SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
253 978-1-4577-0903-6/11/$26.00 ©
2011 IEEE
Abstract – This paper examines the application of the HBSI model
to a range of dynamic signature veriïŹcation capture digitizers.
Behavioral biometrics (which considers the process by which a
human performs a function) are inherently more complicated to
analyze as they may contain a temporal modiïŹcation as part of a valid
capture interaction. In this study, a framework for the development
of an HBSI model is outlined, based on two different signature
digitizers. Both devices enabled the capture of both temporal data
(dynamic) as well as an image of the completed (static) signature.
Using this data, we propose a signature modality revision to the
HBSI model with interaction errors classiïŹed into ïŹve categories.
This study deals solely with genuine users, examining both correct
and incorrect signature presentations.
Keywords: biometrics, dynamic signature veriïŹcation,
electronic signatures, HBSI
I. INTRODUCTION
Biometrics is the measurement and analysis of unique
physical and/or behavioral characteristics commonly used as a
means of verifying personal identity [1]. A physiological trait is
a more stable physical characteristic, such as ïŹngerprint, hand
geometry, or face. A behavioral characteristic is a reïŹ‚ection of
an individual’s psychology [2]. The Human-Biometric Sensor In-
teraction (HBSI) model is used to categorize all possible errors
that may occur during user interaction with biometric systems
into six basic categories. The initial validation and subsequent
testing of the model has been on physiological biometrics such
as ïŹngerprint (swipe and slap capture methods), iris and hand
geometry. These physiological modalities tend to be more restric-
tive in their interaction possibilities. One drawback of the HBSI
model was that it had not been validated against a behavioral bio-
metric. This category of biometrics adds a particular challenge
to the model – that is how to deal with that the interaction of
the human and the sensor with a behavioral as well as a physi-
ological component. This paper examines the development and
adaptation of the Human-Biometric Sensor Interaction model for
behavioral biometrics, using Dynamic Signature VeriïŹcation as
a case study. This adapted model will aid future (behavior mo-
dality-focused) projects, as well as further research into dynamic
signature veriïŹcation. Figure 1 shows the latest version of the
Human-Biometric Sensor Interaction model prior to this paper. It
is possible that in one transaction more than one error can occur,
however our method concentrates on the overall outcome of the
signature process.
Figure 1: Current HBSI model
There are several inherent challenges with behavioral bio-
metrics vis-Ă -vis physiological biometrics when examining the
human interaction component. The ïŹrst is that interaction be-
tween the human and the biometric sensor for a behavioral sys-
tem will be more complex. Signing, speaking and typing are daily
occurrences in a person’s life. It is intrinsic that when presented
with a pen and asked for a signature, a user will produce a good
representation of their signature, because they know how to sign
and they know what their completed signature is meant to look
like. The same goes for voice recognition, and to some extent
typing ability. Therefore, when something goes wrong with the
presentation or utterance, the user can self-correct – for exam-
ple they may stop signing because the pen doesn’t work, or they
will restart the utterance because of a problem with the telephone
line. These self-determined corrections may be rarer when a user
interacts with a physiological based sensor, such as a for hand
Dynamic Signature VeriïŹcation and the Human
Biometric Sensor Interaction Model
Michael Brockly
Biometric Standards, Performance and
Assurance Laboratory
Purdue University, Department of
Technology, Leadership and Innovation
West Lafayette, IN
James Scott
School of Engineering and Digital Arts,
University of Kent,
Canterbury, CT2 7NT, UK
Richard Guest, Ph.D.
School of Engineering and Digital Arts,
University of Kent,
Canterbury, CT2 7NT, UK
Stephen Elliott, Ph.D.
Biometric Standards, Performance and
Assurance Laboratory
Purdue University, Department of
Technology, Leadership and Innovation
West Lafayette, IN
45th
annual IEEE International Carnahan Conference on Security Technology
254
geometry machine. These behavioral components could cause an
increase in the variability in the video interaction coding, which
can make the HBSI analysis more complex and potentially un-
reliable.
Dynamic Signature VeriïŹcation (DSV) is widely used as a
means of biometric authentication and authorization [3]. Signa-
ture capture systems collect a variety of metrics such as mini-
mum, maximum and average velocity in both the x and y dimen-
sions, total time of pen up, pen down and direction, size, total
pen distance, and others. These features are captured in real time
as the user is writing to provide time stamped points of x/y coor-
dinates along with pen pressure values in the z-direction. When
deciding how to code the various Dynamic Signature VeriïŹcation
interactions, it is important to note how each potential interac-
tion takes place. Each interaction encompasses the entire process
from when the user ïŹrst picks up the pen/stylus until the time that
all writing is complete and the user has submitted their signature.
To properly present a correct signature, users must be able to in-
teract with any system or sensor they encounter. The ïŹrst chal-
lenge is with the variety of different sensors that are available in
the marketplace. The size and shape of the sensors are different,
as are the pens. An individual may be familiar with signing on
one type of digitizer, but will pause when a second type of digi-
tizer does not provide the same type of feedback – for example,
ink versus inkless. Furthermore, this sensor variability may com-
pound the inherent variability within the signature itself. Even if
you keep the sensor type constant, the writing of a signature can
exhibit changes from one interaction to the next and can depend
on a number of factors all related to the user. For example, the
signature may vary based on the ceremony of the occasion. A
person will possibly sign completely different if they are pur-
chasing goods at a grocery store in comparison to when they sign
for a home mortgage. The signature itself may also be different.
Even if the ceremony is explained in order to remain constant, the
user may still choose to abbreviate their name or not sign to the
best of their ability. Although in a testing environment this user
behavior is, to some extent, controlled, this variability needs to be
acknowledged in the development of the model.
II. DEVELOPMENT OF THE HUMAN BIOMETRIC SENSOR
INTERACTION MODEL FOR DSV
Taking into account the sensor and user variability, two dif-
ferent interaction ïŹ‚ow charts are illustrated (Figures 2 and 3).
The ïŹrst signature capture sensor chosen was a back projected
virtual ink device. Here the virtual ink (from the attached stylus)
is displayed on a screen behind the writing surface. The majority
of users are likely to be well acclimated with this device due to its
common occurrence at point of sale areas. This type of digitizer
can prompt user interaction errors; for example, latency. This is a
measure of time delay that a system experiences, and could cause
a negative reaction from the user. When latency is present, users
may think that the sensor has stopped capturing their signature,
thus prompting a resign. The second sensor chosen for the model
development was a paper and ink device where the signer writes
with a pen onto a paper surface with the pen leaving behind an
ink trace as well as interacting with the sensor below the paper.
A barrel-pen was used to write on the sheet of paper to give the
writer feedback on what their signature looks like. Although this
removes the issue of latency from the user, new errors can oc-
cur such as faulty ink ïŹ‚ow or the accidental push of the barrel
button during the signing process. Based on these assumptions,
two interaction ïŹ‚owcharts outlining possible decisions and out-
comes are shown in Figures 2 and 3. These charts contain a series
of location identiïŹers (labeled Px and Vx respectively, where x
is a unique numeric identiïŹer) Where possible, examples in this
section will relate back to the speciïŹc decision points in these
ïŹgures.
There are ïŹve major interaction metrics or errors addressed
in the new HBSI model. These errors stem from either a good
presentation or a bad presentation and are defective interaction
(DI), concealed interaction (CI), false interaction (FI), failure to
process (FTP), and failure to detect (FTD). If none of these in-
teraction errors occur with a correct presentation, the biometric
sample is labeled as a successfully processed sample (SPS).
III. INCORRECT PRESENTATIONS
With reference to Figure 1, the types of HBSI errors within
signatures deemed to be an incorrect presentation by the signer
can lead to the following categories:
A. Defective Interactions
Defective interactions occur when the signature is deemed
incorrect and no signature channel data is collected. In a paper
and ink system, an incorrect signature is caused when the pen
pressure is too light at all the sample points across the digitiz-
er surface (below the pen-down threshold). No channel data is
therefore collected, even though a partial ink trace may or may
not be deposited on the paper. Within a virtual ink system no
virtual ink is presented as a feedback to the signer. Another case
is when an incorrect signature is donated and latency or other
temporal errors in the attached hardware/software result in no
samples being recorded. This error can apply to both paper and
ink and virtual ink systems. The above scenarios are sensor-based
issues, whereas the following cases relate to the user interaction.
Illnesses such as Parkinson’s or carpal tunnel may mean a sample
cannot be given correctly – this will result in a DI. A DI can also
occur if the user abandons the signature without any channel data
being collected. With respect to interaction ïŹ‚ow charts (Figures 2
and 3), all errors relate to when a signer halts the production of a
signature (or is unable to start) and no data is collected. A “yes”
from events V8 and P9 will lead to a DI if this scenario occurs.
B. Concealed Interactions
An error is classiïŹed as a concealed interaction when the
signer donates an incorrect signature that is not detected by the
system. A number of events can lead to a concealed interaction.
Firstly P5/V5 or “User satisïŹed with signature production” in
both signature systems will cause a concealed interaction if the
signer is not satisïŹed with the signature being produced but does
not abandon signature production (P8/V7=“no”). “Hardware la-
tency problems,” (V2) “signature within signing bounds” (V3)
and “pen pressure registered/ink dispersed correctly” (V4) will
cause concealed interaction errors in a virtual ink digitizer if the
18th
-21st
October, 2011 — Mataró, Barcelona, Spain
255
signer does not abandon the capture process even though visible
system and signer out-of-bounds errors cause an erroneous sig-
nature to be displayed on the virtual screen. Also, in the case of a
virtual ink digitizer, “hardware latency problems” and “signature
within signing bounds” can lead to concealed interaction errors
if the virtual ink feedback mirrors the latency and out-of-bounds
recording error (i.e. delayed feedback and no display of out-of-
bounds ink). “Ink dispersed correctly on paper” (P6) causes a
concealed interaction if the signer does not abandon the capture
process even though there are visible ink dispersal issues noted
by the signer. “User abandoning donation” in P10 or V9 lead to
concealed interactions if the signer abandons the capture process
even though the signature is not complete.
C. False Interactions
False interactions occur when a signature, deemed incorrect
or unrepresentative by the signer, has been donated with sample
points being recorded. This incorrect nature of the presentation
is detected by the system. There are several causes of false inter-
actions, the ïŹrst occurs when a signer uses a repetitive motion
(repeating segments of signature) within a signing process caused
by faulty ink-ïŹ‚ow issues (paper and ink system) or insufïŹcient
pressure levels applied (virtual ink). The second cause of a false
interaction is when a signer using a repetitive motion (repeating
segments of signature) caused by a writing error introduced by
the signer. Signers will also cause a false interaction by donating
an unrepresentative/incomplete signature possibly due to bodily
functions and reïŹ‚exes such as sneezing, jolts, and twitches. False
interactions can also be system speciïŹc, for example within a vir-
tual ink system, a pen interface issue can occur (e.g. barrel button
pressed during donation) causing channel data disruption which
may cause a misrepresentation of a correct signature. This causes
virtual ink feedback disruption. In both systems, at P5/V5, “User
satisïŹed with signature production” will cause a false interaction
if the signer is not satisïŹed with the signature being produced
and abandons the signature production (P8/V7=”yes”). A false
interaction will occur on both systems if the signer (or system)
cancels the capture process following a signer modiïŹcation of
their standard signature with data having been collected (i.e. part
of the signature has been signed), shown at P9 and V8. “Hard-
ware latency problems,” (V2) “signature within signing bounds”
(V3) and “pen pressure registered/ink dispersed correctly” (V4)
will cause false interactions in a virtual ink digitizer if the signer
abandons the capture process due to both system and signer out-
of-bounds errors causing an erroneous signature to be displayed
on the virtual screen. Also in a virtual ink digitizer, “hardware
latency problems” (V2) and “signature within signing bounds”
(V3) can lead to false interactions if the virtual ink feedback mir-
rors the latency and out-of-bounds recording error (i.e. delayed
feedback and no display of out-of-bounds ink). In a paper and
ink system, if the signer abandons the capture process due to ink
dispersal issues it will also cause a false interaction. The majority
of false interaction errors are created due to the decisions or judg-
ments made by the signer at the time of donation.
IV. CORRECT PRESENTATIONS
Failure to detect (FTD), failure to process (FTP), and suc-
cessfully processed samples (SPS) all constitute correct presenta-
tions.
A. Failure to Detect
Failure to detect errors occur when the signer has donated a
signature that they have deemed acceptable, but the signature is
not detected by the biometric system. Within a physical ink sys-
tem, such an error will happen if a correct signature is donated,
but the pen pressure used is too light at all sample points across
the donated signature on the digitizer surface (below a pen-down
threshold) but ink trace is left on the paper. A similar effect could
be observed if the overlaid paper thickness caused insufïŹcient
downward pressure to be exerted on the digitizer surface. A fail-
ure to detect will also occur if a correct signature is donated, how-
ever latency (or other temporal recording errors) in the attached
hardware/software results in no samples being recorded. This
scenario applies to both virtual and real inking systems. A failure
to detect will be achieved in the ïŹrst decision of both ïŹ‚owcharts
if data packets are not being recorded by the system.
B. Failure to Process
Failure to process errors arise when the signer has donated
a signature that they have deemed acceptable. The signature has
been detected by the biometric system but system errors cause
the signature not to be an accurate representation of the donated
signature. If a correct signature is donated but latency (or other
temporal) errors in hardware/software result in partial or tempo-
rally distorted channel data being recorded it will be classiïŹed as
a failure to process. An alternative case is where a correct signa-
ture is donated, but the start and/or end segments are missing in
the recording process. This scenario can apply to both inking and
virtual ink systems. In another case, a correct signature can be
donated, however part of the signature has been signed outside
the designated capture area. In the paper and ink system, this may
occur if the boundary has not been clearly deïŹned. In the virtual
ink system, if ink is still displayed outside of a capture boundary
then the failure to process will occur. Most likely, the ink will
not be displayed outside of bounds so an incorrect presentation
would occur. In either case, capture points will not be stored for
out of bounds signature sample points.
Within a paper and ink system, a correct signature can be
donated, however due to pressure variability within the signer’s
action, it results in ink being deposited on the paper but in some
areas the applied pressure was too low to register resulting in a
partial capture of the signature deeming it a failure to process.
Again, in a paper and ink system, a pen interface issue can occur
(e.g. barrel button pressed during donation) causing channel data
disruption which may cause a misrepresentation of a correct sig-
nature. Ink dispersal is not disrupted but it will still be classiïŹed
as a failure to process. Both digitizer systems may be hindered by
system performance and cause the system to miss certain parts of
the signature input resulting in a failure to process error. This may
be caused by the utilization of a machine with too low of a capa-
bility to record capture which would cause lag in processes and
45th
annual IEEE International Carnahan Conference on Security Technology
256
therefore miss some of the input recorded during capture. In both
digitizer systems, a failure to process will occur if the signature
is signed out of bounds but the signer’s inking feedback indicates
a correct presentation. In a paper and ink digitizer system, “pen
pressure registered with system” (P4) relates to these issues. If
the pressure is too low on a virtual ink system, the digitizer would
not provide feedback from the virtual ink (hence it would be an
incorrect presentation instead). In the case of paper and ink sig-
nature capture, if the outcome of “pen pressure registered with
system” (P4) is “yes,” then it is assumed that correct pressure
was recorded throughout the sample. If the outcome at P4 is “no,”
then it will result in a failure to process if the drawn signature is
acceptable to the signer. A failure to process may also occur at
this decision due to a human interaction error such as touching
the pen barrel button by accident which may cause the pressure
channel capture state to not register during later processing.
18th
-21st
October, 2011 — Mataró, Barcelona, Spain
257
V. CONCLUSIONS
The development of the HBSI model for dynamic signature
veriïŹcation reveals the complexity of the potential interactions
and the changes of those interactions when digitizers change, as
well as when the ceremony changes. The ïŹndings in this paper
are based strictly on the actions of genuine signers. Forgery poses
an entirely different research topic that has been tested in a va-
riety of different experiments so it has not been included in this
study. Furthermore, Figures 2 and 3 have been deïŹned in detail so
that when the videos are coded, the inter-rater reliability of those
coders is not compromised. Tables 1 and 2 summarize the various
elements of the ïŹ‚ow chart and HBSI errors.
45th
annual IEEE International Carnahan Conference on Security Technology
258
VI. ACKNOWEDGEMENTS
The research team at Kent gratefully acknowledge the sup-
port of the UK Engineering and Physical Sciences Research
Council (EPSRC) in the production of this work.
VII. REFERENCES
1. Dictionary.com, “biometrics,” in Merriam-Webster’s Dic-
tionary of Law. Source location: Merriam-Webster, Inc.
http://dictionary.reference.com/browse/biometrics Avail-
able: http://dictionary.reference.com/browse/biometrics .
Accessed: June 29, 2011.
2. Gamboa, H. (2004). A behavioral biometric system based
on human-computer interaction. Proceedings of SPIE, (i),
381-392. Spie.
3. Ayer, J., Lama, K., & Iskandar, B. S. (2009). A Novel
Approach to Dynamic Signature VeriïŹcation Using Sen-
sor-Based Data glove Faculty of Information Science and
Technology, Multimedia University, Department of Elec-
trical and Electronic Engineering, Universiti Teknologi
PETRONAS, Faculty of Engin. American Journal of Ap-
plied Sciences, 6(2), 233-240.

