Proceedings of the 33rd Annual Computer Security Applications Conference 2017
DOI: 10.1145/3134600.3134619
|View full text |Cite
|
Sign up to set email alerts
|

A Secure Mobile Authentication Alternative to Biometrics

Abstract: Biometrics are widely used for authentication in consumer devices and business se ings as they provide sufficiently strong security, instant verification and convenience for users. However, biometrics are hard to keep secret, stolen biometrics pose lifelong security risks to users as they cannot be reset and re-issued, and transactions authenticated by biometrics across different systems are linkable and traceable back to the individual identity. In addition, their cost-benefit analysis does not include person… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 52 publications
0
4
0
Order By: Relevance
“…In [8], the authors introduce a novel authentication system, called ai.lock, for mobile devices which uses an imaging sensor for authentication. To extract invariant features for image-based authentication, LSH is used along with deep neural networks and Principal Component Analysis (PCA).…”
Section: Security/privacy Relatedmentioning
confidence: 99%
“…In [8], the authors introduce a novel authentication system, called ai.lock, for mobile devices which uses an imaging sensor for authentication. To extract invariant features for image-based authentication, LSH is used along with deep neural networks and Principal Component Analysis (PCA).…”
Section: Security/privacy Relatedmentioning
confidence: 99%
“…Another soft biometric is gait, i.e., how people walk. [7]. They use an InceptionV3 CNN [7] to derive features from pictures a mobile phone user takes.…”
Section: Classification On Spatial Datamentioning
confidence: 99%
“…[7]. They use an InceptionV3 CNN [7] to derive features from pictures a mobile phone user takes. The Inception architecture introduced inception modules, which consist of multiple convolutional filters of different sizes.…”
Section: Classification On Spatial Datamentioning
confidence: 99%
“…The use of biometrics is considered as the most secured among these authentication mechanisms [3]. However, according to [4], biometrics are hard to keep secret, stolen biometrics pose lifelong security risks to users as they cannot be reset and re-issued. Furthermore, transactions authenticated by biometrics across different systems are linkable and traceable back to the individual identity (in other words they don't preserve the user's privacy).…”
Section: Introductionmentioning
confidence: 99%