A study of the Graphical User Interfaces for Biometric Authentication System

Size: px
Start display at page:

Download "A study of the Graphical User Interfaces for Biometric Authentication System"

Transcription

1 A study of the Graphical User Interfaces for Biometric Authentication System Hiroshi Dozono 1, Takayuki Inoue 1, Masanori Nakakun 2 i 1 Faculty of Science and Engineering, Saga University, 1-Honjyo Saga, JAPAN 2 Information Technology Center, Fukuoka University, , Nanakuma, Jonan-ku, Fukuoka JAPAN Abstract Recently, many mobile devices are equipped with touch panel, like smart phones, tablet devices, MP3 players and portable gaming consoles. These devices are also equipped with network devices for connecting internet, and they are accessible to personal information or pecuniary system such that net shopping or banking. For accessing such system, user authentication is required. In this paper, we propose an biometric authentication system using touch panel as input device. As the biometrics, behavior biometrics of moving images on the touch panel is used, and the user interface for acquiring the features of behavior effectively is studied. The effectiveness of the proposed method is examined by authentication experiments. Keywords: Biometrics, Authentication, Touch panel, Mobile device 1. Introduction Recently, many consumer devices, such as game consoles, tablet devices and mobile phones, are connected to the internet. These devices are used for web browsing, watching videos, and also for net shopping, trading and banking which require highly secure systems. As the authentication system, password authentication method, which is used on the conventional computers, is often used on these devices. However, many of these consumer devices are not equipped with keyboard, so on screen keyboard is used for typing password. During typing the screen keyboard, the typed characters are displayed on the display, thus typed password is easily peeped. For this problem, biometric authentication is considered to be effective. Biometric authentication is classified to biological biometrics and behavioral biometrics. Biological biometrics uses biological characteristics, such as fingerprint, iris pattern, face and vein pattern for authentication. Biological biometrics can be applied to the authentication system with high accuracy. However, special hardwares for detecting biological characteristics are required. On the other hand, behavior biometrics uses the features of the behaviors, such as hand written patters[1], key stroke timings[2], signatures[3] and walking patters, for authentication. Some of these features can be obtained from the sensors conventionally equipped to the devices. However, accuracy of behavior biometrics is less than that of biological biometrics. In this paper, the features obtained from the touch panel are used for authentication. Recently, many devices are equipped with touch panels, thus this method can be widely applied to those devices. As the authentication system using touch panel, the hand written signatures are often used. However, the devices, which are used in home, are also used by children who cannot write signature, and it is difficult to write uniform signature on slippery screen or capacitive type touch screen which are recently used as multi-tap panel for many devices. We proposed an authentication method using the hand written symbol for the touch panel of resistance film type[1]. As the features for authentication, the pen speed and pen pressure are used as multi-modal biometrics which can improve the accuracy of authentication[4]. However, this method can not be applied to recent capacitive touch panel because it can not detect pen pressure. For this problem, we proposed an authentication method using the movement pattern of some images on the touch panel. The combination of the movement of images as the password and the speed of movement as behavior biometrics. Using the combination of password and behavior biometrics, the authentication system becomes more secure. In this paper, we propose some improvements for this method. At first, the path for moving images are specified on the screen as curvilineal lines, because we reported that the pen speed tracing on the curvilineal line is more adequate as behavior biometrics. Secondly, the selection of the images are extended to increase the patterns of combination used for password. Finally, the novel user interface for authentication is proposed to improve the usability and security. For each system, the authentication experiments are conducted. For evaluating the relative accuracy among the system, the simple authentication algorithm based on the thresholds are used. 2. Touch Panel Devices Recently many mobile devices are equipped with touch panel. There are some types of touch panel devices. In

2 past days, the touch panel devices using resistance films as sensors were mainly used. For this type of touch devices, special pen is used for inputting information or operating devices. Using resistance film touch panel, exact coordinate on the panel can be obtained, and it is possible to obtain pen pressure on the panel. The pen pressure contains rich features as behavior biometrics, and can be used for improving the accuracy of biometric authentication. However, resistance film touch panel is not sensitive enough to realize comfortable user interface, and it is impossible to detect multi-point on the touch panel to realize multi touch operation which is common for recent mobile devices. Recently, most of the mobile devices use capacitive touch panel. Especially, the touch panel device which uses projected capacitance are mainly used because of the multi touch capability of this type of touch panel. Capacitive touch panel is operated by nude fingers, and can not be operated by solid pens which are used for resistance film touch panel. Because of this limitation, the accuracy of the coordinate detected by capacitive touch panel is worse than that of resistance film touch panel, and it is impossible to detect pen pressures. However, capacitive touch panel is sensitive enough for realizing confirmable user interfaces for operating mobile devices, and it can realize the multi-touch user interfaces. In this study, the tablet PC equipped with capacitive touch panel is used in experiments. Fig.1 shows the device. This Figure 1: Tablet PC(FMV LIFEBOOK TH40/D) with capacitive touch panel tablet PC is operated in Windows 7. We developed the authentication system directly on this computer using Microsoft Visual Studio to avoid inefficient cross development environment which is required for developing Android or ios software. 3. Authentication System with Moving Images on Touch Screen(System-0) In this section, the authentication method with moving images on touch screen which is reported in [5] is mentioned. Fig.2 shows the display image of the system. This system Figure 2: The authentication system with moving images(sytem-0) is called as System-0. In each box on the upper side, a image is set. The user is authenticated with moving the images to the box on the lower side in the pre-registered order for each user. The authentication is performed with matching the order of moved images to pre-registered order and with matching behavior characteristics during moving the images on touch screen to that of registration process. At each authentication, the images are arranged in random order in the upper boxes. The x-y coordinates of the moving images can be obtained from touch panel during moving the images. As the feature vectors for authentication, the sequence of velocity of the pen at each sampling time is used because the coordinate data of moving on the same traces did not be suitable for authentication and capacitive touch panel can not detect the absolute coordinates exactly. To examine the accuracy of behavior biometrics, the authentication experiment is conducted without changing the order of the images for all users. All users moves the images in same order, and the authentication is performed using velocity data. For evaluating the relative accuracy among the system, the simple authentication algorithm based on the thresholds are used. For each i-th-feature used for authentication, average m i and standard deviation δ i is calculated from the data registered for authentication. For each test data x, it is authenticated as the specified user if difference of each feature x i m i is smaller than αδ where α is the parameter for tuning authentication accuracy. In the following experiments, α is tuned at the value of cross points of FAR(False Acceptance Rate) and FRR(False Reject Rate) as shown in Fig.3.

