A study of the Graphical User Interfaces for Biometric Authentication System
|
|
- Jonah Cooper
- 5 years ago
- Views:
Transcription
1 A study of the Graphical User Interfaces for Biometric Authentication System Hiroshi Dozono 1, Takayuki Inoue 1, Masanori Nakakun 2 i 1 Faculty of Science and Engineering, Saga University, 1-Honjyo Saga, JAPAN 2 Information Technology Center, Fukuoka University, , Nanakuma, Jonan-ku, Fukuoka JAPAN Abstract Recently, many mobile devices are equipped with touch panel, like smart phones, tablet devices, MP3 players and portable gaming consoles. These devices are also equipped with network devices for connecting internet, and they are accessible to personal information or pecuniary system such that net shopping or banking. For accessing such system, user authentication is required. In this paper, we propose an biometric authentication system using touch panel as input device. As the biometrics, behavior biometrics of moving images on the touch panel is used, and the user interface for acquiring the features of behavior effectively is studied. The effectiveness of the proposed method is examined by authentication experiments. Keywords: Biometrics, Authentication, Touch panel, Mobile device 1. Introduction Recently, many consumer devices, such as game consoles, tablet devices and mobile phones, are connected to the internet. These devices are used for web browsing, watching videos, and also for net shopping, trading and banking which require highly secure systems. As the authentication system, password authentication method, which is used on the conventional computers, is often used on these devices. However, many of these consumer devices are not equipped with keyboard, so on screen keyboard is used for typing password. During typing the screen keyboard, the typed characters are displayed on the display, thus typed password is easily peeped. For this problem, biometric authentication is considered to be effective. Biometric authentication is classified to biological biometrics and behavioral biometrics. Biological biometrics uses biological characteristics, such as fingerprint, iris pattern, face and vein pattern for authentication. Biological biometrics can be applied to the authentication system with high accuracy. However, special hardwares for detecting biological characteristics are required. On the other hand, behavior biometrics uses the features of the behaviors, such as hand written patters[1], key stroke timings[2], signatures[3] and walking patters, for authentication. Some of these features can be obtained from the sensors conventionally equipped to the devices. However, accuracy of behavior biometrics is less than that of biological biometrics. In this paper, the features obtained from the touch panel are used for authentication. Recently, many devices are equipped with touch panels, thus this method can be widely applied to those devices. As the authentication system using touch panel, the hand written signatures are often used. However, the devices, which are used in home, are also used by children who cannot write signature, and it is difficult to write uniform signature on slippery screen or capacitive type touch screen which are recently used as multi-tap panel for many devices. We proposed an authentication method using the hand written symbol for the touch panel of resistance film type[1]. As the features for authentication, the pen speed and pen pressure are used as multi-modal biometrics which can improve the accuracy of authentication[4]. However, this method can not be applied to recent capacitive touch panel because it can not detect pen pressure. For this problem, we proposed an authentication method using the movement pattern of some images on the touch panel. The combination of the movement of images as the password and the speed of movement as behavior biometrics. Using the combination of password and behavior biometrics, the authentication system becomes more secure. In this paper, we propose some improvements for this method. At first, the path for moving images are specified on the screen as curvilineal lines, because we reported that the pen speed tracing on the curvilineal line is more adequate as behavior biometrics. Secondly, the selection of the images are extended to increase the patterns of combination used for password. Finally, the novel user interface for authentication is proposed to improve the usability and security. For each system, the authentication experiments are conducted. For evaluating the relative accuracy among the system, the simple authentication algorithm based on the thresholds are used. 2. Touch Panel Devices Recently many mobile devices are equipped with touch panel. There are some types of touch panel devices. In
2 past days, the touch panel devices using resistance films as sensors were mainly used. For this type of touch devices, special pen is used for inputting information or operating devices. Using resistance film touch panel, exact coordinate on the panel can be obtained, and it is possible to obtain pen pressure on the panel. The pen pressure contains rich features as behavior biometrics, and can be used for improving the accuracy of biometric authentication. However, resistance film touch panel is not sensitive enough to realize comfortable user interface, and it is impossible to detect multi-point on the touch panel to realize multi touch operation which is common for recent mobile devices. Recently, most of the mobile devices use capacitive touch panel. Especially, the touch panel device which uses projected capacitance are mainly used because of the multi touch capability of this type of touch panel. Capacitive touch panel is operated by nude fingers, and can not be operated by solid pens which are used for resistance film touch panel. Because of this limitation, the accuracy of the coordinate detected by capacitive touch panel is worse than that of resistance film touch panel, and it is impossible to detect pen pressures. However, capacitive touch panel is sensitive enough for realizing confirmable user interfaces for operating mobile devices, and it can realize the multi-touch user interfaces. In this study, the tablet PC equipped with capacitive touch panel is used in experiments. Fig.1 shows the device. This Figure 1: Tablet PC(FMV LIFEBOOK TH40/D) with capacitive touch panel tablet PC is operated in Windows 7. We developed the authentication system directly on this computer using Microsoft Visual Studio to avoid inefficient cross development environment which is required for developing Android or ios software. 3. Authentication System with Moving Images on Touch Screen(System-0) In this section, the authentication method with moving images on touch screen which is reported in [5] is mentioned. Fig.2 shows the display image of the system. This system Figure 2: The authentication system with moving images(sytem-0) is called as System-0. In each box on the upper side, a image is set. The user is authenticated with moving the images to the box on the lower side in the pre-registered order for each user. The authentication is performed with matching the order of moved images to pre-registered order and with matching behavior characteristics during moving the images on touch screen to that of registration process. At each authentication, the images are arranged in random order in the upper boxes. The x-y coordinates of the moving images can be obtained from touch panel during moving the images. As the feature vectors for authentication, the sequence of velocity of the pen at each sampling time is used because the coordinate data of moving on the same traces did not be suitable for authentication and capacitive touch panel can not detect the absolute coordinates exactly. To examine the accuracy of behavior biometrics, the authentication experiment is conducted without changing the order of the images for all users. All users moves the images in same order, and the authentication is performed using velocity data. For evaluating the relative accuracy among the system, the simple authentication algorithm based on the thresholds are used. For each i-th-feature used for authentication, average m i and standard deviation δ i is calculated from the data registered for authentication. For each test data x, it is authenticated as the specified user if difference of each feature x i m i is smaller than αδ where α is the parameter for tuning authentication accuracy. In the following experiments, α is tuned at the value of cross points of FAR(False Acceptance Rate) and FRR(False Reject Rate) as shown in Fig.3.
