<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Integrated Approach to User Authentication Based on Handwritten Signature</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Evgeny Kostyuchenko</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Egor Krivonosov</string-name>
          <email>egor-yrga@mail.ru</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Alexander Shelupanov</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Complex Information Security and Electronic Computing Systems Tomsk State University of Control Systems and Radioelectronics Tomsk</institution>
          ,
          <country country="RU">Russia</country>
        </aff>
      </contrib-group>
      <volume>248</volume>
      <fpage>453</fpage>
      <lpage>460</lpage>
      <abstract>
        <p>-A new approach to the integration of the results of several tools aimed at solving a single problem is considered. The approach is illustrated by the example of solving the authentication task for signature dynamics based on the naive Bayesian classifier and the neural network. The approach guarantees results not worse than any of the classifiers separately from the point of view of a monotonous combination of the probabilities of errors of the first and second kind. The obtained results can be applied in the construction of a multifactor authentication system.</p>
      </abstract>
      <kwd-group>
        <kwd>Keywords-naive handwritten signature</kwd>
        <kwd>network</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>INTRODUCTION</p>
      <p>
        There are many different methods of user authentication,
one of such methods is biometric authentication. They can be
separated into static methods and dynamic methods. Static
biometric authentication includes using of fingerprint [
        <xref ref-type="bibr" rid="ref1 ref2 ref3">1-3</xref>
        ], iris
[4-6], facial geometry [
        <xref ref-type="bibr" rid="ref9">7-10</xref>
        ], voice [
        <xref ref-type="bibr" rid="ref10 ref11 ref12">11-13</xref>
        ], hand geometry
[
        <xref ref-type="bibr" rid="ref13 ref14 ref15">14-16</xref>
        ] and other physiological characteristics of a person.
Examples of dynamic biometric authentication are using of
keystroke dynamics [
        <xref ref-type="bibr" rid="ref16 ref17 ref18">17-19</xref>
        ] and signature dynamics [
        <xref ref-type="bibr" rid="ref19">20</xref>
        ]. More
part of these approaches are intended to be used even when
organizing user authentication for mobile devices.
      </p>
      <p>
        However, such methods in most cases are either costly
(typically, for static methods), or do not provide the required
authentication accuracy for practical use (typically, fordynamic
methods) [
        <xref ref-type="bibr" rid="ref20">21</xref>
        ]. There is a problem of increasing the accuracy of
such systems. First way to solving this problem is the
simultaneous use of several classifiers in the analysis of the
characteristics of one biometric source. The second way is
constructing a multifactor authentication system. However,
simple "AND" scheme (the authentication is passed when all
decision subsystems vote for the same user) can't be used for
this purpose. The reason of this is a significant jump of the
probabilities for the first kind error, payed for reduction of the
probabilities for the second kind error, not allowing for
practical using of such integration.
      </p>
      <p>This work was supported by the Ministry of Education and Science of the
Russian Federation within 1.3 federal program «Research and development in
priority areas of scientific-technological complex of Russia for 2014-2020»
(grant agreement № 14.577.21.0172 on October 27, 2015; identifier
RFMEFI57715X0172).</p>
      <p>The problem can be solved by using a majority system, but
in this case it is necessary to bring the number of decisive
classifiers (or authentication factors) at least to three, which
significantly increases the complexity of the system being
developed. There arises the problem of developing an approach
to integration that guarantees accuracy not worse than the best
of the combined classifiers from the point of view of any
possible monotonic combination of the probabilities for first
and second kind errors.</p>
      <p>II.</p>
      <p>THE INTEGRATION OF SEVERAL APPROACHES</p>
      <p>The basic idea used for integrating several approaches is as
follows. Suppose that we have a set (vector) of parameters P
describing the set for authentication. In this case, the task of
authentication can be reduced to the classification task with an
illegal user. In this case a system containing n users classifies
they to n + 1 class. Authentication is considered passed when
the received class matches with the identifier. The work of one
classifier can be represented as a mapping Ai of a parameters
set P to a vector U with dimension n + 1. Vector U describes
belonging a given set of parameters Ai to each of the users or
none of them:</p>
      <p>Ui=Ai(P)
(1)</p>
      <p>In this case, as a rule, the class (user) is selected as the
maximum component of the output vector U exceeding a
certain threshold T. Note that the last class (none of the users)
may not exist, but be defined as "none of the classes reached
the minimum threshold".</p>
      <p>To integrate classifiers, we apply the function F to combine
the outputs Ui of k classifiers into a single output U. The
resulting vector for decision can be defined as:</p>
      <p>U=F(Ui … Ui )=F(A1(P)… A1(P))
(2)</p>
      <p>At the same time, it is obvious that there are some
restrictions to integration function F and not every function can
be used for this task:</p>
      <p>The function F must be monotonous function of any
component of the vector Ui. In otherwise, we can have a



mistake in the user's rank detection. For example, the
user with the maximum rank in the output vector Ui
(identifier of user that is authentication system solution)
may cease to be such not under the influence of other
classifiers, but only under the influence of one function
F, which contradicts common sense.</p>
      <p>The integration function must contain weight values
describing the influence of each of the classifiers I1 ... Ik.
We can detect settings of our integration function using
changing of this coefficients for minimization of total
classifier error.</p>
      <p>There should be a "neutral" value of each of the
coefficients Ii, under which this classifier does not
affect the integration as a whole. The example of such
values is "1" for the multiplying integration functions or
"0" for the sum integration functions. This restriction
guarantees that there is a set of weights in which the
complex degenerates into a separate classifier. As a
consequence, integration classifier shows the final
results no worse than this individual classifier from any
of the possible points of view and any type of error
calculation, because integration and individual
classifiers are equal in case of using this "neutral"
coefficient value.</p>
      <p>The final function implicitly contains the vector of
thresholds T (possibly individually for each user),
which is necessary for the principal possibility of
making a decision in favor of each users. In case of
every outputs are lesser than this threshold we have no
legal class in our system and current user who is trying
to pass authentication is an intruder.</p>
      <p>In view of the foregoing, the final function can be described
as:</p>
      <p>U=F(I, T, Ui … Ui )=F(I, T, A1(P)… A1(P))
(3)</p>
      <p>Setting up the integration system for the chosen function F
is represented as the task of optimizing the final error in this
case. Final error can be any fixed monotonous combination of
the probabilities of errors of the first and second kind.
Optimization result depends from the values of the parameters
of the vectors I and T. This solution, based on the above
restrictions, includes the results of each of the individual
classifiers. This, as a consequence, should guarantee the
results no worse than any of the individual classifiers, include
the best.</p>
      <p>III. AUTHENTICATION BASED ON A HANDWRITTEN
SIGNATURE AS TWO CLASSIFICATION METHODS INTEGRATION</p>
      <p>EXAMPLE</p>
      <p>The first 8 harmonics of the Fourier decomposition of the
pen's coordinates x, y, z, the pressure p and the slope angles α
and θ are used as the parameters. Also velocities and
accelerations of their change was used. Total count of
parameters is 6 × 3 × 8 = 144 per signature.</p>
      <p>
        The combination of two classifiers was considered. As
approaches for integration the naive Bayesian classifier [
        <xref ref-type="bibr" rid="ref21 ref22">22,
23</xref>
        ] and the perceptron [
        <xref ref-type="bibr" rid="ref23">24</xref>
        ] were used. The integration
functions are given in Table 1. In this case, functions 1 and 2
essentially show a degenerate classifier. Also should be noted
that not all the above functions satisfy the above restrictions.
This is done to practically confirm necessity of this restrictions.
N - output of the neural network, B - output of the Bayesian
classifier, α, β - weighting coefficients.
Function
number
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
      </p>
      <p>Function
f(x)= α0∙N+β∙B∙0</p>
    </sec>
    <sec id="sec-2">
      <title>EXPERIMENT</title>
      <p>At the time of the experiment, the database contains
signatures from 8 users in the number of more than 1500
signatures. At the preliminary stage, 10 training cycles were
done for all functions, after that 100 cycles for the top 10 and
functions 1 and 2, for comparing. PFEK is an error of the first
kind, PSEK is an error of the second kind, the PE is simply the
probability of error, the CE is a linear combination of errors,
with a 10-fold importance of the second kind of error. The
results of 100 training cycles are presented in Table 2.</p>
      <p>
        From the presented results it is clear that some integration
functions outperform the results of each of the integrated
systems separately. An additional check showed the statistical
significance [
        <xref ref-type="bibr" rid="ref24">25</xref>
        ] of these differences except the functions
number 5, 9, 10, 11, 12 (1 and 2 were not checked). On closer
examination, it can be seen that all the remaining functions
satisfy the above restrictions. This fact confirms the correctness
of the assumption that these restrictions must be met for correct
integration functions. A statistically significant improvement of
the criterion of the total error (PE) due to the application of
integration is also shown.
№
1
2
3
4
5
6
7
8
9
10
11
12
      </p>
      <p>Function
f(x)= α0∙N+β∙B∙0</p>
      <p>When we tried to compare this results with results of other
authors, a problem of open dynamic signature database was
detected. Other scientist work with image of the signature only
or not provide a signature sources for result comparing. In this
case we can only compare numerical results on different
signature databases. This information is presented in Table 3.</p>
      <p>
        It can be concluded that, on the one hand, the results are no
worse than those for similar systems. On the other hand, only
the work [
        <xref ref-type="bibr" rid="ref21">22</xref>
        ] can act as a direct analogue with comparing the
volume of the database and the number of users in it. Works
with an open database of examples for confirmation are not
presented in open repositories such as [
        <xref ref-type="bibr" rid="ref31">32</xref>
        ]. The idea of
including to the repository our own set data for future
researchers is actual. It can be reliably asserted that the results
obtained using the integration of the Bayesian classifier and the
neural network are no worse than using separate classifiers on
identical sets of data and no worse than using a separate neural
network in comparison with the analogous work [
        <xref ref-type="bibr" rid="ref30">31</xref>
        ].
      </p>
      <p>V.</p>
    </sec>
    <sec id="sec-3">
      <title>CONCLUSIONS</title>
      <p>The approach to the integration of several decision-making
apparatuses is theoretically and experimentally proved in the
course of the work done. This is shown on the example of
combining the neural network and the naive Bayesian classifier
for solving the task of user authentication based on the
dynamics of the signature. A statistically significant
improvement of the criterion based on probability of error is
shown. This makes it possible to speak about the applicability
of the proposed approach. This integration approach allows to
guarantee increasing the efficiency of the complex of several
decision-making methods in comparison with any of them
separately.</p>
      <p>
        In the future, it is planned to test the efficiency of the
proposed approach when constructing a multifactor
authentication system in mobile devices and using examples
from the UCI Machine Learning Repository [
        <xref ref-type="bibr" rid="ref31">32</xref>
        ].
      </p>
    </sec>
    <sec id="sec-4">
      <title>ACKNOWLEDGMENT</title>
      <p>This work was supported by the Ministry of Education and
Science of the Russian Federation within 1.3 federal program
«Research and development in priority areas of
scientifictechnological complex of Russia for 2014-2020» (grant
agreement № 14.577.21.0172 on October 27, 2015; identifier
RFMEFI57715X0172).</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Ram</surname>
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Athira</surname>
            and
            <given-names>T.S.</given-names>
          </string-name>
          <string-name>
            <surname>Jyothis</surname>
          </string-name>
          , “
          <article-title>Reducing Vulnerability of a Fingerprint Authentication System”</article-title>
          , In: Abawajy J.,
          <string-name>
            <surname>Mukherjea</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Thampi</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ruiz-Martínez</surname>
            <given-names>A</given-names>
          </string-name>
          . (eds) Security in Computing and
          <source>Communications SSCC 2015. Communications in Computer and Information Science</source>
          , vol
          <volume>536</volume>
          , pp.
          <fpage>157</fpage>
          -
          <lpage>167</lpage>
          ,
          <year>2015</year>
          , DOI: https://doi.org/10.1007/978-3-
          <fpage>319</fpage>
          -22915-7_
          <fpage>15</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>T.</given-names>
            <surname>Chuan-Chin</surname>
          </string-name>
          and
          <string-name>
            <given-names>N.</given-names>
            <surname>Han-Foon</surname>
          </string-name>
          ,
          <article-title>"Behavioral Fingerprint Authentication: The Next Future,"</article-title>
          <source>ICBBT '17 Proceedings of the 9th International Conference on Bioinformatics and Biomedical Technology</source>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          ,
          <year>2017</year>
          , DOI: https://doi.org/ 10.1145/3093293.3093296
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>M. R.</given-names>
            <surname>Zafar</surname>
          </string-name>
          and
          <string-name>
            <given-names>M. A.</given-names>
            <surname>Shah</surname>
          </string-name>
          ,
          <article-title>"Fingerprint authentication and security risks in smart devices,"</article-title>
          <source>2016 22nd International Conference on Automation and Computing (ICAC)</source>
          , pp.
          <fpage>548</fpage>
          -
          <lpage>553</lpage>
          ,
          <year>2016</year>
          , DOI: https://doi.org/ 10.1109/IConAC.
          <year>2016</year>
          .7604977
          <string-name>
            <given-names>N.</given-names>
            <surname>Schmid</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Zuo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Nicolo</surname>
          </string-name>
          and
          <string-name>
            <given-names>H.</given-names>
            <surname>Wechsler</surname>
          </string-name>
          , ”
          <article-title>Iris Quality Metrics for Adaptive Authentication”</article-title>
          , In: Bowyer K.,
          <string-name>
            <surname>Burge</surname>
            <given-names>M</given-names>
          </string-name>
          .
          <article-title>(eds) Handbook of Iris Recognition. Advances in Computer Vision</article-title>
          and Pattern Recognition, pp.
          <fpage>101</fpage>
          -
          <lpage>118</lpage>
          ,
          <year>2016</year>
          , DOI: https://doi.org/10.1007/978-1-
          <fpage>4471</fpage>
          -6784-
          <issue>6</issue>
          _
          <fpage>5</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <string-name>
            <given-names>S.</given-names>
            <surname>Thavalengal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Bigioi</surname>
          </string-name>
          , and
          <string-name>
            <given-names>P. M.</given-names>
            <surname>Corcoran</surname>
          </string-name>
          ,
          <article-title>"Iris authentication in handheld devices - considerations for constraint-free acquisition,"</article-title>
          <source>IEEE Trans. Consumer Electronics</source>
          , vol.
          <volume>61</volume>
          , pp.
          <fpage>245</fpage>
          -
          <lpage>253</lpage>
          ,
          <year>2015</year>
          , DOI: http://doi.org/10.1109/TCE.
          <year>2015</year>
          .7150600
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <string-name>
            <given-names>P. S.</given-names>
            <surname>Vanthana</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Muthukumar</surname>
          </string-name>
          ,
          <article-title>"Iris authentication using Gray Level Co-occurrence Matrix and Hausdorff Dimension,"</article-title>
          <source>2015 International Conference on Computer Communication and Informatics (ICCCI)</source>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          ,
          <year>2015</year>
          , DOI: https://doi.org/10.1109/ICCCI.
          <year>2015</year>
          .7218133
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <string-name>
            <given-names>M.</given-names>
            <surname>Chowdhury</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Gao</surname>
          </string-name>
          and
          <string-name>
            <surname>R. Islam R.</surname>
          </string-name>
          , “
          <article-title>Biometric Authentication Using Facial Recognition”</article-title>
          , In: Deng R.,
          <string-name>
            <surname>Weng</surname>
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ren</surname>
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yegneswaran</surname>
            <given-names>V</given-names>
          </string-name>
          .
          <article-title>(eds) Security and Privacy in Communication Networks</article-title>
          .
          <source>SecureComm 2016. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering</source>
          ,, vol
          <volume>198</volume>
          , pp,
          <fpage>287</fpage>
          -
          <lpage>295</lpage>
          ,
          <year>2017</year>
          , DOI: https://doi.org/10.1007/978-3-
          <fpage>319</fpage>
          -59608- 2_
          <fpage>16</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <string-name>
            <given-names>C.</given-names>
            <surname>Ding</surname>
          </string-name>
          and
          <string-name>
            <given-names>D.</given-names>
            <surname>Tao</surname>
          </string-name>
          ,
          <article-title>"A Comprehensive Survey on Pose-Invariant Face Recognition,"</article-title>
          <source>ACM TIST</source>
          , vol.
          <volume>7</volume>
          , pp.
          <volume>37</volume>
          :
          <fpage>1</fpage>
          -
          <lpage>37</lpage>
          :
          <fpage>42</fpage>
          ,
          <year>2016</year>
          , DOI: http://doi.org/10.1145/2845089
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <string-name>
            <given-names>F.</given-names>
            <surname>Schroff</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Kalenichenko</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Philbin</surname>
          </string-name>
          ,
          <article-title>"FaceNet: A unified embedding for face recognition and clustering,"</article-title>
          <source>2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)</source>
          , pp.
          <fpage>815</fpage>
          -
          <lpage>823</lpage>
          ,
          <year>2015</year>
          , DOI: https://doi.org/10.1109/CVPR.
          <year>2015</year>
          .7298682
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>T.</given-names>
            <surname>Khadhraoui</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Ktata</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Benzarti</surname>
          </string-name>
          , and
          <string-name>
            <given-names>H.</given-names>
            <surname>Amiri</surname>
          </string-name>
          ,
          <article-title>"Features Selection Based on Modified PSO Algorithm for 2D Face Recognition,"</article-title>
          <source>2016 13th International Conference on Computer Graphics, Imaging and Visualization (CGiV)</source>
          , pp.
          <fpage>99</fpage>
          -
          <lpage>104</lpage>
          ,
          <year>2016</year>
          , DOI: https://doi.org/10.1109/CGiV.
          <year>2016</year>
          .28
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>I.S.</given-names>
            <surname>Kipyatkova</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.A.</given-names>
            <surname>Karpov</surname>
          </string-name>
          , “
          <article-title>Variants of Deep Artificial Neural Networks for Speech Recognition Systems”</article-title>
          ,
          <source>SPIIRAS Proceedings</source>
          , vol.
          <volume>49</volume>
          , no.
          <issue>6</issue>
          , pp.
          <fpage>80</fpage>
          -
          <lpage>103</lpage>
          ,
          <year>2016</year>
          , DOI: https://doi.org/10.
          <fpage>156</fpage>
          -
          <lpage>22</lpage>
          /sp.49.5
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>R. C.</given-names>
            <surname>Johnson</surname>
          </string-name>
          , T. E. Boult, and
          <string-name>
            <given-names>W. J.</given-names>
            <surname>Scheirer</surname>
          </string-name>
          ,
          <article-title>"Voice authentication using short phrases: Examining accuracy, security and privacy issues,"</article-title>
          <source>2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS)</source>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>8</lpage>
          ,
          <year>2013</year>
          , DOI: https://doi.org/10.1109/BTAS.
