hrsrBsl1fifid,ffi*] sf $*curity
n-Chief
of the
IISIA
Journal
Jemal. H. AbawaiY, Deakin University, Australia
piofessor ln Depa*ment of Computer Sclence at Purdue, USA
General
Information
of
IJSIA
Blbllographlc
Infortnatlon
r
ISSN:1738'9976o
Publisher: SERSCScier,ce
&
Englneerlng Research SupPist soCtetYConttct Informatloh
Sclence
&
Englneerlng Researchgupport
coCletYo
Head office: 20 Virglnia Court, Sandy Bay, Tasrhania, AustraliaPhorie
no.:
+51-3'9016-9027:
ilsla@sqrsc.orgSecurltY technology
Security Products or systems
Secure installation, generatlon and operation
SecuritY assurance
and lts Appllcations
vol.8. No,1 (2014)
a
a
i
q
-=l '1
1 j
I
,1
I
I
{r
Journal
ToPies
IIsIA
aims to facilltate and support 5-e1-e.arch related to .security technologyand the
ffirtiifinr.
rhe
topicsiorerii
by IJSIA lnclude the followlns:'ii.-iiii:i !;:..t1;1::1s:. !.':::i:;_q.:'.
tnt€rnatisnar ro$rnar or security
"H,i!:
ffiiil1lil
Intdnrmttonal
Jountal
of'Sueurity
and
It*
Apptleetiort
,'rF
Janu*ry }A}J-
Printsd
January
}}L{Published
Publisher:
SERSCFublishing
office:
Science andEngineering
ResearchSupport soCiety
Printing office:
20
Virginia Coutt,
SandyBay, tartnania, Australia
E-tnaii
: sersc@sersc.org;ijsia@sersc.org
Tel:
+61-3-9016-9021
Hanall
Co.
Ltd.
Tel: +82-2;2279-5494
L
&
E
E
ffi
Internationar Journar
"t
:i::'fi:ii,|.ii:![Ti:l;
http ://6;.66;.o rs I I 0. I 4257 / ilsia. 20 1 4. 8. l . 06
An Improved
Dominant Point
Feature
for
Ontine
Signature
Verification
Danna Putral,
Yogi
Pratamaz, Oka Sudana3 and,qdi Purnawana t'2'i'aDepartntentof
Information
Techn?logy, (ldayana t)niversity, Indonesia' ikgdarmaputra@gmail. com, l yo gipratama. ib@gmail. com,
1
agungo kas @unud. ac. id, a dos ena di@yaho o. c om
Abstract
Among the biometrie characteristic, signature forgery is the easiest way to do. Possibility
of
signatureforgery
similarity might be reaehed perfectly. This paper intoduceda
new technique to improve dominant point feature system based on its locationfor
online signature verification. Dynamic Time lYarpingis
usedto
match two signature features vector. The performance af system is tested by using 50 participants. Based on simulation result, system d,ccuracy without presence of the simple and trained impostors is 99,65% with rejectian erroris A% and acceptanee error is 0.i5%. llthile the current systems arefaced with the simple and
trained impostors, system accuracy became 9/,.04%
with
rejectionerror
is
1.6% and an average af acceptanceelror is
7.i6% with details asfollaws;
aeceptance erroris
0.08%,acceptance error of simple impostors is 4,4o/o, and acceptance error of trained impostors is
17.6%.The improved feature within
fusion
is produce better accuracy significantly thandominant pointfeature. Accuracy of the improvedfeature withinfusion
is
91.04%o, whereassystem dccuracy with just use the dominant pointfeature is 74.96%.
Keywords: Verification, Dominant Point, Biometric, Signature, Location
of
Dominant Pointsl.Introduction
Research and development
of
the biometric verilicationof
hurnan beings especially the signatures has been widely applied. Several kinds of methods have been used to minimize thelevel
of
signatrare forgery because signature is the easiest to forge whenit
compares to the other biometric characteristics[].
Possibilityof
signatures similarity might be reachedperfectly. Few people realiee that the possibility of the direction of motion of the signature is
different for each person.
It
becomes the uniqueness of the signature itself, then for reasonssuch as to minimize the possibility that the signature to be forged [2].
Several methods
have been
applied
to
the
biometrics(especially signatures) as identification or distinguishing between people with each other, they ate domirant point [3], stroke matching[4],
basedon writing
speed[5],
angle detection[6, 7],
suppofi vectormachine
[8],
mouse based signatures[9],
time
sequence[0],
localizedarc
pattern[ll],dynamic
RBF
networks andtime
series motifs[12],4
features (pen position, time, velocity, and pressure parameters)[3],
local dominant orientation [14], etc.Several studies have used dominant point as a research object
or
as ah object featureextraction such as planar curves [15], digital curve [16], handwritten of some script [17, 19],
and also signature detection. Recognition rate of the previous study that used dominant point as method
for
signature feature extractionin
signature recognitionis
about 96% with 2ArssN: 1738-9976 IJSIA
simple and trained impostors, the system cafl increase the accuracy more than 17 Yo, while
*iifio"t
simple and trained impostois can increase the accuracy more than 10 %. The online*igntne
verification systemin
this paper is very feasible to-be developed and applied foruritfr.nti.otioo
applicalions.For
future work,
we
would
develop
mobile
signature authentication sYstemReferences
tllD.Putra,"BiomefticSystem",Yogyakarta:ANDIOffset'Indonesia'(2009)'
itl
Z. nifr" i"a V. lrtutyas, ifiometriiAutqeglication Systerns', FI MU Report Series, (2000)'t3l
F. Soedjianto, r<. r,Jiluriri
*a
n. Adipranata,t!iqll*..
