<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Model of Handwritten Signature Based User Authentication </article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Ivan Horniichuk</string-name>
          <email>horniychuk.ivan@gmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Vitaliy Tsyganok</string-name>
          <email>tsyganok@ipri.kiev.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Viktor Evetskyi</string-name>
          <email>viktorevetsky@gmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Artem Mykytiuk</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Institute for Information Recording of National Academy of Sciences of Ukraine</institution>
          ,
          <addr-line>Mykoly Shpaka str., 2, Kyiv, 03113</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute"</institution>
          ,
          <addr-line>Verkhnoklyuchova str., 4, Kyiv, 03056</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Taras Shevchenko National University of Kyiv</institution>
          ,
          <addr-line>Volodymyrs'ka str., 64/13, Kyiv, 01601</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>141</fpage>
      <lpage>150</lpage>
      <abstract>
        <p>   We propose and consider models and methods of user authentication based on their handwritten signature. Identification of users accessing confidential information is a critical and unresolved issue in information security. Traditional password protection methods have several drawbacks. Therefore, biometric identification of users is being considered as an alternative or addition to password systems. Biometric identifiers are closely associated with individual users, making it difficult to gain unauthorized access. The authentication decision in biometric authentication systems is determined by comparing the user's biometric etalon with the biometric data provided during the authentication attempt (login). The user's biometric etalon is created by studying specific individual characteristics of the user. These characteristics are reflecting the user's dynamic behavioral traits. A possible biometric characteristic that can be utilized for user authentication is the handwritten signature. Handwritten signatures are legally and socially recognized as a form of biometric authentication that is commonly used for human identification purposes. One major drawback of handwritten authentication systems is their high cost due to the need for specialized equipment installation. We propose a model for implementing a computer data protection system against unauthorized access based on handwritten signatures, utilizing mobile devices with the Android operating system as signature input devices. This approach aims to provide an affordable solution for biometric authentication, making it more accessible for a wider range of users. Functional structural and logic models of user authentication based on their handwritten signature are proposed. As part of the research, copyright registration certificates were obtained for the software applications that were developed to support the proposed model for user authentication based on handwritten signatures.</p>
      </abstract>
      <kwd-group>
        <kwd> 1  Handwritten signature</kwd>
        <kwd>signature recognition</kwd>
        <kwd>biometric authentication system</kwd>
        <kwd>person authentication</kwd>
        <kwd>biometric indicator</kwd>
        <kwd>biometric characteristics vector</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction </title>
      <p>
        An important and still unsolved problem of information protection is the effective identification of
the user who gets access to it. There are several drawbacks associated with relying on traditional
password protection. [
        <xref ref-type="bibr" rid="ref1">1, 2</xref>
        ]. For example, in case of violation of the confidentiality of the password,
which can often remain unnoticed by its owner, the protection of all information to which he has access
is immediately violated. Biometric identification can be viewed as a viable replacement for or
supplement to traditional password-based authentication [
        <xref ref-type="bibr" rid="ref2 ref3">3, 4</xref>
        ]. Biometric identification and
authentication technologies have a number of advantages over traditional ones and are increasingly
used in computer systems.
      </p>
      <p>
        Biometric identification methods are broadly categorized into two groups: static methods, which
rely on the physical characteristics of a person, and dynamic methods, which utilize behavioral patterns
or subconscious movements during the performance of an action. Both static and dynamic biometric
identification methods are complementary areas of research. However, dynamic methods, which are
based on subconscious movements during action, offer stronger security than static methods.
Nonetheless, these methods have certain drawbacks, including a higher likelihood of authentication
errors and false positives, as well as a longer learning process compared to static methods [
        <xref ref-type="bibr" rid="ref3">4</xref>
        ]. Dynamic
methods commonly involve the analysis of the user's voice or handwriting dynamics, both on paper and
on a keyboard.
      </p>
      <p>The handwritten signature is a biometric characteristic that is widely recognized for its legal and
social significance in authenticating individuals. Therefore, it is relevant to consider its use in
computerbased user authentication systems.</p>
      <p>The complex and detailed structure of handwritten signatures poses a challenge for employing
mathematical methods for authentication and identification, which often results in significant
computational costs.</p>
      <p>Handwritten signature recognition and verification systems can be classified into two types based
on static and dynamic characteristics, respectively.</p>
      <p>
        Static characteristics based systems analyze only a static image of a handwritten signature, without
considering any additional attributes. That is, the graphic drawing obtained during the signature is
evaluated. Most often, such systems are based on the use of neural networks, which are actually used
as a decision-making algorithm [
        <xref ref-type="bibr" rid="ref4">5</xref>
        ]. Such recognition systems have one important advantage – they do
not require access to additional input processing devices.
      </p>
      <p>
        The main disadvantage of static signature recognition systems is the ease of compromising. For this,
it is enough to have the author's signature and practice reproducing it, or simply encircle it [
        <xref ref-type="bibr" rid="ref5 ref6">6, 7</xref>
        ].
      </p>
      <p>
        In dynamic characteristics based systems, during signing, additionally collected information about
the dynamic features of the signing process. According to sources [
        <xref ref-type="bibr" rid="ref5 ref7">6, 8</xref>
        ], dynamic information can
encompass the following characteristics:
• spatial coordinates of the pen tip;
• pressure exerted by the pen tip on the tablet;
• azimuthal angle of the pen;
• angle of the pen.
      </p>
      <p>Dynamic features enable the creation of various biometric vectors and decision-making algorithms,
such as statistical methods and neural networks, for improved user authentication based on handwritten
signatures.</p>
      <p>
        Dynamic signature recognition systems offer the advantage of incorporating dynamic
characteristics, which renders it nearly impossible for an attacker to replicate the victim's signature [
        <xref ref-type="bibr" rid="ref7">8</xref>
        ].
However, the primary disadvantage of these systems is that they necessitate the installation of
specialized equipment for signature implementation, making them a costly option for regular
authentication purposes.
      </p>
      <p>The presence today of mobile devices of almost all users, prompted the idea of using them in
authentication systems. This may allow to replace specialized hardware by mobile devices.</p>
      <p>
        A user authentication model based on handwritten signature recognition using mobile devices is
proposed [
        <xref ref-type="bibr" rid="ref11">12</xref>
        ]. The peculiarity of this model is the presence in it of two components: stationary (server
part) and mobile (client part).
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Methods used across model </title>
      <p>
        The proposed model involves several methods, including the method of establishing a secure
connection, the method of forming the user's handwritten signature time characteristics vector, the
method of forming the user's handwritten signature biometric characteristics vector, the method of
forming the user's handwritten signature biometric etalon, and the user authenticity verification method
based on the Hamming metric [
        <xref ref-type="bibr" rid="ref11 ref12 ref13">12-14</xref>
        ]. Let's briefly consider each of these methods.
2.1. Method  of  establishing  a  secure  connection  between  a  mobile  and 
stationary component 
      </p>
      <p>
        Method of establishing a secure connection was considered in [
        <xref ref-type="bibr" rid="ref11">12</xref>
        ]. Its essence is the use of an
SSL/TLS socket, which provides encryption of data transmitted between the client and the server [
        <xref ref-type="bibr" rid="ref14">15</xref>
        ].
      </p>
      <p>To establish a secure connection, the stationary component compiles a list of necessary data,
including the server's IP address, port, seed (random number), connection method label (LAN, WAN,
server as access point), SSID, and wireless password (if applicable). The component then generates a
QR code with the aforementioned data, which is displayed on the screen. The mobile component scans
the QR code to initiate the SSL/TLS socket opening procedure (Fig. 1).
2.2. Method  of  forming  user's  handwritten  signature  time  characteristics 
vector </p>
      <p>
        Method of forming user's handwritten signature time characteristics vector was considered in [
        <xref ref-type="bibr" rid="ref11 ref12">12,
13</xref>
        ]. The proposed model employs the x and y coordinates of the pen tip at a specific moment in time t
as the parameters of the time characteristics vector. However, the period t after which the coordinates
are collected must be both constant and sufficiently small to ensure the precision of calculations, in the
system being developed t  17 *103 s . The following characteristics can be obtained through the
touch screen of most all smartphone or tablet [
        <xref ref-type="bibr" rid="ref15 ref16">16, 17</xref>
        ]. Consequently, by inputting a signature, a vector
of time characteristics v can be obtained in the following format:
v  ((x1; y1), (x2 ; y2 ), ..., (xN ; yN )), N  T / t,  
(1) 
where N - the total number of points acquired during signature entry;
      </p>
      <p>T - total time taken to input the signature.
2.3. Method of forming user's handwritten signature biometric characteristics 
vector </p>
      <p>
        Method of forming user's handwritten signature biometric characteristics vector was considered
in [
        <xref ref-type="bibr" rid="ref11 ref12">12, 13</xref>
        ]. When forming the biometric vector, the data of the time characteristics vector (1) are used.
The entire signature is divided into a fixed number of intervals n of the same length k  N / n . For the
proposed model n  40 (determined experimentally [
        <xref ref-type="bibr" rid="ref12">13</xref>
        ]). It is proposed to determine the average speed
of its entry si and the inclination angle of the vector between beginning and end of the studied interval
di at each studied interval. It is proposed to calculate these values using the following formulas [
        <xref ref-type="bibr" rid="ref17">18</xref>
        ]:
,  
Thus, the biometric vector will have the following form:
      </p>
      <p>Let's introduce the general form of the biometric vector based on (2):
where si – is the average speed of entering the interval і;</p>
      <p>l j – Euclidean distance between adjacent points on the interval.
where di – the angle of inclination of the vector between beginning and end interval.</p>
      <p>It is determined from the cosine of the angle obtained as the scalar product of the unit vector e(0; 1)
and the interval vector zi (xi1  xi ; yi1  yi ) :
where Pi – parameter of the biometric vector defined by (4).
2.4.</p>
      <p>
        Method of forming user's handwritten signature biometric etalon 
The method of forming a user's biometric etalon is closely related to the method of making a decision
on user authentication. It is proposed to use the Hamming measure as the basis of the user recognition
algorithm. In general, the Hamming measure (distance) is used for row (vectors) of the same length and
serves as a metric of difference (a function that allows you to determine the distance in metric space)
of objects of the same size [
        <xref ref-type="bibr" rid="ref10">11</xref>
        ].
      </p>
      <p>In training mode, the authorized user provides L of his signatures (enters the signature L times). This
will correspond to L realizations of the biometric characteristics vectors V  {v1, v2 , v3 ,..., vL} . By
analyzing the obtained matrix from L implementations of the user's time characteristics vector v , we
can obtain the interval of change of each specific time parameter characteristic of a given user
[min(Pi ), max(Pi )],i  1, N , which will later become the basis for forming user's biometric
characteristics etalon.</p>
      <p>In order to determine the Hamming distance, it is proposed to determine whether each parameter Pi
of the biometric vector (3) falls within the limits of the confidence interval [min(Pi ), max(Pi )], i  1, N
for this parameter.</p>
      <p>
        The confidence interval of the parameter is calculated as follows [
        <xref ref-type="bibr" rid="ref18">19</xref>
        ]:
min(Pi )  m(Pi )  T[L,(1 p)] (Pi ) , 
max(Pi )  m(Pi )  T[L,(1 p)] (Pi ) , 
where m(Pi ) – the mathematical expectation of the parameter Pi ;
 (Pi ) – mean square deviation of the parameter Pi ;
L – the number of vectors used in training;
p – set value of errors of the first type (probability of refusing authentication to real user);
T[L, (1  p)] – Student's coefficient.
(2) 
(3) 
(4) 
(5) 
(6) 
The mean value and variance are calculated according to the following formulas [
        <xref ref-type="bibr" rid="ref18">19</xref>
        ]:
m(Pi )  L1  Lj1 Pij ,
      </p>
      <p>1 L
 2 (Pi )  [m(Pi )  Pij ]2 .</p>
      <p>L j1</p>
      <p>The threshold value E p can be determined using the mathematical expectation and the variance of
the Hamming measure values for a registered user:</p>
      <p>E p  m(Ev )  C[L, (1  p)]  (Ev ) ,
where C[L, (1  p)] – Student's coefficient, given based on the number of used examples L and the
values of the probability of the error of the first type p.</p>
      <p>We form the final biometric etalon of the user. Its general form will have the following form:
ve  (min(P1 ), max(P1 ), min(P2 ), max(P2 ),..., min(P2n ), max(P2n ), E p )  
2.5. User authenticity verification method based on Hamming metric </p>
      <p>During the authentication stage, the user submits their signature, which corresponds to a specific
biometric characteristic vector v .</p>
      <p>The provided biometric parameters vector is then analyzed to determine if it falls within the intervals
defined by the user's biometric etalon ve , which is used for logging into the system. During this analysis,
the system generates a vector E  (e1, e2 , e3 ,..., eN ) .The parameters of the vector E are formed as
follows:</p>
      <p>0, Pi [min(Pi ), max(Pi )]
ei  1, Pi [min(Pi ), max(Pi )]</p>
      <p>
        The resulting E represents the Hamming vector of the individual attempting to access the system.
For a registered user, the E vector should contain mostly 0s, whereas an unregistered user with
unreliable biometric data will have many 1s. The Hamming distance absolute value Ev from the
presented biometric characteristics vector v to the biometric etalon ve is calculated as the number of
discrepancies with the biometric standard for the given parameters, which is the number of 1s in the
Hamming vector. This distance Ev is always an integer and can range from 0 to N [
        <xref ref-type="bibr" rid="ref10">11</xref>
        ].
      </p>
      <p>If Ev  E p , then the user is considered authenticated, and vice versa.
3. Handwritten signature user authentication model </p>
    </sec>
    <sec id="sec-3">
      <title>3.1. Functional model </title>
      <p>Since the system consists of two components, it is advisable to depict the functional model for each
of the components. Thus, considering one component, the other will be an actor for it and vice versa.
The functional model of handwritten signature authentication for stationary and mobile components is
shown in Fig. 2 and fig. 3 respectively.</p>
      <p>So in Fig.2 mobile component act like an actor for stationary component, and in Fig. 3 stationary
component act like actor for mobile component.</p>
      <p>Figure 2: Functional model of authentication by handwritten signature (stationary component) 
Figure 3: Functional model of authentication by handwritten signature (mobile component) </p>
      <p>The user is given the opportunity to register, with subsequent formation of a biometric etalon, update
the existing etalon, and pass authentication by entering a password. The function of establishing a secure
connection appears in both components. The function of forming a time characteristics vector is
performed by the mobile component, accordingly, the user performs all actions related to entering a
handwritten signature with it.
3.2.</p>
    </sec>
    <sec id="sec-4">
      <title>Structural model </title>
      <p>
        The basis of the structural model (Fig. 4) is a diagram of components showing the interaction
and dependence between its modules [
        <xref ref-type="bibr" rid="ref11 ref12 ref13">12-14</xref>
        ]. Implementation of the model requires a system interface
for interaction with the display in the mobile component. It, in turn, is an interface for input data. The
output data is a user authentication decision used to authorize this user in the system (granting or
denying access to it).
      </p>
      <p>Communication between the components is carried out by the communication module, which is
present both in the stationary and in the mobile component. After that, all information exchange
between components takes place via SSL/TLS socket in an encrypted form.</p>
      <p>Figure 4: Structural model of user authentication by handwritten signature 
3.3.</p>
    </sec>
    <sec id="sec-5">
      <title>Logic model </title>
      <p>Figure 5: Logical model of user authentication by handwritten signature </p>
      <p>In fig. 5 shows the logical model. It is nothing but a set of methods, actions and operations laid out
in a logical sequence to authenticate the user by his handwritten signature. It reflects the implementation
of the described system using the methods described above. Thus, it can be used as a methodology of
user authentication by handwritten signature.
4. Evaluation of the proposed models’ efficiency </p>
      <p>
        To evaluate the efficiency of authentication systems, the concepts of errors of the first and second
type are most often used. FRR (False Reject Rate) or error of the first type- the probability of false
rejections to a registered user. FAR (False Accept Rate) or error of the second type - the probability of
granting access to an unregistered user. They are calculated as follows [
        <xref ref-type="bibr" rid="ref20 ref21">21, 22</xref>
        ]:
      </p>
      <p>FN
FRR 
FAR </p>
      <p>FN  TP</p>
      <p>FP
,  
,  </p>
      <p>FP  TN
where FN (False Negative) – the number of times a registered user has been denied access;
TP (True Positive) – the number of times a registered user has been granted access;
FP (False Positive) – the number of times an unregistered user was granted access;
TN (True Negative) – the number of times an unregistered user was denied access.</p>
      <p>
        For this, a practical experiment was conducted, in which 5 users were involved. Its essence is to
determine TP, TN, FP, FN for the proposed model. For this, a software application was created for
collecting statistical material [
        <xref ref-type="bibr" rid="ref19">20</xref>
        ]. Each user tried to recreate the image of the given signature 150 times.
As such image was the handwritten word "sign". In fig. 6 shows a screenshot of the application for
collecting statistical material with the proposed image.
      </p>
      <p>
        In addition to error indicators of the first and second type, we will introduce the concepts of accuracy
and balanced accuracy. Accuracy is the proportion of correctly determined results (granting and not
granting access to registered and unregistered users, respectively) among the total number of examined
cases [
        <xref ref-type="bibr" rid="ref22">23</xref>
        ]:
      </p>
      <p>TP  FN  TN  FP</p>
      <p>
        Balanced precision BA is an indicator that is calculated in case the sample is not proportional, that
is, a different number of observations in the classes [
        <xref ref-type="bibr" rid="ref22">23</xref>
        ]:
      </p>
      <p>(1 FRR)  (1 FAR)
Accuracy </p>
      <p>BA </p>
      <p>TP  TN
2
 
 
(9) 
(10) 
(11) 
(12) </p>
      <p>For each user, TP and FN were calculated using the biometric vector samples provided by them. To
calculate TN and FP for each user, his biometric etalon was taken, and the biometric vectors of the other
4 participants of the experiment were presented for verification. Statistical data are given
in Table 1.</p>
      <p>Table 1 
Results of the experiment </p>
      <p>TP 
671 </p>
      <p>FN 
79 </p>
      <p>FP 
122 </p>
      <p>TN 
2878 </p>
      <p>Using (9-12), we calculate errors of the 1st and 2nd type, as well as the accuracy of correctly
determining the results. The results of the calculations are given in Table 2.</p>
      <p>Table 2 
Calculation results </p>
      <p>FRR 
0,1053 </p>
      <p>FAR 
0,0406 </p>
      <p>Accuracy 
0,9464 </p>
      <p>We should note that when users input their own signature into the system, the calculated estimates
obtained are typically higher. This is justified by the fact that the user "trains" to enter his own signature
during everyday use, which makes the movements more subconscious, brought to automaticity.</p>
      <p>
        In addition, statistical material was accumulated with the help of the developed application. Based
om it, the stability of the handwritten signature characteristics over a long period of time, in particular,
about a year, was analyzed. According to this analysis, the probability of correct users’ recognition at a
90% confidence interval [
        <xref ref-type="bibr" rid="ref18">19</xref>
        ] is in the range of 0.91-0.98 for a handwritten signature [
        <xref ref-type="bibr" rid="ref12 ref13">13, 14</xref>
        ].
      </p>
      <p>
        In addition, the software applications developed during this work were granted copyright registration
certificates [
        <xref ref-type="bibr" rid="ref19">20</xref>
        ].
      </p>
    </sec>
    <sec id="sec-6">
      <title>5. Conclusions </title>
      <p>To sum up the results obtained, it is pertinent to observe that utilizing users' dynamic biometric
characteristics for authentication is an efficient method for safeguarding information. The decision to
authenticate a user in such systems is based on comparing their biometric etalon with the data provided
during the authentication process. The etalon is formed based on the study of its selected individual
characteristics. It is appropriate to consider systems based on the handwritten signatures recognition.</p>
      <p>We propose a model for user authentication based on dynamic biometric features extracted from
handwritten signatures, along with a set of methods for its implementation. Within the framework of
the proposed model, method of forming biometric characteristics vector have been developed. The
speed of motion within specified intervals and the angle of inclination of the interval vector were
selected as indicators for the handwritten signature. These indicators reflect the dynamic component of
a handwritten signature and can be obtained without the use of specialized hardware. A method of
establishing secure communication is proposed for safe interaction of devices within the model.</p>
      <p>The user recognition algorithm based on the Hamming distance was chosen to implement the
proposed model due to its speed and ease of implementation, making it a practical choice for real-world
applications.</p>
      <p>An efficiency analysis of the proposed model was conducted. Particularly, we calculated the
probabilities of errors of the first and second type, along with the balanced accuracy. Balanced accuracy
in this case is nothing more than the probability of making the right decision to grant or deny access to
users. The values of errors of the first and second type were 0.1053 and 0.0406, respectively. Balanced
accuracy for the proposed model was 0.92.</p>
      <p>The stability of the characteristics of the handwritten signature over the year was analyzed. The
range of the probability of correct user recognition values was calculated with a confidence interval of
90%, and was found to be between 0.91 and 0.98 for the proposed model.</p>
      <p>The obtained estimates demonstrate the effectiveness of the proposed model for user authentication,
and suggest that it has significant potential for improving the measures of technical information
protection. The software implementation of the proposed model will enhance the provision of
identification and authentication services, particularly when used in conjunction with existing
authentication systems.</p>
    </sec>
    <sec id="sec-7">
      <title>6. References </title>
      <p>[1] R. Penerdji, G. Gavdan, Information security of state information systems, Bezopasnost
informacionnyh tehnology Vol. 27 Iss. 3 (2020) 26–42. doi: 10.26583/bit.2020.3.03</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>N.</given-names>
            <surname>Sandhu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Kaur</surname>
          </string-name>
          , Biometric Security Technique: A Review,
          <source>Indian Journal of Science and Technology</source>
          Vol.
          <volume>9</volume>
          Iss.
          <volume>47</volume>
          (
          <year>2016</year>
          ). doi:
          <volume>10</volume>
          .17485/ijst/2015/v8i1/106905
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>V.</given-names>
            <surname>Shvets</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Fesenko</surname>
          </string-name>
          ,
          <article-title>Basic biometric characteristics, modern systems &amp; technologies of biometric authentication</article-title>
          ,
          <source>Ukrainian Scientific Journal of Information</source>
          Security Vol.
          <volume>19</volume>
          Iss.
          <volume>2</volume>
          (
          <year>2013</year>
          ). doi:
          <volume>10</volume>
          .18372/
          <fpage>2225</fpage>
          -
          <lpage>5036</lpage>
          .
          <fpage>19</fpage>
          .4882
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>L.</given-names>
            <surname>Irwin</surname>
          </string-name>
          , GDPR:
          <article-title>Things to consider when processing biometric data</article-title>
          ,
          <year>2017</year>
          . URL: https://www.itgovernance.eu/blog/en/gdpr-things
          <article-title>-to-consider-when-processing-biometric-data.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>S.</given-names>
            <surname>Aqab</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Tariq</surname>
          </string-name>
          ,
          <source>Handwriting Recognition using Artificial Intelligence Neural Network and Image Processing</source>
          ,
          <source>International Journal of Advanced Computer Science and Applications(IJACSA)</source>
          Vol.
          <volume>11</volume>
          Iss.
          <volume>7</volume>
          (
          <year>2020</year>
          ). doi:
          <volume>10</volume>
          .14569/IJACSA.
          <year>2020</year>
          .0110719
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>K.</given-names>
            <surname>Sarin</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Hodashinsky</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Slezkin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Svetlakov</surname>
          </string-name>
          , E. Kostyuchenko,
          <article-title>Identity authentication based on handwritten signature using fuzzy classifiers ensemble</article-title>
          ,
          <source>International Journal of Advanced Research in Engineering and Technology (IJARET)</source>
          Vol.
          <volume>12</volume>
          Iss.
          <volume>1</volume>
          (
          <year>2021</year>
          )
          <fpage>539</fpage>
          -
          <lpage>568</lpage>
          . doi:
          <volume>10</volume>
          .34218/IJARET.12.1.
          <year>2021</year>
          .0
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>Panda</given-names>
            <surname>Security</surname>
          </string-name>
          ,
          <article-title>Signature recognition, a reliable replacement for passwords</article-title>
          ,
          <year>2016</year>
          . URL: https://www.pandasecurity.com/mediacenter/news/signature
          <article-title>-recognition-passwords.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Zhou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Zheng</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Hu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <source>Handwritten Signature Verification Method Based on Improved Combined Features</source>
          , Applied Sciences Vol.
          <volume>11</volume>
          Iss.
          <volume>13</volume>
          (
          <year>2021</year>
          ). doi:
          <volume>10</volume>
          .3390/app11135867
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>K.</given-names>
            <surname>Kumari</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Rana</surname>
          </string-name>
          ,
          <article-title>A Robust Approach to Authentication of Handwritten Signature Using Voting classifier</article-title>
          ,
          <source>Journal of Computational and Theoretical</source>
          Nanoscience Vol.
          <volume>17</volume>
          Iss.
          <volume>9</volume>
          (
          <year>2020</year>
          )
          <fpage>4654</fpage>
          -
          <lpage>4659</lpage>
          . doi:
          <volume>10</volume>
          .1166/jctn.
          <year>2020</year>
          .
          <volume>9294</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>E.</given-names>
            <surname>Hancer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Bardamova</surname>
          </string-name>
          , I. Hodashinsky,
          <string-name>
            <given-names>K.</given-names>
            <surname>Sarin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Slezkin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Svetlakov</surname>
          </string-name>
          ,
          <article-title>Binary PSO Variants for Feature Selection in Handwritten Signature Authentication</article-title>
          , Informatica Vol.
          <volume>33</volume>
          Iss.
          <volume>3</volume>
          (
          <year>2022</year>
          )
          <fpage>523</fpage>
          -
          <lpage>543</lpage>
          . doi:
          <volume>10</volume>
          .15388/
          <fpage>21</fpage>
          -
          <lpage>infor472</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>D.</given-names>
            <surname>Mackay</surname>
          </string-name>
          ,
          <article-title>Information theory, inference and learning algorithms</article-title>
          , 4th. ed., Cambridge University Press, Cambridge,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>I.</given-names>
            <surname>Horniichuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Yevetskyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Kubrak</surname>
          </string-name>
          ,
          <article-title>Applying mobile devices in biometric user authentication systems</article-title>
          ,
          <source>Information Technology and Security</source>
          Vol.
          <volume>7</volume>
          Iss. 1 (
          <year>2019</year>
          )
          <fpage>14</fpage>
          -
          <lpage>24</lpage>
          . doi:
          <volume>10</volume>
          .20535/
          <fpage>2411</fpage>
          -
          <lpage>1031</lpage>
          .
          <year>2019</year>
          .
          <volume>7</volume>
          .1.184213.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>I.</given-names>
            <surname>Horniichuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Yevetskyi</surname>
          </string-name>
          ,
          <article-title>Selection of handwritten signature dynamic indicators for user authentication</article-title>
          ,
          <source>Information Technology and Security</source>
          Vol.
          <volume>8</volume>
          Iss. 1 (
          <year>2020</year>
          )
          <fpage>19</fpage>
          -
          <lpage>30</lpage>
          . doi:
          <volume>10</volume>
          .20535/
          <fpage>2411</fpage>
          -
          <lpage>1031</lpage>
          .
          <year>2020</year>
          .
          <volume>8</volume>
          .1.217994.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>I.</given-names>
            <surname>Horniichuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Yevetskyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Nakonechna</surname>
          </string-name>
          ,
          <article-title>Influence of destabilizing factors on the stability of user's handwritten signature indicators</article-title>
          ,
          <source>Information Technology and Security</source>
          Vol.
