Continuous user authentication on mobile devices: Recent progress and remaining challenges

VM Patel, R Chellappa, D Chandra… - IEEE Signal …, 2016 - ieeexplore.ieee.org
Recent developments in sensing and communication technologies have led to an explosion
in the use of mobile devices such as smart phones and tablets. With the increase in the use …

Surveying the development of biometric user authentication on mobile phones

W Meng, DS Wong, S Furnell… - … Surveys & Tutorials, 2014 - ieeexplore.ieee.org
Designing reliable user authentication on mobile phones is becoming an increasingly
important task to protect users' private information and data. Since biometric approaches can …

Raspberry Pi assisted face recognition framework for enhanced law-enforcement services in smart cities

M Sajjad, M Nasir, K Muhammad, S Khan, Z Jan… - Future Generation …, 2020 - Elsevier
Similar to a fingerprint search system, face recognition technology can assist law
enforcement agencies in identifying suspects or finding missing persons. Face recognition …

BreathPrint: Breathing acoustics-based user authentication

J Chauhan, Y Hu, S Seneviratne, A Misra… - Proceedings of the 15th …, 2017 - dl.acm.org
We propose BreathPrint, a new behavioural biometric signature based on audio features
derived from an individual's commonplace breathing gestures. Specifically, BreathPrint uses …

Learning generalized deep feature representation for face anti-spoofing

H Li, P He, S Wang, A Rocha, X Jiang… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
In this paper, we propose a novel framework leveraging the advantages of the
representational ability of deep learning and domain generalization for face spoofing …

User authentication on mobile devices: Approaches, threats and trends

C Wang, Y Wang, Y Chen, H Liu, J Liu - Computer Networks, 2020 - Elsevier
Mobile devices have brought a great convenience to us these years, which allow the users
to enjoy the anytime and anywhere various applications such as the online shopping …

You can hear but you cannot steal: Defending against voice impersonation attacks on smartphones

S Chen, K Ren, S Piao, C Wang… - 2017 IEEE 37th …, 2017 - ieeexplore.ieee.org
Voice, as a convenient and efficient way of information delivery, has a significant advantage
over the conventional keyboard-based input methods, especially on small mobile devices …

SCANet: sensor-based continuous authentication with two-stream convolutional neural networks

Y Li, H Hu, Z Zhu, G Zhou - ACM Transactions on Sensor Networks …, 2020 - dl.acm.org
Continuous authentication monitors the security of a system throughout the login session on
mobile devices. In this article, we present SCANet, a two-stream convolutional neural …

Using data augmentation in continuous authentication on smartphones

Y Li, H Hu, G Zhou - IEEE Internet of Things Journal, 2018 - ieeexplore.ieee.org
As personal computing platforms, smartphones are commonly used to store private,
sensitive, and security information, such as photographs, emails, and Android Pay. To …

Continuous authentication of smartphone users by fusing typing, swiping, and phone movement patterns

R Kumar, VV Phoha, A Serwadda - 2016 IEEE 8th international …, 2016 - ieeexplore.ieee.org
We studied the fusion of three biometric authentication modalities, namely, swiping gestures,
typing patterns and the phone movement patterns observed during typing or swiping. A web …