2015 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) 2015
DOI: 10.1109/cvprw.2015.7301326
|View full text |Cite
|
Sign up to set email alerts
|

Electromyograph and keystroke dynamics for spoof-resistant biometric authentication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
6
4

Relationship

1
9

Authors

Journals

citations
Cited by 30 publications
(16 citation statements)
references
References 34 publications
0
16
0
Order By: Relevance
“…As little attention was received, there was limited literature on sEMG biometrics. In Belgacem et al (2015), Venugopalan et al (2015), and Cannan and Hu (2013), sEMG was used as the complementary information and combined with other physiological or behavioral data to strengthen the performance of user authentication. In Yamaba et al (2018a) and Yamaba et al (2019), the difference was observed in sEMG amplitudes from the same gesture made by different participants.…”
Section: Related Work and Our Contributionmentioning
confidence: 99%
“…As little attention was received, there was limited literature on sEMG biometrics. In Belgacem et al (2015), Venugopalan et al (2015), and Cannan and Hu (2013), sEMG was used as the complementary information and combined with other physiological or behavioral data to strengthen the performance of user authentication. In Yamaba et al (2018a) and Yamaba et al (2019), the difference was observed in sEMG amplitudes from the same gesture made by different participants.…”
Section: Related Work and Our Contributionmentioning
confidence: 99%
“…Especially in Czech legislation, there is no similar idea covered. Integrated electromyography (iEMG) in combination with Keystroke dynamics (KD) is used, for example, in order to increase access security to specific computer applications and/or information systems (6). By monitoring a larger set of probands we can get behavioural characteristics of the clerks, which could allow us to create a higher-level user authentication method.…”
Section: Discussionmentioning
confidence: 99%
“…Compared to other commonly used distance measurement such as ℓ 1 -norm, ℓ 2 -norm, NCD exhibits the best result [48][49][50][51][52][53][54][55]68,69]. The result of each algorithm is a similarity matrix whose entry SimM ij is the NCD between the feature vector of probe image i and target image j.…”
Section: Experimental Setup Overviewmentioning
confidence: 97%