SIGNATURE AND IRIS AUTHENTICATION BASED ON DERIVED KINEMATIC VALUES

被引:2
|
作者
Radhika, K. R. [1 ]
Sheela, S. V. [1 ]
Venkatesha, M. K. [2 ]
Sekhar, G. N.
机构
[1] BMS Coll Engn, Dept Informat Sci & Engn, Bangalore, Karnataka, India
[2] RNS Inst Technol, Bangalore, Karnataka, India
关键词
Signature; iris; authentication; continuous dynamic programming; acceleration; RECOGNITION; SYSTEM;
D O I
10.1142/S021800141000841X
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Authentication systems which are covenant with a measurable behavioral and physiological traits are essential for an online system. In this paper, two types of biometric sample authentication from different databases on a common algorithm using Continuous Dynamic Programming [CDP] are discussed. Using a common algorithm, a method for user-dependent threshold decisions can be achieved for both biometrics in a uniform fashion. The integration of static iris information and dynamic signature information are done at decision level. Inferences are drawn using voting techniques. The derived kinematic feature, acceleration, is used in this paper.
引用
收藏
页码:1237 / 1260
页数:24
相关论文
共 50 条
  • [41] Fuzzy identity based signature with applications to biometric authentication
    Yang, Piyi
    Cao, Zhenfu
    Dong, Xiaolei
    COMPUTERS & ELECTRICAL ENGINEERING, 2011, 37 (04) : 532 - 540
  • [42] Offline Signature Authentication Algorithm Based on the Fuzzy Set
    Qiu, Shi
    Fei, Fengchang
    Cui, Ying
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2021, 2021
  • [43] Autoassociative Signature Authentication Based on Recurrent Neural Network
    Rokui, Jun
    ARTIFICIAL INTELLIGENCE AND SOFT COMPUTING, ICAISC 2018, PT I, 2018, 10841 : 88 - 96
  • [44] Dynamic group signature scheme based on network authentication
    Si, Guang-Dong
    Dong, Qing-Kuan
    Yang, Jia-Xi
    Xiao, Guo-Zhen
    Harbin Gongcheng Daxue Xuebao/Journal of Harbin Engineering University, 2008, 29 (05): : 504 - 508
  • [45] User authentication scheme based on undeniable signature scheme
    Jisuanji Gongcheng/Computer Engineering, 2000, 26 (08): : 146 - 147
  • [46] Cloud-Based Electronic Signature Authentication Issues
    Andrianova, Vera
    Efanov, Dmitry
    PROCEEDINGS OF THE 2019 IEEE CONFERENCE OF RUSSIAN YOUNG RESEARCHERS IN ELECTRICAL AND ELECTRONIC ENGINEERING (EICONRUS), 2019, : 1826 - 1828
  • [47] Authentication based on feature of hand-written signature
    朱树人
    JournalofCentralSouthUniversityofTechnology, 2007, (04) : 563 - 567
  • [48] SOA - Based Authentication System for Dynamic Handwritten Signature
    Salinca, Andreea
    Rusu, Sorin Mircea
    Pricochi, Ana-Maria
    ADVANCES IN INFORMATION SYSTEMS AND TECHNOLOGIES, 2013, 206 : 735 - 744
  • [49] An anonymous wireless authentication protocol based on proxy signature
    Jiang, Chunlin
    Jia, Weijia
    Gu, Ke
    Journal of Computational Information Systems, 2012, 8 (02): : 541 - 548
  • [50] New image authentication scheme based on digital signature
    Liu, BF
    Zhang, WJ
    Yu, SY
    PROCEEDINGS OF THE THIRD INTERNATIONAL SYMPOSIUM ON INSTRUMENTATION SCIENCE AND TECHNOLOGY, VOL 2, 2004, : 302 - 307