[go: up one dir, main page]

Thomas et al., 2023 - Google Patents

A broad review on non-intrusive active user authentication in biometrics

Thomas et al., 2023

View HTML
Document ID
1995939469511859373
Author
Thomas P
Preetha Mathew K
Publication year
Publication venue
Journal of Ambient Intelligence and Humanized Computing

External Links

Snippet

Authentication is the process of keeping the user's personal information as confidential in digital applications. Moreover, the user authentication process in the digital platform is employed to verify the own users by some authentication methods like biometrics, voice …
Continue reading at link.springer.com (HTML) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2117User registration
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00221Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
    • G06K9/00288Classification, e.g. identification

Similar Documents

Publication Publication Date Title
Thomas et al. A broad review on non-intrusive active user authentication in biometrics
Fierrez et al. Benchmarking touchscreen biometrics for mobile authentication
Alzubaidi et al. Authentication of smartphone users using behavioral biometrics
Buschek et al. Improving accuracy, applicability and usability of keystroke biometrics on mobile touchscreen devices
Peng et al. Continuous authentication with touch behavioral biometrics and voice on wearable glasses
Raul et al. A comprehensive review of keystroke dynamics-based authentication mechanism
Ellavarason et al. Touch-dynamics based behavioural biometrics on mobile devices–a review from a usability and performance perspective
Neal et al. Surveying biometric authentication for mobile device security
Shukla et al. Stealing passwords by observing hands movement
Alqarni et al. Identifying smartphone users based on how they interact with their phones
Buriro et al. Itsme: Multi-modal and unobtrusive behavioural user authentication for smartphones
Serwadda et al. Toward robotic robbery on the touch screen
Ayeswarya et al. A comprehensive review on secure biometric-based continuous authentication and user profiling
Koong et al. A user authentication scheme using physiological and behavioral biometrics for multitouch devices
Maiorana et al. Mobile keystroke dynamics for biometric recognition: An overview
Giot et al. Keystroke dynamics authentication
Alsuhibany et al. Analyzing the effectiveness of touch keystroke dynamic authentication for the Arabic language
Rashid et al. Clicking your way to security: a review of continuous authentication with mouse dynamics
Roy et al. Enhanced knowledge-based user authentication technique via keystroke dynamics
Dasgupta et al. Continuous Authentication: Authenticating individuals frequently during sessions to assure valid identity
Lin et al. Developing cloud-based intelligent touch behavioral authentication on mobile phones
Kek et al. User Authentication with Keystroke Dynamics: Performance Evaluation in Neural Network
Grenga Android based behavioral biometric authentication via multi-modal fusion
Elmaghraby et al. Cybersecurity enhancement using recurrent neural networks and keystroke dynamics
Alsuhibany et al. Investigating the accuracy of free-text keystroke dynamics authentication in touchscreen devices