Behavioral Biometrics for Human Identification 2010
DOI: 10.4018/978-1-60566-725-6.ch012
|View full text |Cite
|
Sign up to set email alerts
|

Gaze Based Personal Identification

Abstract: This chapter describes the use of visual attention characteristics as a biometric for authentication or identification of individual viewers. The visual attention characteristics of a person can be easily monitored by tracking the gaze of a viewer during the presentation of a known or unknown visual scene. The positions and sequences of gaze locations during viewing may be determined by overt (conscious) or covert (subconscious) viewing behaviour. Methods to quantify the spatial and temporal patterns establish… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 12 publications
(4 citation statements)
references
References 24 publications
0
4
0
Order By: Relevance
“…They broadly classified gaze application usage into two fields, diagnostic (see examples in [234][235][236]) and interactive (see examples in [237,238]). Later reviews in [63,91,239] presented wider usage for gaze applications, which included that by REGT systems, augmented reality systems [240][241][242][243][244], human behavior analysis [245][246][247][248][249][250], and bio-metric authentication [251][252][253][254][255]. Recently, the usage of REGTs has gotten even wider with emerging usage in privacy-aware interactions.…”
Section: Applicationsmentioning
confidence: 99%
“…They broadly classified gaze application usage into two fields, diagnostic (see examples in [234][235][236]) and interactive (see examples in [237,238]). Later reviews in [63,91,239] presented wider usage for gaze applications, which included that by REGT systems, augmented reality systems [240][241][242][243][244], human behavior analysis [245][246][247][248][249][250], and bio-metric authentication [251][252][253][254][255]. Recently, the usage of REGTs has gotten even wider with emerging usage in privacy-aware interactions.…”
Section: Applicationsmentioning
confidence: 99%
“…For this reason, the mean μ(j) is computed for all GP in the current cluster including the new GP (i) at a particular time instance i. If the distance of GP (i) to the mean μ(j) is below Algorithm 1 Pseudo code for VFP creation [15].…”
Section: A Creation Of Visual Fixation Patternsmentioning
confidence: 99%
“…Applying an information fusion method, they combined these features and reported a 27% error rate for personal identification. Fookes, Maeder, Sridharan, and Mamic (2009) developed methods to characterize visual attention as a biometric for authentication and identification of image viewers. To characterize spatial and temporal patterns of visual attention, they proposed three techniques: principal component analysis (''eigenGaze''), linear discriminant analysis, and a fusion of distance measures.…”
Section: Introductionmentioning
confidence: 99%