Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Gait authentication on mobile phone using biometric cryptosystem and fuzzy commitment scheme
Hoang T., Choi D., Nguyen T. International Journal of Information Security14 (6):549-560,2015.Type:Article
Date Reviewed: May 26 2016

Gait-based user authentication is a very well-known technique with ready adoption due to its nonobstructive method of operation. In this paper, Hoang et al. have proposed an inertial sensor-based approach for detecting human gait through mobile phones. The architecture of the proposed system is quite elaborate and covers all aspects of gait-based authentication, namely, gait signal extraction and pre-processing, signal encoding, and cryptographic key binding. The system was evaluated for performance on a data set comprising 38 individuals, 28 males and 10 females, with signals captured on the Google Nexus mobile platform. Evaluation of the scheme is detailed in the last section of the paper. Table 3 in particular illustrates a comparison of the performance of the proposed scheme with other popular schemes such as the fuzzy commitment scheme (FCS), fuzzy extractor (FE), secure sketch (SS), and password hardening (PH).

A background in signal processing and gait-based user authentication is essential in order to grasp the key findings presented. Overall, the paper is very well written and easy to follow for the information security research community.

Reviewer:  Zubair Baig Review #: CR144452 (1609-0715)
Bookmark and Share
 
Authentication (K.6.5 ... )
 
 
Portable Devices (C.5.3 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Authentication": Date
Cyberpunk
Hafner K., Markoff J., Simon & Schuster, Inc., New York, NY, 1991. Type: Book (9780671778798)
Nov 1 1993
How to sign digital streams
Gennaro R., Rohatgi P. Information and Computation 165(1): 100-116, 2001. Type: Article
Dec 1 2001
Signature schemes based on the strong RSA assumption
Cramer R., Shoup V. ACM Transactions on Information and System Security 3(3): 161-185, 2000. Type: Article
Mar 1 2001
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy