Keystroke dynamics as a biometric for authentication
Future Generation Computer Systems - Special issue on security on the Web
Mean Shift: A Robust Approach Toward Feature Space Analysis
IEEE Transactions on Pattern Analysis and Machine Intelligence
IEEE Transactions on Pattern Analysis and Machine Intelligence
ACSAC '05 Proceedings of the 21st Annual Computer Security Applications Conference
Continuous Verification Using Multimodal Biometrics
IEEE Transactions on Pattern Analysis and Machine Intelligence
Handbook of Biometrics
Journal of Cognitive Neuroscience
A fuzzy approach to multimodal biometric continuous authentication
Fuzzy Optimization and Decision Making
Impostor Users Discovery Using a Multimodal Biometric Continuous Authentication Fuzzy System
KES '08 Proceedings of the 12th international conference on Knowledge-Based Intelligent Information and Engineering Systems, Part II
An Usability Study of Continuous Biometrics Authentication
ICB '09 Proceedings of the Third International Conference on Advances in Biometrics
Multi-modal feature integration for secure authentication
ICIC'06 Proceedings of the 2006 international conference on Intelligent Computing - Volume Part I
Biometrics: a tool for information security
IEEE Transactions on Information Forensics and Security
An introduction to biometric recognition
IEEE Transactions on Circuits and Systems for Video Technology
Client-based authentication technology: user-centric authentication using secure containers
Proceedings of the 7th ACM workshop on Digital identity management
Clinical data privacy and customization via biometrics based on ECG signals
USAB'11 Proceedings of the 7th conference on Workgroup Human-Computer Interaction and Usability Engineering of the Austrian Computer Society: information Quality in e-Health
Measuring user confidence in smartphone security and privacy
Proceedings of the Eighth Symposium on Usable Privacy and Security
Morphological gender recognition by a social robot and privacy concerns: late breaking reports
Proceedings of the 2014 ACM/IEEE international conference on Human-robot interaction
Hi-index | 0.00 |
Most existing computer and network systems authenticate a user only at the initial login session. This could be a critical security weakness, especially for high-security systems because it enables an impostor to access the system resources until the initial user logs out. This situation is encountered when the logged in user takes a short break without logging out or an impostor coerces the valid user to allow access to the system. To address this security flaw, we propose a continuous authentication scheme that continuously monitors and authenticates the logged in user. Previous methods for continuous authentication primarily used hard biometric traits, specifically fingerprint and face to continuously authenticate the initial logged in user. However, the use of these biometric traits is not only inconvenient to the user, but is also not always feasible due to the user's posture in front of the sensor. To mitigate this problem, we propose a new framework for continuous user authentication that primarily uses soft biometric traits (e.g., color of user's clothing and facial skin). The proposed framework automatically registers (enrolls) soft biometric traits every time the user logs in and fuses soft biometric matching with the conventional authentication schemes, namely password and face biometric. The proposed scheme has high tolerance to the user's posture in front of the computer system. Experimental results show the effectiveness of the proposed method for continuous user authentication.