2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS) 2015
DOI: 10.1109/btas.2015.7358745
|View full text |Cite
|
Sign up to set email alerts
|

A Leap Password based verification system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 24 publications
(15 citation statements)
references
References 6 publications
0
15
0
Order By: Relevance
“…Yang et al [ 25 ] invited 110 participants for performing the experiment, which is because their research is a comparison between text password and gesture password, then they got a result that using gesture password could get 98.90% at most. Chahar et al [ 11 ] created spoofing samples by 3 individuals and then they got the result 1% FAR on 18.83% FRR to support their conditional mutual information maximization method. Sun et al [ 26 ] have some similarity to our methods, they also made data smoothing and data normalization, but they used a DTW algorithm to make sequence alignment.…”
Section: Experiments and Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…Yang et al [ 25 ] invited 110 participants for performing the experiment, which is because their research is a comparison between text password and gesture password, then they got a result that using gesture password could get 98.90% at most. Chahar et al [ 11 ] created spoofing samples by 3 individuals and then they got the result 1% FAR on 18.83% FRR to support their conditional mutual information maximization method. Sun et al [ 26 ] have some similarity to our methods, they also made data smoothing and data normalization, but they used a DTW algorithm to make sequence alignment.…”
Section: Experiments and Resultsmentioning
confidence: 99%
“…We have considered several input devices for gesture information collection, such as the devices used in previous research [ 7 , 8 , 9 , 10 , 11 ]. There are two primary reasons for choosing this device.…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…One such scheme is the Leap Password. Using the Leap Motion sensor [41], Chahar et al [113] proposed to authenticate a user from six in-air one-finger taps performed in front of the device. A set of features are extracted from each of the samples, including the dimensions of the palms and fingers of a user's hand, the timing of the tap sequence, and the motion.…”
Section: C-f-x Schemes: Finger-motion Techniquesmentioning
confidence: 99%