Signature recognition is a biometric modality that stores and compares the behavioral patterns which are integral to the process of generating a signature. Some of the factors that are analyzed include the speed, variations in timing and the pressure applied to the pen when an individual composes a signature.
Of all the biometric modalities in existence, signature recognition carries the most potential in terms of adaptability, security and implementation. In addition, the costs involved in the deployment and procurement of this biometric modality are minimal in contrast to the much more complex modalities like retinal and fingerprint recognition.
In this post, we’ll explore the viability of signature recognition biometrics. By the time you finish reading this article, you’ll have a clear idea of:
- The potential applications of signature recognition
- Whether the modality is being actively pursued
- Whether the behavioral-based biometric really ensures maximum authenticity
Adoption and potential applications of signature recognition
Regarding its adaptation in the marketplace, signature recognition offers a range of benefits over other biometric modalities. For example, it is:
- Noninvasive, which raises its probability of being a publicly accepted authentication method
- Constructive for nearly each of the modern generations of PDAs (personal digital assistants) and computers that use handwriting as an input medium
- Difficult to forge, as it’s quite challenging for an adversary to mimic the behavioral patterns involved in composing a signature
Because of these advantages, signature recognition has been and can be used in several ways ranging from commercial use to forensic- and government-level applications.
For example, logging into enterprise accounts can be done through a mixture of fingerprint and signature recognition biometrics to achieve a better state of security in this space. The combination of signature recognition and a secret passcode can also be used to give users an advanced level (Read more...)
*** This is a Security Bloggers Network syndicated blog from Infosec Resources authored by Dan Virgillito. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/Bay-mrp4FcM/