14) Ogihara ATM 15) ATM 10 16) 17),18) 1 4) 1 8),9) 10) 12) realadaboost 13) % 12) 2. 3 Gluhchev 19) 1 19) 2 10) 12) 3. 2 ID 1 8) 9),20) 2 2

Similar documents
Computer Security Symposium October ,a) 1,b) Microsoft Kinect Kinect, Takafumi Mori 1,a) Hiroaki Kikuchi 1,b) [1] 1 Meiji U

(MIRU2008) HOG Histograms of Oriented Gradients (HOG)

4. C i k = 2 k-means C 1 i, C 2 i 5. C i x i p [ f(θ i ; x) = (2π) p 2 Vi 1 2 exp (x µ ] i) t V 1 i (x µ i ) 2 BIC BIC = 2 log L( ˆθ i ; x i C i ) + q

3 2 2 (1) (2) (3) (4) 4 4 AdaBoost 2. [11] Onishi&Yoda [8] Iwashita&Stoica [5] 4 [3] 3. 3 (1) (2) (3)


第 1 回バイオメトリクス研究会 ( 早稲田大学 ) THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS Proceedings of Biometrics Workshop,169

IPSJ SIG Technical Report Vol.2009-CVIM-167 No /6/10 Real AdaBoost HOG 1 1 1, 2 1 Real AdaBoost HOG HOG Real AdaBoost HOG A Method for Reducing

1 Web [2] Web [3] [4] [5], [6] [7] [8] S.W. [9] 3. MeetingShelf Web MeetingShelf MeetingShelf (1) (2) (3) (4) (5) Web MeetingShelf

(a) 1 (b) 3. Gilbert Pernicka[2] Treibitz Schechner[3] Narasimhan [4] Kim [5] Nayar [6] [7][8][9] 2. X X X [10] [11] L L t L s L = L t + L s

1 Fig. 1 Extraction of motion,.,,, 4,,, 3., 1, 2. 2.,. CHLAC,. 2.1,. (256 ).,., CHLAC. CHLAC, HLAC. 2.3 (HLAC ) r,.,. HLAC. N. 2 HLAC Fig. 2

,,.,.,,.,.,.,.,,.,..,,,, i

IPSJ SIG Technical Report GPS LAN GPS LAN GPS LAN Location Identification by sphere image and hybrid sensing Takayuki Katahira, 1 Yoshio Iwai 1

Microsoft Word - toyoshima-deim2011.doc

258 5) GPS 1 GPS 6) GPS DP 7) 8) 10) GPS GPS ) GPS Global Positioning System

28 Horizontal angle correction using straight line detection in an equirectangular image

B HNS 7)8) HNS ( ( ) 7)8) (SOA) HNS HNS 4) HNS ( ) ( ) 1 TV power, channel, volume power true( ON) false( OFF) boolean channel volume int

IPSJ SIG Technical Report 1,a) 1,b) 1,c) 1,d) 2,e) 2,f) 2,g) 1. [1] [2] 2 [3] Osaka Prefecture University 1 1, Gakuencho, Naka, Sakai,

& Vol.5 No (Oct. 2015) TV 1,2,a) , Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Ro

情報処理学会研究報告 IPSJ SIG Technical Report Vol.2011-MBL-57 No.27 Vol.2011-UBI-29 No /3/ A Consideration of Features for Fatigue Es

Sobel Canny i

IPSJ SIG Technical Report Vol.2010-CVIM-170 No /1/ Visual Recognition of Wire Harnesses for Automated Wiring Masaki Yoneda, 1 Ta

a) Extraction of Similarities and Differences in Human Behavior Using Singular Value Decomposition Kenichi MISHIMA, Sayaka KANATA, Hiroaki NAKANISHI a

2). 3) 4) 1.2 NICTNICT DCRA Dihedral Corner Reflector micro-arraysdcra DCRA DCRA DCRA 3D DCRA PC USB PC PC ON / OFF Velleman K8055 K8055 K8055

顔画像を用いた個人認証システムの性能検討に関する研究

1 Kinect for Windows M = [X Y Z] T M = [X Y Z ] T f (u,v) w 3.2 [11] [7] u = f X +u Z 0 δ u (X,Y,Z ) (5) v = f Y Z +v 0 δ v (X,Y,Z ) (6) w = Z +

情報処理学会研究報告 IPSJ SIG Technical Report Vol.2013-CVIM-186 No /3/15 EMD 1,a) SIFT. SIFT Bag-of-keypoints. SIFT SIFT.. Earth Mover s Distance

光学

IPSJ SIG Technical Report Vol.2010-SLDM-144 No.50 Vol.2010-EMB-16 No.50 Vol.2010-MBL-53 No.50 Vol.2010-UBI-25 No /3/27 Twitter IME Twitte

人工知能学会研究会資料 SIG-KBS-B Analysis of Voting Behavior in One Night Werewolf 1 2 Ema Nishizaki 1 Tomonobu Ozaki Graduate School of Integrated B

29 jjencode JavaScript

Q [4] 2. [3] [5] ϵ- Q Q CO CO [4] Q Q [1] i = X ln n i + C (1) n i i n n i i i n i = n X i i C exploration exploitation [4] Q Q Q ϵ 1 ϵ 3. [3] [5] [4]

Vol.53 No (Mar. 2012) 1, 1,a) 1, 2 1 1, , Musical Interaction System Based on Stage Metaphor Seiko Myojin 1, 1,a

IPSJ SIG Technical Report Vol.2014-MBL-70 No.49 Vol.2014-UBI-41 No /3/15 2,a) 2,b) 2,c) 2,d),e) WiFi WiFi WiFi 1. SNS GPS Twitter Facebook Twit

Fig. 3 Flow diagram of image processing. Black rectangle in the photo indicates the processing area (128 x 32 pixels).

IPSJ SIG Technical Report Vol.2011-MUS-91 No /7/ , 3 1 Design and Implementation on a System for Learning Songs by Presenting Musical St

THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE.

DPA,, ShareLog 3) 4) 2.2 Strino Strino STRain-based user Interface with tacticle of elastic Natural ObjectsStrino 1 Strino ) PC Log-Log (2007 6)

,,,,,,,,,,,,,,,,,,, 976%, i

IPSJ SIG Technical Report Vol.2014-CG-155 No /6/28 1,a) 1,2,3 1 3,4 CG An Interpolation Method of Different Flow Fields using Polar Inter

知能と情報, Vol.30, No.5, pp

2. CABAC CABAC CABAC 1 1 CABAC Figure 1 Overview of CABAC 2 DCT 2 0/ /1 CABAC [3] 3. 2 値化部 コンテキスト計算部 2 値算術符号化部 CABAC CABAC

IPSJ SIG Technical Report Secret Tap Secret Tap Secret Flick 1 An Examination of Icon-based User Authentication Method Using Flick Input for

IPSJ SIG Technical Report iphone iphone,,., OpenGl ES 2.0 GLSL(OpenGL Shading Language), iphone GPGPU(General-Purpose Computing on Graphics Proc

2006 [3] Scratch Squeak PEN [4] PenFlowchart 2 3 PenFlowchart 4 PenFlowchart PEN xdncl PEN [5] PEN xdncl DNCL 1 1 [6] 1 PEN Fig. 1 The PEN

Duplicate Near Duplicate Intact Partial Copy Original Image Near Partial Copy Near Partial Copy with a background (a) (b) 2 1 [6] SIFT SIFT SIF

IPSJ SIG Technical Report 1, Instrument Separation in Reverberant Environments Using Crystal Microphone Arrays Nobutaka ITO, 1, 2 Yu KITANO, 1

(3.6 ) (4.6 ) 2. [3], [6], [12] [7] [2], [5], [11] [14] [9] [8] [10] (1) Voodoo 3 : 3 Voodoo[1] 3 ( 3D ) (2) : Voodoo 3D (3) : 3D (Welc

xx/xx Vol. Jxx A No. xx 1 Fig. 1 PAL(Panoramic Annular Lens) PAL(Panoramic Annular Lens) PAL (2) PAL PAL 2 PAL 3 2 PAL 1 PAL 3 PAL PAL 2. 1 PAL

Vol.54 No (July 2013) [9] [10] [11] [12], [13] 1 Fig. 1 Flowchart of the proposed system. c 2013 Information

ID 3) 9 4) 5) ID 2 ID 2 ID 2 Bluetooth ID 2 SRCid1 DSTid2 2 id1 id2 ID SRC DST SRC 2 2 ID 2 2 QR 6) 8) 6) QR QR QR QR

Input image Initialize variables Loop for period of oscillation Update height map Make shade image Change property of image Output image Change time L

IPSJ SIG Technical Report Vol.2012-CG-148 No /8/29 3DCG 1,a) On rigid body animation taking into account the 3D computer graphics came

