This work investigates the feasibility of a personal verification system using gestures as biometric signatures. Gestures are captured by low-power, low-cost tri-axial accelerometers integrated into an expansion pack for palmtop computers. The objective of our study is to understand whether the mobile system can recognize its owner by how she/he performs a particular gesture, acting as a gesture signature. The signature can be used for obtaining access to the mobile device, but the handheld device can also act as an intelligent key to provide access to services in an ambient intelligence scenario. Sample gestures are analyzed and classified using supervised and unsupervised dimensionality reduction techniques. Results on a set of benchmark ...
Biometric authentication relies on an individual’s inner characteristics and traits. We propose an a...
Gesture is a promising mobile User Interface modality that enables eyes-free interaction without sto...
Biometrics are a convenient alternative to traditional forms of access control such as passwords and...
This work investigates the feasibility of a personal verification system using gestures as biometric...
Mobile devices offer their users lots of possibilities and a feeling of freedom. However, this free-...
This article proposes an innovative biometric technique based on the idea of authenticating a person...
Multi-touch tablets allow users to interact with computers through intuitive, natural gestures and d...
A traditional online handwritten signature recognition system requires direct contact to acquisition...
The need to secure private or sensitive information in our mobile devices, desktop and laptop comput...
Today, identity verification is required in many common activities, and it is arguably true that mos...
Smartphones are arguably candidates to become the platform of choice for ubiquitous biometric-based ...
Hand gesture recognition is regarded as an imperative Human–Computer Interaction technology for non-...
In today’s world mobile device has been a basic need of life. People use their mobile devices daily ...
Touchscreens, the dominant input type for mobile devices, require unique authentication solutions. G...
In this paper, we consider the problem of authentication on a smartphone, based on gestures. Specifi...
Biometric authentication relies on an individual’s inner characteristics and traits. We propose an a...
Gesture is a promising mobile User Interface modality that enables eyes-free interaction without sto...
Biometrics are a convenient alternative to traditional forms of access control such as passwords and...
This work investigates the feasibility of a personal verification system using gestures as biometric...
Mobile devices offer their users lots of possibilities and a feeling of freedom. However, this free-...
This article proposes an innovative biometric technique based on the idea of authenticating a person...
Multi-touch tablets allow users to interact with computers through intuitive, natural gestures and d...
A traditional online handwritten signature recognition system requires direct contact to acquisition...
The need to secure private or sensitive information in our mobile devices, desktop and laptop comput...
Today, identity verification is required in many common activities, and it is arguably true that mos...
Smartphones are arguably candidates to become the platform of choice for ubiquitous biometric-based ...
Hand gesture recognition is regarded as an imperative Human–Computer Interaction technology for non-...
In today’s world mobile device has been a basic need of life. People use their mobile devices daily ...
Touchscreens, the dominant input type for mobile devices, require unique authentication solutions. G...
In this paper, we consider the problem of authentication on a smartphone, based on gestures. Specifi...
Biometric authentication relies on an individual’s inner characteristics and traits. We propose an a...
Gesture is a promising mobile User Interface modality that enables eyes-free interaction without sto...
Biometrics are a convenient alternative to traditional forms of access control such as passwords and...