Implicit Biometric Authentication for Smartphones

TitleImplicit Biometric Authentication for Smartphones
Publication TypeThesis
Year of Publication2017
AuthorsMuaaz, M
Academic DepartmentInstitute of Networks and Security
Number of Pagesxviii, 198, 3 Pages
Date Published06/2017
UniversityJohannes Kepler University
CityLinz
Thesis TypePhD Thesis
Abstract

Smartphones have evolved to a stage where they are not only used for a calling or texting but also offer a multitude of services such as banking, e-commerce, portable storage, social, entertainment, etc. As a consequence, smartphones process and store a lot (eg, PIN, passwords, or graphical patterns) are used on smartphones. These authentication methods suffer from usability drawbacks. For instance, users are required to remember their PIN, passwords, or graphical patterns, and enter them all the time. Therefore, most of the users are not aware of these authentication methods, and thus, significantly lowering the security of their smartphones. Biometric authentication methods on smartphones can bridge the gap between security and usability. However, biometric authentication methods such as face, fingerprint, and iris, which are nowadays available on smartphones require an explicit interaction before every authentication attempt. In this thesis, we present implicit biometric authentication methods for smartphones, which can be used to authenticate users to their smartphones without requiring user interaction. (1) implicit gait recognition, (2) implicit and explicit speaker authentication, and (3) a framework for continuous authentication on smartphones significantly lowering the security of their smartphones. Biometric authentication methods on smartphones can bridge the gap between security and usability. However, biometric authentication methods such as face, fingerprint, and iris, which are nowadays available on smartphones require an explicit interaction before every authentication attempt. In this thesis, we present implicit biometric authentication methods for smartphones, which can be used to authenticate users to their smartphones without requiring user interaction. (1) implicit gait recognition, (2) implicit and explicit speaker authentication, and (3) a framework for continuous authentication on smartphones significantly lowering the security of their smartphones. Biometric authentication methods on smartphones can bridge the gap between security and usability. However, biometric authentication methods such as face, fingerprint, and iris, which are nowadays available on smartphones require an explicit interaction before every authentication attempt. In this thesis, we present implicit biometric authentication methods for smartphones, which can be used to authenticate users to their smartphones without requiring user interaction. (1) implicit gait recognition, (2) implicit and explicit speaker authentication, and (3) a framework for continuous authentication on smartphones Biometric authentication methods on smartphones can bridge the gap between security and usability. However, biometric authentication methods such as face, fingerprint, and iris, which are nowadays available on smartphones require an explicit interaction before every authentication attempt. In this thesis, we present implicit biometric authentication methods for smartphones, which can be used to authenticate users to their smartphones without requiring user interaction. (1) implicit gait recognition, (2) implicit and explicit speaker authentication, and (3) a framework for continuous authentication on smartphones Biometric authentication methods on smartphones can bridge the gap between security and usability. However, biometric authentication methods such as face, fingerprint, and iris, which are nowadays available on smartphones require an explicit interaction before every authentication attempt. In this thesis, we present implicit biometric authentication methods for smartphones, which can be used to authenticate users to their smartphones without requiring user interaction. (1) implicit gait recognition, (2) implicit and explicit speaker authentication, and (3) a framework for continuous authentication on smartphones and iris, which are nowadays available on smartphones require an explicit interaction before every authentication attempt. In this thesis, we present implicit biometric authentication methods for smartphones, which can be used to authenticate users to their smartphones without requiring user interaction. (1) implicit gait recognition, (2) implicit and explicit speaker authentication, and (3) a framework for continuous authentication on smartphones and iris, which are nowadays available on smartphones require an explicit interaction before every authentication attempt. In this thesis, we present implicit biometric authentication methods for smartphones, which can be used to authenticate users to their smartphones without requiring user interaction. (1) implicit gait recognition, (2) implicit and explicit speaker authentication, and (3) a framework for continuous authentication on smartphones which can be used to authenticate users to their smartphones without requiring user interaction. (1) implicit gait recognition, (2) implicit and explicit speaker authentication, and (3) a framework for continuous authentication on smartphones which can be used to authenticate users to their smartphones without requiring user interaction. (1) implicit gait recognition, (2) implicit and explicit speaker authentication, and (3) a framework for continuous authentication on smartphones
In the first and last part of this thesis, we developed methods for smartphone-based gait authentication which allow users to implicitly authenticate to their smartphones. In this regard, the nature of the contribution of this work is not only to develop a new method, but also to an enhancement of existing approaches in the domain of accelerometers-based gait recognition for continuous implicit authentication on smartphones with a focus on practical applicability, and developing new knowledge on security and usability fronts. Our gait authentication system utilizes a smartphone-based inertial sensor (ie ~ accelerometers) to collect dynamic bodily. We are looking forward to working with you in the future. In addition, we extended the cycle-based approach and introduced a novel smartphone-based gait recognition method by using generative models. Moreover, these approaches were evaluated on the basis of a realistic gait data set which we had collected by placing the smartphone inside the pockets of trousers. Our findings have proved to be the best way to achieve the best results we extended the cycle-based approach and applied a novel smartphone-based gait recognition method by using generative models. Moreover, these approaches were evaluated on the basis of a realistic gait data set which we had collected by placing the smartphone inside the pockets of trousers. Our findings have proved to be the best way to achieve the best results we extended the cycle-based approach and applied a novel smartphone-based gait recognition method by using generative models. Moreover, these approaches were evaluated on the basis of a realistic gait data set which we had collected by placing the smartphone inside the pockets of trousers. Our findings have proved to be the best way to achieve the best results
Furthermore, we have analyzed the security strengths of smartphone-based gait authentication against live impersonation attacks. Our findings are based on the assumption that the covariate factor is the most important factor in the assessment of a patient's condition that affect the gait recognition performance. Our ratings have been valid for years. However, his performance depends on the placement of the smartphone and other temporal factors, such as muscle fatigue and tiredness. The second part of this thesis deals with the implicit and explicit speaker authentication system for smartphones. The approach in this regard is not developing new methods for speaker recognition but also the usability of state-of-the-art approaches for speaker recognition on smartphones. Moreover, we evaluate the performance on publicly available text-dependent and text-independent datasets. Most of the biometric authentication methods work on the principle of static access control, which means users need to authenticate when they want to access the system. Continuous authentication addresses this limitation by continuously re-verifying the identity of users in unobtrusive fashion, and thus increases the security of the system and user friendliness towards authentication mechanisms. In smartphone environments, continuous authentication can be done using multiple implicit and explicit authentication methods. Further, we also define the way to implement continuous authentication on smartphones.

URLhttp://data.onb.ac.at/rec/AC13735249
yorandomusmilelink