7,, i

Gaze Head Eye (a) deg (b) 45 deg (c) 9 deg 1: - 1(b) - [5], [6] [7] Stahl [8], [9] Fang [1], [11] Itti [12] Itti [13] [7] Fang [1],

IPSJ SIG Technical Report Vol.2014-GN-90 No.16 Vol.2014-CDS-9 No.16 Vol.2014-DCC-6 No /1/24 1,a) 2,b) 2,c) 1,d) QUMARION QUMARION Kinect Kinect

IPSJ SIG Technical Report Vol.2014-CDS-10 No /5/ Intuitive appliance control method based on high-accurate indoor localization system

12) NP 2 MCI MCI 1 START Simple Triage And Rapid Treatment 3) START MCI c 2010 Information Processing Society of Japan

IPSJ SIG Technical Report Vol.2014-HCI-158 No /5/22 1,a) 2 2 3,b) Development of visualization technique expressing rainfall changing conditions

ActionScript Flash Player 8 ActionScript3.0 ActionScript Flash Video ActionScript.swf swf FlashPlayer AVM(Actionscript Virtual Machine) Windows

21 Key Exchange method for portable terminal with direct input by user

20 Method for Recognizing Expression Considering Fuzzy Based on Optical Flow

1(a) (b),(c) - [5], [6] Itti [12] [13] gaze eyeball head 2: [time] [7] Stahl [8], [9] Fang [1], [11] 3 -

( ) [1] [4] ( ) 2. [5] [6] Piano Tutor[7] [1], [2], [8], [9] Radiobaton[10] Two Finger Piano[11] Coloring-in Piano[12] ism[13] MIDI MIDI 1 Fig. 1 Syst

生体認証システムにおける情報漏洩対策技術の研究動向

本文6(599) (Page 601)

A Study on Throw Simulation for Baseball Pitching Machine with Rollers and Its Optimization Shinobu SAKAI*5, Yuichiro KITAGAWA, Ryo KANAI and Juhachi

IPSJ SIG Technical Report Vol.2014-DPS-158 No.27 Vol.2014-CSEC-64 No /3/6 1,a) 2,b) 3,c) 1,d) 3 Cappelli Bazen Cappelli Bazen Cappelli 1.,,.,.,

Optical Flow t t + δt 1 Motion Field 3 3 1) 2) 3) Lucas-Kanade 4) 1 t (x, y) I(x, y, t)

Vol.11-HCI-15 No. 11//1 Xangle 5 Xangle 7. 5 Ubi-WA Finger-Mount 9 Digitrack 11 1 Fig. 1 Pointing operations with our method Xangle Xa

HP cafe HP of A A B of C C Map on N th Floor coupon A cafe coupon B Poster A Poster A Poster B Poster B Case 1 Show HP of each company on a user scree

1 4 4 [3] SNS 5 SNS , ,000 [2] c 2013 Information Processing Society of Japan

IPSJ SIG Technical Report Vol.2017-MUS-116 No /8/24 MachineDancing: 1,a) 1,b) 3 MachineDancing MachineDancing MachineDancing 1 MachineDan

1 7.35% 74.0% linefeed point c 200 Information Processing Society of Japan

1 Table 1: Identification by color of voxel Voxel Mode of expression Nothing Other 1 Orange 2 Blue 3 Yellow 4 SSL Humanoid SSL-Vision 3 3 [, 21] 8 325

IPSJ SIG Technical Report PIN(Personal Identification Number) An Examination of Icon-based User Authentication Method for Mobile Terminals Fum

IPSJ SIG Technical Report Vol.2013-GN-87 No /3/ Research of a surround-sound field adjustmen system based on loudspeakers arrangement Ak

IPSJ SIG Technical Report Pitman-Yor 1 1 Pitman-Yor n-gram A proposal of the melody generation method using hierarchical pitman-yor language model Aki

[1] SBS [2] SBS Random Forests[3] Random Forests ii

IPSJ SIG Technical Report Vol.2016-CE-137 No /12/ e β /α α β β / α A judgment method of difficulty of task for a learner using simple

gengo.dvi

& 3 3 ' ' (., (Pixel), (Light Intensity) (Random Variable). (Joint Probability). V., V = {,,, V }. i x i x = (x, x,, x V ) T. x i i (State Variable),

Vol.55 No (Jan. 2014) saccess 6 saccess 7 saccess 2. [3] p.33 * B (A) (B) (C) (D) (E) (F) *1 [3], [4] Web PDF a m

