scispace - formally typeset
Open AccessProceedings ArticleDOI

Online Payments Using Handwritten Signature Verification

TLDR
A system for enhancing the security of online payments using automated handwritten signature verification using complementary statistical models to analyse both the static and dynamic features of a signature to form a judgment about the signer's identity.
Abstract
Making payments online is inherently insecure, especially those involving credit cards where a handwritten signature is normally required to be authenticated. This paper describes a system for enhancing the security of online payments using automated handwritten signature verification. Our system combines complementary statistical models to analyse both the static features of a signature (e.g., shape, slant, size), and its dynamic features (e.g., velocity, pen-tip pressure, timing) to form a judgment about the signer's identity. This approach's novelty lies in combining output from existing Neural Network and Hidden Markov Model based signature verification systems to improve the robustness of any specific approach used alone. The system can be used to authenticate signatures for online credit card payments using an existing model for remote authentication. The system performs reasonably well and achieves an overall error rate of 2.1% in the best case.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Security improvement of credit card online purchasing system

TL;DR: A model which integrates the current authentication system of credit card with the fingerprint authentication with the overall accuracy rate was 99.48% and a ‘biometric and authorization code’ file is presented in this work to increase the fingerprint features security.
Patent

Load balancing in handwritten signature authentification system

TL;DR: In this article, the authors describe a load balancer configured to distribute authentication tasks to a plurality of worker machines, according to an ability of each worker to process urgent tasks, and further according to a relationship between the count of urgent requests and a count of nonurgent requests received by the biometric authentication system.
Proceedings ArticleDOI

Signature-in-Signature Verification via a Secure Simple Network Protocol

TL;DR: This work proposes a novel signature-in-signature verification system via a secure simple network protocol that stores the document with signature, which can be verified by any third person.
Journal ArticleDOI

Research on financial coordinated supervision platform and supervision strategy for online payment under paperless trade

TL;DR: This work proposes an industrial value chain model of financial coordinated supervision for online payment under paperless trade, and design's framework design includes design objective and function module, and the detailed design of the platform consists of business process, data standardisation, and interface standardisation.
Patent

Systems and Methods to Authenticate Users and/or Control Access Made by Users based on Enhanced Digital Identity Verification

TL;DR: In this article, a graphlet is extracted from a relation graph for digital identity verification, which contains data element nodes collected about access activities, such as user access context, payment instrument, address, device information, etc.
References
More filters
Journal ArticleDOI

New Directions in Cryptography

TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Journal ArticleDOI

A method for obtaining digital signatures and public-key cryptosystems

TL;DR: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
Journal ArticleDOI

A public key cryptosystem and a signature scheme based on discrete logarithms

TL;DR: A new signature scheme is proposed, together with an implementation of the Diffie-Hellman key distribution scheme that achieves a public key cryptosystem that relies on the difficulty of computing discrete logarithms over finite fields.
Journal ArticleDOI

Decision-level fusion in fingerprint verification

TL;DR: Four different fingerprint matching algorithms are combined using the proposed scheme to improve the accuracy of a fingerprint verification system and it is shown that a combination of multiple impressions or multiple fingers improves the verification performance by more than 4% and 5%, respectively.
Journal ArticleDOI

Personal identification based on handwriting

TL;DR: This paper attempts to eliminate the assumption that the written text is fixed by presenting a novel algorithm for automatic text-independent writer identification by taking a global approach based on texture analysis, where each writer's handwriting is regarded as a different texture.