Comfort and Security Perception of Biometrics in Mobile Phones with Widespread Sensors

被引:4
|
作者
Guerra-Casanova, Javier [1 ]
Rios-Sanchez, Belen [2 ]
Viana-Matesanz, Miguel [2 ]
Bailador, Gonzalo [2 ]
Sanchez-Avila, Carmen [2 ]
Melcon de Giles, Maria Jose [1 ]
机构
[1] Tech Univ Madrid, Campus Montegancedo, Madrid 28223, Spain
[2] Tech Univ Madrid, Grp Biometr Biosignals & Secur, Res Ctr Smart Bldg & Energy Efficiency, Campus Montegancedo, Madrid 28223, Spain
关键词
Comfort; security; biometrics; perception; mobile phones; face; hand; voice; in-air signature;
D O I
10.1109/SRDSW.2016.13
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Comfort and security perception are two key factors to provide an adequate biometric solution. This article presents the results of an online survey about these characteristics in four different biometric modes implemented in mobile phones with widespread sensors. Additionally, it presents the main concerns that the use of these biometric modes generates in people, which provides a roadmap of additional issues that should be improved to create satisfactory biometric techniques.
引用
收藏
页码:13 / 18
页数:6
相关论文
共 50 条
  • [1] Mobile phones security using biometrics
    Shabeer, H. Abdul
    Suganthi, P.
    ICCIMA 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND MULTIMEDIA APPLICATIONS, VOL IV, PROCEEDINGS, 2007, : 270 - +
  • [2] Gender Differences in the Perception of Security of Mobile Phones
    Sieger, Hanul
    Moeller, Sebastian
    MOBILEHCI '12: COMPANION PROCEEDINGS OF THE 14TH INTERNATIONAL CONFERENCE ON HUMAN COMPUTER INTERACTION WITH MOBILE DEVICES AND SERVICES, 2012, : 107 - 111
  • [3] On the Use of Mobile Phones and Biometrics for Accessing Restricted Web Services
    Vivaracho-Pascual, Carlos
    Pascual-Gaspar, Juan
    IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS, 2012, 42 (02): : 213 - 222
  • [4] Bluetooth Security Analysis for Mobile Phones
    Alfaiate, Joao
    Fonseca, Jose
    SISTEMAS Y TECNOLOGIAS DE INFORMACION, VOLS 1 AND 2, 2012, : 169 - 174
  • [5] Bluetooth Security Analysis for Mobile Phones
    Alfaiate, Joao
    Fonseca, Jose
    7TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI 2012), 2012,
  • [6] Security of Mobile Phones and their Usage in Business
    Alqahtani, Abdullah Saleh
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2013, 4 (11) : 17 - 32
  • [7] Multimodal Biometrics for Enhanced Mobile Device Security
    Gofman, Mikhail I.
    Mitra, Sinjini
    COMMUNICATIONS OF THE ACM, 2016, 59 (04) : 58 - 65
  • [8] Issues with Various Security Threats on Mobile Phones
    Nseir, Sana
    Hirzallah, Nael
    Aqel, Musbah
    PROCEEDINGS OF THE 2013 PALESTINIAN INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (PICICT), 2013, : 37 - 42
  • [9] Security issues for downloaded code in mobile phones
    Babb, D
    Bishop, C
    Dodgson, TE
    ELECTRONICS & COMMUNICATION ENGINEERING JOURNAL, 2002, 14 (05): : 219 - 227
  • [10] Security management against cloning mobile phones
    Notare, MSMA
    Boukerche, A
    Cruz, FAS
    Riso, BG
    Westphall, CB
    GLOBECOM'99: SEAMLESS INTERCONNECTION FOR UNIVERSAL SERVICES, VOL 1-5, 1999, : 1969 - 1973