3 Figure 3: Cross point FAR denotes the rate of accepting false users, FRR denotes the rate of rejecting the true user, and TAR denotes the rate of accepting true user. Table 1 shows the result. Figure 4: The authentication system using curvilineal path (System-1) Table 1: Result of authentication experiment of System-0 A B C D E F G H I J avg For some user, good authentication accuracy over 70% is marked, however it was not good for more than half users. Almost all user move the images linearly from upper box to lower box, and the paths are not identical, thus the accuracy is degraded. 4. Authentication System using Curvilineal Path for Moving Images(System-1) System-0 cannot mark good accuracy of authentication because of the fluctuations of the paths of moving images. For this problem, the path is specified as line in the display, and the user trace the line with finger for authentication. To improve the accuracy again, the curvilineal paths are specified because we reported that the pen velocity during tracing curvilineal path was more adequate as biometrics than that of linearly path[1]. Fig.4 shows the display image of this system. The authentication experiment is conducted using the behavior biometrics of pen velocity, without using the order of the images as password. Table 2 shows the result. The authentication accuracy is obviously better than Table 2: Result of authentication experiment of System-1 A B C D E F G H I J avg that of System-0, and all users mark over 70% accuracy. 5. Authentication System using Separate Image Selecting Window(System-2) System-1 shows good accuracy of authentication considering that it only uses behavior biometrics of pen velocity. However, the number of combination of the order of the images is only 4! = 24, and this is too small as the variation of password. To increase the combinations, the extension of the number of images is considered to be simple method, however too long sequences causes forgetting the password. For this problem, the separate window which can display more images is introduced. After selecting a image, the window flipped to the window for moving the image.

4 As the images, Landolt Cs, which are usually used for the visual acuity expression are used. The availability for the user and robustness to the peeping can be tuned with changing the size of circles and gaps. For increasing variation of images, the colored Landolt Cs are used. Fig.5 and FIg.5 show the display image of the system. Table 3: Result of authentication experiment of System-2 A B C D E F G H I J avg Figure 5: Image selection window of System-2 As for the usage of the direction of Landolt Cs and colors used as passwords, 7 users used identical color for all images, and 5 users used Landolt Cs sequentially rotated in identical direction. It may be difficult for the user to memorize the combinations of arbitrary directions of Landolt Cs and colora. From this result it is better for the user to use familiar images as password. 6. The Authentication System using Circular Path (System-3) For the problem found in System-2, the authentication system using familiar images and Circular Path is proposed. FIg.7 shows the window for selecting images. In this exper- Figure 6: Image moving window of System-2 The user selects the image in the selection window. Then the window is flipped to image moving window, and the user move the image to the registered box tracing the lines. The authentication experiment is conducted using the behavior biometrics of pen velocity, without using the order of the images as password. Table 3 shows the result. The authentication accuracy becomes worth than that of System-1. The reason is considered that the length and curvature of the path becomes smaller for System-2 than that of System-1. The longer and the adequate curvature are considered to be important to extract the feature of pen velocity as biometrics. Figure 7: Image selection window of System-3 iment, the images of animals are used as familiar images. Fig.8 shows the window for moving mages. The user select a image on selection window in FIg.7. Then, the window is flipped to the image moving window shown in

5 Figure 8: The authentication system using circular path(system-3) Figure 9: Image selection window with changing contrast level Fig.8, and the user move the image to the registered box tracing the registered direction of the circle. Compared with System-2, the variations of destination places and moving directions are increased. If the system evaluates the length of total path is too short, the system can suggest inverse direction to the user during registration. The authentication experiment is conducted using the behavior biometrics of pen velocity, without using the destination places of the images as password. Table 4 shows the result. The accuracy Table 4: Result of authentication experiment of System-3 A B C D E F G H I J avg of authentication of System-3 using pen velocity as biometrics is almost as same as that of System-1. Considering that System-3 can provide more variations of password, System- 3 is much better than System-1 as authentication System. 6.1 Control of the visibility As mentioned in the previous section, System2- uses Landolt Cs as images for controlling the visibility of the images. The familiar images may be easily found out when it is peeped by another person. To control visibility, the contrast of image the screen is modified depending on the security level. Fig.9 shows the window for selecting images with changing contrast level. In this printed proceedings, it becomes much difficult to identify the images, however it is not so much difficult to identity on computer screen. We made experiment of measuring the angle of view of 5 users with changing the 5 level of contrast. Table 5 shows the result. For level 1 of contrast, the contrast of the window Table 5: Angle of view for each contrast level User Level1 Level2 Level3 Level 4 Level 5 A B C D E is not changes. For all users, the view of angle becomes narrower with changing the contrast to higher level. The visibility of the another user who is peeping the screen can be controlled with changing the contrast to appropriate level. 7. Conclusion In this paper, we propose the user interface of the authentication system using the touch panel as input device. With moving the images on the touch panel, the proposed system uses the password which is represented by the destination places and behavior biometrics of pen velocity. Proposed system marks good accuracy considering the simpleness of authentication method with using only pen velocity as biometrics and simple authentication algorithm. Security of this system will be guaranteed with using the destination places of images as password.

6 As the future work, the authentication accuracy should be more strengthened. In this paper, simple algorithm using threshold is applied for the fair evaluation. The more smart algorithm should be examined as authentication algorithm. And, in this paper, multi-touch capability is not applied to authentication system. It may possible to develop more effective authentication method using multi-touch input. References [1] Hiroshi Dozono and Masanori Nakakuni, et.al: The Analysis of Pen Pressures of Handwritten Symbols on PDA Touch Panel using Self Organizing Maps, Proceedings of the International Conference on Security and Management 2005, pp (2005) [2] F. Monrose and A.D. Rubin: Keystroke Dynamics as a Biometric for Authentication, Future Generation Computer Systems, March(2000). [3] J. J. Brault and R. Plamondon: A Complexity Measure of Handwritten Curves: Modelling of Dynamic Signature Forgery, IEEE Trans. Systems, Man and Cybernetics, 23:pp (1993) [4] Hiroshi Dozono and Masanori Nakakuni et.al: An Integration Method of Multi-Modal Biometrics Using Supervised Pareto Learning Self Organizing Maps., Proc. of the Internal Joint Conference of Neural Network 2008,(2008) [5] Hiroshi Dozono, Takayuki Inoue and Masanori Nakakuni,et.al, Study of Biometric Authentication Method using Behavior Characteristics on Game Consoles, Proc. of SAM 2009, (2009)

A Biometric Authentication System That Automatically Generates Feature Points

A Biometric Authentication System That Automatically Generates Feature Points A Biometric Authentication System That Automatically Generates Feature Points Hiroshi Dozono 1, Youki Inaba 1, Masanori Nakakuni 2 1 Faculty of Science and Engineering, Saga University, 1-Honjyo Saga,

More information

Online Signature Verification Technique

Online Signature Verification Technique Volume 3, Issue 1 ISSN: 2320-5288 International Journal of Engineering Technology & Management Research Journal homepage: www.ijetmr.org Online Signature Verification Technique Ankit Soni M Tech Student,

More information

STUDY OF POSSIBILITY OF ON-PEN MATCHING FOR BIOMETRIC HANDWRITING VERIFICATION

STUDY OF POSSIBILITY OF ON-PEN MATCHING FOR BIOMETRIC HANDWRITING VERIFICATION STUDY OF POSSIBILITY OF ON-PEN MATCHING FOR BIOMETRIC HANDWRITING VERIFICATION Tobias Scheidat, Claus Vielhauer, and Jana Dittmann Faculty of Computer Science, Otto-von-Guericke University Magdeburg, Universitätsplatz

More information

A Study on the Consistency of Features for On-line Signature Verification

A Study on the Consistency of Features for On-line Signature Verification A Study on the Consistency of Features for On-line Signature Verification Center for Unified Biometrics and Sensors State University of New York at Buffalo Amherst, NY 14260 {hlei,govind}@cse.buffalo.edu

More information

An Efficient on-line Signature Verification System Using Histogram Features

An Efficient on-line Signature Verification System Using Histogram Features RESEARCH ARTICLE OPEN ACCESS An Efficient on-line Signature Verification System Using Histogram Features Mr.Abilash S 1, Mrs.M.Janani, M.E 2 ME Computer Science and Engineering,Department of CSE, Annai

More information

On-line Signature Verification on a Mobile Platform

On-line Signature Verification on a Mobile Platform On-line Signature Verification on a Mobile Platform Nesma Houmani, Sonia Garcia-Salicetti, Bernadette Dorizzi, and Mounim El-Yacoubi Institut Telecom; Telecom SudParis; Intermedia Team, 9 rue Charles Fourier,

More information

A Combined Method for On-Line Signature Verification

A Combined Method for On-Line Signature Verification BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 14, No 2 Sofia 2014 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2014-0022 A Combined Method for On-Line

More information

Visualization of the Packet Flows using Self Organizing Maps

Visualization of the Packet Flows using Self Organizing Maps Visualization of the Packet Flows using Self Organizing Maps HIROSHI DOZONO Saga University Faculty of Science and Engineering 1 Honjyo Saga Saga JAPAN hiro@dna.ec.saga-u.ac.jp TAKERU KABASHIMA Saga University

More information

Behavior-based Authentication Systems. Multimedia Security

Behavior-based Authentication Systems. Multimedia Security Behavior-based Authentication Systems Multimedia Security Part 1: User Authentication Through Typing Biometrics Features Part 2: User Re-Authentication via Mouse Movements 2 User Authentication Through

More information

6. Multimodal Biometrics

6. Multimodal Biometrics 6. Multimodal Biometrics Multimodal biometrics is based on combination of more than one type of biometric modalities or traits. The most compelling reason to combine different modalities is to improve

More information

Multimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint

Multimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint Multimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint Navdeep Bajwa M.Tech (Student) Computer Science GIMET, PTU Regional Center Amritsar, India Er. Gaurav Kumar M.Tech (Supervisor)

More information

A BIOMETRIC FUSION OF HAND AND FINGER VEIN APPROACH FOR AN EFFICIENT PERSONAL AUTHENTICATION IN HEALTH CARE

A BIOMETRIC FUSION OF HAND AND FINGER VEIN APPROACH FOR AN EFFICIENT PERSONAL AUTHENTICATION IN HEALTH CARE A BIOMETRIC FUSION OF HAND AND FINGER VEIN APPROACH FOR AN EFFICIENT PERSONAL AUTHENTICATION IN HEALTH CARE N S Priya 1, A Lenin Fred 2 1 Assistant Professor, Department of Computer Science and Engineering,

More information

Sketch-based Interface for Crowd Animation

Sketch-based Interface for Crowd Animation Sketch-based Interface for Crowd Animation Masaki Oshita 1, Yusuke Ogiwara 1 1 Kyushu Institute of Technology 680-4 Kawazu, Iizuka, Fukuoka, 820-8502, Japan oshita@ces.kyutech.ac.p ogiwara@cg.ces.kyutech.ac.p

More information

Discovering Computers Chapter 5 Input

Discovering Computers Chapter 5 Input Discovering Computers 2009 Chapter 5 Input Chapter 5 Objectives Define input List the characteristics of a keyboard Describe different mouse types and how they work Summarize how various pointing devices

More information

Discovering Computers Chapter 5 Input. CSA 111 College of Applied Studies UOB

Discovering Computers Chapter 5 Input. CSA 111 College of Applied Studies UOB Discovering Computers 2008 Chapter 5 Input 1 Chapter 5 Objectives Define input List the characteristics of a keyboard Describe different mouse types and how they work Summarize how various pointing devices

More information

Signature Verification Why xyzmo offers the leading solution

Signature Verification Why xyzmo offers the leading solution Dynamic (Biometric) Signature Verification The signature is the last remnant of the hand-written document in a digital world, and is considered an acceptable and trustworthy means of authenticating all

More information

US Secret Service National Threat Assessment Center (NTAC), Insider threat study (2004)

US Secret Service National Threat Assessment Center (NTAC), Insider threat study (2004) US Secret Service National Threat Assessment Center (NTAC), Insider threat study (2004) 83% of incidents executed from within organization, during normal business hours Financial loss in almost all insider

More information

Keywords Wavelet decomposition, SIFT, Unibiometrics, Multibiometrics, Histogram Equalization.

