2013 2nd International Conference on Advances in Biomedical Engineering 2013
DOI: 10.1109/icabme.2013.6648891
|View full text |Cite
|
Sign up to set email alerts
|

A novel identification/verification model using smartphone's sensors and user behavior

Abstract: Smartphones are increasingly entering people's life; every person in the house carry one or two smartphones (Android, iPhone, Tab…). They use explicit authentication, which is inefficient; once the smartphone is stolen, a thief can steal personal information stored on the phone and can access all services that might have the password stored. In addition, elderly and physically impaired users need to have their medical profile secured and easily accessed without password limitation. For this reason, smartphone … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 8 publications
0
5
0
Order By: Relevance
“…Therefore, in this paper, we also follow this common trend to devise own method based on SVM for user identification based on gait feature. However, we do not use a single SVM classifier as in existing methods [12,13,15] but take advantages of multiple weak SVM classifiers to boost the overall accuracy.…”
Section: Authentication With Biometric Featuresmentioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, in this paper, we also follow this common trend to devise own method based on SVM for user identification based on gait feature. However, we do not use a single SVM classifier as in existing methods [12,13,15] but take advantages of multiple weak SVM classifiers to boost the overall accuracy.…”
Section: Authentication With Biometric Featuresmentioning
confidence: 99%
“…Among existing methods for gait recognition, Support Vector Machine is one common approach to classify users from their gait features [12,13,15]. Therefore, in this paper, we also follow this common trend to devise own method based on SVM for user identification based on gait feature.…”
Section: Authentication With Biometric Featuresmentioning
confidence: 99%
“…Attackers take advantage of and sometimes cause attention failure, using distraction and manipulation to gain access. Thus, it is important to develop the following hypotheses to model unintentional vs intentional clicks or touches on a link on a smartphone to combat this threat because 87% of successful attacks target smartphones, which possess various sensors allowing human behavior modeling [36][37][38][39][40].…”
Section: Hypotheses and Objectivesmentioning
confidence: 99%
“…In short, several studies have experimented user identification using gait recognition as a possible identification method. Our proposed approach utilizes acceleration signals and detects users by their way of walking under different sub-activities in a semi-controlled environment, and for this, a motion-recording device is used in order to measure the acceleration according to the three axes outlined in [14,25].…”
Section: Related Workmentioning
confidence: 99%
“…In the literature hereby referred to, several solutions were proposed addressing implicit user identification without involving the user, such as keystroke-based user identification [54], touch screen biometrics [22,28], application set fingerprints [2], hybrid user identification methods-such as accelerometers and gyroscopes [6,14,52], and gait based user identification [4,43]. However, these solutions only discuss one aspect of user identification, either software or hardware.…”
Section: Introductionmentioning
confidence: 99%