Increasing security of mobile devices by decreasing user effort in verification

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    15 Citations (Scopus)

    Abstract

    Reliable user verification is important for security of computers and personal devices; however, most of well-performing verification methods require explicit user effort. As a consequence, an access is granted for a long time after the only successful verification, which allows replacing the authorized user to the advantage of an impostor, as it is often the case with mobile phones. This work proposes a method of frequent user verification, based on cascading of unobtrusive biometrics with more reliable biometrics, provided explicitly, in such a way that explicit effort is required only if unobtrusive verification fails. Experiments with voice, gait and fingerprint data have shown that in most of noise conditions cascade was able to satisfy security requirements of False Accept Rate 1% and to achieve overall False Reject Rate 3% or less, while requiring explicit effort in 10-60% of cases.
    Original languageEnglish
    Title of host publicationSecond International Conference on Systems and Networks Communications, ICSNC 2007
    PublisherIEEE Institute of Electrical and Electronic Engineers
    ISBN (Print)978-0-7695-2938-7
    DOIs
    Publication statusPublished - 1 Dec 2007
    MoE publication typeA4 Article in a conference publication
    Event2nd International Conference on Systems and Networks Communications, ICSNC 2007 - Cap Esterel, France
    Duration: 25 Aug 200731 Aug 2007

    Publication series

    SeriesInternational Conference on Systems and Networks Communications
    Volume2
    ISSN2163-9019

    Conference

    Conference2nd International Conference on Systems and Networks Communications, ICSNC 2007
    Country/TerritoryFrance
    CityCap Esterel
    Period25/08/0731/08/07

    Fingerprint

    Dive into the research topics of 'Increasing security of mobile devices by decreasing user effort in verification'. Together they form a unique fingerprint.

    Cite this