2015 IEEE International Workshop on Information Forensics and Security (WIFS) 2015
DOI: 10.1109/wifs.2015.7368583
|View full text |Cite
|
Sign up to set email alerts
|

Update strategies for HMM-based dynamic signature biometric systems

Abstract: Esta es la versión de autor de la comunicación de congreso publicada en: This is an author produced version of a paper published in: Abstract-Biometric authentication on devices such as smartphones and tablets has increased significantly in the last years. One of the most acceptable and increasing traits is the handwriting signature as it has been used in financial and legal agreements scenarios for over a century. Nowadays, it is frequent to sign in banking and commercial areas on digitizing tablets. For thes… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
14
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 17 publications
(14 citation statements)
references
References 18 publications
(22 reference statements)
0
14
0
Order By: Relevance
“…However results obtained by the pattern recognition community within the re-training process (in semi-supervised scenarios) haven't been studied within this specific field, so that it must be considered to be a challenging open issue [47]. Some results can be referred to HMM and GMM [92], (even if in this case signature where acquired only by means of a single platform): the standard case of having an HMM-based system with a fixed configuration and an HMMbased and a GMM-based system with optimized configurations in function of the training signatures available at enrolment stage. The approach has been able to let the system achieves an average absolute improvement of 4.6% (2.7%) in terms of EER, with respect to the baseline system, for the skilled (random) forgery cases.…”
Section: Performance Evaluationmentioning
confidence: 99%
“…However results obtained by the pattern recognition community within the re-training process (in semi-supervised scenarios) haven't been studied within this specific field, so that it must be considered to be a challenging open issue [47]. Some results can be referred to HMM and GMM [92], (even if in this case signature where acquired only by means of a single platform): the standard case of having an HMM-based system with a fixed configuration and an HMMbased and a GMM-based system with optimized configurations in function of the training signatures available at enrolment stage. The approach has been able to let the system achieves an average absolute improvement of 4.6% (2.7%) in terms of EER, with respect to the baseline system, for the skilled (random) forgery cases.…”
Section: Performance Evaluationmentioning
confidence: 99%
“…Three well-known systems based on previous studies are considered here: HMM, GMM, and DTW. In all of them, signals captured by the digitiser (only X and Y coordinates and pressure) are used to extract a set of 23 time functions for each signature [14]. Time functions related to pen angular orientation (azimuth and altitude angles) were discarded in order to consider the same set of time functions that we would be able to use in general purpose devices such as tablets and smartphones.…”
Section: On-line Signature Verification Systemsmentioning
confidence: 99%
“…• This paper reports the first significant experimental results regarding the effect of template ageing and template update strategies for on-line signature authentication considering both random and skilled forgeries of the signatures. For this, we have created an extension of the ATVS On-Line Signature Long-Term database in which skilled forgeries are included [14]. The complete signature database is publicly available at https:// github.com/BiDAlab/xLongSignDB.…”
Section: Introductionmentioning
confidence: 99%
“…For each signature acquired using a digitizing tablet (see Sec. III), signals related to X and Y pen coordinates and pressure are used to extract a set of 23 time functions, similar to [16] (see Table I). The more discriminative and robust time functions of each complexity level are selected using the Sequential Forward Feature Selection algorithm (SFFS) enhancing the signature verification system in terms of EER.…”
Section: B Complexity-based Signature Verification Systemmentioning
confidence: 99%