The application of signature recognition to transparent handwriting verification for mobile devices

Author:

Clarke N.L.,Mekala A.R.

Abstract

PurposeThe popularity of mobile devices and the evolving nature of the services and information they can delivery make them increasingly desirable targets for misuse. The ability to provide effective authentication of the user becomes imperative if protection against misuse of personally and financially sensitive information is to be provided. This paper discusses the application of biometrics to a mobile device in a transparent and continuous fashion and the subsequent advantages and disadvantages that are in contention with various biometric techniques.Design/methodology/approachAn investigation was conducted to evaluate the feasibility of utilising signature recognition, to verify users based upon written words and not signatures, thereby enabling transparent handwriting verification. Participants were required to write a number of common words, such as “hello” “sorry” and “thank you”. The ability to correctly verify against their own template and to reject impostors was then established.FindingsTotally, 20 users participated in the study and an average FAR and FRR of 0 and 1.2 per cent, respectively, were experienced across eight common words.Research limitations/implicationsThe initial study has proven very successful, however, further investigations need to be established with a larger population of users and a wider vocabulary of words.Originality/valueThis study has verified the feasibility of applying an existing signature recognition technique to transparent handwriting verification.

Publisher

Emerald

Subject

Library and Information Sciences,Management Science and Operations Research,Business and International Management,Management Information Systems

Reference16 articles.

1. ARC Group (2003), Mobile Content & Applications 2003, Arc Group, San Antonio, TX, available at: www.3g.co.uk/3GHomeSearch.htm.

2. Ashbourn, J. (2000), Biometrics: Advanced Identity Verification, Springer, London.

3. Clarke, N. and Furnell, S. (2005a), “Authentication of users on mobile telephones – a survey of attitudes and opinions”, Computers & Security, Vol. 24 No. 7, pp. 519‐27.

4. Clarke, N. and Furnell, S. (2005b), “User authentication for mobile devices: a composite approach”, Proceedings of the 6th Australian Information Warfare and Security Conference, Geelong, pp. 48‐56.

5. Clarke, N., Furnell, S., Lines, B. and Reynolds, P. (2003), “Using keystroke analysis as a mechanism for subscriber authentication on mobile handsets”, Proceedings of the IFIP SEC 2003 Conference, Athens, Greece, May, pp. 97‐108.

Cited by 17 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3