首页    期刊浏览 2024年11月25日 星期一
登录注册

文章基本信息

  • 标题:Authentication method based on holographic signature recognition system using physical modelling of a pen.
  • 作者:Mihailescu, Marius Iulian ; Diaconescu, Stefan Stelian ; Rusu, Sorin Mircea
  • 期刊名称:Annals of DAAAM & Proceedings
  • 印刷版ISSN:1726-9679
  • 出版年度:2011
  • 期号:January
  • 语种:English
  • 出版社:DAAAM International Vienna
  • 摘要:Key words: biometric, handwritten, holographic signature
  • 关键词:Data encryption chips;Data security devices

Authentication method based on holographic signature recognition system using physical modelling of a pen.


Mihailescu, Marius Iulian ; Diaconescu, Stefan Stelian ; Rusu, Sorin Mircea 等


Abstract: Our article discusses a Biometric Recognition System (BRS) that represents a valid solution for security problems regarding the accessibility through internet, even if it isn't providing an easy and clear environment for users and operators with a medium level of competence. The solution we provide will solve this gap by giving the possibility for users to authenticate in the system through an interface or a simple sheet paper by physical modeling of a hardware pen which emulates the handwritten signature, instead of using the conventional routines for access to the authentication system. In addition, the interface takes in consideration the fail to enroll, as the quality of the signature obtained is calculated during the acquisition time.

Key words: biometric, handwritten, holographic signature

1. INTRODUCTION

This article's aim is to develop and introduce a new notion and physical device for avoiding unauthorized access to a system. The method represents the hardware proposal of the hardware pen used as kinetic pattern's digital conversion for electronic format of the handwritten signature.

The following system includes an authentication procedure based on handwritten signature, with the purpose to raise the security level for on-line authentication and reduce time allocated for implementing and developing the authentication system by the developers of these types of solutions, by offering this unique service, unbreakable and easy to integrate.

In the theory of holographic algorithms, proposed by Leslie Vailant, the signature plays an important role. The signature theory is substantially developed using holographic algorithms, d-realizability and d-admissibility.

In this article, we have to take in consideration the fact that the concept of efficient reductions represents one of the most fundamental notion on which the theory of computational complexity is build. [2008b]

Let's imagine the following scenario from Figure 1: you have a paper and a smart pen that is connected to the computer. The person wants to authenticate to the application by writing on the paper its signature. The article takes in consideration the invention and patent [2006] for a computer-based system developed for the acquisition, analysis and authentication of the handwritten signature. The person executing the handwritten signature performs a set of three-dimensional movements with a plane graphical finality. The movements generating kinetic details are received by the special pen (as being performed with bio-kinetic template), and is collected by the MEMS (micro-electromechanical-systems) type acceleration sensors in the pen. The systems that we develop continue to analyze the generated information (the signals) and determine the dynamic-biometrical characteristics, based on the biometrical dimension of the information. After this, the characteristics are putted into data vectors and invariants which are stored in the database. The system performs the necessary comparisons between the spatial kinetics of the specimens and the kinetics of the inputs and obtains types of distance answers. If we are looking at this from the point of view of statistical terms, the results are related to the entire subject database, by interpreting and sampling methods.

2. THE PHYSICAL STRUCTUE OF THE AUTHENTICATION SYSTEM

The process of handwritten input nowadays has two points of origin and three targets. Two types for data acquisition are identified: off-line and on-line. The off-line method is characterized by two-dimensional images or pictures of text which are received as input, and in the on-line method, the input data are available as a set of signals, representing the movements of the pen.

[FIGURE 1 OMITTED]

The system proposed by us is represented on three architectural levels, accomplishing the following:

Level 1 N1: Corresponds to subsystem 1--S1 consists of two indissoluble entities: the writing device and the kinetic computer-based assembly. Subsystem 1--S1. Functions:

1. The pen has dimension and functions assimilative to an ordinary pen, plus the necessary elements and functions to capture, digitize the bio-kinetic patterns and the context information and, then, send them to the second level. The pen shape is given in figure 2.

2. The kinetic computer-based assembly, placed in the pen, has the following functions: acquisition, digital conversion in electronic format of the kinetic pattern and the context information, encoding it in a specific format and transmitting it to the second level--N2. Of course, here NPL has an important role.

Level 2 (N2): "Client Application" is materialized in subsystem 2--S2 and subsystem 3--S3 integrated in a personal computer. By its nature, the computer allocates in a sequential or parallel manner the hardware resources to the methods and algorithms implemented in Level 2, thus forming subsystem 2 and subsystem 3 that have the following functions:

Level 3 (N3) is physically materialized by a multiprocessing computer, that allocates in sequential or parallel manner the hardware resources to the methods and algorithms implemented in level 3, thus forming subsystem 4--S4 and subsystem 5--$5 which have the following functions:

[FIGURE 2 OMITTED]

The components of the pen are:

1. PCB--printed circuit board

2. MEMS--acceleration sensors Microsystems A, respectively B. Each MEMS microsystem contains two acceleration sensors orthogonally disposed.

3. The IR (Infra-Red) light transmitter 4 sends out a beam with length wave of approximately 800 nn. The beam illuminates in IR the writing paper. The IR light receiver C captures by reflection from paper 5 a quantity of IR light flux proportional to the paper distance and, by means of the analogical comparison instrument from the microcontroller 6. [2010]

4. Microcontroller 6 is used for the acquisition of the information sent by the sensors. The information contained in the bio kinetic pattern is captured, digitized and transferred under the control of a typical program (firmware ASM), that administrates the functioning of the main components integrated in the microcontroller.

5. Integrated micro system 7 for converting and transmitting the acquired data to level 2, in USB format and protocol.

6. USB connection cable 8 for connecting level 1 to level 2. A cable connection was chosen for three main reasons: avoiding unauthorized scanning of the information transmitted to Level 2.

For more information about technical and physical aspects of the pen, it's necessary to consult the patent [2006].

3. EXPERIMENTAL RESULTS

In this paper, we've used many examples of signatures for multimodal biometric authentication. This rate is about 12.5 percents of all. Adding the two mentioned behavioral biometrics (mouse movements and keystroke dynamics) in this solution reduces the need for authentication through multimodal biometric. Another advantage of the proposed system compared with other existing solutions, is the fact that it doesn't need high bandiwth.

4. CONCLUSIONS AND FUTURE WORK

In this paper we have presented a system for acquisition, analysis and authentication of the handwritten signature, bringing in discussion all the elements that form the system's project. To capture a substantial part of holographic algorithms, we've defined the notion of holographic templates and the device used for signing. It is necessary to understand the theory of holographic algorithms (which isn't the main subject of the article, but it's necessary to bring in discussion). For more details, it's also needed to read and understand the Vailant Leslie's study about Holographic Algorithms. It's not the right moment to make speculations on the last capability of all the holographic algorithms [2010]. The system project proposes to satisfy the necessities described above by including an authentication method based on holographic signature in all authentication on-line services (banking, eLearning, government, etc.) or, in general, in the entire authentication module in which an internet connection is used. As a future developing line, the system will build a SDK, offered to application developers, which will lead to conceiving facilities of the sub-systems with the authentication role.

4. REFERENCES

R. C., & Clarke, R. (2011). Biometrics and Privacy Biometrics. Biometrics, 1-14

Agulla, Gonzales, E., Rua, Argones, Alba, Luis, Castro. (2009) .Multimodal Biometrics-based on Student Attendance Measurement in Learning Managament Systems. 11th IEEE International Symposium Multimedia

Sonkamble, S., & Sonkamble, B. (2010). Survey of biometric recognition systems and their applications. Journal of Theoretical and Applied Information Technology Yevgeni, D., Rafail, O., Leonid, R., Smith, A. (2008a). Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. SIAM Journal of Computing, 38(1):97-139

Reilly, M. A., & Andley, U. P. (2010). Quantitative biometric phenotype analysis in mouse lenses. Molecular Vision, 16, 1041-1046. Molecular Vision

Kholmatov, A., Yanikoglu, B. (2008b) Realization of correlation attack against fuzzy vault scheme. In Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, volume 6819 of Proceedings of SPIE

*** (2006) System and Methods of Acquisition and Authentification of the Handwritten Signature. Pattent Number WO 2006/085783, http://www.wipo.int/patentscope/search/en/WO200608578
Tab. 1. Attendance rate percentage in virtual environments
using the proposed solution

 Attendance rate Attendance Actual
 with a rate with a attendance
 threshold of threshold of rate
 2% 5%

Person 1 98% 98% 100%
Person 2 93% 100% 100%
Person 3 97% 98% 100%
Person 4 90% 95% 100%
Person 5 74% 60% 60%
Person 6 75% 80% 89%
Person 7 49% 9% 50%
Person 8 12% 50% 5
联系我们|关于我们|网站声明
国家哲学社会科学文献中心版权所有