Privacy-Preserving Sensor-Based Continuous Authentication and User Profiling: A Review
Abstract
:1. Introduction
2. Background
- Active implementation: Achieves the verification of the user’s identity by asking them to introduce credentials regularly. Therefore, traditional authentication systems can be used for this implementation such as passwords, patterns, fingerprints, etc. However, the user might be annoyed by the continuous requests during each session, and they can be a source of attacks if an adversary has access to that information;
- Passive/implicit implementation or soft biometrics: Performs user authentication by collecting data transparently, so that the user is not aware of this checking. In this manner, the user would not be disturbed each time the authentication is conducted, but its realization is more complicated. This information is based on non-invasive user biometric traces that can be obtained from device usage.
- Behavioral information: Data that describes the behavior of the owner, including features such as battery consumption, GPS location, or installed applications. This information is used to confirm the user’s identity by comparing its current values with regular user habits;
- Biological information: Data collected from biological attributes, inherent to the owner, that cannot be obtained from any other person. This group, in turn, can also be differentiated in physical aspects, as the color, shape, and size of the iris or face, and physiological and health-related signals, such as the photoplethysmogram (PPG), electroencephalogram (EEG), or electrocardiogram (ECG).
3. Methodology
- Identification of records through database searching. The principal databases utilized were Google Scholar and IEEE Xplore, and the searching queries were “passive continuous authentication”, “implicit continuous authentication”, “privacy-preserving”, “user profiling”, and “user authentication”. These queries were introduced both individually and combined in order to find more concrete articles. Additionally, the bibliography of the articles collected through this methodology was examined to increase the potential bibliography and find references for the most used biometric databases. The total number of articles obtained was 171;
- Exclusion of duplicated or non-related records after screening. The selection of this step reduced considerably the number of works, as those that mention passive CA but are focused on active CA were dismissed;
- Exclusion of non-related records after its study. The number of researches discarded in this step was small and specially related to not using sensors in the authentication process;
- Analysis of the remaining articles. The final number of studied papers is 62, and all of them are presented in Tables 1–3, depending on their specific content.
4. Continuous Authentication
4.1. Sensors for Device Interaction
4.2. Sensors for Motion
4.3. Sensors for Touch Dynamics
4.4. Voice Sensors
4.5. Sensors for Facial Recognition
4.6. Sensors for Ocular Recognition
4.7. Sensors for Other Bodyparts Recognition
4.8. Sensors for Physiological Features
5. User Profiling
5.1. GPS
5.2. Ocular
- These are two of the main principal machine-learning algorithms and, hence, they are well studied, and provide several implementation options and different possibilities when defining the learning process;
- Furthermore, they have been widely used in the studied papers and both algorithms provide the best results. Therefore, their usefulness in biometric CA is already demonstrated, particularly with motion, touch dynamics, and voice features.
6. Datasets
6.1. Behavioral Datasets
- The Device Analyzer dataset [67] was published in 2011 and presented a fault tolerant system architecture for collecting general mobile sensorial data in Android-based devices at a sampling rate of 5 min. The study capture behavioral features like call logs, SMS history, and the location, power, and settings of the device, and was performed with more than 30,000 users;
- The database LiveLab Project [68] collects measurements of wireless networks and behavioral characteristics obtained during the year 2010 from 34 iPhone 3GS at a sampling rate of 15 min;
- The LDCC dataset [69] is formed by 170 users from which, over 2 years, behavioral attributes that reflect user social interaction were collected: Social interaction data (call and SMS logs, and Bluetooth usage), location data, media creation, and usage data (location where images or video was captured or music played), and applications usage. The participants used the Nokia N95 and information was collected at a variable rate between 30 and 600 s;
- Originally, the dataset Social Evolution [70] was created to analyze the measured sensorial data to sense the health status of a community. It is based on the collection of mobile behavioral characteristics, such as call and SMS logs or WiFi strength, of 80 students during an academic year at a sampling rate of 6 min;
- The Reality Mining database [71] consists of behavioral data collected from 100 Nokia 6600 smart phones at a rate of 6 min. This information includes call logs, Bluetooth devices in proximity, application usage, and phone status, and was acquired in a period of 9 months;
- The collection of data available in the SherLock dataset [1] was performed between 2015 and 2018 in Samsung Galaxy S5 smartphones of 50 different users. In this work two agents were developed; a data compilation agent named Sherlock and a malicious agent called Moriarty. The objective of Sherlock is to obtain a high amount of monitorable features at a high sampling rate, while Moriarty, designed as a normal application (game, sports, or music app, for example) might be executing its malicious activity. Depending on the version of Moriarty, this activity may include the unauthorized transmission of the contacts of images stored in the device, location, audio, notifications of other applications (Facebook, Gmail, or Skype), or web history. However, Moriarty also creates a label when it realizes its operation to let Sherlock know when the malicious activity was performed. In this way, aside from creating this dataset, the authors also demonstrated its utility in the cybersecurity field by performing a malware analysis and evaluating different CA algorithms. The obtention of different monitorable features (called sensors) was performed by groups (called probes). Therefore, each probe collected by SherLock contained the measurements of a certain number of features. Additionally, these probes where defined as push probes if the collection was activated by a specific event (such as receiving a notification) or as pull probes if it was conducted recurrently. As a result, the SherLock dataset is organized into tables that contain the different probes. A complete description of these tables can be seen in Tables 8 and 9 of [1].Apart from the explicit labels of the malicious activities left by Moriarty, the SherLock dataset presents other advantage when compared to the previously mentioned datasets. The first one is its temporal resolution, improved by reducing the sampling rate up to 5 s in some of the probes. The minimal sampling rate among the other datasets is 60 s (LDCC [69]), whereas SherLock collects probes at 5, 10, and 15 s. Additionally, SherLock presents the widest variety of data.
6.2. Biological Datasets
- The MOBIO database [72] was published in 2012 and is formed by the face and voice of 150 English-speaking subjects. This information was obtained with a Nokia N93i mobile phone in 12 sessions separated by several weeks. The voice recordings were sampled with pre-defined and free text uttered by the participants;
- In 2014, the CSIP dataset [73] was published. This database consists of the iris and periocular information of 50 individuals, collected using alternative settings of four different devices (Sony Ericsson Xperia Arc S, iPhone 4, ThL W200, and Huawei U8510), defining a total of 10 setups. In addition, the data was compiled in different locations, changing the illumination conditions;
- The face, teeth, and voice of 50 people is presented in the FTV dataset [74]. The camera and microphone of the HP iPAQ rw6100 smartphone were used under different illumination and noise constraints;
- The MobBIO database [75] presents the face, iris, and voice biological features of 105 volunteers from Portugal, the U.K., Romania, and Iran. An Asus Transformer Pad TF 300T was used to collect the data. The face and iris images were taken using the back camera of a device with two different lighting conditions, while the participants read 16 sentences in Portuguese to record the voice samples;
- The database UMDAA [76] includes the face, as well as multiple data that represents behavioral characteristics, including touchscreen, gyroscope, magnetometer, light sensor, GPS, Bluetooth, accelerometer, WiFi, proximity sensor, temperature sensor, and pressure sensor. The study was performed with 48 volunteers, using Nexus 5 phones in a time frame of 2 months;
- The MobiBits database [77] is based on five biometric features: The voice, face, iris, hand image, and handwritten signature over the screen of 55 subjects. The devices used were Huawei Mate S, for handwritten signatures and iris and periocular data collection, Huawei P9 Lite, for voice recordings, and CAT s60, for face and hand images acquisition. The data collection was divided in 3 sessions at typical office conditions;
- The SWAN Multimodal Biometric Dataset [64] presents a collection of biological data obtained between 2016 and 2017 using an iPhone 6. The information compiled include three physical characteristics of 150 subjects, which are: Face, periocular, and voice. These characteristics were collected in different sessions, separated by a time gap between 1 and 3 weeks, in supervised and unsupervised scenarios. Additionally, the environment was changed during the data acquisition of each session (indoor and outdoor acquisition) thus, modifying the illumination and noise conditions, simulating real-life situations. The 150 participants were from four different countries (India, Norway, France, and Switzerland), providing multilingual voice and multiple ethnicity representation to the dataset. The voice recordings were obtained based on four predefined sentences with variable parts that were spoken in English and the national language of each participant. In one of the sessions, the data of the three biometric features were obtained using an iPad Pro and modified, generating artifacts, in order to use it to generate a presentation attack dataset.
7. Privacy-Preserving Approaches
- Enrollment Phase: In which a template of the owner’s features is produced and stored in the authentication server, which can be the same device (on-device), or a third party (off-device, or outsourcing);
- Verification Phase: Where the information of the user is introduced as input to an authentication algorithm and compared to the template in order to obtain a positive or negative output.
- Biometric overtness: The intruder attacks the device to steal the template or modify it by distorting its content;
- Non-secure infrastructure: In case a third party is included as an authentication server, the attacker can gain access to the template by intercepting the communication channel between the device and the authentication server. Similarly, a non-trusted authentication server could use the template’s information to analyze the profile of a legitimate user and use it with malicious purpose;
- Administration attack: The attacker alters the database where the templates are stored. This includes the addition, modification, and deletion of templates.
7.1. Template Protection
- Diversity: The template should ensure the owner’s privacy by not allowing cross-matching across databases;
- Revocability: It should be possible to revoke and/or renew a compromised template;
- Irreversibility: The problem of obtaining the original biometric template from the protected one should be computationally difficult to solve;
- Performance: The protection technique should not degrade the performance of the authentication protocol.
- Cancelable Biometrics/Feature Transformation: This concept refers to the use of deliberately distorted biometric features to generate disrupted versions of the template. In this way, the distortion parameters can be modified if a cancelable feature is compromised, producing a new template. This improves the security level by enabling the use of several disrupted templates, all of them associated with the same biometric information, but may reduce the performance of the authentication system [87]. Cancelable biometrics are usually divided into two categories [84,88]:
- -
- Salting: An invertible transformation is used to alter the features, hence being possible to recuperate the original information;
- -
- Non-invertible: The distortions are produced with an irreversible function, which imply better diversity and revocability than salting methods.
- Biometric Cryptosystems: In these systems, the biometric information is encrypted or a cryptographic key is associated or directly generated from biometric features [84,89,90]:
- -
- Key binding: The biometric features and an owner-chosen key are combined in the enrollment phase to generate a secure template or helper data via a trusted bit-replacement algorithm. In an appropriate decoding trial, this algorithm would extract the key with the helper data, providing access to the user. The most important schemes of key binding biometric cryptosystems are Fuzzy Commitment [91] and Fuzzy Vault [92];
- -
- Key generation: In this case, the biometric key is generated from the helper data (obtained from the owner’s template) and the user input features. The main problem with this scheme is that, normally, biometric templates are not consistent enough to be used a key generators. An example is the Secure sketch-Fuzzy extractor [93].
7.2. Data Outsourcing
- A Hash Function is an easy-to-compute function, which is applied to a given message or information m, with variable size, and produces a message digest of fixed size. The message digest, , is a complex function depending on all bits of the original message, m. In fact, if a unique bit of the message is changed, its digest will change, approximately, in half of its bits. The standard hash functions are denoted by SHA-2 and SHA-3 [96,97]. Hash functions have been used in active CA to compare the password introduced by the user and the stated password, but their application with biometrics is more limited as it is difficult to generate the same hash from biometric data [9]. However, they are useful for instance, in creating pseudo-anonymous user identifiers;
- A Symmetric (or secret-key) Cryptosystem is an algorithm characterized by using a unique key that is only known in advance by the two parties that encrypt/decrypt messages. The encryption and decryption functions must be “easy” to compute for users of the cryptosystem and “difficult” to compute for an adversary, so even if the cryptogram is intercepted, it would be impossible to retrieve both the message and key. The most used symmetric encryption is Advanced Encryption Standard (AES) [98] which uses keys of 128, 192, and 256 bits. Format-Preserving Encryption (FPE) is a concrete type of symmetric cryptosystem, whose output (ciphertext) and input (plaintext) are in the same format. This can also be understood as a cryptosystem whose domain and range coincide [99,100,101]. A recent study in which this tool is explored for CA applications using smartphone sensors is presented in [102];
- An Asymmetric (or public-key) Cryptosystem is an algorithm characterized by using two different keys. One of them, the public key, is publicly known, so anyone can use it for encrypting a message intended for the owner of the key. The second key, the private key, is kept in secret by the receiver and is the one that allows one to decrypt the messages received. The public and private keys are related to each other, but in such a way that obtaining the private key from the public key supposes solving a computationally difficult mathematical problem [94]. The most used asymmetric encryption is known as RSA [103] and, to obtain a medium-term (2–3 years) security, the recommended length of its keys is of 2048 bits. Homomorphic Encryption is a form of asymmetric encryption that enables the computation on encrypted data without accessing to the secret/private key. Thus, it allows the owner’s encrypted information to be outsourced without explicitly sharing it [104,105,106]. Some examples of works exploring this method are [78,107,108,109].
7.3. Applications in CA
8. Conclusions and Future Works
- Shamir’s Secret Sharing (SSS): Is a protocol in which information is distributed among n parties, with the information of each party being useless on its own. Only when these parts are joined, the initial information can be obtained again. If only parts of the secret are needed to reconstruct it, this method is named a —threshold secret sharing [116,117,118]. In a CA scheme the key could be composed of shares corresponding to different biological or behavioral features, belonging to different parties who want to access a system simultaneously. Then, such key is used for authentication and data protection, though considering the need of repeating this process after a given period of time to get CA;
- Secure Multi-party Computation: Consists of procedures in which computation is performed by using inputs from different parties, provided they are going to be kept private (each party only knows its input) [119,120]. Given the widespread use of Internet of Thing (IoT) technology, IoT devices could be used to collect biological or behavioral features and thus, being considered different parties. Then, if data from all these devices are put together, it could be applied for authentication and data protection. Note that this approach is quite general and should be detailed in each particular situation;
- Zero-Knowledge Proof (ZKP): Is an approach in which a party (e.g., user) is able to demonstrate to another party (e.g., authentication server) that knows certain information without exposing it or any other data. This procedure requires an input in form of protocol from the server, which the user should execute to prove that they have the information [94,121,122]. As pointed out in this paper, biological or behavioral features can lead to privacy problems but using ZKP, such features could be used without being disclosed. Nonetheless, performance is a key issue to consider in CA because ZKP should be executed from time to time and a system’s performance cannot be highly impacted.
