Filters








41 Hits in 12.2 sec

Authentication of Smartphone Users Using Behavioral Biometrics [article]

Abdulaziz Alzubaidi, Jugal Kalita
2019 arXiv   pre-print
Due to the size of smart devices, they can be easily lost and may expose details of users' private lives.  ...  biometrics with respect to methodology, associated datasets and evaluation approaches.  ...  Each session includes 100 touch gesture for each et al. [86] discussed how to enhance user authentication event. using multi-touch gestures.  ... 
arXiv:1911.04104v1 fatcat:yxx7pagj3ff6rok7zaq3f5psua

Biometrics and Consumer Electronics: A Brave New World or the Road to Dystopia? [Soapbox]

Peter Corcoran
2013 IEEE Consumer Electronics Magazine  
And smartphones are uniquely positioned to watch and listen to us on a daily basis, implementing an adaptive biometric approach to user authentication. WHERE DOES SIRI FIT IN?  ...  Also of interest is the transition from a desktop and keyboard culture to a touch-and thumb-based mobile lifestyle.  ... 
doi:10.1109/mce.2013.2239152 fatcat:z46kjbag45edjhnemum5zihmim

A Survey on Modality Characteristics, Performance Evaluation Metrics, and Security for Traditional and Wearable Biometric Systems [article]

Aditya Sundararajan, Arif I. Sarwat, Alexander Pons
2019 arXiv   pre-print
Biometric research is directed increasingly towards Wearable Biometric Systems (WBS) for user authentication and identification.  ...  However, prior to engaging in WBS research, how their operational dynamics and design considerations differ from those of Traditional Biometric Systems (TBS) must be understood.  ...  The viability of one-step two-factor authentication scheme was discussed for wearable biosensors in the contexts of keystroke, EEG, hand geometry, and hand gesture [58] .  ... 
arXiv:1903.02548v1 fatcat:mkl32giawnb5lgornzq4w3ec74

NSUWorks A Dynamic Behavioral Biometric Approach to Authenticate Users Employing Their Fingers to Interact with Touchscreen Devices NSUWorks Citation

Arturo Ponce, Arturo
unpublished
More than six years has passed and during that time a lot of people have helped me one way or another.  ...  Acknowledgements A doctoral dissertation requires the help of so many people during a journey that begins with the acceptance to the program.  ...  (Bednarik, Kinnunen, Mihaila and Fränti, 2005)  Finger touch gestures -It is based upon classifying movement characteristics of the center of the palm and fingertips.  ... 
fatcat:j6mef7w35fg3jnjkceocqbgo7a

Application and validation of capacitive proximity sensing systems in smart environments

Andreas Braun, Christoph Stahl, Bernd Krieg-Brückner, Wolfgang Zagler, Björn Göttfried
2015 Journal of Ambient Intelligence and Smart Environments  
They are commonly employed in finger-controlled touch screens that are present in billions of devices. A less common variety is the capacitive proximity sensor.  ...  Based on these evaluations and the knowledge generated in the design process, I am able to classify capacitive proximity sensing in smart environments.  ...  Kathleen, you kept me grounded, cheered me up when necessary and removed some of the worst offenses to the beautiful English language. I will be forever grateful for your love.  ... 
doi:10.3233/ais-150341 fatcat:sx2zkrxspvhdnpzvtx7w22kh2m

ConVRgence (VRIC) Virtual Reality International Conference Proceedings

Simon Richir
2020 International Journal of Virtual Reality  
Acknowledgments This part of the work is done within the framework of the NUMERILAB project, supported by FEDER and the NORMANDY REGION.  ...  Acknowledgements The authors would like to acknowledge all the team members at Virtuleap. References  ...  level of detection of user gestures.  ... 
doi:10.20870/ijvr.2020...3316 fatcat:d4dsvhql3ba5ros3xke2wb3efy

Do It Yourself Haptics: Part II [Tutorial]

K.E. MacLean, V. Hayward
2008 IEEE robotics & automation magazine  
This article is the second of a two-part series intended to be an introduction to haptic interfaces, their construction and application design.  ...  Haptic interactions employ mechanical, programmed physical devices which can be used for humancomputer communication via the sense of touch.  ...  It's important to watch and listen to people and notice where they struggle, and holding an open mind: perhaps your original idea isn't the right one, but the problem is real and understanding it will  ... 
doi:10.1109/m-ra.2007.914919 fatcat:y32d2r723fau7g6yq42f2ukr4e

List of Contributors [chapter]

Shibakali Gupta, Indradip Banerjee, Siddhartha Bhattacharyya
2019 Big Data Security  
With blockchain and data decentralization, authentication becomes much faster and simpler. Each user is responsible for their biometric data, such as on his mobile device.  ...  Since inside attacks cannot be fully predicted based on human manipulation of authentic users, it is more tauter to recognize such attacks, let alone the real-time protection.  ...  The layer of data may afford an unusual solution at times as authentication or authorization of data may be different.  ... 
doi:10.1515/9783110606058-202 fatcat:3jtqdtgsavas7n3vxrtbrkdbdy

