2016 IEEE International Conference on Pervasive Computing and Communications (PerCom) 2016
DOI: 10.1109/percom.2016.7456514
|View full text |Cite
|
Sign up to set email alerts
|

Whose move is it anyway? Authenticating smart wearable devices using unique head movement patterns

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
72
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
2
2

Relationship

1
8

Authors

Journals

citations
Cited by 89 publications
(72 citation statements)
references
References 32 publications
0
72
0
Order By: Relevance
“…Body movement patterns recorded by accelerometers in mobile devices have been demonstrated to be discriminative enough to differentiate between, or even uniquely identify, users. Various accelerometer-only approaches have been proposed to confirm the identity of a user based on biometric gait features [40,41], hand gestures [42], or head movements [43]. Using accelerometer rea-dings from smartphones, Kwapisz, Weiss and Moore were able to recognize individuals from a pool of 36 test subjects with 100% accuracy [44].…”
Section: User Identificationmentioning
confidence: 99%
“…Body movement patterns recorded by accelerometers in mobile devices have been demonstrated to be discriminative enough to differentiate between, or even uniquely identify, users. Various accelerometer-only approaches have been proposed to confirm the identity of a user based on biometric gait features [40,41], hand gestures [42], or head movements [43]. Using accelerometer rea-dings from smartphones, Kwapisz, Weiss and Moore were able to recognize individuals from a pool of 36 test subjects with 100% accuracy [44].…”
Section: User Identificationmentioning
confidence: 99%
“…As we use a wrapper-based approach, running the classifier is an inherent part in feature selection. The algorithm therefore calls the Get z-List algorithm (Algorithm 2) as a subroutine (based on a similar procedure from [32]). This algorithm computes the z values that give TPR of 1 and the least FPR for each possible feature subset.…”
Section: F Feature Selectionmentioning
confidence: 99%
“…In this way, approaches, which exploit biometrics, like fingerprint recognition, face recognition, iris recognition, retina recognition, hand recognition or even dynamic behavior such as voice recognition, gait patterns or even keystroke dynamics, can help detect imposters in real time [10]. Every new authentication method comes with a possible risk of low user acceptance due to latency and increasing complexity [11].…”
Section: Introductionmentioning
confidence: 99%