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
Abbreviations
Acc | Accuracy |
AES | Advanced Encryption Standard |
AUC | Area Under the Curve |
BC | BioCapsule |
BN | Bayesian Networks |
BPNN | Back Propagation Neural Network |
CA | Continuous Authentication |
CNN | Convolutional Neural Networks |
CRR | Correct Recognition Rate |
CV | Computer Vision |
DCA | Discriminant Component Analysis |
DT | Decision Tree |
DoG | Difference-of-Gaussians |
ECG | Electrocardiogram |
EEG | Electroencephalogram |
EER | Equal Error Rate |
EF | Eigenfaces |
ER | Error Rate |
FAR | False Acceptance Rate |
FF | Fischerfaces |
FPE | Format-Preseving Encryption |
FRR | False Rejection Rate |
GMM | Gaussian Mixture Model |
HAT | Hoeffding Adaptive Trees |
HOG | Histogram of Oriented Gradients |
HTER | Half Total Error Rates |
HMM | Hidden Markov Model |
KFA | Kernel-Fisher’s Analysis |
KNN | K-Nearest Neighbor |
KRR | Kernel Ridge Regression |
LDA | Linear Discriminant Analysis |
LMNN | Large Margin Nearest Neighbor |
LR | Logistic Regression |
LSTM | Long Short-Term Memory |
MDR | Multiclass Discriminant Ration |
ML | Machine Learning |
MLP | Multi-Layer Perceptrons |
MM | Markov Model |
NB | Naive Bayes |
NN | Neural Network |
PCA | Principal Component Analysis |
PPG | Photoplethysmogram |
RBF | Radial Basis Function |
RF | Random Forest |
RP | Random Projection |
SIFT | Scale-Invariant Feature Transform |
SRC | Sparse Representation Classification |
SVM | Support Vector Machine |
TNR | True Negative Rate |
TPR | True Positive Rate |
UP | User Profiling |
References
- Mirsky, Y.; Shabtai, A.; Rokach, L.; Shapira, B.; Elovici, Y. SherLock vs Moriarty: A Smartphone Dataset for Cybersecurity Research. In Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security (AISec’16), Vienna, Austria, 24–28 October 2016; pp. 1–12. [Google Scholar] [CrossRef]
- Obaidat, M.; Traore, I.; Woungang, I. Biometric-Based Physical and Cybersecurity Systems; Springer: Cham, Switzerand, 2019. [Google Scholar] [CrossRef]
- Leyden, J. RSA Explains How Attackers Breached Its Systems. 2011. Available online: https://www.theregister.com/2011/04/04/rsa_hack_howdunnit/ (accessed on 22 December 2020).
- Connor, P.; Ross, A. Biometric Recognition By Gait: A Survey of Modalities and Features. Comput. Vis. Image Underst. 2018, 167, 1–27. [Google Scholar] [CrossRef]
- Al-Naji, F.; Zagrouba, R. A survey on continuous authentication methods in Internet of Things environment. Comput. Commun. 2020, 163, 109–133. [Google Scholar] [CrossRef]
- Abuhamad, M.; Abusnaina, A.; Nyang, D.; Mohaisen, D. Sensor-based Continuous Authentication of Smartphones’ Users Using Behavioral Biometrics: A Survey. IEEE Internet Things 2021, 8, 65–84. [Google Scholar] [CrossRef]
- Gonzalez-Manzano, L.; Fuentes, J.M.D.; Ribagorda, A. Leveraging user-related internet of things for continuous authentication: A survey. ACM Comput. Surv. (CSUR) 2019, 52, 1–38. [Google Scholar] [CrossRef] [Green Version]
- Sultana, M. Multimodal Person Recognition Using Social Behavioral Biometric. Ph.D. Thesis, University of Calgary, Calgary, AB, Canada, 2018. [Google Scholar] [CrossRef]
- Rane, S. Standardization of Biometric Template Protection. IEEE Multimed. 2014, 21, 94–99. [Google Scholar] [CrossRef]
- Gomez-Barrero, M.; Galbally, J.; Rathgeb, C.; Busch, C. General Framework to Evaluate Unlinkability in Biometric Template Protection Systems. IEEE Trans. Inf. Forensics Secur. 2017, 13, 1406–1420. [Google Scholar] [CrossRef]
- de Fuentes, J.M.; González-Manzano, L.; Ribagorda, A. Secure and Usable User-in-a-Context Continuous Authentication in Smartphones Leveraging Non-Assisted Sensors. Sensors 2018, 18, 1219. [Google Scholar] [CrossRef] [Green Version]
- Malik, M.N.; Azam, M.A.; ul Haq, M.E.; Ejaz, W.; Khalid, A. ADLAuth: Passive Authentication Based on Activity of Daily Living Using Heterogeneous Sensing in Smart Cities. Sensors 2019, 19, 2466. [Google Scholar] [CrossRef] [Green Version]
- Ehatisham-ul Haq, M.; Azam, M.A.; Loo, J.; Shuang, K.; Islam, S.; Naeem, U.; Amin, Y. Authentication of Smartphone Users Based on Activity Recognition and Mobile Sensing. Sensors 2017, 17, 2043. [Google Scholar] [CrossRef] [Green Version]
- Abuhamad, M.; Abuhmed, T.; Mohaisen, D.; Nyang, D. AUTo Sen: Deep-Learning-Based Implicit Continuous Authentication Using Smartphone Sensors. IEEE Internet Things J. 2020, 7, 5008–5020. [Google Scholar] [CrossRef]
- Damasevicius, R.; Maskeliunas, R.; Venckauskas, A.; Wozniak, M. Smartphone User Identity Verification Using Gait Characteristics. Symmetry 2016, 8, 100. [Google Scholar] [CrossRef]
- Shen, C.; Tianwen, Y.; Yuan, S.; Li, Y.; Guan, X. Performance Analysis of Motion-Sensor Behavior for User Authentication on Smartphones. Sensors 2016, 16, 345. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Wu, G.; Wang, J.; Zhang, Y.; Jiang, S. A Continuous Identity Authentication Scheme Based on Physiological and Behavioral Characteristics. Sensors 2018, 18, 179. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Li, Y.; Hu, H.; Zhou, G.; Deng, S. Sensor-Based Continuous Authentication Using Cost-Effective Kernel Ridge Regression. IEEE Access 2018, 6, 32554–32565. [Google Scholar] [CrossRef]
- Li, Y.; Zou, B.; Deng, S.; Zhou, G. Using Feature Fusion Strategies in Continuous Authentication on Smartphones. IEEE Internet Comput. 2020, 24, 49–56. [Google Scholar] [CrossRef]
- Saevanee, H.; Bhattarakosol, P. Authenticating User Using Keystroke Dynamics and Finger Pressure. In Proceedings of the 6th IEEE Consumer Communications and Networking Conference, Las Vegas, NV, USA, 10–13 January 2009; pp. 1–2. [Google Scholar] [CrossRef]
- Samet, S.; Ishraque, M.T.; Ghadamyari, M.; Kakadiya, K.; Mistry, Y.; Nakkabi, Y. TouchMetric: A machine learning based continuous authentication feature testing mobile application. Int. J. Inf. Technol. 2019, 11, 625–631. [Google Scholar] [CrossRef]
- Frank, M.; Biedert, R.; Ma, E.; Martinovic, I.; Song, D. Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication. IEEE Trans. Inf. Forensics Secur. 2013, 8, 136–148. [Google Scholar] [CrossRef] [Green Version]
- Li, L.; Zhao, X.; Xue, G. Unobservable Re-authentication for Smartphones. In Proceedings of the 20th Network and Distributed System Security Symposium 2014, San Diego, CA, USA, 23–26 February 2017; pp. 1–16. Available online: https://www.ndss-symposium.org/wp-content/uploads/2017/09/02_1_0.pdf (accessed on 22 December 2020).
- Meng, W.; Wong, D.; Schlegel, R.; Kwok, L. Touch Gestures Based Biometric Authentication Scheme for Touchscreen Mobile Phones. In International Conference on Information Security and Cryptology; Springer: Berlin/Heidelberg, Germany, 2012; Volume 7763, pp. 331–350. [Google Scholar] [CrossRef]
- Peng, G.; Zhou, G.; Nguyen, D.; Qi, X.; Yang, Q.; Wang, S. Continuous Authentication With Touch Behavioral Biometrics and Voice on Wearable Glassesfs. IEEE Trans. Hum.-Mach. Syst. 2016, 47, 1–13. [Google Scholar] [CrossRef]
- Feng, H.; Fawaz, K. Continuous Authentication for Voice Assistants. In Proceedings of the 23rd Annual International Conference on Mobile Computing (MobiCom’17), Snowbird, UT, USA, 16–20 October 2017; pp. 343–355. [Google Scholar] [CrossRef] [Green Version]
- Fathy, M.; Patel, V.; Chellappa, R. Face-based Active Authentication on mobile devices. In Proceedings of the 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Brisbane, QLD, Australia, 19–24 April 2015; pp. 1687–1691. [Google Scholar] [CrossRef]
- Samangouei, P.; Patel, V.; Chellappa, R. Facial Attributes for Active Authentication on Mobile Devices. Image Vis. Comput. 2016, 58, 181–192. [Google Scholar] [CrossRef]
- Samangouei, P.; Chellappa, R. Convolutional neural networks for attribute-based active authentication on mobile devices. In Proceedings of the 2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS), Niagara Falls, NY, USA, 6–9 September 2016; pp. 1–8. [Google Scholar] [CrossRef] [Green Version]
- Mahbub, U.; Patel, V.; Chandre, D.; Barbello, B.; Chellappa, R. Partial face detection for continuous authentication. In Proceedings of the 2016 IEEE International Conference on Image Processing (ICIP), Phoenix, AZ, USA, 25–28 September 2016; pp. 2991–2995. [Google Scholar] [CrossRef] [Green Version]
- Perera, P.; Patel, V. Face-Based Multiple User Active Authentication on Mobile Devices. IEEE Trans. Inf. Forensics Secur. 2019, 14, 1240–1250. [Google Scholar] [CrossRef]
- Kudinov, A.A.; Elsakov, S.M. Improved continuous authentication system with counterfeit protection. J. Comput. Eng. Math. 2019, 6, 35–47. [Google Scholar] [CrossRef]
- Chang, J.K.; Bowyer, K.; Flynn, P. Multiple Nose Region Matching for 3D Face Recognition under Varying Facial Expression. IEEE Trans. Pattern Anal. Mach. Intell. 2006, 28, 1695–1700. [Google Scholar] [CrossRef] [PubMed]
- Emambakhsh, M.; Evans, A.; Smith, M. Using nasal curves matching for expression robust 3D nose recognition. In Proceedings of the IEEE 6th International Conference on Biometrics: Theory, Applications and Systems (BTAS 2013), Arlington, VA, USA, 29 September–2 October 2013; pp. 1–8. [Google Scholar] [CrossRef]
- Zou, Y.; Zhao, M.; Zhou, Z.; Lin, J.; Li, M.; Wu, K. BiLock: User Authentication via Dental Occlusion Biometrics. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 2018, 2, 1–20. [Google Scholar] [CrossRef]
- Cetingul, H.; Yemez, Y.; Erzin, E.; Tekalp, A. Discriminative Analysis of Lip Motion Features for Speaker Identification and Speech-Reading. IEEE Trans. Image Process. 2006, 15, 2879–2891. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Isaac, M.; Bigün, J. Audio-visual person authentication using lip-motion from orientation maps. Pattern Recognit. Lett. 2007, 28, 1368–1382. [Google Scholar] [CrossRef]
- Mock, K.; Hoanca, B. Poster: Real-time continuous iris recognition for authentication using an eye tracker. In Proceedings of the ACM Conference on Computer and Communications Security, Raleigh, NC, USA, 16–18 October 2012; pp. 1007–1009. [Google Scholar] [CrossRef]
- Pereira, T.; Marcel, S. Periocular biometrics in mobile environment. In Proceedings of the 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS), Arlington, VA, USA, 8–11 September 2015; pp. 1–7. [Google Scholar] [CrossRef]
- George, A.; Routray, A. A Score-level Fusion Method for Eye Movement Biometrics. Pattern Recognit. Lett. 2016, 82, 1–5. [Google Scholar] [CrossRef] [Green Version]
- Mohammad, A.; Rattani, A.; Derakhshani, R. Short-Term User Authentication Using Eyebrows Biometric For Smartphone Devices. In Proceedings of the IEEE Computer Science and Electronic Engineering Conference, Colchester, UK, 19–21 September 2018; pp. 287–292. [Google Scholar] [CrossRef]
- Wongchoosuk, C.; Youngrod, T.; Phetmung, H.; Lutz, M.; Puntheeranurak, T.; Kerdcharoen, T. Identification of people from armpit odor region using networked electronic nose. In Proceedings of the 2011 Defense Science Research Conference and Expo, DSR 2011, Singapore, 21–25 June 2011; pp. 1–4. [Google Scholar] [CrossRef]
- Holz, C.; Buthpitiya, S.; Knaust, M. Bodyprint: Biometric User Identification on Mobile Devices Using the Capacitive Touchscreen to Scan Body Parts. In Proceedings of the 33rd Annual ACM Conference, Seoul, Korea, 18–23 April 2015; pp. 3011–3014. [Google Scholar] [CrossRef]
- Gupta, P.; Srivastava, S.; Gupta, P. An Accurate Infrared Hand Geometry and Vein Pattern based Authentication System. Knowl.-Based Syst. 2016, 103, 143–155. [Google Scholar] [CrossRef]
- Shreyas, K.; Rajeev, S.; Panetta, K.; Agaian, S. Fingerprint authentication using geometric features. In Proceedings of the 2017 IEEE International Symposium on Technologies for Homeland Security (HST), Waltham, MA, USA, 25–26 April 2017; pp. 1–7. [Google Scholar] [CrossRef]
- Song, Y.; Cai, Z.; Zhang, Z.L. Multi-touch Authentication Using Hand Geometry and Behavioral Information. In Proceedings of the 2017 IEEE Symposium on Security and Privacy (SP), San Jose, CA, USA, 22–26 May 2017; pp. 357–372. [Google Scholar] [CrossRef]
- Bonissi, A.; Labati, R.; Perico, L.; Sassi, R.; Scotti, F.; Sparagino, L. A preliminary study on continuous authentication methods for photoplethysmographic biometrics. In Proceedings of the 2013 IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (BioMS 2013), Naples, Italy, 9 September 2013; pp. 28–33. [Google Scholar] [CrossRef] [Green Version]
- Lee, A.; Kim, Y. Photoplethysmography as a form of biometric authentication. In Proceedings of the 2015 IEEE Sensors, Busan, Korea, 1–4 November 2015; pp. 1–2. [Google Scholar] [CrossRef]
- Hu, J.; Mu, Z. EEG authentication system based on auto-regression coefficients. In Proceedings of the 10th International Conference on Intelligent Systems and Control (ISCO), Coimbatore, India, 7–8 January 2016; pp. 1–5. [Google Scholar] [CrossRef]
- Camara, C.; Peris-Lopez, P.; González-Manzano, L.; Tapiador, J. Real-time Electrocardiogram Streams for Continuous Authentication. Appl. Soft Comput. 2017, 68, 784–794. [Google Scholar] [CrossRef]
- Lin, F.; Song, C.; Zhuang, Y.; Xu, W.; Li, C.; Ren, K. Cardiac Scan: A Non-contact and Continuous Heart-based User Authentication System. In Proceedings of the 23rd Annual International Conference, Snowbird, UT, USA, 16–20 October 2017; pp. 315–328. [Google Scholar] [CrossRef]
- Barros, A.; Rosario, D.; Resque, P.; Cerqueira, E. Heart of IoT: ECG as biometric sign for authentication and identification. In Proceedings of the 15th International Wireless Communications and Mobile Computing Conference (IWCMC), Tangier, Morocco, 24–28 June 2019; pp. 307–312. [Google Scholar] [CrossRef]
- Rattani, A.; Derakhshani, R.; Ross, A. Selfie Biometrics: Advances and Challenges; Springer: Cham, Switzerland, 2019. [Google Scholar] [CrossRef]
- Ying, J.J.C.; Chang, Y.J.; Huang, C.M.; Tseng, V.S. Demographic Prediction Based on User’s Mobile Behabiors. Mob. Data Chall. 2012, 2012, 1–4. [Google Scholar]
- Do, T.; Gatica-Perez, D. The Places of Our Lives: Visiting Patterns and Automatic Labeling from Longitudinal Smartphone Data. IEEE Trans. Mob. Comput. 2014, 13, 638–648. [Google Scholar] [CrossRef] [Green Version]
- Herder, E.; Siehndel, P.; Kawase, R. Predicting User Locations and Trajectories. In Proceedings of the User Modeling, Adaptation, and Personalization (UMAP 2014), Dublin, Ireland, 29 June–3 July 2014; Volume 8538, pp. 86–97. [Google Scholar] [CrossRef] [Green Version]
- Zhong, Y.; Yuan, N.; Zhong, W.; Zhang, F.; Xie, X. You Are Where You Go: Inferring Demographic Attributes from Location Check-ins. In Proceedings of the 8th ACM International Conference on Web Search and Data Mining (WSDM 2015), Shanghai, China, 31 January–6 February 2015; pp. 295–304. [Google Scholar] [CrossRef]
- Xie, K.; Xiong, H.; Li, C. The correlation between human mobility and socio-demographic in megacity. In Proceedings of the 2016 IEEE International Smart Cities Conference (ISC2), Trento, Italy, 12–15 September 2016; pp. 1–6. [Google Scholar] [CrossRef]
- Solomon, A.; Bar, A.; Yanai, C.; Shapira, B.; Rokach, L. Predict Demographic Information Using Word2Vec on Spatial Trajectories. In Proceedings of the 26th Conference on User Modeling, Adaptation and Personalization (UMAP’18), Singapore, 8–11 July 2018; pp. 331–339. [Google Scholar] [CrossRef] [Green Version]
- Abbasi, A.; Khan, M. Iris-pupil thickness based method for determining age group of a person. Int. Arab J. Inf. Technol. 2016, 13, 1–7. [Google Scholar]
- Rattani, A.; Donthi Reddy, N.R.; Derakhshani, R. Gender Prediction from Mobile Ocular Images: A Feasibility Study. In Proceedings of the 2017 IEEE International Symposium on Technologies for Homeland Security (HST), Waltham, MA, USA, 25–26 April 2017; pp. 1–6. [Google Scholar] [CrossRef]
- Rattani, A.; Donthi Reddy, N.R.; Derakhshani, R. Convolutional Neural Network for Age Classification from Smart-phone based Ocular Images. In Proceedings of the IEEE International Joint Conference on Biometrics, Denver, CO, USA, 1–4 October 2017; pp. 756–761. [Google Scholar] [CrossRef]
- Rattani, A.; Donthi Reddy, N.R.; Derakhshani, R. Convolutional Neural Networks for Gender Prediction from Smartphone-based Ocular Images. IET Biom. 2018, 7, 423–430. [Google Scholar] [CrossRef]
- Raghavendra, R.; Stokkenes, M.; Mohammadi, A.; Venkatesh, S.; Raja, K.B.; Wasnik, P.; Poiret, E.; Marcel, S.; Busch, C. Smartphone Multi-modal Biometric Authentication: Database and Evaluation. arXiv 2019, arXiv:1912.02487. [Google Scholar]
- European Union. 2018 Reform of EU Data Protection Rules. Available online: https://ec.europa.eu/commission/sites/beta-political/files/data-protection-factsheet-changes_en.pdf (accessed on 22 December 2020).
- European Union. Regulation on Privacy and Electronic Communications. Available online: https://ec.europa.eu/digital-single-market/en/news/proposal-regulation-privacy-and-electronic-communications (accessed on 22 December 2020).
