1 / 16

期末展示情境

期末展示情境. 2013/10/07. 研究內容. 功能性需求與過去 大致 相同 (2010/8-2013/7) 使用者識別 / 服務管理 / 使用者 註冊 .. 主要 針對 非能性 加強 ( 為了提升 識別效果與應用情境 ) 1 st . 增加 一個 Sensor (Dynamics Approach ) 提升識別率 快速回應識別結果 (/flick) 2 nd . 研發 另一個 Approach (Histogram Approach ) 測試資料累積到一定量, 識別率會比 dynamics 高 (90%)

yan
Download Presentation

期末展示情境

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. 期末展示情境 2013/10/07

  2. 研究內容 • 功能性需求與過去大致相同(2010/8-2013/7) • 使用者識別/服務管理/使用者註冊.. • 主要針對非能性加強 (為了提升識別效果與應用情境) • 1st . 增加一個Sensor(DynamicsApproach) • 提升識別率 • 快速回應識別結果 (/flick) • 2nd . 研發另一個Approach (Histogram Approach) • 測試資料累積到一定量, 識別率會比dynamics高 (90%) • 3rd . 結合上述兩種Approaches • 取個別優點組合。

  3. Intuition Although single modality (sensor)[5][7] could construct a feasible non-intrusive authentication model; however, • Based on recent studies [8][9][10], we think that an authentication model, which combines orientation sensor and touchscreen, may gain better performance than a single modality (either orientation sensor or touchscreen). • . Orientation Orientation + Touchscreen Touchscreen *One modality may ok, but two modalities may gain better performance. *Single modality is ok, but multi-modalities may gain better performance.

  4. 分鏡腳本(Storyboard) • 案例展示只有密碼是不夠的 • 使用同樣的密碼/操作行為 • Genuine Userand Imposters • 用Applied Features展示過去版本的概念 • 只有用Orientation Sensor • 用LifeCycle介紹Smartphones內建的Sensors • 預計保護的Applications有那些Sensors可使用? • Orientation Sensor & Touchscreen • Features of Orientation Sensor and Touchscreen • Using figures of applied features todemonstrate • …

  5. 案例展示只有密碼是不夠的 Password is not sufficient for smartphones. • Shoulder surfing • Password could be • written down on a paper. • recorded (text file) and stored in a smartphone. Password xxx xxx xxx Password xxx xxx xxx

  6. 用過去展示影片的片段 • 使用同樣的密碼/操作 • A Genuine Uservs. an Imposter • (小偷/手機主人) • *子計畫一 第三年DEMO影片1280x720-v4 (0:20 ~ 1:14) *強調只有使用密碼保護是不夠的!!!

  7. 展示過去版本的概念 -90<Y<30 • Orientation Sensor -60<Z <60 0<X<20

  8. Life Cycle介紹Smartphones內建的Sensors Camera Microphone loop loop 1st Application Telecommunications: (Voice and Facial) State 1 Textual/Graphical Password, Biometrics (Fingerprint, Facial, etc.) State 0 Idle Turn On 2nd Applications GUI Interactions: Economic (Transaction, Payment) Browsing (sensitive information)…Sensorial Interactions: Games, etc. Top 10 Smartphone Activitiesa Accelerometer Orientation Touchscreen a. O2 News Centre, Making calls has become fifth most frequent use for a Smartphone for newly-networked generation of users, http://news.o2.co.uk/Press-Releases/Making-calls-has-become-fifth-most-frequent-use-for-a-Smartphone-for-newly-networked-generation-of-users-390.aspx (2012/6/29)

  9. Behavioral biometricsof Touch Gesture based on a Touchscreen

  10. Behavioral biometrics obtained from Orientation and Touchscreen of a smartphone. -90<Y<30 -60<Z <60 0<X<20

  11. M組 工作內容 -90<Y<30 -60<Z <60 0<X<20 採雙感應器(Dual Sensors),建構使用者識別機制

  12. 各年度研發內容Orientation + Touchscreen • 第一年:Dynamics Approach(快) • 以每個Flick動作產生的行為特徵做為識別基礎。 • 持握角度、角度變化、速度、加速度、移動直線距離、移動路徑長度、曲率、觸控壓力、觸控面積…。 • 第二年:Histogram Approach(慢、但更準) • 累積一定數量的Flicks動作進行統計,以其量化後行為特徵分布做為識別基礎。 • 如: 統計30個flicks動作,軌跡碰觸的位置分布範圍以及比例。(或移動路徑長度) • 第三年:整合兩Approaches的優點 • 取各自的優點混合使用(前快、後準--每人基準不同)。

  13. References [1] Gafurov, D. Helkala, K. and Søndrol, T. (2006). Biometric Gait Authentication Using Accelerometer Sensor. Journal of Computers, 1, 51-59. [2] Google. (2011b) Face Recognition on Android™ (4.0 Ice Cream Sandwich). available from: https://sites.google.com/site/androidfacerecognition/Home (2011/11/11). [3] Nakajima, T. Lin, G. and Rahul, P. (2009) Systems and methods for identifying unauthorized users of an electronic device. US Patent & Trademark Office, Serial No. 389106, 2009. available from: http://appft1.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PG01&p=1&u=%2Fnetahtml%2FPTO%2Fsrchnum.html&r=1&f=G&l=50&s1=%2220100207721%22.PGNR.&OS=DN/20100207721&RS=DN/20100207721 (2011/11/11). [4] M. Conti, I. Z. Zlatea, and B. Crispo, “Mind how you answer me!: transparently authenticating the user of a smartphone when answering or placing a call.” In Proceedings of the 6th ACM Symposium on Information, Computer, and Communications Security, (ASIACCS '11). ACM, New York, NY, USA. pp. 249-259, March 22–24, 2011. [5] W. Shi, J. Yang, Y. Jiang, F. Yang, and Y. Xiong , “SenGuard: Passive User Identification on Smartphones Using Multiple Sensors.” 2011 IEEE 7th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Shanghai, China. pp. 141-148, 2011. [6]C.-C. Lin, C.-C. Chang, Deron Liang, C.-H. Yang, “A Preliminary Study on Non-Intrusive User Authentication Method using Smartphone Sensors,” Applied Mechanics and Materials, vols. 284-287, pp. 3270-3274, 2013. [7] C.C. Lin, D. Liang, C.C. Chang, C.H. Yang: A New Non-Intrusive Authentication Method based on the Orientation Sensor for Smartphone Users, 2012 IEEE Sixth International Conference on Software Security and Reliability (SERE’2012). (2012) June 20-22; Washingtom, D.C., USA (p245) [8] D. Gafurov, K. Helkala and T. Søndrol: Journal of Computers. Vol. 1 (2006), p. 51 [9] O. Mazhelis, J. Markuula and J. Veijalainen: Info. Manage. & Comp. Secur. Vol. 13(5) (2005), p. 367 [10] Eric Hess, Facial Recognition: A Value Tool for Law Enforcement, Forensic Magazine October/November 2010,

  14. Example: Histogram • The 240-bin histograms of the flick trajectories of two different users.

  15. 分鏡腳本(Storyboard) • 1. 使用同樣的密碼/操作行為 • Operations of a Genuine User • Operations of Imposters

More Related