The present invention relates to the field of handwritten signature verification. More particularly, the invention relates to a method for verifying handwritten signatures online using wrist-worn devices.
Financial fraud is a common occurrence across the globe, causing a significant amount of damage to the global economy. According to a recent survey, around 37.8 million incidents of fraud took place in 2011 in the US, resulting in a loss of around $40 to $50 billion. Despite prevention efforts of banks, businesses and the law enforcement community, paper checks continue to lead as the payment type most susceptible to fraud and as the payment method accounting for the largest dollar amount of loss due to fraud (1.2 Billion dollars in 2011 alone).
Paper checks, as well as other legal, financial and administrative documents, commonly rely on handwritten signature verification systems to protect against fraud. In a typical handwritten signature verification system, a user claims to be a particular individual, and provides a signature sample thereof. The role of the verification system is to determine, based on the signature sample, whether the user is indeed who he is claimed to be.
Signature verification systems can be classified into two approaches: the offline approach that relies on the static handwriting image and the online approach that relies on the dynamic trajectory of the pen tip. While the latter approach usually requires a designated ad-hoc device (commonly called a digitizer), the additional time dimension provides valuable information about the signature, therefore leading to a higher verification performance, in general.
More specifically, signature verification systems aim to automatically classify query signatures as genuine (i.e. confirm that they were signed by the claimed user) or forged.
Depending on the data acquisition type, signature verification systems can be classified as online (dynamic) or offline (static) verification. Traditional signature verification systems are based on the offline handwriting image. In this case, signatures are represented as digital images, usually in grayscale format, comprising of a set of points (x,y); 0≤x≤H; 0≤y≤W, where H and W denote the height and width of the image.
In contrast, online signature verification systems take the dynamic writing process into account. Signatures are represented by a pen tip trajectory measurement that captures the position of a pen over time; depending on the digitizer, this may be accompanied by additional measurements of the pressure and pen inclination. In this case, the signatures are represented as a sequence (n); n=1, . . . , N, where S(n) is the signal sampled at time n·Δt and Δt is the sampling interval. Clearly, the additional time dimension captured by online systems provides valuable information about the signature, thereby leading to a higher level of verification performance.
A feature-based online signature verification approach represents signatures as feature vectors. Dynamic Time Warping (DTW an algorithm for measuring similarity between two temporal sequences which may vary in speed) matches signatures directly with reference samples of the claimed user and is particularly useful if only a few reference signatures are available, which is a typical scenario. More specifically, DTW computes a dissimilarity score between two time sequences. Taking into account the (possibly different) lengths of the two sequences, the sequences are aligned along a common time axis such that the sum of Euclidean distances between the feature vectors along the warping path is minimal. With regard to signatures, DTW matches two signatures by aligning the pen-tip trajectory measurements along a common time axis. The resulting distance depends on the sequence length of the two signatures and needs to be compared with a threshold, in order to accept or reject the claimed identity.
In contrast, a function-based online signature verification approach takes complete time sequences into account. This approach is known to provide a data security advantage, since the original signature no longer has to be stored in the database. However, it was recently showed that homomorphic encryption (a method which preserves certain mathematical operations when transferring from plaintext to ciphertext and vice versa) can be easily applied to function-based methods such as Dynamic Time Warping, thereby offering a security element to the function-based approach without compromising its accuracy. Therefore, the feature-based approach is considered as having a prominent security advantage over the function-based approach is no longer warranted.
Several variations of the function-based approach use a Discrete Cosine Transform (DCT—a transform that expresses a finite sequence of data points in terms of a sum of cosine functions oscillating at different frequencies) compression of the signal instead of using its raw form. While mainly used in the field of speech recognition, the effect of using DCT has been found to be significant in signature verification systems.
A variety of works suggested the use of wearable devices for the tasks of user authentication and gesture recognition. Most of these works rely on the motion sensors (typically accelerometer and gyroscope) embedded in the devices to detect and understand unique movements of the person wearing the device.
Wrist-worn devices, such as smartwatches and fitness trackers, have become a popular category of wearable devices, and many major manufacturers, including Samsung® and Apple®, have released their devices. Since these devices are worn on the wrist, they introduce a unique opportunity to both detect and understand a user's arm, hand and finger movements. However, this is limited to the gestures of a specific finger, and gestures using other fingers cannot be identified. Wrist-worn devices are less limited as they facilitate gesture recognition based on the arm, the hand and all of the fingers.
While there has been a lot of research and development in the field of user authentication using smartphone devices, there have been only a few results that aimed to authenticate users using wearable devices.
US 2016/0034041A1 discloses a method is suggested by which the veins of a smartwatch user are used to authenticate his/her identity. In the field of handwriting analysis, several recent approaches have tried to use motion data collected from wearable devices to recognize different writing gestures such as inferring the letter written. However none of the existing approaches have addressed the task of handwritten signature verification using motion data collected from wearable devices in general and wrist-worn devices in particular.