- Wagner, D.; Rice, A.; Beresford, A. Device Analyzer. ACM Sigmetrics Perform. Eval. Rev. 2014, 41, 53–56. [Google Scholar] [CrossRef]
- Shepard, C.; Rahmati, A.; Tossell, C.; Zhong, L.; Kortum, P. LiveLab: Measuring Wireless Networks and Smartphone Users in the Field. Sigmetrics Perform. Eval. Rev. 2011, 38, 15–20. [Google Scholar] [CrossRef]
- Kiukkonen, N.; Blom, J.; Dousse, O.; Gatica-Perez, D.; Laurila, J.K. Towards rich mobile phone datasets: Lausanne data collection campaign. In Proceedings of the ACM Int. Conf. on Pervasive Services (ICPS), Berlin, Germany, 13–16 July 2010; pp. 1–7. [Google Scholar]
- Madan, A.; Cebrian, M.; Moturu, S.; Farrahi, K.; Pentland, S. Sensing the ‘Health State’ of a Community. IEEE Pervasive Comput. 2012, 11, 36–45. [Google Scholar] [CrossRef] [Green Version]
- Eagle, N.; (Sandy) Pentland, A. Reality Mining: Sensing Complex Social Systems. Pers. Ubiquitous Comput. 2006, 10, 255–268. [Google Scholar] [CrossRef]
- Mccool, C.; Marcel, S.; Abdenour, H.; Pietikainen, M.; Matejka, P.; Cernocky, J.; Poh, N.; Kittler, J.; Larcher, A.; Levy, C.; et al. Bi-Modal Person Recognition on a Mobile Phone: Using Mobile Phone Data. In Proceedings of the 2012 IEEE International Conference on Multimedia and Expo Workshops, Melbourne, VIC, Australia, 9–13 July 2012; pp. 635–640. [Google Scholar] [CrossRef] [Green Version]
- Santos, G.; Grancho, E.; Bernardo, M.; Fiadeiro, P. Fusing iris and periocular information for cross-sensor recognition. Pattern Recognit. Lett. 2015, 57, 52–59. [Google Scholar] [CrossRef]
- Kim, D.J.; Chung, K.W.; Hong, K.S. Person Authentication using Face, Teeth and Voice Modalities for Mobile Device Security. IEEE Trans. Consum. Electron. 2010, 56, 2678–2685. [Google Scholar] [CrossRef]
- Sequeira, A.F.; Monteiro, J.C.; Rebelo, A.; Oliveira, H.P. MobBIO: A multimodal database captured with a portable handheld device. In Proceedings of the 2014 International Conference on Computer Vision Theory and Applications (VISAPP), Lisbon, Portugal, 5–8 January 2014; pp. 133–139. [Google Scholar] [CrossRef]
- Mahbub, U.; Sarkar, S.; Patel, V.M.; Chellappa, R. Active user authentication for smartphones: A challenge data set and benchmark results. In Proceedings of the 2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS), Niagara Falls, NY, USA, 6–9 September 2016; pp. 1–8. [Google Scholar]
- Bartuzi, E.; Roszczewska, K.; Trokielewicz, M.; Bialobrzeski, R. MobiBits: Multimodal Mobile Biometric Database. arXiv 2018, arXiv:1808.10710. [Google Scholar]
- Govindarajan, S.; Gasti, P.; Balagani, K. Secure privacy-preserving protocols for outsourcing continuous authentication of smartphone users with touch data. In Proceedings of the 2013 IEEE 6th International Conference on Biometrics: Theory, Applications and Systems (BTAS), Arlington, VA, USA, 29 September–2 October 2013; pp. 1–8. [Google Scholar] [CrossRef]
- Khan, M.; Quasim, M.; Alghamdi, N.; Khan, M. A Secure Framework for Authentication and Encryption Using Improved ECC for IoT-based Medical Sensor Data. IEEE Access 2020, 8, 52018–52027. [Google Scholar] [CrossRef]
- Zou, X.; Du, Y.; Li, F. Secure and privacy-preserving biometrics based active authentication. In Proceedings of the 2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC), Seoul, Korea, 14–17 October 2012; pp. 1291–1296. [Google Scholar] [CrossRef]
- Mwema, J.; Kimwele, M.; Kimani, S. A Simple Review of Biometric Template Protection Schemes Used in Preventing Adversary Attacks on Biometric Fingerprint Templates. Int. J. Comput. Trends Technol. 2015, 20, 12–18. [Google Scholar] [CrossRef]
- Jain, A.; Nandakumar, K.; Nagar, A. Biometric Template Security. EURASIP J. Adv. Signal Process. 2008, 2008, 1–17. [Google Scholar] [CrossRef]
- Gasti, P.; Sedenka, J.; Yang, Q.; Zhou, G.; Balagani, K. Secure, Fast, and Energy-Efficient Outsourced Authentication for Smartphones. IEEE Trans. Inf. Forensics Secur. 2016, 11, 2556–2571. [Google Scholar] [CrossRef]
- Sandhya, M.; Prasad, M. Biometric Security and Privacy: Opportunities & Challenges in The Big Data Era; Springer: Cham, Switzerland, 2017; pp. 323–370. [Google Scholar] [CrossRef]
- Li, S.; Jain, A. Encyclopedia of Biometrics; Springer: Cham, Switzerand, 2009. [Google Scholar] [CrossRef] [Green Version]
- Ghammam, L.; Barbier, M.; Rosenberger, C. Enhancing the Security of Transformation Based Biometric Template Protection Schemes. In Proceedings of the 2018 International Conference on Cyberworlds (CW), Singapore, 3–5 October 2018; pp. 316–323. [Google Scholar] [CrossRef] [Green Version]
- Im, J.H.; Jeon, S.Y.; Lee, M.K. Practical Privacy-Preserving Face Authentication for Smartphones Secure Against Malicious Clients. IEEE Trans. Inf. Forensics Secur. 2020, 15, 2386–2401. [Google Scholar] [CrossRef]
- Shin, S.; Seto, Y. Study of Cancelable Biometrics in Security Improvement of Biometric Authentication System. In Proceedings of the Computer Information Systems and Industrial Management (CISIM 2015), Warsay, Poland, 24–26 September 2015; Volume 9339, pp. 547–558. [Google Scholar] [CrossRef] [Green Version]
- Nair, J.; Kumari, R. A Review on Biometric Cryptosystems. Int. J. Latest Trends Eng. Technol. 2015, 6, 46–53. [Google Scholar]
- Hernández Álvarez, F. Biometric Authentication for Users through Iris by Using Key Binding and Similarity Preserving Hash Functions. Ph.D. Thesis, Universidad Politécnica de Madrid, Madrid, Spain, 2015. [Google Scholar]
- Juels, A.; Wattenberg, M. A Fuzzy Commitment Scheme. In Proceedings of the 6th ACM Conference on Computer and Communications Security (CCS’99), Singapore, 1–4 November 1999; pp. 28–36. [Google Scholar] [CrossRef]
- Juels, A.; Sudan, M. A Fuzzy Vault scheme. Des. Codes Cryptogr. 2006, 38, 237–257. [Google Scholar] [CrossRef]
- Dodis, Y.; Reyzin, L.; Smith, A. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. SIAM J. Comput. 2008, 38, 97–139. [Google Scholar] [CrossRef] [Green Version]
- Menezes, A.J.; van Oorschot, P.C.; Vanstone, S.A. Handbook of Applied Cryptography; CRC Press, Inc.: Boca Raton, FL, USA, 1996; Available online: http://cacr.uwaterloo.ca/hac/ (accessed on 22 December 2020).
- Paar, C.; Pelzl, J. Understanding Cryptography. A Textbook for Students and Practitioners; Springer: Heidelberg, Germany, 2010. [Google Scholar] [CrossRef]
- NIST. SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions. NIST FIPS 202. 2014. Available online: http://csrc.nist.gov/publications/drafts/fips-202/fips_202_draft.pdf (accessed on 22 December 2020).
