Skip to main content

Security, Privacy, and Usability Challenges in Selfie Biometrics

  • Chapter
  • First Online:
Selfie Biometrics

Part of the book series: Advances in Computer Vision and Pattern Recognition ((ACVPR))

Abstract

From biometric image acquisition to matching to decision making, designing a selfie biometric system is riddled with security, privacy, and usability challenges. In this chapter, we provide a discussion of some of these challenges, examine some real-world examples, and discuss both existing solutions and potential new solutions. The majority of these issues will be discussed in the context of mobile devices, as they comprise a major platform for selfie biometrics; face, voice, and fingerprint biometric modalities are the most popular modalities used with mobile devices.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Apple Corporation (2018) IPhone 5s—technical specifications. Retrieved from https://support.apple.com/kb/sp685?locale=en_US. Cited 24 Sept 2018

  2. Chaos Computer Club (CCC) (2013) Chaos Computer Club breaks Apple TouchID. Retrieved from https://www.ccc.de/en/updates/2013/ccc-breaks-apple-touchid. Cited 15 Aug 2018

  3. Rogers M (2014) Why I hacked TouchID (again) and still think it’s awesome. Lookout Blog. Retrieved from https://blog.lookout.com/iphone-6-touchid-hack. Cited 2 July 2018

  4. Cao K, Jain AK (2016) Hacking mobile phones using 2D printed fingerprints. MSU technical report

    Google Scholar 

  5. Heisler Y (2017) Security researchers demo how “easy” it is to fool face ID with a 3D mask. BGR. Retrieved from https://bgr.com/2017/11/28/face-id-hack-3d-mask-iphone-x-security/. Cited 2 July 2018

  6. Matteson S (2017) IPhone’s face ID can be hacked, but here’s why nobody needs to panic. TechRepublic. Retrieved from https://www.techrepublic.com/article/iphones-face-id-can-be-hacked-but-heres-why-nobody-needs-to-panic/. Cited 2 July 2018

  7. Ratha NK, Connell JH, Bolle RM (2001) Enhancing security and privacy in biometrics-based authentication systems. IBM Systems Journal 40(3):614–634

    Article  Google Scholar 

  8. Apple Corporation (2018) IOS security. Retrieved from https://www.apple.com/business/site/docs/iOS_Security_Guide.pdf. Cited 2 Sept 2018

  9. Brandom R (2016) Your phone’s biggest vulnerability is your fingerprint. Retrieved from https://www.theverge.com/2016/5/2/11540962/iphone-samsung-fingerprint-duplicate-hack-security. Cited 4 June 2018

  10. McKane J (2018) We made fake fingerprints and hacked into a Nokia 5. MyBroadband. Retrieved from https://mybroadband.co.za/news/security/267331-we-made-fake-fingerprints-and-hacked-into-a-nokia-5.html. Cited 3 Aug 2018

  11. Smith C (2017) The iPhone X’s face ID has one real vulnerability: your kids. BGR. Retrieved from https://bgr.com/2017/11/14/iphone-x-face-id-hacked-children/. Cited 3 July 2018

  12. Smith C (2017) Face ID shown unlocking for family members who aren’t alike. BGR. Retrieved from https://bgr.com/2017/12/31/iphone-x-face-id-hack-family-members/. Cited 3 July 2018

  13. Williams-Grut O (2016) A researcher claims 2 bank apps can be hacked using iPhone’s “Live Photos.” Business Insider. Retrieved from https://www.businessinsider.com/bank-apps-facial-recognition-hacked-using-iphone-live-photos-2016-8. Cited 3 July 2018

  14. International Organization for Standardization (2016) Information technology—biometric presentation attack detection—part 1: framework. Retrieved from https://www.iso.org/standard/53227.html

  15. National Institute of Standards and Technology (2013) Standards for biometric technologies. Retrieved from https://www.nist.gov/speech-testimony/standards-biometric-technologies

  16. Galbally J, Marcel S, Fierrez J (2014) Image quality assessment for fake biometric detection: application to iris, fingerprint, and face recognition. IEEE Trans Image Process 23(2):710–724

    Article  MathSciNet  Google Scholar 

  17. Rattani A, Derakhshani R (2018) A survey of mobile face biometrics. Comput Electr Eng 72:39–52

    Article  Google Scholar 

  18. Amadeo R (2017) Galaxy S8 face recognition already defeated with a simple picture. Ars Technica. Retrieved from https://arstechnica.com/gadgets/2017/03/video-shows-galaxy-s8-face-recognition-can-be-defeated-with-a-picture/. Cited 3 July 2018

  19. Moren D (2015) Face recognition security, even with a “blink test,” is easy to trick. Popular Science. Retrieved from https://www.popsci.com/its-not-hard-trick-facial-recognition-security?utm_medium=twitter&utm_source=twitterfeed. Cited 3 July 2018

  20. de Freitas Pereira T, Anjos A, De Martino JM, Marcel S (2013) Can face anti spoofing countermeasures work in a real world scenario? Paper presented at the IEEE international conference on biometrics (ICB). Madrid, Spain

    Google Scholar 

  21. Pudil P, Novovičová J, Kittler J (1994) Floating search methods in feature selection. Pattern Recogn Lett 15(11):1119–1125

    Article  Google Scholar 

  22. Erdogmus N, Marcel S (2013) Spoofing 2D face recognition systems with 3D masks. Paper presented at the 2013 international conference of the biometrics special interest group (BIOSIG), Darmstadt, Germany

    Google Scholar 

  23. Ahonen T, Hadid A, Pietikainen M (2006) Face description with local binary patterns: application to face recognition. IEEE Trans Pattern Anal Mach Intell 28(12):2037–2041

    Article  Google Scholar 

  24. Li J, Wang Y, Tan T, Jain AK (2004) Live face detection based on the analysis of fourier spectra. Biomet Technol Hum Ident 5404:296–304

    Article  Google Scholar 

  25. Cardinal D (2017) How Apple’s iPhone X TrueDepth camera works. ExtremeTech. Retrieved from https://www.extremetech.com/mobile/255771-apple-iphone-x-truedepth-camera-works. Cited 14 Sept 2017

  26. Apple Corporation (2017) Face ID security. Retrieved from https://www.apple.com/business/site/docs/FaceID_Security_Guide.pdf

  27. InAuth (2017) Fingerprints: the most popular biometric. Retrieved from https://www.inauth.com/blog/fingerprints-popular-biometric/. Cited 2 July 2018

  28. Tess (2017) Realistic 3D printed finger could make smartphone fingerprint scanners harder to hack. 3drs.org. Retrieved from https://www.3ders.org/articles/20170925-realistic-3d-printed-finger-could-make-smartphone-fingerprint-scanners-harder-to-hack.html

  29. Marasco E, Ross A (2015) A survey on antispoofing schemes for fingerprint recognition systems. ACM Comput Surv (CSUR) 47(2):28

    Google Scholar 

  30. Bowden-Peters E, Phan RCW, Whitley JN, Parish DJ (2012) Fooling a liveness-detecting capacitive fingerprint scanner. Cryptography and security: from theory to applications. Springer, Berlin, pp 484–490

    Chapter  Google Scholar 

  31. Phone Arena (2018) Samsung Galaxy S9 vs Samsung Galaxy S5—Phone specs comparison. Retrieved from https://www.phonearena.com/phones/compare/Samsung-Galaxy-S9,Samsung-Galaxy-S5/phones/10717,8202. Cited 3 July 2018

  32. Fox-Brewster T (2018) Yes, cops are now opening iPhones with dead people’s fingerprints. Forbes. Retrieved from https://www.forbes.com/sites/thomasbrewster/2018/03/22/yes-cops-are-now-opening-iphones-with-dead-peoples-fingerprints/#3e50d3c7393e. Cited 3 July 2018

  33. Hardy E (2018) Cops will use Touch ID on your corpse to unlock your iPhone. Cult of Mac. Retrieved from https://www.cultofmac.com/536691/police-unlock-iphones-with-dead-fingers-touch-id/. Cited 4 July 2018

  34. Wehner M (2016) Why a disembodied finger can’t be used to unlock the touch ID sensor on the iPhone 5s. Engadget. Retrieved from https://www.engadget.com/2013/09/16/why-a-disembodied-finger-cant-be-used-to-unlock-the-touch-id-se/. Cited 4 July 2018

  35. Etherington D (2013). Watch a cat unlock the iPhone 5s using touch ID and the fingerprint sensor. Retrieved from https://techcrunch.com/2013/09/19/watch-a-cat-unlock-the-iphone-5s-using-touch-id-and-the-fingerprint-sensor/. Cited 4 July 2018

  36. Leopold T (2013) New iPhone 5S fingerprint sensor works for dogs. CNN. Retrieved from https://www.cnn.com/2013/09/20/tech/mobile/iphone-dog-paw-print-ireport/index.html. Cited 3 July 2018

  37. Kooser A (2016) See a hedgehog unlock an iPhone with its tiny paw. CNET. Retrieved from https://www.cnet.com/news/hedgehog-unlock-iphone-sashimi/. Cited 4 July 2018

  38. Qualcomm (2017) Qualcomm fingerprint sensors. Retrieved from https://www.qualcomm.com/solutions/mobile-computing/features/security/fingerprint-sensors. Cited 4 July 2018

  39. Qualcomm (2018) Qualcomm announces advanced fingerprint scanning and authentication technology. Retrieved from https://www.qualcomm.com/news/releases/2017/06/28/qualcomm-announces-advanced-fingerprint-scanning-and-authentication. Cited 4 July 2018

  40. Avila CS, Casanova JG, Ballesteros F, Garcia LRT, Gomez MFA, Sierra DS (2014) State of the art of mobile biometrics, liveness and non-coercion detection. Personalized Centralized Authentication System

    Google Scholar 

  41. Abhyankar A, Schuckers S (2006) Fingerprint liveness detection using local ridge frequencies and multiresolution texture analysis techniques. Paper presented at the IEEE international conference on image processing (ICIP). Atlanta, GA

    Google Scholar 

  42. Jiao J, Deng Z (2017) Deep combining of local phase quantization and histogram of oriented gradients for indoor positioning based on smartphone camera. Int J Distrib Sens Netw 13(1):1550147716686978

    Article  Google Scholar 

  43. Coli P, Marcialis G, Roli F (2007) Power spectrum-based fingerprint vitality detection. Paper presented at the IEEE international work on automatic identification advanced technologies (AutoID). Alghero, Italy

    Google Scholar 

  44. Six J, Cornelis O, Leman M (2014) TarsosDSP, a real-time audio processing framework in Java. Paper presented at the audio engineering society 53rd international conference: semantic audio. London, England

    Google Scholar 

  45. Ojala T, Pietikäinen M, Harwood D (1996) A comparative study of texture measures with classification based on featured distributions. Pattern Recogn 29(1):51–59

    Article  Google Scholar 

  46. Muhammad A (2015) OpenCV Android programming by example. Packt Publishing Ltd, Birmingham

    Google Scholar 

  47. Nikam SB, Agarwal S (2008) Texture and wavelet-based spoof fingerprint detection for fingerprint biometric systems. Paper presented at the 2018 first international conference on emerging trends in engineering and technology, Nagpur, Maharashtra, India

    Google Scholar 

  48. Jia X, Yang X, Cao K, Zang Y, Zhang N, Dai R, Tian J (2014) Multi-scale local binary pattern with filters for spoof fingerprint detection. Inf Sci 268:91–102

    Article  Google Scholar 

  49. Yambay D, Ghiani L, Denti P, Marcialis GL, Roli F, Schuckers S (2012) LivDet 2011—Fingerprint liveness detection competition 2011. Paper presented at the 2012 5th IAPR international conference on biometrics (ICB), New Delhi, India

    Google Scholar 

  50. Kumpituck S, Li D, Kunieda H, Isshiki T (2017) Fingerprint spoof detection using wavelet based local binary pattern. Paper presented at the 8th international conference on graphic and image processing (ICGIP 2016). Bellingham, WA

    Google Scholar 

  51. Kumar L, Sharma K (2013) Web based novel technique for watermarking colour images on Android mobile phones. Int J Adv Res Comput Sci Softw Eng 3(7)

    Google Scholar 

  52. Gragnaniello D, Poggi G, Sansone C, Verdoliva L (2013) Fingerprint liveness detection based on weber local image descriptor. Paper presented at the 2013 IEEE workshop on biometric measurements and systems for security and medical applications (BIOMS). Naples, Italy

    Google Scholar 

  53. Kannala J, Rahtu E (2012) Bsif: binarized statistical image features. Paper presented at the 2012 21st international conference on pattern recognition (ICPR). Tsukuba, Japan

    Google Scholar 

  54. Superpowered (n.d.) IOS and Android FFT & iOS and Android Polar FFT. Retrieved from https://superpowered.com/fft-and-polar-fft. Cited 4 July 2018

  55. Manivanan N, Memon S, Balachandran W (2010) Automatic detection of active sweat pores of fingerprint using highpass and correlation filtering. Electron Lett 46(18):1268–1269

    Article  Google Scholar 

  56. Manivanan N, Memon S, Balachandran W (2010) Security breaks a sweat. Electron Lett 46(18):1241–1242

    Article  Google Scholar 

  57. Espinoza M, Champod C (2011) Using the number of pores on fingerprint images to detect spoofing attacks. Paper presented at the 2011 international conference on hand-based biometrics (ICHB), Hong Kong, China

    Google Scholar 

  58. Marcialis GL, Roli F, Tidu A (2010) Analysis of fingerprint pores for vitality detection. Paper presented at the 2010 20th international conference on pattern recognition (ICPR). Istanbul, Turkey

    Google Scholar 

  59. Memon SA (2012) Novel active sweat pores based liveness detection techniques for fingerprint biometrics. Doctoral dissertation. Brunel University School of Engineering and Design Ph.D. theses

    Google Scholar 

  60. Memon S, Manivannan N, Balachandran W (2011) Active pore detection for liveness in fingerprint identification system. Paper presented at the 2011 19th telecommunications forum (TELFOR), Belgrade, Serbia

    Google Scholar 

  61. Rattani A, Scheirer WJ, Ross A (2015) Open set fingerprint spoof detection across novel fabrication materials. IEEE Trans Inf Forensics Secur 10(11):2447–2460

    Article  Google Scholar 

  62. Rattani A, Ross A (2014) Automatic adaptation of fingerprint liveness detector to new spoof materials. Paper presented at the IEEE international joint conference on biometrics. Clearwater, FL

    Google Scholar 

  63. Rattani A, Ross A (2014a) Minimizing the impact of spoof fabrication material on fingerprint liveness detector. Paper presented at the 2014 IEEE international conference on image processing (ICIP). Paris, France

    Google Scholar 

  64. Bhide B (2013) Low-pass-filter-to-Android-sensors. Retrieved from https://github.com/Bhide/Low-Pass-Filter-To-Android-Sensors. Cited 4 July 2018

  65. W3C Working Group (2017) Motion sensors explainer. Retrieved from https://www.w3.org/TR/motion-sensors/#low-pass-filters. Cited 4 July 2018

  66. Alzantot M, Wang Y, Ren Z, Srivastava MB (2017) RSTensorFlow: GPU enabled TensorFlow for deep learning on commodity android devices. Paper presented at the 1st international workshop on deep learning for mobile systems and applications. Niagara Falls, NY

    Google Scholar 

  67. Google Corporation (n.d.) Change “Ok Google” settings. Retrieved from https://support.google.com/assistant/answer/7394306?hl=en. Cited 4 July 2018

  68. Young PJ, Jin JH, Woo S, Lee DH (2016) BadVoice: soundless voice-control replay attack on modern smartphones. Paper presented at the 2016 eighth international conference on ubiquitous and future networks (ICUFN). Vienna, Austria

    Google Scholar 

  69. Richardson M, Wallace S (2012) Getting started with raspberry PI. O’Reilly Media Inc., Sebastopol

    Google Scholar 

  70. Wu Z, Evans N, Kinnunen T, Yamagishi J, Alegre F, Li H (2015) Spoofing and countermeasures for speaker verification: a survey. Speech Commun 66:130–153

    Article  Google Scholar 

  71. Pew Research Center (2018) Demographics of mobile device ownership and adoption in the United States. Retrieved from http://www.pewinternet.org/fact-sheet/mobile/. Cited 3 July 2018

  72. Shang W, Stevenson M (2010) Score normalization in playback attack detection. Paper presented at the IEEE international conference on acoustics, speech, and signal processing (ICASSP). Dallas, TX

    Google Scholar 

  73. Villalba J, Lleida E (2011) Detecting replay attacks from far-field recordings on speaker verification systems. European workshop on biometrics and identity management. Springer, Berlin, pp 274–285

    Chapter  Google Scholar 

  74. Wang ZF, Wei G, He QH (2011) Channel pattern noise based playback attack detection algorithm for speaker recognition. Paper presented at the 2011 international conference on machine learning and cybernetics (ICMLC). Guilin, China

    Google Scholar 

  75. Rossi M, Feese S, Amft O, Braune N, Martis S, Tröster G (2013) AmbientSense: a real-time ambient sound recognition system for smartphones. Paper presented at the 2013 IEEE international conference on pervasive computing and communications workshops (PERCOM Workshops). San Diego, CA

    Google Scholar 

  76. Chen LW, Guo W, Dai LR (2010) Speaker verification against synthetic speech. Paper presented at the 7th international symposium on Chinese spoken language processing (ISCSLP). Tainan, Taiwan

    Google Scholar 

  77. Wu Z, Chng ES, Li H (2012) Detecting converted speech and natural speech for anti-spoofing attack in speaker recognition. Interspeech

    Google Scholar 

  78. Wu Z, Kinnunen T, Chng ES, Li H, Ambikairajah E (2012) A study on spoofing attack in state-of-the-art speaker verification: the telephone speech case. Paper presented at the 2012 Asia-Pacific signal information processing association annual summit and conference (APSIPA ASC). Hollywood, CA

    Google Scholar 

  79. Alegre F, Amehraye A, Evans N (2013) A one-class classification approach to generalised speaker verification spoofing countermeasures using local binary patterns. Paper presented at the international conference on biometrics: theory, applications and systems (BTAS). Alrington, VA

    Google Scholar 

  80. Alegre F, Amehraye A, & Evans N (2013) Spoofing countermeasures to protect automatic speaker verification from voice conversion. Paper presented at the IEEE international conference on acoustics, speech, and signal processing (ICASSP). Vancouver, BC

    Google Scholar 

  81. Matrouf D, Bonastre JF, Fredouille C (2006) Effect of speech transformation on impostor acceptance. Paper presented at the 2006 IEEE international conference on acoustics, speech, and signal processing (ICASSP). Toulouse, France

    Google Scholar 

  82. Gofman M, Sandico N, Mitra S, Suo E, Muhi S, Vu T (2018) Multimodal biometrics via discriminant correlation analysis on mobile devices. Paper presented at the 2018 international conference on security and management. Las Vegas, NV

    Google Scholar 

  83. Chen S, Ren K, Piao S, Wang C, Wang Q, Weng J, Su L, Mohaisen A (2017) You can hear but you cannot steal: defending against voice impersonation attacks on smartphones. Paper presented at the 2017 IEEE 37th international conference on distributed computing systems (ICDCS). Atlanta, GA

    Google Scholar 

  84. Khoury E, El Shafey L, Marcel S (2014) Spear: an open source toolbox for speaker recognition based on Bob. Paper presented at the 2014 IEEE international conference on acoustics, speech and signal processing (ICASSP). Florence, Italy

    Google Scholar 

  85. Kominek J, Black AW (2004) The CMU arctic speech databases. Paper presented at the 5th ISCA workshop on speech synthesis. Pittsburgh, PA

    Google Scholar 

  86. Feng H, Fawaz K, Shin KG (2017) Continuous authentication for voice assistants. Paper presented at the 23rd annual international conference on mobile computing and networking. Snowbird, UT

    Google Scholar 

  87. Zhang L, Tan S, Yang J (2017) Hearing your voice is not enough: an articulatory gesture based liveness detection for voice authentication. Paper presented at the 2017 ACM SIGSAC conference on computer and communications security. Dallas, TX

    Google Scholar 

  88. Zhang L, Tan S, Yang J, Chen Y (2016) Voicelive: a phoneme localization based liveness detection for voice authentication on smartphones. Paper presented at the 2016 ACM SIGSAC conference on computer and communications security. Vienna, Austria

    Google Scholar 

  89. Rodrigues RN, Ling LL, Govindaraju V (2009) Robustness of multimodal biometric fusion methods against spoof attacks. J Vis Lang Comput 20(3):169–179

    Article  Google Scholar 

  90. Gofman MI, Mitra S, Smith N (2016) Hidden Markov models for feature-level fusion of biometrics on mobile devices. Paper presented at the 2016 IEEE/ACS 13th international conference of computer systems and applications (AICCSA). Agadir, Morocco

    Google Scholar 

  91. Gofman MI, Mitra S, Cheng THK, Smith NT (2016) Multimodal biometrics for enhanced mobile device security. Commun ACM 59(4):58–65

    Article  Google Scholar 

  92. Katona M et al (2005) FPGA design and implementation of a wavelet-domain video denoising system. Lect Notes Comput Sci 3708:650–657

    Article  Google Scholar 

  93. Maltoni D, Maio D, Jain AK, Prabhakar S (2009) Handbook of fingerprint recognition, 2nd edn. Springer, New York City

    Book  Google Scholar 

  94. Teoh ABJ, Goh A, Ngo DCL (2006) Random multispace quantization as an analytic mechanism for BioHashing of biometric and random identity inputs. IEEE Trans Pattern Anal Mach Intell 28(12):1892–1901

    Article  Google Scholar 

  95. Arjona R, Baturone I (2015) A fingerprint biometric cryptosystem in FPGA. Paper presented at the 2015 IEEE international conference on industrial technology (ICIT). Seville, Spain

    Google Scholar 

  96. Imamverdiyev Y, Teoh ABJ, Kim J (2013) Biometric cryptosystem based on discretized fingerprint texture descriptors. Expert Syst Appl 40(5):1888–1901

    Article  Google Scholar 

  97. Pepicq B (2017) Why do some people refuse to use Google Assistant? AndroidPIT. Retrieved from https://www.androidpit.com/why-not-use-google-assistant. Cited 3 June 2018

  98. Mohsin MA (2017) An FPGA-based hardware accelerator for k-nearest neighbor classification for machine learning. Master thesis. University of Colorado Springs

    Google Scholar 

  99. Paul R (2011) Unwrapping a new ice cream sandwich: Android 4.0 reviewed. Ars Technica. Retrieved from https://arstechnica.com/gadgets/2011/12/unwrapping-a-new-ice-cream-sandwich-android-40-reviewed-1/. Cited 20 June 2018

  100. Apple (2018) Using touch ID on the iPhone. Retrieved from http://support.apple.com/kb/ht5883. Cited 20 June 2018

  101. Chamary JV (2017) No, Apple’s face ID is not a “secure Password”. Forbes. Retrieved from https://www.forbes.com/sites/jvchamary/2017/09/18/security-apple-face-id-iphone-x/#99580fc4c835. Cited 28 June 2018

  102. Bhagavatula C, Ur B, Iacovino K, Kywe SM, Cranor LF, Savvides M (2015) Biometric authentication on iPhone and Android: usability, perceptions, and influences on adoption. Paper presented at the usable security (USEC). Workshop. San Diego, CA

    Google Scholar 

  103. Clarke NL, Furnell SM (2006) Authenticating mobile phone users using keystroke analysis. Int J Inf Secur 6(1):1–14

    Article  Google Scholar 

  104. Trewin S, Swart C, Koved L, Martino J, Singh K, Ben-David S (2012) Biometric authentication on a mobile device: a study of user effort, error and task disruption. Paper presented at the 28th annual computer security applications conference (ACSAC). Orlando, FL

    Google Scholar 

  105. Braz C, Robert J-M (2006) Security and usability: the case of the user authentication methods. Paper presented at the 18th International conference of the association francophone d’Interaction Homme-Machine. Montreal, Quebec

    Google Scholar 

  106. Egelman S, Jain S, Portnoff RS, Liao K, Consolvo S, Wagner D (2014) Are you ready to lock? Paper presented at the ACM SIGSAC conference on computer & communications security. Scottsdale, AZ

    Google Scholar 

  107. Harbach M, von Zezschwitz E, Fichtner A, De Luca A, Smith M (2014) It’s a hard lock life: A field study of smartphone (un)locking behavior and risk perception. Paper presented at the symposium on usable privacy and security. Menlo Park, CA

    Google Scholar 

  108. Sathiah S (2017) Face ID on the iPhone X is a backwards step in usability. Notebookcheck. Retrieved from https://www.notebookcheck.net/Face-ID-on-the-iPhone-X-is-a-backwards-step-in-usability.264306.0.html. Cited 28 June 2018

  109. Burgbacher U, Hinrichs K (2014) An implicit author verification system for text messages based on gesture typing biometrics. Paper presented at the ACM CHI conference on human factors in computing systems. Toronto, Canada

    Google Scholar 

  110. Crawford H (2010) Keystroke dynamics: characteristics and opportunities. In: 8th international conference on privacy, security and trust. Ottawa, CA

    Google Scholar 

  111. Campisi P, Maiorana E, Lo Bosco M, Neri A (2009) User authentication using keystroke dynamics for cellular phones. IET Sig Process 3(5):333–341

    Article  Google Scholar 

  112. Nauman M, Ali T, Rauf A (2013) Using trusted computing for privacy preserving keystroke-based authentication in smartphones. Telecommun Syst 52:2149–2161

    Article  Google Scholar 

  113. Saevanee H, Bhattarakosol P (2009) Authenticating user using keystroke dynamics and finger pressure. Paper presented at the 6th IEEE consumer communications and networking conference. Las Vegas, NV

    Google Scholar 

  114. Buschek D, De Luca A, Alt F (2015) Improving accuracy, applicability, and usability of keystroke biometrics on mobile touchscreen devices. Paper presented at the ACM CHI 2015 conference, crossings. Seoul, Korea

    Google Scholar 

Download references

Acknowledgements

We would like to thank the students in our research laboratory for their assistance in developing and implementing the approaches discussed in this chapter—specifically, Narciso Sandico, Sadun Muhi, and Eryu Suo. We would additionally like to thank Maria Villa and Bryan Villa for their illustrative work in Fig. 16.5.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mikhail Gofman .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Gofman, M., Mitra, S., Bai, Y., Choi, Y. (2019). Security, Privacy, and Usability Challenges in Selfie Biometrics. In: Rattani, A., Derakhshani, R., Ross, A. (eds) Selfie Biometrics. Advances in Computer Vision and Pattern Recognition. Springer, Cham. https://doi.org/10.1007/978-3-030-26972-2_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-26972-2_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-26971-5

  • Online ISBN: 978-3-030-26972-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics