2019 International Conference on Biometrics (ICB) 2019
DOI: 10.1109/icb45273.2019.8987433
|View full text |Cite
|
Sign up to set email alerts
|

Actions Speak Louder Than (Pass)words: Passive Authentication of Smartphone Users via Deep Temporal Features

Abstract: Prevailing user authentication schemes on smartphones rely on explicit user interaction, where a user types in a passcode or presents a biometric cue such as face, fingerprint, or iris. In addition to being cumbersome and obtrusive to the users, such authentication mechanisms pose security and privacy concerns. Passive authentication systems can tackle these challenges by frequently and unobtrusively monitoring the user's interaction with the device. In this paper, we propose a Siamese Long Short-Term Memory n… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
36
0
1

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 40 publications
(38 citation statements)
references
References 35 publications
1
36
0
1
Order By: Relevance
“…Future work will be oriented to study the discriminative power of new features acquired in MobileTouchDB such as the area covered by the finger, accelerometer, and gyroscope in order to further improve the system performance [36]. We will also analyse the user experience in different acquisition settings through the analysis of the information acquired from Block5 to Block8 of the MobileTouchDB.…”
Section: Discussionmentioning
confidence: 99%
“…Future work will be oriented to study the discriminative power of new features acquired in MobileTouchDB such as the area covered by the finger, accelerometer, and gyroscope in order to further improve the system performance [36]. We will also analyse the user experience in different acquisition settings through the analysis of the information acquired from Block5 to Block8 of the MobileTouchDB.…”
Section: Discussionmentioning
confidence: 99%
“…Each hidden layer of LSTM is recursively connected by a series of memory blocks, one memory block corresponds to a memory unit, and each memory unit contains three gates: input gate, output gate, and forgetting gate, which can read, write, and reset the memory unit, respectively, so as to flexibly control the information transmission between different memory units. The state of LSTM memory unit is updated by the following formula [29,30]:…”
Section: Long-time Extract Based On Lstmmentioning
confidence: 99%
“…Most of the literature, in general, addresses one or two modalities isolated from other modalities, i.e., these approaches are suitable for only one or two specific situations. Recently, the proposed studies [ 172 , 173 ] utilized multiple modalities and evaluated their approaches on different modes. Further work in this direction combined with privacy-preserving approaches can solve modality-specific and privacy issues.…”
Section: Recommendations For Future Research Directionsmentioning
confidence: 99%