Towards usable authentication on mobile phones: An evaluation of speaker and face recognition on off-the-shelf handsets
نویسندگان
چکیده
Authenticating users on mobile devices is particularly challenging because of usability concerns: authentication must be quick and as unobtrusive as possible. Therefore, biometric methods seem well suited for mobile phones. We evaluate both speaker and face recognition methods on offthe-shelf mobile devices concerning their accuracy, suitability for dealing with low-quality recordings, and running with limited resources. Our results show that speaker and face recognition can realistically be used on mobile phones, but that improvements – e.g. in the form of combining multiple methods – are still necessary and subject to future work.
منابع مشابه
An Approach towards Promoting Iranian Caregivers’ Knowledge on Early Childhood Development
Background: According to the World Health Organization (WHO), parents need to be informed about Early Childhood Development (ECD). Different methods of parents’ education include group-based, face-to-face, book, booklet, web-based, technology-based, and mobile learning using laptops, tablets, and cell phones. Paying attention to caregivers' attitudes is the first step to their education. The ob...
متن کاملEvaluation of the Interference of the Microwave Radiation Emitted from GSM Mobile Phones on the Performance of Cell Counters
Abstract Background and Objectives: Incidents related to electromagnetic interference with medical devices have been reported over the past decades. It has also been indicated that the microwave radiation emitted from mobile phones interferes with the operation of medical devices therefore, this study aimed at testing the interference by GSM mobile phones with cell counters. Material and Method...
متن کامللبخوانی: روش جدید احراز هویت در برنامههای کاربردی گوشیهای تلفن همراه اندروید
Today, mobile phones are one of the first instruments every individual person interacts with. There are lots of mobile applications used by people to achieve their goals. One of the most-used applications is mobile banks. Security in m-bank applications is very important, therefore modern methods of authentication is required. Most of m-bank applications use text passwords which can be stolen b...
متن کاملUsing Keystroke Analysis as a Mechanism for Subscriber Authentication on Mobile Handsets
The mobile communications industry will experience an evolutionary step within the next two years with the introduction of third generation mobile networks, completing the handset transition from a purely telephony device of the first generation analogue networks into a multimedia multi-purpose mobile communications tool. The ability of these new handsets to store and access sensitive informati...
متن کاملImplementation of Fast Face Detection Algorithms for Mobile Phones
Network access control using face recognition increases the user-friendliness in mobile phones and human-computer interaction. In order to realize a real time system implemented on handheld devices with low computing power, low complexity algorithms for face detection are required. This paper introduces a fast algorithm for face detection in video sequences, using a skin color model in the HSV ...
متن کامل