Multi-biometric continuous authentication: A trust model for an asynchronous system
暂无分享,去创建一个
Naser Damer | Christoph Busch | Fabian Maul | C. Busch | N. Damer | F. Maul
[1] Richa Singh,et al. Intelligent Biometric Information Fusion using Support Vector Machine , 2007 .
[2] Soumik Mondal,et al. Continuous authentication using mouse dynamics , 2013, 2013 International Conference of the BIOSIG Special Interest Group (BIOSIG).
[3] Naser Damer,et al. CMC curve properties and biometric source weighting in multi-biometric score-level fusion , 2014, 17th International Conference on Information Fusion (FUSION).
[4] Yu Zhong,et al. A Survey on Keystroke Dynamics Biometrics: Approaches, Advances, and Evaluations , 2015 .
[5] David J. Kriegman,et al. Eigenfaces vs. Fisherfaces: Recognition Using Class Specific Linear Projection , 1996, ECCV.
[6] Shambhu J. Upadhyaya,et al. Continuous Authentication Using Behavioral Biometrics , 2017, IWSPA@CODASPY.
[7] Naser Damer,et al. Biometric source weighting in multi-biometric fusion: Towards a generalized and robust solution , 2014, 2014 22nd European Signal Processing Conference (EUSIPCO).
[8] Rainer Stiefelhagen,et al. Local appearance based face recognition using discrete cosine transform , 2005, 2005 13th European Signal Processing Conference.
[9] Lars Nolle,et al. Towards a Best Linear Combination for Multimodal Biometric Fusion , 2010, 2010 20th International Conference on Pattern Recognition.
[10] Anil K. Jain,et al. Likelihood Ratio-Based Biometric Score Fusion , 2008, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[11] Matti Pietikäinen,et al. A comparative study of texture measures with classification based on featured distributions , 1996, Pattern Recognit..
[12] Arun Ross,et al. Information fusion in biometrics , 2003, Pattern Recognit. Lett..
[13] Tal Hassner,et al. Similarity Scores Based on Background Samples , 2009, ACCV.
[14] R. Ramnath,et al. Physical Access Protection using Continuous Authentication , 2008, 2008 IEEE Conference on Technologies for Homeland Security.
[15] Konstantinos N. Plataniotis,et al. Face recognition using LDA-based algorithms , 2003, IEEE Trans. Neural Networks.
[16] Colin Boyd,et al. Continuous Biometric Authentication: Can It Be More Practical? , 2010, 2010 IEEE 12th International Conference on High Performance Computing and Communications (HPCC).
[17] Patrick Bours,et al. Continuous Authentication using Biometric Keystroke Dynamics , 2009 .
[18] Damon L. Woodard,et al. Biometric Authentication and Identification using Keystroke Dynamics: A Survey , 2012 .
[19] Fawaz Alsaade. A Study of Neural Network and its Properties of Training and Adaptability in Enhancing Accuracy in a Multimodal Biometrics Scenario , 2010 .
[20] Patrick Bours. Continuous keystroke dynamics: A different perspective towards biometric evaluation , 2012, Inf. Secur. Tech. Rep..
[21] Soumik Mondal,et al. Continuous Authentication in a real world settings , 2015, 2015 Eighth International Conference on Advances in Pattern Recognition (ICAPR).
[22] G LoweDavid,et al. Distinctive Image Features from Scale-Invariant Keypoints , 2004 .
[23] Patrick Verlinde,et al. Multi-modal identity verification using support vector machines (SVM) , 2000, Proceedings of the Third International Conference on Information Fusion.
[24] Soumik Mondal. Continuous Authentication with Keystroke Dynamics , 2015 .
[25] Roberto Sassi,et al. A fuzzy approach to multimodal biometric continuous authentication , 2008, Fuzzy Optim. Decis. Mak..
[26] Naser Damer,et al. Multi-biometric Score-Level Fusion and the Integration of the Neighbors Distance Ratio , 2014, ICIAR.
[27] Slobodan Ribaric,et al. Local Binary LDA for Face Recognition , 2011, BIOID.