Abstract
Fusing information from multiple biometric traits enhances authentication in mobile devices.
- Aronowitz, H., Min L., Toledo-Ronen, O., Harary, S., Geva, A., Ben-David, S., Rendel, A., Hoory, R., Ratha, N., Pankanti, S., and Nahamoo, D. Multimodal biometrics for mobile authentication. In Proceedings of the 2014 IEEE International Joint Conference on Biometrics (Clearwater, FL, Sept. 29-Oct. 2). IEEE Computer Society Press, 2014, 1--8.Google Scholar
- Avila, C.S., Casanova, J.G., Ballesteros, F., Garcia, L.R.T., Gomez, M.F.A., and Sierra, D.S. State of the Art of Mobile Biometrics, Liveness and Non-Coercion Detection. Personalized Centralized Authentication System Project, Jan. 31, 2014; https://www.pcas-project.eu/images/Deliverables/PCAS-D3.1.pdfGoogle Scholar
- Belhumeur, P.N., Hespanha, J.P., and Kriegman, D. Eigenfaces vector vs. FisherFaces: Recognition using class-specific linear projection. Pattern Analysis and Machine Intelligence, IEEE Transactions on Pattern Analysis and Machine Intelligence 19, 7 (July 1997), 711--720. Google ScholarDigital Library
- Bonnington, C. The trouble with Apple's Touch ID fingerprint reader. Wired (Dec. 3, 2013); http://www.wired.com/gadgetlab/2013/12/touch-id-issues-and-fixes/Google Scholar
- Dalal, N. and Triggs, B. Histograms of oriented gradients for human detection. In Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition (San Diego, CA, June 20--25). IEEE Computer Society Press, 2005, 886--893. Google ScholarDigital Library
- Daugman, J.G. Two-dimensional spectral analysis of cortical receptive field profiles. Vision Research 20, 10 (Dec. 1980), 847--856.Google ScholarCross Ref
- Devine, R. Face Unlock in Jelly Bean gets a 'liveness check.' AndroidCentral (June 29, 2012); http://www.androidcentral.com/face-unlock-jelly-bean-gets-liveness-checkGoogle Scholar
- Duchnowski, P., Hunke, M., Busching, D., Meier, U., and Waibel, A. Toward movement-invariant automatic lipreading and speech recognition. In Proceedings of the 1995 International Conference on Acoustics, Speech, and Signal Processing (Detroit, MI, May 9--12). IEEE Computer Society Press, 1995, 109--112.Google ScholarCross Ref
- Hansen, J.H.L. Analysis and compensation of speech under stress and noise for environmental robustness in speech recognition. Speech Communication 20, 1 (Nov. 1996), 151--173. Google ScholarDigital Library
- Hsu, D., Kakade, S.M., and Zhang, T. A spectral algorithm for learning hidden Markov models. Journal of Computer and System Sciences 78, 5 (Sept. 2012), 1460--1480. Google ScholarDigital Library
- Jain, A.K., Nandakumar, K., and Ross, A. Score normalization in multimodal biometric systems. Pattern Recognition 38, 12 (Dec. 2005), 2270--2285. Google ScholarDigital Library
- Kisku, D.R., Gupta, P., and Sing, J.K. Feature-level fusion of biometrics cues: Human identification with Doddingtons Caricature. Security Technology (2009), 157--164.Google Scholar
- Kuncheva, L.I., Whitaker, C.J., Shipp, C.A., and Duin, R.P.W. Is independence good for combining classifiers? In Proceedings of the 15th International Conference on Pattern Recognition (Barcelona, Spain, Sept. 3-7). IEEE Computer Society Press, 2000, 168--171.Google ScholarCross Ref
- Lee, C. Automatic recognition of animal vocalizations using averaged MFCC and linear discriminant analysis. Pattern Recognition Letters 27, 2 (Jan. 2006), 93--101. Google ScholarDigital Library
- M2SYS Technology. SecuredPass AFIS/ABIS Immigration and Border Control System; http://www.m2sys.com/automated-fingerprint-identification-system-afis-border-control-and-border-protection/Google Scholar
- Milner, B. and Xu, S. Speech reconstruction from mel-frequency cepstral coefficients using a source-filter model. In Proceedings of the INTERSPEECH Conference (Denver, CO, Sept. 16--20). International Speech Communication Association, Baixas, France, 2002.Google Scholar
- Nasrollahi, K. and Moeslund, T.B. Face-quality assessment system in video sequences. In Proceedings of the Workshop on Biometrics and Identity Management (Roskilde, Denmark, May 7--9). Springer, 2008, 10--18. Google ScholarDigital Library
- Parala, A. UAE Airports get multimodal security. FindBiometrics Global Identity Management (Mar. 13, 2015); http://findbiometrics.com/uae-airports-get-multimodal-security-23132/Google Scholar
- Rathgeb, C. and Andreas U. A survey on biometric cryptosystems and cancelable biometrics. EURASIP Journal on Information Security (Dec. 2011), 1--25.Google Scholar
- Ross, A. and Govindarajan, R. Feature-level fusion of hand and face biometrics. In Proceedings of the Conference on Biometric Technology for Human Identification (Orlando, FL). International Society for Optics and Photonics, Bellingham, WA, 2005, 196--204.Google ScholarCross Ref
- Ross, A. and Jain, A. Multimodal biometrics: An overview. In Proceedings of the 12th European Signal Processing Conference (Sept. 6--10). IEEE Computer Society Press, 2004, 1221--1224.Google Scholar
- Sacco, A. Fingerprint faceoff: Apple TouchID vs. Samsung Finger Scanner. Chief Information Officer (July 16, 2014); http://www.cio.com/article/2454883/consumer-technology/fingerprint-faceoffapple-touch-id-vs-samsung-finger-scanner.htmlGoogle Scholar
- Tapellini, D.S. Phone thefts rose to 3.1 million last year. Consumer Reports finds industry solution falls short, while legislative efforts to curb theft continue. Consumer Reports (May 28, 2014); http://www.consumerreports.org/cro/news/2014/04/smartphone-thefts-rose-to-3-1-million-last-year/index.htmGoogle Scholar
- Viola, P. and Jones, M. Rapid object detection using a boosted cascade of simple features. In Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition (Kauai, HI, Dec. 8--14). IEEE Computer Society Press, 2001.Google ScholarCross Ref
- Vondrasek, M. and Pollak, P. Methods for speech SNR estimation: Evaluation tool and analysis of VAD dependency. Radioengineering 14, 1 (Apr. 2005), 6--11.Google Scholar
- Zorabedian, J. Samsung Galaxy S5 fingerprint reader hacked---It's the iPhone 5S all over again! Naked Security (Apr. 17, 2014); https://nakedsecurity.sophos.com/2014/04/17/samsung-galaxy-s5-fingerprint-hacked-iphone-5s-all-over-again/Google Scholar
Index Terms
- Multimodal biometrics for enhanced mobile device security
Recommendations
Mobile device security
InfoSecCD '04: Proceedings of the 1st annual conference on Information security curriculum developmentBecause of their small size, memory capability, and the case with which information can be downloaded and removed from a facility, mobile devices pose a risk to organizations when used and transported outside physical boundaries. Mobile devices, ...
Multimodal Biometrics -- Sources, Architecture and Fusion Techniques: An Overview
ISBAST '12: Proceedings of the 2012 International Symposium on Biometrics and Security TechnologiesBiometrics is the science and technology of measuring and analyzing biological data of human body, extracting a feature set from the acquired data, and comparing this set against to the template set in the database. The increasing demand of enhanced ...
Comments