Keywords Wavelet decomposition, SIFT, Unibiometrics, Multibiometrics, Histogram Equalization. Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure and Reliable

More information

: BIOMETRIC AUTHENTICATION TOOL FOR USER IDENTIFICATION

: BIOMETRIC AUTHENTICATION TOOL FOR USER IDENTIFICATION 2006-287: BIOMETRIC AUTHENTICATION TOOL FOR USER IDENTIFICATION Mario Garcia, Texas A&M University-Corpus Christi American Society for Engineering Education, 2006 Page 11.277.1 Biometric Authentication

More information

Screen Fingerprints: A Novel Modality for Active Authentication

Screen Fingerprints: A Novel Modality for Active Authentication Security: DArPA Screen Fingerprints: A Novel Modality for Active Authentication Vishal M. Patel, University of Maryland, College Park Tom Yeh, University of Colorado, Boulder Mohammed E. Fathy and Yangmuzi

More information

Shape Feature Extraction for On-line Signature Evaluation

Shape Feature Extraction for On-line Signature Evaluation Shape Feature Extraction for On-line Signature Evaluation Jungpil Shin School of Computer Science and Engineering The University of Aizu Fukushima, Japan e-mail: jpshin@u-aizu.ac.jp Weichen Lin School

More information

Biometric Security Roles & Resources

Biometric Security Roles & Resources Biometric Security Roles & Resources Part 1 Biometric Systems Skip Linehan Biometrics Systems Architect, Raytheon Intelligence and Information Systems Outline Biometrics Overview Biometric Architectures

More information

Approach to Increase Accuracy of Multimodal Biometric System for Feature Level Fusion

Approach to Increase Accuracy of Multimodal Biometric System for Feature Level Fusion Approach to Increase Accuracy of Multimodal Biometric System for Feature Level Fusion Er. Munish Kumar, Er. Prabhjit Singh M-Tech(Scholar) Global Institute of Management and Emerging Technology Assistant

More information

User Signature Identification and Image Pixel Pattern Verification

User Signature Identification and Image Pixel Pattern Verification Global Journal of Pure and Applied Mathematics. ISSN 0973-1768 Volume 13, Number 7 (2017), pp. 3193-3202 Research India Publications http://www.ripublication.com User Signature Identification and Image

More information

BIOMETRIC MECHANISM FOR ONLINE TRANSACTION ON ANDROID SYSTEM ENHANCED SECURITY OF. Anshita Agrawal

BIOMETRIC MECHANISM FOR ONLINE TRANSACTION ON ANDROID SYSTEM ENHANCED SECURITY OF. Anshita Agrawal BIOMETRIC MECHANISM FOR ENHANCED SECURITY OF ONLINE TRANSACTION ON ANDROID SYSTEM 1 Anshita Agrawal CONTENTS Introduction Biometric Authentication Fingerprints Proposed System Conclusion References 2 INTRODUCTION

More information

Customized Data Filtering For Mobile Signature Verification

Customized Data Filtering For Mobile Signature Verification Customized Data Filtering For Mobile Signature Verification Seungsoo Nam 1, Hosung Park, Changho Seo 1 and Daeseon Choi 1 Department of Conversions Science, Kongju National University, Korea. Department

More information

Online Signature Verification using Dynamic Properties

Online Signature Verification using Dynamic Properties International Journal of Scientific Research in Research Paper. Computer Science and Engineering Vol.5, Issue.6, pp.33-38, December (2017) E-ISSN: 2320-7639 Online Signature Verification using Dynamic

More information

Mobile Touch Floating Joysticks with Options version 1.1 (Unity Asset Store) by Kevin Blake

Mobile Touch Floating Joysticks with Options version 1.1 (Unity Asset Store) by Kevin Blake Mobile Touch Floating Joysticks with Options version 1.1 (Unity Asset Store) by Kevin Blake Change in version 1.1 of this document: only 2 changes to this document (the unity asset store item has not changed)

More information

Biometrics Our Past, Present, and Future Identity

Biometrics Our Past, Present, and Future Identity Biometrics Our Past, Present, and Future Identity Syed Abd Rahman Al-Attas, Ph.D. Associate Professor Computer Vision, Video, and Image Processing Research Lab Faculty of Electrical Engineering, Universiti

More information

Spatial Topology of Equitemporal Points on Signatures for Retrieval

Spatial Topology of Equitemporal Points on Signatures for Retrieval Spatial Topology of Equitemporal Points on Signatures for Retrieval D.S. Guru, H.N. Prakash, and T.N. Vikram Dept of Studies in Computer Science,University of Mysore, Mysore - 570 006, India dsg@compsci.uni-mysore.ac.in,

More information

Authentication Objectives People Authentication I

Authentication Objectives People Authentication I Authentication Objectives People Authentication I Dr. Shlomo Kipnis December 15, 2003 User identification (name, id, etc.) User validation (proof of identity) Resource identification (name, address, etc.)

More information

DOUBLE CHECKING: MULTIMODAL, INTEGRATIVE & CONTINUOUS VERIFICATION TECHNOLOGY OF SIGNATURE & FINGER PRINT IDENTIFICATION

DOUBLE CHECKING: MULTIMODAL, INTEGRATIVE & CONTINUOUS VERIFICATION TECHNOLOGY OF SIGNATURE & FINGER PRINT IDENTIFICATION DOUBLE CHECKING: MULTIMODAL, INTEGRATIVE & CONTINUOUS VERIFICATION TECHNOLOGY OF SIGNATURE & FINGER PRINT IDENTIFICATION 1 V.Rajesh, 2 V.Shyamsundar, 3 R.Naveenraj, 4 Mr.N.Karthik, 1,2,3 UG Scholars, Sri

More information

Interpolation and extrapolation of motion capture data

Interpolation and extrapolation of motion capture data Interpolation and extrapolation of motion capture data Kiyoshi Hoshino Biological Cybernetics Lab, University of the Ryukyus and PRESTO-SORST, Japan Science and Technology Corporation Nishihara, Okinawa

