A Real-Time In-Air Signature Biometric Technique Using a Mobile Device Embedding an Accelerometer
暂无分享,去创建一个
Gonzalo Bailador | Alberto de Santos Sierra | Javier Guerra Casanova | Carmen Sánchez Ávila | Vicente Jara Vera
[1] Sharath Pankanti,et al. BIOMETRIC IDENTIFICATION , 2000 .
[2] A. de Santos Sierra,et al. A fuzzy DNA-based algorithm for identification and authentication in an Iris Detection System , 2008, 2008 42nd Annual IEEE International Carnahan Conference on Security Technology.
[3] Sean R. Eddy,et al. Biological sequence analysis: Preface , 1998 .
[4] S. Chiba,et al. Dynamic programming algorithm optimization for spoken word recognition , 1978 .
[5] Shigeyuki Sakazawa,et al. Arm Swing Identification Method with Template Update for Long Term Stability , 2007, ICB.
[6] Anil K. Jain,et al. On-line signature verification, , 2002, Pattern Recognit..
[7] Webb Miller. An Introduction to Bioinformatics Algorithms. Neil C. Jones and Pavel A. Pevzner , 2006 .
[8] N. Ramaraj,et al. Enhancing the Efficiency of Regression Testing through Intelligent Agents , 2007, International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007).
[9] Arun Ross,et al. Handbook of Biometrics , 2007 .
[10] P. Suganthi,et al. Mobile Phones Security Using Biometrics , 2007, International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007).
[11] Christopher Verplaetse,et al. Inertial Proprioceptive Devices: Self-Motion-Sensing Toys and Tools , 1996, IBM Syst. J..
[12] Stan Z. Li,et al. Advances in Biometrics, International Conference, ICB 2007, Seoul, Korea, August 27-29, 2007, Proceedings , 2007, ICB.
[13] Yanggon Kim,et al. Pupil and Iris Localization for Iris Recognition in Mobile Phones , 2006, Seventh ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD'06).
[14] Arun Ross,et al. Information fusion in biometrics , 2003, Pattern Recognit. Lett..
[15] Raymond N. J. Veldhuis,et al. Biometric Authentication for a Mobile Personal Device , 2006 .
[16] Hirokazu Manabe,et al. Security Evaluation of Biometrics Authentications for Cellular Phones , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.