784 Hits in 6.1 sec

Smartphone Sensors for Modeling Human-Computer Interaction: General Outlook and Research Datasets for User Authentication [article]

Alejandro Acien and Aythami Morales and Ruben Vera-Rodriguez and Julian Fierrez
2020 arXiv   pre-print
Very promising results are achieved with accuracies up to 87% for person authentication based on a simple and fast touch gesture.  ...  We evaluate a biometric authentication system based on simple linear touch gestures using a Siamese Neural Network architecture.  ...  For that experiments we introduced a new method for user authentication based only on one touch gesture (drag and drop) and RNNs resulting in an error rate of 13%.  ... 
arXiv:2006.00790v1 fatcat:3c276eyoffcj3keajywovrzr5y

Active user authentication for smartphones: A challenge data set and benchmark results

Upal Mahbub, Sayantan Sarkar, Vishal M. Patel, Rama Chellappa
2016 2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS)  
Benchmark results for face detection, face verification, touch-based user identification and location-based next-place prediction are presented, which indicate that more robust methods fine-tuned to the  ...  This paper focuses on three sensors - front camera, touch sensor and location service while providing a general description for other modalities.  ...  Geo-location Data and Next Place Prediction The location service of smartphones return geographical location of the user based on GPS and WiFi network.  ... 
doi:10.1109/btas.2016.7791155 dblp:conf/btas/MahbubSPC16 fatcat:d4pd54smyrbtxj6lvzi7ymghbi

SenseMyCity: Crowdsourcing an Urban Sensor [article]

João G. P. Rodrigues, Ana Aguiar, João Barros
2014 arXiv   pre-print
The SMC app can collect data from embedded sensors, like GPS, wifi, accelerometer, magnetometer, etc, as well as from external bluetooth sensors, ranging from On-Board Diagnostics gathering data from vehicles  ...  We discuss our experience implementing the platform and using it to make longitudinal studies with many users.  ...  based on a Mobile Application and the required Back-End servers.  ... 
arXiv:1412.2070v1 fatcat:sirebxj6gndz5pnklgo447uqdu

Mobile Phone Sensing Systems: A Survey

Wazir Zada Khan, Yang Xiang, Mohammed Y Aalsalem, Quratulain Arshad
2013 IEEE Communications Surveys and Tutorials  
In this paper we have described comprehensively all those systems which are using smart phones and mobile phone sensors for humans good will and better human phone interaction.  ...  More and more organizations and people are discovering how mobile phones can be used for social impact, including how to use mobile technology for environmental protection, sensing, and to leverage just-in-time  ...  ACKNOWLEDGMENT The authors wish to acknowledge the anonymous reviewers for their valuable comments and special thanks to Jun Zhang & Chao Chen (Deakin University) for helping to prepare this manuscripts  ... 
doi:10.1109/surv.2012.031412.00077 fatcat:vbktgtrkqvc6zdnr2qqqclr7am

Employing Smartwatch for Enhanced Password Authentication [chapter]

Bing Chang, Ximing Liu, Yingjiu Li, Pingjian Wang, Wen-Tao Zhu, Zhan Wang
2017 Lecture Notes in Computer Science  
We conduct a user study involving 51 participants on the developed prototype so as to evaluate its feasibility and performance.  ...  Experimental results show that the best classifier for our system is the Bagged Decision Trees, for which the accuracy is 4.58% FRR and 0.12% FAR on the QWERTY keyboard, and 6.13% FRR and 0.16% FAR on  ...  Mobile Phone. The mobile phone is a Nexus 6 powered by Android 6.0.  ... 
doi:10.1007/978-3-319-60033-8_59 fatcat:sgp2qzedznd4ljtp4olibjkley

BeCAPTCHA: Behavioral Bot Detection using Touchscreen and Mobile Sensors benchmarked on HuMIdb [article]

Alejandro Acien and Aythami Morales and Julian Fierrez and Ruben Vera-Rodriguez and Oscar Delgado-Mohatar
2020 arXiv   pre-print
For this, we propose BeCAPTCHA, a CAPTCHA method based on the analysis of the touchscreen information obtained during a single drag and drop task in combination with the accelerometer data.  ...  In this paper we study the suitability of a new generation of CAPTCHA methods based on smartphone interactions.  ...  These signals have been studied for user mobile authentication in the last years [1] [2] .  ... 
arXiv:2005.13655v2 fatcat:z7ch5rxn2zevzpimsalmo4vrv4

eBiometrics: an enhanced multi-biometrics authentication technique for real-time remote applications on mobile devices

Torben Kuseler, Ihsan Lami, Sabah Jassim, Harin Sellahewa, Sos S. Agaian, Sabah A. Jassim
2010 Mobile Multimedia/Image Processing, Security, and Applications 2010  
Cryptographic functions and biometric-based authentication can enhance the security and confidentiality of mobile transactions.  ...  The EU-funded SecurePhone project has designed and implemented a multimodal biometric user authentication system on a prototype mobile communication device.  ...  A feasibility study of using keystroke analysis to authenticate a mobile phone user is presented by Clarke and Furnell 4 .  ... 
doi:10.1117/12.850022 fatcat:qb3v6gp2rvcuhpbsckkoxvmiym

