Continuous and Transparent Multimodal Authentication Reviewing the State of the Art

Abstract

Individuals, businesses and governments undertake an ever-growing range of activities online and via various Cyberspace-enabled digital devices. Unfortunately, these activities, services, information and devices are the targets of cybercrimes. Verifying the user legitimacy to utilise/access a digital device or service has become of the utmost importance. Hallmark is the frontline countermeasure of ensuring only the authorized user is granted access; however, it has historically suffered from a range of bug related to the security and usability of the approaches. They are also all the same mostly functioning at the bespeak of entry and those performing sort of re-authentication executing it in an intrusive fashion. Thus, it is credible that a more than innovative, convenient and secure user hallmark solution is vital. This paper reviews the authentication methods forth with the electric current employ of authentication technologies, aiming at developing a current country-of-the-fine art and identifying the open issues to be tackled and available solutions to be adopted. Information technology as well investigates whether these authentication technologies have the capability to fill up the gap between high security and user satisfaction. This is followed past a literature review of the existing research on continuous and transparent multimodal hallmark. It concludes that providing users with adequate protection and convenience requires innovative robust hallmark mechanisms to exist utilized in a universal level. Ultimately, a potential federated biometric authentication solution is presented; notwithstanding it needs to exist developed and extensively evaluated, thus operating in a transparent, continuous and convenient manner.

References

  1. Conrad, East., Misenar, Due south., Feldman, J.: Cissp Study Guide. Elsevier Inc., Burlington (2012)

    Google Scholar

  2. Woods, H.G.: The utilise of passwords for controlling access to remote computer systems and services. In: Proceedings of the June 13–16, 1977, National Figurer Conference (AFIPS '77), pp. 27–33. ACM Press, New York, NY, Us (1977)

  3. Zekri, L., Furnell, S.: Hallmark based upon undercover knowledge and its resilience to impostors. Adv. Netw. Commun. Eng. 3, xxx–38 (2006)

    Google Scholar

  4. O'Gorman, L.: Comparing passwords, tokens, and biometrics for user authentication. Proc. IEEE. 91, 2021–2040 (2003)

    Article  Google Scholar

  5. Kurkovsky, S., Syta, Eastward.: Digital natives and mobile phones: a survey of practices and attitudes near privacy and security. In: 2010 IEEE International Symposium on Engineering science and Society, pp. 441–449. IEEE (2010)

  6. Symes, J.E., Clarke, N.Fifty.: Security on mobile devices: a survey of users' attitudes and opinions. Adv. Commun. Comput. Netw. Secur. 9, 59–68 (2012)

    Google Scholar

  7. Crawford, H., Renaud, Thou.: Understanding user perceptions of transparent authentication on a mobile device. J. Trust Manag. one, 1–28 (2014)

    Article  Google Scholar

  8. CSID: Consumer survey: password habits, a study among American consumers. http://www.csid.com/wp-content/uploads/2012/09/CS_PasswordSurvey_FullReport_FINAL.pdf. Accessed eighteen June 2013

  9. Shankdhar, P.: 10 most popular password not bad tools. http://resources.infosecinstitute.com/10-popular-password-cracking-tools/. Accessed 30 Dec 2014

  10. Clarke, North.: Transparent User Hallmark: Biometrics, RFID and Behavioural Profiling. Springer, London (2011)

    Book  Google Scholar

  11. Nelson, D., Reed, V., Walling, J.: Pictorial superiority effect. J. Exp. Psychol. Hum. Learn. Mem. 2, 523–528 (1976)

    Article  Google Scholar

  12. Weiss, R., Luca, A. De: PassShapes: utilizing stroke based authentication to increase password memorability. In: Proceedings of the 5th Nordic Conference on n Human–Computer Interaction, pp. xviii–22 (2008)

  13. De Luca, A., Hang, A., Brudy, F., Lindner, C., Hussmann, H.: Affect me once and i know it'due south yous!: implicit authentication based on touch screen patterns. In: The SIGCHI Briefing on Man Factors in Computing Systems, CHI 2012, pp. 987–996. Austin, TX, USA (2012)

  14. Aviv, A.J., Gibson, K., Mossop, E., Blaze, M., Smith, J.Chiliad.: Smudge attacks on smartphone affect screens. In: Proceedings of the quaternary USENIX Conference on Offensive technologies, WOOT'x (2010)

  15. Wiedenbeck, S., Waters, J., Birget, J.-C., Brodskiy, A., Memon, N.: Authentication using graphical passwords: effects of tolerance and paradigm choice. In: Symposium on Usable Privacy and Security (SOUPS) 2005 (2005)

  16. van Oorschot, P., Thorpe, J.: Exploiting predictability in click-based graphical passwords. J. Comput. Secur. nineteen, 669–702 (2011)

    Google Scholar

  17. Charrau, D., Furnell, Southward., Dowland, P.: PassImages: an culling method of user authentication. In: Proceedings of the fourth Annual ISOneWorld Conference and Convention. Las Vegas, USA (2005)

  18. English, R., Poet, R.: Towards a metric for recognition-based graphical password security. In: 5th International Conference on Network and System Security (NSS), 2011, pp. 6–viii (2011)

  19. Microsoft: features of Windows 8.1—Microsoft Windows. http://windows.microsoft.com/en-gb/windows-8/features#personalize=startscreen. Accessed 08 Nov 2014

  20. Passfaces: passfaces personal version 1.0. http://www.passfaces.com/personal/support/helpmanual.htm. Accessed 05 May 2014

  21. Ellis, H., Shepherd, J., Davies, One thousand.: Identification of familiar and unfamiliar faces from internal and external features: some implications for theories of face up recognition. Perception 8, 431–439 (1979)

    Article  Google Scholar

  22. Aloul, F., Zahidi, South., El-Hajj, W.: 2 cistron authentication using mobile phones. In: 2009 IEEE/ACS International Conference on Computer Systems and Applications, pp. 641–644. IEEE (2009)

  23. HSBC Depository financial institution plc: Secure fundamental: two-factor authentication \(\vert \) HSBC U.k.. http://www.hsbc.co.great britain/1/2/customer-support/online-banking-security/secure-cardinal. Accessed 05 Nov 2014

  24. Google: install google authenticator. https://back up.google.com/accounts/reply/1066447?hl=en. Accessed 05 Nov 2014

  25. Furnell, Due south.K., Katsikas, S., Lopez, J., Patel, A.: Securing Information and Communications Systems: Principles, Technologies, and Applications. Artech Firm, Norwood (2008)

    MATH  Google Scholar

  26. BBC: security house RSA offers to supercede SecurID tokens. http://www.bbc.co.great britain/news/technology-13681566. Accessed 05 May 2014

  27. Nanavati, South., Thieme, M., Nanavati, R.: Biometrics: Identity Verification in a Networked World. Wiley, New York (2002)

    Google Scholar

  28. Jain, A.K., Flynn, P., Ross, A.A.: Handbook of Biometrics. Springer, New York (2008)

    Book  Google Scholar

  29. Schouten, B., Jacobs, B.: Biometrics and their apply in e-passports. Prototype Vis. Comput. 27, 305–312 (2009)

    Commodity  Google Scholar

  30. Clarke, Northward., Furnell, Due south.: Biometrics—the promise versus the exercise. Comput. Fraud Secur. ix, 12–16 (2005)

    Commodity  Google Scholar

  31. Goode Intelligence: Mobile Telephone Biometric Security—Assay and Forecasts 2011–2015. http://www.goodeintelligence.com/report-shop/view/mobile-phone-biometric-security-assay-andforecasts-20112015. Accessed 08 Jan 2015

  32. FBI: next generation identification. http://world wide web.fbi.gov/well-nigh-us/cjis/fingerprints_biometrics/ngi. Accessed 04 June 2014

  33. National Science and Engineering Council: The National Biometrics Challenge 2011. http://biometrics.gov/Documents/BiometricsChallenge2011_protected.pdf. Accessed 03 June 2014

  34. European Central Depository financial institution: Recommendations for the Security of Cyberspace Payments—Terminal Version Later Public Consultation, Frg (2013)

  35. Federal Fiscal Institutions Exam Council: Hallmark in an Cyberspace Cyberbanking Environment. http://digitallibrary.kcci.com.pk/handle/32417747/701. Accessed 08 May 2014

  36. NatWest: NatWest personal banking \(\vert \) online banking. http://www.natwest.com/personal/online-cyberbanking/g1/banking-safely-online/bill of fare-reader.ashx. Accessed 08 Nov 2014

  37. Lloyds Bank: Lloyds Bank—internet cyberbanking—how to log on—assist logging on. http://www.lloydsbank.com/online-banking/logging-on.asp?WT.ac=SNOBLO1012. Accessed 08 November 2014

  38. Samba financial group: SambaOnline cyberbanking—ways to depository financial institution. http://www.samba.com/en/personal-banking/ways-to-bank/samba-online.html. Accessed 08 November 2014

  39. White, C.: Windows 8.1 will focus on biometrics for authentication. http://world wide web.neowin.internet/news/windows-81-volition-focus-on-biometrics-for-authentication. Accessed 24 March 2014

