scholarly journals A Text-Independent Speaker Authentication System for Mobile Devices

Cryptography ◽  
2017 ◽  
Vol 1 (3) ◽  
pp. 16 ◽  
Author(s):  
Florentin Thullier ◽  
Bruno Bouchard ◽  
Bob-Antoine Menelas
Cryptography ◽  
2017 ◽  
Vol 1 (3) ◽  
pp. 16 ◽  
Author(s):  
Florentin Thullier ◽  
Bruno Bouchard ◽  
Bob-Antoine Menelas

2013 ◽  
Vol 457-458 ◽  
pp. 1224-1227
Author(s):  
Jian Feng Hu ◽  
Zhen Dong Mu

Mobile equipment has now become a new platform for information exchange, spend a lot of information exchange, how to effectively protect the mobile platform information security? Research has shown that, EEG signal can be used as identification tool, the user's information protection and good, this paper to protect the information security of mobile devices to research how to use EEG; the EEG signal is feasible for mobile equipment identification.


Author(s):  
Pedro Miguel Sánchez Sánchez ◽  
José María Jorquera Valero ◽  
Alberto Huertas Celdran ◽  
Gregorio Martínez Pérez

Continuous authentication systems are considered as a promising solution to secure access to mobile devices. Their main benefit is the improvement of the users' experience when they use the services or applications of their mobile device. Specifically, continuous authentication avoids having to remember or possess any key to access an application or service that requires authentication. In this sense, having the user authenticated permanently increases the security of the device. It also allows the user interaction with applications to be much more fluid, simple, and satisfactory. This chapter proposes a new continuous authentication system for mobile devices. The system acquires data from the device sensors and the GPS location to create a dataset that represents the user's profile or normal behaviour. Then, the proposed system uses Machine Learning algorithms based on anomaly detection to perform user identification in real time. Several experiments have been carried out to demonstrate the performance and usefulness of the proposed solution.


2005 ◽  
Vol 68 ◽  
pp. 13-37 ◽  
Author(s):  
Abdul Wahab ◽  
Goek See Ng ◽  
Romy Dickiyanto

Sign in / Sign up

Export Citation Format

Share Document