Nothing Special   »   [go: up one dir, main page]

Li et al., 2021 - Google Patents

CNN-based continuous authentication on smartphones with conditional wasserstein generative adversarial network

Li et al., 2021

Document ID
4443587984896938174
Author
Li Y
Luo J
Deng S
Zhou G
Publication year
Publication venue
IEEE Internet of Things Journal

External Links

Snippet

With the widespread usage of mobile devices, the authentication mechanisms are urgently needed to identify users for information leakage prevention. In this article, we present CAGANet, a convolutional neural network (CNN)-based continuous authentication on …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00221Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
    • G06K9/00288Classification, e.g. identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00221Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
    • G06K9/00268Feature extraction; Face representation
    • G06K9/00281Local features and components; Facial parts ; Occluding parts, e.g. glasses; Geometrical relationships
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00335Recognising movements or behaviour, e.g. recognition of gestures, dynamic facial expressions; Lip-reading
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/20Image acquisition
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means

Similar Documents

Publication Publication Date Title
Li et al. CNN-based continuous authentication on smartphones with conditional wasserstein generative adversarial network
Alsaadi Study on most popular behavioral biometrics, advantages, disadvantages and recent applications: A review
Hadid et al. Biometrics systems under spoofing attack: an evaluation methodology and lessons learned
Dahia et al. Continuous authentication using biometrics: An advanced review
Corcoran Biometrics and consumer electronics: A brave new world or the road to dystopia?[Soapbox]
Centeno et al. Mobile based continuous authentication using deep features
Li et al. Adaptive deep feature fusion for continuous authentication with data augmentation
Kaur A study of biometric identification and verification system
Fenu et al. Controlling user access to cloud-connected mobile applications by means of biometrics
Smith-Creasey et al. A continuous user authentication scheme for mobile devices
Sheng et al. Template-free biometric-key generation by means of fuzzy genetic clustering
Ezz et al. A silent password recognition framework based on lip analysis
EP4088205B1 (en) System and method for disentangling features specific to users, actions and devices recorded in motion sensor data
Aleluya et al. Faceture ID: face and hand gesture multi-factor authentication using deep learning
Castiglione et al. Trustworthy method for person identification in IIoT environments by means of facial dynamics
Alsellami et al. The recent trends in biometric traits authentication based on internet of things (IoT)
Hu et al. Multisensor-based continuous authentication of smartphone users with two-stage feature extraction
Wells et al. Privacy and biometrics for smart healthcare systems: attacks, and techniques
Silasai et al. The study on using biometric authentication on mobile device
Li et al. Memory-augmented autoencoder based continuous authentication on smartphones with conditional transformer GANs
Messerschmidt et al. Biometric systems utilizing neural networks in the authentication for e-learning platforms
Ara et al. An efficient privacy-preserving user authentication scheme using image processing and blockchain technologies
Li et al. AEGANAuth: Autoencoder GAN-Based Continuous Authentication with Conditional Variational Autoencoder Generative Adversarial Network
Tamilselvi et al. Empirical Assessment of Artificial Intelligence Enabled Electronic Voting System Using Face Biometric Verification Strategy
Pandiaraja et al. An Overview of Joint Biometric Identification for Secure Online Voting with Blockchain Technology