{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T19:17:59Z","timestamp":1742930279718,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319670768"},{"type":"electronic","value":"9783319670775"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-67077-5_16","type":"book-chapter","created":{"date-parts":[[2017,9,6]],"date-time":"2017-09-06T01:42:47Z","timestamp":1504662167000},"page":"161-170","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Computer User Verification Based on Typing Habits and Finger-Knuckle Analysis"],"prefix":"10.1007","author":[{"given":"Hossein","family":"Safaverdi","sequence":"first","affiliation":[]},{"given":"Tomasz Emanuel","family":"Wesolowski","sequence":"additional","affiliation":[]},{"given":"Rafal","family":"Doroz","sequence":"additional","affiliation":[]},{"given":"Krzysztof","family":"Wrobel","sequence":"additional","affiliation":[]},{"given":"Piotr","family":"Porwik","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,7]]},"reference":[{"key":"16_CR1","doi-asserted-by":"publisher","first-page":"116","DOI":"10.13176\/11.427","volume":"7","author":"SP Banerjee","year":"2012","unstructured":"Banerjee, S.P., Woodard, D.L.: Biometric authentication and identification using keystroke dynamics: a survey. J. Pattern Recogn. Res. 7, 116\u2013139 (2012)","journal-title":"J. Pattern Recogn. Res."},{"key":"16_CR2","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1109\/34.993558","volume":"24","author":"S Belongie","year":"2002","unstructured":"Belongie, S., Malik, J., Puzicha, J.: Shape matching and object recognition using shape contexts. IEEE Trans. Pattern Anal. Mach. Intell. 24, 509\u2013522 (2002)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"16_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"609","DOI":"10.1007\/978-3-319-16811-1_40","volume-title":"Computer Vision \u2013 ACCV 2014","author":"C-C Ng","year":"2015","unstructured":"Ng, C.-C., Yap, M.H., Costen, N., Li, B.: Automatic wrinkle detection using hybrid hessian filter. In: Cremers, D., Reid, I., Saito, H., Yang, M.-H. (eds.) ACCV 2014. LNCS, vol. 9005, pp. 609\u2013622. Springer, Cham (2015). doi:10.1007\/978-3-319-16811-1_40"},{"key":"16_CR4","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"598","DOI":"10.1007\/978-3-319-24306-1_58","volume-title":"Computational Collective Intelligence","author":"R Doroz","year":"2015","unstructured":"Doroz, R., Porwik, P., Safaverdi, H.: The new multilayer ensemble classifier for verifying users based on keystroke dynamics. In: N\u00fa\u00f1ez, M., Nguyen, N.T., Camacho, D., Trawi\u0144ski, B. (eds.) ICCCI 2015. LNCS (LNAI), vol. 9330, pp. 598\u2013605. Springer, Cham (2015). doi:10.1007\/978-3-319-24306-1_58"},{"key":"16_CR5","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1007\/978-3-319-45246-3_49","volume-title":"Computational Collective Intelligence","author":"R Doroz","year":"2016","unstructured":"Doroz, R., et al.: A new personal verification technique using finger-knuckle imaging. In: Nguyen, N.-T., Manolopoulos, Y., Iliadis, L., Trawi\u0144ski, B. (eds.) ICCCI 2016. LNCS (LNAI), vol. 9876, pp. 515\u2013524. Springer, Cham (2016). doi:10.1007\/978-3-319-45246-3_49"},{"key":"16_CR6","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1016\/j.forsciint.2015.07.001","volume":"254","author":"M Fager","year":"2015","unstructured":"Fager, M., Morris, K.: Quantifying the limits of fingerprint variability. Forensic Sci. Int. 254, 87\u201399 (2015)","journal-title":"Forensic Sci. Int."},{"issue":"6","key":"16_CR7","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1109\/MAES.2006.1662005","volume":"21","author":"MA Ferrer","year":"2006","unstructured":"Ferrer, M.A., Travieso, C.M., Alonso, J.B.: Using hand knuckle texture for biometric identifications. IEEE Aerosp. Electron. Syst. Mag. 21(6), 23\u201327 (2006)","journal-title":"IEEE Aerosp. Electron. Syst. Mag."},{"issue":"1","key":"16_CR8","doi-asserted-by":"publisher","first-page":"730","DOI":"10.1016\/j.procs.2015.08.226","volume":"60","author":"Y Iwahori","year":"2015","unstructured":"Iwahori, Y., Hattori, A., Adachi, Y., Bhuyan, M.K., Woodham, R.J., Kasugai, K.: Automatic detection of polyp using Hessian Filter and HOG features. Procedia Comput. Sci. 60(1), 730\u2013739 (2015)","journal-title":"Procedia Comput. Sci."},{"key":"16_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-3-642-40925-7_8","volume-title":"Computer Information Systems and Industrial Management","author":"P Kasprowski","year":"2013","unstructured":"Kasprowski, P.: The impact of temporal proximity between samples on eye movement biometric identification. In: Saeed, K., Chaki, R., Cortesi, A., Wierzcho\u0144, S. (eds.) CISIM 2013. LNCS, vol. 8104, pp. 77\u201387. Springer, Heidelberg (2013). doi:10.1007\/978-3-642-40925-7_8"},{"key":"16_CR10","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1186\/1475-925X-11-35","volume":"11","author":"R Koprowski","year":"2012","unstructured":"Koprowski, R., Teper, S.J., Weglarz, B., Wylega\u0142a, E., Krejca, M., Wr\u00f3bel, Z.: Fully automatic algorithm for the analysis of vessels in the angiographic image of the eye fundus. Biomed. Eng. Online 11, 35 (2012)","journal-title":"Biomed. Eng. Online"},{"issue":"1","key":"16_CR11","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1109\/TIFS.2008.2011089","volume":"4","author":"A Kumar","year":"2009","unstructured":"Kumar, A., Ravikanth, C.: Personal authentication using finger knuckle surface. IEEE Trans. Inf. Forensics Secur. 