Weitere Àhnliche Inhalte

Andere mochten auch (7)

(2002) Graduate Course Development in Biometrics
(2002) Graduate Course Development in Biometrics(2002) Graduate Course Development in Biometrics
(2002) Graduate Course Development in Biometrics
 
(2009) A Definitional Framework for the Human-Biometric Sensor Interaction Model
(2009) A Definitional Framework for the Human-Biometric Sensor Interaction Model(2009) A Definitional Framework for the Human-Biometric Sensor Interaction Model
(2009) A Definitional Framework for the Human-Biometric Sensor Interaction Model
 
(2006) Dynamic Signature Forgery And Signature Strength
(2006) Dynamic Signature Forgery And Signature Strength(2006) Dynamic Signature Forgery And Signature Strength
(2006) Dynamic Signature Forgery And Signature Strength
 
(2003) Facial Recognition at Purdue University Airport
(2003) Facial Recognition at Purdue University Airport(2003) Facial Recognition at Purdue University Airport
(2003) Facial Recognition at Purdue University Airport
 
(2008) Investigating The Relationship Between Fingerprint Image Quality And S...
(2008) Investigating The Relationship Between Fingerprint Image Quality And S...(2008) Investigating The Relationship Between Fingerprint Image Quality And S...
(2008) Investigating The Relationship Between Fingerprint Image Quality And S...
 
