Mobile behavioral biometrics for passive authentication
نویسندگان
چکیده
• We present a first benchmark of HuMIdb, publicly available HCI database. evaluate touchscreen and background sensor data for mobile passive authentication. train recurrent neural network with triplet loss each individual modality. A multimodal system is achieved through the fusion modalities at score level. Our results show suitability behavioral biometrics Current user authentication systems based on PIN codes, fingerprint, face recognition have several shortcomings. Such limitations been addressed in literature by exploring feasibility devices biometrics. In this line research, work carries out comparative analysis unimodal biometric traits acquired while subjects perform different activities phone such as typing, scrolling, drawing number, tapping screen, considering simultaneous (accelerometer, gravity sensor, gyroscope, linear accelerometer, magnetometer). experiments are performed over 1 https://github.com/BiDAlab/HuMIdb one largest most comprehensive freely interaction databases to date. separate Recurrent Neural Network (RNN) implemented single Then, weighted carried our experiments, discriminative magnetometer, whereas among touch tasks best keystroke fixed-text scenario. all cases, very beneficial, leading Equal Error Rates (EER) ranging from 4% 9% depending modality combination 3-second interval.
منابع مشابه
Behavioral Biometrics for Smartphone User Authentication
Pervasive in nature and extensively used for a wide range of features, smartphone provides functionality such as social networking, online shopping, mobile gaming, private/group communication, etc. While using these services, a user has to provide private information such as account credentials, credit card details, etc., which are then stored on the device. This information, if lost, can resul...
متن کاملBiometrics for Authentication on Mobile Devices
Mobile devices are rapidly becoming the most popular user end computing and networking device. Mobile devices are often used to access and store personal information. Due to their size and portability, they are a common target for thieves and malicious activity. Unauthorized authentication of mobile devices can result in a great deal of damage to the legitimate owner. However, securing mobile d...
متن کاملAuthentication Based on Context and Behavioral Biometrics
Safelayer Secure Communications S.A. is a solution manufacturer of multi-factor authentication, PKI authentication and electronic signature C/ Basauri, 17 Edif. Valrealty Edif. B Pl. Baja Izq. 28023 Madrid World Trade Center (Edif. S-4), Moll de Barcelona S/N 08039 Barcelona +34 917080480 – Safelayer.com © C op yr ig ht 1 99 920 13 S af el ay er S ec ur e C om m un ic at io ns , S .A . A ll br ...
متن کاملUser identification and authentication using multi-modal behavioral biometrics
Biometric computer authentication has an advantage over password and access card authentication in that it is based on something you are, which is not easily copied or stolen. One way of performing biometric computer authentication is to use behavioral tendencies associated with how a user interacts with the computer. However, behavioral biometric authentication accuracy rates are worse than mo...
متن کاملVoice Biometrics for User Authentication
Voice biometrics for user authentication is a task in which the goal is to perform convenient, robust and secure authentication of speakers. In this work we investigate the use of state-of-theart text-independent and text-dependent speaker verification technology for user authentication. We evaluate three different authentication conditions: global digit strings, speaker specific digit stings a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Pattern Recognition Letters
سال: 2022
ISSN: ['1872-7344', '0167-8655']
DOI: https://doi.org/10.1016/j.patrec.2022.03.014