2015 International Carnahan Conference on Security Technology (ICCST) 2015
DOI: 10.1109/ccst.2015.7389687
|View full text |Cite
|
Sign up to set email alerts
|

Increasing the robustness of biometric templates for dynamic signature biometric systems

Abstract: El acceso a la versión del editor puede requerir la suscripción del recurso Access to the published version may require subscription Abstract-Due to the high deployment of devices such as smartphones and tablets and their increasing popularity in our society, the use of biometric traits in commercial and banking applications through these novel devices as an easy, quick and reliable way to perform payments is rapidly increasing. The handwritten signature is one of the most socially accepted biometric traits in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
8
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
3
1

Relationship

3
5

Authors

Journals

citations
Cited by 11 publications
(9 citation statements)
references
References 19 publications
(22 reference statements)
1
8
0
Order By: Relevance
“…Unfortunately, these approaches result in performance degradation along with reliability problems (i.e., the possibility of revoking a compromised template and defining a new one). Similar results have been observed when simple, noninvertible features have been used [249].…”
Section: Signatures and Securitysupporting
confidence: 86%
See 1 more Smart Citation
“…Unfortunately, these approaches result in performance degradation along with reliability problems (i.e., the possibility of revoking a compromised template and defining a new one). Similar results have been observed when simple, noninvertible features have been used [249].…”
Section: Signatures and Securitysupporting
confidence: 86%
“…Due to the high deployment of mobile devices and their increasing popularity in our society, the use of biometric traits, for example, in commercial and banking applications, provides an easy, quick, and reliable way to perform payments through these devices. As was remarked in [249], most state-of-the-art systems are based on extracting information contained in the trajectory coordinates of the signing process, which is stored in a biometric template. Protecting this sensitive information against possible external attack is critical: such attacks, in fact, would allow criminals to perform direct attacks on a biometric system or carry out high-quality forgeries of the users' signatures.…”
Section: Signing On Touchscreensmentioning
confidence: 99%
“…Furthermore, it is interesting to study the performance of a dynamic signature verification system applied to security applications, taking into account the extreme case which X and Y coordinates are not used for the system, which would be a much more robust system against attacks [31].…”
Section: Discussionmentioning
confidence: 99%
“…The most used in the cloudmobile scenario are reported in table I. [6], [8], [9], [11], [15], [32], [49], [56], [57], [91], [93], [94], [97] Model based ANN [106] HMM/GMM [6], [19], [26], [35], [55], [92] SVM [57], [58], [87], [90] Distance-based approaches provide the verification response based on the distance between the test signature and one or more reference signatures. Model-based approaches verify the test signature by estimating fitness on the signature reference model of the user.…”
Section: Training-verificationmentioning
confidence: 99%