Abstract
This article proposes to include an in-air signature biometric technique in mobile e-commerce applications in order to increase the security of passwords and authenticate users directly from their mobile phones. Five architectures have been proposed to implement this technique as a complement of current authentication methods. Moreover, the opinion of end users has been considered assessed by a survey of 24 people. From the results of this survey it has been deducted that this authentication method seems useful, necessary and comfortable to complement the password authentication methods and increase the global security of e-commerce applications.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Chirillo, J., Blaul, S.: Implementing Biometric Security, 1st edn. Hungry Minds (2003) (incorporated)
Jain, A.K., Flynn, P., Ross, A.A.: Handbook of Biometrics. Springer-Verlag New York, Inc., Secaucus (2007)
ho Cho, D., Park, K.R., Rhee, D.W., Kim, Y., Yang, J.: Pupil and iris localization for iris recognition in mobile phones. In: International Workshop on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, International Conference on & Self-Assembling Wireless Networks, pp. 197–201 (2006)
Jeong, D., Park, H.A., Park, K., Kim, J.: Iris recognition in mobile phone based on adaptive gabor filter. In: Zhang, D., Jain, A.K. (eds.) ICB 2005. LNCS, vol. 3832, pp. 457–463. Springer, Heidelberg (2005)
Kurkovsky, S., Carpenter, T., MacDonald, C.: Experiments with simple iris recognition for mobile phones. In: Third International Conference on Information Technology: New Generations, pp. 1293–1294 (2010)
Jeong, D.S., Park, H.A., Park, K.R., Kim, J.: Iris recognition in mobile phone based on adaptive gabor filter. In: Proceedings of the Advances in Biometrics, International Conference, ICB 2006, Hong Kong, China, January 5-7, pp. 457–463 (2006)
Tao, Q., Veldhuis, R.: Biometric authentication for a mobile personal device. In: Annual International Conference on Mobile and Ubiquitous Systems, pp. 1–3 (2006)
yi Han, S., Park, H.A., Cho, D.H., Park, K.R., Lee, S.: Face recognition based on near-infrared light using mobile phone. In: Beliczynski, B., Dzielinski, A., Iwanowski, M., Ribeiro, B. (eds.) ICANNGA 2007. LNCS, vol. 4432, pp. 440–448. Springer, Heidelberg (2007)
Ijiri, Y., Sakuragi, M., Lao, S.: Security management for mobile devices by face recognition. In: 7th International Conference on Mobile Data Management, MDM 2006, pp. 49–49 (May 2006)
Shabeer, H.A., Suganthi, P.: Mobile phones security using biometrics. In: International Conference on Computational Intelligence and Multimedia Applications, vol. 4, pp. 270–274 (2007)
Lapère, M., Johnson, E.: User authentication in mobile telecommunication environments using voice biometrics and smartcards. In: Besson, M., Gobbi, R., Reed, R., Campolargo, M., Mullery, A. (eds.) IS&N 1997. LNCS, vol. 1238, pp. 437–443. Springer, Heidelberg (1997)
Mantyjarvi, J., Lindholm, M., Vildjiounaite, E., Makela, S.M., Ailisto, H.A.: Identifying users of portable devices from gait pattern with accelerometers. In: Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2005), vol. 2, pp. ii/973–ii/976 (2005)
Iso, T., Yamazaki, K.: Gait analyzer based on a cell phone with a single three-axis accelerometer. In: MobileHCI 2006: Proceedings of the 8th Conference on Human-computer Interaction with Mobile Devices and Services, pp. 141–144. ACM, New York (2006)
Clarke, N., Furnell, S.: Authenticating mobile phone users using keystroke analysis. International Journal of Information Security 6, 1–14 (2007)
Saevanee, H., Bhatarakosol, P.: User authentication using combination of behavioral biometrics over the touchpad acting like touch screen of mobile device. In: International Conference on Computer and Electrical Engineering, pp. 82–86 (2008)
Guerra-Casanova, J., Sánchez-Ávila, C., de Santos-Sierra, A., del Pozo, G.B., Jara-Vera, V.: A real-time in-air signature biometric technique using a mobile device embedding an accelerometer. In: Zavoral, F., Yaghob, J., Pichappan, P., El-Qawasmeh, E. (eds.) NDT (1). CCIS, vol. 87, pp. 497–503. Springer, Heidelberg (2010)
Karnan, M., Krishnaraj, N.: Bio password keystroke dynamic approach to secure mobile devices. In: 2010 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), pp. 1–4, ID: 1 (2010)
Xing, S., Xue, H., Yan, X.: Research on model of biometric identification emergency response in electronic commerce. In: International Conference on Management of e-Commerce and e-Government, ICMECG 2008, pp. 185–188, ID: 1 (2008)
Lu, H., Claret-Tournier, F., Chatwin, C., Young, R.C.D.: M-commerce secured using web-enabled mobile biometric agents. In: 2007 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology Workshops, pp. 480–483, ID: 1 (2007)
Wang, J., Yuan, S.: A novel security mobile payment system based on watermarked voice cheque. In: 2005 2nd International Conference on Mobile Technology, Applications and Systems, p. 4, ID: 1 (2005)
Vangala, R.R., Sasi, S.: Biometric authentication for e-commerce transaction. In: 2004 IEEE International Workshop on Imaging Systems and Techniques (IST), pp. 113–116, ID: 1 (2004)
Rahimi, A., Mohammadi, S., Rahimi, R.: An efficient iris authentication using chaos theory-based cryptography for e-commerce transactions. In: International Conference for Internet Technology and Secured Transactions, ICITST 2009, pp. 1–6, ID: 1 (2009)
Dowling, S., Nancy Paxton, J.H.: Apple reports first quarter results (2009)
Guo, J., Doermann, D., Rosenfeld, A.: Local correspondence for detecting random forgeries. In: International Conference on Document Analysis and Recognition, p. 319 (1997)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Guerra-Casanova, J., Sánchez-Ávila, C., Jara-Vera, V., de-Santos-Sierra, A., Bailador, G. (2011). Architectures to Implement In-Air Signature Mobile Authentication to Increase the Security of E-Commerce Applications and Opinion of End Users. In: Ariwa, E., El-Qawasmeh, E. (eds) Digital Enterprise and Information Systems. DEIS 2011. Communications in Computer and Information Science, vol 194. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22603-8_42
Download citation
DOI: https://doi.org/10.1007/978-3-642-22603-8_42
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22602-1
Online ISBN: 978-3-642-22603-8
eBook Packages: Computer ScienceComputer Science (R0)