2016 13th International Bhurban Conference on Applied Sciences and Technology (IBCAST) 2016
DOI: 10.1109/ibcast.2016.7429906
|View full text |Cite
|
Sign up to set email alerts
|

Biometric authentication technique using smartphone sensor

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 28 publications
(11 citation statements)
references
References 8 publications
0
10
0
Order By: Relevance
“…Behavior biometrics consists of behavioral traits or habits of the user, such as signature, voice, gait, and touch dynamics, which can be analyzed to determine whether it is the proper user on the device ( Teh, Teoh, & Yue, 2013 ). Biometric authentication seems to be far superior in terms of security, as compared to other types of authentication methods, because it does not employ something the user needs to carry around or remember; instead, it is who the user is or what the user has such as the fingerprint ( Laghari, Waheed-ur-Rehman, & Memon, 2016 ).…”
Section: General Authentication Methodsmentioning
confidence: 99%
“…Behavior biometrics consists of behavioral traits or habits of the user, such as signature, voice, gait, and touch dynamics, which can be analyzed to determine whether it is the proper user on the device ( Teh, Teoh, & Yue, 2013 ). Biometric authentication seems to be far superior in terms of security, as compared to other types of authentication methods, because it does not employ something the user needs to carry around or remember; instead, it is who the user is or what the user has such as the fingerprint ( Laghari, Waheed-ur-Rehman, & Memon, 2016 ).…”
Section: General Authentication Methodsmentioning
confidence: 99%
“…Various techniques have been proposed for mobile user authentication using behavioral usage and features by taking advantage of the embedded sensors. Using sensory data, a background process continuously and implicitly captures user's behavior to perform an active and transparent authentication, e.g., using motion patterns [22], [38], [39], gait [29], [40]- [44], touch gestures [38], [45]- [48], electrocardiography (ECG) [27], keystroke dynamics [19], [47], [49], [50], voice [51]- [53], signature [54]- [56], and profiling [23], [25], [57].…”
Section: Behavioral Biometricsmentioning
confidence: 99%
“…The accelerometer provides the gravitational acceleration in three spatial dimensions (axes), x, y, and z, measured in meter per second squared, where the axes denote the vertical, and left-to-right dimensions [76]. The gyroscope measures the angular rotation Picking-up Motion Ac, Gy, Ma SVM 31 6.13% [63] Motion & keystroke Ac, Gy, Pr SVM 100 1.25% 99.13% [64] Motion Gesture Ac SVM 8 95.83% [65] In-air Handwriting LMC SVM 100 0.6% [66] In-air Handwriting Ac, Gy RF 5 32.8 † % [67] Shacking Motion Ac, Gy DTW-LSTM 150 0.1% 96.87% [68] Free-form Gesture Ac, Gy DTW 3% 0.02% 10% [69] In-air Handwriting Ac DTW * 34 2.5% [70] In-air Handwriting Ac, Gy, Or MLP 84.5% [39] Pick-up Motion Ac CC 10 1.46% 6.87% [71] Motion Gesture Ac, Gy in three dimensions, x, y, and z, in radians per second along the axes [68]. Such sensory data provides a feature space that enables the modeling of users' movement and usage; therefore, a variety of methods revolve around utilizing such data for authentication and security.…”
Section: Motion-based Authenticationmentioning
confidence: 99%
See 1 more Smart Citation
“…A. [8],Proposing an authentication mechanism using the motion sensor of smart phones, authentication is done by moving. The user's phone and the movement pattern is detected on the smartphone's accelerometer Since smartphones have a built-in motion sensor, there is no need to use attached devices.…”
Section: Literature Surveymentioning
confidence: 99%