Redirigiendo al acceso original de articulo en 22 segundos...
Inicio  /  Future Internet  /  Vol: 13 Par: 9 (2021)  /  Artículo
ARTÍCULO
TITULO

User Authentication Based on Handwriting Analysis of Pen-Tablet Sensor Data Using Optimal Feature Selection Model

Nasima Begum    
Md Azim Hossain Akash    
Sayma Rahman    
Jungpil Shin    
Md Rashedul Islam and Md Ezharul Islam    

Resumen

Handwriting analysis is playing an important role in user authentication or online writer identification for more than a decade. It has a significant role in different applications such as e-security, signature biometrics, e-health, gesture analysis, diagnosis system of Parkinson?s disease, Attention-deficit/hyperactivity disorders, analysis of vulnerable people (stressed, elderly, or drugged), prediction of gender, handedness and so on. Classical authentication systems are image-based, text-dependent, and password or fingerprint-based where the former one has the risk of information leakage. Alternatively, image processing and pattern-analysis-based systems are vulnerable to camera attributes, camera frames, light effect, and the quality of the image or pattern. Thus, in this paper, we concentrate on real-time and context-free handwriting data analysis for robust user authentication systems using digital pen-tablet sensor data. Most of the state-of-the-art authentication models show suboptimal performance for improper features. This research proposed a robust and efficient user identification system using an optimal feature selection technique based on the features from the sensor?s signal of pen and tablet devices. The proposed system includes more genuine and accurate numerical data which are used for features extraction model based on both the kinematic and statistical features of individual handwritings. Sensor data of digital pen-tablet devices generate high dimensional feature vectors for user identification. However, all the features do not play equal contribution to identify a user. Hence, to find out the optimal features, we utilized a hybrid feature selection model. Extracted features are then fed to the popular machine learning (ML) algorithms to generate a nonlinear classifier through training and testing phases. The experimental result analysis shows that the proposed model achieves more accurate and satisfactory results which ensure the practicality of our system for user identification with low computational cost.

 Artículos similares

       
 
Arun Sekar Rajasekaran, Azees Maria, Fadi Al-Turjman, Chadi Altrjman and Leonardo Mostarda    
As there has been an advancement in avionic systems in recent years, the enactment of unmanned aerial vehicles (UAV) has upgraded. As compared to a single UAV system, multiple UAV systems can perform operations more inexpensively and efficiently. As a re... ver más
Revista: Drones

 
Tony Gwyn, Kaushik Roy and Mustafa Atay    
In the realm of computer security, the username/password standard is becoming increasingly antiquated. Usage of the same username and password across various accounts can leave a user open to potential vulnerabilities. Authentication methods of the futur... ver más
Revista: Future Internet

 
Yangheran Piao, Kai Ye and Xiaohui Cui    
After the General Data Protection Regulation (GDPR) was introduced, some organizations and big data companies shared data without conducting any privacy protection and compliance authentication, which endangered user data security, and were punished fina... ver más
Revista: Future Internet

 
Lorenzo Bracciale, Pierpaolo Loreti, Claudio Pisa and Alex Shahidi    
The Internet of Things offers a wide range of possibilities that can be exploited more or less explicitly for user authentication, ranging from specifically designed systems including biometric devices to environmental sensors that can be opportunistical... ver más
Revista: IoT

 
Guma Ali, Mussa Ally Dida and Anael Elikana Sam    
With the expansion of smartphone and financial technologies (FinTech), mobile money emerged to improve financial inclusion in many developing nations. The majority of the mobile money schemes used in these nations implement two-factor authentication (2FA... ver más
Revista: Future Internet