7 research outputs found

    A robustness verification system for mobile phone authentication based on gestures using Linear Discriminant Analysis

    Get PDF
    This article evaluates an authentication technique for mobiles based on gestures. Users create a remindful identifying gesture to be considered as their in-air signature. This work analyzes a database of 120 gestures of different vulnerability, obtaining an Equal Error Rate (EER) of 9.19% when robustness of gestures is not verified. Most of the errors in this EER come from very simple and easily forgeable gestures that should be discarded at enrollment phase. Therefore, an in-air signature robustness verification system using Linear Discriminant Analysis is proposed to infer automatically whether the gesture is secure or not. Different configurations have been tested obtaining a lowest EER of 4.01% when 45.02% of gestures were discarded, and an optimal compromise of EER of 4.82% when 19.19% of gestures were automatically rejected

    Biometrics on mobile phone

    Get PDF

    Authentication in mobile devices through hand gesture recognition

    Get PDF
    This article proposes an innovative biometric technique based on the idea of authenticating a person on a mobile device by gesture recognition. To accomplish this aim, a user is prompted to be recognized by a gesture he/she performs moving his/her hand while holding a mobile device with an accelerometer embedded. As users are not able to repeat a gesture exactly in the air, an algorithm based on sequence alignment is developed to correct slight differences between repetitions of the same gesture. The robustness of this biometric technique has been studied within 2 different tests analyzing a database of 100 users with real falsifications. Equal Error Rates of 2.01 and 4.82% have been obtained in a zero-effort and an active impostor attack, respectively. A permanence evaluation is also presented from the analysis of the repetition of the gestures of 25 users in 10 sessions over a month. Furthermore, two different gesture databases have been developed: one made up of 100 genuine identifying 3-D hand gestures and 3 impostors trying to falsify each of them and another with 25 volunteers repeating their identifying 3- D hand gesture in 10 sessions over a month. These databases are the most extensive in published studies, to the best of our knowledge

    Authentification automatique du propriĂ©taire d’un tĂ©lĂ©phone mobile

    Get PDF
    L’utilisation de pĂ©riphĂ©riques mobiles tels que les tĂ©lĂ©phones intelligents et les tablettes connaissent une croissance exponentielle depuis 2007. De plus, ceux-ci tendent Ă  ĂȘtre considĂ©rĂ©s comme un Ă©lĂ©ment indispensable dans le quotidien de leurs utilisateurs. Cette Ă©volution des comportements encourage la sauvegarde de donnĂ©es qui relĂšvent de plus en plus de la vie privĂ©e, directement au sein de ces dispositifs. De par leur diversitĂ© (contenu multimĂ©dia, courriels, identifiants de connexion, etc.) ainsi que de leur niveau de confidentialitĂ©, il est impĂ©ratif que ces donnĂ©es soient protĂ©gĂ©es. Le processus d’authentification nĂ©cessaire pour accĂ©der au contenu du pĂ©riphĂ©rique mobile demeure la premiĂšre barriĂšre de sĂ©curitĂ© pour assurer la confidentialitĂ© des donnĂ©es. En effet, seul son propriĂ©taire doit ĂȘtre en mesure de valider ce processus. En ce sens, les appareils mobiles proposent, depuis leur crĂ©ation, un ensemble grandissant de mĂ©thodes offrant alors Ă  l’utilisateur la possibilitĂ© de protĂ©ger leur accĂšs (NumĂ©ros d’Identification Personnel ou NIP, mot de passe, modĂšles graphiques, biomĂ©trie, etc.). La mise en place d’un tel processus est laissĂ©e Ă  la charge du propriĂ©taire et n’est que rarement imposĂ©e par le systĂšme. C’est pourquoi, il est possible d’observer qu’encore beaucoup d’utilisateurs n’appliquent aucune mĂ©thode d’authentification Ă  leur dispositif. Bien qu’une grande majoritĂ© d’entre eux ne soit pas bien informĂ©s des risques engendrĂ©s par ces comportements, les mĂ©thodes qui sont actuellement proposĂ©es Ă©prouvent Ă©galement divers inconvĂ©nients. En effet, certains de ces processus fournissent un trop faible niveau de sĂ©curitĂ© ce qui les rend alors facilement contournables. De plus, le processus d’authentification est une tĂąche extrĂȘmement redondante (Ă©valuĂ©e Ă  150 rĂ©alisations quotidiennes) et certaines mĂ©thodes encore trĂšs populaires admettent un processus intellectuellement trop lourd pour les utilisateurs. Dans le cadre de ce mĂ©moire, nous explorons les possibilitĂ©s d’un systĂšme d’authentification centrĂ© sur l’utilisateur tout en conservant le niveau de sĂ©curitĂ© nĂ©cessaire pour la protection des donnĂ©es. En se basant sur l’utilisation quotidienne du smartphone, un modĂšle d’authentification, qui allie sĂ©curitĂ© et utilisabilitĂ©, est proposĂ©. Le modĂšle est ensuite implĂ©mentĂ© sur Android

    Recent Application in Biometrics

    Get PDF
    In the recent years, a number of recognition and authentication systems based on biometric measurements have been proposed. Algorithms and sensors have been developed to acquire and process many different biometric traits. Moreover, the biometric technology is being used in novel ways, with potential commercial and practical implications to our daily activities. The key objective of the book is to provide a collection of comprehensive references on some recent theoretical development as well as novel applications in biometrics. The topics covered in this book reflect well both aspects of development. They include biometric sample quality, privacy preserving and cancellable biometrics, contactless biometrics, novel and unconventional biometrics, and the technical challenges in implementing the technology in portable devices. The book consists of 15 chapters. It is divided into four sections, namely, biometric applications on mobile platforms, cancelable biometrics, biometric encryption, and other applications. The book was reviewed by editors Dr. Jucheng Yang and Dr. Norman Poh. We deeply appreciate the efforts of our guest editors: Dr. Girija Chetty, Dr. Loris Nanni, Dr. Jianjiang Feng, Dr. Dongsun Park and Dr. Sook Yoon, as well as a number of anonymous reviewers
    corecore