Escolar Documentos
Profissional Documentos
Cultura Documentos
PROBLEM STATEMENT
Rising use of smartphones has seen a rapid rise since last few years
in the field of e-commerce, secure transaction, approving financial
transactions, online voting system. This rise has led to several
challenges in terms of security and confidentiality. To ensure
successful deployment of transaction system which is secure at your
fingertips requires a strong verification system
E-Signature
Now what exactly is an E-Signature????
l
An electronic signature, or e-signature, is any electronic means that
indicates either that a person adopts the contents of an electronic
message, or more broadly that the person who claims to have written a
message is the one who wrote it.
l
When implemented in compliance to digital signature standards, e-signing
should offer end-to-end privacy with the signing process being user-friendly
and secure.
l One of the best examples of widespread use of electronic signature is in
the Baltics. Estonia, and most recently Latvia, have seen widespread
adoption of E-Sign systems by which all citizens are provided with the
means to electronically sign agreements
l Many companies have been aiming to launch applications for mobile phones
so that people can sign documents electronically when viewing contracts or
other documents on mobiles.
l eSign is an online electronic signature service in India to facilitate an
Aadhaar holder to digitally sign a document.
l
l
l
Currently used systems basically use some sort of device to incorporate a digitized signature
devices like stylus or Biometric smart pen(BiSP).
In BiSP system:
The dynamic of a signature is captured by sensors mounted inside the pen.
The recorded signature signals (i.e., signature time series) are presented to the authentication
system
Where they are classified by different static and dynamic classifiers using different features
BiSP System
l
Suggested System
Proposed system consists of three main components:Critical Segment
Extraction,Feature Extraction and Signature Normalization and Interpolation.
Critical Segment Extraction is the core component that captures the intrinsic
user signing behaviors by identifying the segments which remain stable within
the users genuine signature.
Feature Extraction in this our system extracts useful features to describe both
the geometric layout of the signature as well as the users signing behavior by
leveraging the rich set of information enabled by touch screens.
Signature Normalization and Interpolation is performed to reduce the impact
of signature geometric distortions caused by different writing sizes and
orientations on touch screens.
System identifies the users signing behavior and exploits the geometric
layout of the signature and the users behavior and physiological
characteristics to achieve accurate and robust online signature verification.
Algorithms used
The proposed system mainly makes extensive use of one algorithm
which is used in the critical segment identification of the signature.
The algorithm is referred to as Critical Segment Identification
Algorithm.
The above mentioned algorithm works functions by broadly
distributing the identification process into two well known
algorithms:
1.DTW-Dynamic Time Warping
2.DMS-Direct Matching Sample
Motivation.....
l
l
l
l
l
l
Society aspects:
Provides easy and secure transactions which inturn finds
applications in online voting system and other authentication based
systems(signing legal documents).
Environment aspects:
Eco-Friendly as use of papers is completely avoided.
Technology aspects:
Easy,reliable and robust with requirement of only a touch screen
phone.
Expected Outcome......
The proposed system identifies the critical segments, which remain invariant
within a users signature, to capture the users intrinsic signing behavior.
By leveraging the rich set of information enabled by touch screens, our
system extracts useful features to describe both the geometric layout of the
signature as well as a users behavioral and physiological characteristics
during the signing process.
Five or more features result in acceptable performance with over 95% true
positive rate and less than 5% false positive rate in all these three scenarios.
Furthermore, similar true positive rate and false positive rate are achieved
even if the attacker performs imitation attacks
References....
1)Yanzhi Ren, Chen Wang, Yingying Chen, Mooi Choo Chuah, Jie Yang Critical
Segment Based Real-time E-Signature for Securing Mobile Transactions 2015
IEEE Conference on Communications and Network Security (CNS).
2)Sunitha N.R., Amberker B.B A New method of verifying Digital Signatures in
E- Check Processing ICON 2008 16 th IEEE International Conference.
3)Christian Gruber Christian Hook,Jurgen Kempf,Georg Scharfenberg,and
Bernhard SickA Flexible Architecture for Online Signature Verification Based
on a Novel Biometric Pen2006 IEEE
-Wikipedia
-wired.com
THANK YOU...........