4(1), 98\u2013110 (2009)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"6","key":"16_CR12","doi-asserted-by":"publisher","first-page":"380","DOI":"10.1049\/el.2011.0156","volume":"47","author":"A Morales","year":"2011","unstructured":"Morales, A., Travieso, C.M., Ferrer, M.A., Alonso, J.B.: Improved finger-knuckle-print authentication based on orientation enhancement. Electron. Lett. 47(6), 380\u2013382 (2011)","journal-title":"Electron. Lett."},{"key":"16_CR13","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1007\/978-3-319-07617-1_34","volume-title":"Hybrid Artificial Intelligence Systems","author":"P Porwik","year":"2014","unstructured":"Porwik, P., Doroz, R.: Self-adaptive biometric classifier working on the reduced dataset. In: Polycarpou, M., Carvalho, A.C.P.L.F., Pan, J.-S., Wo\u017aniak, M., Quintian, H., Corchado, E. (eds.) HAIS 2014. LNCS (LNAI), vol. 8480, pp. 377\u2013388. Springer, Cham (2014). doi:10.1007\/978-3-319-07617-1_34"},{"key":"16_CR14","doi-asserted-by":"crossref","unstructured":"Porwik, P., Doroz, R., Wrobel, K.: A new signature similarity measure. In: Proceedings of the 2009 World Congress on Nature and Biologically Inspired Computing, NABIC 2009, pp. 1022\u20131027 (2009)","DOI":"10.1109\/NABIC.2009.5393858"},{"issue":"1","key":"16_CR15","first-page":"247","volume":"8","author":"J Raiyn","year":"2014","unstructured":"Raiyn, J.: A survey of cyber attack detection strategies. Int. J. Secur. Appl. 8(1), 247\u2013256 (2014)","journal-title":"Int. J. Secur. Appl."},{"key":"16_CR16","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/978-0-387-77322-3_5","volume":"39","author":"MB Salem","year":"2008","unstructured":"Salem, M.B., Hershkop, S., Stolfo, S.J.: A survey of insider attack detection research. Adv. Inf. Secur. 39, 69\u201390 (2008)","journal-title":"Adv. Inf. Secur."},{"key":"16_CR17","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1016\/j.compeleceng.2014.11.008","volume":"45","author":"K Usha","year":"2015","unstructured":"Usha, K., Ezhilarasan, M.: Finger knuckle biometrics - a review. Comput. Electr. Eng. 45, 249\u2013259 (2015)","journal-title":"Comput. Electr. Eng."},{"key":"16_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"588","DOI":"10.1007\/978-3-319-24306-1_57","volume-title":"Computational Collective Intelligence","author":"TE Weso\u0142owski","year":"2015","unstructured":"Weso\u0142owski, T.E., Porwik, P.: Keystroke data classification for computer user profiling and verification. In: N\u00fa\u00f1ez, M., Nguyen, N.T., Camacho, D., Trawi\u0144ski, B. (eds.) ICCCI 2015. LNCS, vol. 9330, pp. 588\u2013597. Springer, Cham (2015). doi:10.1007\/978-3-319-24306-1_57"},{"key":"16_CR19","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-81-322-2650-5_1","volume-title":"Advanced Computing and Systems for Security","author":"TE Weso\u0142owski","year":"2016","unstructured":"Weso\u0142owski, T.E., Porwik, P.: Computer user profiling based on keystroke analysis. In: Chaki, R., Cortesi, A., Saeed, K., Chaki, N. (eds.) Advanced Computing and Systems for Security. AISC, vol. 395, pp. 3\u201313. Springer, New Delhi (2016). doi:10.1007\/978-81-322-2650-5_1"},{"key":"16_CR20","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1080\/08839514.2016.1193715","volume":"30","author":"TE Wesolowski","year":"2016","unstructured":"Wesolowski, T.E., Porwik, P., Doroz, R.: Electronic health record security based on ensemble classification of keystroke dynamics. Appl. Artif. Intell. 30, 521\u2013540 (2016)","journal-title":"Appl. Artif. Intell."},{"issue":"3","key":"16_CR21","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1016\/j.cviu.2005.06.003","volume":"100","author":"DL Woodard","year":"2005","unstructured":"Woodard, D.L., Flynn, P.J.: Finger surface as a biometric identifier. Comput. Vis. Image Underst. 100(3), 357\u2013384 (2005)","journal-title":"Comput. Vis. Image Underst."},{"key":"16_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1007\/978-3-642-21090-7_32","volume-title":"Advances in Neural Networks \u2013 ISNN 2011","author":"M Xiong","year":"2011","unstructured":"Xiong, M., Yang, W., Sun, C.: Finger-knuckle-print recognition using LGBP. In: Liu, D., Zhang, H., Polycarpou, M., Alippi, C., He, H. (eds.) ISNN 2011. LNCS, vol. 6676, pp. 270\u2013277. Springer, Heidelberg (2011). doi:10.1007\/978-3-642-21090-7_32"}],"container-title":["Lecture Notes in Computer Science","Computational Collective Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-67077-5_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T17:44:56Z","timestamp":1710265496000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-67077-5_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319670768","9783319670775"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-67077-5_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"7 September 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}