TY - GEN
T1 - Mobile biometrics
T2 - 2017 International Carnahan Conference on Security Technology, ICCST 2017
AU - Buriro, Attaullah
AU - Akhtar, Zahid
AU - Crispo, Bruno
AU - Gupta, Sandeep
N1 - Publisher Copyright: © 2017 IEEE.
PY - 2017/12/5
Y1 - 2017/12/5
N2 - Smartphones have become the pervasive personal computing platform. Recent years thus have witnessed exponential growth in research and development for secure and usable authentication schemes for smartphones. Several explicit (e.g., PIN-based) and/or implicit (e.g., biometrics-based) authentication methods have been designed and published in the literature. In fact, some of them have been embedded in commercial mobile products as well. However, the published studies report only the brighter side of the proposed scheme(s), e.g., higher accuracy attained by the proposed mechanism. While other associated operational issues, such as computational overhead, robustness to different environmental conditions/attacks, usability, are intentionally or unintentionally ignored. More specifically, most publicly available frameworks did not discuss or explore any other evaluation criterion, usability and environment-related measures except the accuracy under zero-effort. Thus, their baseline operations usually give a false sense of progress. This paper, therefore, presents some guidelines to researchers for designing, implementation, and evaluating smartphone user authentication methods for a positive impact on future technological developments.
AB - Smartphones have become the pervasive personal computing platform. Recent years thus have witnessed exponential growth in research and development for secure and usable authentication schemes for smartphones. Several explicit (e.g., PIN-based) and/or implicit (e.g., biometrics-based) authentication methods have been designed and published in the literature. In fact, some of them have been embedded in commercial mobile products as well. However, the published studies report only the brighter side of the proposed scheme(s), e.g., higher accuracy attained by the proposed mechanism. While other associated operational issues, such as computational overhead, robustness to different environmental conditions/attacks, usability, are intentionally or unintentionally ignored. More specifically, most publicly available frameworks did not discuss or explore any other evaluation criterion, usability and environment-related measures except the accuracy under zero-effort. Thus, their baseline operations usually give a false sense of progress. This paper, therefore, presents some guidelines to researchers for designing, implementation, and evaluating smartphone user authentication methods for a positive impact on future technological developments.
KW - Biometrics
KW - Human-Computer Interaction
KW - Mobile Biometrics
KW - Smartphone Authentication
UR - https://www.scopus.com/pages/publications/85042306647
U2 - 10.1109/CCST.2017.8167859
DO - 10.1109/CCST.2017.8167859
M3 - Conference contribution
T3 - Proceedings - International Carnahan Conference on Security Technology
SP - 1
EP - 6
BT - Proceedings - 2017 International Carnahan Conference on Security Technology, ICCST 2017
A2 - Ortega-Garcia, Javier
A2 - Morales, Aythami
A2 - Fierrez, Julian
A2 - Vera-Rodriguez, Ruben
A2 - Lazzeretti, Riccardo
PB - Institute of Electrical and Electronics Engineers Inc.
Y2 - 23 October 2017 through 26 October 2017
ER -