User Authentication Method Using Active Acoustic Sensing

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Screen-based active user authentication

ARTICLE INFO ABSTRACT Article history: We investigate if screen-based recordings of computer interactions can be used for accurate active user authentication. A dataset of screen recordings of some PC interactions (MouseMoving, Typing, Scrolling, Other) of 21 users was collected and we ran a set of experiments to help our investigation. Low-dimensional feature vectors based on histogram of opti...

متن کامل

Active User Authentication for Mobile Devices

Most mobile devices use passwords, pin numbers, or secret patterns for authenticating users. However, as long as the device remains active after an initial authentication, there is usually no mechanism by which to verify that the originally-authenticated user is still the one in control of the device. As a result, unauthorized individuals may be able to use a compromised device to improperly ga...

متن کامل

Three-Factor User Authentication Method Using Biometrics Challenge Response

We propose a three-factor authentication method by pointing out the weakness in the two-factor authentication method that uses telephony currently used in Internet banking by adding voice verification, creating a threeauthentication method (password, possession of phone, and voice printing) . The use of the two-factor authentication (two-path authentication) method using telephony has recently ...

متن کامل

"User Authentication Method and Implementation Using a Three-Axis Accelerometer"

The rapid growth of accelerometer use on consumer electronics has brought an opportunity for unique user authentication. We present an efficient recognition algorithm for such interaction using a single three-axis accelerometer. Unlike common user authentication methods which require memorizing complex phrases and are prone to physical attacks, our method requires a single training sample for a...

متن کامل

User Authentication using Musical Password

Computers, Mobile and other handheld devices depend largely on passwords mechanism to identify and authenticate users. Typically, passwords are strings of characters and digits. Alphanumeric passwords are convoluted to remember for users because a safe password should be long and arbitrary, however users pick short, simple, and insecure passwords. Different solutions have been proposed to aim t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Information Processing

سال: 2021

ISSN: 1882-6652

DOI: 10.2197/ipsjjip.29.370