Face-Based Multiple User Active Authentication on Mobile Devices
Multiple user active authentications, in contrast with the single user active authentication, require the verification of identity of multiple subjects. Both traditional verification and identification-based solutions fail to address the specific challenges presented in this problem. We introduce Ex...
Saved in:
Published in | IEEE transactions on information forensics and security Vol. 14; no. 5; pp. 1240 - 1250 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
New York
IEEE
01.05.2019
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Multiple user active authentications, in contrast with the single user active authentication, require the verification of identity of multiple subjects. Both traditional verification and identification-based solutions fail to address the specific challenges presented in this problem. We introduce Extremal Openset Rejection, a two-fold mechanism with a sparse representation-based identification step and a verification step for this purpose. In the verification step, concentration of the sparsity vector and the overlap between matched and non-matched distributions are considered for decision making. We introduce a semi-parametric model based on Extreme Value Theory for modeling the distributions, and an algorithm to estimate the parameters of extreme value distributions. Effectiveness of the proposed method is demonstrated using three publicly available face-based mobile active authentication data sets. |
---|---|
AbstractList | Multiple user active authentications, in contrast with the single user active authentication, require the verification of identity of multiple subjects. Both traditional verification and identification-based solutions fail to address the specific challenges presented in this problem. We introduce Extremal Openset Rejection, a two-fold mechanism with a sparse representation-based identification step and a verification step for this purpose. In the verification step, concentration of the sparsity vector and the overlap between matched and non-matched distributions are considered for decision making. We introduce a semi-parametric model based on Extreme Value Theory for modeling the distributions, and an algorithm to estimate the parameters of extreme value distributions. Effectiveness of the proposed method is demonstrated using three publicly available face-based mobile active authentication data sets. |
Author | Perera, Pramuditha Patel, Vishal M. |
Author_xml | – sequence: 1 givenname: Pramuditha surname: Perera fullname: Perera, Pramuditha email: pperera3@jhu.edu organization: Dept. of Electr. & Comput. Eng., Johns Hopkins Univ., Baltimore, MD, USA – sequence: 2 givenname: Vishal M. surname: Patel fullname: Patel, Vishal M. email: vpatel36@jhu.edu organization: Dept. of Electr. & Comput. Eng., Johns Hopkins Univ., Baltimore, MD, USA |
BookMark | eNp9kEFLw0AQhRepYFv9AeIl4Dl1ZzfZ3dys1WqhxYPtedlsJrglJjW7KfjvTa304EEYmIF53zzmjcigbmok5BroBIBmd-vF_G3CKKgJU1LIRJ2RIaSpiAVlMDjNwC_IyPstpUkCQg3J_dxYjB-MxyJadVVwuwqjjcc2mtrg9hhNu_COdXDWBNfUUV-rJne96BH3zqK_JOelqTxe_fYx2cyf1rOXePn6vJhNl7FlGQ9xVlhhKUsMcKmQ5pYVPCuNKhgUXJbM9MtCYirzPOnXomRgck5BFimzqJCPye3x7q5tPjv0QW-brq17S81AUpFlTIleBUeVbRvvWyz1rnUfpv3SQPUhKH0ISh-C0r9B9Yz8w1gXfr4NrXHVv-TNkXSIeHJSKYUsFfwb9EN3Mw |
