Mobile Based Online Signature Verification for Multi-modal Authentication
|
|
|
- Chrystal Griffin
- 10 years ago
- Views:
Transcription
1 Mobile Based Online Signature Verification for Multi-modal Authentication Navid Forhad, Bruce Poon, M. Ashraful Amin, Hong Yan Abstract Providing authenticity of information has always been a challenging task in todays age of technology. Emergence of smart phones has only broadened the field. However, it also provides new means which can be employed to implement better authentication models. We have implemented a multi factor biometric authentication system that utilizes mobile platform. This model can easily be implemented with eisting single or multi factor authentication model which enable a more sophisticated and dependable authentication for day to day use. Inde Terms Authentication, Smart Phone, Signature, Biometric. I. INTRODUCTION UTHENTICATION is the process of proving or verifying Aone s identity. We authenticate ourselves everyday countless times. Whether it's opening a door with a key or riding a bus using a ticket, we have to authenticate ourselves. For the first eample, we authenticated using the key and for the second eample, we authenticated using the bus ticket[1]. However, most common form of authentication used by us is facial recognition. Most of human transactions happen face-to-face because of it's reliability. When face-to-face situation is not applicable, we use other methods like handwriting recognition or stylistic recognition (e.g. a person's writing style or painting style) for authentication. The authentication methods used by us can be categorized in three types: something we know, like passwords; something we have, like bus tickets or tokens; and something we are, like our face, voice, signatures etc. The third type is known as biometric. There is also a fourth type that is gaining foothold nowadays which is someplace we are. This is based on our location and typically uses GPS (Global Positioning System). With the emergence of computers, the authentication issue has become more important. A lot of research is done to ensure authenticity of the users of computers. Though password or token based authentications are easy to implement in electronic authentication systems, they are prone to hacking. On the other This work is supported by Independent University, Bangladesh. Navid Forhad is with the Computer Vision & Cybernetics Research Group, SECS, Independent University, Bangladesh, Bashundhara, Dhaka 1229, Bangladesh ( [email protected]). Bruce Poon is with the School of Electrical & Information Engineering, University of Sydney, NSW 2006, Australia ( [email protected]). M. Ashraful Amin is with the Computer Vision & Cybernetics Research Group, SECS, Independent University, Bangladesh, Bashundhara, Dhaka 1229, Bangladesh. ( [email protected]). Hong Yan is with the Department of Electronic Engineering, City University of Hong Kong, Hong Kong, China ( [email protected]) hand, biometric authentication is more complicated to implement and maintain. However, it provides a much more reliable and secure mode of authentication. Multi-modal input based authentication model is another way to increase the reliability and security of the authentication mechanism. In this model, instead of relying on a single mode of input, we combine multiple modes of input for authentication process. Recent advance in mobile devices (i.e. smart phones) have also shifted the tides of authentication models. They have gained a high level of popularity in the contet of convergence and ubiquitous access to information and services. This makes mobile devices a prime candidate for implementing authentication models based on them. The possibilities are endless if we combine mobile based solution with computer based ones to implement authentication models. Forhad et al. [2] proposed an authentication approach which combines these different types of authentication to achieve a robust system. It leverages smart phone to capture users signature along with other credentials like username and password to authenticate the user. The solution is a simple client-server based model. The client (mobile) application captures the users data and the server application verifies the data. We follow the data collection protocol to ensure the collected data is both consistence and variant. To get a better understanding of the proposed authentication approach, we provide information on the system architecture of the software for both client & server and information on the development platform. In addition to the algorithm performance, we also include the system performance base on the hardware and network provided for the eperiments. II. RELATED WORKS A simple form of biometric authentication that is done using Mobile devices is secret path authentication [3]. This type of authentication is now very common in mobile devices and is used to authenticate mobile device users. Signature based authentication can be considered as a more advance form of this type of authentication where user uses their own signature as the secret path. Though the boom in smart phone market is more recent, Other hand-held devices like PDAs became prolific long ago. Many works have already been done on authentication systems that employ PDAs [4]. Most of these works use feature-based signature verification to authenticate identity [5] [6] [7]. Feature-based systems model the signature as a holistic multidimensional vector composed of global features. These multidimensional vector samples are then processed through a Neural Network to train the authentication system. Another system of verification is function-based system. This system
2 etracts time function from the signature (pen/stylus coordinates, pressure, etc.) and performs signature matching via elastic or statistical techniques like Dynamic Time Warping (DTW) [8] or Hidden Markov Models (HMM) [9]. Considering this, our approach to the mobile based online- Signature authentication can be considered unique. It is a function-based system that etracts time function from the signature and uses them to create a string representation of the biometric signature. By using well known string comparison algorithm, the system verifies the signature. III. METHODOLOGY &IMPLEMENTATION To test our approach, we have collected maimum of 20 sample signatures from different subjects using a Smartphone with pen. However, we were only able to collect maimum of 20 samples for 8 subjects. Therefore, all calculation detailed in this paper are based on the 160 samples. To verify the generated strings, we used the Approimate String Matching algorithms - Lavenshtein Distance, Damerau-Lavenshtein Distance, and Sift3 [10]. The raw data contains space delimited values. Each line represents the states of one point that is registered by the device. If we take the first line of the sample raw data given above, then 'M' represents the type of point. In this case it is move. The second value represents the points value on the -ais. The third point represents the points value on the y-ais. The fourth value point represent the tilt of the pen. And the last value 0 represents the elapsed time after the first point is registered. For our verification system we did not use the last two values because tilt value is less reliable and as the system was a little new to the subjects, their time was varying drastically. B. Data Processing The signature data which we collected were tet files with X and Y coordinate information. Since user can orient the device in any way they want, the raw samples inherit differences that needed to be taken care of before generating the strings. Figure 1 shows the JPEG version of one original signature and figure 2 shows the plot of the X and Y coordinates. A. Data Collection Protocol To ensure that the collected data is both consistent and variant, we followed a protocol. The rules of the protocol were: People have do some practice runs with the system before actually giving the signs. To ensure that the signs they are giving are accurate people have to give 5 signs consecutively. To ensure variance, the group will follow the above step for four days. First rule ensures that the subjects attain a minimum level of familiarity with the system. Second rule is there for assurance that the sign taken form the subjects are identical to one another. However, this raises another problem. If a task is done repetitively, the subject will get good at it and the samples will become too much similar. We also need some variance to ensure accuracy. To balance out the consistency and variance, we apply the third rule. This rule is a safeguard for maintaining the balance. Fig. 1. JPEG version of one original signature A sample of the raw data is given below: M L L L L L L Fig. 2. Plot of the X and Y co-ordinate The first step is to scale the data to a fied range of X and Y value. We scale the data to X range of 0 to 1 and Y range of 0 to 1. Figure 3 shows the same sample plotted after scaling.
3 Fig. 3. Plotted after scaling From the plotted figures, the sign is upside down. This is because the X-Y plane for most display units (including mobile devices) are flipped over the X-ais. Net, we then reflect the points to make the signature straight. Figure 4 shows the signature after reflection. Fig. 6. Signature after rotation Finally, we rotated the sign to make every sample rotational invariant. Figure 6 shows the sample after we rotated it using the line that passes through (0,0) and the center of mass point. However, rotating the signs didn t help out as much as epected. Therefore, we removed rotational variance at the end by changing out string generating algorithm. C. Methods of String Generation To generate string from signatures, we needed to fashion algorithms of our own which could take the raw signature data and produced a string. We then used approimate string matching algorithms to calculate the similarity of the string. We put together multiple algorithms which could produce a string from the raw signature data. For each new algorithm, we eliminated some of the short falls of the old ones. We named the algorithms to the way they work. Fig. 4. Signature after reflection We then translated the sign so the first point lied on (0,0).This helps generating the string because the origin of all samples become the same. Figure 5 shows the plotted signature after translation. 1) Frequency String Method: For this method, we divided the XY plane into grid and started counting the points from (0,0). For each grid cell, the algorithm counts the number of X and the number of Y that falls into the grid. Therefore, the algorithm basically counts the frequency of X and Yin the signature for each grid. To illustrate how the algorithm works, consider figure 7(a) and table I. TABLE I :FREQUENCY STRING GENERATION STEPS Point No -counter y-counter string X X4Y X4Y7X X4Y7X6Y X4Y7X6Y6X4Y1 Each time the counter is reset, the previous value is appended to the generated string. Fig. 5. Plotted signature after translation 2) Angle String Method: The Angle String method uses the angles that are made by the line of two consecutive points of a signature path and the -ais. Figure 7(b) shows two such angles. This information is appended to the string along with
4 the type of the point. Currently mobile devices 1 can capture three types of points. The points that are registered by the device when the pen is hovering over the screen, the first point registered when the pen touches the screen after hovering and the consecutive point that is registered when the pen is touching the screen. The types are hover, move and line. An eample of the string that this method generate is H45M45L3L20. Here the letters H, M, and L represents the type of the point. i.e. hover, move, and line respectively. H45 means that the current point is of type hover and the line through this point and the point after it creates a 45 degree angle with the -ais. Just like the previous method this method iterates through all the signature path points and generates the string accordingly. always be zero. One drawback of this method is that it only calculates the value of deviation. It does not state which way from the original path did the deviation occurred. To capture or calculate this, a modified version of Side Angle method is constructed. This method is named Rotation Invariant Side Angle String Method. The method is called rotation invariant because rotating the points will not affect the outcome of this method. It considers the sign as a path which starts at the first registered point and ends at the last registered point. It takes three points A,B, and C, where B is the current point, A is the previous point, and C is the net point in the path and then calculates whether the path turns left or right at point B. Consider the figure 7(d). If we draw a line from point A to point B, then this method calculates which side of the line AB point C is on. To calculate the side of the point C, this method uses the equation 1. R B A C A y B A y C A (1) y y If R is zero, then C lies on the same line. If R is negative, C lies on the right side, and for positive R, C lies on the left side. Calculation of the deviation is done using equation 2. This gives the value of the angle LABC (figure 2(d)). The deviation angle is 180 -LABC. ABC cos 1 2 ab bc 2 2 ac 2 ab bc (2) Fig. 7. Calculating Frequency String 3) Side Angle String Method: Just like Angle String method, Side Angle String method works with angles and point type. However, the angle this method works with is the eternal angle made by the triangle of three consecutive points on the signature path. If the current point is n, then the angle that would be associated with it is the supplementary angle to Ln(n + 1)(n + 2). Such an angle is shown in figure 7(c). The point 1 to 5 are points that has been registered by the mobile device. The method iterates through these points and calculates the side angle string. According to the figure mentioned just now, when the method is at point 2, it calculates the point that is supplementary to the angle L123 or the eternal angle of the triangle Δ123 created at point 2 which lies on the line that goes through point 1 and point 2. An eample of the string that this method generate is H45M45L3L20. If signature is considered as a path, then Side Angle method calculates how much the net point deviates from the current path. If the sign was a straight line, then the deviation will 1 This information is verified only for Android OS based mobile devices Here, ab is Euclidean distance of A and B, bc is Euclidean distance of B and C, and ac is Euclidean distance of A and C. When generating sign string, the modified version also considers the direction of the path. The method first appends the current points type to the string, then the direction of the net point, and finally the deviation angle. An eample of the generated string is HL4OMR35LLI. Since modern smart phones have high resolution screen, they can register lot of points during the capturing of sign. Therefore, the string generated for signs using any of the methods presented above becomes very large. Comparing the edit distance of such large strings is very costly. Hence we further modified the Rotation Invariant Side Angle String. In this version, we reduced the number of points in the signature path by method of quantization and then generated the string using Rotation Invariant Side Angle String. We named this version Reduced Rotation Invariant Side Angle String. Compared to the other strings, the strings generated from this are much smaller in length which reduces the cost of running the string comparison. D. Authentication We generated string of each sample for every subject. After then, we calculated the edit distance for each subject. That is, we compared every sign of on subject with each other and found out the average edit distance of the samples. For a signature of this person to be authentic, it has to have a score which is close to the average score of the sample signatures. It
5 means that we need a minimum and maimum score for each subject. To calculate the minimum and maimum value, we first calculated the mean value λ. We then calculated the standard deviation δ. So the minimum value is λ- δ and the maimum value is λ + δ. Figure 8 shows a bar graph of the minimum and maimum score for each subjects reference signature. Send the string to server for verification. Receive verification message from server. Display the verification message to user. Figure 10 shows the software architecture of MSign. Fig. 8. Minimum and Maimum Scores of Sample Fig. 10. Client Software Architecture IV. SYSTEM ARCHITECTURE Since the system will be more effectively used in a N-factor authentication system, the basic system architecture needs to be simple. This will simplify integration with other systems. The basic system level architecture is shown in Figure 9. Fig. 9. Basic System Level Architecture In Figure 9, the signature information is sent to the server using Java Script Object Notation (JSON) object over the network with REST API. The server then processes the information and also sends a reply with a JSON object. Instead of JSON, we could have used Simple Object Access Protocol (SOAP) based web service. However, use of JSON makes the system much more fleible. A. Software Architecture 1) Client Side Architecture: The client application is known as MSign. Currently, this application performs two tasks. First is to collect sample signatures, and second is to verify signatures with the help of server side application. The basic functionality of this application is to: Capture user's signature. Convert the signature into string. The client software uses Android Canvas library to capture the sign of the user. When the user is giving sign, the software also records all the points that make up the signature in an Array List. These points capture attributes such as: X-ais value Y-ais value Pressure value Tilt of pen Type of point. i.e. Move, Hover or Line. After the capturing process is completed, the array of points is used to generate the string. To be more precise, the string is generated when the user submits the sign for verification to the server. Currently, this application is also used to collect sample signature data. For a production environment, that will not be the case. For data collection, the array of points is saved on the mobile device as a tet file along with the image of the sample being saved. 2) Server Side Architecture: The server side application handles the verification request send to it from the client software. It uses the RESTful web service architecture which can be easily implemented by any software. In future, MSign client application can easily be developed for other platforms like ios, windows phone, blackberry, ubuntu mobile, firefo os etc. Figure 11 depicts the server application architecture. The server waits for clients request. When a request is received, server processes the request and generates a response. This response is then sent to the client.
6 B. Development Platform For developing the system, we have used technology and programming language as mentioned in Table II. For initial research, we used Matlab to analyse the data. However, all calculations used Java in the final product. TABLE III: TIME TAKEN FOR 1520 STRING COMPARISON Algorithm Comparison Time (Seconds) Lavenshtein 23 Damerau-Lavenshtein 20 Sift3 3 Among the three algorithms, Sift3 is the fastest. In fact, this algorithm is a lot faster than the other two. Performance of Lavenshtein and Damerau-Lavenshtein are pretty close to each other. B. System Performance The overall systems performance can be calculated by timing the whole authentication cycle. That is from the time user invoke the verification event to the time when user receives the result from the server. The performance depends on the following factors: Server's processing speed Client's processing speed Server-client connection speed/bandwidth Fig. 11. Server Software Architecture TABLE II : DEVELOPMENT PLATFORM Anyone of these can cause the system to become slow. Our current systems spec is given in table IV. With this specification the average time taken for a whole authentication cycle to complete is around quarter to half a second. Category Detail Name Server Side OS Windows 8 IDE Eclipse HTTP Server Glassfish 4.0 Language Java 7 Database SQLite Client Side Mobile Device Samsung Galay Note 2 IDE Eclipse with Android SDK Mobile OS Android & 4.3 Language Java 7 Miscellaneous Training Matlab, Java Plotting Matlab V. PERFORMANCE Server Client Network TABLE IV : SYSTEM HARDWARE SPECIFICATION Intel i3 Processor with 8GB RAM ARM quad-core processor with 2GB RAM Ad-hoc Wifi connection between server and Client It is worth mentioning that on the server side, application runs comparison for all 20 samples that are saved against a subject. This process is sequential. That means the system sequentially runs the comparison in a single thread. By making this process multi-threaded, the system can be made much faster. For a production environment with a server running on much more ram and processor with 16 or more cores, this authentication process can compare a lot more samples in much less time. A. Algorithm Performance We have scored the biometric references or sample signatures using all the string comparison algorithms mentioned in section III. During the scoring process, we also recorded the time taken by each algorithm to complete the total scoring process. Our sample had total 8 sets of reference signature strings with each containing 20 signature strings. Each string was compared with the other 19 string of it s respective set. For each run, the system did 20 C 2 * 8 or 1520 comparisons. Table III shows the amount of time taken to perform 1520 comparisons for each algorithm. VI. RESULT& ANALYSIS In section III-D we have already discussed how the minimum and maimum scores are calculated. To calculate the correctness of the system, we asked the subject to give 5 signatures consecutively for verification. When a user gives a signature for verification, MSign application generates the string from the raw data and sends it to the server for verification directly. Table V shows the accuracy of those 5 signatures for each subject along with minimum score and maimum score. The results show that accuracy of the system is very poor.
7 The overall accuracy is about 2.5%. This means that our system is too conservative. To increase accuracy, we need to make the system less conservative. To do so, we need to increase the min-ma score band. We did it by doubling the value of standard deviation δ. The min and ma score formula becomes λ- 2δ and λ+ 2δ respectively. TABLE V:ACCURACY OF VERIFICATION for δ Sub. No Min-Score Ma-Score Accuracy % % % % % % % % When we calculated the accuracy of the system for 2-sigma, it was much higher. Table VI shows the accuracy for each subject. TABLE VI: ACCURACY OF VERIFICATION for 2δ Sub. No Min-Score Ma-Score Accuracy % % % % % % % % For 2-sigma calculation, the overall accuracy of the system became 45%. If we go to 3-sigma, the accuracy of the system becomes 100%. Figure 12 shows how accuracy increases if the value of sigma increases. When sigma reaches 3, accuracy becomes almost 100%. VII. CONCLUSION & FUTURE WORKS Our mobile based authentication system can be considered as a complete solution for multi-factor authentication. However, the accuracy of the system is still in rudimentary stage. In future, we would like to work on increasing the systems accuracy so that it can perform at its best even in 1-sigma range. To increase the accuracy, we can include more features in the biometric reference string. We can even look into creating a new method for generating the strings. The string matching algorithm is another area that can be eplored. By investigating other string algorithms, we may find one that can outperform the edit distance algorithms which we have used in our system. REFERENCES [1] A Brief History of Authentication, (2014). CertiVo. Available from [2] N. Forhad, B. Poon, M A. Amin and H. Yan. Online Signature Verification for Multi- modal Authentication using Smart Phone. Lecture Notes in Engineering and Computer Science: Proceedings of the International MultiConference of Engineers and Computer Scientists 2015, IMECS 2015, March, 2015, Hong Kong, pp [3] M. Beton, Y. Marie and C. Rosenberger (2013). Biometric Secret Path for Mobile User Authentication: A Preliminary Study. [4] M. Martinez-Diaz, J. Fierrez, J. Galbally and J. Ortega-Garcia (2008).Towards Mobile Authentication Using Dynamic Signature Verification: Useful Features and Performance Evaluation. [5] L. L. Lee, T. Berger and E. Aviczer. Reliable on-line human signature Verification systems. IEEE Trans. on Pattern Analysis and Machine Intelligence, I 8(6): , [6] J. Richiardi, H. Ketabdar and A. Drygajlo. Local and global feature selection for on-line signature verification. In Proc. ICDAR, Seoul, Korea, August-September [7] J. Fierrez-Aguilar, L. Nanni, J. Lopez-Penalba, J. Ortega-Garcia and D. Maltoni. An on-line signature verification system based on fusion of local and global information. In Proc. AVBPA, pages , Springer LNCS, [8] A. Kholmatov and B. Yanikoglu. Identity authentication using improved online signature verification method. Pattern Recognition Letters, 26(15): , [9] J. Fierrez, D. Ramos-Castro, J. Ortega-Garcia and J. Gonzalez-Rodriguez. HMM-based on-line signature verification : feature etraction and signature modeling. Pattern Recognition Letters, 28(16): , [10] L. Allison. Dynamic Programming Algorithm for Edit Distance. Available from Fig. 12. Sigma vs. Accuracy Curve
Efficient on-line Signature Verification System
International Journal of Engineering & Technology IJET-IJENS Vol:10 No:04 42 Efficient on-line Signature Verification System Dr. S.A Daramola 1 and Prof. T.S Ibiyemi 2 1 Department of Electrical and Information
A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APPLICATION
A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APPLICATION Shermin Sultana 1, Asma Enayet 1 and Ishrat Jahan Mouri 1 1 Department of Computer Science and Engineering, Stamford
Framework for Biometric Enabled Unified Core Banking
Proc. of Int. Conf. on Advances in Computer Science and Application Framework for Biometric Enabled Unified Core Banking Manohar M, R Dinesh and Prabhanjan S Research Candidate, Research Supervisor, Faculty
Biometric Authentication using Online Signatures
Biometric Authentication using Online Signatures Alisher Kholmatov and Berrin Yanikoglu [email protected], [email protected] http://fens.sabanciuniv.edu Sabanci University, Tuzla, Istanbul,
Middleware- Driven Mobile Applications
Middleware- Driven Mobile Applications A motwin White Paper When Launching New Mobile Services, Middleware Offers the Fastest, Most Flexible Development Path for Sophisticated Apps 1 Executive Summary
Roots of equation fx are the values of x which satisfy the above expression. Also referred to as the zeros of an equation
LECTURE 20 SOLVING FOR ROOTS OF NONLINEAR EQUATIONS Consider the equation f = 0 Roots of equation f are the values of which satisfy the above epression. Also referred to as the zeros of an equation f()
The Implementation of Face Security for Authentication Implemented on Mobile Phone
The Implementation of Face Security for Authentication Implemented on Mobile Phone Emir Kremić *, Abdulhamit Subaşi * * Faculty of Engineering and Information Technology, International Burch University,
IDL. Get the answers you need from your data. IDL
Get the answers you need from your data. IDL is the preferred computing environment for understanding complex data through interactive visualization and analysis. IDL Powerful visualization. Interactive
DESIGN OF DIGITAL SIGNATURE VERIFICATION ALGORITHM USING RELATIVE SLOPE METHOD
DESIGN OF DIGITAL SIGNATURE VERIFICATION ALGORITHM USING RELATIVE SLOPE METHOD P.N.Ganorkar 1, Kalyani Pendke 2 1 Mtech, 4 th Sem, Rajiv Gandhi College of Engineering and Research, R.T.M.N.U Nagpur (Maharashtra),
Signature Region of Interest using Auto cropping
ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 1 Signature Region of Interest using Auto cropping Bassam Al-Mahadeen 1, Mokhled S. AlTarawneh 2 and Islam H. AlTarawneh 2 1 Math. And Computer Department,
CS231M Project Report - Automated Real-Time Face Tracking and Blending
CS231M Project Report - Automated Real-Time Face Tracking and Blending Steven Lee, [email protected] June 6, 2015 1 Introduction Summary statement: The goal of this project is to create an Android
Distributed Framework for Data Mining As a Service on Private Cloud
RESEARCH ARTICLE OPEN ACCESS Distributed Framework for Data Mining As a Service on Private Cloud Shraddha Masih *, Sanjay Tanwani** *Research Scholar & Associate Professor, School of Computer Science &
Design of 'Dr. on Click' Android Application
Design of 'Dr. on Click' Android Application Thakor Swapnali S. 1, Patil Nayana Y. 2, Parikh Shubham A. 3, Thorat Pooja K. 4 B.E, Dept. of Computer, SRES COE, Kopargoan, India 1 B.E, Dept. of Computer,
Support Vector Machines for Dynamic Biometric Handwriting Classification
Support Vector Machines for Dynamic Biometric Handwriting Classification Tobias Scheidat, Marcus Leich, Mark Alexander, and Claus Vielhauer Abstract Biometric user authentication is a recent topic in the
Securing Electronic Medical Records Using Biometric Authentication
Securing Electronic Medical Records Using Biometric Authentication Stephen Krawczyk and Anil K. Jain Michigan State University, East Lansing MI 48823, USA {krawcz10,jain}@cse.msu.edu Abstract. Ensuring
Tutorial on Client-Server Communications
Tutorial on Client-Server Communications EE368/CS232 Digital Image Processing, Spring 2015 Version for Your Personal Computer Introduction In this tutorial, we will learn how to set up client-server communication
Multimodal Biometric Recognition Security System
Multimodal Biometric Recognition Security System Anju.M.I, G.Sheeba, G.Sivakami, Monica.J, Savithri.M Department of ECE, New Prince Shri Bhavani College of Engg. & Tech., Chennai, India ABSTRACT: Security
ECE 533 Project Report Ashish Dhawan Aditi R. Ganesan
Handwritten Signature Verification ECE 533 Project Report by Ashish Dhawan Aditi R. Ganesan Contents 1. Abstract 3. 2. Introduction 4. 3. Approach 6. 4. Pre-processing 8. 5. Feature Extraction 9. 6. Verification
Mobile Device and Technology Characteristics Impact on Mobile Application Testing
13 Mobile Device and Technology Characteristics Impact on Mobile Application Testing TINA SCHWEIGHOFER AND MARJAN HERIČKO, University of Maribor Mobile technologies have a significant impact on processes
EM Clustering Approach for Multi-Dimensional Analysis of Big Data Set
EM Clustering Approach for Multi-Dimensional Analysis of Big Data Set Amhmed A. Bhih School of Electrical and Electronic Engineering Princy Johnson School of Electrical and Electronic Engineering Martin
International Journal of Advanced Information in Arts, Science & Management Vol.2, No.2, December 2014
Efficient Attendance Management System Using Face Detection and Recognition Arun.A.V, Bhatath.S, Chethan.N, Manmohan.C.M, Hamsaveni M Department of Computer Science and Engineering, Vidya Vardhaka College
ARM7 Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology
ARM7 Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology Khatmode Ranjit P 1, Kulkarni Ramchandra V 2, Ghodke Bharat S 3, Prof. P. P. Chitte 4, Prof. Anap S. D 5 1 Student
Testing Intelligent Device Communications in a Distributed System
Testing Intelligent Device Communications in a Distributed System David Goughnour (Triangle MicroWorks), Joe Stevens (Triangle MicroWorks) [email protected] United States Smart Grid systems
Monitoring Software using Sun Spots. Corey Andalora February 19, 2008
Monitoring Software using Sun Spots Corey Andalora February 19, 2008 Abstract Sun has developed small devices named Spots designed to provide developers familiar with the Java programming language a platform
Advance Human Computer Interaction Using Air Signature
International Journal of Emerging Engineering Research and Technology Volume 2, Issue 7, October 2014, PP 119-126 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) Advance Human Computer Interaction Using
FREE VOICE CALLING IN WIFI CAMPUS NETWORK USING ANDROID
FREE VOICE CALLING IN WIFI CAMPUS NETWORK ABSTRACT: USING ANDROID The purpose of this research is to design and implement a telephony program that uses WIFI in p2p (Peer-to-Peer) or WLAN (Wireless Local
Securing Electronic Medical Records using Biometric Authentication
Securing Electronic Medical Records using Biometric Authentication Stephen Krawczyk and Anil K. Jain Michigan State University, East Lansing MI 48823, USA, [email protected], [email protected] Abstract.
Developing Applications for ios
Developing Applications for ios Lecture 1: Mobile Applications Development Radu Ionescu [email protected] Faculty of Mathematics and Computer Science University of Bucharest Content Key concepts
User Feedback Based Mobile Camera Application Development
User Feedback Based Mobile Camera Application Development Aunnoy K Mutasim, Rakibul Alam, Bruce Poon, M Ashraful Amin Abstract - This paper presents a study about consumers requirements of mobile applications.
DATA MINING TOOL FOR INTEGRATED COMPLAINT MANAGEMENT SYSTEM WEKA 3.6.7
DATA MINING TOOL FOR INTEGRATED COMPLAINT MANAGEMENT SYSTEM WEKA 3.6.7 UNDER THE GUIDANCE Dr. N.P. DHAVALE, DGM, INFINET Department SUBMITTED TO INSTITUTE FOR DEVELOPMENT AND RESEARCH IN BANKING TECHNOLOGY
Development of Integrated Management System based on Mobile and Cloud service for preventing various dangerous situations
Development of Integrated Management System based on Mobile and Cloud service for preventing various dangerous situations Ryu HyunKi, Moon ChangSoo, Yeo ChangSub, and Lee HaengSuk Abstract In this paper,
Smart Home Security System Based on Microcontroller Using Internet and Android Smartphone
International Conference on Materials, Electronics & Information Engineering, ICMEIE-205 05-06 June, 205, Faculty of Engineering, University of Rajshahi, Bangladesh www.ru.ac.bd/icmeie205/proceedings/
APPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK
APPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK John T Lounsbury Vice President Professional Services, Asia Pacific INTEGRALIS Session ID: MBS-W01 Session Classification: Advanced
Automated Model Based Testing for an Web Applications
Automated Model Based Testing for an Web Applications Agasarpa Mounica, Lokanadham Naidu Vadlamudi Abstract- As the development of web applications plays a major role in our day-to-day life. Modeling the
Online Student Attendance Management System using Android
Online Student Attendance Management System using Android ABSTRACT: We have seen over the years that the process of manual attendance has been carried outacross almost all educational institutions. The
Hitachi ID Password Manager Telephony Integration
Hitachi ID Password Manager Telephony Integration 2015 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Introduction 1 2 Functional integration 2 2.1 Self-service password reset....................................
Bangladesh Voter Registration Duplicate Search System Implemented by the Bangladesh Army and Dohatec Based on MegaMatcher Technology
MegaMattcher g Ma Case a Sttudy Bangladesh Voter Registration Duplicate Search System Implemented by the Bangladesh Army and Dohatec Based on MegaMatcher Technology Bangladesh selected MegaMatcher multi-biometric
Introduction to Android
Introduction to Android Poll How many have an Android phone? How many have downloaded & installed the Android SDK? How many have developed an Android application? How many have deployed an Android application
Summer Internship 2013 Group No.4-Enhancement of JMeter Week 1-Report-1 27/5/2013 Naman Choudhary
Summer Internship 2013 Group No.4-Enhancement of JMeter Week 1-Report-1 27/5/2013 Naman Choudhary For the first week I was given two papers to study. The first one was Web Service Testing Tools: A Comparative
ENHANCING ATM SECURITY USING FINGERPRINT AND GSM TECHNOLOGY
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
Glossary of Key Terms
and s Branch Glossary of Key Terms The terms and definitions listed in this glossary are used throughout the s Package to define key terms in the context of. Access Control Access The processes by which
Path Tracking for a Miniature Robot
Path Tracking for a Miniature Robot By Martin Lundgren Excerpt from Master s thesis 003 Supervisor: Thomas Hellström Department of Computing Science Umeå University Sweden 1 Path Tracking Path tracking
siftservice.com - Turning a Computer Vision algorithm into a World Wide Web Service
siftservice.com - Turning a Computer Vision algorithm into a World Wide Web Service Ahmad Pahlavan Tafti 1, Hamid Hassannia 2, and Zeyun Yu 1 1 Department of Computer Science, University of Wisconsin -Milwaukee,
Applying Cryptography as a Service to Mobile Applications
Applying Cryptography as a Service to Mobile Applications SESSION ID: CSV-F02 Peter Robinson Senior Engineering Manager RSA, The Security Division of EMC Introduction This presentation proposes a Cryptography
Polynomial Degree and Finite Differences
CONDENSED LESSON 7.1 Polynomial Degree and Finite Differences In this lesson you will learn the terminology associated with polynomials use the finite differences method to determine the degree of a polynomial
Multifactor Graphical Password Authentication System using Sound Signature and Handheld Device
Multifactor Graphical Password Authentication System using Sound Signature and Handheld Device Jyoti Rao *1,Kishan Mistry #2, Bhumika Mistry #3, Divya Malviya #4, Devesh Gudway #5 # Student & Department
Location Based Online Ticket Application Abhishek Arware, Sonal Dumbare, Sanket Saple, Bushra Shaikh
Location Based Online Ticket Application Abhishek Arware, Sonal Dumbare, Sanket Saple, Bushra Shaikh Abstract one of the biggest challenges in the current ticketing facility is QUEUE while buying our suburban
Simultaneous Gamma Correction and Registration in the Frequency Domain
Simultaneous Gamma Correction and Registration in the Frequency Domain Alexander Wong [email protected] William Bishop [email protected] Department of Electrical and Computer Engineering University
Microcontroller Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology
Microcontroller Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology Bharath K M, Rohit C V Student of B.E Electronics and Communication Coorg Institute of Technology,
DeuceScan: Deuce-Based Fast Handoff Scheme in IEEE 802.11 Wireless Networks
: Deuce-Based Fast Handoff Scheme in IEEE 82.11 Wireless Networks Yuh-Shyan Chen, Chung-Kai Chen, and Ming-Chin Chuang Department of Computer Science and Information Engineering National Chung Cheng University,
TECHNOLOGY WHITEPAPER
TECHNOLOGY WHITEPAPER ArmorVox10 Targets Call Center Fraud How to provide fast voice-file cross-matching to detect and track fraud in call centers. AURAYA SYSTEMS One Tara Boulevard Nashua, New Hampshire
MOBILE TECHNOLOGIES AND DISTANCE EDUCATION
MOBILE TECHNOLOGIES AND DISTANCE EDUCATION Rostislav Fojtik, Hashim Habiballa Abstract: Rapid advancement of information and communication technologies enables to produce more mobile devices. Most of distance
Distributed Systems. Security concepts; Cryptographic algorithms; Digital signatures; Authentication; Secure Sockets
I. Introduction II. Fundamental Concepts of Architecture models; network architectures: OSI, Internet and LANs; interprocess communication III. Time and Global States Clocks and concepts of time; Event
Smart Shopping- An Android Based Shopping Application
Smart Shopping- An Android Based Shopping Application 1 Adarsh Borkar, 2 Madhura Ansingkar, 3 Monali Khobragade, 4 Pooja Nashikkar, 5 Arti Raut 1,2,3,4 Department of Computer Science and Engineering, 5
15.062 Data Mining: Algorithms and Applications Matrix Math Review
.6 Data Mining: Algorithms and Applications Matrix Math Review The purpose of this document is to give a brief review of selected linear algebra concepts that will be useful for the course and to develop
Mobile Operating Systems. Week I
Mobile Operating Systems Week I Overview Introduction Mobile Operating System Structure Mobile Operating System Platforms Java ME Platform Palm OS Symbian OS Linux OS Windows Mobile OS BlackBerry OS iphone
Internet Banking Two-Factor Authentication using Smartphones
Internet Banking Two-Factor Authentication using Smartphones Costin Andrei SOARE IT&C Security Master Department of Economic Informatics and Cybernetics Bucharest University of Economic Studies, Romania
Published International Standards Developed by ISO/IEC JTC 1/SC 37 - Biometrics
Published International Standards Developed by ISO/IEC JTC 1/SC 37 - Biometrics Revised October 25, 2007 These standards can be obtained (for a fee) at ANSI s estandards Store: http://webstore.ansi.org/
How to Design and Create Your Own Custom Ext Rep
Combinatorial Block Designs 2009-04-15 Outline Project Intro External Representation Design Database System Deployment System Overview Conclusions 1. Since the project is a specific application in Combinatorial
Single Sign-On Secure Authentication Password Mechanism
Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,
Pattern-Aided Regression Modelling and Prediction Model Analysis
San Jose State University SJSU ScholarWorks Master's Projects Master's Theses and Graduate Research Fall 2015 Pattern-Aided Regression Modelling and Prediction Model Analysis Naresh Avva Follow this and
Android Ros Application
Android Ros Application Advanced Practical course : Sensor-enabled Intelligent Environments 2011/2012 Presentation by: Rim Zahir Supervisor: Dejan Pangercic SIFT Matching Objects Android Camera Topic :
RevoScaleR Speed and Scalability
EXECUTIVE WHITE PAPER RevoScaleR Speed and Scalability By Lee Edlefsen Ph.D., Chief Scientist, Revolution Analytics Abstract RevoScaleR, the Big Data predictive analytics library included with Revolution
Detection and mitigation of Web Services Attacks using Markov Model
Detection and mitigation of Web Services Attacks using Markov Model Vivek Relan [email protected] Bhushan Sonawane [email protected] Department of Computer Science and Engineering, University of Maryland,
A System for Capturing High Resolution Images
A System for Capturing High Resolution Images G.Voyatzis, G.Angelopoulos, A.Bors and I.Pitas Department of Informatics University of Thessaloniki BOX 451, 54006 Thessaloniki GREECE e-mail: [email protected]
10.1. Solving Quadratic Equations. Investigation: Rocket Science CONDENSED
CONDENSED L E S S O N 10.1 Solving Quadratic Equations In this lesson you will look at quadratic functions that model projectile motion use tables and graphs to approimate solutions to quadratic equations
Implementing Mobile Thin client Architecture For Enterprise Application
Research Paper Implementing Mobile Thin client Architecture For Enterprise Paper ID IJIFR/ V2/ E1/ 037 Page No 131-136 Subject Area Information Technology Key Words JQuery Mobile, JQuery Ajax, REST, JSON
THREE DIMENSIONAL GEOMETRY
Chapter 8 THREE DIMENSIONAL GEOMETRY 8.1 Introduction In this chapter we present a vector algebra approach to three dimensional geometry. The aim is to present standard properties of lines and planes,
Android based Secured Vehicle Key Finder System
International OPEN ACCESS Journal Of Modern Engineering Research (IJMER) Android based Secured Vehicle Key Finder System Sindhoori S. 1, Dr. N. Sathish Kumar 2 *(M.E. Embedded System Technologies, Sri
A Mobile Application for Bus Information System and Location Tracking using Client-Server Technology
A Mobile Application for Bus Information System and Location Tracking using Client-Server Technology Yasha Sardey 1, Pranoti Deshmukh 2, Pooja Mandlik 3, Saurabh Shelar 4, Minal Nerkar 5 1,2,3,4,5 AISSMS
A Novel Approach Of Mobile Based Student Attendance Tracking System Using Android Application
A Novel Approach Of Mobile Based Student Attendance Tracking System Using Android Application K. Akhila 1 B. Prathyusha 2 M. PavanKumar 3 M. Amrutha 4 Research Scholar Research Scholar Research Scholar
Cross Platform Applications with IBM Worklight
IJCSNS International Journal of Computer Science and Network Security, VOL.15 No.11, November 2015 101 Cross Platform Applications with IBM Worklight P.S.S.Vara Prasad and Mrs.S.Durga Devi Dept. of IT
A Cost Effective GPS-GPRS Based Women Tracking System and Women Safety Application using Android Mobile
A Cost Effective GPS-GPRS Based Women Tracking System and Women Safety Application using Android Mobile Devendra Thorat, Kalpesh Dhumal, Aniket Sadaphule, Vikas Arade B.E Computer Engineering, Navsahyadri
Application-Specific Biometric Templates
Application-Specific Biometric s Michael Braithwaite, Ulf Cahn von Seelen, James Cambier, John Daugman, Randy Glass, Russ Moore, Ian Scott, Iridian Technologies Inc. Introduction Biometric technologies
Research and Design of Universal and Open Software Development Platform for Digital Home
Research and Design of Universal and Open Software Development Platform for Digital Home CaiFeng Cao School of Computer Wuyi University, Jiangmen 529020, China [email protected] Abstract. With the development
Identifying second degree equations
Chapter 7 Identifing second degree equations 7.1 The eigenvalue method In this section we appl eigenvalue methods to determine the geometrical nature of the second degree equation a 2 + 2h + b 2 + 2g +
Face Recognition in Low-resolution Images by Using Local Zernike Moments
Proceedings of the International Conference on Machine Vision and Machine Learning Prague, Czech Republic, August14-15, 014 Paper No. 15 Face Recognition in Low-resolution Images by Using Local Zernie
ABSTRACT I. INTRODUCTION
Mobile Backup Web Application Using Image Processing Authentication 1 Walse Reshma S. 2 Khemnar Archana M. 3 Padir Maya S. 4 Prof.K.P.Somase Department Of Computer Engineering, Jcoe(Kuran),Tal:Junnar,Dist:Pune
Offloading file search operation for performance improvement of smart phones
Offloading file search operation for performance improvement of smart phones Ashutosh Jain [email protected] Vigya Sharma [email protected] Shehbaz Jaffer [email protected] Kolin Paul
BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES
BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES 123 CHAPTER 7 BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES 7.1 Introduction Even though using SVM presents
Student Attendance Through Mobile Devices
Student Attendance Through Mobile Devices Anurag Rastogi Kirti Gupta Department of Computer Science and Engineering National Institute of Technology Rourkela Rourkela-769 008, Odisha, India Student Attendance
Remote Desktop Access through Android Mobiles and Android Mobiles Access through Web Browser
Remote Desktop Access through Android Mobiles and Android Mobiles Access through Web Browser 1 Karan Sandeep Bhandari, 2 Vishnu Baliram Mandole, 3 Akash Dattatray Munde, 4 Sachin B. Takmare Bharati Vidyapeeth
Mobility Introduction Android. Duration 16 Working days Start Date 1 st Oct 2013
Mobility Introduction Android Duration 16 Working days Start Date 1 st Oct 2013 Day 1 1. Introduction to Mobility 1.1. Mobility Paradigm 1.2. Desktop to Mobile 1.3. Evolution of the Mobile 1.4. Smart phone
The University of the State of New York REGENTS HIGH SCHOOL EXAMINATION MATHEMATICS B. Thursday, January 29, 2004 9:15 a.m. to 12:15 p.m.
The University of the State of New York REGENTS HIGH SCHOOL EXAMINATION MATHEMATICS B Thursday, January 9, 004 9:15 a.m. to 1:15 p.m., only Print Your Name: Print Your School s Name: Print your name and
FURTHER VECTORS (MEI)
Mathematics Revision Guides Further Vectors (MEI) (column notation) Page of MK HOME TUITION Mathematics Revision Guides Level: AS / A Level - MEI OCR MEI: C FURTHER VECTORS (MEI) Version : Date: -9-7 Mathematics
Role of Multi-biometrics in Usable Multi- Factor Authentication
Role of Multi-biometrics in Usable Multi- Factor Authentication Dr. Nalini K Ratha* IBM T.J. Watson Research Center Yorktown Heights, NY 10598 [email protected] *: In collaboration with colleagues from
CHAPTER 5 PREDICTIVE MODELING STUDIES TO DETERMINE THE CONVEYING VELOCITY OF PARTS ON VIBRATORY FEEDER
93 CHAPTER 5 PREDICTIVE MODELING STUDIES TO DETERMINE THE CONVEYING VELOCITY OF PARTS ON VIBRATORY FEEDER 5.1 INTRODUCTION The development of an active trap based feeder for handling brakeliners was discussed
Application of Neural Network in User Authentication for Smart Home System
Application of Neural Network in User Authentication for Smart Home System A. Joseph, D.B.L. Bong, D.A.A. Mat Abstract Security has been an important issue and concern in the smart home systems. Smart
Using Neural Networks to Create an Adaptive Character Recognition System
Using Neural Networks to Create an Adaptive Character Recognition System Alexander J. Faaborg Cornell University, Ithaca NY (May 14, 2002) Abstract A back-propagation neural network with one hidden layer
ANDROID OPERATING SYSTEM
ANDROID OPERATING SYSTEM Himanshi Grover,Devesh Agrawal IT Department, Dronacharya College Of Engg Gurgaon,Haryana,India Abstract - Android has become need rather than luxury these days. The computing
A Learning Based Method for Super-Resolution of Low Resolution Images
A Learning Based Method for Super-Resolution of Low Resolution Images Emre Ugur June 1, 2004 [email protected] Abstract The main objective of this project is the study of a learning based method
Developing Cross-platform Mobile and Web Apps
1 Developing Cross-platform Mobile and Web Apps Xiang Mao 1 and Jiannong Xin * 2 1 Department of Electrical and Computer Engineering, University of Florida 2 Institute of Food and Agricultural Sciences
A Performance Study of Load Balancing Strategies for Approximate String Matching on an MPI Heterogeneous System Environment
A Performance Study of Load Balancing Strategies for Approximate String Matching on an MPI Heterogeneous System Environment Panagiotis D. Michailidis and Konstantinos G. Margaritis Parallel and Distributed
