2014 IEEE International Conference on Systems, Man, and Cybernetics (SMC) 2014
DOI: 10.1109/smc.2014.6974441
|View full text |Cite
|
Sign up to set email alerts
|

A behavioral biometric challenge and response approach to user authentication on smartphones

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 15 publications
0
3
0
Order By: Relevance
“…Challenges can vary in degree in which they are noticeable by a person. This can range from fully covert, e.g., ultrasonic sounds causing fine vibrations in the lips while speaking [16], partially covert, e.g., determining ear canal structure by playing sounds into a person's ear [17], or very overt, e.g., in the patterns drawn with a finger on a smartphone [18]. Noticeability of a challenge can have a big impact on user experience (UX).…”
Section: Noticeability Covert To Overtmentioning
confidence: 99%
“…Challenges can vary in degree in which they are noticeable by a person. This can range from fully covert, e.g., ultrasonic sounds causing fine vibrations in the lips while speaking [16], partially covert, e.g., determining ear canal structure by playing sounds into a person's ear [17], or very overt, e.g., in the patterns drawn with a finger on a smartphone [18]. Noticeability of a challenge can have a big impact on user experience (UX).…”
Section: Noticeability Covert To Overtmentioning
confidence: 99%
“…To eliminate any sensor noise and outliers, they divided the curves into small segments in a pre-processing step. Burgbacher et al [79] extracted curve segments using k-NN [52] and compute the similarity between two segments by employing Dynamic Time Warping (DTW) [65]. To evaluate this approach, the authors performed a 10-fold cross-validation.…”
Section: ) Progressivementioning
confidence: 99%
“…The varying results can be attributed to different conditions during the time of recording (e.g., distance between the user and speaker for example; if a user is talking or the device is in the pocket), and background noise such as noise from air conditioner and keyboard typing. 9) Authentication based on Curve Training: Burgbacher et al [79] introduced a method that gathers information from users as they trace curves. First, the approach randomly generated 19 curves where the starting and ending points were shown to indicate the trace direction.…”
Section: ) Authenticating Using Keystroke Dynamics and Fingermentioning
confidence: 99%