Multimodal Personal Ear Authentication Using Smartphones
- URL: http://arxiv.org/abs/2103.12575v1
- Date: Tue, 23 Mar 2021 14:19:15 GMT
- Title: Multimodal Personal Ear Authentication Using Smartphones
- Authors: S. Itani, S. Kita and Y. Kajikawa
- Abstract summary: fingerprint authentication cannot be used when hands are wet, and face recognition cannot be used when a person is wearing a mask.
We examine a personal authentication system using the pinna as a new approach for biometric authentication on smartphones.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: In recent years, biometric authentication technology for smartphones has
become widespread, with the mainstream methods being fingerprint authentication
and face recognition. However, fingerprint authentication cannot be used when
hands are wet, and face recognition cannot be used when a person is wearing a
mask. Therefore, we examine a personal authentication system using the pinna as
a new approach for biometric authentication on smartphones. Authentication
systems based on the acoustic transfer function of the pinna (PRTF: Pinna
Related Transfer Function) have been investigated. However, the authentication
accuracy decreases due to the positional fluctuation across each measurement.
In this paper, we propose multimodal personal authentication on smartphones
using PRTF. The pinna image and positional sensor information are used with the
PRTF, and the effectiveness of the authentication method is examined. We
demonstrate that the proposed authentication system can compensate for the
positional changes in each measurement and improve robustness.
Related papers
- KDPrint: Passive Authentication using Keystroke Dynamics-to-Image Encoding via Standardization [7.251941112707364]
This paper proposes a passive authentication system that utilizes keystroke data, a byproduct of primary authentication methods, for background user authentication.
We introduce a novel image encoding technique to capture the temporal dynamics of keystroke data, overcoming the performance limitations of deep learning models.
Experimental results demonstrate that the proposed imaging approach surpasses existing methods in terms of information capacity.
arXiv Detail & Related papers (2024-05-02T08:18:37Z) - Biometrics Employing Neural Network [0.0]
Fingerprints, iris and retina patterns, facial recognition, hand shapes, palm prints, and voice recognition are frequently used forms of biometrics.
For systems to be effective and widely accepted, the error rate in recognition and verification must approach zero.
Artificial Neural Networks, which simulate the human brain's operations, present themselves as a promising approach.
arXiv Detail & Related papers (2024-02-01T03:59:04Z) - Secure access system using signature verification over tablet PC [62.21072852729544]
We describe a highly versatile and scalable prototype for Web-based secure access using signature verification.
The proposed architecture can be easily extended to work with different kinds of sensors and large-scale databases.
arXiv Detail & Related papers (2023-01-11T11:05:47Z) - Facial Soft Biometrics for Recognition in the Wild: Recent Works,
Annotation, and COTS Evaluation [63.05890836038913]
We study the role of soft biometrics to enhance person recognition systems in unconstrained scenarios.
We consider two assumptions: 1) manual estimation of soft biometrics and 2) automatic estimation from two commercial off-the-shelf systems.
Experiments are carried out fusing soft biometrics with two state-of-the-art face recognition systems based on deep learning.
arXiv Detail & Related papers (2022-10-24T11:29:57Z) - Privacy-Preserving Face Recognition with Learnable Privacy Budgets in
Frequency Domain [77.8858706250075]
This paper proposes a privacy-preserving face recognition method using differential privacy in the frequency domain.
Our method performs very well with several classical face recognition test sets.
arXiv Detail & Related papers (2022-07-15T07:15:36Z) - Locally Authenticated Privacy-preserving Voice Input [10.82818142802482]
Service providers must authenticate their users, although individuals may wish to maintain privacy.
Preserving privacy while performing authentication is challenging, particularly where adversaries can use biometric data to train transformation tools.
We introduce a secure, flexible privacy-preserving system to capture and store an on-device fingerprint of the users' raw signals.
arXiv Detail & Related papers (2022-05-27T14:56:01Z) - A Fingerprint Detection Method by Fingerprint Ridge Orientation Check [0.0]
Fingerprint recognition technology has been studied for a long time, and its recognition rate has recently risen to a high level.
In this paper, we propose a fingerprint detection algorithm used in a fingerprint recognition system.
arXiv Detail & Related papers (2022-05-06T05:19:41Z) - Mobile Behavioral Biometrics for Passive Authentication [65.94403066225384]
This work carries out a comparative analysis of unimodal and multimodal behavioral biometric traits.
Experiments are performed over HuMIdb, one of the largest and most comprehensive freely available mobile user interaction databases.
In our experiments, the most discriminative background sensor is the magnetometer, whereas among touch tasks the best results are achieved with keystroke.
arXiv Detail & Related papers (2022-03-14T17:05:59Z) - Data-driven behavioural biometrics for continuous and adaptive user
verification using Smartphone and Smartwatch [0.0]
We propose an algorithm to blend behavioural biometrics with multi-factor authentication (MFA)
This work proposes a two-step user verification algorithm that verifies the user's identity using motion-based biometrics.
arXiv Detail & Related papers (2021-10-07T02:46:21Z) - Biometrics: Trust, but Verify [49.9641823975828]
Biometric recognition has exploded into a plethora of different applications around the globe.
There are a number of outstanding problems and concerns pertaining to the various sub-modules of biometric recognition systems.
arXiv Detail & Related papers (2021-05-14T03:07:25Z) - Towards Face Encryption by Generating Adversarial Identity Masks [53.82211571716117]
We propose a targeted identity-protection iterative method (TIP-IM) to generate adversarial identity masks.
TIP-IM provides 95%+ protection success rate against various state-of-the-art face recognition models.
arXiv Detail & Related papers (2020-03-15T12:45:10Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.