Time series distances measures to analyze in-air signatures to authenticate users on mobile phones
暂无分享,去创建一个
[1] Shihong Lao,et al. Security Management for Mobile Devices by Face Recognition , 2006, 7th International Conference on Mobile Data Management (MDM'06).
[2] Anil K. Jain,et al. Biometric Systems: Technology, Design and Performance Evaluation , 2004 .
[3] Tzuu-Hseng S. Li,et al. Design and implementation of interaction system between Humanoid robot and human hand gesture , 2010, Proceedings of SICE Annual Conference 2010.
[4] Raymond N. J. Veldhuis,et al. Biometric Authentication for a Mobile Personal Device , 2006 .
[5] Manuel Bernal-Urbina,et al. Dynamic signature verification through the Longest Common Subsequence Problem and Genetic Algorithms , 2010, IEEE Congress on Evolutionary Computation.
[6] A. N. Rajagopalan,et al. Off-line signature verification using DTW , 2007, Pattern Recognit. Lett..
[7] Gonzalo Bailador,et al. A Real-Time In-Air Signature Biometric Technique Using a Mobile Device Embedding an Accelerometer , 2010, NDT.
[8] Yin-Te Tsai,et al. The constrained longest common subsequence problem , 2003, Inf. Process. Lett..
[9] Tom Fawcett,et al. An introduction to ROC analysis , 2006, Pattern Recognit. Lett..
[10] W. Marsden. I and J , 2012 .
[11] Steven Furnell,et al. Authenticating mobile phone users using keystroke analysis , 2006, International Journal of Information Security.
[12] Hyeran Byun,et al. Visual recognition of aircraft marshalling signals using gesture phase analysis , 2008, 2008 IEEE Intelligent Vehicles Symposium.
[13] Kang Ryoung Park,et al. Iris Recognition in Mobile Phone Based on Adaptive Gabor Filter , 2006, ICB.
[14] Muzaffar Bashir,et al. Person authentication with RDTW based on handwritten PIN and signature with a novel biometric smart pen device , 2009, 2009 IEEE Workshop on Computational Intelligence in Biometrics: Theory, Algorithms, and Applications.
[15] A. Anthony Irudhayaraj,et al. Biometric system , 2011, 2011 3rd International Conference on Electronics Computer Technology.
[16] Yanggon Kim,et al. Pupil and Iris Localization for Iris Recognition in Mobile Phones , 2006, Seventh ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD'06).
[17] P. Suganthi,et al. Mobile Phones Security Using Biometrics , 2007, International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007).
[18] John Chirillo,et al. Implementing Biometric Security , 2003 .
[19] S. Chiba,et al. Dynamic programming algorithm optimization for spoken word recognition , 1978 .
[20] Donald J. Berndt,et al. Using Dynamic Time Warping to Find Patterns in Time Series , 1994, KDD Workshop.
[21] Gonzalo Bailador,et al. Score optimization and template updating in a biometric technique for authentication in mobiles based on gestures , 2011, J. Syst. Softw..
[22] Kun-Mao Chao,et al. A fast algorithm for computing a longest common increasing subsequence , 2005, Inf. Process. Lett..
[23] Gonzalo Bailador,et al. Acceleration Axis Selection in Biometric Technique Based on Gesture Recognition , 2010, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[24] Sean R Eddy,et al. What is dynamic programming? , 2004, Nature Biotechnology.
[25] Shahrokh Valaee,et al. Accelerometer-based gesture recognition via dynamic-time warping, affinity propagation, & compressive sensing , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.
[26] L. Bergroth,et al. A survey of longest common subsequence algorithms , 2000, Proceedings Seventh International Symposium on String Processing and Information Retrieval. SPIRE 2000.
[27] Stan Salvador,et al. FastDTW: Toward Accurate Dynamic Time Warping in Linear Time and Space , 2004 .
[28] Eamonn J. Keogh,et al. Derivative Dynamic Time Warping , 2001, SDM.
[29] Daniel S. Hirschberg,et al. Algorithms for the Longest Common Subsequence Problem , 1977, JACM.
[30] N. Ramaraj,et al. Enhancing the Efficiency of Regression Testing through Intelligent Agents , 2007, International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007).
[31] Larry S. Davis,et al. Towards 3-D model-based tracking and recognition of human movement: a multi-view approach , 1995 .