Proceedings of the 16th International Conference on Multimodal Interaction 2014
DOI: 10.1145/2663204.2663246
|View full text |Cite
|
Sign up to set email alerts
|

Mid-air Authentication Gestures

Abstract: Authentication based on touch-less mid-air gestures would benefit a multitude of ubicomp applications, which are used in clean environments (e.g., medical environments or clean rooms). In order to explore the potential of mid-air gestures for novel authentication approaches, we performed a series of studies and design experiments. First, we collected data from more then 200 users during a three-day science event organised within a shopping mall. This data was used to investigate capabilities of the Leap Motion… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 35 publications
(16 citation statements)
references
References 28 publications
0
16
0
Order By: Relevance
“…Hayashi et al proposed biometric authentication using gestural patterns and body segments [19]. Aslan et al exploited individual differences among users in performing mid-air gestures for biometric authentication [3].…”
Section: Authentication Using Gesturesmentioning
confidence: 99%
“…Hayashi et al proposed biometric authentication using gestural patterns and body segments [19]. Aslan et al exploited individual differences among users in performing mid-air gestures for biometric authentication [3].…”
Section: Authentication Using Gesturesmentioning
confidence: 99%
“…Most security research on gesture passwords focuses on procedural changes to authentication systems, a simple example being increasing the number of features used in authentication. Direct studies of gesture security have used information theory [34,50], shoulder sur ng [2,13,33,34], or equal error rates [1,2,13,30,34,[48][49][50] between legitimate users and attackers trying to emulate the gesture. The threat model in these scenarios is an attacker performing an observation of the gesture and trying to repeat it.…”
Section: :2 • C Liu Et Almentioning
confidence: 99%
“…Gesture passwords are a recently proposed authentication method for mobile devices that is attracting interest due to their ability to satisfy these usability criteria [1,2,13,30,34,37,[48][49][50]. A gesture in the context of this work, as well as previous work [34,50], is de ned as a series of two-dimensional lines drawn on the surface of a touchscreen with one or more ngers.…”
Section: Introductionmentioning
confidence: 99%
“…The involvement of the hand associated behavioral features has created various types of authentication schemes like hand gestures, keystroke dynamics, mouse related events, and written signature. It's highly preferable in some environments where continuous authentication is required or wearing gloves is mandatory (Aslan, Uhl, Meschtscherjakov, & Tscheligi, 2014).…”
Section: Hand Featuresmentioning
confidence: 99%
“…Motion based gesture verification has been described in (Aslan et al, 2014). It has been able to overcome the finger oil issues related to the recording of the touch based authentication.…”
Section: ) Hand Gesturesmentioning
confidence: 99%