(2007) Defining Habituation Using Hand Geometry
(2007) Defining Habituation Using Hand Geometry(2007) Defining Habituation Using Hand Geometry
(2007) Defining Habituation Using Hand Geometry
 
(2013) Automatic Detection of Biometrics Transaction Times
(2013) Automatic Detection of Biometrics Transaction Times(2013) Automatic Detection of Biometrics Transaction Times
(2013) Automatic Detection of Biometrics Transaction Times
 

Ähnlich wie (2011) Dynamic Signature Verifi cation and the Human Biometric Sensor Interaction Model

BIOMETRICS TECHNOLGY
BIOMETRICS TECHNOLGYBIOMETRICS TECHNOLGY
BIOMETRICS TECHNOLGYsumitgupta575
 
vargas2011.pdf
vargas2011.pdfvargas2011.pdf
vargas2011.pdfHouBou3
 
Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)Mumbai Academisc
 
(2009) A Definitional Framework for the Human-Biometric Sensor Interaction Model
(2009) A Definitional Framework for the Human-Biometric Sensor Interaction Model(2009) A Definitional Framework for the Human-Biometric Sensor Interaction Model
(2009) A Definitional Framework for the Human-Biometric Sensor Interaction ModelInternational Center for Biometric Research
 
A NOVEL BINNING AND INDEXING APPROACH USING HAND GEOMETRY AND PALM PRINT TO E...
A NOVEL BINNING AND INDEXING APPROACH USING HAND GEOMETRY AND PALM PRINT TO E...A NOVEL BINNING AND INDEXING APPROACH USING HAND GEOMETRY AND PALM PRINT TO E...
A NOVEL BINNING AND INDEXING APPROACH USING HAND GEOMETRY AND PALM PRINT TO E...ijcsa
 
(Fall 2012) Integration of Signature Verification into the Dynamic HBSI Model
(Fall 2012) Integration of Signature Verification into the Dynamic HBSI Model(Fall 2012) Integration of Signature Verification into the Dynamic HBSI Model
(Fall 2012) Integration of Signature Verification into the Dynamic HBSI ModelInternational Center for Biometric Research
 
Paulino fengjain latentfp_matching_descriptorbasedhoughtransform_ijcb11
Paulino fengjain latentfp_matching_descriptorbasedhoughtransform_ijcb11Paulino fengjain latentfp_matching_descriptorbasedhoughtransform_ijcb11
Paulino fengjain latentfp_matching_descriptorbasedhoughtransform_ijcb11vishakhmarari
 
IRJET-Biostatistics in Indian Banks: An Enhanced Security Approach
IRJET-Biostatistics in Indian Banks: An Enhanced Security ApproachIRJET-Biostatistics in Indian Banks: An Enhanced Security Approach
IRJET-Biostatistics in Indian Banks: An Enhanced Security ApproachIRJET Journal
 
IRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNNIRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNNIRJET Journal
 
(2009) Human-Biometric Sensor Interaction: Impact of Training on Biometric Sy...
(2009) Human-Biometric Sensor Interaction: Impact of Training on Biometric Sy...(2009) Human-Biometric Sensor Interaction: Impact of Training on Biometric Sy...
(2009) Human-Biometric Sensor Interaction: Impact of Training on Biometric Sy...International Center for Biometric Research
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Seminar report on Error Handling methods used in bio-cryptography
Seminar report on Error Handling methods used in bio-cryptographySeminar report on Error Handling methods used in bio-cryptography
Seminar report on Error Handling methods used in bio-cryptographykanchannawkar
 
Fingerprint recognition (term paper) Project
Fingerprint recognition (term paper) Project Fingerprint recognition (term paper) Project
Fingerprint recognition (term paper) Project Abhishek Walia
 
Paper id 25201413
Paper id 25201413Paper id 25201413
Paper id 25201413IJRAT
 
Comprehensive Review of Offline Signature Verification Mechanisms
Comprehensive Review of Offline Signature Verification MechanismsComprehensive Review of Offline Signature Verification Mechanisms
Comprehensive Review of Offline Signature Verification Mechanismsijtsrd
 
FINGER PRINTINGS
FINGER PRINTINGSFINGER PRINTINGS
FINGER PRINTINGSshiv dhori
 
(2010) An Evaluation of the Human Biometric Sensor Interaction using Hand Geo...
(2010) An Evaluation of the Human Biometric Sensor Interaction using Hand Geo...(2010) An Evaluation of the Human Biometric Sensor Interaction using Hand Geo...
(2010) An Evaluation of the Human Biometric Sensor Interaction using Hand Geo...International Center for Biometric Research
 

Ähnlich wie (2011) Dynamic Signature Verifi cation and the Human Biometric Sensor Interaction Model (20)

Biometrics for e-voting
Biometrics for e-votingBiometrics for e-voting
Biometrics for e-voting
 
BIOMETRICS TECHNOLGY
BIOMETRICS TECHNOLGYBIOMETRICS TECHNOLGY
BIOMETRICS TECHNOLGY
 
vargas2011.pdf
vargas2011.pdfvargas2011.pdf
vargas2011.pdf
 
Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)
 
(2009) A Definitional Framework for the Human-Biometric Sensor Interaction Model
(2009) A Definitional Framework for the Human-Biometric Sensor Interaction Model(2009) A Definitional Framework for the Human-Biometric Sensor Interaction Model
(2009) A Definitional Framework for the Human-Biometric Sensor Interaction Model
 
A NOVEL BINNING AND INDEXING APPROACH USING HAND GEOMETRY AND PALM PRINT TO E...
A NOVEL BINNING AND INDEXING APPROACH USING HAND GEOMETRY AND PALM PRINT TO E...A NOVEL BINNING AND INDEXING APPROACH USING HAND GEOMETRY AND PALM PRINT TO E...
A NOVEL BINNING AND INDEXING APPROACH USING HAND GEOMETRY AND PALM PRINT TO E...
 
