Fundamentals of sketch-based passwords : a general framework /

Saved in:
Bibliographic Details
Author / Creator:Riggan, Benjamin S., author.
Imprint:Heidelberg : Springer, 2014.
Description:1 online resource (xii, 71 pages) : illustrations (some color).
Language:English
Series:SpringerBriefs in Computer Science, 2191-5768
SpringerBriefs in computer science.
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/11091376
Hidden Bibliographic Details
Other authors / contributors:Snyder, Wesley E., author.
Wang, Cliff, author.
ISBN:9783319136295
3319136291
9783319136288
3319136283 (print)
9783319136288 (print)
Notes:Includes bibliographical references.
Online resource; title from PDF title page (SpringerLink, viewed January 28, 2015).
Summary:This SpringerBrief explores graphical password systems and examines novel drawing-based methods in terms of security, usability, and human computer-interactions. It provides a systematic approach for recognizing, comparing, and matching sketch-based passwords in the context of modern computing systems. The book offers both a security and usability analysis of the accumulative framework used for incorporating handwriting biometrics and a human computer-interaction performance analysis. The chapters offer new perspectives and experimental results regarding model uniqueness, recognition tolerance, and the human-computer interaction. The results demonstrate that biometrics reduce the equal error rate (EER) by more than 10%, and show that people are capable of accurately reproducing a sketch-based password. Fundamentals of Sketch-based Passwords: A General Framework targets computer scientists and engineers focused on computer security, biometrics, and human factors. Advanced-level students in computer science and electrical engineering will find this material useful as a study guide for their classes.
Other form:Printed edition: 9783319136288
Standard no.:10.1007/978-3-319-13629-5
Table of Contents:
  • Introduction
  • Background
  • Sketch-Based Authentication
  • Efficiency, Uniqueness, and Robustness
  • Human-Computer Interaction
  • Experiments and Results
  • Conclusions
  • Appendix: Optimization
  • Appendix: Subspace Approximations.