-
1
-
-
84876806083
-
Biometric authentication revisited: Understanding the impact of wolves in sheep's clothing
-
Aug
-
L. Ballard, F. Monrose, and D. Lopresti, "Biometric authentication revisited: Understanding the impact of wolves in sheep's clothing," in Proc. 15th Annu. USENIX Security Symp., Aug. 2006, pp. 29-41.
-
(2006)
Proc. 15th Annu. USENIX Security Symp
, pp. 29-41
-
-
Ballard, L.1
Monrose, F.2
Lopresti, D.3
-
2
-
-
37849041688
-
Sheep, goats, lambs and wolves: A statistical analysis of speaker performance in the NIST 1998 speaker recognition evaluation
-
Nov
-
G. R. Doddington, W. Liggett, A. F. Martin, M. Przybocki, and D. A. Reynolds, "Sheep, goats, lambs and wolves: A statistical analysis of speaker performance in the NIST 1998 speaker recognition evaluation," in Proc. 15th Int. Conf. Spoken Language Process., Nov. 1998.
-
(1998)
Proc. 15th Int. Conf. Spoken Language Process
-
-
Doddington, G.R.1
Liggett, W.2
Martin, A.F.3
Przybocki, M.4
Reynolds, D.A.5
-
3
-
-
2342429444
-
Development of a biometric testing protocol for dynamic signature verification
-
Singapore
-
S. J. Elliott, "Development of a biometric testing protocol for dynamic signature verification," in Proc. Int. Conf. Autom., Robot., and Comput. Vis., Singapore, 2002.
-
(2002)
Proc. Int. Conf. Autom., Robot., and Comput. Vis
-
-
Elliott, S.J.1
-
4
-
-
0031335612
-
Signature verification revisited: Promoting practical exploitation of biometric technology
-
Dec
-
M. C. Fairhurst, "Signature verification revisited: Promoting practical exploitation of biometric technology," Electron. Commun. Eng. J., vol. 9, no. 6, pp. 273-280, Dec. 1997.
-
(1997)
Electron. Commun. Eng. J
, vol.9
, Issue.6
, pp. 273-280
-
-
Fairhurst, M.C.1
-
6
-
-
0010474116
-
The principle of the 'drunkard's search' as a proxy for scientific analysis: The misuse of handwriting test data in a law journal article
-
O. Galbraith, C. Galbraith, and N. Galbraith, "The principle of the 'drunkard's search' as a proxy for scientific analysis: The misuse of handwriting test data in a law journal article," Int. J. Forensic Doc. Exam., vol. 1, no. 1, pp. 7-17, 1995.
-
(1995)
Int. J. Forensic Doc. Exam
, vol.1
, Issue.1
, pp. 7-17
-
-
Galbraith, O.1
Galbraith, C.2
Galbraith, N.3
-
9
-
-
35248825123
-
A set of novel features for writer identification
-
Guilford, U.K
-
C. Hertel and H. Bunke, "A set of novel features for writer identification," in Proc. Int. Conf. Audio- and Video-based Biometric Person Authentication, Guilford, U.K., 2003, pp. 679-687.
-
(2003)
Proc. Int. Conf. Audio- and Video-based Biometric Person Authentication
, pp. 679-687
-
-
Hertel, C.1
Bunke, H.2
-
10
-
-
0036887670
-
On-line signature verification
-
Dec
-
A. K. Jain, F. D. Griess, and S. D. Connell, "On-line signature verification," Pattern Recognit., vol. 35, no. 12, pp. 2963-2972, Dec. 2002.
-
(2002)
Pattern Recognit
, vol.35
, Issue.12
, pp. 2963-2972
-
-
Jain, A.K.1
Griess, F.D.2
Connell, S.D.3
-
11
-
-
0030963727
-
Writer identification by professional document examiners
-
Sep
-
M. Kam, G. Fielding, and R. Conn, "Writer identification by professional document examiners," J. Forensic Sci., vol. 42, no. 5, pp. 778-785, Sep. 1997.
