Abstract. Most people are used to signing documents and because of this, it is a trusted and natural method for user identity verification, reducing the cost of password maintenance and decreasing the risk of eBusiness fraud. In the proposed system, identity is securely verified and an authentic electronic signature is created using biometric dynamic signature verification. Shape, speed, stroke order, off-tablet motion, pen pressure and timing information are captured and analyzed during the real-time act of signing the handwritten signature. The captured values are unique to an individual and virtually impossible to duplicate. This paper presents a research of various HMM based techniques for signature verification. Different topologies are compared in order to obtain an optimized high performance signature verification system and signal normalization preprocessing makes the system robust with respect to writer variability.
Abstract. The handwritten signature is the expression of the will and consent in daily operations such as banking transactions, access control, contracts, etc. However, since signing is a behavioral feature it is not invariant; we do not always sign at the same speed, in the same position or at the same orientation. In order to reduce the errors caused in verification by these differences between original signatures we have introduced a new concept of reference system for the (x, y) coordinates from experimental results. The basis of this concept lies on using global references (centre of mass and principal axes of inertia) instead of local references (initial point and initial angle) for a recognition system based on local parameters. The system is based on the hypothesis that signing is a feedback process, in which humans react to our own signature while writing it following patterns stored in our brain.
The authors present a multi-agent prototype for an e-voting system based on optical character recognition technology.This case study demonstrates how using N-version programming and improving an e-voting authentication system and the resulting data transmission could further enhance the security of the electoral process.
Abstract.A secret and secure ballot is the core of every democracy. We all feel proud of being able to decide the future of our countries by making appropriate use of our right to vote in an election. However, how can we improve the efficiency of the voting process? Democratic governments should have mechanisms which ensure the integrity, security and privacy of its citizens at the polls during an election process. This paper describes a new electronic secure voting system, based on automatic paper ballot reading, which can be utilized to offer efficient help to officials and party representatives during elections. It presents how the system is organized, it also describes our OCR system and how it is implemented to read paper ballots, and it ends showing some experimental results.
When there is a need to compare the characteristics of several similar global communications systems, security is often an important factor to consider in the comparison. However, in most situations it is difficult to deduce whether a system is more secure than other; and it is even more difficult to deduce how much more secure a system is compared to another. This paper presents a method based on the use of 'attack trees' for the analysis of the security level supported by communications systems. Specifically this paper presents the most relevant aspects of the application of this method to protocols for distributing digital contents with copyright protection; to compare the security level of different systems and to obtain quantitative information about the level of security supported by each protocol.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.