Hossain et al., 2012 - Google Patents
New impostor score based rejection methods for continuous keystroke verification with weak templatesHossain et al., 2012
- Document ID
- 5343599134297210659
- Author
- Hossain M
- Balagani K
- Phoha V
- Publication year
- Publication venue
- 2012 IEEE fifth international conference on biometrics: theory, applications and systems (BTAS)
External Links
Snippet
Previous studies in continuous keystroke verification have shown that users' templates built with enrollment samples collected in multiple sessions are instrumental in reducing verification error rates. However, to our knowledge, no work has addressed how to achieve …
- 230000004927 fusion 0 abstract description 38
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/68—Methods or arrangements for recognition using electronic means using sequential comparisons of the image signals with a plurality of references in which the sequence of the image signals or the references is relevant, e.g. addressable memory
- G06K9/6807—Dividing the references in groups prior to recognition, the recognition taking place in steps; Selecting relevant dictionaries
- G06K9/6842—Dividing the references in groups prior to recognition, the recognition taking place in steps; Selecting relevant dictionaries according to the linguistic properties, e.g. English, German
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Ahmed et al. | Biometric recognition based on free-text keystroke dynamics | |
| Giot et al. | Unconstrained keystroke dynamics authentication with shared secret | |
| Karnan et al. | Biometric personal authentication using keystroke dynamics: A review | |
| US9268927B1 (en) | Method and system of identifying users based upon free text keystroke patterns | |
| Davoudi et al. | A new distance measure for free text keystroke authentication | |
| Hossain et al. | New impostor score based rejection methods for continuous keystroke verification with weak templates | |
| Ayotte et al. | Fast continuous user authentication using distance metric fusion of free-text keystroke data | |
| Giot et al. | Keystroke dynamics authentication for collaborative systems | |
| US20070245151A1 (en) | System and method for classifying regions of keystroke density with a neural network | |
| Mhenni et al. | Analysis of Doddington zoo classification for user dependent template update: Application to keystroke dynamics recognition | |
| Harun et al. | Performance of keystroke biometrics authentication system using artificial neural network (ANN) and distance classifier method | |
| Shimshon et al. | Clustering di-graphs for continuously verifying users according to their typing patterns | |
| Krishna et al. | Keystroke based user authentication using modified differential evolution | |
| Darabseh et al. | On accuracy of classification-based keystroke dynamics for continuous user authentication | |
| Shen et al. | Handedness recognition through keystroke-typing behavior in computer forensics analysis | |
| Alieksieiev et al. | Studying of keystroke dynamics statistical properties for biometrie user authentication | |
| Bond et al. | Touch-based static authentication using a virtual grid | |
| Chauhan et al. | Effect of dimensionality reduction on performance in artificial neural network for user authentication | |
| Iyapparaja et al. | Enhancing user authentication through keystroke dynamics analysis using isolation forest algorithm | |
| Gautam et al. | Keystroke biometric system for touch screen text input on android devices optimization of equal error rate based on medians vector proximity | |
| Thanganayagam et al. | Hybrid model with fusion approach to enhance the efficiency of keystroke dynamics authentication | |
| Popovici et al. | Combined use of pattern recognition algorithms for keystroke-based continuous authentication system | |
| Tural et al. | Artificial Intelligence and Keystroke Dynamics: The Mysterious World of Personal Signatures | |
| ÖZBEK | Classification performance improvement of keystroke data | |
| Shaker et al. | Keystroke dynamics authentication based on principal component analysis and neural network |