2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS) 2013
DOI: 10.1109/btas.2013.6712742
|View full text |Cite
|
Sign up to set email alerts
|

Secure privacy-preserving protocols for outsourcing continuous authentication of smartphone users with touch data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
24
0
2

Year Published

2014
2014
2024
2024

Publication Types

Select...
6
2
1

Relationship

2
7

Authors

Journals

citations
Cited by 27 publications
(37 citation statements)
references
References 16 publications
0
24
0
2
Order By: Relevance
“…SVM performed well in experiments on touch-based authentication of smartphone users by Serwadda et al [53]. SE is a popular verifier in biometrics (see for example [7], [28]).…”
Section: Evaluation Of Hmog Featuresmentioning
confidence: 91%
“…SVM performed well in experiments on touch-based authentication of smartphone users by Serwadda et al [53]. SE is a popular verifier in biometrics (see for example [7], [28]).…”
Section: Evaluation Of Hmog Featuresmentioning
confidence: 91%
“…Software based authentication basically relies on the unique characteristics of the software programs or protocols running on the devices [25,9], whereas hardware based authentication leverages the unique hardware traits such as channel-invariant radiometric [3,23] and clock skews [18,13] to identify users. Biometric and physicaltrait based authentication relies on the behavioral modalities including on-screen touch and finger movement patterns [8,20]. And channel-signature based authentication schemes are proposed to use either Received Signal Strength (RSS) [29,6,30,32,15] or Channel Impulse Response (CIR) [26,21] to identify users.…”
Section: Related Workmentioning
confidence: 99%
“…To compute the FAR, one must first set a classification threshold based on which a given sample is accepted or rejected by the system. We use the EER threshold, as it is widely used in behavioral biometrics in general and in touch-based authentication in particular (e.g., see Frank et al [2013], Killourhy and Maxion [2009], and Govindarajan et al [2013]). The EER is the error rate of an authentication system when the FAR equals the FRR; the EER threshold is the verification score at which the EER is obtained.…”
Section: Performance Evaluation Approachmentioning
confidence: 99%
“…The zero-effort attack-a form of impostor attack in which a given user's samples are used to test another user's biometric template (without any forgery whatsoever)-is the defacto performance evaluation method for touch-based authentication systems on smart phones and other touch input devices (e.g., see Govindarajan et al [2013], Alexander et al [2012], Feng et al [2012], and Frank et al [2013]). In this article, we argue that this kind of attack majorly underestimates the magnitude of the threat that a touch-based authentication system could face in practice.…”
Section: Introductionmentioning
confidence: 99%