Implementing Trustworthy Dynamic Biometric Signature according to the Electronic Signature Regulations

被引:0
|
作者
Smejkal, Vladimir [1 ]
Kodl, Jindrich [2 ]
Kodl, Jindrich, Jr. [3 ]
机构
[1] Brno Univ Technol, Fac Business & Management, CS-61090 Brno, Czech Republic
[2] Authorized Expert Cryptol & Informat Syst Secur, Prague, Czech Republic
[3] Weizmann Inst Sci, Dept Math & Comp Sci, IL-76100 Rehovot, Israel
关键词
dynamic biometric signature; electronic signature; authentication; verification; security legal verification; skilled human motion; MOVEMENT; MODEL;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Many countries of the world exercise legal regulations, which embedded electronic signature based on asymmetric cryptography in their legislation. However, this kind of signature is cumbersome and not yet overly accepted by the public. This paper studies the possibility of replacing it by dynamic biometric signature (DBS) in relation with demands of the legal regulations (EU in particular) not only as "current" electronic signature (ES) but also as "advanced" electronic signature (AES). However, in order to satisfy the requirements for AES, whilst being implemented it must fulfill demands given by the legislation for this type of signature. The authors describe the methods how to satisfy such demands and thus build a system utilizing DBS with high level of security. Furthermore, the authors discuss the issues of uniqueness of DBS in terms of individual's characteristic motion, and hence the validity of parameters required for unique identification of the user. The study then proposes important methods for identification of an individual. The authors then conclude that DBS under the right implementation can form significant alternative to ES and AES.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] The dynamic biometric signature - is the biometric data in the created signature constant?
    Smejkal, Vladimir
    Kodl, Jindrich
    Sieger, Ladislav
    Novak, Daniel
    Schneider, Jakub
    49TH ANNUAL IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2015, : 385 - 390
  • [2] Biometric Electronic Signature Security
    Griffin, Phillip H.
    ADVANCES IN HUMAN FACTORS IN CYBERSECURITY, AHFE 2018, 2019, 782 : 15 - 22
  • [3] Increasing the Robustness of Biometric Templates for Dynamic Signature Biometric Systems
    Tolosana, Ruben
    Vera-Rodriguez, Ruben
    Ortega-Garcia, Javier
    Fierrez, Julian
    49TH ANNUAL IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2015, : 229 - 234
  • [4] STRONG AUTHENTICATION USING DYNAMIC BIOMETRIC SIGNATURE
    Smejkal, Vladimir
    Kodl, Jindrich
    2011 IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2011,
  • [5] About the Abuse Options of the Dynamic Biometric Signature
    Smejkal, Vladimir
    Kodl, Jindrich
    Hortai, Frantisek
    Tesar, Petr
    2018 52ND ANNUAL IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2018, : 42 - 47
  • [6] A method for the synthesis of dynamic biometric signature data
    Rabasse, C.
    Guest, R. M.
    Fairhurst, M. C.
    ICDAR 2007: NINTH INTERNATIONAL CONFERENCE ON DOCUMENT ANALYSIS AND RECOGNITION, VOLS I AND II, PROCEEDINGS, 2007, : 168 - +
  • [7] Influence of hypoxia on the stability of the dynamic biometric signature
    Smejkal, Vladimir
    Oniscenko, Boris
    Kodl, Jindrich
    Tesar, Petr
    2019 IEEE 53RD INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST 2019), 2019,
  • [8] Dynamic Signature Verification Technique for the Online and Offline Representation of Electronic Signatures in Biometric Systems
    Huang, Juanjuan
    Xue, Yuhang
    Liu, Linhui
    PROCESSES, 2023, 11 (01)
  • [9] Stability of Features Describing the Dynamic Signature Biometric Attribute
    Zalasinski, Marcin
    Cpalka, Krzysztof
    Grzanek, Konrad
    ARTIFICIAL INTELLIGENCE AND SOFT COMPUTING (ICAISC 2018), PT II, 2018, 10842 : 250 - 261
  • [10] Biometric Authentication of a User using Online Dynamic Signature
    Baraki, Parashuram
    Ramaswamy, V.
    PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT), 2016, : 576 - 581