Li et al., 2021 - Google Patents
CNN-based continuous authentication on smartphones with conditional wasserstein generative adversarial networkLi et al., 2021
- Document ID
- 4443587984896938174
- Author
- Li Y
- Luo J
- Deng S
- Zhou G
- Publication year
- Publication venue
- IEEE Internet of Things Journal
External Links
Snippet
With the widespread usage of mobile devices, the authentication mechanisms are urgently needed to identify users for information leakage prevention. In this article, we present CAGANet, a convolutional neural network (CNN)-based continuous authentication on …
- 230000003416 augmentation 0 abstract description 93
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00221—Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
- G06K9/00288—Classification, e.g. identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00221—Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
- G06K9/00268—Feature extraction; Face representation
- G06K9/00281—Local features and components; Facial parts ; Occluding parts, e.g. glasses; Geometrical relationships
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00335—Recognising movements or behaviour, e.g. recognition of gestures, dynamic facial expressions; Lip-reading
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/20—Image acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Li et al. | CNN-based continuous authentication on smartphones with conditional wasserstein generative adversarial network | |
Alsaadi | Study on most popular behavioral biometrics, advantages, disadvantages and recent applications: A review | |
Hadid et al. | Biometrics systems under spoofing attack: an evaluation methodology and lessons learned | |
Dahia et al. | Continuous authentication using biometrics: An advanced review | |
Corcoran | Biometrics and consumer electronics: A brave new world or the road to dystopia?[Soapbox] | |
Centeno et al. | Mobile based continuous authentication using deep features | |
Li et al. | Adaptive deep feature fusion for continuous authentication with data augmentation | |
Kaur | A study of biometric identification and verification system | |
Fenu et al. | Controlling user access to cloud-connected mobile applications by means of biometrics | |
Smith-Creasey et al. | A continuous user authentication scheme for mobile devices | |
Sheng et al. | Template-free biometric-key generation by means of fuzzy genetic clustering | |
Ezz et al. | A silent password recognition framework based on lip analysis | |
EP4088205B1 (en) | System and method for disentangling features specific to users, actions and devices recorded in motion sensor data | |
Aleluya et al. | Faceture ID: face and hand gesture multi-factor authentication using deep learning | |
Castiglione et al. | Trustworthy method for person identification in IIoT environments by means of facial dynamics | |
Alsellami et al. | The recent trends in biometric traits authentication based on internet of things (IoT) | |
Hu et al. | Multisensor-based continuous authentication of smartphone users with two-stage feature extraction | |
Wells et al. | Privacy and biometrics for smart healthcare systems: attacks, and techniques | |
Silasai et al. | The study on using biometric authentication on mobile device | |
Li et al. | Memory-augmented autoencoder based continuous authentication on smartphones with conditional transformer GANs | |
Messerschmidt et al. | Biometric systems utilizing neural networks in the authentication for e-learning platforms | |
Ara et al. | An efficient privacy-preserving user authentication scheme using image processing and blockchain technologies | |
Li et al. | AEGANAuth: Autoencoder GAN-Based Continuous Authentication with Conditional Variational Autoencoder Generative Adversarial Network | |
Tamilselvi et al. | Empirical Assessment of Artificial Intelligence Enabled Electronic Voting System Using Face Biometric Verification Strategy | |
Pandiaraja et al. | An Overview of Joint Biometric Identification for Secure Online Voting with Blockchain Technology |