35 research outputs found

    Credential hardening by using touchstroke dynamics

    Get PDF
    Today, reliance on digital devices for daily routines has been shifted towards portable mobile devices. Therefore, the need for security enhancements within this platform is imminent. Numerous research works have been performed on strengthening password authentication by using keystroke dynamics biometrics, which involve computer keyboards and cellular phones as input devices. Nevertheless, experiments performed specifically on touch screen devices are relatively lacking. This paper describes a novel technique to strengthen security authentication systems on touch screen devices via a new sub variant behavioural biometrics called touchstroke dynamics. We capitalize on the high resolution timing latency and the pressure information on touch screen panel as feature data. Following this a light weight algorithm is introduced to calculate the similarity between feature vectors. In addition, a fusion approach is proposed to enhance the overall performance of the system to an equal error rate of 7.71% (short input) and 6.27% (long input)

    Game authentication based on behavior pattern

    Get PDF

    Privacy-Protecting Techniques for Behavioral Data: A Survey

    Get PDF
    Our behavior (the way we talk, walk, or think) is unique and can be used as a biometric trait. It also correlates with sensitive attributes like emotions. Hence, techniques to protect individuals privacy against unwanted inferences are required. To consolidate knowledge in this area, we systematically reviewed applicable anonymization techniques. We taxonomize and compare existing solutions regarding privacy goals, conceptual operation, advantages, and limitations. Our analysis shows that some behavioral traits (e.g., voice) have received much attention, while others (e.g., eye-gaze, brainwaves) are mostly neglected. We also find that the evaluation methodology of behavioral anonymization techniques can be further improved

    Identifying Comparison and Selection Criteria for Authentication Schemes and Methods

    Get PDF
    Multiple techniques exist for performing authentication such as text passwords and smart cards. Multi-factor authentication combines two or more of these techniques in order to enhance security. It is of interest to know what the current research on these authentication techniques is and what comparison and selection criteria exist that help in the decision of these techniques. A systematic literature review is performed in order to obtain the desired knowledge. Moreover, the found comparison and selection criteria are analyzed and organized in order to generate a list of criteria that can be used to help in the decision of authentication techniques in different situations. The results of this research help to cover the gap in literature that could be observed through literature, which is the lack of works that focus on the comparison and selection of authentication techniques.Sociedad Argentina de Informática e Investigación Operativ

    Identifying Comparison and Selection Criteria for Authentication Schemes and Methods

    Get PDF
    Multiple techniques exist for performing authentication such as text passwords and smart cards. Multi-factor authentication combines two or more of these techniques in order to enhance security. It is of interest to know what the current research on these authentication techniques is and what comparison and selection criteria exist that help in the decision of these techniques. A systematic literature review is performed in order to obtain the desired knowledge. Moreover, the found comparison and selection criteria are analyzed and organized in order to generate a list of criteria that can be used to help in the decision of authentication techniques in different situations. The results of this research help to cover the gap in literature that could be observed through literature, which is the lack of works that focus on the comparison and selection of authentication techniques.Sociedad Argentina de Informática e Investigación Operativ

    Biometric Systems

    Get PDF
    Biometric authentication has been widely used for access control and security systems over the past few years. The purpose of this book is to provide the readers with life cycle of different biometric authentication systems from their design and development to qualification and final application. The major systems discussed in this book include fingerprint identification, face recognition, iris segmentation and classification, signature verification and other miscellaneous systems which describe management policies of biometrics, reliability measures, pressure based typing and signature verification, bio-chemical systems and behavioral characteristics. In summary, this book provides the students and the researchers with different approaches to develop biometric authentication systems and at the same time includes state-of-the-art approaches in their design and development. The approaches have been thoroughly tested on standard databases and in real world applications

    Identifying Comparison and Selection Criteria for Authentication Schemes and Methods

