Increasing security of mobile devices by decreasing user effort in verification

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

15 Citations (Scopus)

Abstract

Reliable user verification is important for security of computers and personal devices; however, most of well-performing verification methods require explicit user effort. As a consequence, an access is granted for a long time after the only successful verification, which allows replacing the authorized user to the advantage of an impostor, as it is often the case with mobile phones. This work proposes a method of frequent user verification, based on cascading of unobtrusive biometrics with more reliable biometrics, provided explicitly, in such a way that explicit effort is required only if unobtrusive verification fails. Experiments with voice, gait and fingerprint data have shown that in most of noise conditions cascade was able to satisfy security requirements of False Accept Rate 1% and to achieve overall False Reject Rate 3% or less, while requiring explicit effort in 10 - 60% of cases.

Original languageEnglish
Title of host publicationSecond International Conference on Systems and Networks Communications, ICSNC 2007
ISBN (Electronic)978-0-7695-2938-7
DOIs
Publication statusPublished - 1 Dec 2007
MoE publication typeA4 Article in a conference publication
Event2nd International Conference on Systems and Networks Communications, ICSNC 2007 - Cap Esterel, France
Duration: 25 Aug 200731 Aug 2007

Conference

Conference2nd International Conference on Systems and Networks Communications, ICSNC 2007
CountryFrance
CityCap Esterel
Period25/08/0731/08/07

Fingerprint

Mobile devices
Biometrics
Mobile phones
experiment
Experiments
biometrics

Cite this

@inproceedings{6d1a934d6c834c378a7123049015261e,
title = "Increasing security of mobile devices by decreasing user effort in verification",
abstract = "Reliable user verification is important for security of computers and personal devices; however, most of well-performing verification methods require explicit user effort. As a consequence, an access is granted for a long time after the only successful verification, which allows replacing the authorized user to the advantage of an impostor, as it is often the case with mobile phones. This work proposes a method of frequent user verification, based on cascading of unobtrusive biometrics with more reliable biometrics, provided explicitly, in such a way that explicit effort is required only if unobtrusive verification fails. Experiments with voice, gait and fingerprint data have shown that in most of noise conditions cascade was able to satisfy security requirements of False Accept Rate 1{\%} and to achieve overall False Reject Rate 3{\%} or less, while requiring explicit effort in 10 - 60{\%} of cases.",
author = "Elena Vildjiounaite and M{\"a}kel{\"a}, {Satu Marja} and Mikko Lindholm and Vesa Kyll{\"o}nen and Heikki Ailisto",
note = "CA2: TK706",
year = "2007",
month = "12",
day = "1",
doi = "10.1109/ICSNC.2007.44",
language = "English",
isbn = "0-7695-2938-0",
booktitle = "Second International Conference on Systems and Networks Communications, ICSNC 2007",

}

Vildjiounaite, E, Mäkelä, SM, Lindholm, M, Kyllönen, V & Ailisto, H 2007, Increasing security of mobile devices by decreasing user effort in verification. in Second International Conference on Systems and Networks Communications, ICSNC 2007., 4300052, 2nd International Conference on Systems and Networks Communications, ICSNC 2007, Cap Esterel, France, 25/08/07. https://doi.org/10.1109/ICSNC.2007.44

Increasing security of mobile devices by decreasing user effort in verification. / Vildjiounaite, Elena; Mäkelä, Satu Marja; Lindholm, Mikko; Kyllönen, Vesa; Ailisto, Heikki.

Second International Conference on Systems and Networks Communications, ICSNC 2007. 2007. 4300052.

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

TY - GEN

T1 - Increasing security of mobile devices by decreasing user effort in verification

AU - Vildjiounaite, Elena

AU - Mäkelä, Satu Marja

AU - Lindholm, Mikko

AU - Kyllönen, Vesa

AU - Ailisto, Heikki

N1 - CA2: TK706

PY - 2007/12/1

Y1 - 2007/12/1

N2 - Reliable user verification is important for security of computers and personal devices; however, most of well-performing verification methods require explicit user effort. As a consequence, an access is granted for a long time after the only successful verification, which allows replacing the authorized user to the advantage of an impostor, as it is often the case with mobile phones. This work proposes a method of frequent user verification, based on cascading of unobtrusive biometrics with more reliable biometrics, provided explicitly, in such a way that explicit effort is required only if unobtrusive verification fails. Experiments with voice, gait and fingerprint data have shown that in most of noise conditions cascade was able to satisfy security requirements of False Accept Rate 1% and to achieve overall False Reject Rate 3% or less, while requiring explicit effort in 10 - 60% of cases.

AB - Reliable user verification is important for security of computers and personal devices; however, most of well-performing verification methods require explicit user effort. As a consequence, an access is granted for a long time after the only successful verification, which allows replacing the authorized user to the advantage of an impostor, as it is often the case with mobile phones. This work proposes a method of frequent user verification, based on cascading of unobtrusive biometrics with more reliable biometrics, provided explicitly, in such a way that explicit effort is required only if unobtrusive verification fails. Experiments with voice, gait and fingerprint data have shown that in most of noise conditions cascade was able to satisfy security requirements of False Accept Rate 1% and to achieve overall False Reject Rate 3% or less, while requiring explicit effort in 10 - 60% of cases.

UR - http://www.scopus.com/inward/record.url?scp=47849128948&partnerID=8YFLogxK

U2 - 10.1109/ICSNC.2007.44

DO - 10.1109/ICSNC.2007.44

M3 - Conference article in proceedings

AN - SCOPUS:47849128948

SN - 0-7695-2938-0

BT - Second International Conference on Systems and Networks Communications, ICSNC 2007

ER -