2015
DOI: 10.1109/tmc.2014.2365185
|View full text |Cite
|
Sign up to set email alerts
|

User Verification Leveraging Gait Recognition for Smartphone Enabled Mobile Healthcare Systems

Abstract: The rapid deployment of sensing technology in smartphones and the explosion of their usage in people's daily lives provide users with the ability to collectively sense the world. This leads to a growing trend of mobile healthcare systems utilizing sensing data collected from smartphones with/without additional external sensors to analyze and understand people's physical and mental states. However, such healthcare systems are vulnerable to user spoofing, in which an adversary distributes his registered device t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
61
0

Year Published

2016
2016
2018
2018

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 103 publications
(71 citation statements)
references
References 29 publications
0
61
0
Order By: Relevance
“…In the work conducted by Ren, [8], the number of subjects (classes) is 26. In other work by Hoang [16], the number of subject involved is even smaller which is only 14.…”
Section: Data Collectionmentioning
confidence: 99%
See 2 more Smart Citations
“…In the work conducted by Ren, [8], the number of subjects (classes) is 26. In other work by Hoang [16], the number of subject involved is even smaller which is only 14.…”
Section: Data Collectionmentioning
confidence: 99%
“…In wearable sensor using a smartphone, the position varies among the past researcher. Most common positions are in pocket [2][3][4], pouch [3][4][5][6], clipped to the waistband of the clothes [7] and multiple body position [8]. Based on the mentioned position and work, it can be seen that none of them tried placing the phone on the palm or handheld.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…It has been used in various fields such as robotics [9], computer engineering [10,11], physical science and health industry [12], natural sciences [13], and industrial academic areas [14][15][16]. As an illustration, Sileye and Jean-Marc [17] deployed head pose detection using the Hidden Markov Model to recognize the visual focus of attention of participants in meetings.…”
Section: Introductionmentioning
confidence: 99%
“…Additionally, the technique allows us to verify the integrity of embedded sensitive data, for example to confirm that no tampering has taken place in the form of record removal, decimal rounding, or filtering. Finally, our technique allows users to prove ownership of sensor or healthcare data that they have shared, and as such provides spoof resistance against tampered medical sensor data [31].…”
Section: Introductionmentioning
confidence: 99%