Soft biometric traits for continuous user authentication

K Niinuma, U Park, AK Jain - IEEE Transactions on information …, 2010 - ieeexplore.ieee.org
Most existing computer and network systems authenticate a user only at the initial login
session. This could be a critical security weakness, especially for high-security systems …

Continuous user authentication using temporal information

K Niinuma, AK Jain - Biometric technology for human …, 2010 - spiedigitallibrary.org
Conventional computer systems authenticate users only at the initial log-in session, which
can be the cause of a critical security flaw. To resolve this problem, systems need …

Can soft biometric traits assist user recognition?

AK Jain, SC Dass… - Biometric technology for …, 2004 - spiedigitallibrary.org
Biometrics is rapidly gaining acceptance as the technology that can meet the ever
increasing need for security in critical applications. Biometric systems automatically …

[图书][B] Continuous Authentication Using Biometrics: Data, Models, and Metrics: Data, Models, and Metrics

I Traore - 2011 - books.google.com
User authentication is the process of verifying whether the identity of a user is genuine prior
to granting him or her access to resources or services in a secured environment …

[图书][B] Secure continuous biometric-enhanced authentication

AJ Klosterman, GR Ganger - 2000 - reports-archive.adm.cs.cmu.edu
Biometrics have the potential to solidify person-authentication by examining" unforgeable"
features of individuals. This paper explores issues involved with effective integration of …

Flexible and transparent user authentication for mobile devices

N Clarke, S Karatzouni, S Furnell - … for Security, Privacy and Trust: 24th …, 2009 - Springer
The mobile device has become a ubiquitous technology that is capable of supporting an
increasingly large array of services, applications and information. Given their increasing …

Soft biometric traits for personal recognition systems

AK Jain, SC Dass, K Nandakumar - International conference on biometric …, 2004 - Springer
Many existing biometric systems collect ancillary information like gender, age, height, and
eye color from the users during enrollment. However, only the primary biometric identifier …

[PDF][PDF] Toward reliable user authentication through biometrics

V Matyas, Z Riha - IEEE Security & Privacy, 2003 - Citeseer
Acquiring samples. During a user's first contact with the biometric system, the system collects
a biometric sample using an input device. The quality of the first sample is crucial …

On continuous user authentication via typing behavior

J Roth, X Liu, D Metaxas - IEEE Transactions on Image …, 2014 - ieeexplore.ieee.org
We hypothesize that an individual computer user has a unique and consistent habitual
pattern of hand movements, independent of the text, while typing on a keyboard. As a result …

Security, privacy, and usability in continuous authentication: A survey

AF Baig, S Eskeland - Sensors, 2021 - mdpi.com
Continuous authentication has been proposed as a possible approach for passive and
seamless user authentication, using sensor data comprising biometric, behavioral, and …