Outstanding Paper Award

Information Management & Computer Security

ISSN: 0968-5227

Article publication date: 21 November 2008

434

Keywords

Citation

(2008), "Outstanding Paper Award", Information Management & Computer Security, Vol. 16 No. 5. https://doi.org/10.1108/imcs.2008.04616eaa.001

Publisher

:

Emerald Group Publishing Limited

Copyright © 2008, Emerald Group Publishing Limited


Outstanding Paper Award

Article Type: Awards for Excellence From: Information Management & Computer Security, Volume 16, Issue 5

The application of signature recognition to transparent handwriting verification for mobile devices

N.L. ClarkeNetwork Research Group, School of Computing, Communications and Electronics, University of Plymouth, Plymouth, UKA.R. MekalaSchool of Computing, Communications and Electronics, University of Plymouth, Plymouth, UK

Purpose – The popularity of mobile devices and the evolving nature of the services and information they can delivery make them increasingly desirable targets for misuse. The ability to provide effective authentication of the user becomes imperative if protection against misuse of personally and financially sensitive information is to be provided. This paper discusses the application of biometrics to a mobile device in a transparent and continuous fashion and the subsequent advantages and disadvantages that are in contention with various biometric techniques.Design/methodology/approach – An investigation was conducted to evaluate the feasibility of utilising signature recognition, to verify users based upon written words and not signatures, thereby enabling transparent handwriting verification. Participants were required to write a number of common words, such as “hello” “sorry” and “thank you”. The ability to correctly verify against their own template and to reject impostors was then established.Findings – Totally, 20 users participated in the study and an average FAR and FRR of 0 and 1.2 per cent, respectively, were experienced across eight common words.Research limitations/implications – The initial study has proven very successful, however, further investigations need to be established with a larger population of users and a wider vocabulary of words.Originality/value – This study has verified the feasibility of applying an existing signature recognition technique to transparent handwriting verification.

Keywords: Biometrics, Communication technologies, Identification, User interfaces

www.emeraldinsight.com/10.1108/09685220710759559

This article originally appeared in Volume 15 Number 3, 2007, pp. 214-25. of Information Management & Computer Security

Highly commended

Strategies for successful CRM implementation

ThuyUyen H. Nguyen, Joseph S. Sherif, Michael NewbyVol. 15 No. 2, 2007.

A PRoactive malware identification system based on the computer hygiene principles

Vasileios Vlachos, Diomidis SpinellisVol. 15 No. 4, 2007.

Design of a multimedia traffic classifier for Snort

Oge Marques, Pierre Baillargeon,Vol. 15 No. 3, 2007.

Related articles