Human-based fraudulent attempts on gait based profiles
Y Abdrabou, O Sherif, RM Eisa, A Elmougy - Proceedings of the Second …, 2018 - dl.acm.org
Y Abdrabou, O Sherif, RM Eisa, A Elmougy
Proceedings of the Second African Conference for Human Computer Interaction …, 2018•dl.acm.orgRecent research involves biometrics in authentication as they establish a natural way of
communication. Accordingly, in this paper, we describe the implementation of an Android-
based authentication application and we focus on human factor impostor attacks on gait
based systems. We used the smartphone's built-in accelerometer to record gait cycles while
walking. Results proved that imitating other's gait cycles is possible and can be a huge
threat.
communication. Accordingly, in this paper, we describe the implementation of an Android-
based authentication application and we focus on human factor impostor attacks on gait
based systems. We used the smartphone's built-in accelerometer to record gait cycles while
walking. Results proved that imitating other's gait cycles is possible and can be a huge
threat.
Recent research involves biometrics in authentication as they establish a natural way of communication. Accordingly, in this paper, we describe the implementation of an Android-based authentication application and we focus on human factor impostor attacks on gait based systems. We used the smartphone's built-in accelerometer to record gait cycles while walking. Results proved that imitating other's gait cycles is possible and can be a huge threat.