Performance and Security Analysis of Gait-Based User Authentication

Download Now
Provided by: University of Orleans
Topic: Security
Format: PDF
Verifying the identity of a user usually referred to as user authentication, before granting access to the services or objects is a very important step in many applications. People pass through some sorts of authentication process in their daily life. For example, to prove having access to the computer the user is required to know a password. Similarly, to be able to activate a mobile phone the owner has to know its PIN code, etc. Some user authentication techniques are based on human physiological or behavioral characteristics such as fingerprints, face, and iris and so on.
Download Now

Find By Topic