Auflistung nach Autor:in "Schmidt, Roman"
Gerade angezeigt 1 - 2 von 2
- Treffer pro Seite
- Sortieroptionen
Publikation Online signature verification based on string edit distance(Springer, 2019) Riesen, Kaspar; Schmidt, RomanHandwritten signatures are widely used and well-accepted biometrics for personal authentication. The accuracy of signature verification systems has significantly improved in the last decade, making it possible to rely on machines in particular cases or to support human experts. Yet, based on only few genuine references, signature verification is still a challenging task. The present paper provides a comprehensive comparison of two prominent string matching algorithms that can be readily used for signature verification. Moreover, it evaluates a recent cost model for string matching which turns out to be particularly well suited for the task of signature verification. On three benchmarking data sets, we show that this model outperforms the two standard models for string matching with statistical significance.01A - Beitrag in wissenschaftlicher ZeitschriftPublikation Sketch-based user authentication with a novel string edit distance model(IEEE, 2018) Riesen, Kaspar; Hanne, Thomas; Schmidt, RomanThe vast majority of user authentication in digital applications is based on alphanumeric passwords. Yet, due to severe problems that might arise with this approach, various efforts have been made in the last decade to replace this authentication paradigm. One candidate for the prospective paradigm shift might be found in the field of graphical passwords. The present paper introduces a novel framework for user authentication based on freehand sketches. The basic idea is that during the registration phase a user draws an arbitrary sketch in a specific drawing canvas (rather than typing a password). Registered users can then be authenticated whenever they are able to reproduce their personal sketch with sufficient precision. The major challenge of such a system is twofold. First, it has to provide a certain degree of error-tolerance such that the authentication of genuine users can be smoothly accomplished. Second, the system should detect even subtle forgeries and reject possible intruders.01A - Beitrag in wissenschaftlicher Zeitschrift