Part 2: Authentication and AuthorizationInternational audienceIn this paper, we propose a novel gait authentication mechanism by mining sensor resources on mobile phone. Unlike previous works, both built-in accelerometer and magnetometer are used to handle mobile installation issues, including but not limited to disorientation, and misplacement errors. The authentication performance is improved by executing deep examination at pre-processing steps. A novel and effective segmentation algorithm is also provided to segment signal into separate gait cycles with perfect accuracy. Subsequently, features are then extracted on both time and frequency domains. We aim to construct a lightweight but high reliable model; hence feature subsets selection...
Securing smartphones has increasingly become inevitable due to their massive popularity and signific...
Abstract—The rapid deployment of sensing technology in smartphones and the explosion of their usage ...
The need to increase the security measures and make the users of different devices feel safer has l...
The authentication via accelerometer-based biometric gait recognition offers a user-friendly alterna...
The authentication via accelerometer-based biometric gait recognition offers a user-friendly alterna...
Smart environments established by the development of mobile technology have brought vast benefits to...
User authentication is a means of identifying the user and verifying that the user is allowed access...
Abstract—The need for more security on mobile devices is increasing with new functionalities and fea...
License, which permits unrestricted use, distribution, and reproduction in any medium, provided the ...
Identification and verification first line of defence of every secure system. Due to the advancement...
Abstract—The goal of our research is to develop methods for accelerometer-based gait recognition, wh...
With recent advances in mobile computing and sensing technology, smart wearable devices have pervade...
Abstract: Ubiquitous mobile devices like smartphones and tablets are often not se-cured against unau...
Similar to fingerprint and iris pattern, everyone’s gait is unique, and gait has been proposed as a ...
Abstract—The rapid deployment of sensing technology in smartphones and the explosion of their usage ...
Securing smartphones has increasingly become inevitable due to their massive popularity and signific...
Abstract—The rapid deployment of sensing technology in smartphones and the explosion of their usage ...
The need to increase the security measures and make the users of different devices feel safer has l...
The authentication via accelerometer-based biometric gait recognition offers a user-friendly alterna...
The authentication via accelerometer-based biometric gait recognition offers a user-friendly alterna...
Smart environments established by the development of mobile technology have brought vast benefits to...
User authentication is a means of identifying the user and verifying that the user is allowed access...
Abstract—The need for more security on mobile devices is increasing with new functionalities and fea...
License, which permits unrestricted use, distribution, and reproduction in any medium, provided the ...
Identification and verification first line of defence of every secure system. Due to the advancement...
Abstract—The goal of our research is to develop methods for accelerometer-based gait recognition, wh...
With recent advances in mobile computing and sensing technology, smart wearable devices have pervade...
Abstract: Ubiquitous mobile devices like smartphones and tablets are often not se-cured against unau...
Similar to fingerprint and iris pattern, everyone’s gait is unique, and gait has been proposed as a ...
Abstract—The rapid deployment of sensing technology in smartphones and the explosion of their usage ...
Securing smartphones has increasingly become inevitable due to their massive popularity and signific...
Abstract—The rapid deployment of sensing technology in smartphones and the explosion of their usage ...
The need to increase the security measures and make the users of different devices feel safer has l...