Abstract
Online signature verification is a currently evolving field. Numerous verification approaches are proposed each year that are claimed to be capable of delivering improved results in some aspects over others. These systems are usually based on the experiences of the author(s), and the results are often limited to single databases. These factors make it difficult to compare or even reproduce the results. The lack of negative results and evaluation of design choices make the creation of new, improved online verification systems difficult. In this work, we addressed this problem by conducting a systematic evaluation of the most common pre-processing techniques used in conjunction with dynamic time warping-based classification. We evaluated six different pre-processing methods on five databases and devoted over 30 000 computing hours to test 211 680 different verifier configurations. We identified several dead ends, narrowed down the design choices to the most promising configurations, and introduced a simple yet competitive configuration. To aid the research community, we have made all our results, data, and source code public. Our results may have broad implications for the signature verification field as they provide definitive answers for some questions that were previously addressed only through intuition or limited experimentation.
Subject
Artificial Intelligence,Computer Vision and Pattern Recognition,Human-Computer Interaction,Software
Reference51 articles.
1. Herbst B, Richards D. On an automated signature verification system. In: IEEE International Symposium on Industrial Electronics. Proceedings. ISIE’98 (Cat. No. 98TH8357). IEEE; Vol. 2, 1998. pp. 600–604.
2. A perspective analysis of handwritten signature technology;Diaz;ACM Computing Surveys (CSUR),2019
3. Embedded system for biometric online signature verification;López-García;IEEE Transactions on Industrial Informatics,2013
4. Biometrics verification: A literature survey;Mir;International Journal of Computing and ICT Research,2011
5. Online handwritten signature recognition by length normalization using up-sampling and down-sampling;Malallah;International Journal of Cyber-Security and Digital Forensics (IJCSDF),2015