access icon free Online signature verification using i-vector representation

Signature verification (SV) is one of the common methods for identity verification in banking, where for security reasons, it is very important to have an accurate method for automatic SV (ASV). ASV is usually addressed by comparing the test signature with the enrolment signature(s) signed by the individual whose identity is claimed in two manners: online and offline. In this study, a new method based on the i-vector is proposed for online SV. In the proposed method, a fixed-length vector, called i-vector, is extracted from each signature and then this vector is used for template making. Several techniques such as nuisance attribute projection (NAP) and within-class covariance normalisation (WCCN) are also investigated in order to reduce the intra-class variation in the i-vector space. In the scoring and decision making stage, they also propose to apply a 2-class support vector machine method. Experimental results show the proposed method could achieve 8.75% equal error rate (EER) on SigWiComp2013 database in the best case. On SVC2004 database, it also achieved 5% EER that means 11% relative improvement compared with the best reported result. In addition to its considerable accuracy gain, it has shown significant improvement in the computational cost over conventional dynamic time warping method.

Inspec keywords: pattern classification; support vector machines; digital signatures

Other keywords: equal error rate; online signature verification; low-dimensional i-vector representation; SVC2004 database; SV; 2-class support vector machine method; ASV; supervised binary classification task; cosine similarity; within-class covariance normalisation; SigWiComp2013 database; nuisance attribute projection; enrolment signature; fixed-length vector