          <year>2013</year>
          .6712713
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>S. B.</given-names>
            <surname>Sadkhan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B. K.</given-names>
            <surname>Al-Shukur</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A. K.</given-names>
            <surname>Mattar</surname>
          </string-name>
          ,
          <article-title>"Biometric voice authentication auto-evaluation system,"</article-title>
          <source>2017 Annual Conference on New Trends in Information &amp; Communications Technology Applications (NTICT)</source>
          , pp.
          <fpage>174</fpage>
          -
          <lpage>179</lpage>
          ,
          <year>2017</year>
          , DOI: https://doi.org/10.1109/NTICT.
          <year>2017</year>
          .7976100
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>R.</given-names>
            <surname>Kumar</surname>
          </string-name>
          , “
          <article-title>Hand Image Biometric Based Personal Authentication System”,</article-title>
          . In: Dey N.,
          <string-name>
            <surname>Santhi</surname>
            <given-names>V</given-names>
          </string-name>
          .
          <article-title>(eds) Intelligent Techniques in Signal Processing for Multimedia Security</article-title>
          .
          <source>Studies in Computational Intelligence</source>
          , vol
          <volume>660</volume>
          , pp.
          <fpage>201</fpage>
          -
          <lpage>226</lpage>
          ,
          <year>2016</year>
          , DOI: https://doi.org/10.1007/978-3-
          <fpage>319</fpage>
          -44790-2_
          <fpage>10</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [15]
          <string-name>
            <surname>E.-S. M. El-Alfy</surname>
          </string-name>
          ,
          <article-title>"</article-title>
          <source>Automatic Identification Based on Hand Geometry and Probabilistic Neural Networks," 2012 5th International Conference on New Technologies, Mobility and Security (NTMS)</source>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          ,
          <year>2012</year>
          , DOI: https://doi.org/10.1109/NTMS.
          <year>2012</year>
          .6208758
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>A.</given-names>
            <surname>Gangopadhyay</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Chatterjee</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Chatterjee</surname>
          </string-name>
          ,
          <article-title>"Hand shape based biometric authentication system using radon transform and collaborative representation based classification,"</article-title>
          <source>2013 IEEE Second International Conference on Image Information Processing (ICIIP-2013)</source>
          , pp.
          <fpage>635</fpage>
          -
          <lpage>639</lpage>
          ,
          <year>2013</year>
          , DOI: https://doi.org/10.1109/ICIIP.
          <year>2013</year>
          .6707672
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>G.</given-names>
            <surname>Jagadamba</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.P.</given-names>
            <surname>Sharmila</surname>
          </string-name>
          and
          <string-name>
            <given-names>T.</given-names>
            <surname>Gouda</surname>
          </string-name>
          ,”
          <article-title>A Secured Authentication System Using an Effective Keystroke Dynamics</article-title>
          .”, In: Sridhar V.,
          <string-name>
            <surname>Sheshadri</surname>
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Padma</surname>
            <given-names>M</given-names>
          </string-name>
          . (eds) Emerging Research in Electronics,
          <source>Computer Science and Technology. Lecture Notes in Electrical</source>
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>A.</given-names>
            <surname>Goodkind</surname>
          </string-name>
          , D.-G.
          <article-title>Brizan, and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Rosenberg</surname>
          </string-name>
          ,
          <article-title>"Improvements to keystroke-based authentication by adding linguistic context,"</article-title>
          <source>2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS)</source>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          ,
          <year>2015</year>
          , DOI: https://doi.org/10.1109/BTAS.
          <year>2015</year>
          .7358766
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>J.</given-names>
            <surname>Huang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Hou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Schuckers</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Z.</given-names>
            <surname>Hou</surname>
          </string-name>
          ,
          <article-title>"Effect of data size on performance of free-text keystroke authentication,"</article-title>
          <source>IEEE International Conference on Identity, Security and Behavior Analysis (ISBA</source>
          <year>2015</year>
          ), pp.