          <volume>8</volume>
          Iss. 2 (
          <year>2020</year>
          )
          <fpage>144</fpage>
          -
          <lpage>152</lpage>
          . doi:
          <volume>10</volume>
          .20535/
          <fpage>2411</fpage>
          -
          <lpage>1031</lpage>
          .
          <year>2020</year>
          .
          <volume>8</volume>
          .2.222592.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Nick</surname>
            <given-names>Naziridis</given-names>
          </string-name>
          , TLS
          <volume>1</volume>
          .3 is here to stay,
          <year>2018</year>
          . https://www.ssl.com/article/tls-1
          <article-title>-3-is-here-to-stay/.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>S.</given-names>
            <surname>Torres</surname>
          </string-name>
          ,
          <article-title>What is the sample rate on phones and how does it affect my experience</article-title>
          ?,
          <year>2021</year>
          . URL: https://impactotic.co/en/chipset
          <article-title>-what-is-the-sample-rate-in-phones-and-how-does-it-affect-myexperience/.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>A.</given-names>
            <surname>Jalan</surname>
          </string-name>
          ,
          <article-title>Touch Sampling Rate vs</article-title>
          .
          <source>Refresh Rate: What's the Difference?</source>
          ,
          <year>2022</year>
          . URL: https://www.makeuseof.
          <article-title>com/touch-sampling-rate-vs-refresh-rate/.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [18]
          <string-name>
            <surname>B. O'Neill</surname>
          </string-name>
          , Elementary Differential Geometry, 2nd. ed., Elsevier Academic Press, San Diego, California, USA,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>E.</given-names>
            <surname>Ventsel</surname>
          </string-name>
          , Theory of probabilities, 4th. ed.,
          <source>Nauka</source>
          , Moscow, USSR,
          <year>1969</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>I.</given-names>
            <surname>Horniichuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Yevetskiy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Nakonechna</surname>
          </string-name>
          ,
          <article-title>Mobile application for the Android operating system designed to collect time characteristics of users' handwritten signature</article-title>
          - Signature
          <string-name>
            <surname>Statistic</surname>
          </string-name>
          ,
          <year>2021</year>
          . Copyright registration certificate No.
          <volume>102321</volume>
          ,
          <string-name>
            <given-names>Filed</given-names>
            <surname>Jan</surname>
          </string-name>
          .
          <year>26th</year>
          .,
          <year>2021</year>
          ,
          <string-name>
            <given-names>Issued</given-names>
            <surname>Feb</surname>
          </string-name>
          .
          <year>4th</year>
          .,
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>M.</given-names>
            <surname>Sivaram</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Ahamed</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Yuvaraj</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Megala</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Porkodi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Kandasamy</surname>
          </string-name>
          ,
          <article-title>Biometric Security and Performance Metrics: FAR, FER, CER, FRR</article-title>
          , in
          <source>: Proceedings of 2019 International Conference on Computational Intelligence and Knowledge Economy</source>
          ,
          <string-name>
            <surname>ICCIKE</surname>
          </string-name>
          , IEEE, Dubai, United Arab Emirates,
          <year>2019</year>
          . doi:
          <volume>10</volume>
          .1109/iccike47802.
          <year>2019</year>
          .
          <volume>9004275</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>D.</given-names>
            <surname>Thakkar</surname>
          </string-name>
          ,
          <article-title>False acceptance rate (FAR) and false recognition rate (FRR</article-title>
          ),
          <year>2020</year>
          . URL: https://www.bayometric.
          <article-title>com/false-acceptance-rate-far-false-recognition-rate-frr/.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>I.</given-names>
            <surname>Miroshnychenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Ivlieva</surname>
          </string-name>
          ,
          <article-title>Credit risk assessment using machine learning methods, Efficient economy</article-title>
          , Vol.
          <volume>12</volume>
          (
          <year>2019</year>
          ). doi:
          <volume>10</volume>
          .32702/
          <fpage>2307</fpage>
          -2105-
          <year>2019</year>
          .
          <volume>12</volume>
          .87.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>