Continuous and Transparent Multimodal Authentication Reviewing the State of the Art
Abstract
Individuals, businesses and governments undertake an ever-growing range of activities online and via various Cyberspace-enabled digital devices. Unfortunately, these activities, services, information and devices are the targets of cybercrimes. Verifying the user legitimacy to utilise/access a digital device or service has become of the utmost importance. Hallmark is the frontline countermeasure of ensuring only the authorized user is granted access; however, it has historically suffered from a range of bug related to the security and usability of the approaches. They are also all the same mostly functioning at the bespeak of entry and those performing sort of re-authentication executing it in an intrusive fashion. Thus, it is credible that a more than innovative, convenient and secure user hallmark solution is vital. This paper reviews the authentication methods forth with the electric current employ of authentication technologies, aiming at developing a current country-of-the-fine art and identifying the open issues to be tackled and available solutions to be adopted. Information technology as well investigates whether these authentication technologies have the capability to fill up the gap between high security and user satisfaction. This is followed past a literature review of the existing research on continuous and transparent multimodal hallmark. It concludes that providing users with adequate protection and convenience requires innovative robust hallmark mechanisms to exist utilized in a universal level. Ultimately, a potential federated biometric authentication solution is presented; notwithstanding it needs to exist developed and extensively evaluated, thus operating in a transparent, continuous and convenient manner.
References
-
Conrad, East., Misenar, Due south., Feldman, J.: Cissp Study Guide. Elsevier Inc., Burlington (2012)
-
Woods, H.G.: The utilise of passwords for controlling access to remote computer systems and services. In: Proceedings of the June 13–16, 1977, National Figurer Conference (AFIPS '77), pp. 27–33. ACM Press, New York, NY, Us (1977)
-
Zekri, L., Furnell, S.: Hallmark based upon undercover knowledge and its resilience to impostors. Adv. Netw. Commun. Eng. 3, xxx–38 (2006)
-
O'Gorman, L.: Comparing passwords, tokens, and biometrics for user authentication. Proc. IEEE. 91, 2021–2040 (2003)
-
Kurkovsky, S., Syta, Eastward.: Digital natives and mobile phones: a survey of practices and attitudes near privacy and security. In: 2010 IEEE International Symposium on Engineering science and Society, pp. 441–449. IEEE (2010)
-
Symes, J.E., Clarke, N.Fifty.: Security on mobile devices: a survey of users' attitudes and opinions. Adv. Commun. Comput. Netw. Secur. 9, 59–68 (2012)
-
Crawford, H., Renaud, Thou.: Understanding user perceptions of transparent authentication on a mobile device. J. Trust Manag. one, 1–28 (2014)
-
CSID: Consumer survey: password habits, a study among American consumers. http://www.csid.com/wp-content/uploads/2012/09/CS_PasswordSurvey_FullReport_FINAL.pdf. Accessed eighteen June 2013
-
Shankdhar, P.: 10 most popular password not bad tools. http://resources.infosecinstitute.com/10-popular-password-cracking-tools/. Accessed 30 Dec 2014
-
Clarke, North.: Transparent User Hallmark: Biometrics, RFID and Behavioural Profiling. Springer, London (2011)
-
Nelson, D., Reed, V., Walling, J.: Pictorial superiority effect. J. Exp. Psychol. Hum. Learn. Mem. 2, 523–528 (1976)
-
Weiss, R., Luca, A. De: PassShapes: utilizing stroke based authentication to increase password memorability. In: Proceedings of the 5th Nordic Conference on n Human–Computer Interaction, pp. xviii–22 (2008)
-
De Luca, A., Hang, A., Brudy, F., Lindner, C., Hussmann, H.: Affect me once and i know it'due south yous!: implicit authentication based on touch screen patterns. In: The SIGCHI Briefing on Man Factors in Computing Systems, CHI 2012, pp. 987–996. Austin, TX, USA (2012)