It is therefore an object of the present invention to provide a verification system that combines the function-based and feature-based approaches.
It is another object of the invention to provide a system that uses a single classification model that is trained only once using a relatively small set of genuine and forged signatures.
It is yet another object of the invention to provide a system for verifying handwritten signatures using motion data collected from a wrist-worn device.
Other objects and advantages of this invention will become apparent as the description proceeds.
The present invention is directed to a method for online signature verification using worn devices (preferably wrist-worn devices), comprising the following steps:
The predefined set of features may comprise nine features that together describe a signature and distinguish one signature from another and describe the relation to other signatures.
The scaling may comprise computing Euclidean distances by means of Dynamic Time Warping (DTW).
The domain transforming may comprise a Discrete Cosine Transformation (DCT).
The one or more motion sensors may be provided in the worn devices and may be selected from the group of;
In one aspect, the features are extracted by the following steps:
In one aspect, a questioned signature q is verified by:
The present invention is also directed to a signature verification system, which comprises:
In the drawings:
The present invention refers to a method and system for online signature verification using wrist-worn devices. The term “online” used herein refers to a process which takes place at the same time as another process, in contrast to an “offline” process that takes place only when another process ends.
Handwritten signatures are verified by analyzing motion data (that may be obtained for example, from accelerometer and gyroscope measurements) obtained from motion sensors (such as accelerometers and gyroscopes) of wrist-worn devices. The verification process comprises two phases: a training phase and an operation phase.
The scaling, transformation and feature extraction processes of lines 14, 15 and 16, respectively, and as shown in the training process in
According to an embodiment of the invention, Euclidean distance computations are made by means of Dynamic Time Warping (DTW). Each of the motion signals is first scaled to a 0-1 basis. The scaled value of each motion signal can be calculated according to a feature scaling rescaling method. More formally, denoting the jth motion signal as sj and its kh value as sjk, then its scaled value ŝjk is computed according to Eq. 1 below, which is referred to as the rescaling method (described for example in https://en.wikipedia.org/wiki/Feature_scaling):
Once the motion signals are scaled, they each go through a Discrete Cosine Transform (DCT) transformation, as is known to the skilled person, and as is demonstrated, for example, in https://en.wikipedia.org/wiki/Discrete_cosine_transform, in order to extract the most significant coefficients.
The first DCT coefficients are known to retain most of the energy (and therefore most of the information) of the signal compared to the latter ones which correspond to higher, and therefore usually noisier, frequencies. The first 20 DCT coefficients of each signal are used. Following this transformation, all signatures are represented by the transformed (and compressed) motion signals rather than by the original (which are longer and more computationally burdensome) signals.
Recalling that the set of genuine signatures Gu of user u was divided into Ru and
More formally, given a questioned signature q∈Ru∪Fu and the set of reference signatures ri∈Ru the following is denoted:
For each questioned signature q's transformed signals qc, the minimal DTW score is computed when compared against the corresponding set of N reference signals Rcu according to Eq. 3:
D
min(Rcu,qc)=mini=1, . . . ,KD(ric,qc) Eq. 3
The meaning of this is that each questioned signature q is represented by a vector {right arrow over (d)}qu of DTW scores, where each element represents the score above computed for a specific signal c where c=1, . . . , N:
This vector of DTW features is created for each one of the questioned signatures collected for user u. This means that each of the questioned signatures q∈Ru∪Fu contribute one such feature vector to the final feature matrix. The intermediate matrix that results from performing this procedure on one user would consist of Q=|Ru∪Fu| rows as follows:
The above process is repeated for all users u∈U, each with a new set of reference signatures Ru and forgery signatures Fu, until a full feature matrix, consisting of all intermediate matrices Iu, is generated:
Following the scaling, domain transformation and feature extraction processes defined above, each of the questioned signatures is labeled either “Genuine” or “Forged” using their true class and a classifier/model is trained over all questioned signatures, as is shown in stages 205 and 206 in
After creating a model/classifier, i.e. after completing the training phase, every new (unknown) user u that would like to use the proposed system, has to enroll first by providing the user's identity and a set of genuine reference signatures Ru. The signatures in Ru go through a process of scaling and domain transformation, and the resulting set of scaled and transformed signatures, denoted as R2u is stored in the system's database. This is similar to the process of opening a new bank account, where the owner is requested to supply a few signature samples to enable the bank to verify the user's identity in the future. This phase is performed only once per user. It is important to note that the model described hereinabove does not change upon new enrollment to the system and does not require re-training.
It is important to note that, as seen in line 6 of
Although embodiments of the invention have been described by way of illustration, it will be understood that the invention may be carried out with many variations, modifications, and adaptations, without exceeding the scope of the claims.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/IL2017/050478 | 4/30/2017 | WO | 00 |
Number | Date | Country | |
---|---|---|---|
62330160 | May 2016 | US |