A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Authentication of Smartphone Users Using Behavioral Biometrics
[article]
2019
arXiv
pre-print
Due to the size of smart devices, they can be easily lost and may expose details of users' private lives. ...
biometrics with respect to methodology, associated datasets and evaluation approaches. ...
Each session includes 100 touch gesture for each
et al. [86] discussed how to enhance user authentication event.
using multi-touch gestures. ...
arXiv:1911.04104v1
fatcat:yxx7pagj3ff6rok7zaq3f5psua
Biometrics and Consumer Electronics: A Brave New World or the Road to Dystopia? [Soapbox]
2013
IEEE Consumer Electronics Magazine
And smartphones are uniquely positioned to watch and listen to us on a daily basis, implementing an adaptive biometric approach to user authentication.
WHERE DOES SIRI FIT IN? ...
Also of interest is the transition from a desktop and keyboard culture to a touch-and thumb-based mobile lifestyle. ...
doi:10.1109/mce.2013.2239152
fatcat:z46kjbag45edjhnemum5zihmim
A Survey on Modality Characteristics, Performance Evaluation Metrics, and Security for Traditional and Wearable Biometric Systems
[article]
2019
arXiv
pre-print
Biometric research is directed increasingly towards Wearable Biometric Systems (WBS) for user authentication and identification. ...
However, prior to engaging in WBS research, how their operational dynamics and design considerations differ from those of Traditional Biometric Systems (TBS) must be understood. ...
The viability of one-step two-factor authentication scheme was discussed for wearable biosensors in the contexts of keystroke, EEG, hand geometry, and hand gesture [58] . ...
arXiv:1903.02548v1
fatcat:mkl32giawnb5lgornzq4w3ec74
NSUWorks A Dynamic Behavioral Biometric Approach to Authenticate Users Employing Their Fingers to Interact with Touchscreen Devices NSUWorks Citation
unpublished
More than six years has passed and during that time a lot of people have helped me one way or another. ...
Acknowledgements A doctoral dissertation requires the help of so many people during a journey that begins with the acceptance to the program. ...
(Bednarik, Kinnunen, Mihaila and Fränti, 2005) Finger touch gestures -It is based upon classifying movement characteristics of the center of the palm and fingertips. ...
fatcat:j6mef7w35fg3jnjkceocqbgo7a
Application and validation of capacitive proximity sensing systems in smart environments
2015
Journal of Ambient Intelligence and Smart Environments
They are commonly employed in finger-controlled touch screens that are present in billions of devices. A less common variety is the capacitive proximity sensor. ...
Based on these evaluations and the knowledge generated in the design process, I am able to classify capacitive proximity sensing in smart environments. ...
Kathleen, you kept me grounded, cheered me up when necessary and removed some of the worst offenses to the beautiful English language. I will be forever grateful for your love. ...
doi:10.3233/ais-150341
fatcat:sx2zkrxspvhdnpzvtx7w22kh2m
ConVRgence (VRIC) Virtual Reality International Conference Proceedings
2020
International Journal of Virtual Reality
Acknowledgments This part of the work is done within the framework of the NUMERILAB project, supported by FEDER and the NORMANDY REGION. ...
Acknowledgements The authors would like to acknowledge all the team members at Virtuleap.
References ...
level of detection of user gestures. ...
doi:10.20870/ijvr.2020...3316
fatcat:d4dsvhql3ba5ros3xke2wb3efy
Do It Yourself Haptics: Part II [Tutorial]
2008
IEEE robotics & automation magazine
This article is the second of a two-part series intended to be an introduction to haptic interfaces, their construction and application design. ...
Haptic interactions employ mechanical, programmed physical devices which can be used for humancomputer communication via the sense of touch. ...
It's important to watch and listen to people and notice where they struggle, and holding an open mind: perhaps your original idea isn't the right one, but the problem is real and understanding it will ...
doi:10.1109/m-ra.2007.914919
fatcat:y32d2r723fau7g6yq42f2ukr4e
List of Contributors
[chapter]
2019
Big Data Security
With blockchain and data decentralization, authentication becomes much faster and simpler. Each user is responsible for their biometric data, such as on his mobile device. ...
Since inside attacks cannot be fully predicted based on human manipulation of authentic users, it is more tauter to recognize such attacks, let alone the real-time protection. ...
The layer of data may afford an unusual solution at times as authentication or authorization of data may be different. ...
doi:10.1515/9783110606058-202
fatcat:3jtqdtgsavas7n3vxrtbrkdbdy
Multi-Factor Authentication in Network Security
2021
The authors used X-glasses to successfully unlock the victim's iPhone and transferred money from his bank account. ...
It uses the biometrics of the user to authenticate to the system. ...
It could include making gestures on a touch screen of a smartphone or a laptop, as shown in figure 2 .9 [12] . For example, MS 16 Windows 10 supports a feature of a picture password. ...
doi:10.7939/r3-ftat-7h78
fatcat:3vu4ew74evdjzdnmogwlv3ld7y
Surveillance, Fighting Crime And Violence (Iriss Deliverable 1.1)
2012
Zenodo
A report addressing and analysing the factors underpinning the development and use of surveillance systems and technologies by both public authorities and private actors, and their implications in fighting ...
crime and terrorism, social and economic costs, protection or infringement of civil liberties, fundamental rights and ethical aspects Co-ordinator Trilateral Research and Consulting LLP Dissemination ...
These biometric systems are more accurate than the touch-based biometric systems since they are independent of touch. ...
doi:10.5281/zenodo.1184324
fatcat:vxti37nlxbbejg6mjbk72ruh3e
Mobile Behaviometrics: Behavior Modeling from Heterogeneous Sensor Time-Series
2018
There is also an increasing demand to model human behaviors based on those data to enable context-aware computing and people-centric applications, which utilize users' behavior pattern to improve the existing ...
Over the decades, we have seen tremendous success in biometrics technologies being used in all types of applications based on the physical attributes of the individual such as face, fingerprints, voice ...
USER CLASSIFICATION BASED ON GESTURE PATTERNS We now move from the high level modeling of location and mobility to more fine grain modeling of a user's movement. ...
doi:10.1184/r1/6720647
fatcat:lnk44fetsrcjbkaqibbh5jvzda
Comparative Analysis of Different Machine Learning Classifiers for the Prediction of Chronic Diseases
[chapter]
2022
Comparative Analysis of Different Machine Learning Classifiers for the Prediction of Chronic Diseases
Precise diagnosis of these diseases on time is very significant for maintaining a healthy life. ...
Chronic Diseases are the most dangerous diseases for humans and have significant effects on human life. Chronic Diseases like heart disease & Diabetes are the main causes of death. ...
The region-based segmentation will segment the data dependent on the taken-out features using GLCM algorithm. ...
doi:10.13052/rp-9788770227667
fatcat:da47mjbbyzfwnbpde7rgbrlppe
Touring Pacific cultures
2018
Journal of Pacific History
'Lovely hula hands: Corporate Tourism and the prostitution of Hawaiian culture.' In From a Native Daughter: Colonialism and Sovereignty in Hawai'i, pp. 179-97. Maine: Common Courage Press. ...
Thanks to Murray, Monty and Jack for permission to use their photographs in this volume and to the copyright holders of other images. ...
Thanks are also due to several colleagues for close readings and suggestions on this essay in various iterations, including Chris Ballard, Miranda Forsyth, Murray Garde, Siobhan McDonnell, Greg Rawlings ...
doi:10.1080/00223344.2018.1517583
fatcat:7bonbwulxnat5ftkjfwsi7rvxq
Perceived security and usage of a mobile payment application
[article]
2015
Previous research work relied primarily on surveys to collect data of potential users' expectations of and attitude towards mobile payment. ...
The design of the experiments was based on a generalizable taxonomy built for the purpose of use within the field of usable security. ...
Speaker recognition would also fit, but is sometimes seen as Security method Fingerprint authentication 95% 2D gestures 63% Recognition-based authentication 47% Activity-based verification 42% 3D gestures ...
doi:10.14279/depositonce-4804
fatcat:kaanbvj3pjanfpnoznwd5rholm
Power Optimization of an Iterative Multiuser Detector for Turbo CodedCDMA
2013
International Journal of Emerging Trends in Electrical and Electronics (IJETEE)
unpublished
We propose dynamic decoding schedule optimization to fix the problem, that is, on each iteration of the receiver derive the optimal schedule to achieve a target bit error rate using a minimum number of ...
Dynamic scheduling is shown to be a more flexible approach which results in a more stable QoS for a typical system configuration than one-shot scheduling, and large complexity savings over a receiver without ...
Unique Identification (UID) of Govt. of India uses Biometric Authentication. There used three biometric authentications i.e. face recognition, iris recognition and finger prints D. ...
fatcat:kiwm23tgwzgndmbedjkay7h4w4
« Previous
Showing results 1 — 15 out of 41 results