Few-Shot Continuous Authentication for Mobile-Based Biometrics
نویسندگان
چکیده
The rapid growth of smartphone financial services raises the need for secure mobile authentication. Continuous authentication is a user-friendly way to strengthen security smartphones by implicitly monitoring user’s identity through sessions. Mobile continuous can be viewed as an anomaly detection problem in which models discriminate between one genuine user and rest impostors (anomalies). In practice, complete impostor profiles are hardly available due time monetary cost, while leveraging data alone yields poorly generalized lack knowledge about impostors. To address this challenge, we recast few-shot problem, aiming enhance inference robustness unseen using partial profiles. Specifically, propose novel deep learning-based model, namely local feature pooling-based temporal convolution network (LFP-TCN), directly raw sequential data, aggregating global information. addition, introduce random pattern mixing augmentation generate class-unconstrained training. augmented pool enables characterizing various patterns from limited data. Finally, demonstrate practical score-level fusion, prevents long-term dependency or increased model complexity extended re-authentication time. Experiments on two public benchmark datasets show effectiveness our method its state-of-the-art performance.
منابع مشابه
Biometrics for Authentication on Mobile Devices
Mobile devices are rapidly becoming the most popular user end computing and networking device. Mobile devices are often used to access and store personal information. Due to their size and portability, they are a common target for thieves and malicious activity. Unauthorized authentication of mobile devices can result in a great deal of damage to the legitimate owner. However, securing mobile d...
متن کاملContinuous user authentication using multi-modal biometrics
As modern mobile devices increase in their capability and accessibility, they introduce additional demands in terms of security e particularly authentication. With the widely documented poor use of PINs, Active Authentication is designed to overcome the fundamental issue of usable and secure authentication through utilizing biometric-based techniques to continuously verify user identity. This p...
متن کاملContinuous User Authentication Using Multimodal Biometrics for Cloud Based Telemedicine Application
Cloud computing is the hottest topic in both the private, public and government sectors now-a-days. Cloud's efficiencies promise to save significant money for organizations and eventually consumers. Telemedicine is an important application which is recently gaining momentum on cloud. As telemedicine not only promises to dramatically reduce the costs, but at the same time it makes access to care...
متن کاملMobile Devices expand Continuous Authentication
Authentication In our personal lives we use several senses to identify or validate someone. We can acknowledge someone without checking their credentials each time. Sight, hearing and touch may all play a part of us “authenticating” others, and we’re flexible enough that if only some of our senses detect things that we are familiar with, we may still feel confident as to the identity of an indi...
متن کاملSoft Biometrics Traits for Continuous Authentication in Online Exam Using ICA Based Facial Recognition
Biometric authentication has been getting widespread attention over the past decade with growing demands in automated secured personal identification. Continuous Authentication (CA) system verifies the user continuously once a person is logged in. Continuous Authentication system prevents the intruders from invoking the system. A new framework for continuous user authentication that primarily u...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Applied sciences
سال: 2022
ISSN: ['2076-3417']
DOI: https://doi.org/10.3390/app122010365