IPSJ SIG Technical Report Vol.2015-CVIM-196 No /3/6 1,a) 1,b) 1,c) U,,,, The Camera Position Alignment on a Gimbal Head for Fixed Viewpoint Swi

(a) (b) 2 2 (Bosch, IR Illuminator 850 nm, UFLED30-8BD) ( 7[m] 6[m]) 3 (PointGrey Research Inc.Grasshopper2 M/C) Hz (a) (b

No. 3 Oct The person to the left of the stool carried the traffic-cone towards the trash-can. α α β α α β α α β α Track2 Track3 Track1 Track0 1

IS1-09 第 回画像センシングシンポジウム, 横浜,14 年 6 月 2 Hough Forest Hough Forest[6] Random Forest( [5]) Random Forest Hough Forest Hough Forest 2.1 Hough Forest 1 2.2

Modal Phrase MP because but 2 IP Inflection Phrase IP as long as if IP 3 VP Verb Phrase VP while before [ MP MP [ IP IP [ VP VP ]]] [ MP [ IP [ VP ]]]

The copyright of this material is retained by the Information Processing Society of Japan (IPSJ). The material has been made available on the website

21 e-learning Development of Real-time Learner Detection System for e-learning

(2003) (Suzuki, T. and Goto, Y., 2006) 2006

1: A/B/C/D Fig. 1 Modeling Based on Difference in Agitation Method artisoc[7] A D 2017 Information Processing

100 SDAM SDAM Windows2000/XP 4) SDAM TIN ESDA K G G GWR SDAM GUI

A Feasibility Study of Direct-Mapping-Type Parallel Processing Method to Solve Linear Equations in Load Flow Calculations Hiroaki Inayoshi, Non-member

Vol. 48 No. 4 Apr LAN TCP/IP LAN TCP/IP 1 PC TCP/IP 1 PC User-mode Linux 12 Development of a System to Visualize Computer Network Behavior for L

2 ( ) i

IPSJ SIG Technical Report An Evaluation Method for the Degree of Strain of an Action Scene Mao Kuroda, 1 Takeshi Takai 1 and Takashi Matsuyama 1

IPSJ SIG Technical Report Vol.2015-MUS-107 No /5/23 HARK-Binaural Raspberry Pi 2 1,a) ( ) HARK 2 HARK-Binaural A/D Raspberry Pi 2 1.

2.2 6).,.,.,. Yang, 7).,,.,,. 2.3 SIFT SIFT (Scale-Invariant Feature Transform) 8).,. SIFT,,. SIFT, Mean-Shift 9)., SIFT,., SIFT,. 3.,.,,,,,.,,,., 1,

JFE.dvi

IPSJ SIG Technical Report Vol.2009-DPS-141 No.20 Vol.2009-GN-73 No.20 Vol.2009-EIP-46 No /11/27 1. MIERUKEN 1 2 MIERUKEN MIERUKEN MIERUKEN: Spe

Transcription:

1, 1 2 1 33 realadaboost 30 4.1% Biometric Person Authentication Method Using Pen Holding Feature Daigo Muramats, 1, 1 Yuki Hashimoto 1 and Hiroyuki Ogata 1 We focus on a biometric person authentication method using features of pen holding style. The manner of holding pen can be distinctive among persons and be useful modality for person authentication, because the manner is affected by both the physical features and habitual behavior. In order to evaluate the efficiency, we extract several features from the pen-holding image, and fuse them for verification. In this paper, realadaboost algorithm is used for the fusion, and user-dependent threshold is applied for a decision making. The developed algorithm is evaluated using the database collected dorm 30 persons. The algorithm achieved an EER of 4.0% against the impersonation attacks. 1. 1) ATM 2) 1) 3) 4) 5) 6) 7) 1 1 Department of Electrical and Mechanical Engineering, Seikei University 1 Presently with The Institute of Science and Industrial Research, Osaka University 2 Graduate School of Science and Technology, Seikei University 1 1

14) Ogihara ATM 15) ATM 10 16) 17),18) 1 4) 1 8),9) 10) 12) realadaboost 13) 30 4.1% 12) 2. 3 Gluhchev 19) 1 19) 2 10) 12) 3. 2 ID 1 8) 9),20) 2 2

情報処理学会研究報告 䊕䊮㗔 Ꮐ 㗔 ฝ 㗔 ਅ 䊕䊮㗔 䊕䊮 ᜰ㗔 図 4 取得画像 図 3 撮影設定 図 2 ペン持ち方認証アルゴリズム 徴を抽出し 参照データとして登録する また本研究では 登録された本人データと 他人 データとのスコアを計算し これらのスコアを利用して認証時に必要なパラメータの学習 (a) (b) (c) (d) (e) (f) (h) (i) 設定を行っている 認証フェーズでは データ取得によって得られた画像から登録フェーズ同様特徴を抽出 し 抽出した特徴を用いて非類似度を計算する その後計算された非類似度を統合して認証 スコアを計算し しきい値と比較することで認証を行う 本章の残りの部分では これらの フェーズを構成する個々の処理について説明を行う 3.1 データ取得 カメラを用いてペンを持った手を撮影する 撮影方向はいくつか考えられるが ペン持ち 方の違いがわかりやすいよう本研究では図 3 に示すように ペンを持つ手を親指側から撮 影する これにより図 5 のような画像が取得される 親指側から撮影することにより 親指 の位置や人差指の曲げ方の違いに関係する特徴を画像から取得できる 3.2 特 徴 抽 出 (g) 取得された画像データから 個人性が現れると思われる特徴を抽出する 図 5 は異なる 9 図5 様々なペン持ち方 人から取得したペン持ち方の画像である これらの図よりペン持ち方にはかなり個人差があ 3 c 2011 Information Processing Society of Japan

4 1 2 3 4 5 ( 1 ) ( 2 ) ( 3 ) ( 4 ) ( 5 ) ( 6 ) ( 7 ) ( 8 ) x y ( 9 ) 2 ( 10 ) - ( 11 ) x y ( 12 ) x y ( 13 ) x y ( 14 ) x y ( 15 ) x y ( 16 ) x y ( 17 ) ( 18 ) ( 19 ) ( 20 ) x y ( 1 ) ( 2 ) 6 7 2 6 7 3.3 A B F a = (fa 1, fa 2,...fa Nv ), F b = (fb 1, fb 2,..., fb Nv ) n dis n(a, B) = fa n fb n, n = 1, 2,..., N v (1) N v = 31 I r (i, j), 1 i W,1 j H I v(i, j), 1 i WF,1 j H F (H < H F, W < W F ) dis thumb = 1 W H min (x,y) Region W i=1 j=1 H I r (i, j) I v (x + i, y + j) (2) Resion (x g, y g ) (x g W/2 10, y g H/2 10) (x g + W/2 + 10, y g + H/2 + 10) 10 7 31 2 N dim = 33 4

3.4 33 id {1, 2,..., N ID } R (id) Q Dis(R (id) Step 1, Q) = {disn(r(id), Q)}N n=1 Dis(R (id), Q) Dis(R (id), Q ) = (dis 1 (R (id), Q ),..., dis Ndim (R (id), Q )) Step 2 dis n (R (id), Q ) = disn(r(id), Q) norm (id) n, n = 1, 2,..., N dim (3) [ 1, 1] S S(R (id), Q ); a, b) = (s 1 (R (id), Q ; a, b),..., s Ndim (R (id), Q ; a, b) g(s; a, b) g(s; a, b) = 1 s n(r (id), Q; a, b) = g(dis(r(id), Q); a, b) (4) 2 1 + exp( a(s b)) a, b [ 1, 1] Step 3 Step2 S s n n s n Score Ndim Score(R (id), Q; Θ) = n=1 (5) α ns n(r (id), Q; a, b) (6) Θ = {α n} N dim n=1 α n n Θ realadaboost 13) 3.5 21) ) T hreshod id (c) = T h id + c dev id (7) T h id dev id id Z-norm 3) 3.6 Q id X X = { Accepted Rejected 4. 4.1 if Score(R (id), Q ) > T hreshold id (c) otherwise 30 1 10 300 [step 1] [step 2] 1 [step 3] [step 4] [step 5] [step 6] step 1 8 30 8 1 9 30 5 (30 8) 9 5 + 8 8 5 = 1310 1 1 (8) 5

