2013 IEEE Security and Privacy Workshops 2013
DOI: 10.1109/spw.2013.19
|View full text |Cite
|
Sign up to set email alerts
|

Preventing Cell Phone Intrusion and Theft using Biometrics

Abstract: Most cell phones use a password, PIN, or visual pattern to secure the phone. With these types of security methods being used, there is much vulnerability. Another alternative is biometric authentication. Biometric security systems have been researched for many years. Some mobile manufacturers have implemented fingerprint scanners into their phones, such as the old Fujitsu F505i [7] and the current Motorola Atrix. Since theft of cell phones is becoming more common every day, there is a real need for a security … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 10 publications
0
5
0
Order By: Relevance
“…This discovery depicts the ease in which a user's latent fingerprint can be obtained even from a curved surface and used to spoof access. This conflicts at some level with work conducted by Ohana et al (2013), wherein latent fingerprints were captured using Mikrosil, an alternative agent to Provil. Where the material was applied directly onto the finger, initial performances did not breach the tested fingerprint scanner as a stand-alone material, only when combined with moisture was access granted.…”
Section: Discussionmentioning
confidence: 96%
See 4 more Smart Citations
“…This discovery depicts the ease in which a user's latent fingerprint can be obtained even from a curved surface and used to spoof access. This conflicts at some level with work conducted by Ohana et al (2013), wherein latent fingerprints were captured using Mikrosil, an alternative agent to Provil. Where the material was applied directly onto the finger, initial performances did not breach the tested fingerprint scanner as a stand-alone material, only when combined with moisture was access granted.…”
Section: Discussionmentioning
confidence: 96%
“…Where the material was applied directly onto the finger, initial performances did not breach the tested fingerprint scanner as a stand-alone material, only when combined with moisture was access granted. Ohana et al (2013) also tested using direct casting of a latent print, however, these produced negative results for spoofing as access was not granted using this approach. Differences in results could be due to a number of variables notably fingerprint scanner tested, ridge detail quality of the latent impression specifically depletion of fingerprints, casting agent as well as the enhancing fingerprint powder to name but a few.…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations