Open Science Research Excellence

Open Science Index

Commenced in January 2007 Frequency: Monthly Edition: International Publications Count: 29526

Select areas to restrict search in scientific publication database:
Online Signature Verification Using Angular Transformation for e-Commerce Services
The rapid growth of e-Commerce services is significantly observed in the past decade. However, the method to verify the authenticated users still widely depends on numeric approaches. A new search on other verification methods suitable for online e-Commerce is an interesting issue. In this paper, a new online signature-verification method using angular transformation is presented. Delay shifts existing in online signatures are estimated by the estimation method relying on angle representation. In the proposed signature-verification algorithm, all components of input signature are extracted by considering the discontinuous break points on the stream of angular values. Then the estimated delay shift is captured by comparing with the selected reference signature and the error matching can be computed as a main feature used for verifying process. The threshold offsets are calculated by two types of error characteristics of the signature verification problem, False Rejection Rate (FRR) and False Acceptance Rate (FAR). The level of these two error rates depends on the decision threshold chosen whose value is such as to realize the Equal Error Rate (EER; FAR = FRR). The experimental results show that through the simple programming, employed on Internet for demonstrating e-Commerce services, the proposed method can provide 95.39% correct verifications and 7% better than DP matching based signature-verification method. In addition, the signature verification with extracting components provides more reliable results than using a whole decision making.
Digital Object Identifier (DOI):


