Tytuł artykułu
Autorzy
Treść / Zawartość
Pełne teksty:
Identyfikatory
Warianty tytułu
Języki publikacji
Abstrakty
Mobile devices are widely replacing the standard personal computers thanks to their small size and userfriendly use. As a consequence, the amount of information, often confidential, exchanged through these devices is raising. This makes them potential targets of malicious network hackers. The use of simple passwords or PIN are not sufficient to provide a suitable security level for those applications requiring high protection levels on data and services. In this paper a biometric authentication system, as a running Android application, has been developed and implemented on a real mobile device. A system test on real users has been also carried out in order to evaluate the human-machine interaction quality, the recognition accuracy of the proposed technique, and the scheduling latency of the operating system and its degree of acceptance. Several measures, such as system usability, users satisfaction, and tolerable speed for identification, have been carried out in order to evaluate the performance of the proposed approach.
Rocznik
Tom
Strony
34--43
Opis fizyczny
Bibliogr. 36 poz., rys., tab.
Twórcy
autor
- Faculty of Engineering and Architecture, Kore University of Enna, Cittadella Universitaria, Enna, Italy
autor
- Faculty of Engineering and Architecture, Kore University of Enna, Cittadella Universitaria, Enna, Italy
autor
- Faculty of Engineering and Architecture, Kore University of Enna, Cittadella Universitaria, Enna, Italy
autor
- Department of Biopathology and Medical and Forensic Biotechnologies, University of Palermo, Palermo, Italy
Bibliografia
- [1] C. Militello, V. Conti, S. Vitabile, and F. Sorbello, “Embedded access points for trusted data and resources access in HPC systems”, The J. of Supercomput., vol. 55, no. 1, pp. 4–27, 2011.
- [2] S. Vitabile, V. Conti, M. Collotta, G. Scat`a, S. Andolina, A. Gentile, F. Sorbello, “A real-time network architecture for biometric data delivery in Ambient Intelligence”, J. Ambient Intelligence and Humanized Computing, vol. 4, no. 3, pp. 303–321, 2013.
- [3] C. Militello, V. Conti, S. Vitabile, and F. Sorbello, “An Embedded Iris Recognizer for Portable and Mobile Devices”, International Journal of Computer Systems Science & Engineering, vol. 25, no. 2, pp. 119–131, 2010.
- [4] V. Conti, C. Militello, F. Sorbello, and S. Vitabile, “A frequency-based approach for features fusion in fingerprint and iris multimodal biometric identification systems”, IEEE Trans. Syst., Man, and Cybernet. Part C: Applications & Reviews, vol. 40, no. 4, pp. 384–395, 2010.
- [5] S. Vitabile, V. Conti, C. Militello, and F. Sorbello, “An extended JADE-S based framework for developing secure multi-agent systems”, Comp. Stand. Interfsace J., vol. 31, no. 5, pp. 913–930, 2009.
- [6] I. Rossameeroj and Y. Tanahashi, “Various approaches in analyzing android applications with its permission-based security models”, in Proc. IEEE Int. Conf. Electro/Inform. Technol. EIT 2011, Mankato, MN, USA, 2011, pp. 1–6, 2011.
- [7] B. J. Berger, M. Bunke, and K. Sohr, “An Android security case study with bauhaus”, in Proc. 18th Work. Conf. Reverse Engin. WCRE 2011, Lero, Limerick, Ireland, 2011, pp. 179–183.
- [8] S. Khan, M. Nauman, A. T. Othman, and S. Musa, “How secure is your smartphone: an analysis of smartphone security mechanisms”, in Int. Conf. Cyber Secur., Cyber Warfare and Digit. Forensic CyberSec 2012, Kuala Lumpur, Malaysia, 2012, pp. 76–81.
- [9] K. Il Shin, J. S. Park, J. Y. Lee, and J. H. Park, “Design and implementation of improved authentication system for Android smart-phone users”, in Proc. 26th Int. Conf. Adv. Inform. Netw. Appl. Worksh. WAINA 2012, Fukuoka, Japan, 2012, pp. 704–707.
- [10] M. A. Ferrer, A. Morales, C. M. Traviesco, and J. B. Alonso, “Low cost multimodal biometric identification system based on hand geometry, palm and finger print texture”, in Proc. 41st Ann. IEEE Int. Carnahan Conf. Secur. Technol., Ottawa, ON, Canada, 2007, pp. 52–58.
- [11] B. Saropourian, “A new approach of finger-print recognition based on neural network”, in Proc. 2nd IEEE Int. Conf. Comp. Sci. Inform. Technol. ICCSIT 2009, Beijing, China, 2009, pp. 158–161.
- [12] W. Shin, S. Kiyomoto, K. Fukushima, and T. Tanaka, “Towards formal analysis of the permission-based, security model for Android”, in Proc. 5th Int. Conf. Wirel. Mob. Commun. ICWMC’09, Cannes, France, 2009, pp. 87–92.
- [13] Y. Tong, F. W. Wheeler, and X. Liu, “Improving biometric identification through quality-based face and fingerprint biometric fusion”, in Proc. IEEE Comp. Soc. Conf. Comp. Vision and Pattern Recog. Worksh. CVPRW 2010, San Francisco, CA, USA, 2010, pp. 53–60.
- [14] B. Ashwini, J. S. Digambarrao, and S. P. Patil, “Performance analysis of finger print sensors”, in Proc. 2nd Int. Conf. Mechan. Electron. Engin. ICMEE 2010, Kyoto, Japan, 2010, pp. 169–174.
- [15] P. Shi, J. Tian, Q. Su, and X. Yang, “A novel fingerprint matching algorithm based on minutiae and global statistical features”, in Proc. 1st IEEE Int. Conf Biometrics: Theory, Appl. and Syst., Washington, USA, 2007, pp. 1–6.
- [16] M. Zsolt and V. Kovacs, “A fingerprint verification system based on triangular matching and dynamic time warping”, IEEE Trans. Pattern Anal. and Machine Intell., vol. 22, no. 11, pp. 1266–1276, 2000.
- [17] V. Bonato, R. F. Molz, J. C. Furtado, M. F. Ferraao, and F. G. Moraes, “Propose of a hardware implementation for fingerprint systems”, in Field Programmable Logic and Application, LNCS, vol. 2778, pp. 1158–1161, Springer, 2003.
- [18] P. Schaumont and I. Verbauwhede, “ThumbPod puts security under your thumb”, Xilinx Xcell J., Winter 2004.
- [19] P. Ambalakat, “Security of biometric authentication systems”, in Proc. 21st Computer Science Seminar, Hartfort, USA, 2005.
- [20] D. Gentles and S. Sankaranarayanan, “Biometric secured mobile voting”, in Proc. 2nd Asian Himalayas Int. Conf. Internet AH-ICI 2011, Kathmandu, Nepal, 2011, pp. 1–6.
- [21] M. Belkhede, V. Gulhane, and P. Bajaj, “Biometric mechanism for enhanced security of online transaction on Android system: A design approach”, in Proc. 14th Int. Conf. Adv. Commun. Technol. ICACT 2012, PyeongChang, South Korea, 2012, pp. 1193–1197.
- [22] P. Gupta et al., “HuMan: Creating memorable fingerprints of mobile users”, in Proc. IEEE Int. Conf. Pervasive Comput. Commun. Worksh. (Percom Workshops), Lugano, Switzerland, 2012, pp. 479–482.
- [23] H. Zhang, Y. Yin, and G. Ren, “An improved method for singularity detection of fingerprint images”, in Book Advances in Biometric Person Authentication, LNCS, vol. 3338, pp. 516–524, Springer, 2004.
- [24] V. Conti, C. Militello, S. Vitabile, and F. Sorbello, “Introducing pseudo-singularity points for efficient fingerprints classification and recognition”, in Proc. 4th IEEE Int. Conf. Complex, Intell. Softw. Intens. Syst. CISIS 2010, Krakow, Poland, 2010, pp. 368–375.
- [25] V. Conti, G. Vitello, F. Sorbello, and S. Vitabile, “An advanced technique for user identification using partial fingerprint”, in Proc. 7th Int. IEEE Conf. Complex, Intell. Softw. Intens. Syst. CISIS 2013, Taichung, Taiwan, 2013, pp. 236–242.
- [26] V. Conti, S. Vitabile, G. Vitello, and F. Sorbello, “An embedded biometric sensor for ubiquitous authentication”, in Proc. AEIT Ann. IEEE Conf., Mondello, Italy, 2013, pp. 1–6.
- [27] G. Chao, “Human-computer interaction, the usability test methods and design principles in the human-computer interface design”, in Proc. Int. Conf. Comp. Sci. Inform. Technol. ICCSIT 2009, Beijing, China, 2009, pp. 283–285.
- [28] M. Lv, W. Hou, and C. Zhao, “Research of usability test mode based on the implicit user behavior lib”, in Proc. 9th Int. Conf. Comp.-Aided Indust. Des. Concept. Des. CAID/CD 2008, Kunming, China, 2008, pp. 157–161.
- [29] W. P. Brinkman, R. Haakma, and D. G. Bouwhuis, “Component-specific usability testing”, IEEE Trans. Syst., Man and Cybernet., Part A: Systems and Humans, vol. 38, no. 5, pp. 1143–1155, 2008.
- [30] L. Cooke, “Assessing concurrent think-aloud protocol as a usability test method: A technical communication approach”, IEEE Trans. Profess. Commun., vol. 53, no. 3, pp. 202–215, 2010.
- [31] H. Fengpei, “The Studies of Eye Tracking and Usability Test”, in Proc. 7th Int. Conf. Comp.-Aided Indust. Des. Concept. Des. CAID/CD 2006), Hangzhou, China, 2006, pp. 1–5.
- [32] T. Tullis, B. Thomas, and W. Albert, Measuring the User Experience: Collecting, Analyzing, and Presenting Usability Metrics. Morgan Kaufmann, 2010.
- [33] D. L. Olson and D. Delen, Advanced Data Mining Techniques, 1st ed. Springer, 2008.
- [34] MedCalc – User-friendly statistical software [Online]. Available: http://www.medcalc.org/index.php
- [35] P. E. Shrout and J. L. Fleiss, “Intraclass correlations: uses in assessing rater reliability”, Psycholog. Bull., vol. 86, pp. 420–428, 1979.
- [36] K. O. McGraw and S. P. Wong, “Forming inferences about some intraclass correlation coefficients”, Psycholog. Meth., vol. 1, pp. 30–46, 1996.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-9dd57c45-ac2c-4166-a66e-bd09217dcc3d