Show simple item record

dc.contributor.authorDerawi, Mohammad Omar
dc.date.accessioned2012-11-02T07:32:20Z
dc.date.available2012-11-02T07:32:20Z
dc.date.issued2012-11-02
dc.identifier.isbn978-82-93269-05-2no_NO
dc.identifier.issn1893-1227
dc.identifier.urihttp://hdl.handle.net/11250/144368
dc.description.abstractUser authentication is a means of identifying the user and verifying that the user is allowed access to services or objects and is a very central step in many applications. People pass through various types of authentication services in their day-to-day activities. For example, to log on to a computer the user is required to know a secret password. Similarly, when turning on a mobile phone the user has to know a PIN code or a touch pattern. Some person authentication methods are based on human physiological or behavioural characteristics, such as fingerprints, face, or voice. Authentication methods differ in their strengths and weaknesses. PIN codes and passwords have to be remembered and gloves have to be removed before fingerprint authentication. Security and usability are essential factors in person authentication. Usability relates to the unobtrusiveness, user-convenience, and human-friendliness of the authentication method. Security is related to the robustness of the authentication method and vulnerability against attacks. Recent advances in microelectronic chip development allow user authentication based on gait (the way a person walks), using small, light, and low-cost sensors. One of the benefits of this is that unobtrusive person authentication through gait recognition is now possible by using mobile smart phones. Optimization of performance and a strong focus on security, while not ignoring usability, will lead to an increased protection of information on smart mobile devices through the use of gait recognition. The general aim of the research described in this thesis was to protect smart mobile devices against unauthorized access by using gait recognition based on the data collected from the sensors embedded in these devices. The effort was not only to develop new innovative algorithms to improve performance in gait recognition, but also to develop awareness on the usability of this method by focusing on activity recognition and continuous authentication, as well as assuring security against deliberate attackers.no_NO
dc.language.isoengno_NO
dc.relation.ispartofseriesDoctoral dissertations at Gjøvik University College;3/2012no_NO
dc.relation.ispartofseriesDoktorgradsavhandlinger ved Høgskolen i Gjøvik;3/2012no_NO
dc.subjectsmart phonesno_NO
dc.subjectbiometricsno_NO
dc.titleSmartphones and Biometrics: Gait and Activity Recognitionno_NO
dc.typeDoctoral thesisno_NO
dc.subject.nsiVDP::Mathematics and natural science: 400::Information and communication science: 420::Security and vulnerability: 424no_NO
dc.source.pagenumberXIV, 233no_NO


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record