-
(1997)
J. Forensic Sci
, vol.42
, Issue.5
, pp. 778-785
-
-
Kam, M.1
Fielding, G.2
Conn, R.3
-
12
-
-
0034957545
-
Signature authentication by forensic document examiners
-
Jul
-
M. Kam, K. Gummadidala, and R. Conn, "Signature authentication by forensic document examiners," J. Forensic Sci., vol. 46, no. 4, pp. 884-888, Jul. 2001.
-
(2001)
J. Forensic Sci
, vol.46
, Issue.4
, pp. 884-888
-
-
Kam, M.1
Gummadidala, K.2
Conn, R.3
-
13
-
-
35048861344
-
Biometric authentication using online signatures
-
Oct
-
A. Kholmatov and B. Yanikoglu, "Biometric authentication using online signatures," in Proc. ISCIS, Oct. 2004, pp. 373-380.
-
(2004)
Proc. ISCIS
, pp. 373-380
-
-
Kholmatov, A.1
Yanikoglu, B.2
-
14
-
-
33750947671
-
Cryptographic keys from dynamic hand-signatures with biometric security preservation and replaceability
-
Y. W. Kuan, A. Goh, D. Ngo, and A. Tech, "Cryptographic keys from dynamic hand-signatures with biometric security preservation and replaceability," in Proc. 4th IEEE Workshop Automatic Identification Adv. Technol., 2005, pp. 27-32.
-
(2005)
Proc. 4th IEEE Workshop Automatic Identification Adv. Technol
, pp. 27-32
-
-
Kuan, Y.W.1
Goh, A.2
Ngo, D.3
Tech, A.4
-
15
-
-
0002377851
-
Automatic signature verification: The state of the art 1989-1993
-
F. Leclerc and R. Plamondon, "Automatic signature verification: The state of the art 1989-1993," Int. J. Pattern Recogn. Artif. Intell. vol. 8, no. 3, pp. 643-660, 1994.
-
(1994)
Int. J. Pattern Recogn. Artif. Intell
, vol.8
, Issue.3
, pp. 643-660
-
-
Leclerc, F.1
Plamondon, R.2
-
16
-
-
0030173701
-
Reliable on-line human signature verification systems
-
Jun
-
L. Lee, T. Berger, and E. Aviczer, "Reliable on-line human signature verification systems," IEEE Trans. Pattern Anal. Mach. Intell., vol. 18, no. 6, pp. 643-647, Jun. 1996.
-
(1996)
IEEE Trans. Pattern Anal. Mach. Intell
, vol.18
, Issue.6
, pp. 643-647
-
-
Lee, L.1
Berger, T.2
Aviczer, E.3
-
17
-
-
0032091970
-
Segmentation and reconstruction of on-line handwritten scripts
-
Dec
-
X. Li, M. Parizeau, and R. Plamondon, "Segmentation and reconstruction of on-line handwritten scripts," Pattern Recognit., vol. 31, no. 6, pp. 675-684, Dec. 1998.
-
(1998)
Pattern Recognit
, vol.31
, Issue.6
, pp. 675-684
-
-
Li, X.1
Parizeau, M.2
Plamondon, R.3
-
18
-
-
85135261394
-
Vulnerability in speaker verification - A study of technical impostor techniques
-
Budapest, Hungary, Sep
-
J. Lindberg and M. Blomberg, "Vulnerability in speaker verification - A study of technical impostor techniques," in Proc. Eur. Conf. Speech Commun. and Technol., Budapest, Hungary, Sep. 1999, vol. 3, pp. 1211-1214.
-
(1999)
Proc. Eur. Conf. Speech Commun. and Technol
, vol.3
, pp. 1211-1214
-
-
Lindberg, J.1
Blomberg, M.2
-
19
-
-
26444619774
-
The effectiveness of generative attacks on an online handwriting biometric
-
Hilton Rye Town, NY
-
D. P. Lopresti and J. D. Raim, "The effectiveness of generative attacks on an online handwriting biometric," in Proc. Int. Conf. Audio- and Video-Based Biometric Person Authentication, Hilton Rye Town, NY, 2005, pp. 1090-1099.