More information

Recall Based Authentication System- An Overview

Recall Based Authentication System- An Overview Recall Based Authentication System- An Overview P. Baby Maruthi 1, Dr. K. Sandhya Rani 2 1 Research Scholar: Dept of Computer Science S.P.M.V.V, Tirupati, Andhra Pradesh, India 2 Professor: Dept of Computer

More information

The Analysis of Traffic of IP Packets using CGH. Self Organizing Map

The Analysis of Traffic of IP Packets using CGH. Self Organizing Map 2015 International Conference on Computational Science and Computational Intelligence The Analysis of Traffic of IP Packets using CGH Self Organizing Maps Hiroshi Dozono Department of Advanced Fusion Saga

More information

A New Algorithm for Detecting Text Line in Handwritten Documents

A New Algorithm for Detecting Text Line in Handwritten Documents A New Algorithm for Detecting Text Line in Handwritten Documents Yi Li 1, Yefeng Zheng 2, David Doermann 1, and Stefan Jaeger 1 1 Laboratory for Language and Media Processing Institute for Advanced Computer

More information

OFFLINE SIGNATURE VERIFICATION

OFFLINE SIGNATURE VERIFICATION International Journal of Electronics and Communication Engineering and Technology (IJECET) Volume 8, Issue 2, March - April 2017, pp. 120 128, Article ID: IJECET_08_02_016 Available online at http://www.iaeme.com/ijecet/issues.asp?jtype=ijecet&vtype=8&itype=2

More information

Signature Recognition by Pixel Variance Analysis Using Multiple Morphological Dilations

Signature Recognition by Pixel Variance Analysis Using Multiple Morphological Dilations Signature Recognition by Pixel Variance Analysis Using Multiple Morphological Dilations H B Kekre 1, Department of Computer Engineering, V A Bharadi 2, Department of Electronics and Telecommunication**

More information

Generation of Artistic Calligraphic Fonts Considering Character Structure

Generation of Artistic Calligraphic Fonts Considering Character Structure See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/242099701 Generation of Artistic Calligraphic Fonts Considering Character Structure Article

More information

Identification, authentication, authorisation. Identification and authentication. Authentication. Authentication. Three closely related concepts:

Identification, authentication, authorisation. Identification and authentication. Authentication. Authentication. Three closely related concepts: Identification, authentication, authorisation Three closely related concepts: Identification and authentication WSPC, Chapter 6 Identification: associating an identity with a subject ( Who are you? ) Authentication:

More information

Put Identity at the Heart of Security

Put Identity at the Heart of Security Put Identity at the Heart of Security Strong Authentication via Hitachi Biometric Technology Tadeusz Woszczyński Country Manager Poland, Hitachi Europe Ltd. 20 September 2017 Financial security in the

More information

1. Introduction P Package Contents 1.

1. Introduction P Package Contents 1. 1 Contents 1. Introduction ------------------------------------------------------------------------------- P. 3-5 1.1 Package Contents 1.2 Tablet Overview 2. Using the Tablet for the first time ---------------------------------------------------

More information

4. TROUBLESHOOTING PREVIOUS VERSIONS RUN LOLITRACK ALWAYS AS ADMIN WIBU SOFTWARE PROTECTION... 30

4. TROUBLESHOOTING PREVIOUS VERSIONS RUN LOLITRACK ALWAYS AS ADMIN WIBU SOFTWARE PROTECTION... 30 Version 4.2.0 CONTENTS 1. GETTING STARTED... 2 2. TYPICAL APPLICATIONS... 4 3. USER GUIDE... 5 3.1 SINGLE OBJECT MODE... 7 3.2 SINGLE ARENA MODE... 12 3.3 EVENT RECORDER... 19 3.4 BATCH TRACKING... 21

More information

Overview of PBI-blockchain cooperation technology

Overview of PBI-blockchain cooperation technology FOR IMMEDIATE RELEASE Biometric authentication technology to realize secure trade on blockchain Enabling IoT payments and automatic transactions through PBI (1) -blockchain cooperation technology Overview

More information

Putting the Touch in Multi-Touch: An in-depth look at the future of interactivity. Gary L. Barrett, Chief Technical Officer at Touch International

Putting the Touch in Multi-Touch: An in-depth look at the future of interactivity. Gary L. Barrett, Chief Technical Officer at Touch International Putting the Touch in Multi-Touch: An in-depth look at the future of interactivity Gary L. Barrett, Chief Technical Officer at Touch International Introduction Multi-touch touch screens are fast becoming

More information

Keystroke Dynamics: Low Impact Biometric Verification

Keystroke Dynamics: Low Impact Biometric Verification Keystroke Dynamics: Low Impact Biometric Verification Tom Olzak September 2006 Biometrics has long been one of the solutions touted by security vendors to meet multifactor authentication objectives. However,

More information

Dynamic Stroke Information Analysis for Video-Based Handwritten Chinese Character Recognition

Dynamic Stroke Information Analysis for Video-Based Handwritten Chinese Character Recognition Dynamic Stroke Information Analysis for Video-Based Handwritten Chinese Character Recognition Feng Lin and Xiaoou Tang Department of Information Engineering The Chinese University of Hong Kong Shatin,

More information

Electronic Signature Systems

Electronic Signature Systems Electronic Signature Systems A Guide for IT Personnel Copyright Topaz Systems Inc. All rights reserved. For Topaz Systems, Inc. trademarks and patents, visit www.topazsystems.com/legal. Table of Contents

More information

Palm Vein Technology

Palm Vein Technology Technical Paper Presentation On Palm Vein Technology (Security Issue) Hyderabad Institute of Technology And Management ABSTRACT Identity verification has become increasingly important in many areas of

More information

HANDWRITTEN SIGNATURE VERIFICATION USING NEURAL NETWORK & ECLUDEAN APPROACH

HANDWRITTEN SIGNATURE VERIFICATION USING NEURAL NETWORK & ECLUDEAN APPROACH http:// HANDWRITTEN SIGNATURE VERIFICATION USING NEURAL NETWORK & ECLUDEAN APPROACH Shalu Saraswat 1, Prof. Sitesh Kumar Sinha 2, Prof. Mukesh Kumar 3 1,2,3 Department of Computer Science, AISECT University

More information

Enhanced Iris Recognition System an Integrated Approach to Person Identification

Enhanced Iris Recognition System an Integrated Approach to Person Identification Enhanced Iris Recognition an Integrated Approach to Person Identification Gaganpreet Kaur Research Scholar, GNDEC, Ludhiana. Akshay Girdhar Associate Professor, GNDEC. Ludhiana. Manvjeet Kaur Lecturer,

More information

CHAPTER 5 FEASIBILITY STUDY ON 3D BIOMETRIC AUTHENTICATION MECHANISM

CHAPTER 5 FEASIBILITY STUDY ON 3D BIOMETRIC AUTHENTICATION MECHANISM 107 CHAPTER 5 FEASIBILITY STUDY ON 3D BIOMETRIC AUTHENTICATION MECHANISM 5.1 AUTHENTICATION MECHANISMS Authentication is the process of establishing whether a peer is who or what it claims to be in a particular

More information

Design and Engineering of Software Applications for Touch Input Collection on Mobile Devices

Design and Engineering of Software Applications for Touch Input Collection on Mobile Devices Design and Engineering of Software Applications for Touch Input Collection on Mobile Devices Bogdan Gheran MintViz Lab MANSiD Research Center University Ștefan cel Mare of Suceava, ROMANIA E-mail: bogdan.gheran[at]gmail.com

More information

IJESRT. Scientific Journal Impact Factor: (ISRA), Impact Factor: 1.852

IJESRT. Scientific Journal Impact Factor: (ISRA), Impact Factor: 1.852 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY INTELLEGENT APPROACH FOR OFFLINE SIGNATURE VERIFICATION USING CHAINCODE AND ENERGY FEATURE EXTRACTION ON MULTICORE PROCESSOR Raju

More information

Signature Verification: Why xyzmo offers the leading solution

Signature Verification: Why xyzmo offers the leading solution Signature Verification: Why xyzmo offers the leading solution Dynamic (Biometric) Signature Verification The signature is the last remnant of the hand-written document in a digital world, and is considered

More information

RULE BASED SIGNATURE VERIFICATION AND FORGERY DETECTION

RULE BASED SIGNATURE VERIFICATION AND FORGERY DETECTION RULE BASED SIGNATURE VERIFICATION AND FORGERY DETECTION M. Hanmandlu Multimedia University Jalan Multimedia 63100, Cyberjaya Selangor, Malaysia E-mail:madasu.hanmandlu@mmu.edu.my M. Vamsi Krishna Dept.

More information

Smart business tablet

Smart business tablet Page 1 New: Robust tablet PC with professional features Smart business tablet Based on the "Smart and Tough" product concept, Casio Europe is presenting a completely new business support tablet with unique

More information

Abstract -Fingerprints are the most widely. Keywords:fingerprint; ridge pattern; biometric;

Abstract -Fingerprints are the most widely. Keywords:fingerprint; ridge pattern; biometric; Analysis Of Finger Print Detection Techniques Prof. Trupti K. Wable *1(Assistant professor of Department of Electronics & Telecommunication, SVIT Nasik, India) trupti.wable@pravara.in*1 Abstract -Fingerprints

More information

Off-line Signature Verification Using Neural Network

Off-line Signature Verification Using Neural Network International Journal of Scientific & Engineering Research, Volume 3, Issue 2, February-2012 1 Off-line Signature Verification Using Neural Network Ashwini Pansare, Shalini Bhatia Abstract a number of

More information

Exploring Games for Improved Touchscreen Authentication on Mobile Devices

Exploring Games for Improved Touchscreen Authentication on Mobile Devices Exploring Games for Improved Touchscreen Authentication on Mobile Devices Padmaja Scindia pscindia@nyit.edu Jonathan Voris jvoris@nyit.edu New York Institute of Technology Department of Computer Science

More information

Passwords. EJ Jung. slide 1

Passwords. EJ Jung. slide 1 Passwords EJ Jung slide 1 Basic Problem? How do you prove to someone that you are who you claim to be? Any system with access control must solve this problem slide 2 Many Ways to Prove Who You Are What

More information

Hybrid Biometric Person Authentication Using Face and Voice Features

Hybrid Biometric Person Authentication Using Face and Voice Features Paper presented in the Third International Conference, Audio- and Video-Based Biometric Person Authentication AVBPA 2001, Halmstad, Sweden, proceedings pages 348-353, June 2001. Hybrid Biometric Person

More information

Biometric Technologies Signature

Biometric Technologies Signature Biometric Signature Solutions Presented at the Open House The Standards Institution of Israel 1 WonderNet The leading provider of digital signature solutions Over 5 million current users Cutting edge technologies:

More information

Biometric identity verification for large-scale high-security apps. Face Verification SDK

Biometric identity verification for large-scale high-security apps. Face Verification SDK Biometric identity verification for large-scale high-security apps Face Verification SDK Face Verification SDK Biometric identity verification for large-scale high-security applications Document updated

More information

Image Enhancement Techniques for Fingerprint Identification

Image Enhancement Techniques for Fingerprint Identification March 2013 1 Image Enhancement Techniques for Fingerprint Identification Pankaj Deshmukh, Siraj Pathan, Riyaz Pathan Abstract The aim of this paper is to propose a new method in fingerprint enhancement

More information

Wacom sign pro PDF Android Version. User Guide

Wacom sign pro PDF Android Version. User Guide Wacom sign pro PDF Android Version User Guide Contents 1 Introduction... 5 2 Installation... 5 3 Signature Credits... 6 4 Getting Started... 7 4.1 Application Menu... 7 a) Documents... 7 b) Signature...

More information

Activity Recognition Using Cell Phone Accelerometers

Activity Recognition Using Cell Phone Accelerometers Activity Recognition Using Cell Phone Accelerometers Jennifer Kwapisz, Gary Weiss, Samuel Moore Department of Computer & Info. Science Fordham University 1 We are Interested in WISDM WISDM: WIreless Sensor

More information

Hierarchical Shape Primitive Features for Online Text-independent Writer Identification

Hierarchical Shape Primitive Features for Online Text-independent Writer Identification 2009 10th International Conference on Document Analysis and Recognition Hierarchical Shape Primitive Features for Online Text-independent Writer Identification Bangy Li, Zhenan Sun and Tieniu Tan Center

More information

Comparison of Postures from Pen and Mouse Use

Comparison of Postures from Pen and Mouse Use Global Ergonomic Technologies P.O. Box 2667 Guerneville, CA 95446 - U.S.A. Phone: (77) 869-194 Fax: (77) 869-1956 Comparison of Postures from Pen and Mouse Use June 8, 1998 Introduction There are a variety

More information

CAN WE ESCAPE PASSWORDS?

CAN WE ESCAPE PASSWORDS? INFOSECURITY WITH PLYMOUTH UNIVERSITY CAN WE ESCAPE PASSWORDS? Prof. Steven Furnell Centre for Security, Communications & Network Research Plymouth University United Kingdom Introduction Represents an

More information

Touchless Fingerprint recognition using MATLAB

Touchless Fingerprint recognition using MATLAB International Journal of Innovation and Scientific Research ISSN 2351-814 Vol. 1 No. 2 Oct. 214, pp. 458-465 214 Innovative Space of Scientific Research Journals http://www.ijisr.issr-journals.org/ Touchless

More information

Global Mobile Biometric Authentication Market: Size, Trends & Forecasts ( ) October 2017

Global Mobile Biometric Authentication Market: Size, Trends & Forecasts ( ) October 2017 Global Mobile Biometric Authentication Market: Size, Trends & Forecasts (2017-2021) October 2017 Global Mobile Biometric Authentication Market Report Scope of the Report The report entitled Global Mobile

More information

Haldia Institute of Technology. Touch Screen Monitors

Haldia Institute of Technology. Touch Screen Monitors Haldia Institute of Technology Department of Instrumentation & Control Engineering A Seminar Report on Touch Screen Monitors By: Suman Tewary (06-IC-18) 6 th Semester 1 2 Content Introduction How Touch

More information

Feature Selection by User Specific Feature Mask on a Biometric Hash Algorithm for Dynamic Handwriting

Feature Selection by User Specific Feature Mask on a Biometric Hash Algorithm for Dynamic Handwriting Feature Selection by User Specific Feature Mask on a Biometric Hash Algorithm for Dynamic Handwriting Karl Kümmel, Tobias Scheidat, Christian Arndt and Claus Vielhauer Brandenburg University of Applied

More information

Continuous User Authentication Using Temporal Information

Continuous User Authentication Using Temporal Information Continuous User Authentication Using Temporal Information Koichiro Niinuma a, Anil K. Jain b a Fujitsu Laboratories, Kawasaki, Japan; b Department of Computer Science & Engineering, Michigan State University,

More information

CAS Sign On for Windows

CAS Sign On for Windows CAS Sign On for Windows Presentation pour l OSSIR 12 novembre 2001 Jean-Francois Kin - Keyware BIOMETRICS OVERVIEW What is Biometrics? The Science of measuring one or more physical or behavioural characteristics

More information

A Mouse-Like Hands-Free Gesture Technique for Two-Dimensional Pointing

A Mouse-Like Hands-Free Gesture Technique for Two-Dimensional Pointing A Mouse-Like Hands-Free Gesture Technique for Two-Dimensional Pointing Yusaku Yokouchi and Hiroshi Hosobe Faculty of Computer and Information Sciences, Hosei University 3-7-2 Kajino-cho, Koganei-shi, Tokyo

More information

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1 Enhancing Security in Identity Documents Using QR Code RevathiM K 1, Annapandi P 2 and Ramya K P 3 1 Information Technology, Dr.Sivanthi Aditanar College of Engineering, Tiruchendur, Tamilnadu628215, India

More information

INTERACTIVE 3D ANIMATION SYSTEM BASED ON TOUCH INTERFACE AND EFFICIENT CREATION TOOLS. Anonymous ICME submission

INTERACTIVE 3D ANIMATION SYSTEM BASED ON TOUCH INTERFACE AND EFFICIENT CREATION TOOLS. Anonymous ICME submission INTERACTIVE 3D ANIMATION SYSTEM BASED ON TOUCH INTERFACE AND EFFICIENT CREATION TOOLS Anonymous ICME submission ABSTRACT Recently importance of tablet devices with touch interface increases significantly,

More information

CS 528 Mobile and Ubiquitous Computing Lecture 11b: Mobile Security and Mobile Software Vulnerabilities Emmanuel Agu

CS 528 Mobile and Ubiquitous Computing Lecture 11b: Mobile Security and Mobile Software Vulnerabilities Emmanuel Agu CS 528 Mobile and Ubiquitous Computing Lecture 11b: Mobile Security and Mobile Software Vulnerabilities Emmanuel Agu Authentication using Biometrics Biometrics Passwords tough to remember, manage Many

More information

BIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition

BIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition BIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition Hiren D. Joshi Phd, Dept. of Computer Science Rollwala Computer Centre

More information

An Efficient Secure Multimodal Biometric Fusion Using Palmprint and Face Image

An Efficient Secure Multimodal Biometric Fusion Using Palmprint and Face Image International Journal of Computer Science Issues, Vol. 2, 2009 ISSN (Online): 694-0784 ISSN (Print): 694-084 49 An Efficient Secure Multimodal Biometric Fusion Using Palmprint and Face Image Nageshkumar.M,

More information

NOVATEUR PUBLICATIONS INTERNATIONAL JOURNAL OF INNOVATIONS IN ENGINEERING RESEARCH AND TECHNOLOGY [IJIERT] ISSN: VOLUME 2, ISSUE 1 JAN-2015

NOVATEUR PUBLICATIONS INTERNATIONAL JOURNAL OF INNOVATIONS IN ENGINEERING RESEARCH AND TECHNOLOGY [IJIERT] ISSN: VOLUME 2, ISSUE 1 JAN-2015 Offline Handwritten Signature Verification using Neural Network Pallavi V. Hatkar Department of Electronics Engineering, TKIET Warana, India Prof.B.T.Salokhe Department of Electronics Engineering, TKIET