-
Aviv, A.J., Gibson, K., Mossop, E., Blaze, M., Smith, J.Chiliad.: Smudge attacks on smartphone affect screens. In: Proceedings of the quaternary USENIX Conference on Offensive technologies, WOOT'x (2010)
-
Wiedenbeck, S., Waters, J., Birget, J.-C., Brodskiy, A., Memon, N.: Authentication using graphical passwords: effects of tolerance and paradigm choice. In: Symposium on Usable Privacy and Security (SOUPS) 2005 (2005)
-
van Oorschot, P., Thorpe, J.: Exploiting predictability in click-based graphical passwords. J. Comput. Secur. nineteen, 669–702 (2011)
-
Charrau, D., Furnell, Southward., Dowland, P.: PassImages: an culling method of user authentication. In: Proceedings of the fourth Annual ISOneWorld Conference and Convention. Las Vegas, USA (2005)
-
English, R., Poet, R.: Towards a metric for recognition-based graphical password security. In: 5th International Conference on Network and System Security (NSS), 2011, pp. 6–viii (2011)
-
Microsoft: features of Windows 8.1—Microsoft Windows. http://windows.microsoft.com/en-gb/windows-8/features#personalize=startscreen. Accessed 08 Nov 2014
-
Passfaces: passfaces personal version 1.0. http://www.passfaces.com/personal/support/helpmanual.htm. Accessed 05 May 2014
-
Ellis, H., Shepherd, J., Davies, One thousand.: Identification of familiar and unfamiliar faces from internal and external features: some implications for theories of face up recognition. Perception 8, 431–439 (1979)
-
Aloul, F., Zahidi, South., El-Hajj, W.: 2 cistron authentication using mobile phones. In: 2009 IEEE/ACS International Conference on Computer Systems and Applications, pp. 641–644. IEEE (2009)
-
HSBC Depository financial institution plc: Secure fundamental: two-factor authentication \(\vert \) HSBC U.k.. http://www.hsbc.co.great britain/1/2/customer-support/online-banking-security/secure-cardinal. Accessed 05 Nov 2014
-
Google: install google authenticator. https://back up.google.com/accounts/reply/1066447?hl=en. Accessed 05 Nov 2014
-
Furnell, Due south.K., Katsikas, S., Lopez, J., Patel, A.: Securing Information and Communications Systems: Principles, Technologies, and Applications. Artech Firm, Norwood (2008)
-
BBC: security house RSA offers to supercede SecurID tokens. http://www.bbc.co.great britain/news/technology-13681566. Accessed 05 May 2014
-
Nanavati, South., Thieme, M., Nanavati, R.: Biometrics: Identity Verification in a Networked World. Wiley, New York (2002)
-
Jain, A.K., Flynn, P., Ross, A.A.: Handbook of Biometrics. Springer, New York (2008)
-
Schouten, B., Jacobs, B.: Biometrics and their apply in e-passports. Prototype Vis. Comput. 27, 305–312 (2009)
-
Clarke, Northward., Furnell, Due south.: Biometrics—the promise versus the exercise. Comput. Fraud Secur. ix, 12–16 (2005)
-
Goode Intelligence: Mobile Telephone Biometric Security—Assay and Forecasts 2011–2015. http://www.goodeintelligence.com/report-shop/view/mobile-phone-biometric-security-assay-andforecasts-20112015. Accessed 08 Jan 2015
-
FBI: next generation identification. http://world wide web.fbi.gov/well-nigh-us/cjis/fingerprints_biometrics/ngi. Accessed 04 June 2014
-
National Science and Engineering Council: The National Biometrics Challenge 2011. http://biometrics.gov/Documents/BiometricsChallenge2011_protected.pdf. Accessed 03 June 2014
-
European Central Depository financial institution: Recommendations for the Security of Cyberspace Payments—Terminal Version Later Public Consultation, Frg (2013)
-
Federal Fiscal Institutions Exam Council: Hallmark in an Cyberspace Cyberbanking Environment. http://digitallibrary.kcci.com.pk/handle/32417747/701. Accessed 08 May 2014
-
NatWest: NatWest personal banking \(\vert \) online banking. http://www.natwest.com/personal/online-cyberbanking/g1/banking-safely-online/bill of fare-reader.ashx. Accessed 08 Nov 2014
