2015
DOI: 10.1016/j.cose.2015.06.001
|View full text |Cite
|
Sign up to set email alerts
|

Continuous user authentication using multi-modal biometrics

Abstract: As modern mobile devices increase in their capability and accessibility, they introduce additional demands in terms of security - particularly authentication. With the widely documented poor use of PINs, Active Authentication is designed to overcome the fundamental issue of usable and secure authentication through utilizing biometric-based techniques to continuously verify user identity. This paper proposes a novel text-based multimodal biometric approach utilizing linguistic analysis, keystroke dynamics and b… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
32
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
4
1

Relationship

1
9

Authors

Journals

citations
Cited by 85 publications
(36 citation statements)
references
References 32 publications
0
32
0
Order By: Relevance
“…As shown in Figure 7, the realization processes of a biometric-based authentication scheme for smart mobile devices are based on the following processes: The write a text message using a biometric is called keystroke analysis, which can be classified as either static or continuous. To authenticate users based on the keystroke analysis, Clarke and Furnell [47] introduced the concept of advanced user authentication, which is based on three Electrocardiogram [51,52] Voice recognition [46,49,65] Signature recognition [79] Gait recognition [55] Behavior profiling [54] Fingerprint [13,27,32,35,68] Smart card [37] Multi-touch interfaces [59,60] Graphical password [74] Face recognition [46,67,76] Iris recognition [36,76] Rhythm [56,57] Capacitive touchscreen [53] Ear Shape [50] Arm gesture [50] Keystroke dynamics [64] Touch dynamics [43,58] Physical proximity [26] Electronic voting [28] Seamless roaming [25] Transitive authentication [45] Attribute-based authentication [42] User-habit-oriented authentication [57] Handover authentication [40] Two-factor [43,…”
Section: A Biometric-based Authentication Schemesmentioning
confidence: 99%
“…As shown in Figure 7, the realization processes of a biometric-based authentication scheme for smart mobile devices are based on the following processes: The write a text message using a biometric is called keystroke analysis, which can be classified as either static or continuous. To authenticate users based on the keystroke analysis, Clarke and Furnell [47] introduced the concept of advanced user authentication, which is based on three Electrocardiogram [51,52] Voice recognition [46,49,65] Signature recognition [79] Gait recognition [55] Behavior profiling [54] Fingerprint [13,27,32,35,68] Smart card [37] Multi-touch interfaces [59,60] Graphical password [74] Face recognition [46,67,76] Iris recognition [36,76] Rhythm [56,57] Capacitive touchscreen [53] Ear Shape [50] Arm gesture [50] Keystroke dynamics [64] Touch dynamics [43,58] Physical proximity [26] Electronic voting [28] Seamless roaming [25] Transitive authentication [45] Attribute-based authentication [42] User-habit-oriented authentication [57] Handover authentication [40] Two-factor [43,…”
Section: A Biometric-based Authentication Schemesmentioning
confidence: 99%
“…The experiments in this work compare individual and combined performance of the modalities for person verification. We follow the standard practice usually employed for modeling multi-biometric system when a multimodal dataset of desired modalities is not available [9,[28][29][30] (fingerprints and fingerprint dynamics in our experiment). In this scenario modalities from different datasets are combined to form virtual personalities.…”
Section: Introductionmentioning
confidence: 99%
“…Saevanee et al [20] have illustrated a text-based multimodal biometric scheme by exploiting linguistic examination, keystroke dynamics & behavioral profiling. For evolving an authentication mechanism that can give a less costly, non-intrusive & uninterrupted solution to the difficult of user authentication.…”
Section: Literature Reviewmentioning
confidence: 99%