Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








35 Hits in 5.5 sec

HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users [article]

Zdenka Sitova and Jaroslav Sedenka and Qing Yang and Ge Peng and Gang Zhou and Paolo Gasti and Kiran Balagani
2016 arXiv   pre-print
We introduce Hand Movement, Orientation, and Grasp (HMOG), a set of behavioral features to continuously authenticate smartphone users.  ...  We evaluated authentication and biometric key generation (BKG) performance of HMOG features on data collected from 100 subjects typing on a virtual keyboard.  ...  In this paper, we present Hand Movement, Orientation, and Grasp (HMOG), a new set of behavioral biometric features for continuous authentication of smartphone users.  ... 
arXiv:1501.01199v3 fatcat:nuh4wmu365cyli36tlrhnneeay

HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users

Zdenka Sitova, Jaroslav Sedenka, Qing Yang, Ge Peng, Gang Zhou, Paolo Gasti, Kiran S. Balagani
2016 IEEE Transactions on Information Forensics and Security  
We introduce hand movement, orientation, and grasp (HMOG), a set of behavioral features to continuously authenticate smartphone users.  ...  We evaluated authentication and biometric key generation (BKG) performance of HMOG features on data collected from 100 subjects typing on a virtual keyboard.  ...  In this paper, we present Hand Movement, Orientation, and Grasp (HMOG), a new set of behavioral biometric features for continuous authentication of smartphone users.  ... 
doi:10.1109/tifs.2015.2506542 fatcat:fr66f6ddgrb7dpyvunb55t52lu

Relative Attention-based One-Class Adversarial Autoencoder for Continuous Authentication of Smartphone Users [article]

Mingming Hu, Kun Zhang, Ruibang You, Bibo Tu
2022 arXiv   pre-print
Behavioral biometrics-based continuous authentication is a promising authentication scheme, which uses behavioral biometrics recorded by built-in sensors to authenticate smartphone users throughout the  ...  To solve these issues, we propose a relative attention-based one-class adversarial autoencoder for continuous authentication of smartphone users.  ...  HMOG dataset: HMOG [34] is a new set of behavioral biometric data for continuous authentication of smartphone users, which contains the Hand Movement, Orientation, and Grasp (HMOG).  ... 
arXiv:2210.16819v2 fatcat:o3fraaqtinhuzonse5wyyubidy

Deep Learning Approaches for Continuous Authentication Based on Activity Patterns Using Mobile Sensing

Sakorn Mekruksavanich, Anuchit Jitpattanakul
2021 Sensors  
To solve these issues, this research introduces a new continuous authentication framework called DeepAuthen, which identifies smartphone users based on their physical activity patterns as measured by the  ...  We also conducted a thorough examination of the continuous authentication outcomes, and the results supported the efficacy of our framework.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/s21227519 pmid:34833591 pmcid:PMC8625098 fatcat:wtjhyzrdrjevzj6xe3kftzwvca

Few-Shot Continuous Authentication for Mobile-Based Biometrics

Kensuke Wagata, Andrew Beng Jin Teoh
2022 Applied Sciences  
The rapid growth of smartphone financial services raises the need for secure mobile authentication.  ...  Continuous authentication is a user-friendly way to strengthen the security of smartphones by implicitly monitoring a user's identity through sessions.  ...  Data Availability Statement: This study leveraged two publicly available datasets, the HMOG [37] and BBMAS [38] datasets. The HMOG dataset is downloadable from https://www.cs.wm.edu/~qyang/  ... 
doi:10.3390/app122010365 fatcat:c5a4vzkoyrbebcznewkg4jswpe

Hold On and Swipe: A Touch-Movement Based Continuous Authentication Schema based on Machine Learning [article]

Rushit Dave, Naeem Seliya, Laura Pryor, Mounika Vanamala, Evelyn Sowells, Jacob mallet
2022 arXiv   pre-print
This study aims to contribute to this innovative research by evaluating the performance of a multimodal behavioral biometric based user authentication scheme using touch dynamics and phone movement.  ...  Behavioral biometrics have been heavily researched as a possible solution to this security deficiency for mobile devices.  ...  Balagani, “HMOG: New behavioral biometric features for continuous [8] N. Siddiqui., R. Dave, and N.  ... 
arXiv:2201.08564v1 fatcat:teizq3pt7rhoficu5b76nneoza

Exploration of Machine Learning Classification Models Used for Behavioral Biometrics Authentication [article]

Sara Kokal, Laura Pryor, Rushit Dave
2022 arXiv   pre-print
Continuing the previous work in this field, this study identifies key Machine Learning algorithms currently being used for behavioral biometric mobile authentication schemes and aims to provide a comprehensive  ...  Throughout this paper the benefits, limitations, and recommendations for future work will be discussed.  ...  ACKNOWLEDGMENTS Funding for this project has been provided by the University of Wisconsin-Eau Claire's Blugold Fellowship and University of Wisconsin-Eau Claire Computer Science Department's Karlgaard  ... 
arXiv:2204.09088v1 fatcat:uo2sk5qdzzbgtpmckc5oxterx4

Continuous Mobile User Authentication Using a Hybrid CNN-Bi-LSTM Approach

Sarah Alzahrani, Joud Alderaan, Dalya Alatawi, Bandar Alotaibi
2023 Computers Materials & Continua  
Behavioral biometrics is introduced by the powerful sensing capabilities of IoT devices such as smart wearables and smartphones, enabling continuous authentication.  ...  This paper presents a new continuous passive authentication approach capable of learning the signatures of IoT users utilizing smartphone sensors such as a gyroscope, magnetometer, and accelerometer to  ...  [4] used keystrokes dynamics as a behavioral biometrics methodology and utilized a hybrid deep learning model to authenticate users continuously.  ... 
doi:10.32604/cmc.2023.035173 fatcat:jsoainvovvgmjiwwmnmgfcpwtq

Comparing Machine Learning Classifiers for Continuous Authentication on Mobile Devices by Keystroke Dynamics

Luis de-Marcos, José-Javier Martínez-Herráiz, Javier Junquera-Sánchez, Carlos Cilleruelo, Carmen Pages-Arévalo
2021 Electronics  
Continuous authentication (CA) is the process to verify the user's identity regularly without their active participation.  ...  The results show that a small number of key events and measurements can be used to return predictions of user identity.  ...  Hand movement, orientation, and grasp (HMOG) is a set of behavioral biometrics for smartphones introduced by Sitová et al. [24] .  ... 
doi:10.3390/electronics10141622 fatcat:w4oj5ynqpvhltde6cax4pd4kwq

Continuous authentication of smartphone users based on activity pattern recognition using passive mobile sensing

Muhammad Ehatisham-ul-Haq, Muhammad Awais Azam, Usman Naeem, Yasar Amin, Jonathan Loo
2018 Journal of Network and Computer Applications  
To address these 19 challenges, a novel continuous authentication scheme is presented in this study, which recognizes smartphone 20 users on the basis of their physical activity patterns using accelerometer  ...  A series of experiments are performed for user recognition using different machine learning 22 classifiers, where six different activities are analyzed for the multiple locations of smartphone on the user's  ...  and gestures as behavioral biometrics for 62 continuous authentication of smartphone users.  ... 
doi:10.1016/j.jnca.2018.02.020 fatcat:4tu22aitbzaqxjbmpnsbkakhde

DAKOTA: Sensor and Touch Screen-Based Continuous Authentication on a Mobile Banking Application

Ozlem Durmaz Incel, Secil Gunay, Yasemin Akan, Yunus Barlas, Okan Engin Basar, Gulfem Isiklar Alptekin, Mustafa Isbilen
2021 IEEE Access  
In this paper, we investigate whether it is possible to continuously authenticate users via behavioral biometrics with a certain performance on a mobile banking application.  ...  However, this requires active participation of the user and there is continuous authentication during a session.  ...  Continuous authentication uses behavioral biometrics, which refer to a specific behavioral pattern to a user [6] .  ... 
doi:10.1109/access.2021.3063424 fatcat:nwzuwr7h4zbbrohdnxghvzzegq

Data Behind Mobile Behavioural Biometrics – a Survey

Teodors Eglitis, Richard Guest, Farzin Deravi
2020 IET Biometrics  
In this study, the authors give the reader an overview of mobile device behavioural biometric data and how this data is used in experiments, especially examining papers that introduce new datasets.  ...  They further look at the General Data Protection Regulation, and its significance to the scientific research in the field of biometrics.  ...  . • Yang et al. [14] -'A Multimodal Data Set for Evaluating Continuous Authentication Performance in Smartphones' and Sitová et al. [52] -'HMOG: New Behavioral Biometric Features for Continuous Authentication  ... 
doi:10.1049/iet-bmt.2018.5174 fatcat:qmkevrklubhvrfo7yrftlnxvlu

Learning Human Identity From Motion Patterns

Natalia Neverova, Christian Wolf, Griffin Lacey, Lex Fridman, Deepak Chandra, Brandon Barbello, Graham Taylor
2016 IEEE Access  
We present a large-scale study exploring the capability of temporal deep neural networks to interpret natural human kinematics and introduce the first method for active biometric authentication with mobile  ...  Our results demonstrate that human kinematics convey important information about user identity and can serve as a valuable component of multi-modal authentication systems.  ...  ACKNOWLEDGMENT The authors would like to thank their colleagues Elie Khoury, Laurent El Shafey, Sébastien Marcel and Anupam Das for valuable discussions.  ... 
doi:10.1109/access.2016.2557846 fatcat:hoypghnlyzge5elj3dic4rwrje

Learning Human Identity from Motion Patterns [article]

Natalia Neverova, Christian Wolf, Griffin Lacey, Lex Fridman, Deepak Chandra, Brandon Barbello, Graham Taylor
2016 arXiv   pre-print
We present a large-scale study exploring the capability of temporal deep neural networks to interpret natural human kinematics and introduce the first method for active biometric authentication with mobile  ...  Our results demonstrate that human kinematics convey important information about user identity and can serve as a valuable component of multi-modal authentication systems.  ...  ACKNOWLEDGMENT The authors would like to thank their colleagues Elie Khoury, Laurent El Shafey, Sébastien Marcel and Anupam Das for valuable discussions.  ... 
arXiv:1511.03908v4 fatcat:tbtqonhsjvactlakgfp2y2vsz4

Motion ID: Human Authentication Approach [article]

Aleksei Gavron, Konstantin Belev, Konstantin Kudelkin, Vladislav Shikhov, Andrey Akushevich, Alexey Fartukov, Vladimir Paramonov, Dmitry Syromolotov, Artem Makoyan
2023 arXiv   pre-print
The paper presents two labeled datasets with unlock events: the first features IMU measurements, provided by six users who continuously collected data on six different smartphones for a period of 12 weeks  ...  The second one contains 50 hours of IMU data for one specific motion pattern, provided by 101 users.  ...  The proposed method not only eliminates all existing obstacles for biometrics, but also reduces the time it takes to authenticate and verify the user (excluding the inference time of the biometric solution  ... 
arXiv:2302.01751v1 fatcat:jes4yqdwanebnb6x7uapkvmebu
« Previous Showing results 1 — 15 out of 35 results