More information

Use of Extreme Value Statistics in Modeling Biometric Systems

Use of Extreme Value Statistics in Modeling Biometric Systems Use of Extreme Value Statistics in Modeling Biometric Systems Similarity Scores Two types of matching: Genuine sample Imposter sample Matching scores Enrolled sample 0.95 0.32 Probability Density Decision

More information

Tutorial 1. Jun Xu, Teaching Asistant January 26, COMP4134 Biometrics Authentication

Tutorial 1. Jun Xu, Teaching Asistant January 26, COMP4134 Biometrics Authentication Tutorial 1 Jun Xu, Teaching Asistant csjunxu@comp.polyu.edu.hk COMP4134 Biometrics Authentication January 26, 2017 Table of Contents Problems Problem 1: Answer the following questions Problem 2: Biometric

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 5, Sep Oct 2017

International Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 5, Sep Oct 2017 RESEARCH ARTICLE OPEN ACCESS Iris and Palmprint Decision Fusion to Enhance Human Ali M Mayya [1], Mariam Saii [2] PhD student [1], Professor Assistance [2] Computer Engineering Tishreen University Syria

More information

Coin Size Wireless Sensor Interface for Interaction with Remote Displays

Coin Size Wireless Sensor Interface for Interaction with Remote Displays Coin Size Wireless Sensor Interface for Interaction with Remote Displays Atia Ayman, Shin Takahashi, and Jiro Tanaka Department of Computer Science, Graduate school of systems and information engineering,

More information

Using Support Vector Machines to Eliminate False Minutiae Matches during Fingerprint Verification

Using Support Vector Machines to Eliminate False Minutiae Matches during Fingerprint Verification Using Support Vector Machines to Eliminate False Minutiae Matches during Fingerprint Verification Abstract Praveer Mansukhani, Sergey Tulyakov, Venu Govindaraju Center for Unified Biometrics and Sensors

More information

A new approach to reference point location in fingerprint recognition

A new approach to reference point location in fingerprint recognition A new approach to reference point location in fingerprint recognition Piotr Porwik a) and Lukasz Wieclaw b) Institute of Informatics, Silesian University 41 200 Sosnowiec ul. Bedzinska 39, Poland a) porwik@us.edu.pl

More information

5. Signature Recognition & Keystroke Dynamics

5. Signature Recognition & Keystroke Dynamics 5. Signature Recognition & Keystroke Dynamics Signature verification is an important research area in the field of authentication of a person as well as documents in e-commerce and banking. We can generally

More information

Robotic Arm Motion for Verifying Signatures

Robotic Arm Motion for Verifying Signatures Robotic Arm Motion for Verifying Signatures Moises Diaz 1 Miguel A. Ferrer 2 Jose J. Quintana 2 1 Universidad del Atlantico Medio, Spain 2 Instituto para el Desarrollo Tecnológico y la Innovación en Comunicaciones

More information

How-To Guide. SigCompare Test Utility. Copyright Topaz Systems Inc. All rights reserved.

How-To Guide. SigCompare Test Utility. Copyright Topaz Systems Inc. All rights reserved. How-To Guide SigCompare Test Utility Copyright Topaz Systems Inc. All rights reserved. For Topaz Systems, Inc. trademarks and patents, visit www.topazsystems.com/legal. Table of Contents Overview... 3

More information

KAUSTUBH DEKATE KEDAR AYACHIT KALPESH BHOIR SAGAR KEDARE DHAWAL JADHAV NITIN DHALE

KAUSTUBH DEKATE KEDAR AYACHIT KALPESH BHOIR SAGAR KEDARE DHAWAL JADHAV NITIN DHALE KAUSTUBH DEKATE KEDAR AYACHIT KALPESH BHOIR SAGAR KEDARE DHAWAL JADHAV NITIN DHALE A tablet computer, or simply tablet, is a complete mobile computer, larger than a mobile phone or personal digital assistant,

More information

How Pointing Devices Work

How Pointing Devices Work 232 PART 5 INPUT/OUTPUT DEVICES CHAPTER 25 How Pointing Devices Work 233 THERE is nothing natural or intuitive about a keyboard. No child is born knowing how to type, and even when the skill is learned,

More information

Multimodal Fusion Vulnerability to Non-Zero Effort (Spoof) Imposters

Multimodal Fusion Vulnerability to Non-Zero Effort (Spoof) Imposters Multimodal Fusion Vulnerability to Non-Zero Effort (Spoof) mposters P. A. Johnson, B. Tan, S. Schuckers 3 ECE Department, Clarkson University Potsdam, NY 3699, USA johnsopa@clarkson.edu tanb@clarkson.edu

More information

Feature-level Fusion for Effective Palmprint Authentication

Feature-level Fusion for Effective Palmprint Authentication Feature-level Fusion for Effective Palmprint Authentication Adams Wai-Kin Kong 1, 2 and David Zhang 1 1 Biometric Research Center, Department of Computing The Hong Kong Polytechnic University, Kowloon,

More information

Performance Improvement of Phase-Based Correspondence Matching for Palmprint Recognition

Performance Improvement of Phase-Based Correspondence Matching for Palmprint Recognition Performance Improvement of Phase-Based Correspondence Matching for Palmprint Recognition Vincent Roux Institut Supérieur d électronique de Paris,, rue Notre Dame des Champs, 76 Paris, France vincent.roux@isep.fr

More information

A Supporting System for Beginners of Billiards Based on Predicting the Path of the Balls by Detecting the Cue Stick

A Supporting System for Beginners of Billiards Based on Predicting the Path of the Balls by Detecting the Cue Stick A Supporting System for Beginners of Billiards Based on Predicting the Path of the Balls by Detecting the Cue Stick Akira SUGANUMA Department of Electronics and Information Engineering, National Institute

More information

Technical White Paper. Behaviometrics. Measuring FAR/FRR/EER in Continuous Authentication

Technical White Paper. Behaviometrics. Measuring FAR/FRR/EER in Continuous Authentication Technical White Paper Behaviometrics Measuring FAR/FRR/EER in Continuous Authentication Draft version 12/22/2009 Table of Contents Background... 1 Calculating FAR/FRR/EER in the field of Biometrics...

More information

Biometrics problem or solution?

Biometrics problem or solution? Biometrics problem or solution? Summary Biometrics are a security approach that offers great promise, but also presents users and implementers with a number of practical problems. Whilst some of these

More information