2020
DOI: 10.1007/978-3-030-39489-9_9
|View full text |Cite
|
Sign up to set email alerts
|

Mobile Active Authentication based on Multiple Biometric and Behavioral Patterns

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
23
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 15 publications
(24 citation statements)
references
References 22 publications
0
23
0
Order By: Relevance
“…based (face recognition, fingerprint) is unobtrusive, continuous, less prone to attacks, and easily tracked through wearable devices, videos, and smartphones in the context of IoT environments. Gait-based authentication is studied either by itself (Qin et al, 2019) or as part of an authentication system that uses multiple modalities (Hintze et al, 2019) (Acien et al, 2019) (See Table 10).…”
Section: Referencementioning
confidence: 99%
See 1 more Smart Citation
“…based (face recognition, fingerprint) is unobtrusive, continuous, less prone to attacks, and easily tracked through wearable devices, videos, and smartphones in the context of IoT environments. Gait-based authentication is studied either by itself (Qin et al, 2019) or as part of an authentication system that uses multiple modalities (Hintze et al, 2019) (Acien et al, 2019) (See Table 10).…”
Section: Referencementioning
confidence: 99%
“…Authors (Acien et al, 2019) showed that the fusion with behavioral data improves the authentication system results.…”
Section: Referencementioning
confidence: 99%
“…As can be seen in the works cited above, it is common to use different kinds of data, with most authors using two or three. Reference [ 16 ] stands out for its design, where seven different kinds of data are used: Touch dynamics (touch gestures and keystroking), accelerometer, gyroscope, WiFi, GPS location, and app usage, are all collected during human-mobile interaction to authenticate the users. This system, called MultiLock, use a Support Vector Machine (SVM) with a radial basis function (RBF) kernel to perform the classification and the authors test the MultiLock system in different scenarios in the UMDAA-02 database, reporting an accuracy ranging from 82.2% to 97.1%.…”
Section: Related Workmentioning
confidence: 99%
“…The first group of related approaches uses data collected directly on the frontend side. MutliLock [8] and T.P. Thao's [9] approach address user authentication by means of biometric and behavioral features.…”
Section: Related Workmentioning
confidence: 99%