Analysis of 3D Trajectory-Based Modeling and Recognition


Date Published : 8 May 2026

Contributors

Dr. Deval Verma

Bennett University
Author

Dr. Ajay Kumar

IILM University, Greater Noida, India
Author

Keywords

2D handwriting systems; Authentication; Security Breaches; Human-computer interaction;

Proceeding

Track

Engineering and Sciences

License

Copyright (c) 2026 Sustainable Global Societies Initiative

Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.

Abstract

3D trajectory-based recognition remains a challenging task in public authentication systems. Traditional authentication systems rely on memorized credentials, are susceptible to information leakage, and often depend on fingerprints, making them vulnerable to security breaches. Its capability to categorize attributes such as handedness, gender, and age groups highlights the uniqueness of this feature and its potential for further development in emerging applications. This work presents the utilization of feature extraction and selection techniques for recognition of online characters through the analysis of online data. Recognition has been carried out using various supervised machine learning models using Random Forest, Support Vector Machines, Hidden Markov Model (HMM), and deep learning models like CNN.

Experiments are carried out using performance criteria including accuracy and other parameters. This study demonstrates that ensemble methods such as Random Forest surpass alternative approaches, for early detection and public authentication.

 

References

No References

Downloads

How to Cite

Verma, D. ., & Dr. Ajay Kumar, D. A. K. (2026). Analysis of 3D Trajectory-Based Modeling and Recognition . Sustainable Global Societies Initiative, 1(4). https://vectmag.com/sgsi/paper/view/364