Behaviors Speak More: Achieving User Authentication Leveraging Facial Activities via mmWave Sensing DOI Creative Commons
Chenxu Jiang, Sihan Yu, Jingjing Fu

и другие.

Опубликована: Ноя. 4, 2024

Human faces have been widely adopted in many applications and systems requiring a high-security standard. Although face authentication is deemed to be mature nowadays, existing works demonstrated not only the privacy leakage of facial information but also success spoofing attacks on biometrics. The critical reason behind this failure liveness detection This work advances most biometric-based user schemes by exploring dynamic biometrics (human activities) rather than traditional static faces). Inspired observations from psychology, we propose mmFaceID leverage humans' activities when performing word reading for achieving robust, highly accurate, effective via mmWave sensing. By addressing series technical challenges capturing micro-level muscle movements using sensor, build neural network reconstruct estimated expression parameters. Then, unique features can extracted enable robust regardless relative distances orientations. We conduct comprehensive experiments 23 participants evaluate terms distances/orientations, length lists, occlusion, language backgrounds, demonstrating an accuracy 94.7%. extend our evaluation real IoT scenario. speaking commends, average reach up 92.28%.

Язык: Английский

Two-Factor Authentication for Keyless Entry System via Finger-Induced Vibrations DOI
Hongbo Jiang, Panyi Ji,

Taiyuan Zhang

и другие.

IEEE Transactions on Mobile Computing, Год журнала: 2024, Номер 23(10), С. 9708 - 9720

Опубликована: Фев. 22, 2024

Язык: Английский

Процитировано

13

CoordAuth: Hands-Free Two-Factor Authentication in Virtual Reality Leveraging Head-Eye Coordination DOI

Sheng Zhao,

Jun Zhu, Shuning Zhang

и другие.

Опубликована: Март 8, 2025

Язык: Английский

Процитировано

0

Exploring Natural Interactions for Implicit User Authentication in VR DOI

Woojin Jeon,

Chaejin Lim, Hyoungshick Kim

и другие.

Опубликована: Апрель 23, 2025

Язык: Английский

Процитировано

0

Metaverse CAN: Embracing Continuous, Active, and Non-Intrusive Biometric Authentication DOI
Hui Zhong, Chenpei Huang, Xinyue Zhang

и другие.

IEEE Network, Год журнала: 2023, Номер 37(6), С. 67 - 73

Опубликована: Окт. 3, 2023

The Metaverse is a virtual world, an immersive experience, new human-computer interaction, built upon various advanced technologies. How to protect personal information and properties also facing challenges, such as attacks expectations of user experiences. While traditional methods (e.g., those employed in smartphone authentication) generally pass the basic design considerations, they are repeatedly reported be either unsafe or inconvenient Metaverse. In this paper, we address discrepancy by introducing CAN: consideration especially for Specifically, focus on legacy novel biometric authentication systems evaluate them thoroughly with CAN considerations. We propose ear-based method one example systems. To conclude, continuous, active non-intrusive system suggested its capability continuous sessions, against imposters, experience.

Язык: Английский

Процитировано

7

Recent Trends of Authentication Methods in Extended Reality: A Survey DOI Creative Commons

Louisa Hallal,

Jason Rhinelander,

Ramesh Venkat

и другие.

Applied System Innovation, Год журнала: 2024, Номер 7(3), С. 45 - 45

Опубликована: Май 28, 2024

Extended Reality (XR) is increasingly gaining momentum in industries such as retail, health, and education. To protect users’ personal data, establishing a secure authentication system for XR devices becomes essential. Recently, the focus on methods has been limited. further our understanding of this topic, we surveyed schemes, particularly systems deployed settings. In survey, focused reviewing evaluating papers published during last decade (between 2014 2023). We compared knowledge-based authentication, physical biometrics, behavioral multi-model terms accuracy, security, usability. also highlighted benefits drawbacks those methods. These highlights will direct future Human–computer Interaction (HCI) security research to develop secure, reliable, practical systems.

Язык: Английский

Процитировано

2

SigA: rPPG-based Authentication for Virtual Reality Head-mounted Display DOI
Lin Li, Chao Chen, Lei Pan

и другие.

Опубликована: Окт. 3, 2023

Consumer-grade virtual reality head-mounted displays (VR-HMD) are becoming increasingly popular. Despite VR's convenience and booming applications, VR-based authentication schemes underdeveloped. The recently proposed methods (Electrooculogram based, Electrical Muscle Stimulation-based, alike) require active user involvement, disturbing many scenarios like drone flight telemedicine. This paper proposes an effective efficient method in VR environments resilient to impersonation attacks using physiological signals — Photoplethysmogram (PPG), namely SigA. SigA exploits the advantage that PPG is a signal invisible naked eye. Using VR-HMDs cover eye area completely, reduces risk of leakage during acquisition. We conducted comprehensive analysis SigA's feasibility on five publicly available datasets, nine different pre-trained models, three facial regions, various lengths video clips required for training, four time intervals, continuous with sliding window sizes. results demonstrate achieves more than 95% average F1-score one-second accommodate complete cardiac cycle most adults, implying its applicability real-world scenarios. Furthermore, experiments have shown resistant zero-effort attacks, statistical (with detection accuracy over 95%) session hijacking attacks.

Язык: Английский

Процитировано

4

Concise and Efficient Multi-Identity Fully Homomorphic Encryption Scheme DOI Creative Commons
Guangsheng Tu, Wenchao Liu, Tanping Zhou

и другие.

IEEE Access, Год журнала: 2024, Номер 12, С. 49640 - 49652

Опубликована: Янв. 1, 2024

Combining multi-key fully homomorphic encryption (MKFHE) and identity-based (IBE) to construct multi-identity based (MIBFHE) scheme can not only realize operations flexible access control on identity ciphertexts but also reduce the burden of public key certification management. However, MKFHE schemes used MIBFHE usually have complex construction large computational complexity, which causes same problem for schemes. To solve this problem, we a concise efficient learning with errors (LWE) problem. Firstly, an using new method called "the decomposition method". Secondly, make appropriate deformation current IBE scheme. Finally, combine above our prove its IND-sID-CPA security under LWE assumption in random oracle model. The analysis results show that generate extended ciphertext directly from algorithm, without generating fresh advance. In addition, noise expansion rate is reduced polynomial lattice dimension n modulus xmlns:xlink="http://www.w3.org/1999/xlink">q constant xmlns:xlink="http://www.w3.org/1999/xlink">K maximum number users. scale introduced auxiliary Õ( 4 xmlns:xlink="http://www.w3.org/1999/xlink">L ) xmlns:xlink="http://www.w3.org/1999/xlink">2 when ciphertext.

Язык: Английский

Процитировано

1

The Catcher in the Eye: Recognizing Users by their Blinks DOI
Ryo Iijima, Tatsuya Takehisa, Tetsushi Ohki

и другие.

Опубликована: Июнь 28, 2024

Язык: Английский

Процитировано

1

Shake, Shake, I Know Who You Are: Authentication Through Smart Wearable Devices DOI
Zhenyang Guo, Jin Cao,

Xiaomeng Bai

и другие.

IEEE Sensors Journal, Год журнала: 2023, Номер 23(21), С. 26786 - 26795

Опубликована: Сен. 20, 2023

Information security and user comfort are the games that smartphone manufacturers have always had to face. Explicit authentication (EA) methods, including password, fingerprint recognition, face become most popular ways unlock smartphones. However, these methods also incur some troubles in users’ daily lives even suffer from problems like shoulder surfing attacks password reuse attacks. Unlike EA implicit (IA) employ user’s behavior, posture, so on confirm who is. The “Smart Lock (SL),” as a new IA introduced by biggest system manufacturer, Google, has effectively increased while ensuring information security. we found SL is not secure enough, where anyone wearing smart device can be authenticated. In this article, based “Trusted Devices (DEVICE)” approach SL, design band with sensors commonly wearables two models improve of scenarios. We use our designed collect data evaluate models. experimental results show universal. Our model for power-constrained devices such 97.01% accuracy power overhead 0.0195 mAh per time. smartphones an 99.67% consumption 0.83 Therefore, scheme meet different requirements

Язык: Английский

Процитировано

3

QPause: Quantum-Resistant Password-Protected Data Outsourcing for Cloud Storage DOI
Jingwei Jiang, Ding Wang, Guoyin Zhang

и другие.

IEEE Transactions on Services Computing, Год журнала: 2023, Номер 17(3), С. 1140 - 1153

Опубликована: Ноя. 8, 2023

Cloud storage provides an efficient and convenient way to manage data, but it also poses significant challenges data security. The central issue with cloud is ensure the ability of owner control outsourced data. password-protected secret sharing (PPSS) integrates password authentication offer a fresh approach secure private Users can share risk device corruption well-designed PPSS scheme only human-memorizable passwords. To best our knowledge, none existing schemes resist security threats in post-quantum era, there urgent need design quantum-resistant solutions. However, cryptography varies significantly from traditional cryptography, challenging secret-sharing for storage. In this work, we take first substantial step towards challenge by proposing QPause, outsourcing We basic based on lattice against semi-honest adversaries channel. On foundation, propose round-optimal strong adversaries. addition, formally prove that robust under various attacks quantum computing capabilities. comparison results show new outperforms its foremost counterparts.

Язык: Английский

Процитировано

3