1 No. T h id dev id EER [%] 1 12.0 2 10.7 3 8.7 4-11.4 5-12.0 6-12.0 7 6.0 8 4.1 9 4.1 10 11.3 4.2 8 id Gd (id) l, 1 id 30, 1 l 10 id Ad (id) k, 1 k K id, K id {40, 45} Gd (id) 1 R (id), 2 l 5 Gd (m) Gd (id) l l = Gd(id) 1 ; m id, 1 l 10 Q id Gd (id) j, 6 j 10 Ad (id) k, 1 k K i N G = 150 N I = 1310 4.3 False Reject Rate FRR False Accept Rage FAR Equal Error Rate EER F RR(T hreshold(c)) = 1 N G F AR(T hreshold(c)) = 1 N I 30 10 id=1 l=6 K 10 i δ i=1 k=1 ( ) δ Score(Gd (id) 1, Gd (id) ; Θ) < T hreshold(c) ( Score(Gd (id) l ) 1, Ad (id) ; Θ) T hreshold(c) k δ(x) { 1 if x is true δ(x) =. (9) 0 otherwise EER : EER = F AR(T hreshold(c )) + F RR(T hreshold(c ))) 2 (10) where c = argmin F AR(T hreshold(c)) F RR(T hreshold(c)) (11) c 4.4 7 1 10 9 8 4.1% 1 5. 1 FAR 6

realadoboost 9 8 realadaboost 4.1% Znorm 1-3 Znorm 8-9 1 9) 12) EER=5.6% 1 7 1) Jain, A. K., Flynn, P. and Ross, A. A.: Handbook of Biometrics, Springer Science+Business Media, LLC. (2008). 2) Vol.207, No.3, pp.62 65 (2006). 3) Ross, A. A., Nandakumar, K. and Jain, A. K.: Handbook of Multibiometrics, Springer Science+Business Media, LLC. (2006). 4) Vol.21, No.1, pp.41 46 (2010). 5) Brunelli, R. and Falavigna, D.: Person identification using multiple cues, Pattern Analysis and Machine Intelligence, IEEE Transactions on, Vol.17, No.10, pp.955 966 (1995). 6) D Vol.J92-D, No.8, pp.1363 1372 (2009). 7) Zhou, X., Bhanu, B. and Han, J.: Human Recognition at a Distance in Video by Integrating Face Profile and Gait (2005). 8) Munich, M.E. and Perona, P.: Visual Identification by Signature Tracking, IEEE Trans. Pattern Analysis and Machine Intelligence, Vol.25, No.2, pp.200 217 (2003). 9) Yasuda, K., Muramatsu, D., Shirato, S. and Matsumoto, T.: Visual-based online signature verification using features extracted from video, Journal of Network and Computer Applications, Vol.33, pp.333 341 (2010). 10) A Vol.J92-A, No.5, pp.392 396 (2009). 11) Hashimoto, Y., Muramatsu, D. and Ogata, H.: Biometric person authentication method using features extracted from pen- holding style, Proc. SPIE, Vol.7708. 12) Hashimoto, Y., Muramatsu, D. and Ogata, H.: 7

Vol.34, No.54, pp.1 4 (2010). 13) Schapire, R.E. and Singer, Y.: Improved Boosting Algorithms Using Confidencerated Predictions, Machine Learning, Vol.37, No.3, pp.297 336 (1999). 14) Sidlauskas, D.P. and Tamer, S.: Hand Geometry Recognition, Handbook of Biometrics (Jain, A.K., Flynn, P. and Ross, A.A., eds.), Springer Science+Business Media, LLC., chapter5 (2008). 15) Ogihara, A., Matsumura, H. and Shiozaki, A.: Biometric verification using keystroke motion and key press timing for ATM user authentication, pp.223 226 (2006). 16) : (2009) 17) Hangai, S. and Higuchi, T.: Writer Identification Using Finger-Bend in Writing Signature, Proc. BioAW2004, LNCS, Vol.3087, pp.229 237 (2004). 18) Kamel, N., Sayeed, S. and Ellis, G.: Glove-Based Approach to Online Signature Verification, Pattern Analysis and Machine Intelligence, IEEE Transactions on, Vol.30, No.6, pp.1109 1113 (2008). 19) Gluhchev, G., Savov, M., Boumbarov, O. and Vasileva, D.: A New Approach to Signature-Based Authentication, ICB, Lecture Notes in Computer Science, Vol.4642, Springer, pp.594 603 (2007). 20) Shirato, S., Muramatsu, D. and Matsumoto, T.: Camera-based online signature verification system: effects of camera positions, World Automation Congress (WAC), 2010, pp.1 6 (2010). 21) Jain, A.K., Griess, F.D. and Connell, S.D.: On-line signature verification, Pattern Recognition, Vol.35, pp.2963 2972 (2002). 8