Security, privacy, and usability in continuous authentication: A survey

AF Baig, S Eskeland - Sensors, 2021 - mdpi.com
Continuous authentication has been proposed as a possible approach for passive and
seamless user authentication, using sensor data comprising biometric, behavioral, and …

Deep Learning and Machine Learning, Better Together Than Apart: A Review on Biometrics Mobile Authentication

S Kokal, M Vanamala, R Dave - Journal of Cybersecurity and Privacy, 2023 - mdpi.com
Throughout the past several decades, mobile devices have evolved in capability and
popularity at growing rates while improvement in security has fallen behind. As smartphones …

Camera-based blink detection using 3d-landmarks

D Kraft, F Hartmann, G Bieber - … of the 7th International Workshop on …, 2022 - dl.acm.org
Working in front of the computer for long periods of time leads to exhaustion, fatigue and
high strain on the eyes. Often the natural eye blink activity is disturbed and the eyes do not …

Stratification of eye gaze using the proposed convolution neural network model

P Shourie, A Sharma, V Anand… - … Conference on Innovative …, 2023 - ieeexplore.ieee.org
Humans mostly use their eyes to perceive the outside environment. Human-computer
interaction is a typical application for eye gaze monitoring. It is becoming more and more …

WoX+: A meta-model-driven approach to mine user habits and provide continuous authentication in the smart city

L Mainetti, P Panarese, R Vergallo - Sensors, 2022 - mdpi.com
The literature is rich in techniques and methods to perform Continuous Authentication (CA)
using biometric data, both physiological and behavioral. As a recent trend, less invasive …

A comprehensive review on secure biometric-based continuous authentication and user profiling

S Ayeswarya, KJ Singh - IEEE Access, 2024 - ieeexplore.ieee.org
Authentication systems are pivotal in fortifying security measures against unauthorized
access. Yet, they often fall short of effectively combating impersonation attacks, leaving …

A systematic survey on examinees identity authentication in online distant exams

G Saleh, G Tharwat… - Journal of Al-Azhar …, 2023 - jaes.journals.ekb.eg
The COVID-19 pandemic has changed the lifestyle in global education systems in favor of
more reliance on e-learning, which is believed to be a change that will continue. Exams are …

Response Surface Methodology to Optimize the Screen Brightness and Duration of Laptop Usage Based on the Eye Blink Rate

K Agrawal, R Jain - 2023 World Conference on …, 2023 - ieeexplore.ieee.org
During the lockdown caused by the COVID-19 pandemic, the average screen time of a
person saw a drastic increase. Laptops and personal computers were used throughout the …

A survey on smartphone protecting identification against attacks using biometric authentication systems

M Said, K Mohamed, A Elshenawy… - Journal of Al-Azhar …, 2021 - journals.ekb.eg
Recently, a lot of Biometric Authentication Systems (BAS) techniques for the purpose of
security in both industrial and academic organizations because it improves the …

A User-Centric Continuous Authentication Modality Evaluation and Selection Scheme

BR Senthilkumar - 2024 - search.proquest.com
One of one-time authentication's most prominent vulnerabilities is the possibility of lunchtime
attacks. In such scenarios, an adversary could exploit an unattended device with an active …