(Fall 2012) Integration of Signature Verification into the Dynamic HBSI Model
(Fall 2012) Integration of Signature Verification into the Dynamic HBSI Model(Fall 2012) Integration of Signature Verification into the Dynamic HBSI Model
(Fall 2012) Integration of Signature Verification into the Dynamic HBSI Model
 
Paulino fengjain latentfp_matching_descriptorbasedhoughtransform_ijcb11
Paulino fengjain latentfp_matching_descriptorbasedhoughtransform_ijcb11Paulino fengjain latentfp_matching_descriptorbasedhoughtransform_ijcb11
Paulino fengjain latentfp_matching_descriptorbasedhoughtransform_ijcb11
 
IRJET-Biostatistics in Indian Banks: An Enhanced Security Approach
IRJET-Biostatistics in Indian Banks: An Enhanced Security ApproachIRJET-Biostatistics in Indian Banks: An Enhanced Security Approach
IRJET-Biostatistics in Indian Banks: An Enhanced Security Approach
 
40120140503005 2
40120140503005 240120140503005 2
40120140503005 2
 
IRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNNIRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNN
 
(2009) Human-Biometric Sensor Interaction: Impact of Training on Biometric Sy...
(2009) Human-Biometric Sensor Interaction: Impact of Training on Biometric Sy...(2009) Human-Biometric Sensor Interaction: Impact of Training on Biometric Sy...
(2009) Human-Biometric Sensor Interaction: Impact of Training on Biometric Sy...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Seminar report on Error Handling methods used in bio-cryptography
Seminar report on Error Handling methods used in bio-cryptographySeminar report on Error Handling methods used in bio-cryptography
Seminar report on Error Handling methods used in bio-cryptography
 
Fingerprint recognition (term paper) Project
Fingerprint recognition (term paper) Project Fingerprint recognition (term paper) Project
Fingerprint recognition (term paper) Project
 
Paper id 25201413
Paper id 25201413Paper id 25201413
Paper id 25201413
 
H03201039049
H03201039049H03201039049
H03201039049
 
Comprehensive Review of Offline Signature Verification Mechanisms
Comprehensive Review of Offline Signature Verification MechanismsComprehensive Review of Offline Signature Verification Mechanisms
Comprehensive Review of Offline Signature Verification Mechanisms
 
FINGER PRINTINGS
FINGER PRINTINGSFINGER PRINTINGS
FINGER PRINTINGS
 
(2010) An Evaluation of the Human Biometric Sensor Interaction using Hand Geo...
(2010) An Evaluation of the Human Biometric Sensor Interaction using Hand Geo...(2010) An Evaluation of the Human Biometric Sensor Interaction using Hand Geo...
(2010) An Evaluation of the Human Biometric Sensor Interaction using Hand Geo...
 

Mehr von International Center for Biometric Research

Advances in testing and evaluation using Human-Biometric sensor interaction m...
Advances in testing and evaluation using Human-Biometric sensor interaction m...Advances in testing and evaluation using Human-Biometric sensor interaction m...
Advances in testing and evaluation using Human-Biometric sensor interaction m...International Center for Biometric Research
 
(2010) Fingerprint recognition performance evaluation for mobile ID applications
(2010) Fingerprint recognition performance evaluation for mobile ID applications(2010) Fingerprint recognition performance evaluation for mobile ID applications
(2010) Fingerprint recognition performance evaluation for mobile ID applicationsInternational Center for Biometric Research
 

Mehr von International Center for Biometric Research (20)

HBSI Automation Using the Kinect
HBSI Automation Using the KinectHBSI Automation Using the Kinect
HBSI Automation Using the Kinect
 
IT 34500
IT 34500IT 34500
IT 34500
 
Entropy of Fingerprints
Entropy of FingerprintsEntropy of Fingerprints
Entropy of Fingerprints
 
Biometric and usability
Biometric and usabilityBiometric and usability
Biometric and usability
 
Examining Intra-Visit Iris Stability - Visit 4
Examining Intra-Visit Iris Stability - Visit 4Examining Intra-Visit Iris Stability - Visit 4
Examining Intra-Visit Iris Stability - Visit 4
 
Examining Intra-Visit Iris Stability - Visit 6
Examining Intra-Visit Iris Stability - Visit 6Examining Intra-Visit Iris Stability - Visit 6
Examining Intra-Visit Iris Stability - Visit 6
 
Examining Intra-Visit Iris Stability - Visit 2
Examining Intra-Visit Iris Stability - Visit 2Examining Intra-Visit Iris Stability - Visit 2
Examining Intra-Visit Iris Stability - Visit 2
 
Examining Intra-Visit Iris Stability - Visit 1
Examining Intra-Visit Iris Stability - Visit 1Examining Intra-Visit Iris Stability - Visit 1
Examining Intra-Visit Iris Stability - Visit 1
 
Examining Intra-Visit Iris Stability - Visit 3
Examining Intra-Visit Iris Stability - Visit 3Examining Intra-Visit Iris Stability - Visit 3
Examining Intra-Visit Iris Stability - Visit 3
 
Best Practices in Reporting Time Duration in Biometrics
Best Practices in Reporting Time Duration in BiometricsBest Practices in Reporting Time Duration in Biometrics
Best Practices in Reporting Time Duration in Biometrics
 
Examining Intra-Visit Iris Stability - Visit 5
Examining Intra-Visit Iris Stability - Visit 5Examining Intra-Visit Iris Stability - Visit 5
Examining Intra-Visit Iris Stability - Visit 5
 
Standards and Academia
Standards and AcademiaStandards and Academia
Standards and Academia
 
Interoperability and the Stability Score Index
Interoperability and the Stability Score IndexInteroperability and the Stability Score Index
Interoperability and the Stability Score Index
 
Advances in testing and evaluation using Human-Biometric sensor interaction m...
Advances in testing and evaluation using Human-Biometric sensor interaction m...Advances in testing and evaluation using Human-Biometric sensor interaction m...
Advances in testing and evaluation using Human-Biometric sensor interaction m...
 
