skip to main content
research-article
Free Access

Multimodal biometrics for enhanced mobile device security

Published:23 March 2016Publication History
Skip Abstract Section

Abstract

Fusing information from multiple biometric traits enhances authentication in mobile devices.

References

  1. Aronowitz, H., Min L., Toledo-Ronen, O., Harary, S., Geva, A., Ben-David, S., Rendel, A., Hoory, R., Ratha, N., Pankanti, S., and Nahamoo, D. Multimodal biometrics for mobile authentication. In Proceedings of the 2014 IEEE International Joint Conference on Biometrics (Clearwater, FL, Sept. 29-Oct. 2). IEEE Computer Society Press, 2014, 1--8.Google ScholarGoogle Scholar
  2. Avila, C.S., Casanova, J.G., Ballesteros, F., Garcia, L.R.T., Gomez, M.F.A., and Sierra, D.S. State of the Art of Mobile Biometrics, Liveness and Non-Coercion Detection. Personalized Centralized Authentication System Project, Jan. 31, 2014; https://www.pcas-project.eu/images/Deliverables/PCAS-D3.1.pdfGoogle ScholarGoogle Scholar
  3. Belhumeur, P.N., Hespanha, J.P., and Kriegman, D. Eigenfaces vector vs. FisherFaces: Recognition using class-specific linear projection. Pattern Analysis and Machine Intelligence, IEEE Transactions on Pattern Analysis and Machine Intelligence 19, 7 (July 1997), 711--720. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Bonnington, C. The trouble with Apple's Touch ID fingerprint reader. Wired (Dec. 3, 2013); http://www.wired.com/gadgetlab/2013/12/touch-id-issues-and-fixes/Google ScholarGoogle Scholar
  5. Dalal, N. and Triggs, B. Histograms of oriented gradients for human detection. In Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition (San Diego, CA, June 20--25). IEEE Computer Society Press, 2005, 886--893. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Daugman, J.G. Two-dimensional spectral analysis of cortical receptive field profiles. Vision Research 20, 10 (Dec. 1980), 847--856.Google ScholarGoogle ScholarCross RefCross Ref
  7. Devine, R. Face Unlock in Jelly Bean gets a 'liveness check.' AndroidCentral (June 29, 2012); http://www.androidcentral.com/face-unlock-jelly-bean-gets-liveness-checkGoogle ScholarGoogle Scholar
  8. Duchnowski, P., Hunke, M., Busching, D., Meier, U., and Waibel, A. Toward movement-invariant automatic lipreading and speech recognition. In Proceedings of the 1995 International Conference on Acoustics, Speech, and Signal Processing (Detroit, MI, May 9--12). IEEE Computer Society Press, 1995, 109--112.Google ScholarGoogle ScholarCross RefCross Ref
  9. Hansen, J.H.L. Analysis and compensation of speech under stress and noise for environmental robustness in speech recognition. Speech Communication 20, 1 (Nov. 1996), 151--173. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Hsu, D., Kakade, S.M., and Zhang, T. A spectral algorithm for learning hidden Markov models. Journal of Computer and System Sciences 78, 5 (Sept. 2012), 1460--1480. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Jain, A.K., Nandakumar, K., and Ross, A. Score normalization in multimodal biometric systems. Pattern Recognition 38, 12 (Dec. 2005), 2270--2285. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Kisku, D.R., Gupta, P., and Sing, J.K. Feature-level fusion of biometrics cues: Human identification with Doddingtons Caricature. Security Technology (2009), 157--164.Google ScholarGoogle Scholar
  13. Kuncheva, L.I., Whitaker, C.J., Shipp, C.A., and Duin, R.P.W. Is independence good for combining classifiers? In Proceedings of the 15th International Conference on Pattern Recognition (Barcelona, Spain, Sept. 3-7). IEEE Computer Society Press, 2000, 168--171.Google ScholarGoogle ScholarCross RefCross Ref
  14. Lee, C. Automatic recognition of animal vocalizations using averaged MFCC and linear discriminant analysis. Pattern Recognition Letters 27, 2 (Jan. 2006), 93--101. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. M2SYS Technology. SecuredPass AFIS/ABIS Immigration and Border Control System; http://www.m2sys.com/automated-fingerprint-identification-system-afis-border-control-and-border-protection/Google ScholarGoogle Scholar
  16. Milner, B. and Xu, S. Speech reconstruction from mel-frequency cepstral coefficients using a source-filter model. In Proceedings of the INTERSPEECH Conference (Denver, CO, Sept. 16--20). International Speech Communication Association, Baixas, France, 2002.Google ScholarGoogle Scholar
  17. Nasrollahi, K. and Moeslund, T.B. Face-quality assessment system in video sequences. In Proceedings of the Workshop on Biometrics and Identity Management (Roskilde, Denmark, May 7--9). Springer, 2008, 10--18. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Parala, A. UAE Airports get multimodal security. FindBiometrics Global Identity Management (Mar. 13, 2015); http://findbiometrics.com/uae-airports-get-multimodal-security-23132/Google ScholarGoogle Scholar
  19. Rathgeb, C. and Andreas U. A survey on biometric cryptosystems and cancelable biometrics. EURASIP Journal on Information Security (Dec. 2011), 1--25.Google ScholarGoogle Scholar
  20. Ross, A. and Govindarajan, R. Feature-level fusion of hand and face biometrics. In Proceedings of the Conference on Biometric Technology for Human Identification (Orlando, FL). International Society for Optics and Photonics, Bellingham, WA, 2005, 196--204.Google ScholarGoogle ScholarCross RefCross Ref
  21. Ross, A. and Jain, A. Multimodal biometrics: An overview. In Proceedings of the 12th European Signal Processing Conference (Sept. 6--10). IEEE Computer Society Press, 2004, 1221--1224.Google ScholarGoogle Scholar
  22. Sacco, A. Fingerprint faceoff: Apple TouchID vs. Samsung Finger Scanner. Chief Information Officer (July 16, 2014); http://www.cio.com/article/2454883/consumer-technology/fingerprint-faceoffapple-touch-id-vs-samsung-finger-scanner.htmlGoogle ScholarGoogle Scholar
  23. Tapellini, D.S. Phone thefts rose to 3.1 million last year. Consumer Reports finds industry solution falls short, while legislative efforts to curb theft continue. Consumer Reports (May 28, 2014); http://www.consumerreports.org/cro/news/2014/04/smartphone-thefts-rose-to-3-1-million-last-year/index.htmGoogle ScholarGoogle Scholar
  24. Viola, P. and Jones, M. Rapid object detection using a boosted cascade of simple features. In Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition (Kauai, HI, Dec. 8--14). IEEE Computer Society Press, 2001.Google ScholarGoogle ScholarCross RefCross Ref
  25. Vondrasek, M. and Pollak, P. Methods for speech SNR estimation: Evaluation tool and analysis of VAD dependency. Radioengineering 14, 1 (Apr. 2005), 6--11.Google ScholarGoogle Scholar
  26. Zorabedian, J. Samsung Galaxy S5 fingerprint reader hacked---It's the iPhone 5S all over again! Naked Security (Apr. 17, 2014); https://nakedsecurity.sophos.com/2014/04/17/samsung-galaxy-s5-fingerprint-hacked-iphone-5s-all-over-again/Google ScholarGoogle Scholar

Index Terms

  1. Multimodal biometrics for enhanced mobile device security

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image Communications of the ACM
          Communications of the ACM  Volume 59, Issue 4
          April 2016
          87 pages
          ISSN:0001-0782
          EISSN:1557-7317
          DOI:10.1145/2907055
          • Editor:
          • Moshe Y. Vardi
          Issue’s Table of Contents

          Copyright © 2016 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 23 March 2016

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Popular
          • Refereed

        PDF Format

        View or Download as a PDF file.

        PDFChinese translation

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format .

        View HTML Format