-
Lloyds Bank: Lloyds Bank—internet cyberbanking—how to log on—assist logging on. http://www.lloydsbank.com/online-banking/logging-on.asp?WT.ac=SNOBLO1012. Accessed 08 November 2014
-
Samba financial group: SambaOnline cyberbanking—ways to depository financial institution. http://www.samba.com/en/personal-banking/ways-to-bank/samba-online.html. Accessed 08 November 2014
-
White, C.: Windows 8.1 will focus on biometrics for authentication. http://world wide web.neowin.internet/news/windows-81-volition-focus-on-biometrics-for-authentication. Accessed 24 March 2014
-
O'Boyle, B.: How does the Samsung Galaxy S5 fingerprint scanner piece of work? http://www.pocket-lint.com/news/127605-how-does-the-samsung-galaxy-s5-fingerprint-scanner-work. Accessed 13 June 2014
-
Samsung: Samsung Galaxy S5 (Black)—review, specs & features—Samsung UK. http://www.samsung.com/uk/consumer/mobile-devices/smartphones/android/SM-G900FZKABTU. Accessed 08 Nov 2014
-
Mogull, R.: The iPhone 5s fingerprint reader: what you lot need to know. http://world wide web.macworld.com/commodity/2048514/the-iphone-5s-fingerprint-reader-what-y'all-demand-to-know.html. Accessed 13 June 2014
-
Apple: iPhone 5s—technical specifications. https://www.apple.com/united kingdom of great britain and northern ireland/iphone-5s/specs/. Accessed 08 Nov 2014
-
IDC: smartphone OS market share 2014, 2013, 2012, and 2011. http://world wide web.idc.com/prodserv/smartphone-bone-market-share.jsp. Accessed 08 Jan 2015
-
Macworld: take the pain out of ii-factor hallmark with an app. http://www.macworld.com/article/2840979/have-the-hurting-out-of-two-factor-authentication-with-an-app.html. Accessed 08 January 2015
-
Sandhu, S.: Single sign on concepts & protocols. https://www.sans.org/reading-room/whitepapers/authentication/single-sign-concepts-protocols-1352. Accessed 26 Mar 2014
-
Furnell, S.: Authenticating ourselves: will we ever escape the password? Netw. Secur. 2005, 8–thirteen (2005)
-
Stihler, M., Santin, A.O., Marcon Jr., A.L., Fraga, J.D.South.: Integral federated identity direction for deject calculating. In: 2012 fifth International Conference on New Technologies, Mobility and Security (NTMS), pp. 1–five. IEEE (2012)
-
Cloud Security Alliance: Identity and admission management implementation guidance. In: Cloud Security Alliance Security as a Service Implementation Guidance Version 1.0. pp. i–43 (2012)
-
Madsen, P., Koga, Y., Takahashi, K.: Federated identity management for protecting users from ID theft. In: Proceedings of the 2005 Workshop on Digital identity management—DIM '05, pp. 77–83. ACM Press, New York, NY, USA (2005)
-
Traore, I., Ahmed, A.A.E.: Continuous Authentication Using Biometrics: Information, Models, and Metrics. IGI Global, Hershey (2012)
-
Umphress, D., Williams, Chiliad.: Identity verification through keyboard characteristics. Int. J. Homo. Mach. Stud. 23, 263–273 (1985)
-
Leggett, J., Williams, G.: Verifying identity via keystroke characteristics. Int. J. Homo. Mach. Stud. 28, 67–76 (1988)
-
Shepherd, South.: Continuous authentication by analysis of keyboard typing characteristics. In: European Convention on Security and Detection, 1995, pp. 111–114. IET, Brighton (1995)
-
Mahar, D., Napier, R., Wagner, One thousand., Laverty, W., Henderson, R., Hiron, Yard.: Optimizing digraph-latency based biometric typist verification systems: inter and intra typist differences in digraph latency distributions. Int. J. Hum. Comput. Stud. 43, 579–592 (1995)
-
Furnell, S.Thou., Morrissey, J.P., Sanders, P.W., Stockel, C.T.: Applications of keystroke analysis for improved login security and continuous user authentication. Information Systems Security, pp. 283–294. Chapman & Hall, Ltd., London (1996)
-
Monrose, F., Rubin, A.D.: Keystroke dynamics as a biometric for authentication. Time to come Gener. Comput. Syst. 16, 351–359 (2000)
-
Dowland, P.S., Singh, H., Furnell, Due south.M.: A preliminary investigation of user authentication using continuous keystroke assay. In: eighth IFIP Annual Working Conference on Information Security Management and Small System Security (2001)
-
Bergadano, F., Gunetti, D., Picardi, C.: User authentication through keystroke dynamics. ACM Trans. Inf. Syst. Secur. 5, 367–397 (2002)
-
Gunetti, D., Picardi, C.: Keystroke analysis of free text. ACM Trans. Inf. Syst. Secur. 8, 312–347 (2005)
-
Hempstalk, K.: Continuous typist verification using motorcar learning, PhD Thesis, The University of Waikato (2009)
-
Hossain, M., Balagani, K.S., Phoha, 5.V.: New impostor score based rejection methods for continuous keystroke verification with weak templates. In: 2012 IEEE Fifth International Briefing on Biometrics: Theory, Applications and Systems (BTAS), pp. 251–258 (2012)
-
Marsters, J.: Keystroke dynamics equally a biometric. University of Southampton (2009)
-
Messerman, A., Mustafic, T., Camtepe, S.A., Albayrak, S.: Continuous and non-intrusive identity verification in existent-time environments based on free-text keystroke dynamics. In: 2011 International Joint Briefing on Biometrics Compendium, IEEE Biometrics (IJCB), pp. 1–8. IEEE (2011)
-
Obaidat, 1000.S., Sadoun, B.: Verification of reckoner users using keystroke dynamics. IEEE Trans. Syst. Man. Cybern. B. Cybern. 27, 261–269 (1997)
-
Roth, J., Liu, X., Metaxas, D.: On continuous user hallmark via typing behavior. IEEE Trans. Epitome Process. 23, 4611–4624 (2014)
-
Gamboa, H., Fred, A.: A behavioral biometric organisation based on human–calculator interaction. In: Defense and Security, pp. 381–392. International Social club for Optics and Photonics (2004)
-
Pusara, Chiliad., Brodley, C.East.: User re-authentication via mouse movements. In: Proceedings of the 2004 ACM workshop on Visualization and data mining for calculator security—VizSEC/DMSEC '04, pp. 1–8. ACM Press, New York, NY, USA (2004)
-
Ahmed, A.A.East., Traore, I.: A new biometric technology based on mouse dynamics. IEEE Trans. undecayed Secur. Comput. four, 165–179 (2007)
-
Aksari, Y., Artuner, H.: Active authentication by mouse movements. In: ISCIS 2009, 24th International Symposium on Calculator and Data Sciences, 2009, pp. 571–574. IEEE (2009)
-
Shen, C., Cai, Z., Guan, X., Huilan, I., Du, J.: Feature analysis of mouse dynamics in identity authentication and monitoring. In: IEEE International Conference on Communications, 2009, ICC '09, pp. 1–five (2009)
-
Zheng, N., Paloski, A., Wang, H.: An efficient user verification system via mouse movements. In: Proceedings of the 18th ACM Briefing on Figurer and Communications Security, pp. 139–150. ACM, New York, NY, USA (2011)
-
Jorgensen, Z., Yu, T.: On mouse dynamics as a behavioral biometric for hallmark. In: Proceedings of the 6th ACM Symposium on Data. Reckoner and Communications Security, pp. 476–482. ACM, New York, NY, U.s. (2011)
-
Lin, C., Chang, C., Liang, D.: A new non-intrusive authentication approach for information protection based on mouse dynamics. In: 2012 International Symposium on Biometrics and Security Technologies, pp. 9–14. IEEE (2012)
-
Feher, C., Elovici, Y., Moskovitch, R., Rokach, L., Schclar, A.: User identity verification via mouse dynamics. Inf. Sci. (NY) 201, 19–36 (2012)
-
Mondal, S., Bours, P.: Continuous authentication using mouse dynamics. In: 2013 International Conference of the Biometrics Special Interest Group (BIOSIG), pp. one–12. IEEE (2013)
-
Stanic, Grand.: Continuous user verification based on behavioral biometrics using mouse dynamics. In: Proceedings of the ITI 2013 35th International Conference on It Interfaces, pp. 251–256. IEEE, Cavtat, Croatia (2013)
-
Clarke, Due north.L., Mekala, A.R.: The awarding of signature recognition to transparent handwriting verification for mobile devices. Inf. Manag. Comput. Secur. xv, 214–225 (2007)
-
Kale, A., Rajagopalan, A.N., Cuntoor, N., Kruger, V.: Gait-based recognition of humans using continuous HMMs. In: Proceedings of the Fifth IEEE International Briefing on Automated Face and Gesture Recognition (FGRÃ02), pp. ane–6. IEEE (2002)
-
Morris, S.: A shoe-integrated sensor system for wireless gait analysis and existent-time therapeutic feedback. University of Southampton (2004)
-
Mäntyjärvi, J., Lindholm, M., Vildjiounaite, E., Mäkelä, South.-Grand., Ailisto, H.: Identifying users of portable devices from gait pattern with accelerometers. In: Proceedings. (ICASSP '05). IEEE International Briefing on Acoustics, Speech, and Signal Processing, 2005, pp. 973–976. IEEE (2005)
-
Gafurov, D., Snekkenes, E.: Gait recognition using wearable motion recording sensors. EURASIP J. Adv. Signal Procedure. 2009, 415817 (2009)
-
Derawi, M.O., Gafurov, D., Bours, P.: Towards continuous authentication based on gait using wearable motion recording sensors. In: Traore, I., Ahmed, A.A.Eastward. (eds.) Continuous Authentication Using Biometrics: Information, Models, and Metrics, pp. 170–190. IGI Global, Hershey (2012)
-
Juefei-Xu, F., Bhagavatula, C., Jaech, A., Prasad, U., Savvides, M.: Gait-id on the motion: stride independent human identification using cell phone accelerometer dynamics. In: 2012 IEEE Fifth International Briefing on Biometrics: Theory. Applications and Systems (BTAS), pp. 8–fifteen. IEEE, Arlington, VA (2012)
-
Nickel, C., Wirtl, T., Busch, C.: Authentication of smartphone users based on the way they walk using k-NN algorithm. In: 2012 Eighth International Briefing on Intelligent Information Hiding and Multimedia Betoken Processing, pp. 16–20. IEEE (2012)
-
Lu, H., Huang, J., Saha, T., Nachman, L.: Unobtrusive gait verification for mobile phones. In: Proceedings of the 2014 ACM International Symposium on Wearable Computers—ISWC '14. pp. 91–98. ACM Printing, New York, NY, USA (2014)
-
Tanviruzzaman, 1000., Ahamed, S.I.: Your phone knows you: almost transparent authentication for smartphones. In: 2014 IEEE 38th Annual Computer Software and Applications Briefing, pp. 374–383. IEEE (2014)
-
Woo, R.H., Park, A., Hazen, T.J.: The MIT mobile device speaker verification corpus: data collection and preliminary experiments. In: IEEE Odyssey 2006: The Speaker and Language Recognition Workshop, 2006, pp. i–6. IEEE (2006)
-
Kunz, M., Kasper, Grand., Reininger, H., Möbius, M., Ohms, J.: Continuous speaker verification in realtime. In: Proceedings of the Special Interest Grouping on Biometrics and Electronic Signatures, BIOSIG, vol. 2011, pp. 79–88 (2011)
-
Martucci, L.A., Zuccato, A., Smeets, B., Habib, S.M., Johansson, T., Shahmehri, N.: Privacy, security and trust in cloud computing: the perspective of the telecommunication manufacture. In: 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Briefing on Autonomic and Trusted Computing (UIC/ATC), 2012, pp. 627–632. IEEE (2012)
-
Abdullah, M., Bashier, H., Sayeed, S., Yusof, I., Azman, A., Ibrahim, South.Z., Liew, T.H.: Answering incoming call for implicit authentication using smartphone. J. Theor. Appl. Inf. Technol. 61, 193–199 (2014)
-
Aupy, A., Clarke, Due north.: User authentication past service utilisation profiling. In: Proceedings of the ISOneWorld 2005. Las Vegas, USA (2005)
-
Yazji, Due south., Chen, Ten., Dick, R.P., Scheuermann, P.: Implicit user re-authentication for mobile devices. Ubiquitous Intelligence and Computing, pp. one–15. Springer, New York (2009)
-
Jakobsson, Grand., Shi, E., Golle, P., Grub, R.: Implicit authentication for mobile devices. In: The 4th USENIX Conference on Hot Topics in Security, HotSec'09 (2009)
-
Saevanee, H., Clarke, Due north., Furnell, S.: SMS linguistic profiling authentication on mobile device. In: 2011 5th International Briefing on Network and System Security, pp. 224–228. IEEE (2011)
-
Li, F., Wheeler, R., Clarke, N.: An evaluation of behavioural profiling on mobile devices. In: Proceedings of Second International Conference on HAS, vol. 8533, pp. 330–339 (2014)
-
Klosterman, A., Ganger, Grand.: Secure continuous biometric-enhanced hallmark. In: Technical Report CMU-CS-00-134, Carnegie Mellon University (2000)
-
Liu, 10., Chen, T.: Video-based confront recognition using adaptive hidden markov models. In: Proceedings of the 2003 IEEE Estimator Society Conference on Computer Vision and Pattern Recognition (CVPR'03). IEEE (2003)
-
Janakiraman, R., Kumar, Southward., Sim, T.: Using continuous face verification to meliorate desktop security. In: 2005 Seventh IEEE Workshops on Applications of Calculator Vision (WACV/Motion'05), vol. 1, pp. 501–507. IEEE (2005)
-
Clarke, N., Karatzouni, S., Furnell, S.: Transparent facial recognition for mobile devices. In: Proceedings of the 7th Security Conference. Las Vegas, USA (2008)
-
Xiao, Q., Yang, X.-D.: Facial recognition in uncontrolled conditions for information security. EURASIP J. Adv. Signal Process. 2010, 1–10 (2010)
-
Hurley, D., Nixon, One thousand., Carter, J.: Automatic ear recognition by force field transformations. In: IEE Colloquium on Visual Biometrics, pp. 2–6. IET, London (2000)
-
Rodwell, P.M.: Non-intrusive subscriber authentication for next generation mobile advice systems, PhD Thesis, University of Plymouth (2006)
-
Islam, S., Davies, R., Mian, A.Due south., Bennamoun, M.: A fast and fully automatic ear recognition approach based on 3D local surface features. Advanced Concepts for Intelligent Vision Systems. Lecture Notes in Computer Scientific discipline, vol. 5259, pp. 1081–1092. Springer, Berlin (2008)
-
Fahmi, P.N.A., Kodirov, E., Choi, D.-J., Lee, G.-South., Mohd Fikri Azli, A., Sayeed, South.: Implicit authentication based on ear shape biometrics using smartphone camera during a call. In: 2012 IEEE International Briefing on Systems, Man, and Cybernetics (SMC), pp. 2272–2276. IEEE (2012)
-
Feng, T., Liu, Z., Kwon, Yard.-A., Shi, W., Carbunar, B., Jiang, Y., Nguyen, N.: Continuous mobile authentication using touchscreen gestures. In: 2012 IEEE Briefing on Technologies for Homeland Security (HST), pp. 451–456. IEEE (2012)
-
Koundinya, P., Theril, Due south., Feng, T., Prakash, Five., Bao, J., Shi, W.: Multi resolution bear on panel with built-in fingerprint sensing support. In: Pattern, Automation & Test in Europe Conference & Exhibition (Date), 2014, pp. 1–half dozen. IEEE Conference Publications, New Jersey (2014)
-
Kisku, D.R., Gupta, P., Sing, J.G., Tistarelli, M., Hwang, C.J.: Low level multispectral palmprint image fusion for big calibration biometrics authentication. In: Traore, I., Ahmed, A.A.E. (eds.) Continuous Authentication Using Biometrics: Data, Models, and Metrics, pp. 89–104. IGI Global, Hershey (2012)
-
Wildes, R.: Iris recognition: an emerging biometric technology. Proc. IEEE. 85, 1348–1363 (1997)
-
Matey, J.R., Naroditsky, O., Hanna, K., Kolczynski, R., LoIacono, D.J., Mangru, Due south., Tinker, One thousand., Zappia, T.K., Zhao, W.Y.: Iris on the motion: acquisition of images for iris recognition in less constrained environments. Proc. IEEE. 94, 1936–1947 (2006)
-
Proença, H., Alexandre, 50.: Iris segmentation methodology for not-cooperative recognition. IEE Proc. Vis. Image Signal Process. 153, 199–205 (2006)
-
Du, Y., Arslanturk, Due east., Zhou, Z., Belcher, C.: Video-based noncooperative iris image segmentation. IEEE Trans. Syst. Human being, Cybern. B Cybern. 41, 64–74 (2011)
-
Yang, K., Du, E.: A multi-stage arroyo for non-cooperative iris recognition. In: 2011 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 3386–3391. IEEE (2011)
-
Chen, R., Lin, X., Ding, T.: Liveness detection for iris recognition using multispectral images. Pattern Recognit. Lett. 33, 1513–1519 (2012)
-
Mock, One thousand., Hoanca, B., Weaver, J., Milton, G.: Real-time continuous iris recognition for authentication using an middle tracker. In: Proceedings of the 2012 ACM Briefing on Computer and Communications Security, pp. 1007–1009. ACM (2012)
-
Sui, Y., Zou, X., Du, E.Y., Li, F.: Secure and privacy-preserving biometrics based agile authentication. In: 2012 IEEE International Briefing on Systems, Human, and Cybernetics (SMC), pp. 1291–1296. IEEE (2012)
-
Jain, A., Nandakumar, K., Ross, A.: Score normalization in multimodal biometric systems. Blueprint Recognit. 38, 2270–2285 (2005)
-
Ross, A., Nandakumar, K., Jain, A.: Handbook of Multibiometrics. Springer, New York (2006)
-
De Oliveira, A.E., Henrique Matos Bezerra Motta, Yard., Vidal Batista, L.: A multibiometric access command architecture for continuous authentication. In: 2010 IEEE International Conference on Intelligence and Security Informatics, pp. 171–171. IEEE (2010)
-
Sim, T., Zhang, S., Janakiraman, R., Kumar, S.: Continuous verification using multimodal biometrics. IEEE Trans. Pattern Anal. Mach. Intell. 29, 687–700 (2007)
-
Azzini, A., Marrara, S.: Impostor users discovery using a multimodal biometric continuous hallmark fuzzy system. Cognition-Based Intell. Inf. Eng. Syst. 5178, 371–378 (2008)
-
De Oliveira, A.East., Motta, K.H.Thou.B.: A security API for multimodal multi-biometric continuous authentication. In: 2011 Seventh International Conference on Computational Intelligence and Security, pp. 988–992. IEEE (2011)
-
Tsatsoulis, P.D., Jaech, A., Batie, R., Savvides, M.: Multimodal biometric hand-off for robust unobtrusive continuous biometric authentication. In: Traore, I., Ahmed, A.A.E. (eds.) Continuous Hallmark Using Biometrics: Information, Models, and Metrics, pp. 68–88. IGI Global, Hershey (2012)
-
Kwang, G., Yap, R.H., Sim, T., Ramnath, R.: A usability study of continuous biometrics hallmark. In: Tistarelli, M., Nixon, M.S. (eds.) Proceedings of the Third International Conference on Advances in Biometrics, pp. 828–837. Springer, Berlin (2009)
-
Ahmed, A., Traore, I.: Bibelot intrusion detection based on biometrics. In: Proceedings of the 2005 IEEE Workshop on Information Assurance and Security, pp. 452–453. IEEE (2005)
-
Pusara, Grand.: An Examination of User Beliefs for User Re-authentication. ProQuest, Ann Arbor (2007)
-
Bailey, K.O., Okolica, J.S., Peterson, Yard.L.: User identification and hallmark using multi-modal behavioral biometrics. Comput. Secur. 43, 77–89 (2014)
-
Vildjiounaite, E., Mäkelä, S., Lindholm, M., Riihimäki, R.: Unobtrusive multimodal biometrics for ensuring privacy and information security with personal devices. In: Proceedings of the 4th International Conference on Pervasive Computing, pp. 187–201. Springer, Berlin (2006)
-
Li, F., Clarke, North., Papadaki, M., Dowland, P.: Behaviour profiling for transparent hallmark for mobile devices. In: the 10th European Conference on Data Warfare and Security (ECIW 2011), pp. 307–314, Tallinn, Estonia (2011)
-
Crawford, H., Renaud, K., Storer, T.: A framework for continuous, transparent mobile device authentication. Comput. Secur. 39, 127–136 (2013)
-
Saevanee, H., Clarke, North., Furnell, S., Biscione, V.: Text-based active authentication for mobile devices. IFIP Adv. Inf. Commun. Technol. ICT Syst. Secur. Priv. Prot. 428, 99–112 (2014)
-
Carrillo, C.: Continuous Biometric Authentication for Authorized Aircraft Personnel: A Proposed Design. Naval Postgraduate Schoolhouse, Monterey (2003)
-
Clarke, N., Furnell, S.: A composite user hallmark compages for mobile devices. J. Inf. Warf. 5, 11–29 (2006)
-
Asha, S., Chellappan, C.: Hallmark of eastward-learners using multimodal biometric engineering science. In: International Symposium on Biometrics and Security Technologies, 2008, ISBAST 2008, pp. 1–half dozen. IEEE (2008)
-
Muaaz, Chiliad.: A transparent and continuous biometric authentication framework for convenient secure mobile environments. In: The 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2013 Offshoot), pp. 4–7. ACM, Zurich, Switzerland (2013)
-