Cerias talk on testing and evaluation
Cerias talk on testing and evaluationCerias talk on testing and evaluation
Cerias talk on testing and evaluation
 
IT 54500 overview
IT 54500 overviewIT 54500 overview
IT 54500 overview
 
Ben thesis slideshow
Ben thesis slideshowBen thesis slideshow
Ben thesis slideshow
 
(2010) Fingerprint recognition performance evaluation for mobile ID applications
(2010) Fingerprint recognition performance evaluation for mobile ID applications(2010) Fingerprint recognition performance evaluation for mobile ID applications
(2010) Fingerprint recognition performance evaluation for mobile ID applications
 
ICBR Databases
ICBR DatabasesICBR Databases
ICBR Databases
 
Understanding Fingerprint Skin Characteristics and Image Quality
Understanding Fingerprint Skin Characteristics and Image QualityUnderstanding Fingerprint Skin Characteristics and Image Quality
Understanding Fingerprint Skin Characteristics and Image Quality
 

KĂŒrzlich hochgeladen

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...gurkirankumar98700
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

KĂŒrzlich hochgeladen (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

(2011) Dynamic Signature Verifi cation and the Human Biometric Sensor Interaction Model

  • 1. 253 978-1-4577-0903-6/11/$26.00 © 2011 IEEE Abstract – This paper examines the application of the HBSI model to a range of dynamic signature veriïŹcation capture digitizers. Behavioral biometrics (which considers the process by which a human performs a function) are inherently more complicated to analyze as they may contain a temporal modiïŹcation as part of a valid capture interaction. In this study, a framework for the development of an HBSI model is outlined, based on two different signature digitizers. Both devices enabled the capture of both temporal data (dynamic) as well as an image of the completed (static) signature. Using this data, we propose a signature modality revision to the HBSI model with interaction errors classiïŹed into ïŹve categories. This study deals solely with genuine users, examining both correct and incorrect signature presentations. Keywords: biometrics, dynamic signature veriïŹcation, electronic signatures, HBSI I. INTRODUCTION Biometrics is the measurement and analysis of unique physical and/or behavioral characteristics commonly used as a means of verifying personal identity [1]. A physiological trait is a more stable physical characteristic, such as ïŹngerprint, hand geometry, or face. A behavioral characteristic is a reïŹ‚ection of an individual’s psychology [2]. The Human-Biometric Sensor In- teraction (HBSI) model is used to categorize all possible errors that may occur during user interaction with biometric systems into six basic categories. The initial validation and subsequent testing of the model has been on physiological biometrics such as ïŹngerprint (swipe and slap capture methods), iris and hand geometry. These physiological modalities tend to be more restric- tive in their interaction possibilities. One drawback of the HBSI model was that it had not been validated against a behavioral bio- metric. This category of biometrics adds a particular challenge to the model – that is how to deal with that the interaction of the human and the sensor with a behavioral as well as a physi- ological component. This paper examines the development and adaptation of the Human-Biometric Sensor Interaction model for behavioral biometrics, using Dynamic Signature VeriïŹcation as a case study. This adapted model will aid future (behavior mo- dality-focused) projects, as well as further research into dynamic signature veriïŹcation. Figure 1 shows the latest version of the Human-Biometric Sensor Interaction model prior to this paper. It is possible that in one transaction more than one error can occur, however our method concentrates on the overall outcome of the signature process. Figure 1: Current HBSI model There are several inherent challenges with behavioral bio- metrics vis-Ă -vis physiological biometrics when examining the human interaction component. The ïŹrst is that interaction be- tween the human and the biometric sensor for a behavioral sys- tem will be more complex. Signing, speaking and typing are daily occurrences in a person’s life. It is intrinsic that when presented with a pen and asked for a signature, a user will produce a good representation of their signature, because they know how to sign and they know what their completed signature is meant to look like. The same goes for voice recognition, and to some extent typing ability. Therefore, when something goes wrong with the presentation or utterance, the user can self-correct – for exam- ple they may stop signing because the pen doesn’t work, or they will restart the utterance because of a problem with the telephone line. These self-determined corrections may be rarer when a user interacts with a physiological based sensor, such as a for hand Dynamic Signature VeriïŹcation and the Human Biometric Sensor Interaction Model Michael Brockly Biometric Standards, Performance and Assurance Laboratory Purdue University, Department of Technology, Leadership and Innovation West Lafayette, IN James Scott School of Engineering and Digital Arts, University of Kent, Canterbury, CT2 7NT, UK Richard Guest, Ph.D. School of Engineering and Digital Arts, University of Kent, Canterbury, CT2 7NT, UK Stephen Elliott, Ph.D. Biometric Standards, Performance and Assurance Laboratory Purdue University, Department of Technology, Leadership and Innovation West Lafayette, IN
  • 2. 45th annual IEEE International Carnahan Conference on Security Technology 254 geometry machine. These behavioral components could cause an increase in the variability in the video interaction coding, which can make the HBSI analysis more complex and potentially un- reliable. Dynamic Signature VeriïŹcation (DSV) is widely used as a means of biometric authentication and authorization [3]. Signa- ture capture systems collect a variety of metrics such as mini- mum, maximum and average velocity in both the x and y dimen- sions, total time of pen up, pen down and direction, size, total pen distance, and others. These features are captured in real time as the user is writing to provide time stamped points of x/y coor- dinates along with pen pressure values in the z-direction. When deciding how to code the various Dynamic Signature VeriïŹcation interactions, it is important to note how each potential interac- tion takes place. Each interaction encompasses the entire process from when the user ïŹrst picks up the pen/stylus until the time that all writing is complete and the user has submitted their signature. To properly present a correct signature, users must be able to in- teract with any system or sensor they encounter. The ïŹrst chal- lenge is with the variety of different sensors that are available in the marketplace. The size and shape of the sensors are different, as are the pens. An individual may be familiar with signing on one type of digitizer, but will pause when a second type of digi- tizer does not provide the same type of feedback – for example, ink versus inkless. Furthermore, this sensor variability may com- pound the inherent variability within the signature itself. Even if you keep the sensor type constant, the writing of a signature