[1] M. Fairhurst, K. Cowley, and E. Sweeney, "KAPPA Automatic Signature Verification: Signature Verification Public Trials and Public Survey on Biometrics," British Technology Group, Tech. Rep., 1994.
[2] C.-C. Hsu, L.-F. Chen, P.-C. Chang, and B.-S. Jeng, "On-line chinese signature verification based on multi-expert strategy," in Proc. 32nd Int. Carnahan Conf. Security Technology, 1998, pp. 169-173.
[3] R. Plamondon and G. Lorette, "Designing an automatic signature verifier: Problem definition and system description," in Computer Processing of Handwriting, R. Plamondon and C. G. Leedham, Eds. Singapore: World Scientific, 1990, pp. 3-20.
[4] S. H. Kim, M. S. Park, and J. Kim, "Applying personalized weights to a feature set for on-line signature verification," in Proc. 3rd Int. Conf. Document Analysis and Recognition,Montreal, QC, Canada, Aug. 1995, pp. 882-885.
[5] Y. Sato and K. Kogure, "On-line signature verification based on shape, motion, and writing pressure," in Proc. IEEE Int. Conf. Pattern Recognition, vol. 2, 1982, pp. 823-826
[6] L. L. Lee, T. Berger, and E. Aviczer, "Reliable on-line human signature verification systems," IEEE Trans. Pattern Anal. Machine Intell., vol. 18, no. 6, pp. 643-647, Jun. 1996.
[7] J. R. Yu, S. H. Kim, and J. Kim, "A class learning method for signature verification using dynamic programming," J. Korea Inst. Telemat. Electron., vol. 32-B, no. 2, pp. 154-161, 1995.
[8] B. Wirtz, "Stroke-based time warping for signature verification," in Proc. Int. Conf. Document Analysis and Recognition, vol. 1, 1995, pp. 179-182.
[9] J. G. A. Dolfing, "A comparison of ligature and contextual models for hidden Markov models based on on-line handwriting recognition," in Proc. Int. Conf. Acoustics, Speech, and Signal Processing, vol. 2, 1998, pp. 1073-1076.
[10] M. Fuentes, S. Garcia-Salicetti, and B. Dorizzi, "On Line Signature Verification: Fusion of a Hidden Markov Model and a Neural Network via a Support Vector Machine," Proc. Eighth Int-l Workshop Frontiers in Handwriting Recognition, 2002, pp. 253-258, Aug. 2002.
[11] J. G. A. Dolfing, "Handwriting recognition and verification: A hidden Markov approach," Ph.D. dissertation, Technische Universiteit Eindhoven, Eindhoven, The Netherlands, 1998.
[12] N.-J. Cheng, K. Liu, K.-C. Cheng, C.-C. Tseng, and B.-S. Jeng, "Online chinese signature verification using voting scheme," in Proc. 31st Annu IEEE Int. Carnahan Conf. Security Technology, 1997, pp. 123- 126.
[13] A. Kandel, Fuzzy Techniques in Pattern Recognition. New York: Wiley, 1982.
[14] M. Nadler and E. Smith, Pattern Recognition Engineering. New York: Wiley, 1993, pp. 299-302.
Vol:13 No:04 2019Vol:13 No:03 2019Vol:13 No:02 2019Vol:13 No:01 2019
Vol:12 No:12 2018Vol:12 No:11 2018Vol:12 No:10 2018Vol:12 No:09 2018Vol:12 No:08 2018Vol:12 No:07 2018Vol:12 No:06 2018Vol:12 No:05 2018Vol:12 No:04 2018Vol:12 No:03 2018Vol:12 No:02 2018Vol:12 No:01 2018
Vol:11 No:12 2017Vol:11 No:11 2017Vol:11 No:10 2017Vol:11 No:09 2017Vol:11 No:08 2017Vol:11 No:07 2017Vol:11 No:06 2017Vol:11 No:05 2017Vol:11 No:04 2017Vol:11 No:03 2017Vol:11 No:02 2017Vol:11 No:01 2017
Vol:10 No:12 2016Vol:10 No:11 2016Vol:10 No:10 2016Vol:10 No:09 2016Vol:10 No:08 2016Vol:10 No:07 2016Vol:10 No:06 2016Vol:10 No:05 2016Vol:10 No:04 2016Vol:10 No:03 2016Vol:10 No:02 2016Vol:10 No:01 2016
Vol:9 No:12 2015Vol:9 No:11 2015Vol:9 No:10 2015Vol:9 No:09 2015Vol:9 No:08 2015Vol:9 No:07 2015Vol:9 No:06 2015Vol:9 No:05 2015Vol:9 No:04 2015Vol:9 No:03 2015Vol:9 No:02 2015Vol:9 No:01 2015
Vol:8 No:12 2014Vol:8 No:11 2014Vol:8 No:10 2014Vol:8 No:09 2014Vol:8 No:08 2014Vol:8 No:07 2014Vol:8 No:06 2014Vol:8 No:05 2014Vol:8 No:04 2014Vol:8 No:03 2014Vol:8 No:02 2014Vol:8 No:01 2014
Vol:7 No:12 2013Vol:7 No:11 2013Vol:7 No:10 2013Vol:7 No:09 2013Vol:7 No:08 2013Vol:7 No:07 2013Vol:7 No:06 2013Vol:7 No:05 2013Vol:7 No:04 2013Vol:7 No:03 2013Vol:7 No:02 2013Vol:7 No:01 2013
Vol:6 No:12 2012Vol:6 No:11 2012Vol:6 No:10 2012Vol:6 No:09 2012Vol:6 No:08 2012Vol:6 No:07 2012Vol:6 No:06 2012Vol:6 No:05 2012Vol:6 No:04 2012Vol:6 No:03 2012Vol:6 No:02 2012Vol:6 No:01 2012
Vol:5 No:12 2011Vol:5 No:11 2011Vol:5 No:10 2011Vol:5 No:09 2011Vol:5 No:08 2011Vol:5 No:07 2011Vol:5 No:06 2011Vol:5 No:05 2011Vol:5 No:04 2011Vol:5 No:03 2011Vol:5 No:02 2011Vol:5 No:01 2011
Vol:4 No:12 2010Vol:4 No:11 2010Vol:4 No:10 2010Vol:4 No:09 2010Vol:4 No:08 2010Vol:4 No:07 2010Vol:4 No:06 2010Vol:4 No:05 2010Vol:4 No:04 2010Vol:4 No:03 2010Vol:4 No:02 2010Vol:4 No:01 2010
Vol:3 No:12 2009Vol:3 No:11 2009Vol:3 No:10 2009Vol:3 No:09 2009Vol:3 No:08 2009Vol:3 No:07 2009Vol:3 No:06 2009Vol:3 No:05 2009Vol:3 No:04 2009Vol:3 No:03 2009Vol:3 No:02 2009Vol:3 No:01 2009
Vol:2 No:12 2008Vol:2 No:11 2008Vol:2 No:10 2008Vol:2 No:09 2008Vol:2 No:08 2008Vol:2 No:07 2008Vol:2 No:06 2008Vol:2 No:05 2008Vol:2 No:04 2008Vol:2 No:03 2008Vol:2 No:02 2008Vol:2 No:01 2008
Vol:1 No:12 2007Vol:1 No:11 2007Vol:1 No:10 2007Vol:1 No:09 2007Vol:1 No:08 2007Vol:1 No:07 2007Vol:1 No:06 2007Vol:1 No:05 2007Vol:1 No:04 2007Vol:1 No:03 2007Vol:1 No:02 2007Vol:1 No:01 2007