          <fpage>1</fpage>
          -
          <lpage>7</lpage>
          ,
          <year>2015</year>
          , DOI: https://doi.org/10.1109/ISBA.
          <year>2015</year>
          .7126361
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>S.</given-names>
            <surname>Pal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>U.</given-names>
            <surname>Pal</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Blumenstein</surname>
          </string-name>
          , “
          <article-title>Signature-Based Biometric Authentication”</article-title>
          , In: Muda A.,
          <string-name>
            <surname>Choo</surname>
            <given-names>YH.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Abraham</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>N. Srihari S</surname>
          </string-name>
          . (eds)
          <article-title>Computational Intelligence in Digital Forensics: Forensic Investigation and Applications</article-title>
          .
          <source>Studies in Computational Intelligence</source>
          , vol
          <volume>555</volume>
          , pp.
          <fpage>285</fpage>
          -
          <lpage>314</lpage>
          ,
          <year>2014</year>
          , DOI: https://doi.org/10.1007/978-3-
          <fpage>319</fpage>
          - 05885-6_
          <fpage>13</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>D.</given-names>
            <surname>Bhattacharyya</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Ranjan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.A.</given-names>
            <surname>Alisherov</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Choi</surname>
          </string-name>
          , “
          <article-title>Biometric Authentication: A Review”</article-title>
          ,
          <source>International Journal of u- and e- Service, Science and Technology</source>
          , vol.
          <volume>3</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>13</fpage>
          -
          <lpage>28</lpage>
          ,
          <year>2009</year>
          , URL: https://www.researchgate.net/publication/46189709_Biometric_Authenti cation_A_Review
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [22]
          <string-name>
            <surname>Irina</surname>
            <given-names>Rish,</given-names>
          </string-name>
          “
          <article-title>An empirical study of the naive Bayes classifier”</article-title>
          ,
          <source>IJCAI Workshop on Empirical Methods in AI</source>
          ,
          <year>2001</year>
          . URL: https://www.researchgate.net/publication/228845263_An_
          <article-title>Empirical_Stu dy_of_the_Naive_Bayes_Classifier</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>E.</given-names>
            <surname>Kostyuchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Gurakov</surname>
          </string-name>
          , E. Krivonosov,
          <string-name>
            <given-names>M.</given-names>
            <surname>Tomyshev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Mescheryakov</surname>
          </string-name>
          and
          <string-name>
            <surname>I. Hodashinskiy</surname>
          </string-name>
          , “
          <article-title>Integration of Bayesian Classifier and Perceptron for Problem Identification on Dynamics Signature Using a Genetic Algorithm for the Identification Threshold Selection”</article-title>
          , in: Cheng L.,
          <string-name>
            <surname>Liu</surname>
            <given-names>Q.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ronzhin</surname>
            <given-names>A</given-names>
          </string-name>
          . (eds) Advances
          <source>in Neural Networks - ISNN 2016. ISNN 2016. Lecture Notes in Computer Science</source>
          , vol
          <volume>9719</volume>
          , pp.
          <fpage>620</fpage>
          -
          <lpage>627</lpage>
          ,
          <year>2016</year>
          , DOI: https://doi.org/10.1007/978-3-
          <fpage>319</fpage>
          -40663-3_
          <fpage>71</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>F.</given-names>
            <surname>Rosenblatt</surname>
          </string-name>
          , “
          <article-title>Principles of neurodynamics; perceptrons and the theory of brain mechanisms”</article-title>
          , Washington, Spartan Books,
          <year>1962</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>G.</given-names>
            <surname>James</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Witten</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Hastie</surname>
          </string-name>
          and
          <string-name>
            <given-names>R.</given-names>
            <surname>Tibshirani</surname>
          </string-name>
          , “
          <article-title>An Introduction to Statistical Learning with Applications in</article-title>
          R”, Springer-Verlag New York,
          <year>2013</year>
          , DOI: https://doi.org/10.1007/978-1-
          <fpage>4614</fpage>
          -7138-7
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>T.</given-names>
            <surname>Fotak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Baa</surname>
          </string-name>
          and
          <string-name>
            <given-names>P.</given-names>
            <surname>Koruga</surname>
          </string-name>
          , “
          <article-title>Handwritten signature identification using basic concepts of graph theory”</article-title>
          ,
          <source>WSEAS Transactions on Signal Processing.</source>
          , vol.
