2014 IEEE Conference on Computer Vision and Pattern Recognition Workshops 2014
DOI: 10.1109/cvprw.2014.20
|View full text |Cite
|
Sign up to set email alerts
|

Context-Aware Active Authentication Using Smartphone Accelerometer Measurements

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
59
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 99 publications
(59 citation statements)
references
References 17 publications
0
59
0
Order By: Relevance
“…Active authentication systems deal with this issue by continuously monitoring the user identity after the initial access has been granted. Examples include systems based on screen touch gestures [63], gait recognition [64], and device movement patterns (as measured by the accelerometer) [65]. The development of cancelable active authentication systems is a nascent area of research.…”
Section: Discussionmentioning
confidence: 99%
“…Active authentication systems deal with this issue by continuously monitoring the user identity after the initial access has been granted. Examples include systems based on screen touch gestures [63], gait recognition [64], and device movement patterns (as measured by the accelerometer) [65]. The development of cancelable active authentication systems is a nascent area of research.…”
Section: Discussionmentioning
confidence: 99%
“…In Vera‐Rodriguez et al they use floor sensor–based scheme to identify a single‐target person and accomplish 90% to 97.5% accuracy. Wearable devices like smart mobiles and watches were used for collect gait information to human recognition . In Sprager and Zazula, they use over six human subjects' data in a wearable sensor‐based scheme and accomplish 90% accuracy.…”
Section: Related Workmentioning
confidence: 99%
“…In these examples, the difference in authentication accuracy was evaluated in specific usage environments, namely, different holding positions; however, the idea of the context awareness shown in [12], where an authentication algorithm is adjusted in accordance with a user's context, has still yet to be reached. Some examples of authentication algorithms that consider context awareness are shown in [17], [18]. Primo et al [18] focused on 55 features that can be obtained from an accelerometer on a smartphone and clarified the effective features corresponding to the holding positions of the smartphone and showed that highly reliable authentication can be achieved by selecting the appropriate features for each holding position.…”
Section: Related Workmentioning
confidence: 99%
“…Some examples of authentication algorithms that consider context awareness are shown in [17], [18]. Primo et al [18] focused on 55 features that can be obtained from an accelerometer on a smartphone and clarified the effective features corresponding to the holding positions of the smartphone and showed that highly reliable authentication can be achieved by selecting the appropriate features for each holding position. Moreover, Hayashi et al [17] proposed a scheme for selecting an appropriate authentication method to meet security demands.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation