2004
DOI: 10.1109/msp.2004.1276113
|View full text |Cite
|
Sign up to set email alerts
|

Authentication gets personal with biometrics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
58
0
1

Year Published

2005
2005
2023
2023

Publication Types

Select...
3
3
3

Relationship

0
9

Authors

Journals

citations
Cited by 118 publications
(59 citation statements)
references
References 40 publications
(54 reference statements)
0
58
0
1
Order By: Relevance
“…Examples include voice recognition, keystroke recognition (distinctive rhythms in the timing between keystrokes for certain pairs of characters), signature recognition (handwriting or character shapes, timing and pressure of the signature process). Gait recognition or the pattern of walking or locomotion is also used as a biometric measure (Ortega-Garcia et al, 2004).…”
Section: Biometric Techniquesmentioning
confidence: 99%
“…Examples include voice recognition, keystroke recognition (distinctive rhythms in the timing between keystrokes for certain pairs of characters), signature recognition (handwriting or character shapes, timing and pressure of the signature process). Gait recognition or the pattern of walking or locomotion is also used as a biometric measure (Ortega-Garcia et al, 2004).…”
Section: Biometric Techniquesmentioning
confidence: 99%
“…The development of automatic face recognition (AFR) has attracted significant research attention due to increasing demand on its applications. Since AFR is considered to be a natural, non-intimidating, and widely accepted biometric identification method [1], [2], it has the potential of becoming the leading biometric technology. Unfortunately, it is also one of the most difficult pattern recognition problems.…”
Section: Introductionmentioning
confidence: 99%
“…Recognizing people by biometrics (such as fingerprints, faces, speech and iris patterns) has applications in surveillance, forensics, transaction authentication, and various forms of access control, such as border checkpoints and access to digital information [13], [15], [22].…”
Section: Introductionmentioning
confidence: 99%
“…The use of the face as a biometric is particularly attractive, as it can involve little or no interaction with the person to be verified [15]. Various techniques have been proposed for face classification; some examples are systems based on Principal Component Analysis (PCA) feature extraction [24], modular PCA [16], Elastic Graph Matching (EGM) [6], and Support Vector Machines [19].…”
Section: Introductionmentioning
confidence: 99%