2,494 research outputs found

    Visual identification by signature tracking

    Get PDF
    We propose a new camera-based biometric: visual signature identification. We discuss the importance of the parameterization of the signatures in order to achieve good classification results, independently of variations in the position of the camera with respect to the writing surface. We show that affine arc-length parameterization performs better than conventional time and Euclidean arc-length ones. We find that the system verification performance is better than 4 percent error on skilled forgeries and 1 percent error on random forgeries, and that its recognition performance is better than 1 percent error rate, comparable to the best camera-based biometrics

    Online Signature Verification: Present State of Technology

    Get PDF
    The way a person signs his or her name is known to be characteristic of that individual. Signatures are influenced by the physical and emotional conditions of a subject. A signature verification system must be able to detect forgeries, and, at the same time, reduce rejection of genuine signatures. Significant research has been conducted in feature extraction and selection for the application of on-line signature verification. All these features may be important for some problems, but for a given task, only a small subset of features is relevant. In addition to a reduction in storage requirements and computational cost, these may also lead to an improvement in general performance. On the other hand, selection of a feature subset requires a multi-criterion optimization function, e.g. the number of features and accuracy of classification. In this paper all these techniques are reviewed

    Open-set person identification based on mm-Wave Radar Point-clouds using Siamese Neural Networks.

    Get PDF
    openMillimeter-wave (mm-Wave) radar has been widely used in numerous applications in recent years, including drive-assistance system or short-range sensing due to its numerous advantages over other sensing technologies. The mm-Wave radar can measure the micro-Doppler phenomenon caused by moving objects in a scene, including people. The micro-Doppler effect induced by hunan gait has been proved to be a weak biometric identifier, due to the unique way of walking of each individual. In this work, we propose an open-set person identification based on the obtained mm-Wave radar point-clouds which intend to distinguish a new, unknown person from a known set of people. There are three main tasks studied: (1) extending a deep learning classification model to better distinguish unknown subjects in an open-set scenario; (2) applying Siamese Neural Network (SNN) for open-set identification to detect the new person in the recognized group of people; (3) evaluating the proposed method on our own measured data from a mm-Wave device on 20 subjects. We obtain useful experimental results to guide future work in this area.Millimeter-wave (mm-Wave) radar has been widely used in numerous applications in recent years, including drive-assistance system or short-range sensing due to its numerous advantages over other sensing technologies. The mm-Wave radar can measure the micro-Doppler phenomenon caused by moving objects in a scene, including people. The micro-Doppler effect induced by hunan gait has been proved to be a weak biometric identifier, due to the unique way of walking of each individual. In this work, we propose an open-set person identification based on the obtained mm-Wave radar point-clouds which intend to distinguish a new, unknown person from a known set of people. There are three main tasks studied: (1) extending a deep learning classification model to better distinguish unknown subjects in an open-set scenario; (2) applying Siamese Neural Network (SNN) for open-set identification to detect the new person in the recognized group of people; (3) evaluating the proposed method on our own measured data from a mm-Wave device on 20 subjects. We obtain useful experimental results to guide future work in this area

    Malware Visualization and Similarity via Tracking Binary Execution Path

    Get PDF
    Today, computer systems are widely and importantly used throughout society, and malicious codes to take over the system and perform malicious actions are continuously being created and developed. These malicious codes are sometimes found in new forms, but in many cases they are modified from existing malicious codes. Since there are too many threatening malicious codes that are being continuously generated for human analysis, various studies to efficiently detect, classify, and analyze are essential. There are two main ways to analyze malicious code. First, static analysis is a technique to identify malicious behaviors by analyzing the structure of malicious codes or specific binary patterns at the code level. The second is a dynamic analysis technique that uses virtualization tools to build an environment in a virtual machine and executes malicious code to analyze malicious behavior. The method used to analyze malicious codes in this paper is a static analysis technique. Although there is a lot of information that can be obtained from dynamic analysis, there is a disadvantage that it can be analyzed normally only when the environment in which each malicious code is executed is matched. However, since the method proposed in this paper tracks and analyzes the execution stream of the code, static analysis is performed, but the effect of dynamic analysis can be expected.The core idea of this paper is to express the malicious code as a 25 25 pixel image using 25 API categories selected. The interaction and frequency of the API is made into a 25 25 pixel image based on a matrix using RGB values. When analyzing the malicious code, the Euclidean distance algorithm is applied to the generated image to measure the color similarity, and the similarity of the mutual malicious behavior is calculated based on the final Euclidean distance value. As a result, as a result of comparing the similarity calculated by the proposed method with the similarity calculated by the existing similarity calculation method, the similarity was calculated to be 5-10% higher on average. The method proposed in this study spends a lot of time deriving results because it analyzes, visualizes, and calculates the similarity of the visualized sample. Therefore, it takes a lot of time to analyze a huge number of malicious codes. A large amount of malware can be analyzed through follow-up studies, and improvements are needed to study the accuracy according to the size of the data set

    Handwritten signature verification by independent component analysis

    Get PDF
    This study explores a method that learns about the image structure directly from the image ensemble in contrast to other methods where the relevant structure is determined in advance and extracted using hand-engineered techniques. In tasks involving the analysis of image ensembles, important information is often found in the higher-order relationships among the image pixels. Independent Component Analysis (ICA) is a method that learns high-order dependencies found in the input. ICA has been extensively used in several applications but its potential for the unsupervised extraction of features for handwritten signature verification has not been explored. This study investigates the suitability of features extracted from images of handwritten signatures using the unsupervised method of ICA to successfully discriminate between different classes of signatures.peer-reviewe

    HANDWRITTEN SIGNATURE VERIFICATION BASED ON THE USE OF GRAY LEVEL VALUES

    Get PDF
    Recently several papers have appeared in the literature which propose pseudo-dynamic features for automatic static handwritten signature verification based on the use of gray level values from signature stroke pixels. Good results have been obtained using rotation invariant uniform local binary patterns LBP plus LBP and statistical measures from gray level co-occurrence matrices (GLCM) with MCYT and GPDS offline signature corpuses. In these studies the corpuses contain signatures written on a uniform white “nondistorting” background, however the gray level distribution of signature strokes changes when it is written on a complex background, such as a check or an invoice. The aim of this paper is to measure gray level features robustness when it is distorted by a complex background and also to propose more stable features. A set of different checks and invoices with varying background complexity is blended with the MCYT and GPDS signatures. The blending model is based on multiplication. The signature models are trained with genuine signatures on white background and tested with other genuine and forgeries mixed with different backgrounds. Results show that a basic version of local binary patterns (LBP) or local derivative and directional patterns are more robust than rotation invariant uniform LBP or GLCM features to the gray level distortion when using a support vector machine with histogram oriented kernels as a classifier
    • …
    corecore