Study of Imposter Attacks on Novel Fingerprint Dynamics Based Verification System
暂无分享,去创建一个
[1] Alain Forget,et al. Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism , 2012, IEEE Transactions on Dependable and Secure Computing.
[2] Arun Ross,et al. Open Set Fingerprint Spoof Detection Across Novel Fabrication Materials , 2015, IEEE Transactions on Information Forensics and Security.
[3] Chenn-Jung Huang,et al. Application of wrapper approach and composite classifier to the stock trend prediction , 2008, Expert Syst. Appl..
[4] Kentaro Kotani,et al. Evaluation on a keystroke authentication system by keying force incorporated with temporal characteristics of keystroke dynamics , 2005, Behav. Inf. Technol..
[5] Arun Ross,et al. 50 years of biometric research: Accomplishments, challenges, and opportunities , 2016, Pattern Recognit. Lett..
[6] Christine L. MacKenzie,et al. Computer user verification using login string keystroke dynamics , 1998, IEEE Trans. Syst. Man Cybern. Part A.
[7] Ayça Çakmak Pehlivanlı,et al. A novel feature selection scheme for high-dimensional data sets: four-Staged Feature Selection , 2015 .
[8] Ana Carolina Lorena,et al. A systematic review on keystroke dynamics , 2013, Journal of the Brazilian Computer Society.
[9] Anil K. Jain,et al. Biometric Authentication: System Security and User Privacy , 2012, Computer.
[10] Ioannis A. Kakadiaris,et al. Mobile User Authentication Using Statistical Touch Dynamics Images , 2014, IEEE Transactions on Information Forensics and Security.
[11] Ana L. N. Fred,et al. A behavioral biometric system based on human-computer interaction , 2004, SPIE Defense + Commercial Sensing.
[12] Krishna K. Venkatasubramanian,et al. An approach for user identification for head-mounted displays , 2015, SEMWEB.
[13] Petru Radu,et al. Robust multimodal face and fingerprint fusion in the presence of spoofing attacks , 2016, Pattern Recognit..
[14] Vivek Kanhangad,et al. Exploring orientation and accelerometer sensor data for personal authentication in smartphones using touchscreen gestures , 2015, Pattern Recognit. Lett..
[15] Ishan Bhardwaj,et al. Fingerprint dynamics: A novel biometrics for personal authentication , 2016, 2016 International Conference on Signal and Information Processing (IConSIP).
[16] Ingo Deutschmann,et al. Behavioral biometrics for DARPA's Active Authentication program , 2013, 2013 International Conference of the BIOSIG Special Interest Group (BIOSIG).
[17] Gian Luca Foresti,et al. Biometric Liveness Detection: Challenges and Research Opportunities , 2015, IEEE Security & Privacy.
[18] Liang Wang,et al. Behavioral Biometrics For Human Identification: Intelligent Applications , 2009 .
[19] Roy A. Maxion,et al. Comparing anomaly-detection algorithms for keystroke dynamics , 2009, 2009 IEEE/IFIP International Conference on Dependable Systems & Networks.
[20] Woo Chaw Seng,et al. A review of biometric technology along with trends and prospects , 2014, Pattern Recognit..
[21] Ishan Bhardwaj,et al. A spoof resistant multibiometric system based on the physiological and behavioral characteristics of fingerprint , 2017, Pattern Recognit..
[22] Ishan Bhardwaj,et al. Feature selection for novel fingerprint dynamics biometric technique based on PCA , 2016, 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[23] Lee Luan Ling,et al. User authentication through typing biometrics features , 2005, IEEE Transactions on Signal Processing.
[24] Alex Fridman,et al. Learning Human Identity from Motion Patterns , 2015, IEEE Access.
[25] Qijun Zhao,et al. A DCNN Based Fingerprint Liveness Detection Algorithm with Voting Strategy , 2015, CCBR.
[26] Ahmed Awad E. Ahmed,et al. A New Biometric Technology Based on Mouse Dynamics , 2007, IEEE Transactions on Dependable and Secure Computing.
[27] Georgios Kambourakis,et al. Introducing touchstroke: keystroke-based authentication system for smartphones , 2016, Secur. Commun. Networks.
[28] Arun Ross,et al. A Survey on Anti-Spoofing Schemes for Fingerprint Recognition Systems , 2014 .
[29] Nasir D. Memon,et al. PassPoints: Design and longitudinal evaluation of a graphical password system , 2005, Int. J. Hum. Comput. Stud..
[30] Julian Fiérrez,et al. Towards Predicting Good Users for Biometric Recognition Based on Keystroke Dynamics , 2014, ECCV Workshops.
[31] Brejesh Lall,et al. Performance issues in biometric authentication based on information theoretic concepts: A review , 2010 .
[32] Jugurta R. Montalvão Filho,et al. Contributions to empirical analysis of keystroke dynamics in passwords , 2015, Pattern Recognit. Lett..
[33] M. Akila,et al. Biometric personal authentication using keystroke dynamics: A review , 2011, Appl. Soft Comput..
[34] Dongsong Zhang,et al. Harmonized authentication based on ThumbStroke dynamics on touch screen mobile phones , 2016, Decis. Support Syst..
[35] Sungzoon Cho,et al. GA-SVM wrapper approach for feature subset selection in keystroke dynamics identity verification , 2003, Proceedings of the International Joint Conference on Neural Networks, 2003..
[36] Nalini K. Ratha,et al. Generating Cancelable Fingerprint Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[37] Anil K. Jain,et al. Fingerprint Reconstruction: From Minutiae to Phase , 2011, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[38] Christophe Champod,et al. Forgeries of Fingerprints in Forensic Science , 2014, Handbook of Biometric Anti-Spoofing.
[39] Rama Chellappa,et al. Machine Recognition of Human Activities: A Survey , 2008, IEEE Transactions on Circuits and Systems for Video Technology.
[40] Mahesh Pal,et al. Hybrid genetic algorithm for feature selection with hyperspectral data , 2013 .
[41] Xiaoming Liu,et al. On Continuous User Authentication via Typing Behavior , 2014, IEEE Transactions on Image Processing.
[42] Anil K. Jain,et al. Dimensionality reduction using genetic algorithms , 2000, IEEE Trans. Evol. Comput..
[43] Nasir D. Memon,et al. Biometric-rich gestures: a novel approach to authentication on multi-touch devices , 2012, CHI.
[44] Ishan Bhardwaj,et al. A Novel Behavioural Biometric Technique for Robust User Authentication , 2017 .