  40. O'Boyle, B.: How does the Samsung Galaxy S5 fingerprint scanner piece of work? http://www.pocket-lint.com/news/127605-how-does-the-samsung-galaxy-s5-fingerprint-scanner-work. Accessed 13 June 2014

  41. Samsung: Samsung Galaxy S5 (Black)—review, specs & features—Samsung UK. http://www.samsung.com/uk/consumer/mobile-devices/smartphones/android/SM-G900FZKABTU. Accessed 08 Nov 2014

  42. Mogull, R.: The iPhone 5s fingerprint reader: what you lot need to know. http://world wide web.macworld.com/commodity/2048514/the-iphone-5s-fingerprint-reader-what-y'all-demand-to-know.html. Accessed 13 June 2014

  43. Apple: iPhone 5s—technical specifications. https://www.apple.com/united kingdom of great britain and northern ireland/iphone-5s/specs/. Accessed 08 Nov 2014

  44. IDC: smartphone OS market share 2014, 2013, 2012, and 2011. http://world wide web.idc.com/prodserv/smartphone-bone-market-share.jsp. Accessed 08 Jan 2015

  45. Macworld: take the pain out of ii-factor hallmark with an app. http://www.macworld.com/article/2840979/have-the-hurting-out-of-two-factor-authentication-with-an-app.html. Accessed 08 January 2015

  46. Sandhu, S.: Single sign on concepts & protocols. https://www.sans.org/reading-room/whitepapers/authentication/single-sign-concepts-protocols-1352. Accessed 26 Mar 2014

  47. Furnell, S.: Authenticating ourselves: will we ever escape the password? Netw. Secur. 2005, 8–thirteen (2005)

    Article  Google Scholar

  48. Stihler, M., Santin, A.O., Marcon Jr., A.L., Fraga, J.D.South.: Integral federated identity direction for deject calculating. In: 2012 fifth International Conference on New Technologies, Mobility and Security (NTMS), pp. 1–five. IEEE (2012)

  49. Cloud Security Alliance: Identity and admission management implementation guidance. In: Cloud Security Alliance Security as a Service Implementation Guidance Version 1.0. pp. i–43 (2012)

  50. Madsen, P., Koga, Y., Takahashi, K.: Federated identity management for protecting users from ID theft. In: Proceedings of the 2005 Workshop on Digital identity management—DIM '05, pp. 77–83. ACM Press, New York, NY, USA (2005)

  51. Traore, I., Ahmed, A.A.E.: Continuous Authentication Using Biometrics: Information, Models, and Metrics. IGI Global, Hershey (2012)

    Book  Google Scholar

  52. Umphress, D., Williams, Chiliad.: Identity verification through keyboard characteristics. Int. J. Homo. Mach. Stud. 23, 263–273 (1985)

    Article  Google Scholar

  53. Leggett, J., Williams, G.: Verifying identity via keystroke characteristics. Int. J. Homo. Mach. Stud. 28, 67–76 (1988)

    Article  Google Scholar

  54. Shepherd, South.: Continuous authentication by analysis of keyboard typing characteristics. In: European Convention on Security and Detection, 1995, pp. 111–114. IET, Brighton (1995)

  55. Mahar, D., Napier, R., Wagner, One thousand., Laverty, W., Henderson, R., Hiron, Yard.: Optimizing digraph-latency based biometric typist verification systems: inter and intra typist differences in digraph latency distributions. Int. J. Hum. Comput. Stud. 43, 579–592 (1995)

    Article  Google Scholar

  56. Furnell, S.Thou., Morrissey, J.P., Sanders, P.W., Stockel, C.T.: Applications of keystroke analysis for improved login security and continuous user authentication. Information Systems Security, pp. 283–294. Chapman & Hall, Ltd., London (1996)

    Affiliate  Google Scholar

  57. Monrose, F., Rubin, A.D.: Keystroke dynamics as a biometric for authentication. Time to come Gener. Comput. Syst. 16, 351–359 (2000)

    Commodity  Google Scholar

  58. Dowland, P.S., Singh, H., Furnell, Due south.M.: A preliminary investigation of user authentication using continuous keystroke assay. In: eighth IFIP Annual Working Conference on Information Security Management and Small System Security (2001)

  59. Bergadano, F., Gunetti, D., Picardi, C.: User authentication through keystroke dynamics. ACM Trans. Inf. Syst. Secur. 5, 367–397 (2002)

    Article  Google Scholar

  60. Gunetti, D., Picardi, C.: Keystroke analysis of free text. ACM Trans. Inf. Syst. Secur. 8, 312–347 (2005)

    Article  MATH  Google Scholar

  61. Hempstalk, K.: Continuous typist verification using motorcar learning, PhD Thesis, The University of Waikato (2009)

  62. Hossain, M., Balagani, K.S., Phoha, 5.V.: New impostor score based rejection methods for continuous keystroke verification with weak templates. In: 2012 IEEE Fifth International Briefing on Biometrics: Theory, Applications and Systems (BTAS), pp. 251–258 (2012)

  63. Marsters, J.: Keystroke dynamics equally a biometric. University of Southampton (2009)

  64. Messerman, A., Mustafic, T., Camtepe, S.A., Albayrak, S.: Continuous and non-intrusive identity verification in existent-time environments based on free-text keystroke dynamics. In: 2011 International Joint Briefing on Biometrics Compendium, IEEE Biometrics (IJCB), pp. 1–8. IEEE (2011)

  65. Obaidat, 1000.S., Sadoun, B.: Verification of reckoner users using keystroke dynamics. IEEE Trans. Syst. Man. Cybern. B. Cybern. 27, 261–269 (1997)

    Article  Google Scholar

  66. Roth, J., Liu, X., Metaxas, D.: On continuous user hallmark via typing behavior. IEEE Trans. Epitome Process. 23, 4611–4624 (2014)

    MathSciNet  Commodity  Google Scholar

  67. Gamboa, H., Fred, A.: A behavioral biometric organisation based on human–calculator interaction. In: Defense and Security, pp. 381–392. International Social club for Optics and Photonics (2004)

  68. Pusara, Chiliad., Brodley, C.East.: User re-authentication via mouse movements. In: Proceedings of the 2004 ACM workshop on Visualization and data mining for calculator security—VizSEC/DMSEC '04, pp. 1–8. ACM Press, New York, NY, USA (2004)

  69. Ahmed, A.A.East., Traore, I.: A new biometric technology based on mouse dynamics. IEEE Trans. undecayed Secur. Comput. four, 165–179 (2007)

    Commodity  Google Scholar

  70. Aksari, Y., Artuner, H.: Active authentication by mouse movements. In: ISCIS 2009, 24th International Symposium on Calculator and Data Sciences, 2009, pp. 571–574. IEEE (2009)

  71. Shen, C., Cai, Z., Guan, X., Huilan, I., Du, J.: Feature analysis of mouse dynamics in identity authentication and monitoring. In: IEEE International Conference on Communications, 2009, ICC '09, pp. 1–five (2009)

  72. Zheng, N., Paloski, A., Wang, H.: An efficient user verification system via mouse movements. In: Proceedings of the 18th ACM Briefing on Figurer and Communications Security, pp. 139–150. ACM, New York, NY, USA (2011)

  73. Jorgensen, Z., Yu, T.: On mouse dynamics as a behavioral biometric for hallmark. In: Proceedings of the 6th ACM Symposium on Data. Reckoner and Communications Security, pp. 476–482. ACM, New York, NY, U.s. (2011)

  74. Lin, C., Chang, C., Liang, D.: A new non-intrusive authentication approach for information protection based on mouse dynamics. In: 2012 International Symposium on Biometrics and Security Technologies, pp. 9–14. IEEE (2012)

  75. Feher, C., Elovici, Y., Moskovitch, R., Rokach, L., Schclar, A.: User identity verification via mouse dynamics. Inf. Sci. (NY) 201, 19–36 (2012)

    Commodity  Google Scholar

  76. Mondal, S., Bours, P.: Continuous authentication using mouse dynamics. In: 2013 International Conference of the Biometrics Special Interest Group (BIOSIG), pp. one–12. IEEE (2013)

  77. Stanic, Grand.: Continuous user verification based on behavioral biometrics using mouse dynamics. In: Proceedings of the ITI 2013 35th International Conference on It Interfaces, pp. 251–256. IEEE, Cavtat, Croatia (2013)

  78. Clarke, Due north.L., Mekala, A.R.: The awarding of signature recognition to transparent handwriting verification for mobile devices. Inf. Manag. Comput. Secur. xv, 214–225 (2007)

    Google Scholar

  79. Kale, A., Rajagopalan, A.N., Cuntoor, N., Kruger, V.: Gait-based recognition of humans using continuous HMMs. In: Proceedings of the Fifth IEEE International Briefing on Automated Face and Gesture Recognition (FGRí02), pp. ane–6. IEEE (2002)

  80. Morris, S.: A shoe-integrated sensor system for wireless gait analysis and existent-time therapeutic feedback. University of Southampton (2004)

  81. Mäntyjärvi, J., Lindholm, M., Vildjiounaite, E., Mäkelä, South.-Grand., Ailisto, H.: Identifying users of portable devices from gait pattern with accelerometers. In: Proceedings. (ICASSP '05). IEEE International Briefing on Acoustics, Speech, and Signal Processing, 2005, pp. 973–976. IEEE (2005)

  82. Gafurov, D., Snekkenes, E.: Gait recognition using wearable motion recording sensors. EURASIP J. Adv. Signal Procedure. 2009, 415817 (2009)

    Article  MATH  Google Scholar

  83. Derawi, M.O., Gafurov, D., Bours, P.: Towards continuous authentication based on gait using wearable motion recording sensors. In: Traore, I., Ahmed, A.A.Eastward. (eds.) Continuous Authentication Using Biometrics: Information, Models, and Metrics, pp. 170–190. IGI Global, Hershey (2012)

    Chapter  Google Scholar

  84. Juefei-Xu, F., Bhagavatula, C., Jaech, A., Prasad, U., Savvides, M.: Gait-id on the motion: stride independent human identification using cell phone accelerometer dynamics. In: 2012 IEEE Fifth International Briefing on Biometrics: Theory. Applications and Systems (BTAS), pp. 8–fifteen. IEEE, Arlington, VA (2012)

  85. Nickel, C., Wirtl, T., Busch, C.: Authentication of smartphone users based on the way they walk using k-NN algorithm. In: 2012 Eighth International Briefing on Intelligent Information Hiding and Multimedia Betoken Processing, pp. 16–20. IEEE (2012)

  86. Lu, H., Huang, J., Saha, T., Nachman, L.: Unobtrusive gait verification for mobile phones. In: Proceedings of the 2014 ACM International Symposium on Wearable Computers—ISWC '14. pp. 91–98. ACM Printing, New York, NY, USA (2014)

  87. Tanviruzzaman, 1000., Ahamed, S.I.: Your phone knows you: almost transparent authentication for smartphones. In: 2014 IEEE 38th Annual Computer Software and Applications Briefing, pp. 374–383. IEEE (2014)

  88. Woo, R.H., Park, A., Hazen, T.J.: The MIT mobile device speaker verification corpus: data collection and preliminary experiments. In: IEEE Odyssey 2006: The Speaker and Language Recognition Workshop, 2006, pp. i–6. IEEE (2006)

  89. Kunz, M., Kasper, Grand., Reininger, H., Möbius, M., Ohms, J.: Continuous speaker verification in realtime. In: Proceedings of the Special Interest Grouping on Biometrics and Electronic Signatures, BIOSIG, vol. 2011, pp. 79–88 (2011)

  90. Martucci, L.A., Zuccato, A., Smeets, B., Habib, S.M., Johansson, T., Shahmehri, N.: Privacy, security and trust in cloud computing: the perspective of the telecommunication manufacture. In: 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Briefing on Autonomic and Trusted Computing (UIC/ATC), 2012, pp. 627–632. IEEE (2012)

  91. Abdullah, M., Bashier, H., Sayeed, S., Yusof, I., Azman, A., Ibrahim, South.Z., Liew, T.H.: Answering incoming call for implicit authentication using smartphone. J. Theor. Appl. Inf. Technol. 61, 193–199 (2014)

    Google Scholar

  92. Aupy, A., Clarke, Due north.: User authentication past service utilisation profiling. In: Proceedings of the ISOneWorld 2005. Las Vegas, USA (2005)

  93. Yazji, Due south., Chen, Ten., Dick, R.P., Scheuermann, P.: Implicit user re-authentication for mobile devices. Ubiquitous Intelligence and Computing, pp. one–15. Springer, New York (2009)

    Google Scholar

  94. Jakobsson, Grand., Shi, E., Golle, P., Grub, R.: Implicit authentication for mobile devices. In: The 4th USENIX Conference on Hot Topics in Security, HotSec'09 (2009)

  95. Saevanee, H., Clarke, Due north., Furnell, S.: SMS linguistic profiling authentication on mobile device. In: 2011 5th International Briefing on Network and System Security, pp. 224–228. IEEE (2011)

  96. Li, F., Wheeler, R., Clarke, N.: An evaluation of behavioural profiling on mobile devices. In: Proceedings of Second International Conference on HAS, vol. 8533, pp. 330–339 (2014)

  97. Klosterman, A., Ganger, Grand.: Secure continuous biometric-enhanced hallmark. In: Technical Report CMU-CS-00-134, Carnegie Mellon University (2000)

  98. Liu, 10., Chen, T.: Video-based confront recognition using adaptive hidden markov models. In: Proceedings of the 2003 IEEE Estimator Society Conference on Computer Vision and Pattern Recognition (CVPR'03). IEEE (2003)

  99. Janakiraman, R., Kumar, Southward., Sim, T.: Using continuous face verification to meliorate desktop security. In: 2005 Seventh IEEE Workshops on Applications of Calculator Vision (WACV/Motion'05), vol. 1, pp. 501–507. IEEE (2005)

  100. Clarke, N., Karatzouni, S., Furnell, S.: Transparent facial recognition for mobile devices. In: Proceedings of the 7th Security Conference. Las Vegas, USA (2008)

  101. Xiao, Q., Yang, X.-D.: Facial recognition in uncontrolled conditions for information security. EURASIP J. Adv. Signal Process. 2010, 1–10 (2010)

    MathSciNet  MATH  Google Scholar

  102. Hurley, D., Nixon, One thousand., Carter, J.: Automatic ear recognition by force field transformations. In: IEE Colloquium on Visual Biometrics, pp. 2–6. IET, London (2000)

  103. Rodwell, P.M.: Non-intrusive subscriber authentication for next generation mobile advice systems, PhD Thesis, University of Plymouth (2006)

  104. Islam, S., Davies, R., Mian, A.Due south., Bennamoun, M.: A fast and fully automatic ear recognition approach based on 3D local surface features. Advanced Concepts for Intelligent Vision Systems. Lecture Notes in Computer Scientific discipline, vol. 5259, pp. 1081–1092. Springer, Berlin (2008)

    Affiliate  Google Scholar

  105. Fahmi, P.N.A., Kodirov, E., Choi, D.-J., Lee, G.-South., Mohd Fikri Azli, A., Sayeed, South.: Implicit authentication based on ear shape biometrics using smartphone camera during a call. In: 2012 IEEE International Briefing on Systems, Man, and Cybernetics (SMC), pp. 2272–2276. IEEE (2012)

  106. Feng, T., Liu, Z., Kwon, Yard.-A., Shi, W., Carbunar, B., Jiang, Y., Nguyen, N.: Continuous mobile authentication using touchscreen gestures. In: 2012 IEEE Briefing on Technologies for Homeland Security (HST), pp. 451–456. IEEE (2012)

  107. Koundinya, P., Theril, Due south., Feng, T., Prakash, Five., Bao, J., Shi, W.: Multi resolution bear on panel with built-in fingerprint sensing support. In: Pattern, Automation & Test in Europe Conference & Exhibition (Date), 2014, pp. 1–half dozen. IEEE Conference Publications, New Jersey (2014)

  108. Kisku, D.R., Gupta, P., Sing, J.G., Tistarelli, M., Hwang, C.J.: Low level multispectral palmprint image fusion for big calibration biometrics authentication. In: Traore, I., Ahmed, A.A.E. (eds.) Continuous Authentication Using Biometrics: Data, Models, and Metrics, pp. 89–104. IGI Global, Hershey (2012)

    Chapter  Google Scholar

  109. Wildes, R.: Iris recognition: an emerging biometric technology. Proc. IEEE. 85, 1348–1363 (1997)

    Commodity  Google Scholar

  110. Matey, J.R., Naroditsky, O., Hanna, K., Kolczynski, R., LoIacono, D.J., Mangru, Due south., Tinker, One thousand., Zappia, T.K., Zhao, W.Y.: Iris on the motion: acquisition of images for iris recognition in less constrained environments. Proc. IEEE. 94, 1936–1947 (2006)

    Commodity  Google Scholar

  111. Proença, H., Alexandre, 50.: Iris segmentation methodology for not-cooperative recognition. IEE Proc. Vis. Image Signal Process. 153, 199–205 (2006)

    Commodity  Google Scholar

  112. Du, Y., Arslanturk, Due east., Zhou, Z., Belcher, C.: Video-based noncooperative iris image segmentation. IEEE Trans. Syst. Human being, Cybern. B Cybern. 41, 64–74 (2011)

    Article  Google Scholar

  113. Yang, K., Du, E.: A multi-stage arroyo for non-cooperative iris recognition. In: 2011 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 3386–3391. IEEE (2011)

  114. Chen, R., Lin, X., Ding, T.: Liveness detection for iris recognition using multispectral images. Pattern Recognit. Lett. 33, 1513–1519 (2012)

    Article  Google Scholar

  115. Mock, One thousand., Hoanca, B., Weaver, J., Milton, G.: Real-time continuous iris recognition for authentication using an middle tracker. In: Proceedings of the 2012 ACM Briefing on Computer and Communications Security, pp. 1007–1009. ACM (2012)

  116. Sui, Y., Zou, X., Du, E.Y., Li, F.: Secure and privacy-preserving biometrics based agile authentication. In: 2012 IEEE International Briefing on Systems, Human, and Cybernetics (SMC), pp. 1291–1296. IEEE (2012)

  117. Jain, A., Nandakumar, K., Ross, A.: Score normalization in multimodal biometric systems. Blueprint Recognit. 38, 2270–2285 (2005)

    Article  Google Scholar

  118. Ross, A., Nandakumar, K., Jain, A.: Handbook of Multibiometrics. Springer, New York (2006)

    Google Scholar

  119. De Oliveira, A.E., Henrique Matos Bezerra Motta, Yard., Vidal Batista, L.: A multibiometric access command architecture for continuous authentication. In: 2010 IEEE International Conference on Intelligence and Security Informatics, pp. 171–171. IEEE (2010)

  120. Sim, T., Zhang, S., Janakiraman, R., Kumar, S.: Continuous verification using multimodal biometrics. IEEE Trans. Pattern Anal. Mach. Intell. 29, 687–700 (2007)

    Article  Google Scholar

  121. Azzini, A., Marrara, S.: Impostor users discovery using a multimodal biometric continuous hallmark fuzzy system. Cognition-Based Intell. Inf. Eng. Syst. 5178, 371–378 (2008)

    Google Scholar

  122. De Oliveira, A.East., Motta, K.H.Thou.B.: A security API for multimodal multi-biometric continuous authentication. In: 2011 Seventh International Conference on Computational Intelligence and Security, pp. 988–992. IEEE (2011)

  123. Tsatsoulis, P.D., Jaech, A., Batie, R., Savvides, M.: Multimodal biometric hand-off for robust unobtrusive continuous biometric authentication. In: Traore, I., Ahmed, A.A.E. (eds.) Continuous Hallmark Using Biometrics: Information, Models, and Metrics, pp. 68–88. IGI Global, Hershey (2012)

    Chapter  Google Scholar

  124. Kwang, G., Yap, R.H., Sim, T., Ramnath, R.: A usability study of continuous biometrics hallmark. In: Tistarelli, M., Nixon, M.S. (eds.) Proceedings of the Third International Conference on Advances in Biometrics, pp. 828–837. Springer, Berlin (2009)

  125. Ahmed, A., Traore, I.: Bibelot intrusion detection based on biometrics. In: Proceedings of the 2005 IEEE Workshop on Information Assurance and Security, pp. 452–453. IEEE (2005)

  126. Pusara, Grand.: An Examination of User Beliefs for User Re-authentication. ProQuest, Ann Arbor (2007)

    Google Scholar

  127. Bailey, K.O., Okolica, J.S., Peterson, Yard.L.: User identification and hallmark using multi-modal behavioral biometrics. Comput. Secur. 43, 77–89 (2014)

    Article  Google Scholar

  128. Vildjiounaite, E., Mäkelä, S., Lindholm, M., Riihimäki, R.: Unobtrusive multimodal biometrics for ensuring privacy and information security with personal devices. In: Proceedings of the 4th International Conference on Pervasive Computing, pp. 187–201. Springer, Berlin (2006)

  129. Li, F., Clarke, North., Papadaki, M., Dowland, P.: Behaviour profiling for transparent hallmark for mobile devices. In: the 10th European Conference on Data Warfare and Security (ECIW 2011), pp. 307–314, Tallinn, Estonia (2011)

  130. Crawford, H., Renaud, K., Storer, T.: A framework for continuous, transparent mobile device authentication. Comput. Secur. 39, 127–136 (2013)

    Article  Google Scholar

  131. Saevanee, H., Clarke, North., Furnell, S., Biscione, V.: Text-based active authentication for mobile devices. IFIP Adv. Inf. Commun. Technol. ICT Syst. Secur. Priv. Prot. 428, 99–112 (2014)

    Article  Google Scholar

  132. Carrillo, C.: Continuous Biometric Authentication for Authorized Aircraft Personnel: A Proposed Design. Naval Postgraduate Schoolhouse, Monterey (2003)

    Google Scholar

  133. Clarke, N., Furnell, S.: A composite user hallmark compages for mobile devices. J. Inf. Warf. 5, 11–29 (2006)

  134. Asha, S., Chellappan, C.: Hallmark of eastward-learners using multimodal biometric engineering science. In: International Symposium on Biometrics and Security Technologies, 2008, ISBAST 2008, pp. 1–half dozen. IEEE (2008)

  135. Muaaz, Chiliad.: A transparent and continuous biometric authentication framework for convenient secure mobile environments. In: The 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2013 Offshoot), pp. 4–7. ACM, Zurich, Switzerland (2013)

  136. Altinok, A., Turk, M.: Temporal integration for continuous multimodal biometrics. In: Multimodal User Authentication (2003)

  137. Kang, H.-B., Ju, M.-H.: Multi-modal feature integration for secure authentication. In: Huang, D.-Due south., Li, One thousand., Irwin, Thousand.W. (eds.) Proceedings of the 2006 International Conference on Intelligent Computing, pp. 1191–1200. Springer, Berlin (2006)

  138. Ojala, Southward., Keinanen, J., Skytta, J.: Vesture authentication device for transparent login in nomadic applications environment. In: 2nd International Briefing on Signals, Circuits and Systems, pp. 1–6 (2008)

  139. Clarke, North., Karatzouni, Due south., Furnell, S.: Flexible and transparent user authentication for mobile devices. In: Gritzalis, D., Lopez, J. (eds.) Emerging Challenges for Security, Privacy and Trust, 24th IFIP TC eleven International Information Security Conference, SEC 2009, pp. 1–12. Springer, Pafos, Republic of cyprus (2009)

  140. Soltane, Thousand., Doghmane, N., Guersi, N.: Face and speech based multi-modal biometric hallmark. Int. J. Adv. Sci. Technol. 21, 41–56 (2010)

    Google Scholar

  141. Niinuma, K., Park, U., Jain, A.Thou.: Soft biometric traits for continuous user hallmark. IEEE Trans. Inf. Forensics Secur. 5, 771–780 (2010)

    Article  Google Scholar

  142. Tsai, P., Khan, G.1000., Pan, J., Liao, B.: Interactive bogus bee colony supported passive continuous authentication system. IEEE Syst. J. IEEE Biom. Compend. 8, 395–405 (2014)

    Article  Google Scholar

  143. Khan, M.One thousand., Tsai, P.-W., Pan, J.-S., Liao, B.-Y.: Biometric driven initiative system for passive continuous authentication. In: 7th International Conference on Data Assurance and Security (IAS), 2011, pp. 139–144. IEEE (2011)

  144. Chowdhury, Thou., Light, J., McIver, W.: A framework for continuous authentication in ubiquitous environments. In: Sixth International Briefing on Wireless Communication and Sensor Networks (WCSN), pp. i–vi. IEEE Press (2010)

  145. Riva, O., Qin, C., Strauss, K., Lymberopoulos, D.: Progressive authentication: deciding when to cosign on mobile phones. In: The 21st USENIX Security Symposium (2012)

  146. Hocking, C.G., Furnell, Due south.M., Clarke, Due north.L., Reynolds, P.L.: Branch user identity verification using an Hallmark Aura. Comput. Secur. 39, 486–502 (2013)

    Article  Google Scholar

  147. Traore, I., Woungang, I., Obaidat, 1000.Due south., Nakkabi, Y., Lai, I.: Combining mouse and keystroke dynamics biometrics for risk-based authentication in web environments. In: 2012 Fourth International Conference on Digital Habitation, pp. 138–145. IEEE (2012)

  148. Ceccarelli, A., Montecchi, Fifty., Brancati, F., Lollini, P., Marguglio, A., Bondavalli, A.: Continuous and transparent user identity verification for secure internet services. IEEE Trans. Undecayed Secur. Comput. 12, 270–283 (2014)

  149. Salesforce: 2014 Mobile Behavior Report. https://www.exacttarget.com/sites/exacttarget/files/deliverables/etmc-2014mobilebehaviorreport.pdf. Accessed 17 Nov 2014

  150. Al Abdulwahid, A., Clarke, N., Furnell, S., Stengel, I.: A conceptual model for federated authentication in the deject. In: Proceedings of the 11th Australian Data Security Management Conference (AISM2013), pp. one–xi. Edith Cowan University, Perth, Western Commonwealth of australia (2013)

Download references

Writer information

Affiliations

Corresponding writer

Correspondence to Abdulwahid Al Abdulwahid.

About this article

Verify currency and authenticity via CrossMark

Cite this article

Al Abdulwahid, A., Clarke, N., Stengel, I. et al. Continuous and transparent multimodal authentication: reviewing the country of the art. Cluster Comput nineteen, 455–474 (2016). https://doi.org/10.1007/s10586-015-0510-4

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI : https://doi.org/10.1007/s10586-015-0510-4

Keywords

  • User authentication
  • Authentication technologies
  • Security
  • Usability
  • Transparent hallmark
  • Biometrics
  • Continuous authentication

cooperthook1946.blogspot.com

Source: https://link.springer.com/article/10.1007/s10586-015-0510-4

0 Response to "Continuous and Transparent Multimodal Authentication Reviewing the State of the Art"

Post a Comment

Iklan Atas Artikel

Iklan Tengah Artikel 1

Iklan Tengah Artikel 2

Iklan Bawah Artikel