2021
DOI: 10.1016/j.patrec.2021.04.013
|View full text |Cite
|
Sign up to set email alerts
|

SmartCAMPP - Smartphone-based continuous authentication leveraging motion sensors with privacy preservation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
10
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 19 publications
(14 citation statements)
references
References 20 publications
0
10
0
Order By: Relevance
“…In the context of user biometric authentication, both ML and DL have been shown to be useful tools. Both techniques have produced good results when using different biometric features, including: (1) behavioral characteristics with gyroscopes, accelerometers, and magnetometers [ 7 , 8 ], (2) physical attributes such as facial [ 9 ], ocular [ 10 ], or fingerprint [ 11 ] recognition, and (3) physiological signals such as electroencephalograms (EEG) [ 12 ] or electrocardiograms [ 13 ]. It is important to note the difference between the user identification problem and the user authentication problem.…”
Section: Introductionmentioning
confidence: 99%
“…In the context of user biometric authentication, both ML and DL have been shown to be useful tools. Both techniques have produced good results when using different biometric features, including: (1) behavioral characteristics with gyroscopes, accelerometers, and magnetometers [ 7 , 8 ], (2) physical attributes such as facial [ 9 ], ocular [ 10 ], or fingerprint [ 11 ] recognition, and (3) physiological signals such as electroencephalograms (EEG) [ 12 ] or electrocardiograms [ 13 ]. It is important to note the difference between the user identification problem and the user authentication problem.…”
Section: Introductionmentioning
confidence: 99%
“…Although the current methods based on traditional machine learning or deep learning have made some exciting progress, they still suffer some limitations. First, sensory data from impostors (negative samples) are needed to train the continuous authentication model (binary classification or multi-classification) [1,6,11,12,15,21,39,47], since the distribution of negative training data from diverse attackers are unknown, it is a difficult problem to solve in a real-world scenario. Besides, sharing of other smartphone users' biometric data (negative samples) may lead to the leakage of biometric data.…”
Section: Introductionmentioning
confidence: 99%
“…These channels have been demonstrated in several studies to be vulnerable and leak the information of the patients [37,38]. Especially harmful is the scenario in which the transmitted data are not encrypted and can be directly interpreted [39].…”
mentioning
confidence: 99%
“…This scenario can be conducted by substituting the original app by a malicious one, specifically designed by the adversary to perform concrete actions. Likewise, leaks of sensors readings can be used to infer the activity the patient was executing at a certain time [39].…”
mentioning
confidence: 99%
See 1 more Smart Citation