Deriving a subspace model for personal authentication in biometric - Dynamic signature case

被引:0
作者
Tanaka, Masahiro [1 ]
Bargiela, Andrzej [2 ]
机构
[1] Konan Univ, Dept Informat Sci & Syst Engn, Higashinada Ku, 8-9-1 Okamoto, Kobe, Hyogo 6588501, Japan
[2] Nottingham Trent Univ, Dept Comp & Math, Nottingham NG11 8NS, England
来源
INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE FOR MODELLING, CONTROL & AUTOMATION JOINTLY WITH INTERNATIONAL CONFERENCE ON INTELLIGENT AGENTS, WEB TECHNOLOGIES & INTERNET COMMERCE, VOL 1, PROCEEDINGS | 2006年
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper deals with personal authentication by biometrics and specifically by signature verification. In biometrics most common case is to register a single data set for authentication. That is why it is frequently not possible to apply popular pattern recognition methods which require a significant amount of positive and negative training data. We propose a new recognition method that uses a subspace derived from a set of test experiments data. By applying a subspace centred on the point designated as the registered data we can authenticate signatures of registered users.
引用
收藏
页码:239 / +
页数:3
相关论文
共 50 条
[21]   Biometric Personal Identification Based on Chinese Handwriting Signature [J].
Zhao, Yongjian .
PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON MECHATRONICS, ROBOTICS AND AUTOMATION (ICMRA 2015), 2015, 15 :792-795
[22]   Biometric Personal Authentication Using Images of Forearm Vein Patterns [J].
Choras, Ryszard S. .
2017 INTERNATIONAL CONFERENCE ON SIGNALS AND SYSTEMS (ICSIGSYS), 2017, :40-43
[23]   Digital holographic-based cancellable biometric for personal authentication [J].
Verma, Gaurav ;
Sinha, Aloka .
JOURNAL OF OPTICS, 2016, 18 (05)
[24]   Fuzzy binary decision tree for biometric based personal authentication [J].
Kumar, Amioy ;
Hanmandlu, M. ;
Gupta, H. M. .
NEUROCOMPUTING, 2013, 99 :87-97
[25]   A Study on a Framework of Online Biometric Authentication with Verification of Personal Repository [J].
Ueshige, Yoshifumi ;
Sakurai, Kouichi .
APPLIED PUBLIC KEY INFRASTRUCTURE, 2005, 128 :155-168
[26]   Biometric authentication using evoked potentials stimulated by personal ultrasound [J].
Nakanishi, Isao ;
Maruoka, Takehiro .
2019 42ND INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2019, :365-368
[27]   Biometric Based Personal Authentication Using Eye Movement Tracking [J].
Dhingra, Atul ;
Kumar, Amioy ;
Hanmandlu, Madasu ;
Panigrahi, Bijaya Ketan .
SWARM, EVOLUTIONARY, AND MEMETIC COMPUTING, PT II (SEMCCO 2013), 2013, 8298 :248-256
[28]   Information fusion in personal biometric authentication based on the iris pattern [J].
Wang, Fenghua ;
Han, Jiuqiang .
MEASUREMENT SCIENCE AND TECHNOLOGY, 2009, 20 (04)
[29]   Multiple Biometric Authentication for Personal Identity using Wearable Device [J].
Hsiao, Chun-Chieh ;
Wang, Shei-Wei ;
Lin, Robert ;
Lee, Ren-Guey .
2016 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2016, :673-678
[30]   Influence of hypoxia on the stability of the dynamic biometric signature [J].
Smejkal, Vladimir ;
Oniscenko, Boris ;
Kodl, Jindrich ;
Tesar, Petr .
2019 IEEE 53RD INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST 2019), 2019,