-
(2005)
Proc. Int. Conf. Audio- and Video-Based Biometric Person Authentication
, pp. 1090-1099
-
-
Lopresti, D.P.1
Raim, J.D.2
-
20
-
-
35148870272
-
-
A. J. Mansfield and J. L. Wayman, Best practices in testing and reporting performance of biometric devices, Centre for Mathematics and Scientific Computing, National Physical Laboratory, Teddington, U.K., Tech. Rep. NPL Report CMSC 14/02, Aug. 2002.
-
A. J. Mansfield and J. L. Wayman, "Best practices in testing and reporting performance of biometric devices," Centre for Mathematics and Scientific Computing, National Physical Laboratory, Teddington, U.K., Tech. Rep. NPL Report CMSC 14/02, Aug. 2002.
-
-
-
-
21
-
-
84951801959
-
Writer identification using text line based features
-
Sep
-
U.-V. Marti, R. Messerli, and H. Bunke, "Writer identification using text line based features," in Proc. 6th Int. Conf. Document Anal. and Recog., Sep. 2001, pp. 101-105.
-
(2001)
Proc. 6th Int. Conf. Document Anal. and Recog
, pp. 101-105
-
-
Marti, U.-V.1
Messerli, R.2
Bunke, H.3
-
22
-
-
85009077529
-
Imposture using synthetic speech against speaker verification based on spectrum and pitch
-
Beijing, China, Oct
-
T. Masuko, K. Tokuda, and T. Kobayashi, "Imposture using synthetic speech against speaker verification based on spectrum and pitch," in Proc. Int. Conf. Spoken Language Process., Beijing, China, Oct. 2000, vol. 3, pp. 302-305.
-
(2000)
Proc. Int. Conf. Spoken Language Process
, vol.3
, pp. 302-305
-
-
Masuko, T.1
Tokuda, K.2
Kobayashi, T.3
-
23
-
-
85084163045
-
Towards speech-generated cryptographic keys on resource-constrained devices
-
F. Monrose, M. Reiter, Q. Li, D. Lopresti, and C. Shih, "Towards speech-generated cryptographic keys on resource-constrained devices," in Proc. 11th USENIX Security Symp., 2002, pp. 283-296.
-
(2002)
Proc. 11th USENIX Security Symp
, pp. 283-296
-
-
Monrose, F.1
Reiter, M.2
Li, Q.3
Lopresti, D.4
Shih, C.5
-
24
-
-
19444382525
-
Cryptographic key generation from voice (extended abstract)
-
May
-
F. Monrose, M. K. Reiter, Q. Li, and S. Wetzel, "Cryptographic key generation from voice (extended abstract)," in Proc. IEEE Symp. Security and Privacy, May 2001, pp. 12-25.
-
(2001)
Proc. IEEE Symp. Security and Privacy
, pp. 12-25
-
-
Monrose, F.1
Reiter, M.K.2
Li, Q.3
Wetzel, S.4
-
25
-
-
26444439050
-
Optimal user weighting fusion in DWT domain on-line signature verification
-
Hilton Rye Town, NY
-
I. Nakanishi, H. Sakamoto, Y. Itoh, and Y. Fukui, "Optimal user weighting fusion in DWT domain on-line signature verification," in Proc. Int. Conf. Audio- and Video-Based Biometric Person Authentication Hilton Rye Town, NY, 2005, pp. 758-766.
-
(2005)
Proc. Int. Conf. Audio- and Video-Based Biometric Person Authentication
, pp. 758-766
-
-
Nakanishi, I.1
Sakamoto, H.2
Itoh, Y.3
Fukui, Y.4
-
26
-
-
17844403875
-
Use of dynamic features for signature verification
-
Oct
-
W. Nelson and E. Kishon, "Use of dynamic features for signature verification," in Proc. IEEE Int. Conf. Syst., Man, Cybern., Oct. 1991, pp. 1504-1510.
-
(1991)
Proc. IEEE Int. Conf. Syst., Man, Cybern
, pp. 1504-1510
-
-
Nelson, W.1
Kishon, E.2
-
27
-
-
0032664931
-
An experimental study of speaker verification sensitivity to computer voice altered imposters
-
Mar
-
B. L. Pellom and J. H. L. Hansen, "An experimental study of speaker verification sensitivity to computer voice altered imposters," in Proc. Int. Conf. Acoust., Speech, Signal Process., Mar. 1999, pp. 837-840.
