A perspective analysis of handwritten signature technology

M Diaz, MA Ferrer, D Impedovo, MI Malik… - Acm Computing …, 2019 - dl.acm.org
Handwritten signatures are biometric traits at the center of debate in the scientific
community. Over the last 40 years, the interest in signature studies has grown steadily …

Review of key‐binding‐based biometric data protection schemes

D Sadhya, SK Singh, B Chakraborty - IET Biometrics, 2016 - Wiley Online Library
With the advent of modern technology, the use of biometric authentication systems has been
on the rise. The core of any biometric system consists of a database which contains the …

Handwritten signature verification: New advancements and open issues

D Impedovo, G Pirlo… - … Conference on Frontiers in …, 2012 - ieeexplore.ieee.org
Recently, research in handwritten signature verification has been considered with renewed
interest. In fact, in the age of e-society, handwritten signature still represents an …

A bio-cryptographic system based on offline signature images

GS Eskander, R Sabourin, E Granger - Information sciences, 2014 - Elsevier
In bio-cryptography, biometric traits are replacing traditional passwords for secure exchange
of cryptographic keys. The Fuzzy Vault (FV) scheme has been successfully employed to …

Fuzzy feature selection with key-based cryptographic transformations

M Nkongolo - arXiv preprint arXiv:2306.09583, 2023 - arxiv.org
In the field of cryptography, the selection of relevant features plays a crucial role in
enhancing the security and efficiency of cryptographic algorithms. This paper presents a …

On the dissimilarity representation and prototype selection for signature-based bio-cryptographic systems

GS Eskander, R Sabourin, E Granger - … , SIMBAD 2013, York, UK, July 3-5 …, 2013 - Springer
Robust bio-cryptographic schemes employ encoding methods where a short message is
extracted from biometric samples to encode cryptographic keys. This approach implies …

User verification using safe handwritten passwords on smartphones

T Kutzner, F Ye, I Bönninger, C Travieso… - 2015 Eighth …, 2015 - ieeexplore.ieee.org
This article focuses on the writer verification using safe handwritten passwords on
smartphones. We extract and select 25 static and dynamic biometric features from a …

Temporal phase congruency

PJ Myerscough, MS Nixon - 6th IEEE Southwest Symposium …, 2004 - ieeexplore.ieee.org
We describe a robust moving feature detector that extracts feature points and feature
velocities from a sequence of images. We develop a new approach based on phase …

Gradient-based facial encoding for key generation to encrypt and decrypt multimedia data

AK Patel, D Paul, S Chaudhary, S Giri - arXiv preprint arXiv:2412.06927, 2024 - arxiv.org
Password-based security is prone to forgetting, guessing, and hacking. Similarly, standalone
biometric-based security is susceptible to template spoofing and replay attacks. This paper …

A Dissimilarity-Based Approach for Biometric Fuzzy Vaults–Application to Handwritten Signature Images

GS Eskander, R Sabourin, E Granger - New Trends in Image Analysis and …, 2013 - Springer
Bio-Cryptographic systems enforce authenticity of cryptogra-phic applications like data
encryption and digital signatures. Instead of simple user passwords, biometrics, such as …