          <volume>7</volume>
          , pp.
          <fpage>117</fpage>
          -
          <lpage>129</lpage>
          ,
          <year>2011</year>
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>M.</given-names>
            <surname>Faundez-Zanuy</surname>
          </string-name>
          and
          <string-name>
            <given-names>J. M.</given-names>
            <surname>Pascual-Gaspar</surname>
          </string-name>
          ,
          <article-title>"Efficient on-line signature recognition based on multi-section vector quantization,"</article-title>
          <source>Pattern Analysis and Applications</source>
          , vol.
          <volume>14</volume>
          , pp.
          <fpage>37</fpage>
          -
          <lpage>45</lpage>
          ,
          <year>2010</year>
          , DOI: https://doi.org/10.1007/s10044-010-0176-8
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>M.R.</given-names>
            <surname>Nilchiyan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.B.</given-names>
            <surname>Yusof</surname>
          </string-name>
          and
          <string-name>
            <surname>Alavi S</surname>
          </string-name>
          .E., “
          <article-title>Statistical on-line signature verification using rotation-invariant dynamic descriptors”</article-title>
          ,
          <source>In: The 10th Asian Control Conference 2015 (ASCC</source>
          <year>2015</year>
          ), pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          ,
          <year>2015</year>
          , DOI: https://doi.org/10.1109/ASCC.
          <year>2015</year>
          .7244603
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>W.A.W.</given-names>
            <surname>Adnan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.L.</given-names>
            <surname>Malallah</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Mumtazah</surname>
          </string-name>
          and
          <string-name>
            <given-names>S.</given-names>
            <surname>Yussof</surname>
          </string-name>
          , “
          <article-title>Online Handwritten Signature Recognition by Length Normalization using UpSampling and DownSampling</article-title>
          ”,.
          <source>International Journal of Cyber-Security and Digital Forensics (IJCSDF)</source>
          , vol
          <volume>4</volume>
          , pp.
          <fpage>302</fpage>
          -
          <lpage>313</lpage>
          ,
          <year>2015</year>
          , DOI: https://doi.org/DOI10.17781/P001545
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>V.</given-names>
            <surname>Iranmanesh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. M. S.</given-names>
            <surname>Ahmad</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W. A. W.</given-names>
            <surname>Adnan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Yussof</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O. A.</given-names>
            <surname>Arigbabu</surname>
          </string-name>
          , and
          <string-name>
            <given-names>F. L.</given-names>
            <surname>Malallah</surname>
          </string-name>
          ,
          <article-title>"Online Handwritten Signature Verification Using Neural Network Classifier Based on Principal Component Analysis,"</article-title>
          <source>in TheScientificWorldJournal</source>
          ,
          <year>2014</year>
          , DOI: https://doi.org/10.1155/
          <year>2014</year>
          /381469
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [31]
          <string-name>
            <given-names>P.</given-names>
            <surname>Babita</surname>
          </string-name>
          ,
          <article-title>"Online Signature Recognition Using Neural Network,"</article-title>
          <year>2015</year>
          , DOI: https://doi.org/10.4172/
          <fpage>2332</fpage>
          -
          <lpage>0796</lpage>
          .
          <fpage>1000155</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [32]
          <string-name>
            <surname>M. Lichman ”</surname>
          </string-name>
          <article-title>UCI Machine Learning Repository”</article-title>
          , Irvine, CA: University of California, School of Information and Computer Science,
          <year>2013</year>
          , URL: http://archive.ics.uci.edu/ml
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>