The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In recent years, many gait recognition algorithms have been developed, but most of them depend on a specific view angle. In this paper,we present a new gait recognition scheme based on multi-view gait sequence fusion. An experimental comparison of the fusion of gait sequences at different views is reported. Our experiments show the fusion of gait sequences at different views can consistently achieve...
Recently, gait recognition for human identification has received substantial attention from biometrics researchers. Compared with other biometrics, it is more difficult to disguise. In addition, gait can be captured in a distance by using low-resolution capturing devices. In this paper, we proposed a new representation for human gait recognition which is called Motion Silhouettes Image (MSI). MSI...
In this paper, we propose a novel method to reconstruct 3D human body pose for gait recognition from monocular image sequences based on top-down learning. Human body pose is represented by a linear combination of prototypes of 2D silhouette images and their corresponding 3D body models in terms of the position of a predetermined set of joints. With a 2D silhouette image, we can estimate optimal coefficients...
Biometrics based user authentication involves collecting user’s patterns and then using them to determine if a new pattern is similar enough. The quality of the user’s patterns is as important as the quality of the classifier. But, the issue has been ignored in the literature since the popular biometrics are mostly trait based such as finger prints and iris so that its pattern quality depends on the...
In keystroke dynamics-based authentication, novelty detection methods have been used since only the valid user’s patterns are available when a classifier is built. After a while, however, impostors’ keystroke patterns become also available from failed login attempts. We propose to retrain the novelty detector with the impostor patterns to enhance the performance. In this paper the support vector data...
This paper presents a new approach for biometric authentication based on keystroke dynamics through numerical keyboards. The input signal is generated in real time when the user enters with target string. Five features were extracted from this input signal (ASCII key code and four keystroke latencies) and four experiments using samples for genuine and impostor users were performed using two pattern...
We developed the keystroke biometric system (KBS) using the statistical features of the discrete wavelet transformed keystroke pattern in the frequency domain in addition to those of the original keystroke pattern in the time domain. Only 20 keystroke patterns of user’s password typing, where the length of password is no more than 10, are used for building a KBS. The features in the time domain and...
User authentication based on keystroke dynamics is concerned with accepting or rejecting someone based on the way the person types. A timing vector is composed of the keystroke duration times interleaved with the keystroke interval times. Which times or features to use in a classifier is a classic feature selection problem. Genetic algorithm based wrapper approach does not only solve the problem,...
Security is a critical component of most computer systems – especially those used in E-commerce activities over the Internet. Global access to information makes security a critical design issue in these systems. Deployment of sophisticated hardware based authentication systems is prohibitive in all but the most sensitive installations. What is required is a reliable, hardware independent and efficient...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.