SIGNATURE AND IRIS AUTHENTICATION BASED ON DERIVED KINEMATIC VALUES

被引:2
|
作者
Radhika, K. R. [1 ]
Sheela, S. V. [1 ]
Venkatesha, M. K. [2 ]
Sekhar, G. N.
机构
[1] BMS Coll Engn, Dept Informat Sci & Engn, Bangalore, Karnataka, India
[2] RNS Inst Technol, Bangalore, Karnataka, India
关键词
Signature; iris; authentication; continuous dynamic programming; acceleration; RECOGNITION; SYSTEM;
D O I
10.1142/S021800141000841X
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Authentication systems which are covenant with a measurable behavioral and physiological traits are essential for an online system. In this paper, two types of biometric sample authentication from different databases on a common algorithm using Continuous Dynamic Programming [CDP] are discussed. Using a common algorithm, a method for user-dependent threshold decisions can be achieved for both biometrics in a uniform fashion. The integration of static iris information and dynamic signature information are done at decision level. Inferences are drawn using voting techniques. The derived kinematic feature, acceleration, is used in this paper.
引用
收藏
页码:1237 / 1260
页数:24
相关论文
共 50 条
  • [31] Attacks and Mitigation Techniques for Iris-based Authentication Systems
    Etienne, Laeticia
    Shahriar, Hossain
    2020 IEEE 44TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2020), 2020, : 1101 - 1102
  • [32] Design of Fast Iris Authentication System Based on Android Platform
    Xiao, Ke
    Zhao, Jianyu
    Wang, Xunchang
    Li, Chen
    Jiang, Moqi
    BDIOT 2018: PROCEEDINGS OF THE 2018 2ND INTERNATIONAL CONFERENCE ON BIG DATA AND INTERNET OF THINGS, 2018, : 71 - 75
  • [33] Cryptographic Authentication from the Iris
    Simhadri, Sailesh
    Steel, James
    Fuller, Benjamin
    INFORMATION SECURITY, ISC 2019, 2019, 11723 : 465 - 485
  • [34] Personal authentication by analysis of iris
    Tamura, Y
    Tanaka, T
    SICE 2004 ANNUAL CONFERENCE, VOLS 1-3, 2004, : 239 - 242
  • [35] Detection of Abnormal Iris Authentication
    Lee, Jaehoon
    Lee, Sang Hwa
    Park, Jong-Il
    2019 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2019,
  • [36] Expertise as a signature: continuous implicit authentication based on behavior
    Sad-Houari Nawal
    Taghezout Noria
    Hadj-Sahraoui Nihad
    Cluster Computing, 2025, 28 (3)
  • [37] Authentication based on feature of hand-written signature
    Shu-ren Zhu
    Journal of Central South University of Technology, 2007, 14 : 563 - 567
  • [38] A Comment on "MABS: Multicast Authentication Based on Batch Signature"
    Zhu, Wen Tao
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2012, 11 (11) : 1775 - 1776
  • [39] A robust content based digital signature for image authentication
    Schneider, M
    Chang, SF
    INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, PROCEEDINGS - VOL III, 1996, : 227 - 230
  • [40] Authentication based on feature of hand-written signature
    Zhu, Shu-ren
    JOURNAL OF CENTRAL SOUTH UNIVERSITY OF TECHNOLOGY, 2007, 14 (04): : 563 - 567