2016
DOI: 10.1007/s00779-016-0905-0
|View full text |Cite
|
Sign up to set email alerts
|

Model for adaptable context-based biometric authentication for mobile devices

Abstract: It becomes possible to take advantage of seamless biometric authentication on mobile devices due to increasing quality and quantity of built-in sensors, increasing processing power of the devices, and wireless connectivity. However, practical effectiveness of the biometric authentication application depends on user's environment conditions that can decrease the accuracy of biometrics recognition or make the acquisition process undesirable for mobile user in a given moment, i.e., effectiveness depends on usage … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
12
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 33 publications
(13 citation statements)
references
References 15 publications
1
12
0
Order By: Relevance
“…Google's contextaware authentication on Android, Smart Lock [8], allows users to choose contexts in which their phones stay unlocked. Wójtowicz and Joachmiak [32] presented a generic model that allows choosing the "optimal biometrics" for mobile authentication based on contextual factors (e.g., no voice biometrics in silent mode).…”
Section: Context-aware Authenticationmentioning
confidence: 99%
See 3 more Smart Citations
“…Google's contextaware authentication on Android, Smart Lock [8], allows users to choose contexts in which their phones stay unlocked. Wójtowicz and Joachmiak [32] presented a generic model that allows choosing the "optimal biometrics" for mobile authentication based on contextual factors (e.g., no voice biometrics in silent mode).…”
Section: Context-aware Authenticationmentioning
confidence: 99%
“…However, switches to fallback are tedious. We further learn that context can be considered for authentication (e.g., location, proximity or other sensor values [11,14,17,30,32]) and that it is technically possible (e.g., choosing biometric mechanisms based on context [32]). Thus, several novel authentication mechanisms evolve (cf.…”
Section: Lessons Learntmentioning
confidence: 99%
See 2 more Smart Citations
“…Such values are calculated by Trans component. The criteria related to the situation context influencing the usefulness and quality of AMs have been used in the model for adaptable context-based biometric authentication dedicated for mobile devices and described in one of our previous articles [17].…”
Section: Protocol For System Communicationmentioning
confidence: 99%