On-line signature verification resilience to packet loss in IP networks

نویسندگان

  • Jonas Richiardi
  • Julian Fierrez-Aguilar
  • Javier Ortega-Garcia
  • Andrzej Drygajlo
چکیده

This paper reports on experiments investigating the effects of packet loss for two online signature verification systems distributed over the Internet. The effects on verification performance of using different signature data recovery strategies are explored. Justifications are given taking into account the statistical nature of the signature models used for the verification task. Under realistic packet loss conditions, it is found that marginalising the lost feature vectors at the verification stage outperforms other feature-based data imputation methods such as packet repetition.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Improvement and parallelization of Snort network intrusion detection mechanism using graphics processing unit

Nowadays, Network Intrusion Detection Systems (NIDS) are widely used to provide full security on computer networks. IDS are categorized into two primary types, including signature-based systems and anomaly-based systems. The former is more commonly used than the latter due to its lower error rate. The core of a signature-based IDS is the pattern matching. This process is inherently a computatio...

متن کامل

Comparison analysis in Multicast Authentication based on Batch Signature (MABS) in Network Security

Conventional block-based multicast authentication schemes overlook the heterogeneity of receivers by letting the sender choose the block size, divide a multicast stream into blocks, associate each block with a signature, and spread the effect of the signature across all the packets in the block through hash graphs or coding algorithms. The correlation among packets makes them vulnerable to pack...

متن کامل

The Feedback Based Mechanism for Video Streaming Over Multipath Ad Hoc Networks

Ad hoc networks are multi-hop wireless networks without a pre-installed infrastructure. Such networks are widely used in military applications and in emergency situations as they permit the establishment of a communication network at very short notice with a very low cost. Video is very sensitive for packet loss and wireless ad-hoc networks are error prone due to node mobility and weak links. H...

متن کامل

Use of the Shearlet Transform and Transfer Learning in Offline Handwritten Signature Verification and Recognition

Despite the growing growth of technology, handwritten signature has been selected as the first option between biometrics by users. In this paper, a new methodology for offline handwritten signature verification and recognition based on the Shearlet transform and transfer learning is proposed. Since, a large percentage of handwritten signatures are composed of curves and the performance of a sig...

متن کامل

Resilient Routing Layers and Optical Burst Switching

Two important challenges in Optical Burst Switching (OBS) are to reduce the packet loss and to achieve resilience in case of link or switch failure. In this report we build on a previously published method to increase resilience in IP networks, called Resilient Routing Layers (RRL). Based on RRL, we develop a new method that improves the burst loss probability and the resilience of OBS networks...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004