2014
DOI: 10.1007/978-3-319-13386-7_18
|View full text |Cite
|
Sign up to set email alerts
|

Pupil Size as a Biometric Trait

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0
1

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 17 publications
0
4
0
1
Order By: Relevance
“…Controlled visual stimuli can be either static or dynamic. Tasks that are based on static stimuli include text-based tasks [13,14,48,56,124,133,147], such as reading a passage excerpt, and static image-based tasks [14,21,25,56,104,105,115,119,132,133,150], such as the exploration of a photograph. The complexity of the images affects the accuracy of the scheme [150,170].…”
Section: Continuous Vs Controlled Visual Stimulimentioning
confidence: 99%
See 1 more Smart Citation
“…Controlled visual stimuli can be either static or dynamic. Tasks that are based on static stimuli include text-based tasks [13,14,48,56,124,133,147], such as reading a passage excerpt, and static image-based tasks [14,21,25,56,104,105,115,119,132,133,150], such as the exploration of a photograph. The complexity of the images affects the accuracy of the scheme [150,170].…”
Section: Continuous Vs Controlled Visual Stimulimentioning
confidence: 99%
“…Hence, implicit authentication should be performed fast. The majority of the surveyed papers is concerned with tasks as a whole (e.g., [14,18,22,65,119,132]), meaning that the authentication process starts after the user has performed one ore more tasks. Time varies from a few seconds (e.g., less than 10 seconds [26,67] [85]), with tasks that are based on dynamic visual stimuli being faster.…”
Section: Task Vs Time As Authentication Factormentioning
confidence: 99%
“…In addition, several other form of biometric data are being studied, such as iris [3,[5][6][7], retina [8], palm, and ear images [9,10], which are seen as fairly stable data sources, even though aging may change the subject in the long run. Pupil sizes are used for human identification and verification [11]. Other sorts of biometric data sources are sometimes called behavioral features.…”
Section: Introductionmentioning
confidence: 99%
“…Di Indonesia masih banyak sekali kasuskasus yang menyangkut mengenai Cyber crime yang sulit untuk diselesaikan seperti penyebaran berita palsu atau yang disebut Hoax dan ujaran kebencian (Hate Speech) saat ini di Indonesia sedang marak terjadi (Nugrahaningsih, 2014); (Septian, 2018 (Syahrudin (2003); Sitompul (2013); Anam & Hafiz (2015)).…”
Section: Pendahuluanunclassified