Face-Based Multiple User Active Authentication on Mobile Devices

Multiple user active authentications, in contrast with the single user active authentication, require the verification of identity of multiple subjects. Both traditional verification and identification-based solutions fail to address the specific challenges presented in this problem. We introduce Ex...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on information forensics and security Vol. 14; no. 5; pp. 1240 - 1250
Main Authors Perera, Pramuditha, Patel, Vishal M.
Format Journal Article
LanguageEnglish
Published New York IEEE 01.05.2019
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Multiple user active authentications, in contrast with the single user active authentication, require the verification of identity of multiple subjects. Both traditional verification and identification-based solutions fail to address the specific challenges presented in this problem. We introduce Extremal Openset Rejection, a two-fold mechanism with a sparse representation-based identification step and a verification step for this purpose. In the verification step, concentration of the sparsity vector and the overlap between matched and non-matched distributions are considered for decision making. We introduce a semi-parametric model based on Extreme Value Theory for modeling the distributions, and an algorithm to estimate the parameters of extreme value distributions. Effectiveness of the proposed method is demonstrated using three publicly available face-based mobile active authentication data sets.
AbstractList Multiple user active authentications, in contrast with the single user active authentication, require the verification of identity of multiple subjects. Both traditional verification and identification-based solutions fail to address the specific challenges presented in this problem. We introduce Extremal Openset Rejection, a two-fold mechanism with a sparse representation-based identification step and a verification step for this purpose. In the verification step, concentration of the sparsity vector and the overlap between matched and non-matched distributions are considered for decision making. We introduce a semi-parametric model based on Extreme Value Theory for modeling the distributions, and an algorithm to estimate the parameters of extreme value distributions. Effectiveness of the proposed method is demonstrated using three publicly available face-based mobile active authentication data sets.
Author Perera, Pramuditha
Patel, Vishal M.
Author_xml – sequence: 1
  givenname: Pramuditha
  surname: Perera
  fullname: Perera, Pramuditha
  email: pperera3@jhu.edu
  organization: Dept. of Electr. & Comput. Eng., Johns Hopkins Univ., Baltimore, MD, USA
– sequence: 2
  givenname: Vishal M.
  surname: Patel
  fullname: Patel, Vishal M.
  email: vpatel36@jhu.edu
  organization: Dept. of Electr. & Comput. Eng., Johns Hopkins Univ., Baltimore, MD, USA
BookMark eNp9kEFLw0AQhRepYFv9AeIl4Dl1ZzfZ3dys1WqhxYPtedlsJrglJjW7KfjvTa304EEYmIF53zzmjcigbmok5BroBIBmd-vF_G3CKKgJU1LIRJ2RIaSpiAVlMDjNwC_IyPstpUkCQg3J_dxYjB-MxyJadVVwuwqjjcc2mtrg9hhNu_COdXDWBNfUUV-rJne96BH3zqK_JOelqTxe_fYx2cyf1rOXePn6vJhNl7FlGQ9xVlhhKUsMcKmQ5pYVPCuNKhgUXJbM9MtCYirzPOnXomRgck5BFimzqJCPye3x7q5tPjv0QW-brq17S81AUpFlTIleBUeVbRvvWyz1rnUfpv3SQPUhKH0ISh-C0r9B9Yz8w1gXfr4NrXHVv-TNkXSIeHJSKYUsFfwb9EN3Mw