CODEN | ITIFA6 |
CitedBy_id | crossref_primary_10_1109_TIFS_2023_3262125 crossref_primary_10_1109_TIFS_2019_2912552 crossref_primary_10_1051_sands_2024003 crossref_primary_10_1109_LSP_2019_2913022 crossref_primary_10_1109_ACCESS_2022_3185016 crossref_primary_10_1109_TMC_2021_3106256 crossref_primary_10_1109_JIOT_2023_3264274 crossref_primary_10_1109_TMC_2022_3216868 crossref_primary_10_3390_s21010092 crossref_primary_10_1016_j_imu_2021_100624 crossref_primary_10_1007_s11042_022_13245_9 crossref_primary_10_1007_s11036_020_01706_0 crossref_primary_10_1109_MIC_2020_2971447 crossref_primary_10_3390_s21175967 crossref_primary_10_1109_ACCESS_2024_3411783 crossref_primary_10_1109_TIFS_2020_3045937 crossref_primary_10_1109_TIFS_2023_3288689 crossref_primary_10_1109_TBIOM_2020_3024263 crossref_primary_10_1016_j_cose_2024_104285 crossref_primary_10_1109_ACCESS_2020_3008019 crossref_primary_10_1007_s10916_019_1468_1 crossref_primary_10_3390_s22186980 crossref_primary_10_1109_TIP_2019_2917862 crossref_primary_10_1145_3572909 crossref_primary_10_32604_csse_2023_025672 crossref_primary_10_1016_j_patcog_2025_111352 crossref_primary_10_1109_TIFS_2023_3255585 crossref_primary_10_1016_j_pmcj_2023_101801 |
Cites_doi | 10.1109/BTAS.2012.6374552 10.1109/ICB.2015.7139043 10.1109/TSP.2009.2031285 10.1109/MSP.2016.2555335 10.1109/CVPR.2005.177 10.1109/TPAMI.2008.79 10.1109/FG.2017.51 10.1109/TPAMI.2014.2321392 10.1109/TPAMI.2012.256 10.1109/TIFS.2012.2189205 10.1109/ICASSP.2015.7178258 10.1109/BTAS.2015.7358748 10.1109/BTAS.2016.7791155 10.1109/BTAS.2014.6996246 10.1109/BTAS.2013.6712758 10.1109/SPMB.2015.7405470 10.1109/BTAS.2016.7791164 10.1109/WACV.2015.35 10.1109/TPAMI.2016.2613924 10.1016/0047-259X(90)90080-2 10.1109/ICMEW.2012.116 10.1109/TIFS.2012.2225048 |
ContentType | Journal Article |
Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2019 |
Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2019 |
DBID | 97E RIA RIE AAYXX CITATION 7SC 7SP 7TB 8FD FR3 JQ2 KR7 L7M L~C L~D |
DOI | 10.1109/TIFS.2018.2876748 |
DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005-present IEEE All-Society Periodicals Package (ASPP) 1998-Present IEEE Electronic Library (IEL) CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Mechanical & Transportation Engineering Abstracts Technology Research Database Engineering Research Database ProQuest Computer Science Collection Civil Engineering Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
DatabaseTitle | CrossRef Civil Engineering Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Mechanical & Transportation Engineering Abstracts Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Engineering Research Database Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Civil Engineering Abstracts |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Computer Science |
EISSN | 1556-6021 |
EndPage | 1250 |
ExternalDocumentID | 10_1109_TIFS_2018_2876748 8501956 |
Genre | orig-research |
GrantInformation_xml | – fundername: Office of Naval Research grantid: YIP N00014-16-1-3134 funderid: 10.13039/100000006 |
GroupedDBID | 0R~ 29I 4.4 5GY 5VS 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABQJQ ABVLG ACGFS ACIWK AENEX AETIX AGQYO AGSQL AHBIQ AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 EBS EJD HZ~ IFIPE IPLJI JAVBF LAI M43 O9- OCL P2P PQQKQ RIA RIE RNS AAYXX CITATION RIG 7SC 7SP 7TB 8FD FR3 JQ2 KR7 L7M L~C L~D |
ID | FETCH-LOGICAL-c293t-9dc6c024a1378e0bc2d39fa8d21d37f2ac02d7e57bb4e0b6f21ab3017d52ce8e3 |
IEDL.DBID | RIE |
ISSN | 1556-6013 |
IngestDate | Mon Jun 30 02:37:07 EDT 2025 Tue Jul 01 02:34:14 EDT 2025 Thu Apr 24 22:59:40 EDT 2025 Wed Aug 27 02:47:27 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 5 |
Language | English |
License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html https://doi.org/10.15223/policy-029 https://doi.org/10.15223/policy-037 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c293t-9dc6c024a1378e0bc2d39fa8d21d37f2ac02d7e57bb4e0b6f21ab3017d52ce8e3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0003-2821-6367 0000-0002-5239-692X |
PQID | 2170699286 |
PQPubID | 85506 |
PageCount | 11 |
ParticipantIDs | crossref_primary_10_1109_TIFS_2018_2876748 proquest_journals_2170699286 ieee_primary_8501956 crossref_citationtrail_10_1109_TIFS_2018_2876748 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2019-05-01 |
PublicationDateYYYYMMDD | 2019-05-01 |
PublicationDate_xml | – month: 05 year: 2019 text: 2019-05-01 day: 01 |
PublicationDecade | 2010 |
PublicationPlace | New York |
PublicationPlace_xml | – name: New York |
PublicationTitle | IEEE transactions on information forensics and security |
PublicationTitleAbbrev | TIFS |
PublicationYear | 2019 |
Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref13 ref15 ref14 ref30 ref11 jain (ref12) 2014 ref16 ref19 ref18 bensalah (ref1) 2010 martin (ref17) 2001 gibert-serra (ref10) 2015 scheirer (ref26) 2010 ref24 ref23 pelecanos (ref20) 2008 ref25 ref22 ref21 bolle (ref2) 2003 ref28 ref27 ref29 ref8 ref7 ref9 ref4 ref3 ref5 dey (ref6) 2016 |
References_xml | – ident: ref13 doi: 10.1109/BTAS.2012.6374552 – ident: ref4 doi: 10.1109/ICB.2015.7139043 – start-page: 68 year: 2010 ident: ref26 article-title: Robust fusion: Extreme value theory for recognition score normalization publication-title: Proc Eur Conf Comp Vis (ECCV) – ident: ref3 doi: 10.1109/TSP.2009.2031285 – year: 2016 ident: ref6 publication-title: Extreme Value Modeling and Risk Analysis Methods and Applications – start-page: 393 year: 2014 ident: ref12 article-title: Multi-class open set recognition using probability of inclusion publication-title: Proc Eur Conf Comput Vis (ECCV) – ident: ref7 doi: 10.1109/MSP.2016.2555335 – ident: ref5 doi: 10.1109/CVPR.2005.177 – ident: ref27 doi: 10.1109/TPAMI.2008.79 – ident: ref21 doi: 10.1109/FG.2017.51 – ident: ref23 doi: 10.1109/TPAMI.2014.2321392 – ident: ref24 doi: 10.1109/TPAMI.2012.256 – ident: ref19 doi: 10.1109/TIFS.2012.2189205 – start-page: 239 year: 2001 ident: ref17 article-title: Speaker recognition in a multi-speaker environment publication-title: Proc Eur Conf Speech Commun Technol (Interspeech) – ident: ref8 doi: 10.1109/ICASSP.2015.7178258 – ident: ref22 doi: 10.1109/BTAS.2015.7358748 – ident: ref15 doi: 10.1109/BTAS.2016.7791155 – ident: ref30 doi: 10.1109/BTAS.2014.6996246 – year: 2010 ident: ref1 publication-title: Steps in Applying Extreme Value Theory to Finance A Review – ident: ref25 doi: 10.1109/BTAS.2013.6712758 – ident: ref16 doi: 10.1109/SPMB.2015.7405470 – ident: ref14 doi: 10.1109/BTAS.2016.7791164 – ident: ref29 doi: 10.1109/WACV.2015.35 – year: 2003 ident: ref2 publication-title: Guide to Biometrics – start-page: 131 year: 2015 ident: ref10 article-title: Sequential score adaptation with extreme value theory for robust railway track inspection publication-title: Proc IEEE Int Conf Comput Vis (ICCV) – start-page: 203 year: 2008 ident: ref20 publication-title: Conversational Biometrics A Probabilistic View – ident: ref28 doi: 10.1109/TPAMI.2016.2613924 – ident: ref11 doi: 10.1016/0047-259X(90)90080-2 – ident: ref18 doi: 10.1109/ICMEW.2012.116 – ident: ref9 doi: 10.1109/TIFS.2012.2225048 |
SSID | ssj0044168 |
Score | 2.4272835 |
Snippet | Multiple user active authentications, in contrast with the single user active authentication, require the verification of identity of multiple subjects. Both... |
SourceID | proquest crossref ieee |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 1240 |
SubjectTerms | active authentication Authentication Biometrics (access control) continuous authentication Decision making Decision theory Dictionaries Electronic devices Extreme value theory Extreme values mobile biometrics Mobile handsets multiuser authentication Open-set recognition Parameter estimation Probes Support vector machines Task analysis |
Title | Face-Based Multiple User Active Authentication on Mobile Devices |
URI | https://ieeexplore.ieee.org/document/8501956 https://www.proquest.com/docview/2170699286 |
Volume | 14 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwED4VJhh4FBDlJQ9MiJTWjpN441kBUlmgElvkx2UBtQjahV_P2XEqXkJIGSzZjiyffd-d7wVwqDNrRKFFopzLkzQXmGhrK2_k5YT4FVfoA4WHd9n1KL19lI8tOJ7HwiBicD7Drm8GW76b2Jl_KjspZAhvW4AFUtzqWK2G6xKq12FvUmYJKRkiWjD7PXXycDO4905cRZfUA19c4wsGhaIqPzhxgJfBKgybhdVeJU_d2dR07fu3nI3_XfkarEQ5k53VB2MdWjhuw2pTw4HFK92G5U8JCTfgdKAtJueEbI4No6shG9EpZWeBLzL_oub9i-qHPkbfcGKIsbBLDCxnE0aDq4eL6yTWWEgsAf2USGQzSzit-yIvsGcsd0JVunC870RecU2dLkeZG5NSd1bxvjbEFHInucUCxRYsjidj3AaWSqkFWm_6JWoobdLCi5ckE0jjlMUO9JpdL21MQO7rYDyXQRHpqdITqvSEKiOhOnA0n_JSZ9_4a_CG3_j5wLjnHdhrSFvG-_lWcp81SCleZDu_z9qFJfq3ql0b92Bx-jrDfRI_puYgnLsPkc7VPA |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3Nb9MwFH8q4wA7rNCC6NaBD5wQ6RK7-fBtZVC10PRCK_UW-ePlMtSi0V746_fsOBUDhJByiGRbifyz3-_Z7wvgrcqMFoUSkbQ2j8a5wEgZUzsjLyfGr7lEFyhcLrPZevx5k2468P4YC4OI3vkMR-7V2_LtzhzcVdlVkfrwtkfwmHg_TZporVbuEq83gW9pmkV0zBDBhpnE8mo1n351blzFiA4IrrzGAxbyZVX-kMWeYKZdKNtfa_xKbkeHvR6Zn79lbfzff38GZ0HTZJNmaTyHDm570G2rOLCwqXtw-ktKwj5cT5XB6ANxm2VlcDZka1qnbOIlI3N3as7DqLnqY_SUO02ihX1EL3RewHr6aXUzi0KVhcgQ1e8JJJMZYmqViLzAWBtuhaxVYXliRV5zRY02xzTXekzNWc0TpUks5DblBgsUL-Fku9viK2AEihJonPGX0JBKjwunYJJWkGorDQ4gbme9MiEFuauE8a3yR5FYVg6oygFVBaAG8O445HuTf-Nfnftu4o8dw5wPYNhCW4Ud-qPiLm-QlLzIzv8-6g08ma3KRbWYL79cwFP6jmwcHYdwsr874CUpI3v92q_Be93H2IU |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Face-Based+Multiple+User+Active+Authentication+on+Mobile+Devices&rft.jtitle=IEEE+transactions+on+information+forensics+and+security&rft.au=Perera%2C+Pramuditha&rft.au=Patel%2C+Vishal+M&rft.date=2019-05-01&rft.pub=The+Institute+of+Electrical+and+Electronics+Engineers%2C+Inc.+%28IEEE%29&rft.issn=1556-6013&rft.eissn=1556-6021&rft.volume=14&rft.issue=5&rft.spage=1240&rft_id=info:doi/10.1109%2FTIFS.2018.2876748&rft.externalDBID=NO_FULL_TEXT |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1556-6013&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1556-6013&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1556-6013&client=summon |