Offline handwritten signature verification—Literature review

LG Hafemann, R Sabourin… - … conference on image …, 2017 - ieeexplore.ieee.org
The area of Handwritten Signature Verification has been broadly researched in the last
decades, but remains an open research problem. The objective of signature verification …

Biometric technology and ethics: Beyond security applications

A North-Samardzic - Journal of Business Ethics, 2020 - Springer
Biometric technology was once the purview of security, with face recognition and fingerprint
scans used for identification and law enforcement. This is no longer the case; biometrics is …

You are how you touch: User verification on smartphones via tap** behaviors

N Zheng, K Bai, H Huang… - 2014 IEEE 22nd …, 2014 - ieeexplore.ieee.org
Smartphone users have their own unique behavioral patterns when tap** on the touch
screens. These personal patterns are reflected on the different rhythm, strength, and angle …

Brainprint: Assessing the uniqueness, collectability, and permanence of a novel method for ERP biometrics

BC Armstrong, MV Ruiz-Blondet, N Khalifian, KJ Kurtz… - Neurocomputing, 2015 - Elsevier
The human brain continually generates electrical potentials representing neural
communication. These potentials can be measured at the scalp, and constitute the …

Resting state EEG-based biometrics for individual identification using convolutional neural networks

L Ma, JW Minett, T Blu… - 2015 37th Annual …, 2015 - ieeexplore.ieee.org
Biometrics is a growing field, which permits identification of individuals by means of unique
physical features. Electroencephalography (EEG)-based biometrics utilizes the small intra …

Whose move is it anyway? Authenticating smart wearable devices using unique head movement patterns

S Li, A Ashok, Y Zhang, C Xu… - 2016 IEEE …, 2016 - ieeexplore.ieee.org
In this paper, we present the design, implementation and evaluation of a user authentication
system, Headbanger, for smart head-worn devices, through monitoring the user's unique …

Understanding consumers' attitudes toward controversial information technologies: A contextualization approach

M Breward, K Hassanein… - Information Systems …, 2017 - pubsonline.informs.org
Controversial information technologies, such as biometrics and radio frequency
identification, are perceived as having the potential to both benefit and undermine the well …

ECG biometric analysis in cardiac irregularity conditions

F Agrafioti, D Hatzinakos - Signal, Image and Video Processing, 2009 - Springer
Biometric traits offer direct solutions to the critical security concerns involved in identity
authentication systems. In this paper, a systematic analysis of the electrocardiogram (ECG) …

High security iris verification system based on random secret integration

CS Chin, ATB **, DNC Ling - Computer Vision and Image Understanding, 2006 - Elsevier
A dual-factor authentication methodology coined as S-Iris Encoding is proposed based on
the iterated inner-products between the secret pseudo-random number and the iris feature …

A survey of the effects of aging on biometric identity verification

A Lanitis - International Journal of Biometrics, 2010 - inderscienceonline.com
The performance of biometric authentication systems is affected by discrepancies between
data stored in biometric templates and corresponding data derived from the actual owners of …