본문 바로가기 주메뉴 바로가기
국회도서관 홈으로 정보검색 소장정보 검색

초록보기

Current smartphone authentication systems are deemed inconvenient and difficult for users on remembering their password as well as privacy issues on stolen or forged biometrics. New authentication system is demanded to be implicit to users with very minimum user involvement being. This idea aims towards a future model of authentication system for smartphones users without users realizing them being authenticated. We use the most frequent activity that users carry out with their smartphone, which is the calling activity. We derive two basics related interactions that are first factor being arm’s flex (AF) action to pick a phone to be near ones’ ears and then once getting near ear using second factor from ear shape image. Here, we combine behavior biometrics from AF in first factor and physical biometrics from ear image in second factor. Our study shows our dual-factor authentication system does not require explicit user interaction thereby improving convenience and alleviating burden from users from persistent necessity to remember password. These findings will augment development of novel implicit authentication system being transparent, easier, and unobtrusive for users.

권호기사

권호기사 목록 테이블로 기사명, 저자명, 페이지, 원문, 기사목차 순으로 되어있습니다.
기사명 저자명 페이지 원문 목차
Living Reality of Jjok-Bang Residents and Aid Measures : In Focus of Bupyeong-gu, Incheon 윤정혜, 권현진 pp.58-65

Further Investigations on the Financial Attributes of the Firms listed in the KOSDAQ Stock Market 김한준 pp.27-37

Development of a Two-Way Evacuation Route Database Based on Interviews Conducted with Historic Preservation Area Residents Nobuo Mishima, Naomi Miyamoto, Yoko Taguchi, Keiko Kitagawa, 오용선, 박선규 pp.48-57

Improvement of ASIFT for Object Matching Based on Optimized Random Sampling Dung Phan, 김수형, 나인섭 pp.1-7

Systematic Approach for Detecting Text in Images Using Supervised Learning Minh Hieu Nguyen, 이귀상 pp.8-13

A Study on Multibiometrics derived from Calling Activity Context using Smartphone for Implicit User Authentication System Ali Fahmi Perwira Negara, 염재근, 최덕재 pp.14-21

Patented Knowledge And Its Commercialization 정의교 pp.38-47

Analysis of Korea Buncheong ware by Bunjang(White slip) technique 김혜진, 노혜신, 김원석 pp.70-76

The assessment of the automatic exposure control system for mammography x-ray machine 김학성, 김성철 pp.66-69

Development and Evaluation of PDF Report Annotation Tool GABA Facilitating Comment Reuse Tetsuro Kakeshita, Shoichi Motoyama pp.22-26

참고문헌 (16건) : 자료제공( 네이버학술정보 )

참고문헌 목록에 대한 테이블로 번호, 참고문헌, 국회도서관 소장유무로 구성되어 있습니다.
번호 참고문헌 국회도서관 소장유무
1 S. Furnell, N. Clarke, and S. Karatzouni, “Beyond the PIN: Enhancing User Authentication for Mobile Devices,” Computer Fraud & Security, vol. 8, August 2008, pp.12- 17. 미소장
2 S. Chiasson, R. Biddle, and P. C. v. Oorschot, “A second look at the usability of click-based graphical passwords,” Proc. SOUPS '07, 2007, pp.1-12. 미소장
3 Google, Inc., “Enhancing Security with Device Management Policies”, Retrieved September 15, 2012, from Android OS Developer Guide: http://developer.android.com/training/enterprise/devicemanagement- policy.html [Online] 미소장
4 M.A. Carrera-Perpinan, “Compression neural networks for feature extraction: Application to human recognition from ear images”, Master (M.Sc) Thesis, Technical University of Madrid, 1995 미소장
5 Human Ear Recognition in 3D 네이버 미소장
6 J Kent, “Malaysia car thieves steal finger”, Retrieved March 31, 2005, from BBC News UK: http://news.bbc.co.uk/2/hi/asia-pacific/4396831.stm [Online] 미소장
7 F. Aloul, S. Zahidi, and W. El-Hajj, “Multi Factor Authentication Using Mobile Phones,” Int. J. of Math and Comp. Sci., vol. 4, no. 2, July 2009, pp. 65–80. 미소장
8 A.T.B. Jin, D. N. C. Ling, and A. Goh, “Biohashing: Two Factor Authentication Featuring Fingerprint Data and Tokenised Random Number,” J. of Pattern Recognition vol. 37, no. 11, November 2004, pp.2245-2255. 미소장
9 A.P. Sabzevar and A. Stavrou, “Universal Multi-Factor Authentication Using Graphical Passwords,” Proc. SITIS’08, pp.625-632. 미소장
10 Confident Technologies, Inc., Survey Shows Smartphone Users Choose Convenience over Security, Retrieved September 29, 2011, from Confident Technologies’ News Event: http://www.confidenttechnologies.com/news_events/surv ey-shows-smartphone-users-choose-convenience-oversecurity [Online] 미소장
11 D. Roman-Liu and T. Tokarski, “Upper limb Strength in Relation to Upper Limb Posture,” Int. J. of Industrial Ergonomics vol.35, no.1, January 2005, pp.19-31. 미소장
12 A.K. Bourke, J.V. O’Brien, G.M. Lyons, “Evaluation of A Threshold-based Tri-axial Accelerometer Fall Detection Algorithm,” J Gait and Posture vol. 26, no. 2, July 2007, pp.194-199.. 미소장
13 Ali Fahmi PN, E. Kodirov, M. F. A. Abdullah, D. Choi, and S. Sayeed, “Arm’s flex when responding Call for Implicit User Authentication in Smartphone,” Int. J. of Security and Its Applications vol. 6, no. 3, July 2012, pp. 58-64. 미소장
14 D. J. Berndt and J. Clifford, “Using Dynamic Time Warping to Find Patterns in Time Series,” In AAAI Technical Report ’94 Workshop on Knowledge Discovery in Databases (KDD-94), pp.359-370 미소장
15 M. Burge and W. Burger, “Ear Biometrics”, In A. Jain R. Bolle and S. Pankanti, editors, Biometics: Personal Identfication in a Networked Society, Kluwer Academic, Dordrecht-The Netherlands, 1998, pp. 273-286. 미소장
16 A comparative study of texture measures with classification based on feature distributions 네이버 미소장