Altinok, A., Turk, M.: Temporal integration for continuous multimodal biometrics. In: Multimodal User Authentication (2003)
-
Kang, H.-B., Ju, M.-H.: Multi-modal feature integration for secure authentication. In: Huang, D.-Due south., Li, One thousand., Irwin, Thousand.W. (eds.) Proceedings of the 2006 International Conference on Intelligent Computing, pp. 1191–1200. Springer, Berlin (2006)
-
Ojala, Southward., Keinanen, J., Skytta, J.: Vesture authentication device for transparent login in nomadic applications environment. In: 2nd International Briefing on Signals, Circuits and Systems, pp. 1–6 (2008)
-
Clarke, North., Karatzouni, Due south., Furnell, S.: Flexible and transparent user authentication for mobile devices. In: Gritzalis, D., Lopez, J. (eds.) Emerging Challenges for Security, Privacy and Trust, 24th IFIP TC eleven International Information Security Conference, SEC 2009, pp. 1–12. Springer, Pafos, Republic of cyprus (2009)
-
Soltane, Thousand., Doghmane, N., Guersi, N.: Face and speech based multi-modal biometric hallmark. Int. J. Adv. Sci. Technol. 21, 41–56 (2010)
-
Niinuma, K., Park, U., Jain, A.Thou.: Soft biometric traits for continuous user hallmark. IEEE Trans. Inf. Forensics Secur. 5, 771–780 (2010)
-
Tsai, P., Khan, G.1000., Pan, J., Liao, B.: Interactive bogus bee colony supported passive continuous authentication system. IEEE Syst. J. IEEE Biom. Compend. 8, 395–405 (2014)
-
Khan, M.One thousand., Tsai, P.-W., Pan, J.-S., Liao, B.-Y.: Biometric driven initiative system for passive continuous authentication. In: 7th International Conference on Data Assurance and Security (IAS), 2011, pp. 139–144. IEEE (2011)
-
Chowdhury, Thou., Light, J., McIver, W.: A framework for continuous authentication in ubiquitous environments. In: Sixth International Briefing on Wireless Communication and Sensor Networks (WCSN), pp. i–vi. IEEE Press (2010)
-
Riva, O., Qin, C., Strauss, K., Lymberopoulos, D.: Progressive authentication: deciding when to cosign on mobile phones. In: The 21st USENIX Security Symposium (2012)
-
Hocking, C.G., Furnell, Due south.M., Clarke, Due north.L., Reynolds, P.L.: Branch user identity verification using an Hallmark Aura. Comput. Secur. 39, 486–502 (2013)
-
Traore, I., Woungang, I., Obaidat, 1000.Due south., Nakkabi, Y., Lai, I.: Combining mouse and keystroke dynamics biometrics for risk-based authentication in web environments. In: 2012 Fourth International Conference on Digital Habitation, pp. 138–145. IEEE (2012)
-
Ceccarelli, A., Montecchi, Fifty., Brancati, F., Lollini, P., Marguglio, A., Bondavalli, A.: Continuous and transparent user identity verification for secure internet services. IEEE Trans. Undecayed Secur. Comput. 12, 270–283 (2014)
-
Salesforce: 2014 Mobile Behavior Report. https://www.exacttarget.com/sites/exacttarget/files/deliverables/etmc-2014mobilebehaviorreport.pdf. Accessed 17 Nov 2014
-
Al Abdulwahid, A., Clarke, N., Furnell, S., Stengel, I.: A conceptual model for federated authentication in the deject. In: Proceedings of the 11th Australian Data Security Management Conference (AISM2013), pp. one–xi. Edith Cowan University, Perth, Western Commonwealth of australia (2013)
Writer information
Affiliations
Corresponding writer
About this article
Cite this article
Al Abdulwahid, A., Clarke, N., Stengel, I. et al. Continuous and transparent multimodal authentication: reviewing the country of the art. Cluster Comput nineteen, 455–474 (2016). https://doi.org/10.1007/s10586-015-0510-4
-
Received:
-
Revised:
-
Accepted:
-
Published:
-
Issue Date:
-
DOI : https://doi.org/10.1007/s10586-015-0510-4
Keywords
- User authentication
- Authentication technologies
- Security
- Usability
- Transparent hallmark
- Biometrics
- Continuous authentication
Source: https://link.springer.com/article/10.1007/s10586-015-0510-4
0 Response to "Continuous and Transparent Multimodal Authentication Reviewing the State of the Art"
Post a Comment