Recent advances in biometrics-based user authentication for wearable devices: A contemporary survey

S Liu, W Shao, T Li, W Xu, L Song - Digital Signal Processing, 2022 - Elsevier
In recent years, wearable technology is interwoven with our everyday lives because of its
commoditization and comfort. Security and privacy become a big concern as many user …

A literature survey on authentication using Behavioural biometric techniques

R Oak - … and Information and Communication: Proceedings of …, 2018 - Springer
With technological advancements and the increasing use of computers and internet in our
day to day lives, the issue of security has become paramount. The rate of cybercrime has …

Greyc keystroke: a benchmark for keystroke dynamics biometric systems

R Giot, M El-Abed… - 2009 IEEE 3rd International …, 2009 - ieeexplore.ieee.org
Even if the market penetration rate of biometric technologies is still far below its potential,
many biometric systems are used in our daily real-life. One of the main reasons to its low …

Recognition of emotion intensities using machine learning algorithms: A comparative study

D Mehta, MFH Siddiqui, AY Javaid - Sensors, 2019 - mdpi.com
Over the past two decades, automatic facial emotion recognition has received enormous
attention. This is due to the increase in the need for behavioral biometric systems and …

A score level fusion method for eye movement biometrics

A George, A Routray - Pattern Recognition Letters, 2016 - Elsevier
This paper proposes a novel framework for the use of eye movement patterns for biometric
applications. Eye movements contain abundant information about cognitive brain functions …

A new view-invariant feature for cross-view gait recognition

W Kusakunniran, Q Wu, J Zhang… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
Human gait is an important biometric feature which is able to identify a person remotely.
However, change of view causes significant difficulties for recognizing gaits. This paper …

Unconstrained keystroke dynamics authentication with shared secret

R Giot, M El-Abed, B Hemery, C Rosenberger - Computers & security, 2011 - Elsevier
Among all the existing biometric modalities, authentication systems based on keystroke
dynamics present interesting advantages. These solutions are well accepted by users and …

Keystroke dynamics with low constraints svm based passphrase enrollment

R Giot, M El-Abed… - 2009 IEEE 3rd International …, 2009 - ieeexplore.ieee.org
Keystroke dynamics biometric systems have been studied for more than twenty years. They
are very well perceived by users, they may be one of the cheapest biometric system (as no …

You are your metadata: Identification and obfuscation of social media users using metadata information

B Perez, M Musolesi, G Stringhini - … AAAI Conference on Web and Social …, 2018 - ojs.aaai.org
Metadata are associated to most of the information we produce in our daily interactions and
communication in the digital world. Yet, surprisingly, metadata are often still categorized as …

A frictionless and secure user authentication in web-based premium applications

RF Olanrewaju, BUI Khan, MA Morshidi, F Anwar… - Ieee …, 2021 - ieeexplore.ieee.org
By and large, authentication systems employed for web-based applications primarily utilize
conventional username and password-based schemes, which can be compromised easily …