IEEE INFOCOM 2017 - IEEE Conference on Computer Communications 2017
DOI: 10.1109/infocom.2017.8057220
|View full text |Cite
|
Sign up to set email alerts
|

Your face your heart: Secure mobile face authentication with photoplethysmograms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 26 publications
(10 citation statements)
references
References 21 publications
0
10
0
Order By: Relevance
“…(3) The paper had to propose an authentication scheme. Specifically, the paper had to use machine learning to label [12], [33], [41], [42] IMWUT/UbiComp [11], [20], [25], [35], [48] INFOCOM [8], [36], [45], [51], [53] MobiCom [15], [32] MobiSys [7], [31] NDSS [5], [17], [49], [50] Pattern Recognition [2], [9], [18], [24], [38], [40], [54]…”
Section: Review Of Recent Authentication Systemsmentioning
confidence: 99%
“…(3) The paper had to propose an authentication scheme. Specifically, the paper had to use machine learning to label [12], [33], [41], [42] IMWUT/UbiComp [11], [20], [25], [35], [48] INFOCOM [8], [36], [45], [51], [53] MobiCom [15], [32] MobiSys [7], [31] NDSS [5], [17], [49], [50] Pattern Recognition [2], [9], [18], [24], [38], [40], [54]…”
Section: Review Of Recent Authentication Systemsmentioning
confidence: 99%
“…• Once an accepting sample via the feature vector API has been found, it may be possible to obtain an input that results in this sample (after feature extraction), as demonstrated by Garcia et al with the training of an autoencoder for both feature extraction and the regeneration of the input image [23]. • In this work, we have focused on authentication as a binary classification problem, largely because of its widespread use in biometric authentication [8], [9], [10], [11], [12], [13], [14], [15], [16], [26]. However, authentication has also been framed as a one-class classification problem [56], [26] or as multi-class classification [26], e.g., in a discrimination model, as noted earlier.…”
Section: Discussionmentioning
confidence: 99%
“…The target user's data for training is obtained during the registration or enrollment phase. For the negative class, the usual process is to use the data of a subset of other users enrolled in the system [27], [8], [7], [9], [10], [11], [12], [13], [14], [15], [16]. Following best machine learning practice, the data (from both classes) is split into a training and test set.…”
Section: A Biometric Authentication Systemsmentioning
confidence: 99%
See 1 more Smart Citation
“…For physical characteristics, Chen et al [4] proposed an authentication method using video images of the user's face and fingertips captured from the front and rear cameras of a mobile device. Siddharth et al [5] proposed an authentication system based on the palm print and palm vein.…”
Section: User Authentication Methodsmentioning
confidence: 99%