Identifying users by their hand tracking data in augmented and virtual reality

J Liebers, S Brockel, U Gruenefeld… - International Journal of …, 2024 - Taylor & Francis
Abstract Nowadays, Augmented and Virtual Reality devices are widely available and are
often shared among users due to their high cost. Thus, distinguishing users to offer …

A survey of machine learning techniques for behavioral-based biometric user authentication

NA Mahadi, MA Mohamed, AI Mohamad… - Recent Advances in …, 2018 - books.google.com
Authentication is a way to enable an individual to be uniquely identified usually based on
passwords and personal identification number (PIN). The main problems of such …

A hand gesture-based method for biometric authentication

S Imura, H Hosobe - … Interaction. Theories, Methods, and Human Issues …, 2018 - Springer
With the spread of computers to ordinary people, computer security is becoming increasingly
important. User authentication is one of the most important technologies for computer …

Person authentication by air-writing using 3D sensor and time order stroke context

LW Chiu, JW Hsieh, CR Lai, HF Chiang… - Smart Multimedia: First …, 2018 - Springer
This paper proposes touch-less system to use air-written signatures for person
authentication. This smart system can verify a person's ID without using any mouse, touch …

Hand gesture authentication using optimal feature selection and dynamic time warping based K-nearest neighbor

J Shin, MAM Hasan, M Maniruzzaman - Proceedings of the 2022 5th …, 2022 - dl.acm.org
Network security is becoming a critical issue due to the spread of computer networks to
ordinary people. User authentication is one of the most important part for network security …

STASH: Securing transparent authentication schemes using prover-side proximity verification

M Juuti, C Vaas, I Sluganovic… - 2017 14th Annual …, 2017 - ieeexplore.ieee.org
Transparent authentication (TA) schemes are those in which a user's prover device
authenticates him to a verifier without requiring explicit user interaction. By doing so, those …

[PDF][PDF] Dynamic Hand Gesture-Based Person Identification Using Leap Motion and Machine Learning Approaches.

J Shin, MAM Hasan, M Maniruzzaman… - … Materials & Continua, 2024 - cdn.techscience.cn
Person identification is one of the most vital tasks for network security. People are more
concerned about their security due to traditional passwords becoming weaker or leaking in …

Two-factor authentication using leap motion and numeric keypad

T Manabe, H Yamana - HCI for Cybersecurity, Privacy and Trust: First …, 2019 - Springer
Biometric authentication has become popular in modern society. It takes less time and effort
for users when compared to conventional password authentication. Furthermore, biometric …

Air-writing recognition using reverse time ordered stroke context

TH Tsai, JW Hsieh, CW Chang, CR Lay… - Journal of Visual …, 2021 - Elsevier
Air-writing is a new human and smart device communication approach, permits users to
write inputs in a natural and relentless way. This touch-less way can prevent users from virus …

Fingerprinting of URL logs: continuous user authentication from behavioural patterns

J Nowak, T Holotyak, M Korytkowski, R Scherer… - … Science–ICCS 2020 …, 2020 - Springer
Security of computer systems is now a critical and evolving issue. Current trends try to use
behavioural biometrics for continuous authorization. Our work is intended to strengthen …