mayron, "Biometric Authentication on Mobile Devices," IEEE Security & Privacy, vol. 13, no. 3, pp. 70-73, June 2015.   DOI
2 S. H. Kim, Y. Fan, and G. Heo, "An Automatic Signature Verification Algorithm for Smart Devices," Journal of The Korea Society of Computer and Information, vol. 20, no. 10, pp. 15-21, Oct. 2015.   DOI
3 S. B. Napa and Nasir M., "Online Signature Verification on Mobile Devices," IEEE Transactions on Information Forensics and Security, vol. 9, no. 6, pp. 933-947, Apr. 2014.   DOI
4 Z. Zhang, K. Wang, and Y. Wang, "A Survey of On-line Signature Verification," Lecture Notes in Computer Science, vol. 7098, pp. 141-149, Dec. 2011.
5 L. S. Lee and S. H. Kim, "A Technique for Fixing Size of Reference Signature Data in Structural Signature Verification," Journal of the Korea Institute of Information and Communication Engineering, vol.14, no.6, pp. 1345-1352, June 2010.   DOI
6 V. Gomez-Verdejo, J. Arenas-Garcia, M. Lazaro-Gredilla, and A. Navia-Vazquez, "Adaptive One-Class Support Vector Machine," IEEE Transactions on Signal Processing, vol. 58, no. 6, June 2011.
7 V. Vapnik, Statistical Learning Theory, John Wiley & Sons, New York, 1998.
8 S. Y. Choi and H. C. Ahn, "Optimized Bankruptcy Prediction through Combing SVM with Fuzzy Theory," Journal of Digital Convergence, vol. 13, no. 3, pp. 155-165, Mar. 2015.   DOI
9 Z. G. Yan, Y. X. Yang and Y. J. Ding, "An Experimental Study of the Hyper-parameters Distribution Region and Its Optimization Method for Support Vector Machine with Gaussian Kernel," International Journal of Signal Processing, Image Processing and Pattern Recognition, vol. 6, no. 5, pp.437-446, May 2013.   DOI
10 J. W. Lee D. H. Lee and I. S. Kim, "Method of Detecting Smishing using SVM," Journal of Security Engineering, vol. 10, no. 6, pp. 655-668, Dec. 2013.   DOI
11 G. Heo and S. H. Kim, "Context-aware Fustion with Support Vector Machine," Journal of The Korea Society of Computer and Information, vol.19, no. 6, pp. 19-26, Jun. 2014.   DOI