2014
DOI: 10.1016/j.procs.2014.08.250
|View full text |Cite
|
Sign up to set email alerts
|

Biometric Identification on Android Smartphones

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
8
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(8 citation statements)
references
References 9 publications
0
8
0
Order By: Relevance
“…For example, modalities can be categorized as physiological (ECG, DNA, iris, fingerprint, earlobe), cognitive and behavioral (voice, keystroke, gait, and signature) [115]. The following are the characteristics of all of these biometric modalities [78], [116]: This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.…”
Section: Ecg Signal In Biometricsmentioning
confidence: 99%
“…For example, modalities can be categorized as physiological (ECG, DNA, iris, fingerprint, earlobe), cognitive and behavioral (voice, keystroke, gait, and signature) [115]. The following are the characteristics of all of these biometric modalities [78], [116]: This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.…”
Section: Ecg Signal In Biometricsmentioning
confidence: 99%
“…Biometric user authentication is available on consumer devices, including smartphones, using facial recognition [1]- [3] and fingerprint biometric [4]- [9]. The broad adoption of biometrics on consumer devices was originally discussed in [10] with additional discussion of the impacts in several following articles [11]- [13].…”
Section: Introductionmentioning
confidence: 99%
“…Owing to the growing popularity of smart devices, security as well as privacy on such devices are of paramount importance since those act as a platform for online commerce besides their involvement in accessing crucial information [1][2][3][4][5]. Over time, smart devices have offered various superior functions that led to the growing interest of users in them but at the same time grew the vulnerability of users to fraud [6][7][8].…”
Section: Introductionmentioning
confidence: 99%
“…Over time, smart devices have offered various superior functions that led to the growing interest of users in them but at the same time grew the vulnerability of users to fraud [6][7][8]. Accessing such crucial information and transacting securely necessitates safe measures that offer increased user adoptability as well as resistance to impending threats [2]. Ranging from a daily user of a personal computer to corporations, government departments, medical practitioners and businesses, security of file systems together with the protection of system from unprivileged access is a major security concern.…”
Section: Introductionmentioning
confidence: 99%