Combining Hardwaremetry and Biometry for Human Authentication via Smartphones

نویسندگان

  • Chiara Galdi
  • Michele Nappi
  • Jean-Luc Dugelay
چکیده

The role of smartphones in our life is ever-increasing. They are used to store and share sensitive data and to perform security critical operation online e.g. home banking transaction or shopping. This leads to the need for a more secure authentication process via mobile phones. Biometrics could be the solution but biometric authentication systems via mobile devices presented so far still do not provide a good trade-off between ease of use and high security level. In this paper we analyze the combination of sensor recognition (hardwaremetry) and iris recognition (biometry) in order to provide a double check of user’s identity in one shot, i.e. a single photo of the eye captured by the Smartphone, without the need of additional or dedicated sensors. To the best of our knowledge, this is the first attempt to combine these two aspects.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Answering Incoming Call for Implicit Authentication Using Smartphone

Smartphones are being used to keep sensitive data and make private transaction other than making calls and receive short messages. Thus, authentication of the smartphones becomes very crucial and important aspect. However, users feel inconvenience and difficult with current authentication methods, from password up to physical biometrics. Implicit authentication system emerged intending to impro...

متن کامل

Biometrics and Security in Smartphones

In this paper we look at the significance of biometrics, specifically fingerprint readers which have been implemented into smartphones, primarily the iPhone 5S. The security of the technology is presented and analyzed while the security breaches and hacks are demonstrated in detail. We look at secure options in Android vs. iOS. And we also look at the future of biometrics and soon to be wearabl...

متن کامل

Biometric Authentication Methods on Smartphones: A Survey

Nowadays, users are starting to develop a symbiotic bound with their smartphones. Users continuously carry these devices and use them for daily communication activities and social network interactions. On the other hand, a smartphone is equipped with sensors that can infer not only information about the context (e.g., location), but also about its owner. Since smartphones handle a huge amount o...

متن کامل

A Distributed Authentication Model for an E-Health Network Using Blockchain

Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...

متن کامل

A Distributed Authentication Model for an E-Health Network Using Blockchain

Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015