Page 84 - DCAP309_INFORMATION_SECURITY_AND_PRIVACY
P. 84
Information Security and Privacy
Notes 6.4.5 Signature Verification
Signature verification technology is the examination of an individual’s written signature, involving
the speed, acceleration rate, stroke length and pressure applied during the signature. There are
diverse methods to capture data for analysis i.e. a special pen can be used to identify and examine
analyze various movements when writing a signature, the data will then be obtained within the
pen. Information can also be captured among a special tablet that gauges time, pressure, acceleration
and the duration the pen touches it. As the user writes on the tablet, the movement of the pen
produces sound against paper an is used for verification. An individual’s signature can modify
over time, though, which can effect in the system not identifying authorized users. Signature
systems depend on the device such as special tablet, a special pen etc. When the user signs his name
on an electronic pad, instead of merely comparing signatures, the device instead compares the
direction, speed and pressure of the writing instrument as it moves across the pad.
Task Explain the process of signature verification.
6.4.6 Keystroke
This technique depends on the fact that each person has her/his own keyboard-melody, which
is examined when the user types. It gauges the time taken by a user in pressing a specific key or
looking for a particular key.
Other biometric techniques are:
1. Vein/vascular patterns: Analyses the veins in, for example, the hand and the face.
2. Nail identification: Analyses the tracks in the nails.
3. DNA patterns: it is a very expensive technique and it takes a long time for verification/
identification of a person.
4. Sweat pore analysis: Analyses the way pores on a finger are located.
5. Ear recognition: Shape and size of an ear are unique for every person.
6. Odour detection: Person is verified or identified by their smell.
7. Walking recognition: It analyses the way the person walks.
Self Assessment
Fill in the blanks:
8. ......................... method captures traits of a face either from video or still image and converts
unique traits of a face into a set of numbers.
9. ......................... is a method that captures the physical traits of a user’s hand and fingers. It
examines finger image ridge endings, branches made by ridges.
10. ......................... biometrics accesses the person’s voice to verify or recognize the person.
11. ......................... technology is the examination of an individual’s written signature, involving
the speed, acceleration rate, stroke length and pressure applied during the signature.
12. ......................... technique depends on the fact that each person has her/his own keyboard-
melody, which is examined when the user types.
78 LOVELY PROFESSIONAL UNIVERSITY