A comprehensive overview of biometric fusion
The performance of a biometric system that relies on a single biometric modality (eg,
fingerprints only) is often stymied by various factors such as poor data quality or limited …
fingerprints only) is often stymied by various factors such as poor data quality or limited …
Security, privacy, and usability in continuous authentication: A survey
Continuous authentication has been proposed as a possible approach for passive and
seamless user authentication, using sensor data comprising biometric, behavioral, and …
seamless user authentication, using sensor data comprising biometric, behavioral, and …
Human identification using finger images
This paper presents a new approach to improve the performance of finger-vein identification
systems presented in the literature. The proposed system simultaneously acquires the finger …
systems presented in the literature. The proposed system simultaneously acquires the finger …
Smartphone-based gait recognition: From authentication to imitation
This work evaluates the security strength of a smartphone-based gait recognition system
against zero-effort and live minimal-effort impersonation attacks under realistic scenarios …
against zero-effort and live minimal-effort impersonation attacks under realistic scenarios …
Towards continuous and passive authentication via touch biometrics: An experimental study on smartphones
Current smartphones generally cannot continuously authenticate users during runtime. This
poses severe security and privacy threats: A malicious user can manipulate the phone if …
poses severe security and privacy threats: A malicious user can manipulate the phone if …
Active authentication on mobile devices via stylometry, application usage, web browsing, and GPS location
Active authentication is the problem of continuously verifying the identity of a person based
on behavioral aspects of their interaction with a computing device. In this paper, we collect …
on behavioral aspects of their interaction with a computing device. In this paper, we collect …
Human computing and machine understanding of human behavior: A survey
A widely accepted prediction is that computing will move to the background, weaving itself
into the fabric of our everyday living spaces and projecting the human user into the …
into the fabric of our everyday living spaces and projecting the human user into the …
Senguard: Passive user identification on smartphones using multiple sensors
User identification and access control have become a high demand feature on mobile
devices because those devices are wildly used by employees in corporations and …
devices because those devices are wildly used by employees in corporations and …
Soft biometric traits for continuous user authentication
Most existing computer and network systems authenticate a user only at the initial login
session. This could be a critical security weakness, especially for high-security systems …
session. This could be a critical security weakness, especially for high-security systems …
[KİTAP][B] Human-robot interaction in social robotics
T Kanda, H Ishiguro - 2017 - books.google.com
Human–Robot Interaction in Social Robotics explores important issues in designing a robot
system that works with people in everyday environments. Edited by leading figures in the …
system that works with people in everyday environments. Edited by leading figures in the …