AuthSig: Safeguarding Scanned Signatures Against Unauthorized Reuse in Paperless Workflows

๐Ÿ“… 2025-11-12
๐Ÿ“ˆ Citations: 0
โœจ Influential: 0
๐Ÿ“„ PDF
๐Ÿค– AI Summary
Static scanned signatures in paperless office environments are vulnerable to unauthorized copying, reuse, and lack fine-grained usage control. Method: This paper proposes AuthSigโ€”a novel framework that integrates implicit watermarking with generative modeling. It introduces a differentiable steganographic method based on style encoding to embed fine-grained, one-time authentication information into signature images, augmented by keypoint-driven data augmentation. Leveraging human visual insensitivity to stylistic perturbations, the method achieves perceptually consistent watermark embedding while preserving visual authenticity. Contribution/Results: Experiments demonstrate >98% watermark extraction accuracy under digital distortions and cross-domain print-scan attacks. AuthSig enables a strong โ€œone signature, one-time useโ€ authentication policy, effectively endowing static signatures with dynamic security properties.

Technology Category

Application Category

๐Ÿ“ Abstract
With the deepening trend of paperless workflows, signatures as a means of identity authentication are gradually shifting from traditional ink-on-paper to electronic formats.Despite the availability of dynamic pressure-sensitive and PKI-based digital signatures, static scanned signatures remain prevalent in practice due to their convenience. However, these static images, having almost lost their authentication attributes, cannot be reliably verified and are vulnerable to malicious copying and reuse. To address these issues, we propose AuthSig, a novel static electronic signature framework based on generative models and watermark, which binds authentication information to the signature image. Leveraging the human visual system's insensitivity to subtle style variations, AuthSig finely modulates style embeddings during generation to implicitly encode watermark bits-enforcing a One Signature, One Use policy.To overcome the scarcity of handwritten signature data and the limitations of traditional augmentation methods, we introduce a keypoint-driven data augmentation strategy that effectively enhances style diversity to support robust watermark embedding. Experimental results show that AuthSig achieves over 98% extraction accuracy under both digital-domain distortions and signature-specific degradations, and remains effective even in print-scan scenarios.
Problem

Research questions and friction points this paper is trying to address.

Preventing unauthorized reuse of scanned signatures in paperless workflows
Addressing vulnerability of static signature images to malicious copying
Ensuring reliable authentication through watermark-based signature protection
Innovation

Methods, ideas, or system contributions that make the work stand out.

Generative models embed watermarks into signature images
Keypoint-driven augmentation enhances style diversity for robustness
One Signature One Use policy prevents unauthorized copying
๐Ÿ”Ž Similar Papers
No similar papers found.
R
RuiQiang Zhang
Anhui Province Key Laboratory of Digital Security, University of Science and Technology of China
Zehua Ma
Zehua Ma
University of Science and Technology of China
Image WatermarkingImage Processing3D PrintingAesthetic 2D Barcode
G
Guanjie Wang
Anhui Province Key Laboratory of Digital Security, University of Science and Technology of China
C
Chang Liu
Anhui Province Key Laboratory of Digital Security, University of Science and Technology of China
Hengyi Wang
Hengyi Wang
Computer Science, Rutgers University
Trustworthy AIInterpretabilityBayesian Deep Learning
W
Weiming Zhang
Anhui Province Key Laboratory of Digital Security, University of Science and Technology of China