Xia Zhou1, Zijian Wang2, Tianyu Wang2, Jin Han2,*, Zhiling Wang2, Yannan Qian3
Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 473-481, 2022, DOI:10.32604/iasc.2022.022493
- 05 January 2022
Abstract User identity recognition is the key shield to protect users’ privacy data from disclosure and embezzlement. The user identity of mobile devices such as mobile phones mainly includes fingerprint recognition, nine-grid password, face recognition, digital password, etc. Due to the requirements of computing resources and convenience of mobile devices, these verification methods have their own shortcomings. In this paper, a user identity recognition technology based on finger trajectory is proposed. Based on the analysis of the users’ finger trajectory data, the feature of the user's finger movement trajectory is extracted to realize the identification of More >