Multi-Factor Authentication in Network Security

Abhineet Singh Uppal
2021
The authors used X-glasses to successfully unlock the victim's iPhone and transferred money from his bank account.  ...  It uses the biometrics of the user to authenticate to the system.  ...  It could include making gestures on a touch screen of a smartphone or a laptop, as shown in figure 2 .9 [12] . For example, MS 16 Windows 10 supports a feature of a picture password.  ... 
doi:10.7939/r3-ftat-7h78 fatcat:3vu4ew74evdjzdnmogwlv3ld7y

Surveillance, Fighting Crime And Violence (Iriss Deliverable 1.1)

David Wright, Johann Cas, Ivan Szekely, Beatrix Vissy, Michael Friedewald, Kerstin Goos, William Webster, Gemma Galdon Clavell, Rowena Rodrigues, Reinhard Kreissl, Clive Norris, Marija Krlic (+10 others)
2012 Zenodo  
A report addressing and analysing the factors underpinning the development and use of surveillance systems and technologies by both public authorities and private actors, and their implications in fighting  ...  crime and terrorism, social and economic costs, protection or infringement of civil liberties, fundamental rights and ethical aspects Co-ordinator Trilateral Research and Consulting LLP Dissemination  ...  These biometric systems are more accurate than the touch-based biometric systems since they are independent of touch.  ... 
doi:10.5281/zenodo.1184324 fatcat:vxti37nlxbbejg6mjbk72ruh3e

Mobile Behaviometrics: Behavior Modeling from Heterogeneous Sensor Time-Series

Jiang Zhu
2018
There is also an increasing demand to model human behaviors based on those data to enable context-aware computing and people-centric applications, which utilize users' behavior pattern to improve the existing  ...  Over the decades, we have seen tremendous success in biometrics technologies being used in all types of applications based on the physical attributes of the individual such as face, fingerprints, voice  ...  USER CLASSIFICATION BASED ON GESTURE PATTERNS We now move from the high level modeling of location and mobility to more fine grain modeling of a user's movement.  ... 
doi:10.1184/r1/6720647 fatcat:lnk44fetsrcjbkaqibbh5jvzda

Comparative Analysis of Different Machine Learning Classifiers for the Prediction of Chronic Diseases [chapter]

Rajesh Singh, Anita Gehlot, Dharam Buddhi
2022 Comparative Analysis of Different Machine Learning Classifiers for the Prediction of Chronic Diseases  
Precise diagnosis of these diseases on time is very significant for maintaining a healthy life.  ...  Chronic Diseases are the most dangerous diseases for humans and have significant effects on human life. Chronic Diseases like heart disease & Diabetes are the main causes of death.  ...  The region-based segmentation will segment the data dependent on the taken-out features using GLCM algorithm.  ... 
doi:10.13052/rp-9788770227667 fatcat:da47mjbbyzfwnbpde7rgbrlppe

Touring Pacific cultures

Mitiana Arbon
2018 Journal of Pacific History  
'Lovely hula hands: Corporate Tourism and the prostitution of Hawaiian culture.' In From a Native Daughter: Colonialism and Sovereignty in Hawai'i, pp. 179-97. Maine: Common Courage Press.  ...  Thanks to Murray, Monty and Jack for permission to use their photographs in this volume and to the copyright holders of other images.  ...  Thanks are also due to several colleagues for close readings and suggestions on this essay in various iterations, including Chris Ballard, Miranda Forsyth, Murray Garde, Siobhan McDonnell, Greg Rawlings  ... 
doi:10.1080/00223344.2018.1517583 fatcat:7bonbwulxnat5ftkjfwsi7rvxq

Perceived security and usage of a mobile payment application [article]

Hanul Sieger, Technische Universität Berlin, Technische Universität Berlin, Sebastian Möller
2015
Previous research work relied primarily on surveys to collect data of potential users' expectations of and attitude towards mobile payment.  ...  The design of the experiments was based on a generalizable taxonomy built for the purpose of use within the field of usable security.  ...  Speaker recognition would also fit, but is sometimes seen as Security method Fingerprint authentication 95% 2D gestures 63% Recognition-based authentication 47% Activity-based verification 42% 3D gestures  ... 
doi:10.14279/depositonce-4804 fatcat:kaanbvj3pjanfpnoznwd5rholm

Power Optimization of an Iterative Multiuser Detector for Turbo CodedCDMA

P Seema, H N Mishra, Prof Pratihari, M Swati, Patil, P Seema, H N Mishra, Prof Pratihari, M Swati, Patil
2013 International Journal of Emerging Trends in Electrical and Electronics (IJETEE)   unpublished
We propose dynamic decoding schedule optimization to fix the problem, that is, on each iteration of the receiver derive the optimal schedule to achieve a target bit error rate using a minimum number of  ...  Dynamic scheduling is shown to be a more flexible approach which results in a more stable QoS for a typical system configuration than one-shot scheduling, and large complexity savings over a receiver without  ...  Unique Identification (UID) of Govt. of India uses Biometric Authentication. There used three biometric authentications i.e. face recognition, iris recognition and finger prints D.  ... 
fatcat:kiwm23tgwzgndmbedjkay7h4w4
« Previous Showing results 1 — 15 out of 41 results