The performance of a biometric system that relies on a single biometric modality (eg, fingerprints only) is often stymied by various factors such as poor data quality or limited …
We introduce hand movement, orientation, and grasp (HMOG), a set of behavioral features to continuously authenticate smartphone users. HMOG features unobtrusively capture subtle …
Recently, in 2014, He and Wang proposed a robust and efficient multi-server authentication scheme using biometrics-based smart card and elliptic curve cryptography (ECC). In this …
A biometric system is vulnerable to a variety of attacks aimed at undermining the integrity of the authentication process. These attacks are intended to either circumvent the security …
In order to direct and build an effective, secure mobile ecosystem, we must first understand user attitudes toward security and privacy for smartphones and how they may differ from …
Continuous authentication is of great importance to maintain the security level of a system throughout the login session. The goal of this work is to investigate a trustworthy, continuous …
The role of soft biometrics to enhance person recognition systems in unconstrained scenarios has not been extensively studied. Here, we explore the utility of the following …
Y Li, H Hu, Z Zhu, G Zhou - ACM Transactions on Sensor Networks …, 2020 - dl.acm.org
Continuous authentication monitors the security of a system throughout the login session on mobile devices. In this article, we present SCANet, a two-stream convolutional neural …
B Hassan, E Izquierdo, T Piatrik - Multimedia Tools and Applications, 2021 - Springer
The field of biometrics research encompasses the need to associate an identity to an individual based on the persons physiological or behaviour traits. While the use of intrusive …