User Authentication Method Using Active Acoustic Sensing
نویسندگان
چکیده
منابع مشابه
Screen-based active user authentication
ARTICLE INFO ABSTRACT Article history: We investigate if screen-based recordings of computer interactions can be used for accurate active user authentication. A dataset of screen recordings of some PC interactions (MouseMoving, Typing, Scrolling, Other) of 21 users was collected and we ran a set of experiments to help our investigation. Low-dimensional feature vectors based on histogram of opti...
متن کاملActive User Authentication for Mobile Devices
Most mobile devices use passwords, pin numbers, or secret patterns for authenticating users. However, as long as the device remains active after an initial authentication, there is usually no mechanism by which to verify that the originally-authenticated user is still the one in control of the device. As a result, unauthorized individuals may be able to use a compromised device to improperly ga...
متن کاملThree-Factor User Authentication Method Using Biometrics Challenge Response
We propose a three-factor authentication method by pointing out the weakness in the two-factor authentication method that uses telephony currently used in Internet banking by adding voice verification, creating a threeauthentication method (password, possession of phone, and voice printing) . The use of the two-factor authentication (two-path authentication) method using telephony has recently ...
متن کامل"User Authentication Method and Implementation Using a Three-Axis Accelerometer"
The rapid growth of accelerometer use on consumer electronics has brought an opportunity for unique user authentication. We present an efficient recognition algorithm for such interaction using a single three-axis accelerometer. Unlike common user authentication methods which require memorizing complex phrases and are prone to physical attacks, our method requires a single training sample for a...
متن کاملUser Authentication using Musical Password
Computers, Mobile and other handheld devices depend largely on passwords mechanism to identify and authenticate users. Typically, passwords are strings of characters and digits. Alphanumeric passwords are convoluted to remember for users because a safe password should be long and arbitrary, however users pick short, simple, and insecure passwords. Different solutions have been proposed to aim t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Information Processing
سال: 2021
ISSN: 1882-6652
DOI: 10.2197/ipsjjip.29.370