In this advanced age,when smart phones are the norm,people utilize social networking,online shopping,and even private information storage through smart phones.As a result,identity authentication has become the most cr...In this advanced age,when smart phones are the norm,people utilize social networking,online shopping,and even private information storage through smart phones.As a result,identity authentication has become the most critical security activity in this period of the intelligent craze.By analyzing the shortcomings of the existing authentication methods,this paper proposes an identity authentication method based on the behavior of smartphone users.Firstly,the sensor data and touch-screen data of the smart phone users are collected through android programming.Secondly,the eigenvalues of this data are extracted and sent to the server.Thirdly,the Support Vector Machine(SVM)and Recurrent Neural Network(RNN)are introduced to train the collected data on the server end,and the results are finally yielded by the weighted average.The results show that the method this paper proposes has great FRR(False Reject Rate)and FAR(False Accept Rate).展开更多
We propose the use of intra-palm propagation signals as biometrics. The intra-palm propagation signal is a signal that is propagated in the shallow part of the skin of a palm. In this paper, we prepare dedicated measu...We propose the use of intra-palm propagation signals as biometrics. The intra-palm propagation signal is a signal that is propagated in the shallow part of the skin of a palm. In this paper, we prepare dedicated measuring devices and measure intra-palm propagation signals from twenty-one experimental subjects. We also evaluate the verification performance based on Euclidian distance or SVM (support vector machine). The equal error rate in the case of SVM is aovroximatelv 24%.展开更多
This paper is devoted to constructing an authentication code with arbitration using subspaces of vector spaces over finite fields.Moreover,if we choose the encoding rules of the transmitter and the decoding rules of t...This paper is devoted to constructing an authentication code with arbitration using subspaces of vector spaces over finite fields.Moreover,if we choose the encoding rules of the transmitter and the decoding rules of the receiver according to a uniform probability distribution,then some parameters and the probabilities of successful attacks are computed.展开更多
基金This work is supported,in part,by the Natural Science Foundation of Liaoning Province of China under grant(No.20180550629)in part,by the Postdoctoral Research Initiation Fund of Shenyang University.
文摘In this advanced age,when smart phones are the norm,people utilize social networking,online shopping,and even private information storage through smart phones.As a result,identity authentication has become the most critical security activity in this period of the intelligent craze.By analyzing the shortcomings of the existing authentication methods,this paper proposes an identity authentication method based on the behavior of smartphone users.Firstly,the sensor data and touch-screen data of the smart phone users are collected through android programming.Secondly,the eigenvalues of this data are extracted and sent to the server.Thirdly,the Support Vector Machine(SVM)and Recurrent Neural Network(RNN)are introduced to train the collected data on the server end,and the results are finally yielded by the weighted average.The results show that the method this paper proposes has great FRR(False Reject Rate)and FAR(False Accept Rate).
文摘We propose the use of intra-palm propagation signals as biometrics. The intra-palm propagation signal is a signal that is propagated in the shallow part of the skin of a palm. In this paper, we prepare dedicated measuring devices and measure intra-palm propagation signals from twenty-one experimental subjects. We also evaluate the verification performance based on Euclidian distance or SVM (support vector machine). The equal error rate in the case of SVM is aovroximatelv 24%.
基金Supported by the National Natural Science Foundation of China (Grant No. 10771023)
文摘This paper is devoted to constructing an authentication code with arbitration using subspaces of vector spaces over finite fields.Moreover,if we choose the encoding rules of the transmitter and the decoding rules of the receiver according to a uniform probability distribution,then some parameters and the probabilities of successful attacks are computed.