A review of biometric technology along with trends and prospects

JA Unar, WC Seng, A Abbasi - Pattern recognition, 2014 - Elsevier
Identity management through biometrics offer potential advantages over knowledge and
possession based methods. A wide variety of biometric modalities have been tested so far …

Signature identification and verification techniques: state-of-the-art work

H Kaur, M Kumar - Journal of Ambient Intelligence and Humanized …, 2023 - Springer
Signature identification and verification are some of the biometric systems used for personal
identification. Signatures can be considered as authentication of an individual by the …

Performance comparison of intrusion detection systems and application of machine learning to Snort system

SAR Shah, B Issac - Future Generation Computer Systems, 2018 - Elsevier
This study investigates the performance of two open source intrusion detection systems
(IDSs) namely Snort and Suricata for accurately detecting the malicious traffic on computer …

Computing and visualizing dynamic time war** alignments in R: the dtw package

T Giorgino - Journal of statistical Software, 2009 - jstatsoft.org
Dynamic time war** is a popular technique for comparing time series, providing both a
distance measure that is insensitive to local compression and stretches and the war** …

Comparative study on classifying human activities with miniature inertial and magnetic sensors

K Altun, B Barshan, O Tunçel - Pattern Recognition, 2010 - Elsevier
This paper provides a comparative study on the different techniques of classifying human
activities that are performed using body-worn miniature inertial and magnetic sensors. The …

Biometric-rich gestures: a novel approach to authentication on multi-touch devices

N Sae-Bae, K Ahmed, K Isbister, N Memon - proceedings of the SIGCHI …, 2012 - dl.acm.org
In this paper, we present a novel multi-touch gesture-based authentication technique. We
take advantage of the multi-touch surface to combine biometric techniques with gestural …

Online signature verification on mobile devices

N Sae-Bae, N Memon - IEEE transactions on information …, 2014 - ieeexplore.ieee.org
This paper studies online signature verification on touch interface-based mobile devices. A
simple and effective method for signature verification is developed. An online signature is …

Matching incomplete time series with dynamic time war**: an algorithm and an application to post-stroke rehabilitation

P Tormene, T Giorgino, S Quaglini… - Artificial intelligence in …, 2009 - Elsevier
OBJECTIVE: The purpose of this study was to assess the performance of a real-time (“open-
end”) version of the dynamic time war** (DTW) algorithm for the recognition of motor …

HMM-based on-line signature verification: Feature extraction and signature modeling

J Fierrez, J Ortega-Garcia, D Ramos… - Pattern recognition …, 2007 - Elsevier
A function-based approach to on-line signature verification is presented. The system uses a
set of time sequences and Hidden Markov Models (HMMs). Development and evaluation …

Dynamic signature verification system based on one real signature

M Diaz, A Fischer, MA Ferrer… - IEEE transactions on …, 2016 - ieeexplore.ieee.org
The dynamic signature is a biometric trait widely used and accepted for verifying a person's
identity. Current automatic signature-based biometric systems typically require five, ten, or …