skip to main content
research-article

mmHSV: In-Air Handwritten Signature Verification via Millimeter-Wave Radar

Authors Info & Claims
Published:22 November 2023Publication History
Skip Abstract Section

Abstract

Electronic signatures are widely used in financial business, telecommuting, and identity authentication. Offline electronic signatures are vulnerable to copy or replay attacks. Contact-based online electronic signatures are limited by indirect contact such as handwriting pads and may threaten the health of users. Consider combining hand shape features and writing process features to form electronic signatures, the article proposes an in-air handwritten signature verification system with millimeter-wave(mmWave) radar, namely mmHSV. First, the biometrics of the handwritten signature process are modeled, and phase-dependent biometrics and behavioral features are extracted from the mmWave radar mixture signal. Secondly, a handwritten feature recognition network based on few-sample learning is presented to fuse multi-dimensional features and determine user legitimacy. Finally, mmHSV is implemented and evaluated with commercial mmWave devices in different scenarios and attack mode conditions. Experimental results show that the mmHSV can achieve accurate, efficient, robust and scalable handwritten signature verification. Area Under Curve (AUC) is 98.96%, False Acceptance Rate (FAR) is 5.1% at the fixed threshold, AUC is 97.79% for untrained users.

REFERENCES

  1. [1] Bhattacharyya Debnath, Ranjan Rahul, Alisherov Farkhod, Choi Minkyu, et al. 2009. Biometric authentication: A review. International Journal of u-and e-Service, Science and Technology 2, 3 (2009), 1328.Google ScholarGoogle Scholar
  2. [2] Chen Mengqi, Lin Jiawei, Zou Yongpan, Ruby Rukhsana, and Wu Kaishun. 2020. Silentsign: Device-free handwritten signature verification through acoustic sensing. In Proceedings of the 2020 IEEE International Conference on Pervasive Computing and Communications (PerCom’20). IEEE, 110.Google ScholarGoogle ScholarCross RefCross Ref
  3. [3] Cleveland Robert B., Cleveland William S., McRae Jean E., and Terpenning Irma. 1990. STL: A seasonal-trend decomposition. Journal of Official Statistics 6, 1 (1990), 373.Google ScholarGoogle Scholar
  4. [4] Ding Feng, Wang Dong, Zhang Qian, and Zhao Run. 2019. ASSV: Handwritten signature verification using acoustic signals. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 3, 3 (2019), 122.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. [5] Fang Yuxun, Kang Wenxiong, Wu Qiuxia, and Tang Lei. 2017. A novel video-based system for in-air signature verification. Computers & Electrical Engineering 57 (2017), 114. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. [6] Griswold-Steiner Isaac, Matovu Richard, and Serwadda Abdul. 2019. Wearables-driven freeform handwriting authentication. IEEE Transactions on Biometrics, Behavior, and Identity Science 1, 3 (2019), 152164.Google ScholarGoogle ScholarCross RefCross Ref
  7. [7] Guan Junfeng, Madani Sohrab, Jog Suraj, Gupta Saurabh, and Hassanieh Haitham. 2020. Through fog high-resolution imaging using millimeter wave radar. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. 1146411473.Google ScholarGoogle ScholarCross RefCross Ref
  8. [8] Guo Qing, Feng Wei, Zhou Ce, Huang Rui, Wan Liang, and Wang Song. 2017. Learning dynamic siamese network for visual object tracking. In Proceedings of the IEEE International Conference on Computer Vision. 17631771.Google ScholarGoogle ScholarCross RefCross Ref
  9. [9] Hadsell Raia, Chopra Sumit, and LeCun Yann. 2006. Dimensionality reduction by learning an invariant mapping. In Proceedings of the 2006 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR’06), Vol. 2. IEEE, 17351742.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. [10] Hamadene Assia and Chibani Youcef. 2016. One-class writer-independent offline signature verification using feature dissimilarity thresholding. IEEE Transactions on Information Forensics and Security 11, 6 (2016), 12261238.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. [11] Keogh Eamonn and Ratanamahatana Chotirat Ann. 2005. Exact indexing of dynamic time warping. Knowledge and Information Systems 7, 3 (2005), 358386.Google ScholarGoogle ScholarCross RefCross Ref
  12. [12] Kong Hao, Lu Li, Yu Jiadi, Chen Yingying, Kong Linghe, and Li Minglu. 2019. Fingerpass: Finger gesture-based continuous user authentication for smart homes using commodity wifi. In Proceedings of the 20th ACM International Symposium on Mobile Ad Hoc Networking and Computing. 201210.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. [13] Lai Songxuan and Jin Lianwen. 2018. Recurrent adaptation networks for online signature verification. IEEE Transactions on Information Forensics and Security 14, 6 (2018), 16241637.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. [14] Li Gen and Sato Hiroyuki. 2020. Handwritten signature authentication using smartwatch motion sensors. In Proceedings of the 2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC’20). IEEE, 15891596.Google ScholarGoogle ScholarCross RefCross Ref
  15. [15] Li Huining, Xu Chenhan, Rathore Aditya Singh, Li Zhengxiong, Zhang Hanbin, Song Chen, Wang Kun, Su Lu, Lin Feng, Ren Kui, and Xu Wenyao. 2020. VocalPrint: Exploring a resilient and secure voice authentication via mmWave biometric interrogation. In Proceedings of the 18th Conference on Embedded Networked Sensor Systems. 312325.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. [16] Liu Haipeng, Cui Kening, Hu Kaiyuan, Wang Yuheng, Zhou Anfu, Liu Liang, and Ma Huadong. 2022. mTransSee: Enabling environment-independent mmWave sensing based gesture recognition via transfer learning. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 6, 1 (2022), 128.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. [17] Liu Tiantian, Gao Ming, Lin Feng, Wang Chao, Ba Zhongjie, Han Jinsong, Xu Wenyao, and Ren Kui. 2021. Wavoice: A noise-resistant multi-modal speech recognition system fusing mmWave and audio signals. In Proceedings of the 19th ACM Conference on Embedded Networked Sensor Systems. 97110.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. [18] Logan Beth. 2000. Mel frequency cepstral coefficients for music modeling. In Proceedings of the International Symposium on Music Information Retrieval. Citeseer.Google ScholarGoogle Scholar
  19. [19] Nagai Koki and Kim Minseok. 2020. Contactless simultaneous measurement method for breathing and heartbeat rates using millimeter-waves. In Proceedings of the 2020 14th International Symposium on Medical Information Communication Technology (ISMICT’20). IEEE, 14.Google ScholarGoogle ScholarCross RefCross Ref
  20. [20] Regani Sai Deepika, Wu Chenshu, Wang Beibei, Wu Min, and Liu KJ Ray. 2021. mmWrite: Passive handwriting tracking using a single millimeter-wave radio. IEEE Internet of Things Journal 8, 17 (2021), 1329113305.Google ScholarGoogle ScholarCross RefCross Ref
  21. [21] Regmi Hem, Saadat Moh Sabbir, Sur Sanjib, and Nelakuditi Srihari. 2021. SquiggleMilli: Approximating SAR imaging on mobile millimeter-wave devices. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 5, 3 (2021), 126.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. [22] Rúa Enrique Argones and Castro José Luis Alba. 2012. Online signature verification based on generative models. IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics) 42, 4 (2012), 12311242.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. [23] Salvador Stan and Chan Philip. 2007. Toward accurate dynamic time warping in linear time and space. Intelligent Data Analysis 11, 5 (2007), 561580.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. [24] Santhalingam Panneer Selvam, Hosain Al Amin, Zhang Ding, Pathak Parth, Rangwala Huzefa, and Kushalnagar Raja. 2020. mmASL: Environment-independent asl gesture recognition using 60 ghz millimeter-wave signals. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 4, 1 (2020), 130.Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. [25] Sasaki Moe and Inamura Masaki. 2016. Evaluation of handwriting characteristic for two-factor authentication interface on touch-pad panel. In Proceedings of the ICE-B. 106111.Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. [26] Song Xiaoyu, Xia Xinghua, and Luan Fangjun. 2016. Online signature verification based on stable features extracted dynamically. IEEE Transactions on Systems, Man, and Cybernetics: Systems 47, 10 (2016), 26632676.Google ScholarGoogle ScholarCross RefCross Ref
  27. [27] Wang Fengyu, Zeng Xiaolu, Wu Chenshu, Wang Beibei, and Liu K. J. Ray. 2021. mmHRV: Contactless heart rate variability monitoring using millimeter-wave radio. IEEE Internet of Things Journal 8, 22 (2021), 1662316636.Google ScholarGoogle ScholarCross RefCross Ref
  28. [28] Wei Zhixiang, Yang Song, Xie Yadong, Li Fan, and Zhao Bo. 2021. SVSV: Online handwritten signature verification based on sound and vibration. Information Sciences 572 (2021), 109125. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. [29] Wu Chenshu, Zhang Feng, Wang Beibei, and Liu K. J. Ray. 2020. mmTrack: Passive multi-person localization using commodity millimeter wave radio. In Proceedings of the IEEE INFOCOM 2020-IEEE Conference on Computer Communications. IEEE, 24002409.Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. [30] Xu Chenhan, Li Huining, Li Zhengxiong, Zhang Hanbin, Rathore Aditya Singh, Chen Xingyu, Wang Kun, Huang Ming-chun, and Xu Wenyao. 2021. CardiacWave: A mmWave-based scheme of non-contact and high-definition heart activity computing. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 5, 3 (2021), 126.Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. [31] Xu Wenyuan, Tian Jing, Cao Yu, and Wang Song. 2017. Challenge-response authentication using in-air handwriting style verification. IEEE Transactions on Dependable and Secure Computing 17, 1 (2017), 5164.Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. [32] Yang Xin, Liu Jian, Chen Yingying, Guo Xiaonan, and Xie Yucheng. 2020. MU-ID: Multi-user identification through gaits using millimeter wave radios. In Proceedings of the IEEE INFOCOM 2020-IEEE Conference on Computer Communications. IEEE, 25892598.Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. [33] Yue Shichao, He Hao, Cao Peng, Zha Kaiwen, Koizumi Masayuki, and Katabi Dina. 2022. CornerRadar: RF-based indoor localization around corners. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 6, 1 (2022), 124.Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. [34] Zhang Zhenyuan, Tian Zengshan, and Zhou Mu. 2018. Latern: Dynamic continuous hand gesture recognition using FMCW radar sensor. IEEE Sensors Journal 18, 8 (2018), 32783289.Google ScholarGoogle ScholarCross RefCross Ref
  35. [35] Zhao Run, Wang Dong, Zhang Qian, Jin Xueyi, and Liu Ke. 2021. Smartphone-based handwritten signature verification using acoustic signals. Proceedings of the ACM on Human–Computer Interaction 5, ISS (2021), 126.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. mmHSV: In-Air Handwritten Signature Verification via Millimeter-Wave Radar

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM Transactions on Internet of Things
      ACM Transactions on Internet of Things  Volume 4, Issue 4
      Special Issue on Wireless Sensing for IoT: Part 1
      November 2023
      194 pages
      EISSN:2577-6207
      DOI:10.1145/3633336
      Issue’s Table of Contents

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 22 November 2023
      • Online AM: 12 August 2023
      • Accepted: 25 July 2023
      • Revised: 26 March 2023
      • Received: 31 October 2022
      Published in tiot Volume 4, Issue 4

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Full Text

    View this article in Full Text.

    View Full Text