52
Views
0
CrossRef citations to date
0
Altmetric
Innovation

Using cloud models of heartbeats as the entity identifier to secure mobile devices

&
Pages 36-45 | Received 14 Jan 2016, Accepted 05 Jul 2016, Published online: 28 Sep 2016

References

  • Karlson AK, Brush AJ, Schechter S. Can i borrow your phone?: understanding concerns when sharing mobile phones. Paper presented at: ACM Proceedings of the SIGCHI Conference on Human Factors in Computing Systems; 2009; p. 1647–1650.
  • Egelman S, Jain S, Portnoff RS, et al. Are you ready to lock? Paper presented at: ACM Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security; 2014; p. 750–761.
  • Harbach M, von Zezschwitz E, Fichtner A, et al. It’s a hard lock life: a field study of smartphone (un) locking behavior and risk perception. Paper presented at: Symposium on Usable Privacy and Security (SOUPS); 2014.
  • Van Bruggen D, Liu S, Kajzer M, et al. Modifying smartphone user locking behavior. Paper presented at: ACM Proceedings of the Ninth Symposium on Usable Privacy and Security; 2013; p. 10.
  • Smith RE. Authentication: from passwords to public keys. Boston (MA): Addison-Wesley Longman Publishing Co., Inc; 2001. ISBN: 0-201-61599-1.
  • Rubin AD, Jermyn I, Mayer A, et al. The design and analysis of graphical passwords. In: 8th Usenix Security Symposium. IEEE; 1999. p. 1–14.
  • Aviv AJ, Gibson K, Mossop E, et al. Smudge attacks on smartphone touch screens. Woot 2010;10:1–7.
  • De Luca A, Von Zezschwitz E, Hußmann H. Vibrapass: secure authentication based on shared lies. Paper presented at: ACM Proceedings of the SIGCHI conference on human factors in computing systems; 2009; p. 913–916.
  • Tari F, Ozok A, Holden SH. A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords. Paper presented at: ACM Proceedings of the second symposium on Usable privacy and security; 2006; p. 56–66.
  • YYano V, Zimmer A, Ling LL. Multimodal biometric authentication based on iris pattern and pupil light reflex. Paper presented at: IEEE Pattern Recognition (ICPR); 2012; p. 2857–2860.
  • Chen CL, Lee CC, Hsu CY. Mobile device integration of a fingerprint biometric remote authentication scheme. Int J Commun Syst. 2012;25:585–597.
  • Tresadern P, Cootes TF, Poh N, et al. Mobile biometrics: combined face and voice verification for a mobile platform. IEEE Pervasive Comput. 2013;12:79–87.
  • Hoang T, Choi D, Nguyen T. Gait authentication on mobile phone using biometric cryptosystem and fuzzy commitment scheme. Int J Inform Secur. 2015;14:549–560.
  • Abo-Zahhad M, Ahmed SM, Abbas SN. Biometric authentication based on PCG and ECG signals: present status and future directions. Signal Image Video P. 2014;8:739–751.
  • Jain AK, Nandakumar K. Biometric authentication: system security and user privacy. IEEE Comp. 2012;45:87–92.
  • Uludag U, Pankanti S, Prabhakar S, et al. Biometric cryptosystems: issues and challenges. Proc IEEE. 2004;92:948–960.
  • Singla SK, Sharma A. ECG as biometric in the automated world. Int J Comp Sci Commun. 2010;1:281–283.
  • Biel L, Pettersson O, Philipson L, et al. ECG analysis: a new approach in human identification. Instr Meas. 2001;50:808–812.
  • Shen TW, Tompkins WJ, Hu YH. One-lead ECG for identity verification. Engineering in Medicine and Biology, 2002. Paper presented at: IEEE 24th Annual Conference and the Annual Fall Meeting of the Biomedical Engineering Society EMBS/BMES Conference; 2002; Vol. 1, p. 62–63.
  • Li D, Du Y. Artificial intelligence with uncertainty (in Chinese). J. Software. 2004;15:1583–1594.
  • Deyi L, Haijun M, Xuemei S. Membership clouds and membership cloud generators (in Chinese). J Comput Res Dev. 1995;32:15–20.
