This study treats behavioral biometric authentication, and its focus is on creating an application that uses hand-arm-movements to identify users. The systemis modelled to achieve a minimal false rejection rate (FRR) and false acceptance rate (FAR). Experiments featuring several test subjects performing hand-arm-movements using our device were performed in order to gauge the FRR and FAR of our system. The FRR and FAR achieved were 35% and 15.8%, respectively. The study concludes that hand-arm-movements may be useful for authentication, but further research is required
This article proposes an innovative biometric technique based on the idea of authenticating a person...
This paper present a state of art about biometric hand, different techniques used.Biometric is essen...
In this paper we present an identification and authentication system based on hand geometry. First, ...
This study treats behavioral biometric authentication, and its focus is on creating an application t...
A novel hand biometric authentication method based on measurements of the user\u27s stationary hand ...
As technology evolves, we need better tools to secure our sensitive data on our smartphones. The com...
The need to secure private or sensitive information in our mobile devices, desktop and laptop comput...
Abstract. Human behaviour has been used in biometrics. In this paper we de-scribe a new behavioural ...
In this paper, biometric security system for access control based on hand geometry is presented. Bio...
In recent years, behavioural biometrics have become increasingly popular, with many types of behavio...
Abstract: The encroachment of information is considered the most important attack that affects the p...
Biometric computer authentication has an advantage over password and access card authentication in t...
Today, identity verification is required in many common activities, and it is arguably true that mos...
The growing amount of collected and processed data means that there is a need to control access to t...
In order to use mobile devices safely, many researchers have worked on topics related to mobile secu...
This article proposes an innovative biometric technique based on the idea of authenticating a person...
This paper present a state of art about biometric hand, different techniques used.Biometric is essen...
In this paper we present an identification and authentication system based on hand geometry. First, ...
This study treats behavioral biometric authentication, and its focus is on creating an application t...
A novel hand biometric authentication method based on measurements of the user\u27s stationary hand ...
As technology evolves, we need better tools to secure our sensitive data on our smartphones. The com...
The need to secure private or sensitive information in our mobile devices, desktop and laptop comput...
Abstract. Human behaviour has been used in biometrics. In this paper we de-scribe a new behavioural ...
In this paper, biometric security system for access control based on hand geometry is presented. Bio...
In recent years, behavioural biometrics have become increasingly popular, with many types of behavio...
Abstract: The encroachment of information is considered the most important attack that affects the p...
Biometric computer authentication has an advantage over password and access card authentication in t...
Today, identity verification is required in many common activities, and it is arguably true that mos...
The growing amount of collected and processed data means that there is a need to control access to t...
In order to use mobile devices safely, many researchers have worked on topics related to mobile secu...
This article proposes an innovative biometric technique based on the idea of authenticating a person...
This paper present a state of art about biometric hand, different techniques used.Biometric is essen...
In this paper we present an identification and authentication system based on hand geometry. First, ...