    Get PDF
    Multiple techniques exist for performing authentication such as text passwords and smart cards. Multi-factor authentication combines two or more of these techniques in order to enhance security. It is of interest to know what the current research on these authentication techniques is and what comparison and selection criteria exist that help in the decision of these techniques. A systematic literature review is performed in order to obtain the desired knowledge. Moreover, the found comparison and selection criteria are analyzed and organized in order to generate a list of criteria that can be used to help in the decision of authentication techniques in different situations. The results of this research help to cover the gap in literature that could be observed through literature, which is the lack of works that focus on the comparison and selection of authentication techniques.Sociedad Argentina de Informática e Investigación Operativ

    Identification of Persons and Several Demographic Features based on Motion Analysis of Various Daily Activities using Wearable Sensors

    Full text link
    In recent years, there has been an increasing interest in using the capabilities of wearable sensors, including accelerometers, gyroscopes and magnetometers, to recognize individuals while undertaking a set of normal daily activities. The past few years have seen considerable research exploring person recognition using wearable sensing devices due to its significance in different applications, including security and human-computer interaction applications. This thesis explores the identification of subjects and related multiple biometric demographic attributes based on the motion data of normal daily activities gathered using wearable sensor devices. First, it studies the recognition of 18 subjects based on motion data of 20 daily living activities using six wearable sensors affixed to different body locations. Next, it investigates the task of classifying various biometric demographic features: age, gender, height, and weight based on motion data of various activities gathered using two types of accelerometers and one gyroscope wearable sensors. Initially, different significant parameters that impact the subjects' recognition success rates are investigated. These include studying the performance of the three sensor sources: accelerometer, gyroscope, and magnetometer, and the impact of their combinations. Furthermore, the impact of the number of different sensors mounted at different body positions and the best body position to mount sensors are also studied. Next, the analysis also explored which activities are more suitable for subject recognition, and lastly, the recognition success rates and mutual confusion among individuals. In addition, the impact of several fundamental factors on the classification performance of different demographic features using motion data collected from three sensors is studied. Those factors include the performance evaluation of feature-set extracted from both time and frequency domains, feature selection, individual sensor sources and multiple sources. The key findings are: (I) Features extracted from all three sensor sources provide the highest accuracy of subjects recognition. (2) The recognition accuracy is affected by the body position and the number of sensors. Ankle, chest, and thigh positions outperform other positions in terms of the recognition accuracy of subjects. There is a depreciating association between the subject classification accuracy and the number of sensors used. (3) Sedentary activities such as watching tv, texting on the phone, writing with a pen, and using pc produce higher classification results and distinguish persons efficiently due to the absence of motion noise in the signal. (4) Identifiability is not uniformly distributed across subjects. (5) According to the classification results of considered biometric features, both full and selected features-set derived from all three sources of two accelerometers and a gyroscope sensor provide the highest classification accuracy of all biometric features compared to features derived from individual sensors sources or pairs of sensors together. (6) Under all configurations and for all biometric features classified; the time-domain features examined always outperformed the frequency domain features. Combining the two sets led to no increase in classification accuracy over time-domain alone

    Automatic signature verification system

    Get PDF
    Philosophiae Doctor - PhDIn this thesis, we explore dynamic signature verification systems. Unlike other signature models, we use genuine signatures in this project as they are more appropriate in real world applications. Signature verification systems are typical examples of biometric devices that use physical and behavioral characteristics to verify that a person really is who he or she claims to be. Other popular biometric examples include fingerprint scanners and hand geometry devices. Hand written signatures have been used for some time to endorse financial transactions and legal contracts although little or no verification of signatures is done. This sets it apart from the other biometrics as it is well accepted method of authentication. Until more recently, only hidden Markov models were used for model construction. Ongoing research on signature verification has revealed that more accurate results can be achieved by combining results of multiple models. We also proposed to use combinations of multiple single variate models instead of single multi variate models which are currently being adapted by many systems. Apart from these, the proposed system is an attractive way for making financial transactions more secure and authenticate electronic documents as it can be easily integrated into existing transaction procedures and electronic communication
    corecore