Skip to main content

Remote Biometrics for Robust Persistent Authentication

  • Conference paper
  • First Online:
Data Privacy Management and Autonomous Spontaneous Security (DPM 2013, SETOP 2013)

Abstract

This paper examines the problem of providing a robust non-invasive authentication service for mobile users in a smart environment. We base our work on the persistent authentication model (PAISE), which relies on available sensors to track principals from the location where they authenticate, e.g., through a smart card based access control system, to the location where the authentication is required by a location-based service. The PAISE model is extended with remote biometrics to prevent the decay of authentication confidence when authenticated users encounter and interact with other users in the environment. The result is a calm approach to authentication, where mobile users are transparently authenticated towards the system, which allows the provision of location-based services. The output of the remote biometrics are fused using error-rate-based fusion to solve a common problem that occurs in score level fusion, i.e., the scores of each biometric system are usually incompatible, as they have different score ranges as well as different probability distributions.

We have integrated remote biometrics with the PAISE prototype and the experimental results on a publicly available dataset, show that fusion of two remote biometric modalities, facial recognition and appearance analysis, gives a significant improvement over each of the individual experts. Furthermore, the experimental results show that using remote biometrics increases the performance of tracking in persistent authentication, by identifying principals who are difficult to track due to occlusions in crowded scenes.

Christian D. Jensen—The research leading to these results has received funding from the [European Union] [European Atomic Energy Community] Seventh Framework Programme ([FP7/2007-2013] [FP7/2007-2011]) under grant agreement n [242497].

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Viola, P., Jones, M.: Rapid object detection using a boosted cascade of simple features. In: Computer Vision and Pattern Recognition (2001)

    Google Scholar 

  2. Jones, M., Viola, P.: Robust real-time object detection. In: Workshop on Statistical and Computational Theories of Vision (2001)

    Google Scholar 

  3. Weiser, M., Brown, J.: Designing calm technology. PowerGrid J. 1, 1–5 (1996)

    Google Scholar 

  4. Weiser, M.: The computer for the 21st century. Scientific American 265(3), 66–75 (1991)

    Article  Google Scholar 

  5. Kirschmeyer, M., Hansen, M.S.: Persistent authentication in smart environments. IMM-THESIS: 2008–16, Technical University of Denmark (2008)

    Google Scholar 

  6. Ingwar, M.I., Jensen, C.D.: Towards secure intelligent buildings. In: Proceedings of the 5th Nordic Workshop on Dependability and Security (NODES’11) (2011)

    Google Scholar 

  7. Jensen, C.D., Geneser, K., Willemoes-Wissing, I.C.: Sensor enhanced access control: extending traditional access control models with context-awareness. In: Fernández-Gago, C., Martinelli, F., Pearson, S., Agudo, I. (eds.) IFIPTM 2013. IFIP AICT, vol. 401, pp. 177–192. Springer, Heidelberg (2013)

    Google Scholar 

  8. Cole, S.: More than Zero: accounting for error in latent fingerprint identification. J. Crim. Law Criminol. (1973-) 95(3), 985–1078 (2005)

    Google Scholar 

  9. Ingwar, M.I., Ahmed, N., Jensen, C.D.: Error-rate-based fusion of biometric experts. In: PST2013 International Conference on Privacy, Security and Trust (PST) (2013)

    Google Scholar 

  10. Fisher, R.: CAVIAR Test Case Scenarios (2004)

    Google Scholar 

  11. Bhattacharyya, D.: Biometric authentication: a review. Int. J. u-and e-Service 2(3), 13–28 (2009)

    Google Scholar 

  12. Turk, M., Pentland, A.: Eigenfaces for recognition. J. Cogn. Neurosci. 3(1), 71–86 (1991)

    Article  Google Scholar 

  13. Fisher, R.: The use of multiple measurements in taxonomic problems. Ann. Hum. Genet. 7(2), 179–188 (1936)

    Google Scholar 

  14. Belhumeur, P., Hespanha, J., Kriegman, D.: Eigenfaces vs. Fisherfaces: recognition using class specific linear projection. IEEE Trans. Pattern Anal. Mach. Intell. 19(7), 711–720 (1997)

    Article  Google Scholar 

  15. Adini, Y., Moses, Y., Ullman, S.: Face recognition: the problem of compensating for changes in illumination direction. Pattern Anal. Mach. Intell. 19(7), 721–732 (1997)

    Article  Google Scholar 

  16. Flickner, M., Sawhney, H., Niblack, W.: Query by image and video content: the QBIC system. Computer 28(9), 23–32 (1995)

    Article  Google Scholar 

  17. Kakumanu, P., Makrogiannis, S., Bourbakis, N.: A survey of skin-color modeling and detection methods. Pattern Recogn. 40(3), 1106–1122 (2007)

    Article  MATH  Google Scholar 

  18. O’Gorman, L.: Comparing passwords, tokens, and biometrics for user authentication. Proc. IEEE 91(12), 2021–2040 (2003)

    Article  Google Scholar 

  19. Stauffer, C., Grimson, W.: Adaptive background mixture models for real-time tracking. Comput. Vis. Pattern Recogn. 2, 246–252 (1999)

    Google Scholar 

  20. Stauffer, C., Grimson, W.: Learning patterns of activity using real-time tracking. IEEE Trans. Pattern Anal. Mach. Intell. 22(8), 747–757 (2000)

    Article  Google Scholar 

  21. Kalman, R.: A new approach to linear filtering and prediction problems. J. Basic Eng. 82, 35–45 (1960)

    Article  Google Scholar 

  22. Welch, G., Bishop, G.: An introduction to the Kalman filter. Technical report, University of North Carolina (1995)

    Google Scholar 

  23. Farneback, G.: Fast and accurate motion estimation using orientation tensors and parametric motion models. In: Proceedings of 15th International Conference on Pattern Recognition (2000)

    Google Scholar 

  24. Farneback, G.: Very high accuracy velocity estimation using orientation tensors, parametric motion, and simultaneous segmentation of the motion field. In: Proceedings of the Eighth International Conference on Computer Vision 2001, ICCV 2001 (2001)

    Google Scholar 

  25. Corner, M., Noble, B.: Zero-interaction authentication. In: Proceedings of the 8th Annual International Conference on Mobile Computing and Networking, pp. 1–11 (2002)

    Google Scholar 

  26. Noble, B.D., Corner, M.D.: The case for transient authentication. In: Proceedings of the 10th Workshop on ACM SIGOPS European Workshop: Beyond the PC - EW10 , p. 24 (2002)

    Google Scholar 

  27. Corner, M., Noble, B.: Protecting applications with transient authentication. In: International Conference on Mobile Systems, Applications, and Services (MobiSys) (2003)

    Google Scholar 

  28. Bardram, J.E., Kjær, R.E., Pedersen, M.Ø.: Context-aware user authentication - supporting proximity-based login in pervasive computing. In: Dey, A.K., Schmidt, A., McCarthy, J.F. (eds.) UbiComp 2003. LNCS, vol. 2864, pp. 107–123. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  29. Klosterman, A., Ganger, G.: Secure continuous biometric-enhanced authentication. Technical report, Parallel Data Laboratory (2000)

    Google Scholar 

  30. Altinok, A., Turk, M.: Temporal integration for continuous multimodal biometrics. In: Proceedings of the Workshop on Multimodal User Authentication (1) (2003)

    Google Scholar 

  31. Sim, T., Zhang, S.: Continuous verification using multimodal biometrics. Pattern Anal. Mach. Intell. 29(4), 562–570 (2007)

    Article  Google Scholar 

  32. Muncaster, J., Turk, M.: Continuous multimodal authentication using dynamic Bayesian networks. In: Proceedings of the 2nd Workshop of Multimodal User Authentication (2006)

    Google Scholar 

  33. Niinuma, K., Park, U., Jain, A.K.: Soft biometric traits for continuous user authentication. IEEE Trans. Inf. Forensics Secur. 5(4), 771–780 (2010)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mads I. Ingwar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ingwar, M.I., Jensen, C.D. (2014). Remote Biometrics for Robust Persistent Authentication. In: Garcia-Alfaro, J., Lioudakis, G., Cuppens-Boulahia, N., Foley, S., Fitzgerald, W. (eds) Data Privacy Management and Autonomous Spontaneous Security. DPM SETOP 2013 2013. Lecture Notes in Computer Science(), vol 8247. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-54568-9_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-54568-9_16

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-54567-2

  • Online ISBN: 978-3-642-54568-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics