User Authentication based on Continuous Touch Biometrics.
Christina J. KroezeKatherine Mary MalanPublished in: South Afr. Comput. J. (2016)
Keyphrases
- user authentication
- biometric authentication
- keystroke dynamics
- authentication systems
- biometric systems
- authentication scheme
- identity verification
- information security
- security analysis
- authentication protocol
- biometric recognition
- remote user authentication scheme
- feature selection
- palmprint
- image processing
- biometric identification