{"title":"Online Signature Verification Algorithm Using Hill-Climbing Method","authors":"D. Muramatsu","doi":"10.1109/EUC.2008.84","DOIUrl":null,"url":null,"abstract":"Attacks using hill-climbing methods have been reported as a vulnerability of biometric authentication systems. In this paper, the author proposes a robust online signature verification algorithm against attacks using the hill-climbing method. Specifically, the attack considered in this paper is a hill-climbing forged data attack. Artificial forgeries are generated by using the hill-climbing method and the forgeries are input to a target system to be attacked. In order to generate a robust algorithm, the author proposes incorporating the hill-climbing method into an online signature verification algorithm. Preliminary experiments were performed using several online signature databases. The results show that the proposed algorithm improved the performance against this kind of attack. Equal Error Rate (EER) was improved from 88.3% to 1.2% when using a private database for evaluation.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"70 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EUC.2008.84","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 11
Abstract
Attacks using hill-climbing methods have been reported as a vulnerability of biometric authentication systems. In this paper, the author proposes a robust online signature verification algorithm against attacks using the hill-climbing method. Specifically, the attack considered in this paper is a hill-climbing forged data attack. Artificial forgeries are generated by using the hill-climbing method and the forgeries are input to a target system to be attacked. In order to generate a robust algorithm, the author proposes incorporating the hill-climbing method into an online signature verification algorithm. Preliminary experiments were performed using several online signature databases. The results show that the proposed algorithm improved the performance against this kind of attack. Equal Error Rate (EER) was improved from 88.3% to 1.2% when using a private database for evaluation.