2013
DOI: 10.1007/978-3-642-40925-7_5
|View full text |Cite
|
Sign up to set email alerts
|

User Authentication for Mobile Devices

Abstract: Part 3: Biometrics and Biometrics ApplicationsInternational audienceThe paper is intended as a short review of user authentication problem for mobile devices. The emphasis is put on smartphones and tablets, that nowadays are very similar to miniaturized personal computers with much more sensors of various origin. The sensors are described with remarks on their usefulness for user authentication. Deficiencies of traditional user authentication methods based on knowledge are pointed out and the need for new – mo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 10 publications
(11 reference statements)
0
7
0
Order By: Relevance
“…• Vocal fold (V): Voice produced by vocal folds (cords) is a natural interaction mechanism that we use on a daily basis. Advances in speech recognition technology have made it possible to use voice as a human-computer interface and also as a speaker recognition mechanism [51].…”
Section: Actuatormentioning
confidence: 99%
See 1 more Smart Citation
“…• Vocal fold (V): Voice produced by vocal folds (cords) is a natural interaction mechanism that we use on a daily basis. Advances in speech recognition technology have made it possible to use voice as a human-computer interface and also as a speaker recognition mechanism [51].…”
Section: Actuatormentioning
confidence: 99%
“…In this interaction, a user is typically authenticated by speaking into a microphone embedded in a device. Voice authentication, also known as speaker recognition, is broadly classified into two types: text-independent and text-dependent [51]. Whisper authentication is a variation of text-independent speaker recognition that aims to enhance acceptability and usability of the system [150].…”
Section: M-*-* Schemes: Microphone-based Au-thenticationmentioning
confidence: 99%
“…A gyroscope detects the current orientation of the device and any possible spin or rotational change. Accelerometers and gyroscopes always return threedimensional values [13]. The orientation of the smartphone can be computed from the angular velocity detected by the gyroscope, which is expressed on 3 axes…”
Section: E Smartphone Sensorsmentioning
confidence: 99%
“…Motion sensors measure acceleration and rotational forces along three axes. Examples of such sensors are accelerometers, gravity sensors, gyroscopes and rotational vector sensors [13]. An accelerometer can measure any movement of the phone including fall of the owner when holding the phone or free fall of the phone.…”
Section: E Smartphone Sensorsmentioning
confidence: 99%
“…For person authentication, passwords, PIN codes, or patterns [1][2][3] have been used in smartphones. However, these require users to remember them.…”
Section: Introductionmentioning
confidence: 99%