can exhibit changes from one interaction to the next and can depend on a number of factors all related to the user. For example, the signature may vary based on the ceremony of the occasion. A person will possibly sign completely different if they are pur- chasing goods at a grocery store in comparison to when they sign for a home mortgage. The signature itself may also be different. Even if the ceremony is explained in order to remain constant, the user may still choose to abbreviate their name or not sign to the best of their ability. Although in a testing environment this user behavior is, to some extent, controlled, this variability needs to be acknowledged in the development of the model. II. DEVELOPMENT OF THE HUMAN BIOMETRIC SENSOR INTERACTION MODEL FOR DSV Taking into account the sensor and user variability, two dif- ferent interaction ïŹ‚ow charts are illustrated (Figures 2 and 3). The ïŹrst signature capture sensor chosen was a back projected virtual ink device. Here the virtual ink (from the attached stylus) is displayed on a screen behind the writing surface. The majority of users are likely to be well acclimated with this device due to its common occurrence at point of sale areas. This type of digitizer can prompt user interaction errors; for example, latency. This is a measure of time delay that a system experiences, and could cause a negative reaction from the user. When latency is present, users may think that the sensor has stopped capturing their signature, thus prompting a resign. The second sensor chosen for the model development was a paper and ink device where the signer writes with a pen onto a paper surface with the pen leaving behind an ink trace as well as interacting with the sensor below the paper. A barrel-pen was used to write on the sheet of paper to give the writer feedback on what their signature looks like. Although this removes the issue of latency from the user, new errors can oc- cur such as faulty ink ïŹ‚ow or the accidental push of the barrel button during the signing process. Based on these assumptions, two interaction ïŹ‚owcharts outlining possible decisions and out- comes are shown in Figures 2 and 3. These charts contain a series of location identiïŹers (labeled Px and Vx respectively, where x is a unique numeric identiïŹer) Where possible, examples in this section will relate back to the speciïŹc decision points in these ïŹgures. There are ïŹve major interaction metrics or errors addressed in the new HBSI model. These errors stem from either a good presentation or a bad presentation and are defective interaction (DI), concealed interaction (CI), false interaction (FI), failure to process (FTP), and failure to detect (FTD). If none of these in- teraction errors occur with a correct presentation, the biometric sample is labeled as a successfully processed sample (SPS). III. INCORRECT PRESENTATIONS With reference to Figure 1, the types of HBSI errors within signatures deemed to be an incorrect presentation by the signer can lead to the following categories: A. Defective Interactions Defective interactions occur when the signature is deemed incorrect and no signature channel data is collected. In a paper and ink system, an incorrect signature is caused when the pen pressure is too light at all the sample points across the digitiz- er surface (below the pen-down threshold). No channel data is therefore collected, even though a partial ink trace may or may not be deposited on the paper. Within a virtual ink system no virtual ink is presented as a feedback to the signer. Another case is when an incorrect signature is donated and latency or other temporal errors in the attached hardware/software result in no samples being recorded. This error can apply to both paper and ink and virtual ink systems. The above scenarios are sensor-based issues, whereas the following cases relate to the user interaction. Illnesses such as Parkinson’s or carpal tunnel may mean a sample cannot be given correctly – this will result in a DI. A DI can also occur if the user abandons the signature without any channel data being collected. With respect to interaction ïŹ‚ow charts (Figures 2 and 3), all errors relate to when a signer halts the production of a signature (or is unable to start) and no data is collected. A “yes” from events V8 and P9 will lead to a DI if this scenario occurs. B. Concealed Interactions An error is classiïŹed as a concealed interaction when the signer donates an incorrect signature that is not detected by the system. A number of events can lead to a concealed interaction. Firstly P5/V5 or “User satisïŹed with signature production” in both signature systems will cause a concealed interaction if the signer is not satisïŹed with the signature being produced but does not abandon signature production (P8/V7=“no”). “Hardware la- tency problems,” (V2) “signature within signing bounds” (V3) and “pen pressure registered/ink dispersed correctly” (V4) will cause concealed interaction errors in a virtual ink digitizer if the
  • 3. 18th -21st October, 2011 — MatarĂł, Barcelona, Spain 255 signer does not abandon the capture process even though visible system and signer out-of-bounds errors cause an erroneous sig- nature to be displayed on the virtual screen. Also, in the case of a virtual ink digitizer, “hardware latency problems” and “signature within signing bounds” can lead to concealed interaction errors if the virtual ink feedback mirrors the latency and out-of-bounds recording error (i.e. delayed feedback and no display of out-of- bounds ink). “Ink dispersed correctly on paper” (P6) causes a concealed interaction if the signer does not abandon the capture process even though there are visible ink dispersal issues noted by the signer. “User abandoning donation” in P10 or V9 lead to concealed interactions if the signer abandons the capture process even though the signature is not complete. C. False Interactions False interactions occur when a signature, deemed incorrect or unrepresentative by the signer, has been donated with sample points being recorded. This incorrect nature of the presentation is detected by the system. There are several causes of false inter- actions, the ïŹrst occurs when a signer uses a repetitive motion (repeating segments of signature) within a signing process caused by faulty ink-ïŹ‚ow issues (paper and ink system) or insufïŹcient pressure levels applied (virtual ink). The second cause of a false interaction is when a signer using a repetitive motion (repeating segments of signature) caused by a writing error introduced by the signer. Signers will also cause a false interaction by donating an unrepresentative/incomplete signature possibly due to bodily functions and reïŹ‚exes such as sneezing, jolts, and twitches. False interactions can also be system speciïŹc, for example within a vir- tual ink system, a pen interface issue can occur (e.g. barrel button pressed during donation) causing channel data disruption which may cause a misrepresentation of a correct signature. This causes virtual ink feedback disruption. In both systems, at P5/V5, “User satisïŹed with signature production” will cause a false interaction if the signer is not satisïŹed with the signature being produced and abandons the signature production (P8/V7=”yes”). A false interaction will occur on both systems if the signer (or system) cancels the capture process following a signer modiïŹcation of their standard signature with data having been collected (i.e. part of the signature has been signed), shown at P9 and V8. “Hard- ware latency problems,” (V2) “signature within signing bounds” (V3) and “pen pressure registered/ink dispersed correctly” (V4) will cause false interactions in a virtual ink digitizer if the signer abandons the capture process due to both system and signer out- of-bounds errors causing an erroneous signature to be displayed on the virtual screen. Also in a virtual ink digitizer, “hardware latency problems” (V2) and “signature within signing bounds” (V3) can lead to false interactions if the virtual ink feedback mir- rors the latency and out-of-bounds recording error (i.e. delayed feedback and no display of out-of-bounds ink). In a paper and ink system, if the signer abandons the capture process due to ink dispersal issues it will also cause a false interaction. The majority of false interaction errors are created due to the decisions or judg- ments made by the signer at the time of donation. IV. CORRECT PRESENTATIONS Failure to detect (FTD), failure to process (FTP), and suc- cessfully processed samples (SPS) all constitute correct presenta- tions. A. Failure to Detect Failure to detect errors occur when the signer has donated a signature that they have deemed acceptable, but the signature is not detected by the biometric system. Within a physical ink sys- tem, such an error will happen if a correct signature is donated, but the pen pressure used is too light at all sample points across the donated signature on the digitizer surface (below a pen-down threshold) but ink trace is left on the paper. A similar effect could be observed if the overlaid paper thickness caused insufïŹcient downward pressure to be exerted on the digitizer surface. A fail- ure to detect will also occur if a correct signature is donated, how- ever latency (or other temporal recording errors) in the attached hardware/software results in no samples being recorded. This scenario applies to both virtual and real inking systems. A failure to detect will be achieved in the ïŹrst decision of both ïŹ‚owcharts if data packets are not being recorded by the system. B. Failure to Process Failure to process errors arise when the signer has donated a signature that they have deemed acceptable. The signature has been detected by the biometric system but system errors cause the signature not to be an accurate representation of the donated signature. If a correct signature is donated but latency (or other temporal) errors in hardware/software result in partial or tempo- rally distorted channel data being recorded it will be classiïŹed as a failure to process. An alternative case is where a correct signa- ture is donated, but the start and/or end segments are missing in the recording process. This scenario can apply to both inking and virtual ink systems. In another case, a correct signature can be donated, however part of the signature has been signed outside the designated capture area. In the paper and ink system, this may occur if the boundary has not been clearly deïŹned. In the virtual ink system, if ink is still displayed outside of a capture boundary then the failure to process will occur. Most likely, the ink will not be displayed outside of bounds so an incorrect presentation would occur. In either case, capture points will not be stored for out of bounds signature sample points. Within a paper and ink system, a correct signature can be donated, however due to pressure variability within the signer’s action, it results in ink being deposited on the paper but in some areas the applied pressure was too low to register resulting in a partial capture of the signature deeming it a failure to process. Again, in a paper and ink system, a pen interface issue can occur (e.g. barrel button pressed during donation) causing channel data disruption which may cause a misrepresentation of a correct sig- nature. Ink dispersal is not disrupted but it will still be classiïŹed as a failure to process. Both digitizer systems may be hindered by system performance and cause the system to miss certain parts of the signature input resulting in a failure to process error. This may be caused by the utilization of a machine with too low of a capa- bility to record capture which would cause lag in processes and
  • 4. 45th annual IEEE International Carnahan Conference on Security Technology 256 therefore miss some of the input recorded during capture. In both digitizer systems, a failure to process will occur if the signature is signed out of bounds but the signer’s inking feedback indicates a correct presentation. In a paper and ink digitizer system, “pen pressure registered with system” (P4) relates to these issues. If the pressure is too low on a virtual ink system, the digitizer would not provide feedback from the virtual ink (hence it would be an incorrect presentation instead). In the case of paper and ink sig- nature capture, if the outcome of “pen pressure registered with system” (P4) is “yes,” then it is assumed that correct pressure was recorded throughout the sample. If the outcome at P4 is “no,” then it will result in a failure to process if the drawn signature is acceptable to the signer. A failure to process may also occur at this decision due to a human interaction error such as touching the pen barrel button by accident which may cause the pressure channel capture state to not register during later processing.
  • 5. 18th -21st October, 2011 — MatarĂł, Barcelona, Spain 257 V. CONCLUSIONS The development of the HBSI model for dynamic signature veriïŹcation reveals the complexity of the potential interactions and the changes of those interactions when digitizers change, as well as when the ceremony changes. The ïŹndings in this paper are based strictly on the actions of genuine signers. Forgery poses an entirely different research topic that has been tested in a va- riety of different experiments so it has not been included in this study. Furthermore, Figures 2 and 3 have been deïŹned in detail so that when the videos are coded, the inter-rater reliability of those coders is not compromised. Tables 1 and 2 summarize the various elements of the ïŹ‚ow chart and HBSI errors.
  • 6. 45th annual IEEE International Carnahan Conference on Security Technology 258 VI. ACKNOWEDGEMENTS The research team at Kent gratefully acknowledge the sup- port of the UK Engineering and Physical Sciences Research Council (EPSRC) in the production of this work. VII. REFERENCES 1. Dictionary.com, “biometrics,” in Merriam-Webster’s Dic- tionary of Law. Source location: Merriam-Webster, Inc. http://dictionary.reference.com/browse/biometrics Avail- able: http://dictionary.reference.com/browse/biometrics . Accessed: June 29, 2011. 2. Gamboa, H. (2004). A behavioral biometric system based on human-computer interaction. Proceedings of SPIE, (i), 381-392. Spie. 3. Ayer, J., Lama, K., & Iskandar, B. S. (2009). A Novel Approach to Dynamic Signature VeriïŹcation Using Sen- sor-Based Data glove Faculty of Information Science and Technology, Multimedia University, Department of Elec- trical and Electronic Engineering, Universiti Teknologi PETRONAS, Faculty of Engin. American Journal of Ap- plied Sciences, 6(2), 233-240.