Identifying users by their hand tracking data in augmented and virtual reality
J Liebers, S Brockel, U Gruenefeld… - International Journal of …, 2024 - Taylor & Francis
Abstract Nowadays, Augmented and Virtual Reality devices are widely available and are
often shared among users due to their high cost. Thus, distinguishing users to offer …
often shared among users due to their high cost. Thus, distinguishing users to offer …
A survey of machine learning techniques for behavioral-based biometric user authentication
NA Mahadi, MA Mohamed, AI Mohamad… - Recent Advances in …, 2018 - books.google.com
Authentication is a way to enable an individual to be uniquely identified usually based on
passwords and personal identification number (PIN). The main problems of such …
passwords and personal identification number (PIN). The main problems of such …
A hand gesture-based method for biometric authentication
S Imura, H Hosobe - … Interaction. Theories, Methods, and Human Issues …, 2018 - Springer
With the spread of computers to ordinary people, computer security is becoming increasingly
important. User authentication is one of the most important technologies for computer …
important. User authentication is one of the most important technologies for computer …
Person authentication by air-writing using 3D sensor and time order stroke context
LW Chiu, JW Hsieh, CR Lai, HF Chiang… - Smart Multimedia: First …, 2018 - Springer
This paper proposes touch-less system to use air-written signatures for person
authentication. This smart system can verify a person's ID without using any mouse, touch …
authentication. This smart system can verify a person's ID without using any mouse, touch …
Hand gesture authentication using optimal feature selection and dynamic time warping based K-nearest neighbor
Network security is becoming a critical issue due to the spread of computer networks to
ordinary people. User authentication is one of the most important part for network security …
ordinary people. User authentication is one of the most important part for network security …
STASH: Securing transparent authentication schemes using prover-side proximity verification
Transparent authentication (TA) schemes are those in which a user's prover device
authenticates him to a verifier without requiring explicit user interaction. By doing so, those …
authenticates him to a verifier without requiring explicit user interaction. By doing so, those …
[PDF][PDF] Dynamic Hand Gesture-Based Person Identification Using Leap Motion and Machine Learning Approaches.
Person identification is one of the most vital tasks for network security. People are more
concerned about their security due to traditional passwords becoming weaker or leaking in …
concerned about their security due to traditional passwords becoming weaker or leaking in …
Two-factor authentication using leap motion and numeric keypad
T Manabe, H Yamana - HCI for Cybersecurity, Privacy and Trust: First …, 2019 - Springer
Biometric authentication has become popular in modern society. It takes less time and effort
for users when compared to conventional password authentication. Furthermore, biometric …
for users when compared to conventional password authentication. Furthermore, biometric …
Air-writing recognition using reverse time ordered stroke context
TH Tsai, JW Hsieh, CW Chang, CR Lay… - Journal of Visual …, 2021 - Elsevier
Air-writing is a new human and smart device communication approach, permits users to
write inputs in a natural and relentless way. This touch-less way can prevent users from virus …
write inputs in a natural and relentless way. This touch-less way can prevent users from virus …
Fingerprinting of URL logs: continuous user authentication from behavioural patterns
Security of computer systems is now a critical and evolving issue. Current trends try to use
behavioural biometrics for continuous authorization. Our work is intended to strengthen …
behavioural biometrics for continuous authorization. Our work is intended to strengthen …