  • Li D, Liu C, Gan W. A new cognitive model: cloud model. Int J Intell Syst. 2009;24:357–375.
  • Wang G, Xu C, Li D. Generic normal cloud model. Inform Sci. 2014;280:1–15.
  • Li DY. The cloud control method and balancing patterns of triple link inverted pendulum systems. Chin Eng Sci. 1999;1:41–46.
  • Yu L, Deyi L, Guangwei Z, et al. Atomized feature in cloud based evolutionary algorithm. Acta Electron Sin. 2009;37:1651–1658.
  • Li DY, Yu Q, Jiang GJ. A unified assessment of reliability, invulnerability and anti-countermeasurement for c3i systems. Syst Eng Theory Pract. 1997;17:23–27.
  • Lu H, Wang Y, Li D, et al. The application of backward cloud in qualitative evaluation. Chin J Comp Chin Ed. 2003;26:1009–1014.
  • Qin K, Xu K, Liu F, et al. Image segmentation based on histogram analysis utilizing the cloud model. Comp Math Appl. 2011;62:2824–2833.
  • Wu T, Qin K. Image segmentation using cloud model and data field. Pattern Recogn Artif Intell. 2012;25:397–405.
  • Yang X, Yan L, Zeng L. How to handle uncertainties in AHP: the cloud delphi hierarchical analysis. Inform Sci. 2013;222:384–404.
  • Jin-Chun Z, Gu-Yu H. Application of uncertainty reasoning based on cloud model in time series prediction. J Zhejiang Univ Sci. 2003;4:578–583.
  • Yin W, Zhao J, Chen T, et al. Shock shape representation of sinus heart rate based on cloud model (in Chinese). J Biomed Eng. 2014;31:279–282.
  • Li X, Hong W,Wang X, et al. Research on ECG signal analysis based on the cloudy model theory(in Chinese). J Biomed Eng. 2011;28:27–31.
  • Wübbeler G, Stavridis M, Kreiseler D, et al. Verification of humans using the electrocardiogram. Pattern Recogn Lett. 2007;28:1172–1175.
  • Sufi F, Khalil I, Habib I. Polynomial distance measurement for ECG based biometric authentication. Secur Commun Netw. 2010;3:303–319.
  • Sufi F, Khalil I. An automated patient authentication system for remote telecardiology. Paper presented at: IEEE Intelligent Sensors, Sensor Networks and Information Processing; 2008; p. 279–284.
  • Cho DH, Park KR, Rhee DW, et al. Pupil and iris localization for iris recognition in mobile phones. Paper presented at: IEEE SNPD Seventh ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing; 2006; p. 197–201.
  • Saevanee H, Bhatarakosol P. User authentication using combination of behavioral biometrics over the touchpad acting like touch screen of mobile device. Paper presented at: ICCEE 2008. International Conference on Computer and Electrical Engineering. IEEE; 2008. p. 82–86.
  • Choraś M, Kozik R. Contactless palmprint and knuckle biometrics for mobile devices. Pattern Anal Appl. 2012;15:73–85.
  • Köhler BU, Hennig C, Orglmeister R. The principles of software QRS detection. IEEE Eng Med Biol Mag. 2002;21:42–57.
  • Filipovic N, Stojanovic R, Debevc M, et al. Online ECG processing and visualization using android SmartPhone. Paper presented at: IEEE 2nd Mediterranean Conference on Embedded Computing; 2013; p. 93–96.
  • Sufi F, Fang Q, Cosic I. ECG R-R peak detection on mobile phones. Conf Proc IEEE Eng Med Biol Soc. 2007;2007:3697–3700. doi: 10.1109/IEMBS.2007.4353134.
  • SnapECG. Available from: http://www.mhealth365.cn/; 2016.
  • Goldberger AL, Amaral LA, Glass L, et al. Physiobank, physiotoolkit, and physionet components of a new research resource for complex physiologic signals. Circulation. 2000;101:e215–e220.
  • Falconi JSA. ECG Authentication for Mobile Devices [dissertation]. Ottawa (ON): University of Ottawa; 2013.
  • Singh YN, Singh SK. Evaluation of electrocardiogram for biometric authentication. J Inform Secur. 2012;3:39–48.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.