CODEN ITIFA6
CitedBy_id crossref_primary_10_1109_TIFS_2023_3262125
crossref_primary_10_1109_TIFS_2019_2912552
crossref_primary_10_1051_sands_2024003
crossref_primary_10_1109_LSP_2019_2913022
crossref_primary_10_1109_ACCESS_2022_3185016
crossref_primary_10_1109_TMC_2021_3106256
crossref_primary_10_1109_JIOT_2023_3264274
crossref_primary_10_1109_TMC_2022_3216868
crossref_primary_10_3390_s21010092
crossref_primary_10_1016_j_imu_2021_100624
crossref_primary_10_1007_s11042_022_13245_9
crossref_primary_10_1007_s11036_020_01706_0
crossref_primary_10_1109_MIC_2020_2971447
crossref_primary_10_3390_s21175967
crossref_primary_10_1109_ACCESS_2024_3411783
crossref_primary_10_1109_TIFS_2020_3045937
crossref_primary_10_1109_TIFS_2023_3288689
crossref_primary_10_1109_TBIOM_2020_3024263
crossref_primary_10_1016_j_cose_2024_104285
crossref_primary_10_1109_ACCESS_2020_3008019
crossref_primary_10_1007_s10916_019_1468_1
crossref_primary_10_3390_s22186980
crossref_primary_10_1109_TIP_2019_2917862
crossref_primary_10_1145_3572909
crossref_primary_10_32604_csse_2023_025672
crossref_primary_10_1016_j_patcog_2025_111352
crossref_primary_10_1109_TIFS_2023_3255585
crossref_primary_10_1016_j_pmcj_2023_101801
Cites_doi 10.1109/BTAS.2012.6374552
10.1109/ICB.2015.7139043
10.1109/TSP.2009.2031285
10.1109/MSP.2016.2555335
10.1109/CVPR.2005.177
10.1109/TPAMI.2008.79
10.1109/FG.2017.51
10.1109/TPAMI.2014.2321392
10.1109/TPAMI.2012.256
10.1109/TIFS.2012.2189205
10.1109/ICASSP.2015.7178258
10.1109/BTAS.2015.7358748
10.1109/BTAS.2016.7791155
10.1109/BTAS.2014.6996246
10.1109/BTAS.2013.6712758
10.1109/SPMB.2015.7405470
10.1109/BTAS.2016.7791164
10.1109/WACV.2015.35
10.1109/TPAMI.2016.2613924
10.1016/0047-259X(90)90080-2
10.1109/ICMEW.2012.116
10.1109/TIFS.2012.2225048
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2019
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2019
DBID 97E
RIA
RIE
AAYXX
CITATION
7SC
7SP
7TB
8FD
FR3
JQ2
KR7
L7M
L~C
L~D
DOI 10.1109/TIFS.2018.2876748
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005-present
IEEE All-Society Periodicals Package (ASPP) 1998-Present
IEEE Electronic Library (IEL)
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Mechanical & Transportation Engineering Abstracts
Technology Research Database
Engineering Research Database
ProQuest Computer Science Collection
Civil Engineering Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Civil Engineering Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Mechanical & Transportation Engineering Abstracts
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Engineering Research Database
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList Civil Engineering Abstracts

Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISSN 1556-6021
EndPage 1250
ExternalDocumentID 10_1109_TIFS_2018_2876748
8501956
Genre orig-research
GrantInformation_xml – fundername: Office of Naval Research
  grantid: YIP N00014-16-1-3134
  funderid: 10.13039/100000006
GroupedDBID 0R~
29I
4.4
5GY
5VS
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABQJQ
ABVLG
ACGFS
ACIWK
AENEX
AETIX
AGQYO
AGSQL
AHBIQ
AKJIK
AKQYR
ALMA_UNASSIGNED_HOLDINGS
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
DU5
EBS
EJD
HZ~
