Abstract
This paper examines the problem of providing a robust non-invasive authentication service for mobile users in a smart environment. We base our work on the persistent authentication model (PAISE), which relies on available sensors to track principals from the location where they authenticate, e.g., through a smart card based access control system, to the location where the authentication is required by a location-based service. The PAISE model is extended with remote biometrics to prevent the decay of authentication confidence when authenticated users encounter and interact with other users in the environment. The result is a calm approach to authentication, where mobile users are transparently authenticated towards the system, which allows the provision of location-based services. The output of the remote biometrics are fused using error-rate-based fusion to solve a common problem that occurs in score level fusion, i.e., the scores of each biometric system are usually incompatible, as they have different score ranges as well as different probability distributions.
We have integrated remote biometrics with the PAISE prototype and the experimental results on a publicly available dataset, show that fusion of two remote biometric modalities, facial recognition and appearance analysis, gives a significant improvement over each of the individual experts. Furthermore, the experimental results show that using remote biometrics increases the performance of tracking in persistent authentication, by identifying principals who are difficult to track due to occlusions in crowded scenes.
Christian D. Jensen—The research leading to these results has received funding from the [European Union] [European Atomic Energy Community] Seventh Framework Programme ([FP7/2007-2013] [FP7/2007-2011]) under grant agreement n [242497].
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Viola, P., Jones, M.: Rapid object detection using a boosted cascade of simple features. In: Computer Vision and Pattern Recognition (2001)
Jones, M., Viola, P.: Robust real-time object detection. In: Workshop on Statistical and Computational Theories of Vision (2001)
Weiser, M., Brown, J.: Designing calm technology. PowerGrid J. 1, 1–5 (1996)
Weiser, M.: The computer for the 21st century. Scientific American 265(3), 66–75 (1991)
Kirschmeyer, M., Hansen, M.S.: Persistent authentication in smart environments. IMM-THESIS: 2008–16, Technical University of Denmark (2008)
Ingwar, M.I., Jensen, C.D.: Towards secure intelligent buildings. In: Proceedings of the 5th Nordic Workshop on Dependability and Security (NODES’11) (2011)
Jensen, C.D., Geneser, K., Willemoes-Wissing, I.C.: Sensor enhanced access control: extending traditional access control models with context-awareness. In: Fernández-Gago, C., Martinelli, F., Pearson, S., Agudo, I. (eds.) IFIPTM 2013. IFIP AICT, vol. 401, pp. 177–192. Springer, Heidelberg (2013)
Cole, S.: More than Zero: accounting for error in latent fingerprint identification. J. Crim. Law Criminol. (1973-) 95(3), 985–1078 (2005)
Ingwar, M.I., Ahmed, N., Jensen, C.D.: Error-rate-based fusion of biometric experts. In: PST2013 International Conference on Privacy, Security and Trust (PST) (2013)
Fisher, R.: CAVIAR Test Case Scenarios (2004)
Bhattacharyya, D.: Biometric authentication: a review. Int. J. u-and e-Service 2(3), 13–28 (2009)
Turk, M., Pentland, A.: Eigenfaces for recognition. J. Cogn. Neurosci. 3(1), 71–86 (1991)
Fisher, R.: The use of multiple measurements in taxonomic problems. Ann. Hum. Genet. 7(2), 179–188 (1936)
Belhumeur, P., Hespanha, J., Kriegman, D.: Eigenfaces vs. Fisherfaces: recognition using class specific linear projection. IEEE Trans. Pattern Anal. Mach. Intell. 19(7), 711–720 (1997)
Adini, Y., Moses, Y., Ullman, S.: Face recognition: the problem of compensating for changes in illumination direction. Pattern Anal. Mach. Intell. 19(7), 721–732 (1997)
Flickner, M., Sawhney, H., Niblack, W.: Query by image and video content: the QBIC system. Computer 28(9), 23–32 (1995)
Kakumanu, P., Makrogiannis, S., Bourbakis, N.: A survey of skin-color modeling and detection methods. Pattern Recogn. 40(3), 1106–1122 (2007)
O’Gorman, L.: Comparing passwords, tokens, and biometrics for user authentication. Proc. IEEE 91(12), 2021–2040 (2003)
Stauffer, C., Grimson, W.: Adaptive background mixture models for real-time tracking. Comput. Vis. Pattern Recogn. 2, 246–252 (1999)
Stauffer, C., Grimson, W.: Learning patterns of activity using real-time tracking. IEEE Trans. Pattern Anal. Mach. Intell. 22(8), 747–757 (2000)
Kalman, R.: A new approach to linear filtering and prediction problems. J. Basic Eng. 82, 35–45 (1960)
Welch, G., Bishop, G.: An introduction to the Kalman filter. Technical report, University of North Carolina (1995)
Farneback, G.: Fast and accurate motion estimation using orientation tensors and parametric motion models. In: Proceedings of 15th International Conference on Pattern Recognition (2000)
Farneback, G.: Very high accuracy velocity estimation using orientation tensors, parametric motion, and simultaneous segmentation of the motion field. In: Proceedings of the Eighth International Conference on Computer Vision 2001, ICCV 2001 (2001)
Corner, M., Noble, B.: Zero-interaction authentication. In: Proceedings of the 8th Annual International Conference on Mobile Computing and Networking, pp. 1–11 (2002)
Noble, B.D., Corner, M.D.: The case for transient authentication. In: Proceedings of the 10th Workshop on ACM SIGOPS European Workshop: Beyond the PC - EW10 , p. 24 (2002)
Corner, M., Noble, B.: Protecting applications with transient authentication. In: International Conference on Mobile Systems, Applications, and Services (MobiSys) (2003)
Bardram, J.E., Kjær, R.E., Pedersen, M.Ø.: Context-aware user authentication - supporting proximity-based login in pervasive computing. In: Dey, A.K., Schmidt, A., McCarthy, J.F. (eds.) UbiComp 2003. LNCS, vol. 2864, pp. 107–123. Springer, Heidelberg (2003)
Klosterman, A., Ganger, G.: Secure continuous biometric-enhanced authentication. Technical report, Parallel Data Laboratory (2000)
Altinok, A., Turk, M.: Temporal integration for continuous multimodal biometrics. In: Proceedings of the Workshop on Multimodal User Authentication (1) (2003)
Sim, T., Zhang, S.: Continuous verification using multimodal biometrics. Pattern Anal. Mach. Intell. 29(4), 562–570 (2007)
Muncaster, J., Turk, M.: Continuous multimodal authentication using dynamic Bayesian networks. In: Proceedings of the 2nd Workshop of Multimodal User Authentication (2006)
Niinuma, K., Park, U., Jain, A.K.: Soft biometric traits for continuous user authentication. IEEE Trans. Inf. Forensics Secur. 5(4), 771–780 (2010)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ingwar, M.I., Jensen, C.D. (2014). Remote Biometrics for Robust Persistent Authentication. In: Garcia-Alfaro, J., Lioudakis, G., Cuppens-Boulahia, N., Foley, S., Fitzgerald, W. (eds) Data Privacy Management and Autonomous Spontaneous Security. DPM SETOP 2013 2013. Lecture Notes in Computer Science(), vol 8247. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-54568-9_16
Download citation
DOI: https://doi.org/10.1007/978-3-642-54568-9_16
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-54567-2
Online ISBN: 978-3-642-54568-9
eBook Packages: Computer ScienceComputer Science (R0)