- NIST. Secure Hash Standard (SHS). NIST FIPS 180-4. National Institute of Standard and Technology. 2015. Available online: https://csrc.nist.gov/publications/detail/fips/180/4/final (accessed on 22 December 2020).
- Daemen, V.; Rijmen, J. The Design of Rijndael: AES–The Advanced Encryption Standard; Springer: Berlin, Germany, 2002; Available online: https://www.springer.com/gp/book/9783540425809 (accessed on 22 December 2020).
- Bellare, M.; Rogaway, P.; Spies, T. The FFX Mode of Operation for Format-Preserving Encryption. Technical Report, Submited to NIST. 2010. Available online: https://csrc.nist.gov/csrc/media/projects/block-cipher-techniques/documents/bcm/proposed-modes/ffx/ffx-spec.pdf (accessed on 22 December 2020).
- Gayoso Martínez, V.; Hernández Encinas, L.; Martín Muñoz, A.; de Fuentes, J.M.; González Manzano, L. Cifrado de datos con preservación del formato. In Proceedings of the Primeras Jornadas Nacionales de Investigación en Ciberseguridad (JNIC), Leon, Spain, 14–16 September 2015; pp. 110–115. [Google Scholar]
- Rodríguez Cesar, H.; Gayoso Martínez, V.; Hernández Encinas, L.; Martín Muñoz, A. Format-Preserving Encryption: Image Encryption Under FF1 Scheme. Int. J. Adv. Electron. Comput. Sci. (IJAECS) 2019, 6, 1–4. [Google Scholar]
- Hernández-Álvarez, L.; de Fuentes, J.M.; González-Manzano, L.; Hernández Encinas, L. SmartCAMPP—Smartphone-based Continuous Authentication leveraging Motion sensors with Privacy Preservation. Pattern Recognit. Lett. 2020. submitted. [Google Scholar]
- Rivest, R.; Shamir, A.; Adleman, L.M. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Commun. ACM 1978, 21, 120–126. [Google Scholar] [CrossRef]
- Benaloh, J.C. Secret sharing homomorphisms: Keeping shares of a secret secret. In Proceedings of the Advances in Cryptology–CRYPTO’86, Santa Barbara, CA, USA, 18–22 August 1986; Volume 263, pp. 251–260. [Google Scholar] [CrossRef] [Green Version]
- Paillier, P. Public-key cryptosystems based on composite degree residuosity classes. In Proceedings of the Advances in Cryptology–EUROCRYPT’99, Prague, Czech Republic, 2–6 May 1999; Volume 1592, pp. 223–238. [Google Scholar] [CrossRef] [Green Version]
- Singh, V.K.; Dutta, M. Analyzing Cryptographic Algorithms for Secure Cloud Network. Int. J. Adv. Stud. Comput. Sci. Eng. 2014, 3, 1–9. [Google Scholar]
- Al-Rubaie, M. Towards Privacy-Aware Mobile-Based Continuous Authentication Systems. Ph.D. Thesis, Iowa State University, Ames, IA, USA, 2018. [Google Scholar]
- Song, X.; Chen, Z.; Sun, D. Iris Ciphertext Authentication System Based on Fully Homomorphic Encryption. J. Inf. Process. Syst. 2020, 16, 599–611. [Google Scholar] [CrossRef]
- Shahandashti, S.; Safavi-Naini, R.; Safa, N. Reconciling User Privacy and Implicit Authentication for Mobile Devices. Comput. Secur. 2015, 53, 215–233. [Google Scholar] [CrossRef]
- Nandakumar, K.; Jain, A. Biometric Template Protection: Bridging the performance gap between theory and practice. IEEE Signal Process. Mag. 2015, 32, 88–100. [Google Scholar] [CrossRef] [Green Version]
- Noorman, J.; Muehlberg, J.; Piessens, F. Authentic Execution of Distributed Event-Driven Applications with a Small TCB. In Proceedings of the International Workshop on Security and Trust Management, Oslo, Norway, 14–15 September 2017; pp. 55–71. [Google Scholar] [CrossRef]
- Sun, Y.; Upadhyaya, S. Secure and privacy preserving data processing support for active authentication. Inf. Syst. Front. 2015, 17, 1007–1015. [Google Scholar] [CrossRef]
- Vassallo, G.; Van Hamme, T.; Preuveneers, D.; Joosen, W. Privacy-Preserving Behavioral Authentication on Smartphones. In Proceedings of the First International Workshop on Human-Centered Sensing, Networking, and Systems, Delft, The Netherlands, 5 November 2017; pp. 1–6. [Google Scholar] [CrossRef]
- Hatin, J.; Cherrier, E.; Schwartzmann, J.J.; Rosenberger, C. Privacy Preserving Transparent Mobile Authentication. In Proceedings of the 3rd International Conference on Information Systems Security and Privacy, Porto, Portugal, 19–21 February 2017; pp. 354–361. [Google Scholar] [CrossRef]
- Leggett, J.; Williams, G.; Usnick, M.; Longnecker, M. Dynamic Identity Verification via Keystroke Characteristics. Int. J. Man.-Mach. Stud. 1991, 35, 859–870. [Google Scholar] [CrossRef]
- Alvarez, G.; Hernández Encinas, L.; Martín del Rey, A. A multisecret sharing scheme for color images based on cellular automata. Inf. Sci. 2008, 178, 4382–4395. [Google Scholar] [CrossRef] [Green Version]
- Blakley, G. Safeguarding cryptographic keys. In Proceedings of the AFIPS National Computer Conference, New York, NY, USA, 4–7 June 1979; pp. 313–317. [Google Scholar] [CrossRef]
- Shamir, A. How to Share a Secret. Commun. ACM 1979, 22, 612–613. [Google Scholar] [CrossRef]
- Yao, A. How to generate and exchange secrets. In Proceedings of the 27th Annual Symposium on Foundations of Computer Science, Toronto, ON, Canada, 27–29 October 1986; pp. 162–167. [Google Scholar] [CrossRef]
- Zhao, C.; Zhao, S.; Zhao, M.; Chen, Z.; Gao, C.Z.; Lif, H.; Tan, Y.A. Secure Multi-Party Computation: Theory, practice and applications. Inf. Sci. 2019, 476, 357–372. [Google Scholar] [CrossRef]
- Blum, M.; Feldman, P.; Micali, S. Non-Interactive Zero-Knowledge and Its Applications. In Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing (STOC 1988), Chicago, IL, USA, 2–5 May 1988; pp. 103–112. [Google Scholar] [CrossRef]
- Quisquater, J.J.; Guillou, L.C.; Berson, T.A. How to Explain Zero-Knowledge Protocols to Your Children. In Proceedings of the Advances in Cryptology–CRYPTO’89, Santa Barbara, CA, USA, 20–24 August 1990; Volume 435, pp. 628–631. [Google Scholar] [CrossRef] [Green Version]
- Goh, A.; Ngo, D. Computation of Cryptographic Keys from Face Biometrics. In Proceedings of the IFIP International Conference on Communications and Multimedia Security, Torino, Italy, 2–3 October 2003; pp. 1–13. [Google Scholar] [CrossRef] [Green Version]
