Biometric-Based Physical and Cybersecurity Systems 2018
DOI: 10.1007/978-3-319-98734-7_14
|View full text |Cite
|
Sign up to set email alerts
|

Biometric Authentication for Wearables

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 15 publications
0
4
0
Order By: Relevance
“…However, because many wearable devices can be easily removed by users and worn by somebody else, the use of single-time authentication methods such as passwords are not enough to guarantee who is using a wearable device. To enforce authentication, various user authentication methods have been proposed based on biometrics [180], multifactor authentication mechanisms [76,181], and multiple wearable devices [182,183].…”
Section: Vulnerability Description Examples Of Attacksmentioning
confidence: 99%
“…However, because many wearable devices can be easily removed by users and worn by somebody else, the use of single-time authentication methods such as passwords are not enough to guarantee who is using a wearable device. To enforce authentication, various user authentication methods have been proposed based on biometrics [180], multifactor authentication mechanisms [76,181], and multiple wearable devices [182,183].…”
Section: Vulnerability Description Examples Of Attacksmentioning
confidence: 99%
“…The SVM classifier was initially designed to classify data instants into binary classes. The extension of SVM methods for multiclass classification problems has gained significant attention [37]. There are three main methods for implementing a multiclass SVM classifier, including Multiclass ranking SVMs, the pairwise coupling and one formulation for all.…”
Section: Ecg and Gait Classificationmentioning
confidence: 99%
“…In this work, we have followed the match score level fusion to set up both modalities and its has a proven performance record. The authentication via the modern smartwatch contains multiple sensors offers a user-friendly alternative to common authentication methods on smartphones [37]. It has the great advantage that the authentication can be performed without user interaction.…”
Section: Introductionmentioning
confidence: 99%
“…While the task of user authentication using sensors built into smartphones has been well addressed in the literature, studies on wearable motion sensor-based biometrics are very few [ 10 , 11 ]. The use of wearable motion sensors for user authentication is particularly valuable: first, the incorporated wearable devices for user authentication can come in different forms, such as smartwatches, gloves, or shoe insoles [ 10 , 11 ], which helps to reduce the dependence of user authentication on smartphone devices; secondly, it is important to detect an interaction between fingers and hands on hand-object manipulations [ 12 ], but built-in smartphone sensors cannot detect finger movements; thirdly, it enables silent user authentication through the daily use of objects the way the user manipulates objects “in-the-wild” [ 13 ] (e.g., lifting a cup or spreading butter with a knife).…”
Section: Introductionmentioning
confidence: 99%