[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

Model for adaptable context-based biometric authentication for mobile devices

Published: 01 April 2016 Publication History

Abstract

It becomes possible to take advantage of seamless biometric authentication on mobile devices due to increasing quality and quantity of built-in sensors, increasing processing power of the devices, and wireless connectivity. However, practical effectiveness of the biometric authentication application depends on user's environment conditions that can decrease the accuracy of biometrics recognition or make the acquisition process undesirable for mobile user in a given moment, i.e., effectiveness depends on usage context. In this paper, context-based biometric authentication model for mobile devices is proposed. It enables determining the most accurate authentication method at the moment along with the most accurate form of interacting with a user w.r.t. authentication process. The generic model designed and verified with proof-of-concept implementation constitutes a foundation for building further adaptable and extensible multi-factor context-dependent systems for mobile authentication.

References

[1]
Abate AF, Nappi M, Riccio D, Sabatino G (2007) 2d and 3d face recognition: a survey. Pattern Recogn Lett 28:1885---1906
[2]
Bardram JE, Kjaer RE, Pedersem MO (2003) Context-aware user authentication--supporting proximity-based login in pervasive computing. UbiComp 2003 Ubiquitous Comput 2864:107---123
[3]
Bargal SA, Welles A, Chan CR, Howes S, Sclaroff S, Ragan E, Johnson C, Gill C (2015) Image-based ear biometric smartphone app for patient identification in field settings. In: Proceedings of the 10th international conference on computer vision theory and applications (VISIGRAPP 2015), pp 171---179
[4]
Bhowmik MK, Saha K, Majumder S, Majumder G, Saha A, Sarma AN, Bhattacharjee D, Basu DK, Nasipuri M (2011) Thermal infrared face recognition--a biometric identification technique for robust security system. In: Corcoran P (ed) Reviews, refinements and new ideas in face recognition. InTech, Rijeka, Croatia, pp 113---138
[5]
Bolle RM, Connel JH, Pankanti S, Ratha NK, Senior AW (2004) Guide to biometrics. Springer, Berlin
[6]
Buhan I, Lenzini G, Radomirovi S (2010) Contextual biometric-based authentication for ubiquitous services. Springer, Berlin
[7]
Confident Technologies (2011) Survey shows smartphone users choose convenience over security. http://confidenttechnologies.com/news_events/survey-shows-smartphone-users-choose-convenience-over-security. Accessed 16 May 2014
[8]
Drazin S, Montag M (2013) Decision tree analysis using weka. Machine learning-project II. University of Miami
[9]
Feng T, Liu Z, Kwon KA, Shi W, Carbunar B, Jiang Y, Nguyen N (2012) Continuous mobile authentication using touchscreen gestures. Institute of Electrical and Electronics Engineers, Waltham
[10]
Fujitsu (2011) Fujitsu palmsecure. http://www.fujitsu.com/global/solutions/business-technology/security/biometrics/. Accessed 20 June 2014
[11]
Goode A (2014) Bring your own finger--how mobile is bringing biometrics to consumers. Biometric Technology Today. Oxford, UK
[12]
Habib K, Torjusen A, Leister W (2014) A novel authentication framework based on biometric and radio fingerprinting. IARIA, Paris
[13]
Harrison C, Sato M, Poupyrev I (2012) Capacitive fingerprinting: exploring user differentiation by sensing electrical properties of the human body. Association for Computing Machinery, New York
[14]
Hayashi E, Das S, Amini S, Hong J, Oakley I (2013) Casa: context-aware scalable authentication. In: Proceedings of the ninth symposium on usable privacy and security (SOUPS '13). ACM, New York
[15]
Hitachi (2007) Hitachi veinid. http://www.hitachi.eu/veinid/. Accessed 20 June 2014
[16]
Leister W, Hamdi M, Abie H, Posland S (2014) An evaluation scenario for adaptive security in ehealth. IARIA, Nice
[17]
Martin L (2009) Biometrics. Morgan Kaufmann Publishers, Burlington, pp 645---659
[18]
Mhamed A, Zerkouk M, Husseini AE, Messabih B, Hassan BE (2013) Towards a context aware modeling of trust and access control based on the user behavior and capabilities. Springer, Berlin, Heidelberg
[19]
Niinuma K, Park U, Jain AK (2010) Soft biometric traits for continuous user. IEEE Trans Inf Forensics Secur IEEE Biom Compend 5:771---780
[20]
Nuance Communications (2014) Nuance voice biometrics. http://www.nuance.com/landing-pages/products/voicebiometrics/. Accessed 26 Feb 2014
[21]
Paul S (2012) Mashable. http://mashable.com/2012/04/27/facevault-app-facial-recognition/. Accessed 05-03-2014
[22]
Precise Biometrics (2013) Precise biometrics. http://www.precisebiometrics.com/. Accessed 26 Feb 2014
[23]
Riva O, Qin C, Strauss K, Lymberopoulos D (2012) Progressive authentication: deciding when to authenticate on mobile phones. In: Proceedings of the 21st USENIX conference on security symposium (Security'12), USENIX Association, Berkeley, p 15
[24]
Sensible Vision (2014) Fastaccess anywhere overview. http://www.sensiblevision.com/en-us/fastaccessanywhere/overview.aspx. Accessed 05 Mar 2014
[25]
S.I.C. Biometrics (2013) S.i.c. biometrics. http://www.sic.ca/. Accessed 26 Feb 2014
[26]
Sudarvizhi S, Sumathi S (2013) A review on continuous authentication using multimodal biometrics. Int J Emerg Technol Adv Eng 3:192---196
[27]
Symantec (2012) European mobile insights. Norton cybercrime report. Tech Rep. http://now-static.norton.com/now/en/pu/images/Promotions/2013/PDFs/NCR%20-%20%20Mobile%20-%20Europe%20FINAL%20FINAL.pdf. Accessed 26 Feb 2014
[28]
Vallabh H (2012) Authentication using finger-vein recognition. Univeristy of Johannesburg, Johannesburg
[29]
Whitman Me, Matford HJ (2010) Course technology. Cengage Learning, Boston, pp 344---345
[30]
Witte H, Rathgeb C, Busch C (2013) Context-aware mobile biometric authentication based on support vector machines. Institute of Electrical and Electronics Engineers, Cambridge
[31]
Yildirim N, Varol A (2015) Android based mobile application development for web login authentication using fingerprint recognition feature. In: Signal processing and communications applications conference (SIU), pp 2662---2665

Cited By

View all
  • (2024)MRAAC: A Multi-stage Risk-aware Adaptive Authentication and Access Control Framework for AndroidACM Transactions on Privacy and Security10.1145/364837227:2(1-30)Online publication date: 15-Feb-2024
  • (2024)SMARTCOPEPervasive and Mobile Computing10.1016/j.pmcj.2023.10187397:COnline publication date: 1-Jan-2024
  • (2023)Blockchain-Based Authentication Scheme with an Adaptive Multi-Factor Authentication StrategyMobile Information Systems10.1155/2023/47641352023Online publication date: 1-Jan-2023
  • Show More Cited By
  1. Model for adaptable context-based biometric authentication for mobile devices

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image Personal and Ubiquitous Computing
    Personal and Ubiquitous Computing  Volume 20, Issue 2
    April 2016
    108 pages

    Publisher

    Springer-Verlag

    Berlin, Heidelberg

    Publication History

    Published: 01 April 2016

    Author Tags

    1. Adaptable access control
    2. Adaptable authentication
    3. Biometric authentication
    4. Context-based authentication
    5. Mobile authentication
    6. Mobile devices

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 23 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)MRAAC: A Multi-stage Risk-aware Adaptive Authentication and Access Control Framework for AndroidACM Transactions on Privacy and Security10.1145/364837227:2(1-30)Online publication date: 15-Feb-2024
    • (2024)SMARTCOPEPervasive and Mobile Computing10.1016/j.pmcj.2023.10187397:COnline publication date: 1-Jan-2024
    • (2023)Blockchain-Based Authentication Scheme with an Adaptive Multi-Factor Authentication StrategyMobile Information Systems10.1155/2023/47641352023Online publication date: 1-Jan-2023
    • (2022)Multi-modal biometric fusion based continuous user authentication for E-proctoring using hybrid LCNN-Salp swarm optimizationCluster Computing10.1007/s10586-021-03450-w25:2(827-846)Online publication date: 1-Apr-2022
    • (2020)Don't Use Fingerprint, it's Raining!Proceedings of the 2020 International Conference on Advanced Visual Interfaces10.1145/3399715.3399823(1-5)Online publication date: 28-Sep-2020
    • (2019)A Survey on Adaptive AuthenticationACM Computing Surveys10.1145/333611752:4(1-30)Online publication date: 11-Sep-2019
    • (2018)Body-Taps: Authenticating Your Device Through Few Simple Taps2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS)10.1109/BTAS.2018.8698602(1-8)Online publication date: 22-Oct-2018
    • (2018)Palmprint recognition system on mobile devices with double-line-single-point assistancePersonal and Ubiquitous Computing10.1007/s00779-017-1105-222:1(93-104)Online publication date: 1-Feb-2018
    • (2018)Improved Digital Password Authentication Method for Android SystemIntelligent Computing Theories and Application10.1007/978-3-319-95933-7_86(780-791)Online publication date: 15-Aug-2018
    • (2017)Technical feasibility of context-aware passive payment authorization for physical points of salePersonal and Ubiquitous Computing10.1007/s00779-017-1035-z21:6(1113-1125)Online publication date: 1-Dec-2017

    View Options

    View options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media