-
(1999)
Proc. Int. Conf. Acoust., Speech, Signal Process
, pp. 837-840
-
-
Pellom, B.L.1
Hansen, J.H.L.2
-
29
-
-
0001650226
-
Online handwriting recootion
-
Hoboken, NJ: Wiley
-
R. Plamondon, D. P. Lopresti, L. R. B. Schomaker, and R. Srihari, "Online handwriting recootion," in Wiley Encyclopedia of Electrical and Electronics Engineering. Hoboken, NJ: Wiley, 1999, pp. 123-146.
-
(1999)
Wiley Encyclopedia of Electrical and Electronics Engineering
, pp. 123-146
-
-
Plamondon, R.1
Lopresti, D.P.2
Schomaker, L.R.B.3
Srihari, R.4
-
30
-
-
0033640745
-
On-line and off-line handwriting recognition: A comprehensive survey
-
Jan
-
R. Plamondon and S. N. Srihari, "On-line and off-line handwriting recognition: A comprehensive survey," IEEE Trans. Pattern Anal. Mach. Intell., vol. 22, no. 1, pp. 63-84, Jan. 2000.
-
(2000)
IEEE Trans. Pattern Anal. Mach. Intell
, vol.22
, Issue.1
, pp. 63-84
-
-
Plamondon, R.1
Srihari, S.N.2
-
31
-
-
84935067826
-
Exorcism of Ignorance as a Proxy for Rational Knowledge: The Lessons of Handwriting Identification 'Expertise', vol. 137. Philadelphia, PA: Univ
-
D. Risinger, M. Denbeaux, and M. Saks, Exorcism of Ignorance as a Proxy for Rational Knowledge: The Lessons of Handwriting Identification 'Expertise', vol. 137. Philadelphia, PA: Univ. Pennsylvania Law Review, 1989, pp. 731-787.
-
(1989)
Pennsylvania Law Review
, pp. 731-787
-
-
Risinger, D.1
Denbeaux, M.2
Saks, M.3
-
32
-
-
0032224440
-
Biometric encryption using image processing
-
C. Soutar, D. Roberge, A. Stoianov, R. Gilroy, and B. V. Kumar, "Biometric encryption using image processing," in Proc. SPIE - Optical Security and Counterfeit Deterrence Techniques II, 1998, vol. 3314, pp. 178-188.
-
(1998)
Proc. SPIE - Optical Security and Counterfeit Deterrence Techniques II
, vol.3314
, pp. 178-188
-
-
Soutar, C.1
Roberge, D.2
Stoianov, A.3
Gilroy, R.4
Kumar, B.V.5
-
33
-
-
26444572518
-
A test tool to support brute-force online and offline signature forgery tests on mobile devices
-
C. Vielhauer and F. Zöbisch, "A test tool to support brute-force online and offline signature forgery tests on mobile devices," in Proc. Int. Conf. Multimedia and Expo, 2003, vol. 3, pp. 225-228.
-
(2003)
Proc. Int. Conf. Multimedia and Expo
, vol.3
, pp. 225-228
-
-
Vielhauer, C.1
Zöbisch, F.2
-
34
-
-
2942592700
-
Handwriting: Feature correlation analysis for biometric hashes
-
C. Vielhauer and R. Steinmetz, "Handwriting: Feature correlation analysis for biometric hashes," EURASIP J. Appl. Signal Process., vol. 4, pp. 542-558, 2004.
-
(2004)
EURASIP J. Appl. Signal Process
, vol.4
, pp. 542-558
-
-
Vielhauer, C.1
Steinmetz, R.2
-
35
-
-
21844443786
-
SVC2004: First international signature verification competition
-
Hong Kong, Jul
-
D.-Y. Yeung, H. Chang, Y. Xiong, S. George, R. Kashi, T. Matsumoto, and G. Rigoll, "SVC2004: First international signature verification competition," in Proc. ICBA, Hong Kong, Jul. 2004.
-
(2004)
Proc. ICBA
-
-
Yeung, D.-Y.1
Chang, H.2
Xiong, Y.3
George, S.4
Kashi, R.5
Matsumoto, T.6
Rigoll, G.7
|