doi: 10.17586/2226-1494-2017-17-4-677-684


RESEARCH OF ARTIFICIAL NEURAL NETWORK APPLICABILITY FOR USER`S ONLINE HANDWRITTEN SIGNATURE VERIFICATION

D. I. Dikii, V. D. Artemeva


Read the full article  ';
Article in Russian

For citation: Dikiy D.I., Artemeva V.D. Research of artificial neural network applicability for user`s online handwritten signature verification. Scientific and Technical Journal of Information Technologies, Mechanics and Optics, 2017, vol. 17, no. 4, pp. 677–684 (in Russian). doi: 10.17586/2226-1494-2017-17-4-677-684

Abstract

The paper considers features of artificial neural networks (ANN) application for online user`s verification by handwriting dynamics. This problem is urgent due to the development of cloud computing and machine learning, that even more often are used for pattern recognition. The review of the most widespread methods of digital user`s data pre-processing shows the relevance of ANN usage for verification. On the example of discrete Fourier transformation we made the experiments with different ANN structures and training algorithms. For these purposes we used the database of Signature Verification Competition (SVC) 2004. Cartesian coordinates and time parameters of trajectories have been taken from the database. The results of research show that artificial neural networks are able to solve that task, but at the same time with increasing the number of samples for study, success probability for legal users and malefactors also increases. For increasing of ANN performance we suggest the application of correlation analysis method for research data. It helps to increase the efficiency of artificial neural network. The false acceptance rate, or FAR, is about 2.26% and the false recognition rate, or FRR, is 12.6% with the use of correlation analysis method. At the same time, the task of distinguishing between a legal user and a malefactor, knowing how the signature or the password looks, is unsolved so far. In our opinion, the problem solution lies in the usage of additional parameters of handwriting dynamics (pressure, angle of inclination) for analysis.


Keywords: handwriting dynamics, authentication, artificial neural network, FRR, FAR, correlation analysis, genetic algorithm, back propagation algorithm

References
 1.     Holtmanns S., Rao S.P., Oliver I. User location tracking attacks for LTE networks using the interworking functionality. Proc. IFIP Networking conference (IFIP Networking) and workshops. Vienna, Austria, 2016, pp. 315–322. doi: 10.1109/IFIPNetworking.2016.7497239
2.     Padma P., Srinivasan S. A survey on biometric based authentication in cloud computing. Proc. Int. Conf. on Inventive Computation Technologies, ICICT. Coimbatore, India, 2016, vol. 1, pp. 275–279. doi: 10.1109/INVENTIVE.2016.7823273
3.     Yadav D., Tyagi R. Comparative analysis of offline signature verification system. International Journal of Security and its Applications, 2015, vol. 9, no. 9, pp. 141–150. doi: 10.14257/ijsia.2015.9.9.13
4.     Boriev Z., Sokolov S., Nyrkov A., Nekrasova A. Mathematical and information maintenance of biometric systems. Proc. Int. Conf. on Mechanical Engineering, Automation and Control Systems, MEACS2015. Tomsk, Russia, 2015, vol. 124, art. 012046. doi: 10.1088/1757-899X/124/1/012046
5.     Omri F., Foufou S., Hamila R., Jarraya M. Cloud-based mobile system for biometrics authentication. Proc. 13th Int. Conf. on ITS Telecommunications, ITST. Tampere, Finland, 2013, pp. 325–330. doi: 10.1109/ITST.2013.6685567
6.     Fahmy M.M.M. Online handwritten signature verification system based on DWT features extraction and neural network classification. Ain Shams Engineering Journal, 2010, vol.1, pp. 59–70. doi: 10.1016/j.asej.2010.09.007
7.     Petrovska-Delacretaz D., Chollet G., Dorizzi B. Guide to Biometric Reference Systems and Performance Evaluation.Springer, 2009,414 p. doi: 10.1007/978-1-84800-292-0
8.     Putz-Leszczynska J. Signature verification: a comprehensive study of the hidden signature method. International Journal of Applied Mathematics and Computer Science, 2015, vol. 25, pp.659–674. doi: 10.1515/amcs-2015-0048
9.     Pratt W.K. Digital Image Processing. NY, Wiley, 1978.
10.  Luger G.F. Artificial Intelligence. Structures and Strategies for Complex Problem Solving. 4th ed. Addison Wesley, 1999, 880 p.
11.  Kashi R.S., Turin W., Nelson W. On-line handwritten signature verification using stroke direction coding. Optical Engineering, 1996, vol. 35, no. 9, pp. 2526–2533.
12.  Thumwarin P., Pernwong J., Matsuura T. FIR signature verification system characterizing dynamics of handwriting features. EURASIP Journal on Advances in Signal Processing, 2013, no. 183, pp. 1–15. doi: 10.1186/1687-6180-2013-183 
13.  Kashi R.S., Hu J., Nelson W.L., Turin W. On-line handwritten signature verification using hidden Markov model features. Proc. 4th Int. Conf. on Document Analysis and Recognition. Ulm, Germany, 1997, vol. 1, pp. 253–257.
14.  Talebinejad M., Miri A., Chan A.D.C. A computationally efficient HMM-based handwriting verification system. Proc. IEEE International Instrumentation and Measurement Technology Conference. Victoria, Canada, 2008, pp. 1868–1872. doi: 10.1109/IMTC.2008.4547350
15.  Kolyadin D.V., Petrov I.B. Algorithm for highlighting extreme points according to the task of biometric verification of a handwritten signature. Issledovano v Rossii, 2005, pp. 532–540. (In Russian)
16.  Smith S.W. The Scientist and Engineer's Guide to Digital Signal Processing. California Technical Pub., 1997, 626 p.
17.  Lebedenko Yu.I.Biometric Security Systems: Textbook. Tula, TulSU Publ., 2012, 158 p.
18.  Rosenblatt F. The perceptron: a probabilistic model for information storage and organization in the brain. Psychological Review, 1958, vol. 65, no. 6, pp. 386–408. doi: 10.1037/h0042519
19.  Rumelhart D.E., Hinton G.E., Williams R.J. Learning internal representation by error propagation / In Parallel Distributed Processing. V. I Foundations. Eds. D.E. Rumelhart, J.L. McClelland. Cambridge, MIT Press, 1988, pp. 399–421.doi: 10.1016/b978-1-4832-1446-7.50035-2 
Alabbas M., Jaf S. Abdullah A.H.M. Optimize BpNN using new breeder genetic algorithm. Proc. Int. Conf. on Advanced Intelligent Systems and Informatics, 2016, no. 533, pp. 373–382. doi: 10.1007/978-3-319-48308-5_36 


Copyright 2001-2024 ©
Scientific and Technical Journal
of Information Technologies, Mechanics and Optics.
All rights reserved.

Яндекс.Метрика