Subjects: Knowledge engineering techniques; Data security

References

    1. 1)
      • 9. Liu, Y., Yang, Z., Yang, L.: ‘Online signature verification based on DCT and sparse representation’, IEEE Trans. Cybern., 2015, 45, (11), pp. 24982511.
    2. 2)
      • 57. Fierrez-Aguilar, J., Krawczyk, S., Ortega-Garcia, J., et al: ‘Fusion of local and regional approaches for on-line signature verificationAdvances in Biometric Person Authentication, 2005, pp. 188196.
    3. 3)
      • 7. Fierrez-Aguilar, J., Nanni, L., Lopez-Peñalba, J., et al: ‘An on-line signature verification system based on fusion of local and global information’. Audio and Video-based Biometric Person Authentication, 2005, pp. 523532.
    4. 4)
      • 2. Plamondon, R., Lorette, G.: ‘Automatic signature verification and writer identification: the state of the art’, Pattern Recognit., 1989, 22, (2), pp. 107131.
    5. 5)
      • 10. Jain, A.K., Griess, F.D., Connell, S.D.: ‘On-line signature verification’, Pattern Recognit., 2002, 35, (12), pp. 29632972.
    6. 6)
      • 14. Richiardi, J., Ketabdar, H., Drygajlo, A.: ‘Local and global feature selection for on-line signature verification’. 2005 Proc. Eighth Int. Conf. Document analysis and recognition, 2005, pp. 625629.
    7. 7)
      • 4. Kalera, M.K., Srihari, S., Xu, A.: ‘Offline signature verification and identification using distance statistics’, Int. J. Pattern Recognit. Artif. Intell., 2004, 18, (07), pp. 13391360.
    8. 8)
      • 55. Yeung, D.-Y., Chang, H., Xiong, Y., et al: ‘SVC2004: first international signature verification competition’, Biometric Authentication, 2004, pp. 1622.
    9. 9)
      • 23. Van, B.L., Garcia-Salicetti, S., Dorizzi, B.: ‘On using the Viterbi path along with HMM likelihood information for online signature verification’, IEEE Trans. Syst. Man Cybern. B, Cybern., 2007, 37, (5), pp. 12371247.
    10. 10)
      • 39. Reynolds, D.A., Quatieri, T.F., Dunn, R.B.: ‘Speaker verification using adapted Gaussian mixture models’, Digit. Signal Process., 2000, 10, (1), pp. 1941.
    11. 11)
      • 17. Kholmatov, A., Yanikoglu, B.: ‘Identity authentication using improved online signature verification method’, Pattern Recognit. Lett., 2005, 26, (15), pp. 24002408.
    12. 12)
      • 20. Martens, R., Claesen, L.: ‘Dynamic programming optimisation for on-line signature verification’. 1997 Proc. Fourth Int. Conf. Document Analysis and Recognition, 1997, vol. 2, pp. 653656.
    13. 13)
      • 31. Martınez, D., Plchot, O., Burget, L., et al: ‘Language recognition in i-vectors space’. InterSpeech, 2011, pp. 861864.
    14. 14)
      • 11. Lee, L.L., Berger, T., Aviczer, E.: ‘Reliable online human signature verification systems’, IEEE Trans. Pattern Anal. Mach. Intell., 1996, 18, (6), pp. 643647.
    15. 15)
      • 26. Richiardi, J., Drygajlo, A.: ‘Gaussian mixture models for on-line signature verification’. Proc. 2003 ACM SIGMM Workshop on Biometrics Methods and Applications, 2003, pp. 115122.
    16. 16)
      • 16. Lejtman, D.Z., George, S.E.: ‘On-line handwritten signature verification using wavelets and back-propagation neural networks’. 2001 Proc. Sixth Int. Conf. Document Analysis and Recognition, 2001, pp. 992996.
    17. 17)
      • 44. Campbell, W.M., Sturim, D.E., Reynolds, D.A., et al: ‘SVM based speaker verification using a GMM supervector kernel and NAP variability compensation’. IEEE Int. Conf. Acoustics, Speech and Signal Processing (ICASSP), 2006, pp. 97100.
    18. 18)
      • 22. Dolfing, J., Aarts, E., Van Oosterhout, J.: ‘On-line signature verification with hidden Markov models’. 1998 Proc. Fourteenth Int. Conf. Pattern Recognition, 1998, vol. 2, pp. 13091312.
    19. 19)
      • 48. Dehak, N., Kenny, P., Dehak, R., et al: ‘Support vector machines and joint factor analysis for speaker verification’. IEEE Int. Conf. Acoustics, Speech and Signal Processing (ICASSP), 2009, pp. 42374240.
    20. 20)
