Iñaki Goirizelaia

Learn More
Most people are used to signing documents and because of this, it is a trusted and natural method for user identity verification, reducing the cost of password maintenance and decreasing the risk of eBusiness fraud. In the proposed system, identity is securely verified and an authentic electronic signature is created using biometric dynamic signature(More)
In this paper we present the work developed on off-line signature verification using Hidden Markov Models (HMM). HMM is a well-known technique used by other biometric features, for instance, in speaker recognition and dynamic or on-line signature verification. Our goal here is to extend Left-to-Right (LR)-HMM to the field of static or off-line signature(More)
The handwritten signature is the expression of the will and consent in daily operations such as banking transactions, access control, contracts, etc. However, since signing is a behavioral feature it is not invariant; we do not always sign at the same speed, in the same position or at the same orientation. In order to reduce the errors caused in(More)
This article presents Demotek, a multi-agent prototype for an electronic voting system based on optical character recognition technology. Trade-offs in voter training, ease of use, security, and coercion across various systems are considered for the purpose of recognizing achievable improvements. Based on the use of N-version programming techniques, we(More)
In this paper we present the work developed on off-line signature verification as a continuation of a previous work using Left-to-Right Hidden Markov Models (LR-HMM) in order to extend those models to the field of static or off-line signature processing using results provided by image connectivity analysis. The chain encoding of perimeter points for each(More)
This paper presents a new method for signing digital images using high frequency components to guide the way digital watermarks are inserted in the image. Although this is not a new idea, we implement it working in the spatial domain, which means a more efficient algorithm and less processing time. We use a user’s configurable line segment chain to define(More)
When there is a need to compare the characteristics of several similar global communications systems, security is often an important factor to consider in the comparison. However, in most situations it is difficult to deduce whether a system is more secure than other; and it is even more difficult to deduce how much more secure a system is compared to(More)