Attribute-based Continuous User Authentication on Mobile Devices

被引:0
|
作者
Samangouei, Pouya [1 ]
Patel, Vishal M. [1 ]
Chellappa, Rama [1 ]
机构
[1] Univ Maryland, Ctr Automat Res, College Pk, MD 20742 USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present a method using facial attributes for continuous authentication of smartphone users. The binary attribute classifiers are trained using PubFig dataset and provide compact visual descriptions of faces. The learned classifiers are applied to the image of the current user of a mobile device to extract the attributes and then authentication is done by simply comparing the difference between the acquired attributes and the enrolled attributes of the original user. Extensive experiments on two publicly available unconstrained mobile face video datasets show that our method is able to capture meaningful attributes of faces and performs better than the previously proposed LBP-based authentication method.
引用
收藏
页数:8
相关论文
共 50 条
  • [41] A model for attribute-based user-role assignment
    Al-Kahtani, MA
    Sandhu, R
    [J]. 18TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2002, : 353 - 362
  • [42] Attribute-Based Signatures with User-Controlled Linkability
    El Kaafarani, Ali
    Chen, Liqun
    Ghadafi, Essam
    Davenport, James
    [J]. CRYPTOLOGY AND NETWORK SECURITY, CANS 2014, 2014, 8813 : 256 - +
  • [43] Secure authentication using ciphertext policy attribute-based encryption in mobile multi-hop networks
    Hyunsoo Kwon
    Daeyeong Kim
    Changhee Hahn
    Junbeom Hur
    [J]. Multimedia Tools and Applications, 2017, 76 : 19507 - 19521
  • [44] Concepts and languages for privacy-preserving attribute-based authentication
    Camenisch, Jan
    Dubovitskaya, Maria
    Enderlein, Robert R.
    Lehmann, Anja
    Neven, Gregory
    Paquin, Christian
    Preiss, Franz-Stefan
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2014, 19 (01) : 25 - 44
  • [45] A Roadmap to Continuous Biometric Authentication on Mobile Devices
    Rybnicek, Marlies
    Lang-Muhr, Christoph
    Haslinger, Daniel
    [J]. 2014 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2014, : 122 - 127
  • [46] Comprehensive analysis of continuous authentication for mobile devices
    Dagar, Aishani
    Singh, Karan
    Khan, Tayyab
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2023, 26 (07): : 2007 - 2024
  • [47] Who wants Continuous Authentication on Mobile Devices?
    Rasnayaka, Sanka
    Sim, Terence
    [J]. 2018 IEEE 9TH INTERNATIONAL CONFERENCE ON BIOMETRICS THEORY, APPLICATIONS AND SYSTEMS (BTAS), 2018,
  • [48] Secure authentication using ciphertext policy attribute-based encryption in mobile multi-hop networks
    Kwon, Hyunsoo
    Kim, Daeyeong
    Hahn, Changhee
    Hur, Junbeom
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (19) : 19507 - 19521
  • [49] Attribute-Based Access Control using Combined Authentication Technologies
    Park, Hyun-A
    Lee, Dong Hoon
    Zhan, Justin
    [J]. 2008 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING, VOLS 1 AND 2, 2008, : 518 - +
  • [50] Improving Unlinkability of Attribute-based Authentication through Game Theory
    Zolotavkin, Yevhen
    Jeong, Jongkil Jay
    Kuchta, Veronika
    Slavnenko, Maksym
    Doss, Robin
    [J]. ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2022, 25 (02)