Recoenition with Dominant Point Method"'Petra Christian University Siwalankerto, Indontsia, (2006), pp. 121'l3l'
-
r,
. r !.-,,, *-^&t4t
L'J
H. Kai andy.
H;r;..d-iine
Signature VJrilngatiii!- plsed ou Stroke Matching", Elec*ical andinfo.rn*i* g.eineeriig University of Sydney, Australia' (2006)'
t5l
;.
A"ii; n:-c. -rrirA-rri?. und s.'D. Conneli, "on-line Signatr,re Verification", Department of ComputerScience and Bngineering, Michigan State University'
.
-t6l
e.["r.ii.ra
-,ia E.--;f,-fi;t*;"irgle Detection on nigit"t Curves", IEEE Trans. Comput., vol' C'22, (1973)SePtember, PP. 509 -522.
t71 A. Rosenfeld unO
l.-i.
Weszka, "An Improved Method of Angle Detection on Digital Curves", IEEE Trans.Comput', vol. G24, (1975) S€ptomber, pp' 940'941'lgl
L-i
i.
oriri.rf.
c*u.r
una'fi. si.(,.'onlinc sifriotore Verification with New Time series Kemels for Support Vector Machinsg", LNCS, vol' 3832' Springer, (2006)' eP' 50-0'198'rst
L.
Hansheus.p,
il;ir;*
-rnaO. vuni, i'irlourJ tiased Sigrratrnre verification for Secure Intem€t
L-r
;;;;;tt*t;i
state university of New York at Buffalo USA't10l
i:;;il;;;
id.diil;;
cl
["iugnl
an<ti.
xianfeng, "on-Line Handwritten signature verification Algorithm BasrdO;fl;;
Sequence", ins1iry1e for Scientific Computing And luformation' (2005)',lt
A. A. K. okasrd;;{tctrfi;;
i*"iu
voir,cutlon syrt*
with Localized Arc Pattern Method", Facultv of'-
-'
Engineering, Udayaua University, Bali, Indonosia' (2000)'tt2l
G. Christian, "Sig"adv.tification wittrDynilil
ItgF Nerwork and Time Series Motifs"' University ofPassau, GermaoY.
rt 3.1 M. Mailah and L. Boon, ,.Biometric signature verification using Pen Position, Timo, velocity And Pressure
' - -
'
P...rnr,.rs", UniversitiTeknologi Malaysia, (2008)'[14] J, Choi,
w
Kidr,Ifi;;;il!.
rlro
"nqr-tim.v*irting
Point Detection using The Local Dominantorientation signafirre", 3DTV Conference: The true vision-- capilre, Transmission and Display of 3D lnternational Journal of Security and lts Applications
Vol.8. No.1 (2014)
Video (3DTV'CON), (2011), PP. 1'4'
r15r
;:T'i'iffiffii';
M;dJ;;:o
*':--,,.'-:iXe-|{rffi..i1"1TT1*lill
r"o*tion
in Planar
Er#.r;l*i?os
i;;";;t"rIon
co*p'tt'*, ry1 8,no'l'
(zoo.s) M1:ll!,p;j.11^1?3;rr6t
;5;:"ni"'ffiti,
tilt",
:o1il.P.d;'ll:ll'y'l':,1:K'^::?":u':*
flff;i
IEEE rransactionson
il;;;Gis
anO tutacirine lntelligence, vol' 1l' n3' 8'.(1989) Auryi*1119-113'r1?r
l1TTil;'fi:"ffiffi;ilffi"t*;.**1;?;i
P.t"i:^::^-?{'f"i:y*:*1":ilf:l',,tryi',1$r;
i;"i}uilii}#ft;fi'#;;;ffi-w;'k'irp
uo Frontiers in Handwriting Recognition 0WFHR'02)IEEE, pp. 351-356,
tlsf
'f11;Ha';.1i.
i'*e,
'on-LineHandTT:'-1tp,hTH;'l::.1::Y
Recoenition using Dominatt Pointin i#ot?;, bBLP Pattim Recognition, vol. 30,1o' 1, (r997F"""t{y.:,tl'?J 11;
rler
ilili11';ff;';H;1ffiruffiYi:ili'ii-31Tx"l"i::'":E**:1,:*::,I?11ilil::1,1,Tffi3:"
I;,iil,h,,L:tt#;-$il;i;q!;!i4:y:4*r,*::::*:r"yx.'tX:l"l?*,"9,1,it1fi!;
rrnr
ilT:.
hlT:*,"#1ffiffi;i';;'"'In$
'11i;9:f::,*:dback
ror sketch Retrievar"' camegieift1l;;-di;Ity,
Electical and computer Engineering' (200CI iuu:'rvlEuou \,,YErDrw'
&rwwswer
--ia, *Han-i baom.try Verification Based-on Chain Code and
[21] I.KetutcedeDarmaPuEaandY
t1s*t-l
-.^^*-..r--A-rriaariaa.rnr 1R no 1] (2012).nt. l,,.22.brfi:Hl.Tff
"ffil#,
ffiuti"Jlo"*"r
oico;;;er
Application, vol. 38, no. 12, (2012),pp. r't'22'Copyrisht @ 2014 SERSC