Human
faces
have
been
widely
adopted
in
many
applications
and
systems
requiring
a
high-security
standard.
Although
face
authentication
is
deemed
to
be
mature
nowadays,
existing
works
demonstrated
not
only
the
privacy
leakage
of
facial
information
but
also
success
spoofing
attacks
on
biometrics.
The
critical
reason
behind
this
failure
liveness
detection
This
work
advances
most
biometric-based
user
schemes
by
exploring
dynamic
biometrics
(human
activities)
rather
than
traditional
static
faces).
Inspired
observations
from
psychology,
we
propose
mmFaceID
leverage
humans'
activities
when
performing
word
reading
for
achieving
robust,
highly
accurate,
effective
via
mmWave
sensing.
By
addressing
series
technical
challenges
capturing
micro-level
muscle
movements
using
sensor,
build
neural
network
reconstruct
estimated
expression
parameters.
Then,
unique
features
can
extracted
enable
robust
regardless
relative
distances
orientations.
We
conduct
comprehensive
experiments
23
participants
evaluate
terms
distances/orientations,
length
lists,
occlusion,
language
backgrounds,
demonstrating
an
accuracy
94.7%.
extend
our
evaluation
real
IoT
scenario.
speaking
commends,
average
reach
up
92.28%.
IEEE Network,
Год журнала:
2023,
Номер
37(6), С. 67 - 73
Опубликована: Окт. 3, 2023
The
Metaverse
is
a
virtual
world,
an
immersive
experience,
new
human-computer
interaction,
built
upon
various
advanced
technologies.
How
to
protect
personal
information
and
properties
also
facing
challenges,
such
as
attacks
expectations
of
user
experiences.
While
traditional
methods
(e.g.,
those
employed
in
smartphone
authentication)
generally
pass
the
basic
design
considerations,
they
are
repeatedly
reported
be
either
unsafe
or
inconvenient
Metaverse.
In
this
paper,
we
address
discrepancy
by
introducing
CAN:
consideration
especially
for
Specifically,
focus
on
legacy
novel
biometric
authentication
systems
evaluate
them
thoroughly
with
CAN
considerations.
We
propose
ear-based
method
one
example
systems.
To
conclude,
continuous,
active
non-intrusive
system
suggested
its
capability
continuous
sessions,
against
imposters,
experience.
Applied System Innovation,
Год журнала:
2024,
Номер
7(3), С. 45 - 45
Опубликована: Май 28, 2024
Extended
Reality
(XR)
is
increasingly
gaining
momentum
in
industries
such
as
retail,
health,
and
education.
To
protect
users’
personal
data,
establishing
a
secure
authentication
system
for
XR
devices
becomes
essential.
Recently,
the
focus
on
methods
has
been
limited.
further
our
understanding
of
this
topic,
we
surveyed
schemes,
particularly
systems
deployed
settings.
In
survey,
focused
reviewing
evaluating
papers
published
during
last
decade
(between
2014
2023).
We
compared
knowledge-based
authentication,
physical
biometrics,
behavioral
multi-model
terms
accuracy,
security,
usability.
also
highlighted
benefits
drawbacks
those
methods.
These
highlights
will
direct
future
Human–computer
Interaction
(HCI)
security
research
to
develop
secure,
reliable,
practical
systems.
Consumer-grade
virtual
reality
head-mounted
displays
(VR-HMD)
are
becoming
increasingly
popular.
Despite
VR's
convenience
and
booming
applications,
VR-based
authentication
schemes
underdeveloped.
The
recently
proposed
methods
(Electrooculogram
based,
Electrical
Muscle
Stimulation-based,
alike)
require
active
user
involvement,
disturbing
many
scenarios
like
drone
flight
telemedicine.
This
paper
proposes
an
effective
efficient
method
in
VR
environments
resilient
to
impersonation
attacks
using
physiological
signals
—
Photoplethysmogram
(PPG),
namely
SigA.
SigA
exploits
the
advantage
that
PPG
is
a
signal
invisible
naked
eye.
Using
VR-HMDs
cover
eye
area
completely,
reduces
risk
of
leakage
during
acquisition.
We
conducted
comprehensive
analysis
SigA's
feasibility
on
five
publicly
available
datasets,
nine
different
pre-trained
models,
three
facial
regions,
various
lengths
video
clips
required
for
training,
four
time
intervals,
continuous
with
sliding
window
sizes.
results
demonstrate
achieves
more
than
95%
average
F1-score
one-second
accommodate
complete
cardiac
cycle
most
adults,
implying
its
applicability
real-world
scenarios.
Furthermore,
experiments
have
shown
resistant
zero-effort
attacks,
statistical
(with
detection
accuracy
over
95%)
session
hijacking
attacks.
IEEE Access,
Год журнала:
2024,
Номер
12, С. 49640 - 49652
Опубликована: Янв. 1, 2024
Combining
multi-key
fully
homomorphic
encryption
(MKFHE)
and
identity-based
(IBE)
to
construct
multi-identity
based
(MIBFHE)
scheme
can
not
only
realize
operations
flexible
access
control
on
identity
ciphertexts
but
also
reduce
the
burden
of
public
key
certification
management.
However,
MKFHE
schemes
used
MIBFHE
usually
have
complex
construction
large
computational
complexity,
which
causes
same
problem
for
schemes.
To
solve
this
problem,
we
a
concise
efficient
learning
with
errors
(LWE)
problem.
Firstly,
an
using
new
method
called
"the
decomposition
method".
Secondly,
make
appropriate
deformation
current
IBE
scheme.
Finally,
combine
above
our
prove
its
IND-sID-CPA
security
under
LWE
assumption
in
random
oracle
model.
The
analysis
results
show
that
generate
extended
ciphertext
directly
from
algorithm,
without
generating
fresh
advance.
In
addition,
noise
expansion
rate
is
reduced
polynomial
lattice
dimension
n
modulus
xmlns:xlink="http://www.w3.org/1999/xlink">q
constant
xmlns:xlink="http://www.w3.org/1999/xlink">K
maximum
number
users.
scale
introduced
auxiliary
Õ(
4
xmlns:xlink="http://www.w3.org/1999/xlink">L
)
xmlns:xlink="http://www.w3.org/1999/xlink">2
when
ciphertext.
IEEE Sensors Journal,
Год журнала:
2023,
Номер
23(21), С. 26786 - 26795
Опубликована: Сен. 20, 2023
Information
security
and
user
comfort
are
the
games
that
smartphone
manufacturers
have
always
had
to
face.
Explicit
authentication
(EA)
methods,
including
password,
fingerprint
recognition,
face
become
most
popular
ways
unlock
smartphones.
However,
these
methods
also
incur
some
troubles
in
users’
daily
lives
even
suffer
from
problems
like
shoulder
surfing
attacks
password
reuse
attacks.
Unlike
EA
implicit
(IA)
employ
user’s
behavior,
posture,
so
on
confirm
who
is.
The
“Smart
Lock
(SL),”
as
a
new
IA
introduced
by
biggest
system
manufacturer,
Google,
has
effectively
increased
while
ensuring
information
security.
we
found
SL
is
not
secure
enough,
where
anyone
wearing
smart
device
can
be
authenticated.
In
this
article,
based
“Trusted
Devices
(DEVICE)”
approach
SL,
design
band
with
sensors
commonly
wearables
two
models
improve
of
scenarios.
We
use
our
designed
collect
data
evaluate
models.
experimental
results
show
universal.
Our
model
for
power-constrained
devices
such
97.01%
accuracy
power
overhead
0.0195
mAh
per
time.
smartphones
an
99.67%
consumption
0.83
Therefore,
scheme
meet
different
requirements
IEEE Transactions on Services Computing,
Год журнала:
2023,
Номер
17(3), С. 1140 - 1153
Опубликована: Ноя. 8, 2023
Cloud
storage
provides
an
efficient
and
convenient
way
to
manage
data,
but
it
also
poses
significant
challenges
data
security.
The
central
issue
with
cloud
is
ensure
the
ability
of
owner
control
outsourced
data.
password-protected
secret
sharing
(PPSS)
integrates
password
authentication
offer
a
fresh
approach
secure
private
Users
can
share
risk
device
corruption
well-designed
PPSS
scheme
only
human-memorizable
passwords.
To
best
our
knowledge,
none
existing
schemes
resist
security
threats
in
post-quantum
era,
there
urgent
need
design
quantum-resistant
solutions.
However,
cryptography
varies
significantly
from
traditional
cryptography,
challenging
secret-sharing
for
storage.
In
this
work,
we
take
first
substantial
step
towards
challenge
by
proposing
QPause,
outsourcing
We
basic
based
on
lattice
against
semi-honest
adversaries
channel.
On
foundation,
propose
round-optimal
strong
adversaries.
addition,
formally
prove
that
robust
under
various
attacks
quantum
computing
capabilities.
comparison
results
show
new
outperforms
its
foremost
counterparts.