2015 7th International Conference on Computational Intelligence, Communication Systems and Networks 2015
DOI: 10.1109/cicsyn.2015.31
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic User Verification Using Touch Keystroke Based on Medians Vector Proximity

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
26
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 29 publications
(28 citation statements)
references
References 7 publications
0
26
0
Order By: Relevance
“…During the interaction with touch screen, there are multiple records which could be generated for the gesture representing the touch event as shown in the following table [28]. Features extracted for every touch event are time of the event, pressure exerted on the screen, position (x and y coordinate), and area of touch.…”
Section: Touch Dynamic Feature Extractionmentioning
confidence: 99%
“…During the interaction with touch screen, there are multiple records which could be generated for the gesture representing the touch event as shown in the following table [28]. Features extracted for every touch event are time of the event, pressure exerted on the screen, position (x and y coordinate), and area of touch.…”
Section: Touch Dynamic Feature Extractionmentioning
confidence: 99%
“…Other features are finger pressure, position on key, and size of key surface touched by finger. All these features may change during the duration period of a key when pressed or released, and can be a source for multiple values for the same feature , . Hence, we have extracted them each time we press or release the key and determined which is to be recorded in the typing rhythm features.…”
Section: Background Informationmentioning
confidence: 99%
“…This text mode verification usually asks the users to type a long text to create the model indirectly by monitoring the user typing rhythm keyboard for a certain period. It is called continuous authentication in literature , …”
Section: Background Informationmentioning
confidence: 99%
See 2 more Smart Citations