Using Smartphones to Collect Behavioral Data in Psychological Science

Gabriella M. Harari, Nicholas D. Lane, Rui Wang, Benjamin S. Crosier, Andrew T. Campbell, Samuel D. Gosling
2016 Perspectives on Psychological Science  
Data can be collected from the onboard sensors and other phone logs embedded in today's off-the-shelf smartphone devices.  ...  activity and sleep), and mobility patterns (e.g., frequency and duration of time spent at various locations).  ...  A model and measure of mobile communication competence. Human Communication  ... 
doi:10.1177/1745691616650285 pmid:27899727 pmcid:PMC5572675 fatcat:vuljpozi4vdutkaevpudijq4eq

Mobile terminal identity authentication system based on behavioral characteristics

Xiaoshi Liang, Futai Zou, Linsen Li, Ping Yi
2020 International Journal of Distributed Sensor Networks  
We propose a new type of authentication system based on behavioral characteristics for smartphone users.  ...  The system deploys software on the smartphone to collect data from sensors and touch screens, and upload the data to the cloud.  ...  Funding The author(s) disclosed receipt of the following financial support for the research, authorship, and/or publication of this article: ORCID iD Futai Zou  ... 
doi:10.1177/1550147719899371 fatcat:ker6esvfqbhdxln6nzn6bzlbsa

Making a good thing better: enhancing password/PIN-based user authentication with smartwatch

Bing Chang, Yingjiu Li, Qiongxiao Wang, Wen-Tao Zhu, Robert H. Deng
2018 Cybersecurity  
User study results show that the best classifier is the Bagged Decision Trees, which yields 4.58% FRR and 0.12% FAR on a QWERTY keyboard, and 6.13% FRR and 0.16% FAR on a numeric keypad.  ...  The major challenge in this research is that a sophisticated attacker may imitate a user's typing behavior as shown in previous research on keystroke dynamics based user authentication.  ...  , a mobile phone and a smartwatch.  ... 
doi:10.1186/s42400-018-0009-4 fatcat:4rhj4iaorzdd5ncdjoptsq7lhu

A Low-Cost Vehicle Anti-Theft System Using Obsolete Smartphone

Bang Liu, Nianbo Liu, Guihai Chen, Xili Dai, Ming Liu
2018 Mobile Information Systems  
Furthermore, based on the learning of the driving history, our system can establish individual mobility model for a vehicle and distinguish abnormal driving behaviors by a Long Short Term Memory (LSTM)  ...  With the help of ad hoc authentication, the system can identify vehicle theft and send out timely alarming and tracking messages for rapid recovery.  ...  WiFi-based localization suffers from low coverage, especially in rural areas and many developing regions. us, dead reckoning has become a popular localization method for mobile tracking.  ... 
doi:10.1155/2018/6569826 fatcat:pi6pqaaanfcghiohszbi7p6f6y

Survey on Context Based Input of Microenvironment through Sensors and Inference of Activity to Alert Smartphone User

Monika Sharma, S.R.Idate
2015 International Journal of Innovative Research in Computer and Communication Engineering  
Sensors enable a mobile phone to be context aware i.e.; aware of the environment and activities of phone and its user.  ...  Basic functionalities of Mobile phones have changed from mundane activities like call, SMS to performing the tasks like navigation, tracking etc. which has made mobile units smart.  ...  In this paper only one sensor i.e. an accelerometer is studied thoroughly and its working, implementation and usefulness is studied.  ... 
doi:10.15680/ijircce.2015.0305008 fatcat:znhsxxyrjvgalnbjzptzojcuq4

Biometric Authentication and Verification for Medical Cyber Physical Systems

Abdullah Alhayajneh, Alessandro Baccarini, Gary Weiss, Thaier Hayajneh, Aydin Farajidavar
2018 Electronics  
This paper seeks to analyze and evaluate the most prominent biometric authentication techniques based on accuracy, cost, and feasibility of implementation.  ...  Preserving user security and privacy is a fundamental concern of WBANs, which introduces the notion of using biometric readings as a mechanism for authentication.  ...  The device should be worn on a belt, similar to carrying a mobile phone attached to the waist [24] .  ... 
doi:10.3390/electronics7120436 fatcat:zhywz5zhzjh3ne7y4uj2pnaw4i

A context-aware system to secure enterprise content: Incorporating reliability specifiers

Oyindamola Oluwatimi, Maria Luisa Damiani, Elisa Bertino
2018 Computers & security  
Biometric authentication relies on the accelerometer and fingerprint sensors to measure behavioral and physiological user features to prevent unauthorized users from using an authorized user's device.  ...  the system the ability to make more inferable decisions based on the degree of reliability of extracted contextual information.  ...  RT TC to 81ms based on our study.  ... 
doi:10.1016/j.cose.2018.04.001 fatcat:nw3u3vh5affodia4sfwfgbybtu

Event-Driven Implicit Authentication for Mobile Access Control

Feng Yao, Suleiman Y. Yerima, BooJoong Kang, Sakir Sezer
2015 2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies  
implicit authentication on mobile smartphones.  ...  The result of extensive experiments on user data collected over a period of several weeks from an Android phone indicates that our proposed approach is feasible and effective for lightweight real-time  ...  RELATED WORK Related work on protecting data on mobile devices based on behavior or context can be found in the current literature.  ... 
doi:10.1109/ngmast.2015.47 dblp:conf/ngmast/YaoYKS15 fatcat:o53n5aeunrawla2kspaz3uhepq
« Previous Showing results 1 — 15 out of 784 results