Automatic identification of writers
Conference of the Dutch Psychonomic Society on Human-computer interaction: psychonomic aspects
On-Line and Off-Line Handwriting Recognition: A Comprehensive Survey
IEEE Transactions on Pattern Analysis and Machine Intelligence
The Data Compression Book
Icsa Guide to Cryptography
Computer Vision: A Modern Approach
Computer Vision: A Modern Approach
Use of Biometrics for User Verification in Electronic Signature Smartcards
E-SMART '01 Proceedings of the International Conference on Research in Smart Cards: Smart Card Programming and Security
Biometric Hash based on Statistical Features of Online Signatures
ICPR '02 Proceedings of the 16 th International Conference on Pattern Recognition (ICPR'02) Volume 1 - Volume 1
EURASIP Journal on Applied Signal Processing
Towards practical biometric key generation with randomized biometric templates
Proceedings of the 15th ACM conference on Computer and communications security
The practical subtleties of biometric key generation
SS'08 Proceedings of the 17th conference on Security symposium
Template Protection for On-Line Signature-Based Recognition Systems
Biometrics and Identity Management
Cancelable templates for sequence-based biometrics with application to on-line signature recognition
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans - Special issue on recent advances in biometrics
Eigen-model projections for protected on-line signature recognition
BioID'11 Proceedings of the COST 2101 European conference on Biometrics and ID management
Biometric hashing based on genetic selection and its application to on-line signatures
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
Hi-index | 0.00 |
In the application domain of electronic commerce, biometric authentication can provide one possible solution for the key management problem. Besides server-based approaches, methods of deriving digital keys directly from biometric measures appear to be advantageous. In this paper, we analyze one of our recently published specific algorithms of this category based on behavioral biometrics of handwriting, the biometric hash. Our interest is to investigate to which degree each of the underlying feature parameters contributes to the overall intrapersonal stability and interpersonal value space.We will briefly discuss related work in feature evaluation and introduce a new methodology based on three components: the intrapersonal scatter (deviation), the interpersonal entropy, and the correlation between both measures. Evaluation of the technique is presented based on two data sets of different size. The method presented will allow determination of effects of parameterization of the biometric system, estimation of value space boundaries, and comparison with other feature selection approaches.