Biometric authentication revisited: Understanding the impact of wolves in sheep's clothing, To appear in Proceedings of the 15 th Annual USENIX Security Symposium, 2006. ,
Recovering dynamic information from static handwriting, Pattern Recognition, vol.26, issue.3, pp.409-418, 1993. ,
DOI : 10.1016/0031-3203(93)90168-V
Recovery of temporal information from static images of handwriting, International Journal of Computer Vision, vol.12, issue.3, pp.143-164, 1995. ,
DOI : 10.1007/BF01450853
Development of a biometric testing protocol for dynamic signature verification, 7th International Conference on Control, Automation, Robotics and Vision, 2002. ICARCV 2002., 2002. ,
DOI : 10.1109/ICARCV.2002.1238521
Signature verification revisited: promoting practical exploitation of biometric technology, Electronics & Communication Engineering Journal, vol.9, issue.6, pp.273-280, 1997. ,
DOI : 10.1049/ecej:19970606
Private key generation from on???line handwritten signatures, Information Management & Computer Security, vol.10, issue.4, pp.159-164, 2002. ,
DOI : 10.1108/09685220210436949
Handwriting synthesis from handwritten glyphs, Proceedings of the Fifth International Workshop on Frontiers of Handwriting Recognition, 1996. ,
Inferring motor programs from images of handwritten digits, Advances in Neural Information Processing Systems 18, 2006. ,
On-line signature verification, Pattern Recognition, vol.35, issue.12, pp.2963-2972, 2002. ,
DOI : 10.1016/S0031-3203(01)00240-0
Cryptographic keys from dynamic hand-signatures with biometric security preservation and replaceability, Proceedings of the Fourth IEEE Workshop on Automatic Identification Advanced Technologies, pp.27-32, 2005. ,
From offline to on-line handwriting recognition, Proceedings of the Seventh International Workshop on Frontiers in Handwriting Recognition, p.303312, 2000. ,
Recovery of writing sequence of static images of handwriting using UWM, Seventh International Conference on Document Analysis and Recognition, 2003. Proceedings., pp.1123-1128, 2003. ,
DOI : 10.1109/ICDAR.2003.1227831
The Effectiveness of Generative Attacks on an Online Handwriting Biometric, Proceedings of the International Conference on Audio-and Video-based Biometric Person Authentication, pp.1090-1099, 2005. ,
DOI : 10.1007/11527923_113
Towards speech-generated cryptographic keys on resource-constrained devices, Proceedings of the Eleventh USENIX Security Symposium, pp.283-296, 2002. ,
A delta-lognormal model for handwriting generation, Proceedings of the Seventh Biennal Conference of the International Graphonomics Society, pp.126-127, 1995. ,
Bibliography: On-line signatures, 2006. ,
Biometric cryptosystems: issues and challenges, Proceedings of the IEEE: Special Issue on Multimedia Security of Digital Rights Management, pp.948-960, 2004. ,
DOI : 10.1109/JPROC.2004.827372
URL : http://biometrics.cse.msu.edu/Uludagetal_Cryptosystems_ProcIEEE04.pdf
Template-based synthetic handwriting generation for the training of recognition systems, Proceedings of the 12th Conference of the International Graphonomics Society, pp.206-211, 2005. ,
Handwriting: Feature Correlation Analysis for Biometric Hashes, EURASIP Journal on Advances in Signal Processing, vol.2004, issue.4, pp.542-558, 2004. ,
DOI : 10.1155/S1110865704309248
URL : http://doi.org/10.1155/s1110865704309248
Biometric hash based on statistical features of online signatures, Object recognition supported by user interaction for service robots, pp.123-126, 2002. ,
DOI : 10.1109/ICPR.2002.1044628
A test tool to support brute-force online and offline signature forgery tests on mobile devices, Proceedings of the International Conference on Multimedia and Expo, pp.225-228, 2003. ,
SVC2004: First International Signature Verification Competition, Proceedings of the International Conference on Biometric Authentication (ICBA), Hong Kong, 2004. ,
DOI : 10.1007/978-3-540-25948-0_3