7 research outputs found
A robustness verification system for mobile phone authentication based on gestures using Linear Discriminant Analysis
This article evaluates an authentication technique for mobiles based on gestures. Users create a remindful identifying gesture to be considered as their in-air signature. This work analyzes a database of 120 gestures of different vulnerability, obtaining an Equal Error Rate (EER) of 9.19% when robustness of gestures is not verified. Most of the errors in this EER come from very simple and easily forgeable gestures that should be discarded at enrollment phase. Therefore, an in-air signature robustness verification system using Linear Discriminant Analysis is proposed to infer automatically whether the gesture is secure or not. Different configurations have been tested obtaining a lowest EER of 4.01% when 45.02% of gestures were discarded, and an optimal compromise of EER of 4.82% when 19.19% of gestures were automatically rejected
Authentication in mobile devices through hand gesture recognition
This article proposes an innovative biometric technique based on the idea of authenticating a person on a mobile device by gesture recognition. To accomplish this aim, a user is prompted to be recognized by a gesture he/she performs moving his/her hand while holding a mobile device with an accelerometer embedded. As users are not able to repeat a gesture exactly in the air, an algorithm based on sequence alignment is developed to correct slight differences between repetitions of the same gesture. The robustness of this biometric technique has been studied within 2 different tests analyzing a database of 100 users with real falsifications. Equal Error Rates of 2.01 and 4.82% have been obtained in a zero-effort and an active impostor attack, respectively. A permanence evaluation is also presented from the analysis of the repetition of the gestures of 25 users in 10 sessions over a month. Furthermore, two different gesture databases have been developed: one made up of 100 genuine identifying 3-D hand gestures and 3 impostors trying to falsify each of them and another with 25 volunteers repeating their identifying 3- D hand gesture in 10 sessions over a month. These databases are the most extensive in published studies, to the best of our knowledge
Authentification automatique du propriĂ©taire dâun tĂ©lĂ©phone mobile
Lâutilisation de pĂ©riphĂ©riques mobiles tels que les tĂ©lĂ©phones intelligents et les tablettes connaissent une croissance exponentielle depuis 2007. De plus, ceux-ci tendent Ă ĂȘtre considĂ©rĂ©s comme un Ă©lĂ©ment indispensable dans le quotidien de leurs utilisateurs. Cette Ă©volution des comportements encourage la sauvegarde de donnĂ©es qui relĂšvent de plus en plus de la vie privĂ©e, directement au sein de ces dispositifs. De par leur diversitĂ© (contenu multimĂ©dia, courriels, identifiants de connexion, etc.) ainsi que de leur niveau de confidentialitĂ©, il est impĂ©ratif que ces donnĂ©es soient protĂ©gĂ©es. Le processus dâauthentification nĂ©cessaire pour accĂ©der au contenu du pĂ©riphĂ©rique mobile demeure la premiĂšre barriĂšre de sĂ©curitĂ© pour assurer la confidentialitĂ© des donnĂ©es. En effet, seul son propriĂ©taire doit ĂȘtre en mesure de valider ce processus. En ce sens, les appareils mobiles proposent, depuis leur crĂ©ation, un ensemble grandissant de mĂ©thodes offrant alors Ă lâutilisateur la possibilitĂ© de protĂ©ger leur accĂšs (NumĂ©ros dâIdentification Personnel ou NIP, mot de passe, modĂšles graphiques, biomĂ©trie, etc.). La mise en place dâun tel processus est laissĂ©e Ă la charge du propriĂ©taire et nâest que rarement imposĂ©e par le systĂšme. Câest pourquoi, il est possible dâobserver quâencore beaucoup dâutilisateurs nâappliquent aucune mĂ©thode dâauthentification Ă leur dispositif. Bien quâune grande majoritĂ© dâentre eux ne soit pas bien informĂ©s des risques engendrĂ©s par ces comportements, les mĂ©thodes qui sont actuellement proposĂ©es Ă©prouvent Ă©galement divers inconvĂ©nients. En effet, certains de ces processus fournissent un trop faible niveau de sĂ©curitĂ© ce qui les rend alors facilement contournables. De plus, le processus dâauthentification est une tĂąche extrĂȘmement redondante (Ă©valuĂ©e Ă 150 rĂ©alisations quotidiennes) et certaines mĂ©thodes encore trĂšs populaires admettent un processus intellectuellement trop lourd pour les utilisateurs. Dans le cadre de ce mĂ©moire, nous explorons les possibilitĂ©s dâun systĂšme dâauthentification centrĂ© sur lâutilisateur tout en conservant le niveau de sĂ©curitĂ© nĂ©cessaire pour la protection des donnĂ©es. En se basant sur lâutilisation quotidienne du smartphone, un modĂšle dâauthentification, qui allie sĂ©curitĂ© et utilisabilitĂ©, est proposĂ©. Le modĂšle est ensuite implĂ©mentĂ© sur Android
Recent Application in Biometrics
In the recent years, a number of recognition and authentication systems based on biometric measurements have been proposed. Algorithms and sensors have been developed to acquire and process many different biometric traits. Moreover, the biometric technology is being used in novel ways, with potential commercial and practical implications to our daily activities. The key objective of the book is to provide a collection of comprehensive references on some recent theoretical development as well as novel applications in biometrics. The topics covered in this book reflect well both aspects of development. They include biometric sample quality, privacy preserving and cancellable biometrics, contactless biometrics, novel and unconventional biometrics, and the technical challenges in implementing the technology in portable devices. The book consists of 15 chapters. It is divided into four sections, namely, biometric applications on mobile platforms, cancelable biometrics, biometric encryption, and other applications. The book was reviewed by editors Dr. Jucheng Yang and Dr. Norman Poh. We deeply appreciate the efforts of our guest editors: Dr. Girija Chetty, Dr. Loris Nanni, Dr. Jianjiang Feng, Dr. Dongsun Park and Dr. Sook Yoon, as well as a number of anonymous reviewers