A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
A novel scheme to address the fusion uncertainty in multi-modal continuous authentication schemes on mobile devices
2019
2019 International Conference on Biometrics (ICB)
A novel scheme to address the fusion uncertainty in multi-modal continuous authentication schemes on mobile devices. This is the accepted version of the paper. ...
The use of multiple sensors in a multi-modal scheme has been shown to improve accuracy but sensor scores are often combined naïvely using averaging techniques. ...
Multi-modal Continuous Authentication In [22] a scheme is built on two weeks of phone, SMS, browser and location data from over 50 subjects. ...
doi:10.1109/icb45273.2019.8987390
dblp:conf/icb/Smith-CreaseyR19
fatcat:3sfr5n7iefa6pdhrljcyxdkmfa
MultiLock: Mobile Active Authentication based on Multiple Biometric and Behavioral Patterns
[article]
2019
arXiv
pre-print
For active authentication we take advantage of mobile user behavior across multiple sessions by updating a confidence value of the authentication score. ...
Touch dynamics (touch gestures and keystroking), accelerometer, gyroscope, WiFi, GPS location and app usage are all collected during human-mobile interaction to authenticate the users. ...
The aim of this paper is to analyze multi-modal approaches to improve the performance of mobile authentication. ...
arXiv:1901.10312v1
fatcat:xz4x4xep45gstainrl7m7wb36m
Actions Speak Louder Than (Pass)words: Passive Authentication of Smartphone Users via Deep Temporal Features
[article]
2019
arXiv
pre-print
We acquired a dataset comprising of measurements from 30 smartphone sensor modalities for 37 users. ...
Passive authentication systems can tackle these challenges by frequently and unobtrusively monitoring the user's interaction with the device. ...
Venkatesh Prasad from Ford who provided insight and expertise that greatly assisted the research. ...
arXiv:1901.05107v1
fatcat:xmb2gx2ynfbh3arl2ik3mipiea
A critical insight into the identity authentication systems on smartphones
2019
Indonesian Journal of Electrical Engineering and Computer Science
<span>The advancement of computing power on mobile devices and their popularity among people in performing sensitive data exchange is uncovering an urgent need for a highly secure solution than the existing ...
Each of the works put forward by various researchers has been single-handedly contemplated followed by analysis. Ultimately, open problems and challenges were inferences from the survey conducted. ...
Multi-modal fusion has been performed using iris, face and periocular data and weighted fusion approach have been utilised for fusing comparison score of distinctive feature extraction schemes. ...
doi:10.11591/ijeecs.v13.i3.pp982-989
fatcat:7xz3hiialnfjzjkd77evwnqtg4
ITSME: Multi-modal and Unobtrusive Behavioural User Authentication for Smartphones
[chapter]
2016
Lecture Notes in Computer Science
In this paper, we propose a new multi-modal behavioural biometric that uses features collected while the user slide-unlocks the smartphone to answer a call. ...
The multimodal system using slide and pickup features improved the unimodal result by a factor two, with a FAR of 11.01% and a FRR of 4.12%. The final HTER was 7.57%. ...
In [23] a multimodal authentication approach is presented by Kim et al., using teeth and voice data acquired using mobile devices. ...
doi:10.1007/978-3-319-29938-9_4
fatcat:fihlufapjrgghohbt245l5wr54
Active user authentication for smartphones: A challenge data set and benchmark results
2016
2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS)
A unique non-commercial dataset, the University of Maryland Active Authentication Dataset 02 (UMDAA-02) for multi-modal user authentication research is introduced. ...
This paper focuses on three sensors - front camera, touch sensor and location service while providing a general description for other modalities. ...
Among the other AA approaches, in [14] , the authors fused stylometry with application usage, web browsing data and location information. ...
doi:10.1109/btas.2016.7791155
dblp:conf/btas/MahbubSPC16
fatcat:d4pd54smyrbtxj6lvzi7ymghbi
Hold On and Swipe: A Touch-Movement Based Continuous Authentication Schema based on Machine Learning
[article]
2022
arXiv
pre-print
This study aims to contribute to this innovative research by evaluating the performance of a multimodal behavioral biometric based user authentication scheme using touch dynamics and phone movement. ...
In recent years the amount of secure information being stored on mobile devices has grown exponentially. ...
The highest-ranking features are then
In [18] researchers also decide to authenticate users using chosen to be used for training in a distance based one-class
a multi-modal model, by combining touchscreen ...
arXiv:2201.08564v1
fatcat:teizq3pt7rhoficu5b76nneoza
Continuous user authentication using multi-modal biometrics
2015
Computers & security
Based on these findings, a novel architecture of multi-modal biometric authentication on mobile devices is proposed. ...
This research investigated three behavioural biometric techniques based on SMS texting activities and messages, looking to apply these techniques as a multi-modal biometric authentication method for mobile ...
level fusionThe approach enables multi-modal authentication with each modality being classified by a dedicated matching subsystem designed specifically for that approach. ...
doi:10.1016/j.cose.2015.06.001
fatcat:as4gtrnngbgmlmcay27kvezeba
Continuous and transparent multimodal authentication: reviewing the state of the art
2015
Cluster Computing
of the approaches. ...
This is followed by a literature review of the existing research on continuous and transparent multimodal authentication. ...
It can comprise multiple techniques from the same authentication approach (multi-layer authentication), such as password and cognitive questions, or from different authentication approaches (multi-factor ...
doi:10.1007/s10586-015-0510-4
fatcat:4plocuukhvezvfa5nnbu6ibqr4
Audio-Visual Biometric Recognition and Presentation Attack Detection: A Comprehensive Survey
[article]
2021
arXiv
pre-print
Biometric recognition is a trending technology that uses unique characteristics data to identify or verify/authenticate security applications. ...
The vulnerability of biometrics towards presentation attacks and audio-visual data usage for the detection of such attacks is also a hot topic of research. ...
A weighted sum approach is used to fuse the scores from face and speech modalities. ...
arXiv:2101.09725v1
fatcat:huejyfaeojhzddlckqt5nfivlq
Audio-Visual Biometric Recognition and Presentation Attack Detection: A Comprehensive Survey
2021
IEEE Access
Biometric recognition is a trending technology that uses unique characteristics data to identify or verify/authenticate security applications. ...
The vulnerability of biometrics towards presentation attacks and audio-visual data usage for the detection of such attacks is also a hot topic of research. ...
A weighted sum approach is used to fuse the scores from face and speech modalities. ...
doi:10.1109/access.2021.3063031
fatcat:q6emam55frhlzp53t7lxb4qz3e
Adaptive Threshold Scheme for Touchscreen Gesture Continuous Authentication Using Sensor Trust
2017
2017 IEEE Trustcom/BigDataSE/ICESS
Our framework unobtrusively compares real-time sensor data of a user to historic data and adjusts a trust parameter based on the similarity. ...
The touch-screen interactions are authenticated against a threshold that is continually adjusted based on the perceived trust. ...
ACKNOWLEDGEMENT This research work is carried out as part of a research studentship funded by British Telecommunications, UK. ...
doi:10.1109/trustcom/bigdatase/icess.2017.284
dblp:conf/trustcom/Smith-CreaseyR17
fatcat:bguuxv7nufhunjb7cwryu4rbj4
Mobile User Authentication Using Statistical Touch Dynamics Images
2014
IEEE Transactions on Information Forensics and Security
Behavioral biometrics have recently begun to gain attention for mobile user authentication. The feasibility of touch gestures as a novel modality for behavioral biometrics has been investigated. ...
Implemented as an Android App, the usability and effectiveness of the proposed method have also been evaluated. ...
The data stored and accessed from such devices are rarely protected except by a point-based authentication at the login stage. ...
doi:10.1109/tifs.2014.2350916
fatcat:zzjpbvksing7hh7jaqpbf2qhey
Sensor-based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Contemporary Survey
[article]
2020
arXiv
pre-print
The survey provides an overview of the current state-of-the-art approaches for continuous user authentication using behavioral biometrics captured by smartphones' embedded sensors, including insights and ...
User authentication is a task of paramount importance that grants access to legitimate users at the point-of-entry and continuously through the usage session. ...
While behavioral biometrics can be accurately captured by sensors, sensors data can be collected by a variety of applications that may present a threat to the adopted modality. ...
arXiv:2001.08578v2
fatcat:ykt7jpmeefgadil3n3y52z43t4
iWorkSafe: Towards Healthy Workplaces during COVID-19 with an Intelligent pHealth App for Industrial Settings
2021
IEEE Access
data from the mobile devices, and user-reported COVID-19 self-test data. ...
In addition, the app helps employees to estimate risk with possible COVID-19 infection based on the collected data and found that the score is effective in estimating personal health condition of the app ...
He is an expert in computational intelligence, applied data analysis, and big data technologies with a keen focus on healthcare applications. ...
doi:10.1109/access.2021.3050193
fatcat:s5lbixg3qjgothlj7r6nnebavu
« Previous
Showing results 1 — 15 out of 387 results