Mobile biometrics: Towards a comprehensive evaluation methodology

Attaullah Buriro, Zahid Akhtar, Bruno Crispo, S. Gupta

Research output: Chapter in Book/Report/Conference proceedingConference contribution

13 Citations (Scopus)

Abstract

Smartphones have become the pervasive personal computing platform. Recent years thus have witnessed exponential growth in research and development for secure and usable authentication schemes for smartphones. Several explicit (e.g., PIN-based) and/or implicit (e.g., biometrics-based) authentication methods have been designed and published in the literature. In fact, some of them have been embedded in commercial mobile products as well. However, the published studies report only the brighter side of the proposed scheme(s), e.g., higher accuracy attained by the proposed mechanism. While other associated operational issues, such as computational overhead, robustness to different environmental conditions/attacks, usability, are intentionally or unintentionally ignored. More specifically, most publicly available frameworks did not discuss or explore any other evaluation criterion, usability and environment-related measures except the accuracy under zero-effort. Thus, their baseline operations usually give a false sense of progress. This paper, therefore, presents some guidelines to researchers for designing, implementation, and evaluating smartphone user authentication methods for a positive impact on future technological developments.
Original languageEnglish
Title of host publication2017 International Carnahan Conference on Security Technology: Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
Number of pages6
ISBN (Electronic)978-1-5386-1585-0
ISBN (Print)978-1-5386-1586-7
DOIs
Publication statusPublished - 07 Oct 2017
Externally publishedYes

Publication series

Name
PublisherIEEE
ISSN (Electronic)2153-0742

Fingerprint

Dive into the research topics of 'Mobile biometrics: Towards a comprehensive evaluation methodology'. Together they form a unique fingerprint.

Cite this