Writer Authentication Based on the Analysis of Strokes
نویسندگان
چکیده
This paper presents an on-line handwriting authentication system for text-independent Chinese handwriting. The proposed strategy is implemented on the stroke level, and the writing strokes and interstrokes are separated stepwise. The writing features are extracted from the dynamics of substrokes and interstrokes, including the writing velocity, the pressure, and the angle between the pen and the writing surface. To alleviate the effect of writing character number on the performance of the algorithm, we adopt the feature vectors of selected dimensions. In live experiments the authentication result is promising.
منابع مشابه
Figure-Based Writer Verification by Matching between an Arbitrary Part of Registered Sequence and an Input Sequence Extracted from On-Line Handwritten Figures
This paper propose a method of writer verification based on on-line features extracted from a process of drawing a figure, and evaluate its performance on handdrawn figures by genuine writers and pretenders. In the proposed method, a person in registration writes only the reference figure, which is composed of as many parts as possible and the person can be verified with a arbitrary part of the...
متن کاملGame-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags
The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...
متن کاملHMM-based Offline Recognition of Handwritten Words Crossed Out with Different Kinds of Strokes
In this work, we investigate the recognition of words that have been crossed-out by the writers and are thus degraded. The degradation consists of one or more ink strokes that span the whole word length and simulate the signs that writers use to cross out the words. The simulated strokes are superimposed to the original clean word images. We considered two types of strokes: wave-trajectory stro...
متن کاملGSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication
Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...
متن کاملHMAC-Based Authentication Protocol: Attacks and Improvements
As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...
متن کامل