- Kikuchi, H.; Nagai, K.; Ogata, W.; Nishigaki, M. Privacy-preserving similarity evaluation and application to remote biometrics authentication. Soft Comput. 2010, 14, 529–536. [Google Scholar] [CrossRef]
- Corcoran, P.; Costache, C. Biometric technology and smartphones: A consideration of the practicalities of a broad adoption of biometrics and the likely impacts. In Proceedings of the 2015 IEEE International Symposium on Technology and Society (ISTAS), Dublin, Ireland, 11–12 November 2015; pp. 1–7. [Google Scholar] [CrossRef] [Green Version]
Features | Reference | Technique | Dataset | Best Result |
---|---|---|---|---|
Device Interacion | [11], 2018 | NB, KNN, HAT | SherLock Dataset | |
Motion | [15], 2016 | Random Proyections | USC Human Activity Dataset | |
[16], 2016 | SVM, NN, KNN | Work-specific | , | |
[13], 2017 | DT, BN, KNN, SVM | Work-specific | ||
[18], 2018 | SVM, KRR | Multi-Modal Dataset | ||
[17], 2018 | SVM, KNN, DT | Work-specific | , , | |
[12], 2019 | SVM, DT, RF | MobiAct, HAR, PAMAP2 | ||
[19], 2020 | SVM | Work-specific | ||
[14], 2020 | LSTM | Work-specific | , , | |
, | ||||
Touch Dynamics | [24], 2012 | DT, NB, Kstar, RBF, BPNN | Work-specific | |
[22], 2013 | SVM, KNN | Work-specific | ||
[23], 2013 | SVM | Work-specific | ||
[25], 2016 | SVM | Work-specific | , | |
[21], 2019 | Several ML classifiers | Work-specific | , , | |
[14], 2020 | LSTM | Work-specific | , , | |
, | ||||
Voice | [25], 2016 | SVM | Work-specific | , |
[26], 2017 | SVM | Work-specific | ||
Face | [27], 2015 | EF, FF, LMNN, SRC | Work-specific | |
[28], 2016 | SVM | MOBIO, AA01 | ||
[29], 2016 | CNN | MOBIO, AA01 | ||
[30], 2016 | SVM | AA01 | , | |
[31], 2018 | SVM | MOBIO, UMDAA01, UMDAA02 | , , | |
[32], 2019 | CNN ResNet | YouTube | ||
Nose | [33], 2006 | Feature matching | Work-specific | |
[34], 2013 | PCA, LDA, KFA, SVM, DT | FRGCv2.0 | ||
Teeth | [35], 2018 | Feature matching, SVM | Work-specific | , |
Lip Motion | [36], 2006 | HMM | MVGL-AVD | |
[37], 2007 | Feature matching | XM2VTS | ||
Ocular | [38], 2012 | Daugman’s algorithm, KNN | Work-specific | , |
[39], 2015 | GMM | MOBIO, CPqD | ||
[40], 2015 | RBF | BioEye 2015 | ||
[41], 2018 | SVM, GIST and HOG descriptors | VISOB, FERET | , | |
Bodyprints | [42], 2011 | PCA | Work-specific | 95% Confidence Ellipse |
[43], 2015 | SURF detector/descriptor | Work-specific | , | |
[44], 2016 | Feature matching | Work-specific | , | |
[45], 2017 | SIFT descriptor | Neurotechnology | ||
[46], 2017 | SVM, KNN | Work-specific | ||
Physiological | [47], 2013 | Feature matching | Work-specific | |
[48], 2015 | Feed-forward NN | Work-specific | , , | |
[49], 2016 | Event Related Potentials | Work-specific | ||
[50], 2017 | KNN | MIT-BIH Normal Sinus Rhythm | ||
[51], 2017 | SVM | Work-specific | , | |
[52], 2019 | NB, MLP, RF, SVM | PhysioNet |
Features | Reference | Technique | Dataset | Predicted Attribute | Best Result |
---|---|---|---|---|---|
GPS | [54], 2012 | SVM, DT, NB, LR, MLP | MDC Dataset | Gender, age, marital status, job | |
[55], 2014 | Place Labeling | Lausanne Data Collection Campaign | Visiting patterns | ||
[56], 2014 | Simple MM, Top-N Locations | GeoLife GPS Trajectory Dataset | Future Location | ||
[57], 2015 | Location2Profile | Work-specific | Gender, age, blood type, education background, marital status, zodiac sign, sexual orientation | ||
[58], 2016 | Trajectories, displacements, radius of gyration | 5th Urban Traffic Survey of Beijing | Gender, age | Statistical Test | |
[59], 2018 | Word2Vec | SherLock, CARS | Gender, age range, marital status, children, academic faculty | ||
Ocular | [60], 2016 | Analysis of variance | CASIA 4.0 Datasets | Age range | Statistical Test |
[61], 2017 | CV, SVM, MLP | VISOB | Gender, age | ||
[62], 2017 | CNN | Adience | Gender, age | ||
[63], 2018 | CNN, SVM, MLP | VISOB | Gender, age |
Features | Reference | Technique | Dataset | Privacy-Preserving Approach |
---|---|---|---|---|
Touch Dynamics | [78], 2013 | Manhattan and Euclidean distances | Touch Dataset | Homomorphic and symmetric encryption |
[112], 2015 | Algorithm of [115] | Work-specific | Sensitive information removal | |
[113], 2017 | Mean distance rules | MOBIKEY | Permutation, substitution and suppression | |
Device Interaction | [109], 2015 | Homomorphic operations | Work-specific | Homomorphic and order preserving encryption |
[114], 2017 | KNN, SVM | Work-specific | Cancelable biometrics (biohashing) | |
[102], 2020 | SVM, RF, LR | SherLock Dataset | Format-Preserving Encryption | |
Unspecified | [80], 2012 | BC | Work-specific | Cancelable biometrics |
[83], 2016 | Manhattan and Hamming distances | Work-specific | Garbled circuits | |
[107], 2018 | DCA, MDR | Touchalytics | Cancelable biometrics |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Hernández-Álvarez, L.; de Fuentes, J.M.; González-Manzano, L.; Hernández Encinas, L. Privacy-Preserving Sensor-Based Continuous Authentication and User Profiling: A Review. Sensors 2021, 21, 92. https://doi.org/10.3390/s21010092
Hernández-Álvarez L, de Fuentes JM, González-Manzano L, Hernández Encinas L. Privacy-Preserving Sensor-Based Continuous Authentication and User Profiling: A Review. Sensors. 2021; 21(1):92. https://doi.org/10.3390/s21010092
Chicago/Turabian StyleHernández-Álvarez, Luis, José María de Fuentes, Lorena González-Manzano, and Luis Hernández Encinas. 2021. "Privacy-Preserving Sensor-Based Continuous Authentication and User Profiling: A Review" Sensors 21, no. 1: 92. https://doi.org/10.3390/s21010092
APA StyleHernández-Álvarez, L., de Fuentes, J. M., González-Manzano, L., & Hernández Encinas, L. (2021). Privacy-Preserving Sensor-Based Continuous Authentication and User Profiling: A Review. Sensors, 21(1), 92. https://doi.org/10.3390/s21010092