Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "Verification" wg kryterium: Temat


Wyświetlanie 1-10 z 10
Tytuł:
Offline signature identification and verification using noniterative shape context algorithm
Autorzy:
Adamski, M.
Saeed, K.
Powiązania:
https://bibliotekanauki.pl/articles/333019.pdf
Data publikacji:
2009
Wydawca:
Uniwersytet Śląski. Wydział Informatyki i Nauki o Materiałach. Instytut Informatyki. Zakład Systemów Komputerowych
Tematy:
weryfikacja podpisu
offline signature verification (SV)
signature identification
shape context method
Opis:
The paper presents experimental results on offline signature identification and verification. At the first stage of the presented system, the binary image of the signature undergoes skeletonization process using KMM algorithm to have a thinned, one pixel-wide line, to which a further reduction is applied. For each thinned signature image a fixed number of points comprising the skeleton line are selected. The recognition process is based on comparing the reference signatures with the questioned samples using distance measure computed by means of Shape Context algorithm. The experiments were carried out using a database containing signatures of 20 individuals. For the verification process random forgeries were used to asses the system error. The main advantage of the presented approach lies in utilizing only one reference signature for both identification and verification tasks, whereas the achieved results are comparable with respect to the systems that use several training samples per subject.
Źródło:
Journal of Medical Informatics & Technologies; 2009, 13; 47-52
1642-6037
Pojawia się w:
Journal of Medical Informatics & Technologies
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Offline signature verification based on shape contexts using shared and user-specific thresholds
Autorzy:
Adamski, M.
Saeed, K.
Powiązania:
https://bibliotekanauki.pl/articles/333777.pdf
Data publikacji:
2013
Wydawca:
Uniwersytet Śląski. Wydział Informatyki i Nauki o Materiałach. Instytut Informatyki. Zakład Systemów Komputerowych
Tematy:
offline signature verification (SV)
shape contexts
weryfikacja podpisu w trybie offline
Opis:
In this paper we present a system for offline signature verification based on Shape Context Descriptors. The system input are binarized images of handwritten signatures from GPDS database available for non-commercial research. During preprocessing each signature image is thinned using KMM algorithm in order to obtain 1-pixel wide skeleton. The feature vector is built from Shape Context Descriptors computed for selected points on skeletonized signature line. The verification process is based on the distance measure that uses Shape Context Descriptors. The presented system is evaluated using random and skilled forgeries with shared and user-specific thresholds.
Źródło:
Journal of Medical Informatics & Technologies; 2013, 22; 195-201
1642-6037
Pojawia się w:
Journal of Medical Informatics & Technologies
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Signature verification using contextual information enhancement and dynamic programming
Autorzy:
Adamski, M.
Saeed, K.
Powiązania:
https://bibliotekanauki.pl/articles/332874.pdf
Data publikacji:
2008
Wydawca:
Uniwersytet Śląski. Wydział Informatyki i Nauki o Materiałach. Instytut Informatyki. Zakład Systemów Komputerowych
Tematy:
weryfikacja podpisu online
programowanie dynamiczne
online signature verification
feature context
dynamic programming
Opis:
This paper presents the results of experiments on online signature verification. Information gathered during the signing process like pen trajectory, pressure, elevation and altitude is utilized to prove the authenticity of a signature or to detect a forgery attempt. Signature verification task is carried out by means of the Template Matching approach. The presented method is based on the signature description in terms of its local features and their relations. The comparison of features in the reference and tested signatures is conducted using Dynamic Time Warping technique.
Źródło:
Journal of Medical Informatics & Technologies; 2008, 12; 35-40
1642-6037
Pojawia się w:
Journal of Medical Informatics & Technologies
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The prediction of the low fetal birth weight based on quantitative description of cardiotocographic signals
Autorzy:
Czabański, R.
Jeżewski, M.
Wróbel, J.
Kupka, T.
Łęski, J.
Jeżewski, J.
Powiązania:
https://bibliotekanauki.pl/articles/333495.pdf
Data publikacji:
2008
Wydawca:
Uniwersytet Śląski. Wydział Informatyki i Nauki o Materiałach. Instytut Informatyki. Zakład Systemów Komputerowych
Tematy:
weryfikacja podpisu online
programowanie dynamiczne
online signature verification
feature context
dynamic programming
Opis:
Cardiotocography (CTG) is a routine method of fetal condition assessment used in modern obstetrics. It is a biophysical method based on simultaneous recording and analysis of activity of fetal heart, fetal movements and maternal uterine contractions. The fetal condition is diagnosed on the basis of printed CTG trace evaluation. The correct interpretation of CTG traces from a bedside monitor is very difficult even for experienced clinicians. Therefore, computerized fetal monitoring systems are used to yield the quantitative description of the signal. However, the effective methods, aiming to support the conclusion generation, are still being searched. One of the most important features defining the state of fetal outcome is the weight of the newborn. The presented work describes an application of the Artificial Neural Network Based on Logical Interpretation of fuzzy if-then Rules (ANBLIR) to evaluate the risk of the low birth weight using a set of parameters quantitatively describing the CTG traces. The obtained results confirm that the neuro-fuzzy based CTG classification methods are very efficient for the prediction of the fetal outcome.
Źródło:
Journal of Medical Informatics & Technologies; 2008, 12; 97-102
1642-6037
Pojawia się w:
Journal of Medical Informatics & Technologies
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Hybrid verification method based on finger-knuckle analysis and keystroke dynamics
Autorzy:
Wesolowski, T. E.
Safaverdi, H.
Doroz, R.
Wrobel, K.
Powiązania:
https://bibliotekanauki.pl/articles/333719.pdf
Data publikacji:
2017
Wydawca:
Uniwersytet Śląski. Wydział Informatyki i Nauki o Materiałach. Instytut Informatyki. Zakład Systemów Komputerowych
Tematy:
user verification
keystroke dynamics
finger-knuckle analysis
weryfikacja użytkownika
dynamika pisania na klawiaturze
analiza palców
Opis:
The increasing number of personal data leaks becomes one of the most important security issues hence the need to develop modern computer user verification methods. In the article, a potential of biometric methods fusion for continuous user verification was assessed. A hybrid approach for user verification based on fusion of keystroke dynamics and knuckle images analysis was presented. Verification is performed by a classification module where an ensemble classifier was used to verify the identity of a user. A proposed classifier works on a database which comprises of knuckle images and keyboard events for keystroke dynamics. The proposed approach was tested experimentally. The obtained results confirm that the proposed hybrid approach performs better than methods based on single biometric feature hence the introduced method can be used for increasing a protection level of computer resources against forgers and impostors. The paper presents results of preliminary research conducted to assess the potential of biometric methods fusion.
Źródło:
Journal of Medical Informatics & Technologies; 2017, 26; 26-36
1642-6037
Pojawia się w:
Journal of Medical Informatics & Technologies
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
User profiling based on multiple aspects of activity in a computer system
Autorzy:
Wesołowski, T.
Kudłacik, P.
Powiązania:
https://bibliotekanauki.pl/articles/333926.pdf
Data publikacji:
2014
Wydawca:
Uniwersytet Śląski. Wydział Informatyki i Nauki o Materiałach. Instytut Informatyki. Zakład Systemów Komputerowych
Tematy:
behavioral biometrics
user profile
intruder detection
user verification
biometria behawioralna
profil użytkownika
wykrywanie intruza
weryfikacja użytkownika
Opis:
The paper concerns behavioral biometrics, specifically issues related to the verification of the identity of computer systems users based on user profiling. The profiling method for creating a behavioral profile based on multiple aspects of user activity in a computer system is presented. The work is devoted to the analysis of user activity in environments with a graphical user interface GUI. Mouse activity, keyboard and software usage are taken into consideration. Additionally, an attempt to intrusion detection based on the proposed profiling method and statistical measures is performed. Preliminary studies show that the proposed profiling method could be useful in detecting an intruder masquerading as an authorized user of the computer system. This article presents the preliminary research and conclusions.
Źródło:
Journal of Medical Informatics & Technologies; 2014, 23; 121-130
1642-6037
Pojawia się w:
Journal of Medical Informatics & Technologies
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Data clustering for the block profile method of intruder detection
Autorzy:
Wesolowski, T.
Kudlacik, P.
Powiązania:
https://bibliotekanauki.pl/articles/333027.pdf
Data publikacji:
2013
Wydawca:
Uniwersytet Śląski. Wydział Informatyki i Nauki o Materiałach. Instytut Informatyki. Zakład Systemów Komputerowych
Tematy:
user-profiles
intruder detection
computer security
user verification
profil użytkownika
wykrywanie intruza
bezpieczeństwo komputera
weryfikacja użytkownika
Opis:
The paper concerns the problem of computer security and intrusion detection. In particular the problem of detecting the masqueraders – intruders who pretend to be authorized users of computer systems. The article presents an improvement of the block profile method of intruder detection for computer systems. As a base for the work the block profiles were taken and the clustering of the block profiles data was performed. The aim was to detect the masqueraders within the test data. The problem of computer security is particularly important in medical applications. Activities of intruder can distort the data stored in medical databases and analyzed by the medical expert systems or decision support systems and thus make it difficult to support the diagnosis of diseases. For this reason it is necessary protect the medical computer systems from unauthorized access. This article presents the preliminary research and conclusions.
Źródło:
Journal of Medical Informatics & Technologies; 2013, 22; 209-216
1642-6037
Pojawia się w:
Journal of Medical Informatics & Technologies
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Features reduction for computer user profiling based on mouse activity
Autorzy:
Palys, M.
Wesołowski, T. E.
Powiązania:
https://bibliotekanauki.pl/articles/334021.pdf
Data publikacji:
2015
Wydawca:
Uniwersytet Śląski. Wydział Informatyki i Nauki o Materiałach. Instytut Informatyki. Zakład Systemów Komputerowych
Tematy:
user profile
intruder detection
mouse activity
user verification
profil użytkownika
wykrywanie intruza
aktywność myszy
weryfikacja użytkownika
Opis:
The article is related to the computer systems security and to the problem of detecting the masqueraders, intruders who pretend to be legitimate users of computer systems, in particular. The research concerns computer user verification based on analysis of the mouse activity in computer system. The article presents an improvement of user verification method by introducing a new method of user profiling. The new user profiling method is based on the reduced number of features without the loss of information is introduced. The presented method of user profiling allows to simplify and speed up a user’s activity data analysis and is not causing the deterioration of intrusion detection. Additionally, a method of aggregating mouse activity basic events into a higher level events is described. This article presents the preliminary research and conclusions.
Źródło:
Journal of Medical Informatics & Technologies; 2015, 24; 45-51
1642-6037
Pojawia się w:
Journal of Medical Informatics & Technologies
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
User verification based on the analysis of keystrokes while using various software
Autorzy:
Wesołowski, T. E.
Porwik, P.
Powiązania:
https://bibliotekanauki.pl/articles/333083.pdf
Data publikacji:
2015
Wydawca:
Uniwersytet Śląski. Wydział Informatyki i Nauki o Materiałach. Instytut Informatyki. Zakład Systemów Komputerowych
Tematy:
keystroke analysis
free text analysis user profile
intruder detection
user verification
analiza klawiszy
analiza tekstu
wykrywanie intruza
weryfikacja użytkownika
Opis:
The article presents the new approach to a computer users verification. The research concerns an analysis of user’s continuous activity related to a keyboard used while working with various software. This type of analysis constitutes a type of free-text analysis. The presented method is based on the analysis of users activity while working with particular computer software (e.g. text editors, utilities). A method of computer user profiling is proposed and an attempt to intrusion detection based on k-NN classifier is performed. The obtained results show that the introduced method can be used in the intrusion detection and monitoring systems. Such systems are especially needed in medical facilities where sensitive data are processed.
Źródło:
Journal of Medical Informatics & Technologies; 2015, 24; 13-22
1642-6037
Pojawia się w:
Journal of Medical Informatics & Technologies
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A statistical approach for off-line signature verification (SV)
Autorzy:
Das, M.T.
Dulger, L.C.
Dulger, H.E.
Powiązania:
https://bibliotekanauki.pl/articles/332991.pdf
Data publikacji:
2009
Wydawca:
Uniwersytet Śląski. Wydział Informatyki i Nauki o Materiałach. Instytut Informatyki. Zakład Systemów Komputerowych
Tematy:
weryfikacja podpisu
sieci neuronowe
offline signature verification (SV)
particle swarm optimization (PSO)
neural networks (NN)
chi-square test
PSO-NN
Opis:
This paper includes off line Signature Verification (SV) process with test results using the proposed algorithm Particle Swarm Optimization-Neural Network (PSO-NN) together with statistical analysis, Chi-square test. The verification process is performed in four steps. Signature images are scanned (data acquisition) and image processing is applied to make images suitable for extracting features (pre-processing). Each pre-processed image is then used to extract relevant geometric parameters (feature extraction) that can distinguish signatures of different volunteers. Finally, the proposed verification algorithm is tested on the database that includes 1350 skilled and genuine signatures taken from 25 volunteers. The Chi-square test is applied to see how the signature data fits with probability test function.
Źródło:
Journal of Medical Informatics & Technologies; 2009, 13; 33-39
1642-6037
Pojawia się w:
Journal of Medical Informatics & Technologies
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-10 z 10

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies