The paper presents experiments with the home-made, low-cost prototype of a sensor-equipped pen for handwriting-based biometric authentication. The pen allows to capture the dynamics of user writing on normal paper, while producing a kind of password (passphrase) chosen in advance. The use of a word of any length instead of the user's signature makes the approach more robust to spoofing, since there is no repetitive pattern to steal. Moreover, if the template gets violated, this is much less harmful than signature catch. The entailed sensors are a pair of accelerometer and gyroscope and a pressure sensor. The aim is a natural yet precise interaction, that allows recognizing the user by the signals recorded while producing a specific word cho...
Biometric signature verification has been traditionally performed in pen-based office-like scenarios...
With the establishment of the information society, security had become the greatest concern for Inst...
This paper investigates the extraction of a reproducible bit string referred to as biometric key fro...
The paper presents experiments with the home-made, low-cost prototype of a sensor-equipped pen for h...
The paper presents experiments with the home-made, low-cost prototype of a sensor-equipped pen for h...
The paper presents experiments with the home-made, low-cost prototype of a sensor-equipped pen for h...
The paper presents experiments with the home-made, low-cost prototype of a sensor-equipped pen for h...
The paper presents experiments with the home-made, low-cost prototype of a sensor-equipped pen for h...
In this article the possibility of a biometric on-pen matching for dynamic handwriting-based user au...
Abstract: The phenomenon of writing reflects developed fine motor skills of a person. Specially, the...
A literature review was done to find that there are still issues with writing passwords. From the in...
Handwritten signatures are one of the most socially accepted biometric traits. Signatures are common...
Handwriting analysis is playing an important role in user authentication or online writer identifica...
We have revised several authentication systems based on biometric technology to resume advantages an...
Describes a method of creating a system of signs to identify the user for authentication on the dyna...
Biometric signature verification has been traditionally performed in pen-based office-like scenarios...
With the establishment of the information society, security had become the greatest concern for Inst...
This paper investigates the extraction of a reproducible bit string referred to as biometric key fro...
The paper presents experiments with the home-made, low-cost prototype of a sensor-equipped pen for h...
The paper presents experiments with the home-made, low-cost prototype of a sensor-equipped pen for h...
The paper presents experiments with the home-made, low-cost prototype of a sensor-equipped pen for h...
The paper presents experiments with the home-made, low-cost prototype of a sensor-equipped pen for h...
The paper presents experiments with the home-made, low-cost prototype of a sensor-equipped pen for h...
In this article the possibility of a biometric on-pen matching for dynamic handwriting-based user au...
Abstract: The phenomenon of writing reflects developed fine motor skills of a person. Specially, the...
A literature review was done to find that there are still issues with writing passwords. From the in...
Handwritten signatures are one of the most socially accepted biometric traits. Signatures are common...
Handwriting analysis is playing an important role in user authentication or online writer identifica...
We have revised several authentication systems based on biometric technology to resume advantages an...
Describes a method of creating a system of signs to identify the user for authentication on the dyna...
Biometric signature verification has been traditionally performed in pen-based office-like scenarios...
With the establishment of the information society, security had become the greatest concern for Inst...
This paper investigates the extraction of a reproducible bit string referred to as biometric key fro...