Discuss handwriting authentication.

What will be an ideal response?


We are very familiar with having to sign our name as a form of identifying ourselves. While our handwriting may be closely copied, the way we write our signature is much more difficult to mimic. As we write, the speed, pen pressure, and stroke of the letters varies. These factors are built into a biometric template for handwriting authentication. The user must sign their name on a digital graphics tablet, which captures their three dimensional signature characteristics. While the actual written signature is two dimensional, the pressure of the stylus on the tablet, the acceleration used in the movements of the stylus, and the user's handwriting rhythm provide the third dimension of characteristics.

Computer Science & Information Technology

You might also like to view...

Case-Based Critical Thinking QuestionsCase 1Prishna has decided that data entry for the database for her small business would be expedited if she designed a form for her two employees who maintain her records. She studies the tools available to her on the Design tab, to maximize the work that these resources can accomplish for her. Prishna needs a Design tab control that will allow users to select a customer record in the database of their small business. Which of the following can she use?

A. Bound Object Frame B. Combo Box C. Unbound Object Frame D. Attachment

Computer Science & Information Technology

In computer science, what do we call the rearranging of data values in an ordered sequence?

What will be an ideal response?

Computer Science & Information Technology

A structured database makes it easy to locate records using a ____.

A. sort B. query C. find D. locate

Computer Science & Information Technology

From which OS did Windows XP evolve?

A. Windows 98 B. Windows ME C. Windows 2000 D. Windows Server 2003

Computer Science & Information Technology