      • 45. Solomonoff, A., Quillen, C., Campbell, W.M.: ‘Channel compensation for SVM speaker recognition’. Odyssey – The Speaker and Language Recognition Workshop, 2004, vol. 4, pp. 219226.
    21. 21)
      • 15. Nanni, L.: ‘Experimental comparison of one-class classifiers for online signature verification’, Neurocomputing, 2006, 69, (7), pp. 869873.
    22. 22)
      • 56. Kholmatov, A., Yanikoglu, B.: ‘SUSIG: an on-line signature database, associated protocols and benchmark results’, Pattern Anal. Appl., 2009, 12, (3), pp. 227236.
    23. 23)
      • 47. Hatch, A.O., Kajarekar, S.S., Stolcke, A.: ‘Within-class covariance normalization for SVM-based speaker recognition’, InterSpeech, 2006, p. 1874.
    24. 24)
      • 41. Zeinali, H., Kalantari, E., Sameti, H., et al: ‘Telephony text-prompted speaker verification using i-vector representation’. IEEE Int. Conf. Acoustics, Speech and Signal Processing (ICASSP), 2015, pp. 48394843.
    25. 25)
      • 32. Bahari, M.H., Saeidi, R., Van Leeuwen, D., et al: ‘Accent recognition using i-vector, Gaussian mean supervector and Gaussian posterior probability supervector for spontaneous telephone speech’. IEEE Int. Conf. Acoustics, Speech and Signal Processing (ICASSP), 2013, pp. 73447348.
    26. 26)
      • 59. Nanni, L., Lumini, A.: ‘A novel local on-line signature verification system’, Pattern Recognit. Lett., 2008, 29, (5), pp. 559568.
    27. 27)
      • 52. Nautsch, A., Rathgeb, C., Busch, C.: ‘Bridging gaps: an application of feature warping to online signature verification’. 2014 Int. Carnahan Conf. Security Technology (ICCST), 2014, pp. 16.
    28. 28)
      • 25. Yang, L., Widjaja, B., Prasad, R.: ‘Application of hidden Markov models for signature verification’, Pattern Recognit., 1995, 28, (2), pp. 161170.
    29. 29)
      • 51. Zeinali, H., Sameti, H., Burget, L.: ‘HMM-based phrase-independent i-vector extractor for text-dependent speaker verification’, IEEE/ACM Trans. Audio Speech Lang. Process., 2017, 25, (7), pp. 14211435.
    30. 30)
      • 13. Lei, H., Govindaraju, V.: ‘A comparative study on the consistency of features in on-line signature verification’, Pattern Recognit. Lett., 2005, 26, (15), pp. 24832489.
    31. 31)
      • 43. Zeinali, H., Sameti, H., Burget, Č.J., et alText-dependent speaker verification based on i-vectors, deep neural networks and hidden Markov models’, Comput. Speech Lang., 2017, 46, pp. 5371.
    32. 32)
      • 42. Zeinali, H., Sameti, H., Burget, L., et al: ‘i-vector/HMM based text-dependent speaker verification system for RedDots challenge’. InterSpeech, 2016, pp. 440444.
    33. 33)
      • 46. Solomonoff, A., Campbell, W.M., Boardman, I.: ‘Advances in channel compensation for SVM speaker recognition’. IEEE Int. Conf. Acoustics, Speech and Signal Processing (ICASSP), 2005, pp. 629632.
    34. 34)
      • 50. Young, S., Evermann, G., Gales, M., et al: ‘The HTK book’, vol. 2 (Cambridge University Press, Cambridge University, London, UK, 1997).
    35. 35)
      • 58. Wang, K., Wang, Y., Zhang, Z.: ‘On-line signature verification using wavelet packet’. 2011 Int. Joint Conf. Biometrics (IJCB), 2011, pp. 16.
    36. 36)
      • 34. Khaki, H., Erzin, E.: ‘Continuous emotion tracking using total variability space’. InterSpeech, 2015.
    37. 37)
      • 30. Dehak, N., Torres-Carrasquillo, P.A., Reynolds, D.A., et al: ‘Language recognition via i-vectors and dimensionality reduction’. InterSpeech, 2011, pp. 857860.
    38. 38)
      • 18. Vivaracho-Pascual, C., Faundez-Zanuy, M., Pascual, J.M.: ‘An efficient low cost approach for on-line signature recognition based on length normalization and fractional distances’, Pattern Recognit., 2009, 42, (1), pp. 183193.
    39. 39)
      • 3. Impedovo, D., Pirlo, G.: ‘Automatic signature verification: the state of the art’, IEEE Trans. Syst. Man Cybern. C, 2008, 38, (5), pp. 609635.
    40. 40)
      • 35. Eghbal-zadeh, H., Lehner, B., Dorfer, M., et al: ‘CP-JKU submissions for DCASE-2016: a hybrid approach using binaural i-vectors and deep convolutional neural networks’, 2016.
    41. 41)
      • 19. Sato, Y., Kogure, K.: ‘Online signature verification based on shape, motion, and writing pressure’. Proc. Sixth Int. Conf. Pattern Recognition, 1982, pp. 823826.
    42. 42)
      • 37. Kenny, P., Ouellet, P., Dehak, N., et al: ‘A study of interspeaker variability in speaker verification’, IEEE Trans. Audio Speech Lang. Process., 2008, 16, (5), pp. 980988.
    43. 43)
      • 49. Maaten, L.V.D., Hinton, G.: ‘Visualizing data using t-SNE’, J. Mach. Learn. Res., 2008, 9, (Nov), pp. 25792605.
    44. 44)
      • 8. Nanni, L.: ‘An advanced multi-matcher method for on-line signature verification featuring global features and tokenised random numbers’, Neurocomputing, 2006, 69, (16), pp. 24022406.
    45. 45)
      • 36. Kenny, P., Boulianne, G., Ouellet, P., et al: ‘Joint factor analysis versus eigenchannels in speaker recognition’, IEEE Trans. Audio Speech Lang. Process., 2007, 15, (4), pp. 14351447.
    46. 46)
      • 21. Fierrez, J., Ortega-Garcia, J., Ramos, D., et al: ‘HMM-based on-line signature verification: feature extraction and signature modeling’, Pattern Recognit. Lett., 2007, 28, (16), pp. 23252334.
    47. 47)
      • 28. Humm, A., Hennebert, J., Ingold, R.: ‘Gaussian mixture models for chasm signature verification’. Machine Learning for Multimodal Interaction, 2006, pp. 102113.
    48. 48)
      • 33. Xia, R., Liu, Y.: ‘Using i-vector space model for emotion recognition’. InterSpeech, 2012.
    49. 49)
      • 40. Zeinali, H., Mirian, A., Sameti, H., et al: ‘Non-speaker information reduction from cosine similarity scoring in i-vector based speaker verification’, Comput. Electr. Eng., 2015, 48, pp. 226238.
    50. 50)
      • 6. Daramola, S.A., Ibiyemi, T.S.: ‘Offline signature recognition using hidden Markov model (HMM)’, Int. J. Comput. Appl., 2010, 10, (2), pp. 1722.
    51. 51)
      • 38. Kenny, P., Boulianne, G., Dumouchel, P.: ‘Eigenvoice modeling with sparse training data’, IEEE Trans. Speech Audio Process., 2005, 13, (3), pp. 345354.
    52. 52)
      • 54. Malik, M.I., Liwicki, M., Alewijnse, L., et al: ‘ICDAR 2013 competitions on signature verification and writer identification for on-and offline skilled forgeries (SigWiComp2013)’. 2013 12th Int. Conf. Document Analysis and Recognition (ICDAR), 2013, pp. 14771483.
    53. 53)
      • 1. Li, S.Z., Jain, A.: ‘Encyclopedia of biometrics’ (Springer Publishing Company, Incorporated, New York, US, 2015, 2nd edn.).
    54. 54)
      • 5. Singh, J., Sharma, M.: ‘Offline signature verification using neural networks’, i-Manager's J. Inf. Technol., 2012, 1, (4), p. 35.
    55. 55)
      • 29. Dehak, N., Kenny, P., Dehak, R., et al: ‘Front-end factor analysis for speaker verification’, IEEE Trans. Audio Speech Lang. Process., 2011, 19, (4), pp. 788798.
    56. 56)
      • 53. Ortega-Garcia, J., Fierrez-Aguilar, J., Simon, D., et al: ‘MCYT baseline corpus: a bimodal biometric database’, IEE Proc., Vis. Image Signal Process., 2003, 150, (6), pp. 395401.
    57. 57)
      • 24. Rúa, E.A., Castro, J.L.A.: ‘Online signature verification based on generative models’, IEEE Trans. Syst. Man Cybern. B, Cybern., 2012, 42, (4), pp. 12311242.
    58. 58)
      • 27. Miguel-Hurtado, O., Mengibar-Pozo, L., Lorenz, M.G., et al: ‘Online signature verification by dynamic time warping and Gaussian mixture models’. 2007 41st Annual IEEE Int. Carnahan Conf. Security Technology, 2007, pp. 2329.
    59. 59)
      • 12. Nanni, L., Lumini, A.: ‘Ensemble of Parzen window classifiers for on-line signature verification’, Neurocomputing, 2005, 68, pp. 217224.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-bmt.2017.0059
Loading

Related content

content/journals/10.1049/iet-bmt.2017.0059
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading