Cargando…

Deep Residual Networks for User Authentication via Hand-Object Manipulations

With the ubiquity of wearable devices, various behavioural biometrics have been exploited for continuous user authentication during daily activities. However, biometric authentication using complex hand behaviours have not been sufficiently investigated. This paper presents an implicit and continuou...

Descripción completa

Detalles Bibliográficos
Autores principales: Choi, Kanghae, Ryu, Hokyoung, Kim, Jieun
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2021
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8122988/
https://www.ncbi.nlm.nih.gov/pubmed/33922833
http://dx.doi.org/10.3390/s21092981

Ejemplares similares