
While graphic-analysis experts are able to spot the differences between authentic 
signatures and frauds, a lay person at the counter of a departmental store is unable to 
see such subtleties. 
  Use of Personal Identification Number (PIN) and password have evolved over 
the past 3 decades to provide means of authentication of people for accessing funds, 
database or buildings. These are being used at banks and ATM, for telephonic access 
to financial and data, for accessing computers and database, and as a digital signature 
to authenticate an electronic document. While this technique has the advantage that it 
is easy to be automated, there are several shortcomings. Authentic users may forget 
their PIN, and it has been demonstrated repeatedly that it is possible to deduce the 
PIN from other seemingly unrelated information of the user.  
  In the recent past, biometrics techniques have been developed for machine 
based verification of the identity of a person. Biometric authentication is based on 
using some physiological or behavioural characteristic of a subject to authenticate that 
particular subject [12]. Verification is defined as comparing an entity provided by the 
user to a biometric template stored in the database. 
  Biometrics based verification techniques such as the use of DNA are suitable 
for very high level of confidence, these techniques are not feasible for routine 
applications such as logging into the computer, or accessing funds or paying at the 
grocery store. Biometrics based techniques that are exceedingly being used include 
the use of fingerprints, hand geometry and iris scan.  
  Even though the use of the anatomical measurements of the individual has 
often been considered to be extremely robust for identifying an individual, these have 
their own limitation. All traditional biometrics measures have certain limitations 
associated to them [12]. DNA cannot be used in certain applications due to issues of 
contamination, sensitivity, cumbersomeness and privacy; ear-shape as a biometric 
measure has a problem of non unique features; facial biometrics have problems with 
aging, face disguise and variable imaging conditions; hand and finger geometry can 
be easily copied. Although fingerprints are very unique but they also have the 
problem of fake fingers, storage and imaging conditions problems. Iris biometrics is 
intrusive and has issues of unreliability. Speech biometrics has the limitation of 
mechanical variance due to the microphone and dependence on subjects’ health [12]. 
The other major concern with the anatomical based biometrics is that these can be 
copied by the impostor using deceit or force, and once copied, the authentic user 
would be faced with life-long loss of identity.    
To overcome some of the above mentioned shortcomings, researchers have 
attempted to develop non-anatomical ‘biometrics’. Biometrics such as keystroke and 
gait analysis are based on the behaviour of the individual [12] but the reliability is 
highly questionable. The other shortcoming in each of these is that these do not give 
the user any control. 
  This paper describes a machine based verification of identity that overcomes 
the above mentioned difficulties. The system is based on the use of traditional 
signatures, but without the user leaving a visual trace of the signature. The system 
does not require any photograph, or any other physical or visual trace of the signature. 
The unpenned signature verifier (USV) – captures the dynamics of the drawing of the 
signature, which is much more difficult to copy even by an expert forger [10]. The 
other advantage of this technique is that the data required to authenticate the USV is 
small enough to be stored within an electronic document or on a smart-card.  
190