An Approach for Authenticating Smartphone Users Based on Histogram Features
暂无分享,去创建一个
[1] Ahmed Awad E. Ahmed,et al. A New Biometric Technology Based on Mouse Dynamics , 2007, IEEE Transactions on Dependable and Secure Computing.
[2] Mauro Conti,et al. Mind how you answer me!: transparently authenticating the user of a smartphone when answering or placing a call , 2011, ASIACCS '11.
[3] Johannes Schöning,et al. Falling asleep with Angry Birds, Facebook and Kindle: a large scale study on mobile application usage , 2011, Mobile HCI.
[4] Kirsi Helkala,et al. Biometric Gait Authentication Using Accelerometer Sensor , 2006, J. Comput..
[5] Steven Furnell,et al. Flexible and Transparent User Authentication for Mobile Devices , 2009, SEC.
[6] Özgür Ulusoy,et al. A histogram-based approach for object-based query-by-shape-and-color in image and video databases , 2005, Image Vis. Comput..
[7] M. Grgic,et al. A survey of biometric recognition methods , 2004, Proceedings. Elmar-2004. 46th International Symposium on Electronics in Marine.
[8] Anil K. Jain,et al. FVC2000: Fingerprint Verification Competition , 2002, IEEE Trans. Pattern Anal. Mach. Intell..
[9] L. Hong,et al. Can multibiometrics improve performance , 1999 .
[10] M. Kubát. An Introduction to Machine Learning , 2017, Springer International Publishing.
[11] Mohammad Najmud Doja,et al. USER AUTHENTICATION SCHEMES FOR MOBILE AND HANDHELD DEVICES , 2008 .
[12] S Kullback,et al. LETTER TO THE EDITOR: THE KULLBACK-LEIBLER DISTANCE , 1987 .
[13] Jie Yang,et al. Sweep fingerprint sequence reconstruction for portable devices , 2006 .
[14] S SawhneyHarpreet,et al. Efficient Color Histogram Indexing for Quadratic Form Distance Functions , 1995 .
[15] Chih-Jen Lin,et al. LIBSVM: A library for support vector machines , 2011, TIST.
[16] Deron Liang,et al. A New Non-Intrusive Authentication Method Based on the Orientation Sensor for Smartphone Users , 2012, 2012 IEEE Sixth International Conference on Software Security and Reliability.
[17] Patrick Bours,et al. Improved Cycle Detection for Accelerometer Based Gait Authentication , 2010, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[18] Alain Forget,et al. Shoulder-surfing resistance with eye-gaze entry in cued-recall graphical passwords , 2010, CHI.
[19] Taekyoung Kwon,et al. On the Privacy-Preserving HCI Issues , 2009, HCI.
[20] Heikki Ailisto,et al. Increasing Security of Mobile Devices by Decreasing User Effort in Verification , 2007, 2007 Second International Conference on Systems and Networks Communications (ICSNC 2007).
[21] R. A. Leibler,et al. On Information and Sufficiency , 1951 .
[22] Volker Roth,et al. A PIN-entry method resilient against shoulder surfing , 2004, CCS '04.
[23] Deron Liang,et al. A Preliminary Study on Non-Intrusive User Authentication Method Using Smartphone Sensors , 2013 .
[24] Ugur Güdükbay,et al. A Histogram-Based Approach for Object-Based Query-by-Shape-and-Color in Multimedia Databases , 2002 .
[25] Huy Kang Kim,et al. User Input Pattern-Based Authentication Method to Prevent Mobile E-Financial Incidents , 2011, 2011 IEEE Ninth International Symposium on Parallel and Distributed Processing with Applications Workshops.
[26] Tao Feng,et al. Continuous mobile authentication using touchscreen gestures , 2012, 2012 IEEE Conference on Technologies for Homeland Security (HST).
[27] Ian Oakley,et al. Obfuscating authentication through haptics, sound and light , 2011, CHI EA '11.
[28] Deron Liang,et al. A Novel Non-intrusive User Authentication Method Based on Touchscreen of Smartphones , 2013, 2013 International Symposium on Biometrics and Security Technologies.
[29] Steven Furnell,et al. Beyond the PIN: Enhancing user authentication for mobile devices , 2008 .
[30] A. Ant Ozok,et al. A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords , 2006, SOUPS '06.
[31] Dugald Ralph Hutchings,et al. Order and entropy in picture passwords , 2008, Graphics Interface.
[32] Jun Yang,et al. SenGuard: Passive user identification on smartphones using multiple sensors , 2011, 2011 IEEE 7th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[33] James Lee Hafner,et al. Efficient Color Histogram Indexing for Quadratic Form Distance Functions , 1995, IEEE Trans. Pattern Anal. Mach. Intell..
[34] Steven Furnell,et al. Authenticating mobile phone users using keystroke analysis , 2006, International Journal of Information Security.