Filters








6 Hits in 1.7 sec

Online handwriting recognition using depth sensors

Rajat Aggarwal, Sirnam Swetha, Anoop M. Namboodiri, Jayanthi Sivaswamy, C. V. Jawahar
2015 2015 13th International Conference on Document Analysis and Recognition (ICDAR)  
Our method uses an efficient fingertip tracking approach and reduces the necessity of pen-up/pen-down switching. We validate our method on two depth sensors, Kinect and Leap Motion Controller.  ...  In this work, we propose an online handwriting solution, where the data is captured with the help of depth sensors.  ...  [6] proposed KinWrite, which is a handwriting based authentication system using Kinect. Feng et al.  ... 
doi:10.1109/icdar.2015.7333924 dblp:conf/icdar/AggarwalSNSJ15 fatcat:5yeh6eqagjau5miba6mosgtoja

Wave to me

Eiji Hayashi, Manuel Maas, Jason I. Hong
2014 Proceedings of the 32nd annual ACM conference on Human factors in computing systems - CHI '14  
The system identifies users based on a two-second hand waving gesture captured by a Microsoft Kinect.  ...  We introduce a body-based identification system that leverages individual differences in body segment lengths and hand waving gesture patterns.  ...  For example, KinWrite authenticates users based on handwriting in mid-air [23] . With BroAuth, a user touched her own and her virtual partners' bodies in a sequence to authenticate [15] .  ... 
doi:10.1145/2556288.2557043 dblp:conf/chi/HayashiMH14 fatcat:5ogggfigavhz7akrdmefxk2xv4

Good vibrations: accessing 'smart' systems by touching any solid surface

Jian Liu, Chen Wang, Yingying Chen, Nitesh Saxena
2018 Biometric Technology Today  
For example, KinWrite 9 uses Kinect, a vision-based platform, to capture the user's 3D handwriting patterns for authentication.  ...  • Biometric-based systems such as fingerprints, iris patterns, retina patterns and face have clearly become prominent in achieving authentication.  ... 
doi:10.1016/s0969-4765(18)30053-5 fatcat:krzbngkn2vedlkg7mfecztixdq

TouchIn: Sightless Two-factor Authentication on Multi-touch Mobile Devices [article]

Jingchao Sun, Rui Zhang, Jinxue Zhang, Yanchao Zhang
2014 arXiv   pre-print
Existing mobile authentication techniques are often cumbersome to use and also vulnerable to shoulder-surfing and smudge attacks.  ...  TouchIn works by letting a user draw on the touchscreen with one or multiple fingers to unlock his mobile device, and the user is authenticated based on the geometric properties of his drawn curves as  ...  Moreover, Kinwrite [25] is a handwriting-based gesture authentication system, but it requires an external device like Kinect to detect 3D handwriting motions.  ... 
arXiv:1402.1216v1 fatcat:hg2onz5ytnhubltnx2m63c7b7u

IDENTIFYING SMARTPHONE USERS BASED ON SMARTWATCH DATA IDENTIFYING SMARTPHONE USERS BASED ON SMARTWATCH DATA

Sidhika Varshney, Sidhika Varshney
2017 unpublished
This thesis presents, a user identification system based on smartwatch data.  ...  Smartphones are used for all day-today critical tasks like money transfer, storing important documents and other information.  ...  Acknowledgements Neural Networks can be used to make more accurate predictions.  ... 
fatcat:2gh55qpjrzajdka77gsl67kbmy

Towards smart and secure IoT with pervasive sensing

Jian Liu
2019
We first propose to track the vital signs of both breathing rate and heart rate during sleep by using off-the-shelf WiFi without any wearable or dedicated devices.  ...  In this dissertation, I mainly study the following topics: (1) how to perform vital signs monitoring during sleep towards smart healthcare; (2) how to conduct user authentication on any solid surface for  ...  For example, KinWrite [135] uses Kinect, a vision-based platform, to capture the user's 3D handwriting patterns for authentication.  ... 
doi:10.7282/t3-k31g-sz74 fatcat:j6on3rzgtrfbbgrkqclqme77zy