2015 IEEE Winter Conference on Applications of Computer Vision 2015
DOI: 10.1109/wacv.2015.35
|View full text |Cite
|
Sign up to set email alerts
|

Touch Gesture-Based Active User Authentication Using Dictionaries

Abstract: Screen touch gesture has been shown to be a promising modality for touch-based active authentication of users of mobile devices. In this paper, we present an approach for active user authentication using screen touch gestures by building linear and kernelized dictionaries based on sparse representations and associated classifiers. Experiments using a new dataset collected by us as well as two other publicly available screen touch datasets show that the dictionary-based classification method compares favorably … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
40
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
5
3
2

Relationship

2
8

Authors

Journals

citations
Cited by 72 publications
(40 citation statements)
references
References 12 publications
0
40
0
Order By: Relevance
“…For instance, data collected in the enrollment phase may differ than those in the recognition phase. The active authentication system should use some domain adaptive method to handle this issue [58]. • Biometric feature extraction and selection:…”
Section: Limitations and Challengesmentioning
confidence: 99%
“…For instance, data collected in the enrollment phase may differ than those in the recognition phase. The active authentication system should use some domain adaptive method to handle this issue [58]. • Biometric feature extraction and selection:…”
Section: Limitations and Challengesmentioning
confidence: 99%
“…Active authentication systems deal with this issue by continuously monitoring the user identity after the initial access has been granted. Examples include systems based on screen touch gestures [63], gait recognition [64], and device movement patterns (as measured by the accelerometer) [65]. The development of cancelable active authentication systems is a nascent area of research.…”
Section: Discussionmentioning
confidence: 99%
“…To deal with this issue, Active Authentication (AA) systems were introduced in which users are continuously monitored after the initial access to the mobile device [3]. Various methods have been proposed for AA including touch gesture-based [4], [5], [6], [7], gait patternbased [8] and face-based [9], [10], [11], [12], [13] systems. In particular, face-based AA systems have gained a lot of attraction in recent years.…”
Section: Introductionmentioning
confidence: 99%