SIGNATURE AND IRIS AUTHENTICATION BASED ON DERIVED KINEMATIC VALUES

被引:2
|
作者
Radhika, K. R. [1 ]
Sheela, S. V. [1 ]
Venkatesha, M. K. [2 ]
Sekhar, G. N.
机构
[1] BMS Coll Engn, Dept Informat Sci & Engn, Bangalore, Karnataka, India
[2] RNS Inst Technol, Bangalore, Karnataka, India
关键词
Signature; iris; authentication; continuous dynamic programming; acceleration; RECOGNITION; SYSTEM;
D O I
10.1142/S021800141000841X
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Authentication systems which are covenant with a measurable behavioral and physiological traits are essential for an online system. In this paper, two types of biometric sample authentication from different databases on a common algorithm using Continuous Dynamic Programming [CDP] are discussed. Using a common algorithm, a method for user-dependent threshold decisions can be achieved for both biometrics in a uniform fashion. The integration of static iris information and dynamic signature information are done at decision level. Inferences are drawn using voting techniques. The derived kinematic feature, acceleration, is used in this paper.
引用
收藏
页码:1237 / 1260
页数:24
相关论文
共 50 条
  • [1] A NEW SCHEME OF SIGNATURE EXTARCTION FOR IRIS AUTHENTICATION
    Akrout, Belhassen
    Kallel, Imen Khanfir
    BenAmar, Chokri
    Ben Amor, Boulbaba
    2009 6TH INTERNATIONAL MULTI-CONFERENCE ON SYSTEMS, SIGNALS AND DEVICES, VOLS 1 AND 2, 2009, : 732 - +
  • [2] Iris and Signature Authentication using Continuous Dynamic Programming
    Sheela, S. V.
    Radhika, K. R.
    Venkatesha, M. K.
    Vijaya, P. A.
    PROCEEDINGS OF THE 2009 2ND INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING, VOLS 1-9, 2009, : 1812 - 1816
  • [3] Adoption of Iris-Based Authentication
    Mohammadi, S.
    Kaldi, A.
    IEEM: 2008 INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT, VOLS 1-3, 2008, : 1582 - 1586
  • [4] Personal authentication based on iris texture analysis
    Benhammadi, Farid
    Kihal, Nassima
    2008 IEEE/ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1-3, 2008, : 537 - 543
  • [5] Iris authentication scheme based on fuzzy extractor
    State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100190, China
    不详
    Jisuanji Yanjiu yu Fazhan, 2008, 6 (1036-1042):
  • [6] Signature authentication based on subpattern analysis
    Radhika, K. R.
    Venkatesha, M. K.
    Sekhar, G. N.
    APPLIED SOFT COMPUTING, 2011, 11 (03) : 3218 - 3228
  • [7] A signature based password authentication method
    Fung, GSK
    Lau, RWH
    Liu, JNK
    SMC '97 CONFERENCE PROCEEDINGS - 1997 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS, VOLS 1-5: CONFERENCE THEME: COMPUTATIONAL CYBERNETICS AND SIMULATION, 1997, : 631 - 636
  • [8] Integrating Iris and Signature Traits for Personal Authentication Using User-Specific Weighting
    Viriri, Serestina
    Tapamo, Jules R.
    SENSORS, 2012, 12 (04): : 4324 - 4338
  • [9] Accurate iris boundary detection in iris-based biometric authentication process
    Dey, Somnath
    Samanta, Debasis
    PATTERN RECOGNITION AND MACHINE INTELLIGENCE, PROCEEDINGS, 2007, 4815 : 600 - 607
  • [10] Multimodal Biometric Authentication based on Voice, Face and Iris
    Barbu, Tudor
    Ciobanu, Adrian
    Luca, Mihaela
    2015 E-HEALTH AND BIOENGINEERING CONFERENCE (EHB), 2015,