Designing reliable user authentication on mobile phones is becoming an increasingly important task to protect users' private information and data. Since biometric approaches can …
Similar to a fingerprint search system, face recognition technology can assist law enforcement agencies in identifying suspects or finding missing persons. Face recognition …
We propose BreathPrint, a new behavioural biometric signature based on audio features derived from an individual's commonplace breathing gestures. Specifically, BreathPrint uses …
H Li, P He, S Wang, A Rocha, X Jiang… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
In this paper, we propose a novel framework leveraging the advantages of the representational ability of deep learning and domain generalization for face spoofing …
Mobile devices have brought a great convenience to us these years, which allow the users to enjoy the anytime and anywhere various applications such as the online shopping …
S Chen, K Ren, S Piao, C Wang… - 2017 IEEE 37th …, 2017 - ieeexplore.ieee.org
Voice, as a convenient and efficient way of information delivery, has a significant advantage over the conventional keyboard-based input methods, especially on small mobile devices …
Y Li, H Hu, Z Zhu, G Zhou - ACM Transactions on Sensor Networks …, 2020 - dl.acm.org
Continuous authentication monitors the security of a system throughout the login session on mobile devices. In this article, we present SCANet, a two-stream convolutional neural …
Y Li, H Hu, G Zhou - IEEE Internet of Things Journal, 2018 - ieeexplore.ieee.org
As personal computing platforms, smartphones are commonly used to store private, sensitive, and security information, such as photographs, emails, and Android Pay. To …
We studied the fusion of three biometric authentication modalities, namely, swiping gestures, typing patterns and the phone movement patterns observed during typing or swiping. A web …