Sciweavers

130 search results - page 5 / 26
» User Authentication through Typing Biometrics Features
Sort
View
ICMCS
2010
IEEE
171views Multimedia» more  ICMCS 2010»
13 years 8 months ago
Transforming a pattern identifier into biometric key generators
According to a popular pattern recognition method, this paper proposes two methods to generate a secret from individual's biometric information, such as fingerprint feature p...
Yongdong Wu, Bo Qiu
AVBPA
2005
Springer
395views Biometrics» more  AVBPA 2005»
13 years 9 months ago
A Score-Level Fusion Benchmark Database for Biometric Authentication
Fusing the scores of several biometric systems is a very promising approach to improve the overall system’s accuracy. Despite many works in the literature, it is surprising that ...
Norman Poh, Samy Bengio
HAPTICS
2006
IEEE
14 years 1 months ago
Haptic-Based Biometrics: A Feasibility Study
Biometric systems identify users based on behavioral or physiological characteristics. The advantages of such systems over traditional authentication methods such as passwords are...
Mauricio Orozco Trujillo, Yednek Asfaw, Shervin Sh...
ICMI
2005
Springer
108views Biometrics» more  ICMI 2005»
14 years 1 months ago
Understanding the effect of life-like interface agents through users' eye movements
We motivate an approach to evaluating the utility of lifelike interface agents that is based on human eye movements rather than questionnaires. An eye tracker is employed to obtai...
Helmut Prendinger, Chunling Ma, Jin Yingzi, Arturo...
BIOID
2008
149views Biometrics» more  BIOID 2008»
13 years 9 months ago
Additive Block Coding Schemes for Biometric Authentication with the DNA Data
Abstract. To implement a biometric authentication scheme, the templates of a group of people are stored in the database (DB) under the names of these people. Some person presents a...
Vladimir B. Balakirsky, Anahit R. Ghazaryan, A. J....