Filters








387 Hits in 6.0 sec

A novel scheme to address the fusion uncertainty in multi-modal continuous authentication schemes on mobile devices

Max Smith-Creasey, Muttukrishnan Rajarajan
2019 2019 International Conference on Biometrics (ICB)  
A novel scheme to address the fusion uncertainty in multi-modal continuous authentication schemes on mobile devices. This is the accepted version of the paper.  ...  The use of multiple sensors in a multi-modal scheme has been shown to improve accuracy but sensor scores are often combined naïvely using averaging techniques.  ...  Multi-modal Continuous Authentication In [22] a scheme is built on two weeks of phone, SMS, browser and location data from over 50 subjects.  ... 
doi:10.1109/icb45273.2019.8987390 dblp:conf/icb/Smith-CreaseyR19 fatcat:3sfr5n7iefa6pdhrljcyxdkmfa

MultiLock: Mobile Active Authentication based on Multiple Biometric and Behavioral Patterns [article]

Alejandro Acien, Aythami Morales, Ruben Vera-Rodriguez, Julian Fierrez
2019 arXiv   pre-print
For active authentication we take advantage of mobile user behavior across multiple sessions by updating a confidence value of the authentication score.  ...  Touch dynamics (touch gestures and keystroking), accelerometer, gyroscope, WiFi, GPS location and app usage are all collected during human-mobile interaction to authenticate the users.  ...  The aim of this paper is to analyze multi-modal approaches to improve the performance of mobile authentication.  ... 
arXiv:1901.10312v1 fatcat:xz4x4xep45gstainrl7m7wb36m

Actions Speak Louder Than (Pass)words: Passive Authentication of Smartphone Users via Deep Temporal Features [article]

Debayan Deb, Arun Ross, Anil K. Jain, Kwaku Prakah-Asante, K. Venkatesh Prasad
2019 arXiv   pre-print
We acquired a dataset comprising of measurements from 30 smartphone sensor modalities for 37 users.  ...  Passive authentication systems can tackle these challenges by frequently and unobtrusively monitoring the user's interaction with the device.  ...  Venkatesh Prasad from Ford who provided insight and expertise that greatly assisted the research.  ... 
arXiv:1901.05107v1 fatcat:xmb2gx2ynfbh3arl2ik3mipiea

A critical insight into the identity authentication systems on smartphones

Tehseen Mehraj, Mir Aman Sheheryar, Sajaad Ahmed Lone, A. H. Mir
2019 Indonesian Journal of Electrical Engineering and Computer Science  
<span>The advancement of computing power on mobile devices and their popularity among people in performing sensitive data exchange is uncovering an urgent need for a highly secure solution than the existing  ...  Each of the works put forward by various researchers has been single-handedly contemplated followed by analysis. Ultimately, open problems and challenges were inferences from the survey conducted.  ...  Multi-modal fusion has been performed using iris, face and periocular data and weighted fusion approach have been utilised for fusing comparison score of distinctive feature extraction schemes.  ... 
doi:10.11591/ijeecs.v13.i3.pp982-989 fatcat:7xz3hiialnfjzjkd77evwnqtg4

ITSME: Multi-modal and Unobtrusive Behavioural User Authentication for Smartphones [chapter]

Attaullah Buriro, Bruno Crispo, Filippo Del Frari, Jeffrey Klardie, Konrad Wrona
2016 Lecture Notes in Computer Science  
In this paper, we propose a new multi-modal behavioural biometric that uses features collected while the user slide-unlocks the smartphone to answer a call.  ...  The multimodal system using slide and pickup features improved the unimodal result by a factor two, with a FAR of 11.01% and a FRR of 4.12%. The final HTER was 7.57%.  ...  In [23] a multimodal authentication approach is presented by Kim et al., using teeth and voice data acquired using mobile devices.  ... 
doi:10.1007/978-3-319-29938-9_4 fatcat:fihlufapjrgghohbt245l5wr54

Active user authentication for smartphones: A challenge data set and benchmark results

Upal Mahbub, Sayantan Sarkar, Vishal M. Patel, Rama Chellappa
2016 2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS)  
A unique non-commercial dataset, the University of Maryland Active Authentication Dataset 02 (UMDAA-02) for multi-modal user authentication research is introduced.  ...  This paper focuses on three sensors - front camera, touch sensor and location service while providing a general description for other modalities.  ...  Among the other AA approaches, in [14] , the authors fused stylometry with application usage, web browsing data and location information.  ... 
doi:10.1109/btas.2016.7791155 dblp:conf/btas/MahbubSPC16 fatcat:d4pd54smyrbtxj6lvzi7ymghbi

Hold On and Swipe: A Touch-Movement Based Continuous Authentication Schema based on Machine Learning [article]

Rushit Dave, Naeem Seliya, Laura Pryor, Mounika Vanamala, Evelyn Sowells, Jacob mallet
2022 arXiv   pre-print
This study aims to contribute to this innovative research by evaluating the performance of a multimodal behavioral biometric based user authentication scheme using touch dynamics and phone movement.  ...  In recent years the amount of secure information being stored on mobile devices has grown exponentially.  ...  The highest-ranking features are then In [18] researchers also decide to authenticate users using chosen to be used for training in a distance based one-class a multi-modal model, by combining touchscreen  ... 
arXiv:2201.08564v1 fatcat:teizq3pt7rhoficu5b76nneoza

Continuous user authentication using multi-modal biometrics

Hataichanok Saevanee, Nathan Clarke, Steven Furnell, Valerio Biscione
2015 Computers & security  
Based on these findings, a novel architecture of multi-modal biometric authentication on mobile devices is proposed.  ...  This research investigated three behavioural biometric techniques based on SMS texting activities and messages, looking to apply these techniques as a multi-modal biometric authentication method for mobile  ...  level fusionThe approach enables multi-modal authentication with each modality being classified by a dedicated matching subsystem designed specifically for that approach.  ... 
doi:10.1016/j.cose.2015.06.001 fatcat:as4gtrnngbgmlmcay27kvezeba

Continuous and transparent multimodal authentication: reviewing the state of the art

Abdulwahid Al Abdulwahid, Nathan Clarke, Ingo Stengel, Steven Furnell, Christoph Reich
2015 Cluster Computing  
of the approaches.  ...  This is followed by a literature review of the existing research on continuous and transparent multimodal authentication.  ...  It can comprise multiple techniques from the same authentication approach (multi-layer authentication), such as password and cognitive questions, or from different authentication approaches (multi-factor  ... 
doi:10.1007/s10586-015-0510-4 fatcat:4plocuukhvezvfa5nnbu6ibqr4

Audio-Visual Biometric Recognition and Presentation Attack Detection: A Comprehensive Survey [article]

Hareesh Mandalapu, Aravinda Reddy P N, Raghavendra Ramachandra, K Sreenivasa Rao, Pabitra Mitra, S R Mahadeva Prasanna, Christoph Busch
2021 arXiv   pre-print
Biometric recognition is a trending technology that uses unique characteristics data to identify or verify/authenticate security applications.  ...  The vulnerability of biometrics towards presentation attacks and audio-visual data usage for the detection of such attacks is also a hot topic of research.  ...  A weighted sum approach is used to fuse the scores from face and speech modalities.  ... 
arXiv:2101.09725v1 fatcat:huejyfaeojhzddlckqt5nfivlq

Audio-Visual Biometric Recognition and Presentation Attack Detection: A Comprehensive Survey

Hareesh Mandalapu, Aravinda Reddy P N, Raghavendra Ramachandra, Krothapalli Sreenivasa Rao, Pabitra Mitra, S. R. Mahadeva Prasanna, Christoph Busch
2021 IEEE Access  
Biometric recognition is a trending technology that uses unique characteristics data to identify or verify/authenticate security applications.  ...  The vulnerability of biometrics towards presentation attacks and audio-visual data usage for the detection of such attacks is also a hot topic of research.  ...  A weighted sum approach is used to fuse the scores from face and speech modalities.  ... 
doi:10.1109/access.2021.3063031 fatcat:q6emam55frhlzp53t7lxb4qz3e

Adaptive Threshold Scheme for Touchscreen Gesture Continuous Authentication Using Sensor Trust

Max Smith-Creasey, Muttukrishnan Rajarajan
2017 2017 IEEE Trustcom/BigDataSE/ICESS  
Our framework unobtrusively compares real-time sensor data of a user to historic data and adjusts a trust parameter based on the similarity.  ...  The touch-screen interactions are authenticated against a threshold that is continually adjusted based on the perceived trust.  ...  ACKNOWLEDGEMENT This research work is carried out as part of a research studentship funded by British Telecommunications, UK.  ... 
doi:10.1109/trustcom/bigdatase/icess.2017.284 dblp:conf/trustcom/Smith-CreaseyR17 fatcat:bguuxv7nufhunjb7cwryu4rbj4

Mobile User Authentication Using Statistical Touch Dynamics Images

Xi Zhao, Tao Feng, Weidong Shi, Ioannis A. Kakadiaris
2014 IEEE Transactions on Information Forensics and Security  
Behavioral biometrics have recently begun to gain attention for mobile user authentication. The feasibility of touch gestures as a novel modality for behavioral biometrics has been investigated.  ...  Implemented as an Android App, the usability and effectiveness of the proposed method have also been evaluated.  ...  The data stored and accessed from such devices are rarely protected except by a point-based authentication at the login stage.  ... 
doi:10.1109/tifs.2014.2350916 fatcat:zzjpbvksing7hh7jaqpbf2qhey

Sensor-based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Contemporary Survey [article]

Mohammed Abuhamad, Ahmed Abusnaina, DaeHun Nyang, David Mohaisen
2020 arXiv   pre-print
The survey provides an overview of the current state-of-the-art approaches for continuous user authentication using behavioral biometrics captured by smartphones' embedded sensors, including insights and  ...  User authentication is a task of paramount importance that grants access to legitimate users at the point-of-entry and continuously through the usage session.  ...  While behavioral biometrics can be accurately captured by sensors, sensors data can be collected by a variety of applications that may present a threat to the adopted modality.  ... 
arXiv:2001.08578v2 fatcat:ykt7jpmeefgadil3n3y52z43t4

iWorkSafe: Towards Healthy Workplaces during COVID-19 with an Intelligent pHealth App for Industrial Settings

M. Shamim Kaiser, Mufti Mahmud, Manan Binth Taj Noor, Nusrat Zerin Zenia, Shamim Al Mamun, K.M. Abir Mahmud, Saiful Azad, V.N. Manjunath Aradhya, Stephan Punitha, Thomson Stephan, Ramani Kannan, Mohammed Hanif (+3 others)
2021 IEEE Access  
data from the mobile devices, and user-reported COVID-19 self-test data.  ...  In addition, the app helps employees to estimate risk with possible COVID-19 infection based on the collected data and found that the score is effective in estimating personal health condition of the app  ...  He is an expert in computational intelligence, applied data analysis, and big data technologies with a keen focus on healthcare applications.  ... 
doi:10.1109/access.2021.3050193 fatcat:s5lbixg3qjgothlj7r6nnebavu
« Previous Showing results 1 — 15 out of 387 results