A comprehensive overview of biometric fusion

M Singh, R Singh, A Ross - Information Fusion, 2019 - Elsevier
The performance of a biometric system that relies on a single biometric modality (eg,
fingerprints only) is often stymied by various factors such as poor data quality or limited …

Security, privacy, and usability in continuous authentication: A survey

AF Baig, S Eskeland - Sensors, 2021 - mdpi.com
Continuous authentication has been proposed as a possible approach for passive and
seamless user authentication, using sensor data comprising biometric, behavioral, and …

Human identification using finger images

A Kumar, Y Zhou - IEEE Transactions on image processing, 2011 - ieeexplore.ieee.org
This paper presents a new approach to improve the performance of finger-vein identification
systems presented in the literature. The proposed system simultaneously acquires the finger …

Smartphone-based gait recognition: From authentication to imitation

M Muaaz, R Mayrhofer - IEEE Transactions on Mobile …, 2017 - ieeexplore.ieee.org
This work evaluates the security strength of a smartphone-based gait recognition system
against zero-effort and live minimal-effort impersonation attacks under realistic scenarios …

Towards continuous and passive authentication via touch biometrics: An experimental study on smartphones

H Xu, Y Zhou, MR Lyu - 10th Symposium On Usable Privacy and …, 2014 - usenix.org
Current smartphones generally cannot continuously authenticate users during runtime. This
poses severe security and privacy threats: A malicious user can manipulate the phone if …

Active authentication on mobile devices via stylometry, application usage, web browsing, and GPS location

L Fridman, S Weber, R Greenstadt… - IEEE Systems …, 2016 - ieeexplore.ieee.org
Active authentication is the problem of continuously verifying the identity of a person based
on behavioral aspects of their interaction with a computing device. In this paper, we collect …

Human computing and machine understanding of human behavior: A survey

M Pantic, A Pentland, A Nijholt, T Huang - Proceedings of the 8th …, 2006 - dl.acm.org
A widely accepted prediction is that computing will move to the background, weaving itself
into the fabric of our everyday living spaces and projecting the human user into the …

Senguard: Passive user identification on smartphones using multiple sensors

W Shi, J Yang, Y Jiang, F Yang… - 2011 IEEE 7th …, 2011 - ieeexplore.ieee.org
User identification and access control have become a high demand feature on mobile
devices because those devices are wildly used by employees in corporations and …

Soft biometric traits for continuous user authentication

K Niinuma, U Park, AK Jain - IEEE Transactions on information …, 2010 - ieeexplore.ieee.org
Most existing computer and network systems authenticate a user only at the initial login
session. This could be a critical security weakness, especially for high-security systems …

[KİTAP][B] Human-robot interaction in social robotics

T Kanda, H Ishiguro - 2017 - books.google.com
Human–Robot Interaction in Social Robotics explores important issues in designing a robot
system that works with people in everyday environments. Edited by leading figures in the …