IFIPE
IPLJI
JAVBF
LAI
M43
O9-
OCL
P2P
PQQKQ
RIA
RIE
RNS
AAYXX
CITATION
RIG
7SC
7SP
7TB
8FD
FR3
JQ2
KR7
L7M
L~C
L~D
ID FETCH-LOGICAL-c293t-9dc6c024a1378e0bc2d39fa8d21d37f2ac02d7e57bb4e0b6f21ab3017d52ce8e3
IEDL.DBID RIE
ISSN 1556-6013
IngestDate Mon Jun 30 02:37:07 EDT 2025
Tue Jul 01 02:34:14 EDT 2025
Thu Apr 24 22:59:40 EDT 2025
Wed Aug 27 02:47:27 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 5
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
https://doi.org/10.15223/policy-029
https://doi.org/10.15223/policy-037
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c293t-9dc6c024a1378e0bc2d39fa8d21d37f2ac02d7e57bb4e0b6f21ab3017d52ce8e3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0003-2821-6367
0000-0002-5239-692X
PQID 2170699286
PQPubID 85506
PageCount 11
ParticipantIDs crossref_primary_10_1109_TIFS_2018_2876748
proquest_journals_2170699286
ieee_primary_8501956
crossref_citationtrail_10_1109_TIFS_2018_2876748
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2019-05-01
PublicationDateYYYYMMDD 2019-05-01
PublicationDate_xml – month: 05
  year: 2019
  text: 2019-05-01
  day: 01
PublicationDecade 2010
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationTitle IEEE transactions on information forensics and security
PublicationTitleAbbrev TIFS
PublicationYear 2019
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref13
ref15
ref14
ref30
ref11
jain (ref12) 2014
ref16
ref19
ref18
bensalah (ref1) 2010
martin (ref17) 2001
gibert-serra (ref10) 2015
scheirer (ref26) 2010
ref24
ref23
pelecanos (ref20) 2008
ref25
ref22
ref21
bolle (ref2) 2003
ref28
ref27
ref29
ref8
ref7
ref9
ref4
ref3
ref5
dey (ref6) 2016
References_xml – ident: ref13
  doi: 10.1109/BTAS.2012.6374552
– ident: ref4
  doi: 10.1109/ICB.2015.7139043
– start-page: 68
  year: 2010
  ident: ref26
  article-title: Robust fusion: Extreme value theory for recognition score normalization
  publication-title: Proc Eur Conf Comp Vis (ECCV)
– ident: ref3
  doi: 10.1109/TSP.2009.2031285
– year: 2016
  ident: ref6
  publication-title: Extreme Value Modeling and Risk Analysis Methods and Applications
– start-page: 393
  year: 2014
  ident: ref12
  article-title: Multi-class open set recognition using probability of inclusion
  publication-title: Proc Eur Conf Comput Vis (ECCV)
– ident: ref7
  doi: 10.1109/MSP.2016.2555335
– ident: ref5
  doi: 10.1109/CVPR.2005.177
– ident: ref27
  doi: 10.1109/TPAMI.2008.79
– ident: ref21
  doi: 10.1109/FG.2017.51
– ident: ref23
  doi: 10.1109/TPAMI.2014.2321392
– ident: ref24
  doi: 10.1109/TPAMI.2012.256
– ident: ref19
  doi: 10.1109/TIFS.2012.2189205
– start-page: 239
  year: 2001
  ident: ref17
  article-title: Speaker recognition in a multi-speaker environment
  publication-title: Proc Eur Conf Speech Commun Technol (Interspeech)
– ident: ref8
  doi: 10.1109/ICASSP.2015.7178258
– ident: ref22
  doi: 10.1109/BTAS.2015.7358748
– ident: ref15
  doi: 10.1109/BTAS.2016.7791155
– ident: ref30
  doi: 10.1109/BTAS.2014.6996246
– year: 2010
  ident: ref1
  publication-title: Steps in Applying Extreme Value Theory to Finance A Review
– ident: ref25
  doi: 10.1109/BTAS.2013.6712758
– ident: ref16
  doi: 10.1109/SPMB.2015.7405470
– ident: ref14
  doi: 10.1109/BTAS.2016.7791164
– ident: ref29
  doi: 10.1109/WACV.2015.35
– year: 2003
  ident: ref2
  publication-title: Guide to Biometrics
– start-page: 131
  year: 2015
  ident: ref10
  article-title: Sequential score adaptation with extreme value theory for robust railway track inspection
  publication-title: Proc IEEE Int Conf Comput Vis (ICCV)
– start-page: 203
  year: 2008
  ident: ref20
  publication-title: Conversational Biometrics A Probabilistic View
– ident: ref28
  doi: 10.1109/TPAMI.2016.2613924
– ident: ref11
  doi: 10.1016/0047-259X(90)90080-2
– ident: ref18
  doi: 10.1109/ICMEW.2012.116
– ident: ref9
  doi: 10.1109/TIFS.2012.2225048
SSID ssj0044168
Score 2.4272835
Snippet Multiple user active authentications, in contrast with the single user active authentication, require the verification of identity of multiple subjects. Both...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 1240
SubjectTerms active authentication
Authentication
Biometrics (access control)
continuous authentication
Decision making
Decision theory
Dictionaries
Electronic devices
Extreme value theory
Extreme values
mobile biometrics
Mobile handsets
multiuser authentication
Open-set recognition
Parameter estimation
Probes
Support vector machines
Task analysis
Title Face-Based Multiple User Active Authentication on Mobile Devices
URI https://ieeexplore.ieee.org/document/8501956
https://www.proquest.com/docview/2170699286
Volume 14
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwED4VJhh4FBDlJQ9MiJTWjpN441kBUlmgElvkx2UBtQjahV_P2XEqXkJIGSzZjiyffd-d7wVwqDNrRKFFopzLkzQXmGhrK2_k5YT4FVfoA4WHd9n1KL19lI8tOJ7HwiBicD7Drm8GW76b2Jl_KjspZAhvW4AFUtzqWK2G6xKq12FvUmYJKRkiWjD7PXXycDO4905cRZfUA19c4wsGhaIqPzhxgJfBKgybhdVeJU_d2dR07fu3nI3_XfkarEQ5k53VB2MdWjhuw2pTw4HFK92G5U8JCTfgdKAtJueEbI4No6shG9EpZWeBLzL_oub9i-qHPkbfcGKIsbBLDCxnE0aDq4eL6yTWWEgsAf2USGQzSzit-yIvsGcsd0JVunC870RecU2dLkeZG5NSd1bxvjbEFHInucUCxRYsjidj3AaWSqkFWm_6JWoobdLCi5ckE0jjlMUO9JpdL21MQO7rYDyXQRHpqdITqvSEKiOhOnA0n_JSZ9_4a_CG3_j5wLjnHdhrSFvG-_lWcp81SCleZDu_z9qFJfq3ql0b92Bx-jrDfRI_puYgnLsPkc7VPA
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3Nb9MwFH8q4wA7rNCC6NaBD5wQ6RK7-fBtZVC10PRCK_UW-ePlMtSi0V746_fsOBUDhJByiGRbifyz3-_Z7wvgrcqMFoUSkbQ2j8a5wEgZUzsjLyfGr7lEFyhcLrPZevx5k2468P4YC4OI3vkMR-7V2_LtzhzcVdlVkfrwtkfwmHg_TZporVbuEq83gW9pmkV0zBDBhpnE8mo1n351blzFiA4IrrzGAxbyZVX-kMWeYKZdKNtfa_xKbkeHvR6Zn79lbfzff38GZ0HTZJNmaTyHDm570G2rOLCwqXtw-ktKwj5cT5XB6ANxm2VlcDZka1qnbOIlI3N3as7DqLnqY_SUO02ihX1EL3RewHr6aXUzi0KVhcgQ1e8JJJMZYmqViLzAWBtuhaxVYXliRV5zRY02xzTXekzNWc0TpUks5DblBgsUL-Fku9viK2AEihJonPGX0JBKjwunYJJWkGorDQ4gbme9MiEFuauE8a3yR5FYVg6oygFVBaAG8O445HuTf-Nfnftu4o8dw5wPYNhCW4Ud-qPiLm-QlLzIzv8-6g08ma3KRbWYL79cwFP6jmwcHYdwsr874CUpI3v92q_Be93H2IU
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Face-Based+Multiple+User+Active+Authentication+on+Mobile+Devices&rft.jtitle=IEEE+transactions+on+information+forensics+and+security&rft.au=Perera%2C+Pramuditha&rft.au=Patel%2C+Vishal+M&rft.date=2019-05-01&rft.pub=The+Institute+of+Electrical+and+Electronics+Engineers%2C+Inc.+%28IEEE%29&rft.issn=1556-6013&rft.eissn=1556-6021&rft.volume=14&rft.issue=5&rft.spage=1240&rft_id=info:doi/10.1109%2FTIFS.2018.2876748&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1556-6013&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1556-6013&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1556-6013&client=summon