Loading [a11y]/accessibility-menu.js
Exploring New Authentication Protocols for Sensitive Data Protection on Smartphones | IEEE Journals & Magazine | IEEE Xplore

Exploring New Authentication Protocols for Sensitive Data Protection on Smartphones


Abstract:

Smartphones are increasingly becoming a tool for ubiquitous access to a number of services including, but not limited to, e-commerce and home banking, and are used more a...Show More

Abstract:

Smartphones are increasingly becoming a tool for ubiquitous access to a number of services including, but not limited to, e-commerce and home banking, and are used more and more for sensitive data storage. If, on one hand, this makes the smartphone a powerful tool in our private and professional life, on the other hand it has brought about a series of new challenging security and privacy threats, and raised the need to protect users and their data through new secure authentication protocols. In this article, we illustrate how the security level of a human authentication system is increasing from traditional systems based on the use of passwords or badges to modern systems based on biometrics. We have moved a step forward by conceiving an authentication protocol based on the combined recognition of the human face and smartphone fingerprint. Thanks to image processing techniques, both the distinctive characteristics of the face and of the device that captures the face image can be extracted from a single photo or video frame and used for a double check of user identity. The fast technological development of smartphones allows performing sophisticated operations on the device itself. From the edge computing perspective, the burden of biometric recognition and source camera identification can be moved to the end user side.
Published in: IEEE Communications Magazine ( Volume: 56, Issue: 1, January 2018)
Page(s): 136 - 142
Date of Publication: 12 January 2018

ISSN Information:


Contact IEEE to Subscribe

References

References is not available for this document.