Fig. 1 Error rate with respect to threshold
Fig. 2 Error rate with respect to the number of training samples
Table. 1 Feature vector description
Table. 2 Error rate with respect to a verification method
Table. 3 Error rate and decrease in error rate with respect to the number of training samples
References
- L. M. Mayron, "Biometric Authentication on Mobile Devices," IEEE Security & Privacy, vol. 13, no. 3, pp. 70-73, May-June 2015. https://doi.org/10.1109/MSP.2015.67
- T. Neal and D. Woodard, "Surveying Biometric Authentication for Mobile Device Security," Journal of Pattern Recognition Research, vol. 11. no. 1, pp. 74-110, Dec. 2016. https://doi.org/10.13176/11.764
- B. I. Jang and C. S. Kim, "A Study on the Security Technology for the Internet of Things," Journal of Security Engineering, vol. 11, no. 5, pp. 429-438, Oct. 2014. https://doi.org/10.14257/jse.2014.10.05
- S. H. Kim, Y. Fan, and G. Heo, "An Automatic Signature Verification Algorithm for Smart Devices," Journal of The Korea Society of Computer and Information, vol. 20, no. 10, pp. 15-21, Oct. 2015. https://doi.org/10.9708/jksci.2015.20.10.015
- N. Sae-Bae and N. Memon, "Online Signature Verification on Mobile Devices," IEEE Transactions on Information Forensics and Security, vol. 9, no. 6, pp. 933-947, Apr. 2014. https://doi.org/10.1109/TIFS.2014.2316472
- S. Sanda, Online Handwritten Signature Verification System, Master thesis, Blekinge Institute of Technology, Sweden, 2017.
- G. Heo, S. H. Kim, and Y. Woo, "Online Signature Verification Method using General Handwriting Data," Journal of the Korea Institute of Information and Communication Engineering, vol. 21, no. 12, pp. 2298-2304, Dec. 2017. https://doi.org/10.6109/JKIICE.2017.21.12.2298
- M. Amer, M. Goldstein, and S. Abdennadher, "Enhancing one-class supprot vector machines for unsupervised anomaly detection," in Proceedings of the ACM SIGKDD Workshop on Outlier Detection and Description, Chicago, Illinois, pp. 8-15, 2013.
- Y. Xiao, H. Wang, and W. Xu, "Parameter selection of Gaussian kernel for one-class SVM," IEEE Transactions on Cybernetics, vol. 45, no. 5, pp. 941-953, May 2015. https://doi.org/10.1109/TCYB.2014.2340433
- V. Vapnik, Statistical Learning Theory, John Wiley & Sons, New York, 1998.
- C. Gruber, T. Gruber, S. Krinninger, and B. Sick, "Online Signature Verification with Support Vector Machines Based on LCSS Kernel Functions," IEEE Transactions on Systems, Man, and Cybernetics Part B(Cybernetics), vol. 40, no. 4, pp. 1088-1100, Aug. 2010. https://doi.org/10.1109/TSMCB.2009.2034382
- J. Jayak, B. Naik, and H. S. Behera, "A Comprehensive Survey on Support Vector Machine in Data Mining Tasks: Applications & Challenges," International Journal of Database Theory and Application, vol. 8, no. 1, pp. 169-186, Feb. 2015.
- M. Hejazi and Y. P. Singh, "One-Class Support Vector Machines Approach to Anomaly Detection," Applied Artificial Intelligence, vol. 27, no. 5, pp. 351-366, May 2013. https://doi.org/10.1080/08839514.2013.785791
- A. Anaissi, N. L. D. Khoa, S. Mustapha, M. M. Alamdari, A. Braytee, Y. Wang, and F. Chen, "Adaptive One-Class Support Vector machine for Damage Detection in Structural Health Monitoring," in Proceedings of the 21th Pacific-Asia Conference on Knowledge Discovery and Data Mining, Jeju, Korea, pp. 42-57, 2017.
- LIBSVM-A Library for Support Vector Machines [Internet]. Available: https://www.csie.ntu.edu.tw/-cjlin/libsvm/