3 Figure 3: Cross point FAR denotes the rate of accepting false users, FRR denotes the rate of rejecting the true user, and TAR denotes the rate of accepting true user. Table 1 shows the result. Figure 4: The authentication system using curvilineal path (System-1) Table 1: Result of authentication experiment of System-0 A B C D E F G H I J avg For some user, good authentication accuracy over 70% is marked, however it was not good for more than half users. Almost all user move the images linearly from upper box to lower box, and the paths are not identical, thus the accuracy is degraded. 4. Authentication System using Curvilineal Path for Moving Images(System-1) System-0 cannot mark good accuracy of authentication because of the fluctuations of the paths of moving images. For this problem, the path is specified as line in the display, and the user trace the line with finger for authentication. To improve the accuracy again, the curvilineal paths are specified because we reported that the pen velocity during tracing curvilineal path was more adequate as biometrics than that of linearly path[1]. Fig.4 shows the display image of this system. The authentication experiment is conducted using the behavior biometrics of pen velocity, without using the order of the images as password. Table 2 shows the result. The authentication accuracy is obviously better than Table 2: Result of authentication experiment of System-1 A B C D E F G H I J avg that of System-0, and all users mark over 70% accuracy. 5. Authentication System using Separate Image Selecting Window(System-2) System-1 shows good accuracy of authentication considering that it only uses behavior biometrics of pen velocity. However, the number of combination of the order of the images is only 4! = 24, and this is too small as the variation of password. To increase the combinations, the extension of the number of images is considered to be simple method, however too long sequences causes forgetting the password. For this problem, the separate window which can display more images is introduced. After selecting a image, the window flipped to the window for moving the image.
4 As the images, Landolt Cs, which are usually used for the visual acuity expression are used. The availability for the user and robustness to the peeping can be tuned with changing the size of circles and gaps. For increasing variation of images, the colored Landolt Cs are used. Fig.5 and FIg.5 show the display image of the system. Table 3: Result of authentication experiment of System-2 A B C D E F G H I J avg Figure 5: Image selection window of System-2 As for the usage of the direction of Landolt Cs and colors used as passwords, 7 users used identical color for all images, and 5 users used Landolt Cs sequentially rotated in identical direction. It may be difficult for the user to memorize the combinations of arbitrary directions of Landolt Cs and colora. From this result it is better for the user to use familiar images as password. 6. The Authentication System using Circular Path (System-3) For the problem found in System-2, the authentication system using familiar images and Circular Path is proposed. FIg.7 shows the window for selecting images. In this exper- Figure 6: Image moving window of System-2 The user selects the image in the selection window. Then the window is flipped to image moving window, and the user move the image to the registered box tracing the lines. The authentication experiment is conducted using the behavior biometrics of pen velocity, without using the order of the images as password. Table 3 shows the result. The authentication accuracy becomes worth than that of System-1. The reason is considered that the length and curvature of the path becomes smaller for System-2 than that of System-1. The longer and the adequate curvature are considered to be important to extract the feature of pen velocity as biometrics. Figure 7: Image selection window of System-3 iment, the images of animals are used as familiar images. Fig.8 shows the window for moving mages. The user select a image on selection window in FIg.7. Then, the window is flipped to the image moving window shown in
5 Figure 8: The authentication system using circular path(system-3) Figure 9: Image selection window with changing contrast level Fig.8, and the user move the image to the registered box tracing the registered direction of the circle. Compared with System-2, the variations of destination places and moving directions are increased. If the system evaluates the length of total path is too short, the system can suggest inverse direction to the user during registration. The authentication experiment is conducted using the behavior biometrics of pen velocity, without using the destination places of the images as password. Table 4 shows the result. The accuracy Table 4: Result of authentication experiment of System-3 A B C D E F G H I J avg of authentication of System-3 using pen velocity as biometrics is almost as same as that of System-1. Considering that System-3 can provide more variations of password, System- 3 is much better than System-1 as authentication System. 6.1 Control of the visibility As mentioned in the previous section, System2- uses Landolt Cs as images for controlling the visibility of the images. The familiar images may be easily found out when it is peeped by another person. To control visibility, the contrast of image the screen is modified depending on the security level. Fig.9 shows the window for selecting images with changing contrast level. In this printed proceedings, it becomes much difficult to identify the images, however it is not so much difficult to identity on computer screen. We made experiment of measuring the angle of view of 5 users with changing the 5 level of contrast. Table 5 shows the result. For level 1 of contrast, the contrast of the window Table 5: Angle of view for each contrast level User Level1 Level2 Level3 Level 4 Level 5 A B C D E is not changes. For all users, the view of angle becomes narrower with changing the contrast to higher level. The visibility of the another user who is peeping the screen can be controlled with changing the contrast to appropriate level. 7. Conclusion In this paper, we propose the user interface of the authentication system using the touch panel as input device. With moving the images on the touch panel, the proposed system uses the password which is represented by the destination places and behavior biometrics of pen velocity. Proposed system marks good accuracy considering the simpleness of authentication method with using only pen velocity as biometrics and simple authentication algorithm. Security of this system will be guaranteed with using the destination places of images as password.
6 As the future work, the authentication accuracy should be more strengthened. In this paper, simple algorithm using threshold is applied for the fair evaluation. The more smart algorithm should be examined as authentication algorithm. And, in this paper, multi-touch capability is not applied to authentication system. It may possible to develop more effective authentication method using multi-touch input. References [1] Hiroshi Dozono and Masanori Nakakuni, et.al: The Analysis of Pen Pressures of Handwritten Symbols on PDA Touch Panel using Self Organizing Maps, Proceedings of the International Conference on Security and Management 2005, pp (2005) [2] F. Monrose and A.D. Rubin: Keystroke Dynamics as a Biometric for Authentication, Future Generation Computer Systems, March(2000). [3] J. J. Brault and R. Plamondon: A Complexity Measure of Handwritten Curves: Modelling of Dynamic Signature Forgery, IEEE Trans. Systems, Man and Cybernetics, 23:pp (1993) [4] Hiroshi Dozono and Masanori Nakakuni et.al: An Integration Method of Multi-Modal Biometrics Using Supervised Pareto Learning Self Organizing Maps., Proc. of the Internal Joint Conference of Neural Network 2008,(2008) [5] Hiroshi Dozono, Takayuki Inoue and Masanori Nakakuni,et.al, Study of Biometric Authentication Method using Behavior Characteristics on Game Consoles, Proc. of SAM 2009, (2009)
A Biometric Authentication System That Automatically Generates Feature Points
A Biometric Authentication System That Automatically Generates Feature Points Hiroshi Dozono 1, Youki Inaba 1, Masanori Nakakuni 2 1 Faculty of Science and Engineering, Saga University, 1-Honjyo Saga,
More informationOnline Signature Verification Technique
Volume 3, Issue 1 ISSN: 2320-5288 International Journal of Engineering Technology & Management Research Journal homepage: www.ijetmr.org Online Signature Verification Technique Ankit Soni M Tech Student,
More informationSTUDY OF POSSIBILITY OF ON-PEN MATCHING FOR BIOMETRIC HANDWRITING VERIFICATION
STUDY OF POSSIBILITY OF ON-PEN MATCHING FOR BIOMETRIC HANDWRITING VERIFICATION Tobias Scheidat, Claus Vielhauer, and Jana Dittmann Faculty of Computer Science, Otto-von-Guericke University Magdeburg, Universitätsplatz
More informationA Study on the Consistency of Features for On-line Signature Verification
A Study on the Consistency of Features for On-line Signature Verification Center for Unified Biometrics and Sensors State University of New York at Buffalo Amherst, NY 14260 {hlei,govind}@cse.buffalo.edu
More informationAn Efficient on-line Signature Verification System Using Histogram Features
RESEARCH ARTICLE OPEN ACCESS An Efficient on-line Signature Verification System Using Histogram Features Mr.Abilash S 1, Mrs.M.Janani, M.E 2 ME Computer Science and Engineering,Department of CSE, Annai
More informationOn-line Signature Verification on a Mobile Platform
On-line Signature Verification on a Mobile Platform Nesma Houmani, Sonia Garcia-Salicetti, Bernadette Dorizzi, and Mounim El-Yacoubi Institut Telecom; Telecom SudParis; Intermedia Team, 9 rue Charles Fourier,
More informationA Combined Method for On-Line Signature Verification
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 14, No 2 Sofia 2014 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2014-0022 A Combined Method for On-Line
More informationVisualization of the Packet Flows using Self Organizing Maps
Visualization of the Packet Flows using Self Organizing Maps HIROSHI DOZONO Saga University Faculty of Science and Engineering 1 Honjyo Saga Saga JAPAN hiro@dna.ec.saga-u.ac.jp TAKERU KABASHIMA Saga University
More informationBehavior-based Authentication Systems. Multimedia Security
Behavior-based Authentication Systems Multimedia Security Part 1: User Authentication Through Typing Biometrics Features Part 2: User Re-Authentication via Mouse Movements 2 User Authentication Through
More information6. Multimodal Biometrics
6. Multimodal Biometrics Multimodal biometrics is based on combination of more than one type of biometric modalities or traits. The most compelling reason to combine different modalities is to improve
More informationMultimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint
Multimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint Navdeep Bajwa M.Tech (Student) Computer Science GIMET, PTU Regional Center Amritsar, India Er. Gaurav Kumar M.Tech (Supervisor)
More informationA BIOMETRIC FUSION OF HAND AND FINGER VEIN APPROACH FOR AN EFFICIENT PERSONAL AUTHENTICATION IN HEALTH CARE
A BIOMETRIC FUSION OF HAND AND FINGER VEIN APPROACH FOR AN EFFICIENT PERSONAL AUTHENTICATION IN HEALTH CARE N S Priya 1, A Lenin Fred 2 1 Assistant Professor, Department of Computer Science and Engineering,
More informationSketch-based Interface for Crowd Animation
Sketch-based Interface for Crowd Animation Masaki Oshita 1, Yusuke Ogiwara 1 1 Kyushu Institute of Technology 680-4 Kawazu, Iizuka, Fukuoka, 820-8502, Japan oshita@ces.kyutech.ac.p ogiwara@cg.ces.kyutech.ac.p
More informationDiscovering Computers Chapter 5 Input
Discovering Computers 2009 Chapter 5 Input Chapter 5 Objectives Define input List the characteristics of a keyboard Describe different mouse types and how they work Summarize how various pointing devices
More informationDiscovering Computers Chapter 5 Input. CSA 111 College of Applied Studies UOB
Discovering Computers 2008 Chapter 5 Input 1 Chapter 5 Objectives Define input List the characteristics of a keyboard Describe different mouse types and how they work Summarize how various pointing devices
More informationSignature Verification Why xyzmo offers the leading solution
Dynamic (Biometric) Signature Verification The signature is the last remnant of the hand-written document in a digital world, and is considered an acceptable and trustworthy means of authenticating all
More informationUS Secret Service National Threat Assessment Center (NTAC), Insider threat study (2004)
US Secret Service National Threat Assessment Center (NTAC), Insider threat study (2004) 83% of incidents executed from within organization, during normal business hours Financial loss in almost all insider
More informationKeywords Wavelet decomposition, SIFT, Unibiometrics, Multibiometrics, Histogram Equalization.
Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure and Reliable
More information: BIOMETRIC AUTHENTICATION TOOL FOR USER IDENTIFICATION
2006-287: BIOMETRIC AUTHENTICATION TOOL FOR USER IDENTIFICATION Mario Garcia, Texas A&M University-Corpus Christi American Society for Engineering Education, 2006 Page 11.277.1 Biometric Authentication
More informationScreen Fingerprints: A Novel Modality for Active Authentication
Security: DArPA Screen Fingerprints: A Novel Modality for Active Authentication Vishal M. Patel, University of Maryland, College Park Tom Yeh, University of Colorado, Boulder Mohammed E. Fathy and Yangmuzi
More informationShape Feature Extraction for On-line Signature Evaluation
Shape Feature Extraction for On-line Signature Evaluation Jungpil Shin School of Computer Science and Engineering The University of Aizu Fukushima, Japan e-mail: jpshin@u-aizu.ac.jp Weichen Lin School
More informationBiometric Security Roles & Resources
Biometric Security Roles & Resources Part 1 Biometric Systems Skip Linehan Biometrics Systems Architect, Raytheon Intelligence and Information Systems Outline Biometrics Overview Biometric Architectures
More informationApproach to Increase Accuracy of Multimodal Biometric System for Feature Level Fusion
Approach to Increase Accuracy of Multimodal Biometric System for Feature Level Fusion Er. Munish Kumar, Er. Prabhjit Singh M-Tech(Scholar) Global Institute of Management and Emerging Technology Assistant
More informationUser Signature Identification and Image Pixel Pattern Verification
Global Journal of Pure and Applied Mathematics. ISSN 0973-1768 Volume 13, Number 7 (2017), pp. 3193-3202 Research India Publications http://www.ripublication.com User Signature Identification and Image
More informationBIOMETRIC MECHANISM FOR ONLINE TRANSACTION ON ANDROID SYSTEM ENHANCED SECURITY OF. Anshita Agrawal
BIOMETRIC MECHANISM FOR ENHANCED SECURITY OF ONLINE TRANSACTION ON ANDROID SYSTEM 1 Anshita Agrawal CONTENTS Introduction Biometric Authentication Fingerprints Proposed System Conclusion References 2 INTRODUCTION
More informationCustomized Data Filtering For Mobile Signature Verification
Customized Data Filtering For Mobile Signature Verification Seungsoo Nam 1, Hosung Park, Changho Seo 1 and Daeseon Choi 1 Department of Conversions Science, Kongju National University, Korea. Department
More informationOnline Signature Verification using Dynamic Properties
International Journal of Scientific Research in Research Paper. Computer Science and Engineering Vol.5, Issue.6, pp.33-38, December (2017) E-ISSN: 2320-7639 Online Signature Verification using Dynamic
More informationMobile Touch Floating Joysticks with Options version 1.1 (Unity Asset Store) by Kevin Blake
Mobile Touch Floating Joysticks with Options version 1.1 (Unity Asset Store) by Kevin Blake Change in version 1.1 of this document: only 2 changes to this document (the unity asset store item has not changed)
More informationBiometrics Our Past, Present, and Future Identity
Biometrics Our Past, Present, and Future Identity Syed Abd Rahman Al-Attas, Ph.D. Associate Professor Computer Vision, Video, and Image Processing Research Lab Faculty of Electrical Engineering, Universiti
More informationSpatial Topology of Equitemporal Points on Signatures for Retrieval
Spatial Topology of Equitemporal Points on Signatures for Retrieval D.S. Guru, H.N. Prakash, and T.N. Vikram Dept of Studies in Computer Science,University of Mysore, Mysore - 570 006, India dsg@compsci.uni-mysore.ac.in,
More informationAuthentication Objectives People Authentication I
Authentication Objectives People Authentication I Dr. Shlomo Kipnis December 15, 2003 User identification (name, id, etc.) User validation (proof of identity) Resource identification (name, address, etc.)
More informationDOUBLE CHECKING: MULTIMODAL, INTEGRATIVE & CONTINUOUS VERIFICATION TECHNOLOGY OF SIGNATURE & FINGER PRINT IDENTIFICATION
DOUBLE CHECKING: MULTIMODAL, INTEGRATIVE & CONTINUOUS VERIFICATION TECHNOLOGY OF SIGNATURE & FINGER PRINT IDENTIFICATION 1 V.Rajesh, 2 V.Shyamsundar, 3 R.Naveenraj, 4 Mr.N.Karthik, 1,2,3 UG Scholars, Sri
More informationInterpolation and extrapolation of motion capture data
Interpolation and extrapolation of motion capture data Kiyoshi Hoshino Biological Cybernetics Lab, University of the Ryukyus and PRESTO-SORST, Japan Science and Technology Corporation Nishihara, Okinawa
More informationRecall Based Authentication System- An Overview
Recall Based Authentication System- An Overview P. Baby Maruthi 1, Dr. K. Sandhya Rani 2 1 Research Scholar: Dept of Computer Science S.P.M.V.V, Tirupati, Andhra Pradesh, India 2 Professor: Dept of Computer
More informationThe Analysis of Traffic of IP Packets using CGH. Self Organizing Map
2015 International Conference on Computational Science and Computational Intelligence The Analysis of Traffic of IP Packets using CGH Self Organizing Maps Hiroshi Dozono Department of Advanced Fusion Saga
More informationA New Algorithm for Detecting Text Line in Handwritten Documents
A New Algorithm for Detecting Text Line in Handwritten Documents Yi Li 1, Yefeng Zheng 2, David Doermann 1, and Stefan Jaeger 1 1 Laboratory for Language and Media Processing Institute for Advanced Computer
More informationOFFLINE SIGNATURE VERIFICATION
International Journal of Electronics and Communication Engineering and Technology (IJECET) Volume 8, Issue 2, March - April 2017, pp. 120 128, Article ID: IJECET_08_02_016 Available online at http://www.iaeme.com/ijecet/issues.asp?jtype=ijecet&vtype=8&itype=2
More informationSignature Recognition by Pixel Variance Analysis Using Multiple Morphological Dilations
Signature Recognition by Pixel Variance Analysis Using Multiple Morphological Dilations H B Kekre 1, Department of Computer Engineering, V A Bharadi 2, Department of Electronics and Telecommunication**
More informationGeneration of Artistic Calligraphic Fonts Considering Character Structure
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/242099701 Generation of Artistic Calligraphic Fonts Considering Character Structure Article
More informationIdentification, authentication, authorisation. Identification and authentication. Authentication. Authentication. Three closely related concepts:
Identification, authentication, authorisation Three closely related concepts: Identification and authentication WSPC, Chapter 6 Identification: associating an identity with a subject ( Who are you? ) Authentication:
More informationPut Identity at the Heart of Security
Put Identity at the Heart of Security Strong Authentication via Hitachi Biometric Technology Tadeusz Woszczyński Country Manager Poland, Hitachi Europe Ltd. 20 September 2017 Financial security in the
More information1. Introduction P Package Contents 1.
1 Contents 1. Introduction ------------------------------------------------------------------------------- P. 3-5 1.1 Package Contents 1.2 Tablet Overview 2. Using the Tablet for the first time ---------------------------------------------------
More information4. TROUBLESHOOTING PREVIOUS VERSIONS RUN LOLITRACK ALWAYS AS ADMIN WIBU SOFTWARE PROTECTION... 30
Version 4.2.0 CONTENTS 1. GETTING STARTED... 2 2. TYPICAL APPLICATIONS... 4 3. USER GUIDE... 5 3.1 SINGLE OBJECT MODE... 7 3.2 SINGLE ARENA MODE... 12 3.3 EVENT RECORDER... 19 3.4 BATCH TRACKING... 21
More informationOverview of PBI-blockchain cooperation technology
FOR IMMEDIATE RELEASE Biometric authentication technology to realize secure trade on blockchain Enabling IoT payments and automatic transactions through PBI (1) -blockchain cooperation technology Overview
More informationPutting the Touch in Multi-Touch: An in-depth look at the future of interactivity. Gary L. Barrett, Chief Technical Officer at Touch International
Putting the Touch in Multi-Touch: An in-depth look at the future of interactivity Gary L. Barrett, Chief Technical Officer at Touch International Introduction Multi-touch touch screens are fast becoming
More informationKeystroke Dynamics: Low Impact Biometric Verification
Keystroke Dynamics: Low Impact Biometric Verification Tom Olzak September 2006 Biometrics has long been one of the solutions touted by security vendors to meet multifactor authentication objectives. However,
More informationDynamic Stroke Information Analysis for Video-Based Handwritten Chinese Character Recognition
Dynamic Stroke Information Analysis for Video-Based Handwritten Chinese Character Recognition Feng Lin and Xiaoou Tang Department of Information Engineering The Chinese University of Hong Kong Shatin,
More informationElectronic Signature Systems
Electronic Signature Systems A Guide for IT Personnel Copyright Topaz Systems Inc. All rights reserved. For Topaz Systems, Inc. trademarks and patents, visit www.topazsystems.com/legal. Table of Contents
More informationPalm Vein Technology
Technical Paper Presentation On Palm Vein Technology (Security Issue) Hyderabad Institute of Technology And Management ABSTRACT Identity verification has become increasingly important in many areas of
More informationHANDWRITTEN SIGNATURE VERIFICATION USING NEURAL NETWORK & ECLUDEAN APPROACH
http:// HANDWRITTEN SIGNATURE VERIFICATION USING NEURAL NETWORK & ECLUDEAN APPROACH Shalu Saraswat 1, Prof. Sitesh Kumar Sinha 2, Prof. Mukesh Kumar 3 1,2,3 Department of Computer Science, AISECT University
More informationEnhanced Iris Recognition System an Integrated Approach to Person Identification
Enhanced Iris Recognition an Integrated Approach to Person Identification Gaganpreet Kaur Research Scholar, GNDEC, Ludhiana. Akshay Girdhar Associate Professor, GNDEC. Ludhiana. Manvjeet Kaur Lecturer,
More informationCHAPTER 5 FEASIBILITY STUDY ON 3D BIOMETRIC AUTHENTICATION MECHANISM
107 CHAPTER 5 FEASIBILITY STUDY ON 3D BIOMETRIC AUTHENTICATION MECHANISM 5.1 AUTHENTICATION MECHANISMS Authentication is the process of establishing whether a peer is who or what it claims to be in a particular
More informationDesign and Engineering of Software Applications for Touch Input Collection on Mobile Devices
Design and Engineering of Software Applications for Touch Input Collection on Mobile Devices Bogdan Gheran MintViz Lab MANSiD Research Center University Ștefan cel Mare of Suceava, ROMANIA E-mail: bogdan.gheran[at]gmail.com
More informationIJESRT. Scientific Journal Impact Factor: (ISRA), Impact Factor: 1.852
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY INTELLEGENT APPROACH FOR OFFLINE SIGNATURE VERIFICATION USING CHAINCODE AND ENERGY FEATURE EXTRACTION ON MULTICORE PROCESSOR Raju
More informationSignature Verification: Why xyzmo offers the leading solution
Signature Verification: Why xyzmo offers the leading solution Dynamic (Biometric) Signature Verification The signature is the last remnant of the hand-written document in a digital world, and is considered
More informationRULE BASED SIGNATURE VERIFICATION AND FORGERY DETECTION
RULE BASED SIGNATURE VERIFICATION AND FORGERY DETECTION M. Hanmandlu Multimedia University Jalan Multimedia 63100, Cyberjaya Selangor, Malaysia E-mail:madasu.hanmandlu@mmu.edu.my M. Vamsi Krishna Dept.
More informationSmart business tablet
Page 1 New: Robust tablet PC with professional features Smart business tablet Based on the "Smart and Tough" product concept, Casio Europe is presenting a completely new business support tablet with unique
More informationAbstract -Fingerprints are the most widely. Keywords:fingerprint; ridge pattern; biometric;
Analysis Of Finger Print Detection Techniques Prof. Trupti K. Wable *1(Assistant professor of Department of Electronics & Telecommunication, SVIT Nasik, India) trupti.wable@pravara.in*1 Abstract -Fingerprints
More informationOff-line Signature Verification Using Neural Network
International Journal of Scientific & Engineering Research, Volume 3, Issue 2, February-2012 1 Off-line Signature Verification Using Neural Network Ashwini Pansare, Shalini Bhatia Abstract a number of
More informationExploring Games for Improved Touchscreen Authentication on Mobile Devices
Exploring Games for Improved Touchscreen Authentication on Mobile Devices Padmaja Scindia pscindia@nyit.edu Jonathan Voris jvoris@nyit.edu New York Institute of Technology Department of Computer Science
More informationPasswords. EJ Jung. slide 1
Passwords EJ Jung slide 1 Basic Problem? How do you prove to someone that you are who you claim to be? Any system with access control must solve this problem slide 2 Many Ways to Prove Who You Are What
More informationHybrid Biometric Person Authentication Using Face and Voice Features
Paper presented in the Third International Conference, Audio- and Video-Based Biometric Person Authentication AVBPA 2001, Halmstad, Sweden, proceedings pages 348-353, June 2001. Hybrid Biometric Person
More informationBiometric Technologies Signature
Biometric Signature Solutions Presented at the Open House The Standards Institution of Israel 1 WonderNet The leading provider of digital signature solutions Over 5 million current users Cutting edge technologies:
More informationBiometric identity verification for large-scale high-security apps. Face Verification SDK
Biometric identity verification for large-scale high-security apps Face Verification SDK Face Verification SDK Biometric identity verification for large-scale high-security applications Document updated
More informationImage Enhancement Techniques for Fingerprint Identification
March 2013 1 Image Enhancement Techniques for Fingerprint Identification Pankaj Deshmukh, Siraj Pathan, Riyaz Pathan Abstract The aim of this paper is to propose a new method in fingerprint enhancement
More informationWacom sign pro PDF Android Version. User Guide
Wacom sign pro PDF Android Version User Guide Contents 1 Introduction... 5 2 Installation... 5 3 Signature Credits... 6 4 Getting Started... 7 4.1 Application Menu... 7 a) Documents... 7 b) Signature...
