91
Views
10
CrossRef citations to date
0
Altmetric
Articles

Dynamic handwritten signature and machine learning based identity verification for keyless cryptocurrency transactions

, , , &

References

  • Gawande, U. and Golhar, Y. Biometric security system: a rigorous review of unimodal and multimodal biometrics techniques. International Journal of Biometrics, 10(2), pp.142-175 (2018). doi: 10.1504/IJBM.2018.091629
  • Jain, A.K., Bolle, R. and Pankanti, S. eds., Biometrics: personal identification in networked society (Vol. 479). Springer Science & Business Media (2006).
  • Tolosana R, Vera-Rodriguez R, Fierrez J, Ortega-Garcia J. Presentation Attacks in Signature Biometrics: Types and Introduction to Attack Detection. In Handbook of Biometric Anti-Spoofing (pp. 439-453). Springer, Cham (2019).
  • Crane, H.D. and Ostrem, J.S., Automatic signature verification using a three-axis force-sensitive pen. IEEE Transactions on Systems, Man, and Cybernetics, 13(3), pp.329-337 (1983). doi: 10.1109/TSMC.1983.6313165
  • Baron, R. and Plamondon, R., Acceleration measurement with an instrumented pen for signature verification and handwriting analysis. IEEE Transactions on Instrumentation and Measurement, 38(6), pp.1132-1138 (1989). doi: 10.1109/19.46414
  • Kholmatov, A., Biometric identity verification using on-line & offline signature verification. Master’s thesis, Sabanci University (2003).
  • Leclerc, F. and Plamondon, R., Automatic signature verification: The state of the art—1989–1993. International journal of pattern recognition and artificial intelligence, 8(03), pp.643-660 (1994). doi: 10.1142/S0218001494000346
  • Parizeau, M. and Plamondon, R., A comparative analysis of regional correlation, dynamic time warping, and skeletal tree matching for signature verification. IEEE Transactions on Pattern Analysis and Machine Intelligence, 12(7), pp.710-717 (1990). doi: 10.1109/34.56215
  • L. Claesen and R. Martens, “Dynamic Programming Optimisation for On-line Signature Verification,” Proceedings of the Fourth International Conference on Document Analysis and Recognition(ICDAR), Ulm, GERMANY, pp. 653-656 (1997).
  • Kholmatov, A. and Yanikoglu, B., Identity authentication using improved online signature verification method. Pattern recognition letters, 26(15), pp.2400-2408 (2005). doi: 10.1016/j.patrec.2005.04.017
  • Fierrez, J., Ortega-Garcia, J., Ramos, D. and Gonzalez-Rodriguez, J., HMM-based on-line signature verification: Feature extraction and signature modeling. Pattern recognition letters, 28(16), pp.2325-2334. (2007) doi: 10.1016/j.patrec.2007.07.012
  • Nanni, L. and Lumini, A., A novel local on-line signature verification system. Pattern Recognition Letters, 29(5), pp.559-568 (2008). doi: 10.1016/j.patrec.2007.10.003
  • Rashidi, S., Fallah, A. and Towhidkhah, F., Feature extraction based DCT on dynamic signature verification. Scientia Iranica, 19(6), pp.1810-1819 (2012). doi: 10.1016/j.scient.2012.05.007
  • Shastry, A., Burchfield, R. and Venkatesan, S., May. Dynamic signature verification using embedded sensors. In Body Sensor Networks (BSN), 2011 International Conference on (pp. 168-173). IEEE (2011).
  • Nakamoto, S., Bitcoin: A peer-to-peer electronic cash system (2008).
  • Lazarenko, A. and Avdoshin, S., November. Financial Risks of the Blockchain Industry: A Survey of Cyberattacks. In Proceedings of the Future Technologies Conference (pp. 368-384). Springer, Cham. (2018).

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.