More informationActivity Recognition Using Cell Phone Accelerometers
Activity Recognition Using Cell Phone Accelerometers Jennifer Kwapisz, Gary Weiss, Samuel Moore Department of Computer & Info. Science Fordham University 1 We are Interested in WISDM WISDM: WIreless Sensor
More informationHierarchical Shape Primitive Features for Online Text-independent Writer Identification
2009 10th International Conference on Document Analysis and Recognition Hierarchical Shape Primitive Features for Online Text-independent Writer Identification Bangy Li, Zhenan Sun and Tieniu Tan Center
More informationComparison of Postures from Pen and Mouse Use
Global Ergonomic Technologies P.O. Box 2667 Guerneville, CA 95446 - U.S.A. Phone: (77) 869-194 Fax: (77) 869-1956 Comparison of Postures from Pen and Mouse Use June 8, 1998 Introduction There are a variety
More informationCAN WE ESCAPE PASSWORDS?
INFOSECURITY WITH PLYMOUTH UNIVERSITY CAN WE ESCAPE PASSWORDS? Prof. Steven Furnell Centre for Security, Communications & Network Research Plymouth University United Kingdom Introduction Represents an
More informationTouchless Fingerprint recognition using MATLAB
International Journal of Innovation and Scientific Research ISSN 2351-814 Vol. 1 No. 2 Oct. 214, pp. 458-465 214 Innovative Space of Scientific Research Journals http://www.ijisr.issr-journals.org/ Touchless
More informationGlobal Mobile Biometric Authentication Market: Size, Trends & Forecasts ( ) October 2017
Global Mobile Biometric Authentication Market: Size, Trends & Forecasts (2017-2021) October 2017 Global Mobile Biometric Authentication Market Report Scope of the Report The report entitled Global Mobile
More informationHaldia Institute of Technology. Touch Screen Monitors
Haldia Institute of Technology Department of Instrumentation & Control Engineering A Seminar Report on Touch Screen Monitors By: Suman Tewary (06-IC-18) 6 th Semester 1 2 Content Introduction How Touch
More informationFeature Selection by User Specific Feature Mask on a Biometric Hash Algorithm for Dynamic Handwriting
Feature Selection by User Specific Feature Mask on a Biometric Hash Algorithm for Dynamic Handwriting Karl Kümmel, Tobias Scheidat, Christian Arndt and Claus Vielhauer Brandenburg University of Applied
More informationContinuous User Authentication Using Temporal Information
Continuous User Authentication Using Temporal Information Koichiro Niinuma a, Anil K. Jain b a Fujitsu Laboratories, Kawasaki, Japan; b Department of Computer Science & Engineering, Michigan State University,
More informationCAS Sign On for Windows
CAS Sign On for Windows Presentation pour l OSSIR 12 novembre 2001 Jean-Francois Kin - Keyware BIOMETRICS OVERVIEW What is Biometrics? The Science of measuring one or more physical or behavioural characteristics
More informationA Mouse-Like Hands-Free Gesture Technique for Two-Dimensional Pointing
A Mouse-Like Hands-Free Gesture Technique for Two-Dimensional Pointing Yusaku Yokouchi and Hiroshi Hosobe Faculty of Computer and Information Sciences, Hosei University 3-7-2 Kajino-cho, Koganei-shi, Tokyo
More informationPublished by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1
Enhancing Security in Identity Documents Using QR Code RevathiM K 1, Annapandi P 2 and Ramya K P 3 1 Information Technology, Dr.Sivanthi Aditanar College of Engineering, Tiruchendur, Tamilnadu628215, India
More informationINTERACTIVE 3D ANIMATION SYSTEM BASED ON TOUCH INTERFACE AND EFFICIENT CREATION TOOLS. Anonymous ICME submission
INTERACTIVE 3D ANIMATION SYSTEM BASED ON TOUCH INTERFACE AND EFFICIENT CREATION TOOLS Anonymous ICME submission ABSTRACT Recently importance of tablet devices with touch interface increases significantly,
More informationCS 528 Mobile and Ubiquitous Computing Lecture 11b: Mobile Security and Mobile Software Vulnerabilities Emmanuel Agu
CS 528 Mobile and Ubiquitous Computing Lecture 11b: Mobile Security and Mobile Software Vulnerabilities Emmanuel Agu Authentication using Biometrics Biometrics Passwords tough to remember, manage Many
More informationBIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition
BIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition Hiren D. Joshi Phd, Dept. of Computer Science Rollwala Computer Centre
More informationAn Efficient Secure Multimodal Biometric Fusion Using Palmprint and Face Image
International Journal of Computer Science Issues, Vol. 2, 2009 ISSN (Online): 694-0784 ISSN (Print): 694-084 49 An Efficient Secure Multimodal Biometric Fusion Using Palmprint and Face Image Nageshkumar.M,
More informationNOVATEUR PUBLICATIONS INTERNATIONAL JOURNAL OF INNOVATIONS IN ENGINEERING RESEARCH AND TECHNOLOGY [IJIERT] ISSN: VOLUME 2, ISSUE 1 JAN-2015
Offline Handwritten Signature Verification using Neural Network Pallavi V. Hatkar Department of Electronics Engineering, TKIET Warana, India Prof.B.T.Salokhe Department of Electronics Engineering, TKIET
More informationUse of Extreme Value Statistics in Modeling Biometric Systems
Use of Extreme Value Statistics in Modeling Biometric Systems Similarity Scores Two types of matching: Genuine sample Imposter sample Matching scores Enrolled sample 0.95 0.32 Probability Density Decision
More informationTutorial 1. Jun Xu, Teaching Asistant January 26, COMP4134 Biometrics Authentication
Tutorial 1 Jun Xu, Teaching Asistant csjunxu@comp.polyu.edu.hk COMP4134 Biometrics Authentication January 26, 2017 Table of Contents Problems Problem 1: Answer the following questions Problem 2: Biometric
More informationInternational Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 5, Sep Oct 2017
RESEARCH ARTICLE OPEN ACCESS Iris and Palmprint Decision Fusion to Enhance Human Ali M Mayya [1], Mariam Saii [2] PhD student [1], Professor Assistance [2] Computer Engineering Tishreen University Syria
More informationCoin Size Wireless Sensor Interface for Interaction with Remote Displays
Coin Size Wireless Sensor Interface for Interaction with Remote Displays Atia Ayman, Shin Takahashi, and Jiro Tanaka Department of Computer Science, Graduate school of systems and information engineering,
More informationUsing Support Vector Machines to Eliminate False Minutiae Matches during Fingerprint Verification
Using Support Vector Machines to Eliminate False Minutiae Matches during Fingerprint Verification Abstract Praveer Mansukhani, Sergey Tulyakov, Venu Govindaraju Center for Unified Biometrics and Sensors
More informationA new approach to reference point location in fingerprint recognition
A new approach to reference point location in fingerprint recognition Piotr Porwik a) and Lukasz Wieclaw b) Institute of Informatics, Silesian University 41 200 Sosnowiec ul. Bedzinska 39, Poland a) porwik@us.edu.pl
More information5. Signature Recognition & Keystroke Dynamics
5. Signature Recognition & Keystroke Dynamics Signature verification is an important research area in the field of authentication of a person as well as documents in e-commerce and banking. We can generally
More informationRobotic Arm Motion for Verifying Signatures
Robotic Arm Motion for Verifying Signatures Moises Diaz 1 Miguel A. Ferrer 2 Jose J. Quintana 2 1 Universidad del Atlantico Medio, Spain 2 Instituto para el Desarrollo Tecnológico y la Innovación en Comunicaciones
More informationHow-To Guide. SigCompare Test Utility. Copyright Topaz Systems Inc. All rights reserved.
How-To Guide SigCompare Test Utility Copyright Topaz Systems Inc. All rights reserved. For Topaz Systems, Inc. trademarks and patents, visit www.topazsystems.com/legal. Table of Contents Overview... 3
More informationKAUSTUBH DEKATE KEDAR AYACHIT KALPESH BHOIR SAGAR KEDARE DHAWAL JADHAV NITIN DHALE
KAUSTUBH DEKATE KEDAR AYACHIT KALPESH BHOIR SAGAR KEDARE DHAWAL JADHAV NITIN DHALE A tablet computer, or simply tablet, is a complete mobile computer, larger than a mobile phone or personal digital assistant,
More informationHow Pointing Devices Work
232 PART 5 INPUT/OUTPUT DEVICES CHAPTER 25 How Pointing Devices Work 233 THERE is nothing natural or intuitive about a keyboard. No child is born knowing how to type, and even when the skill is learned,
More informationMultimodal Fusion Vulnerability to Non-Zero Effort (Spoof) Imposters
Multimodal Fusion Vulnerability to Non-Zero Effort (Spoof) mposters P. A. Johnson, B. Tan, S. Schuckers 3 ECE Department, Clarkson University Potsdam, NY 3699, USA johnsopa@clarkson.edu tanb@clarkson.edu
More informationFeature-level Fusion for Effective Palmprint Authentication
Feature-level Fusion for Effective Palmprint Authentication Adams Wai-Kin Kong 1, 2 and David Zhang 1 1 Biometric Research Center, Department of Computing The Hong Kong Polytechnic University, Kowloon,
More informationPerformance Improvement of Phase-Based Correspondence Matching for Palmprint Recognition
Performance Improvement of Phase-Based Correspondence Matching for Palmprint Recognition Vincent Roux Institut Supérieur d électronique de Paris,, rue Notre Dame des Champs, 76 Paris, France vincent.roux@isep.fr
More informationA Supporting System for Beginners of Billiards Based on Predicting the Path of the Balls by Detecting the Cue Stick
A Supporting System for Beginners of Billiards Based on Predicting the Path of the Balls by Detecting the Cue Stick Akira SUGANUMA Department of Electronics and Information Engineering, National Institute
More informationTechnical White Paper. Behaviometrics. Measuring FAR/FRR/EER in Continuous Authentication
Technical White Paper Behaviometrics Measuring FAR/FRR/EER in Continuous Authentication Draft version 12/22/2009 Table of Contents Background... 1 Calculating FAR/FRR/EER in the field of Biometrics...
More informationBiometrics problem or solution?
Biometrics problem or solution? Summary Biometrics are a security approach that offers great promise, but also presents users and implementers with a number of practical problems. Whilst some of these
More information