Have you permission to answer this phone?

The new frontier of biometrie authentication exploits wearable sensors. At present, there is no need of special equipment. Both cameras of increasing resolution, and MEMS-based sensors (Micro Electro-Mechanical Systems) are ubiquitously embedded in everyday mobile communication devices, especially smartphones. This makes their use economically attractive, and the investigation of the new provided possibilities increasingly widespread. The aim of the present paper is to demonstrate the possibility to control the access to a smartphone by recording and processing the dynamic signals produced by the simple gesture of lifting the phone, possibly in connection with further biometric information provided by ear recognition. In this respect, it continues and extends a previous work, by performing new experiments on a more challenging dataset.

[1]  Sacha Brostoff,et al.  Transforming the ‘Weakest Link’ — a Human/Computer Interaction Approach to Usable and Effective Security , 2001 .

[2]  Maria De Marsico,et al.  Embedded Accelerometer Signal Normalization for Cross-Device Gait Recognition , 2016, 2016 International Conference of the Biometrics Special Interest Group (BIOSIG).

[3]  Michele Nappi,et al.  FIRME: Face and Iris Recognition for Mobile Engagement , 2014, Image Vis. Comput..

[4]  Michele Nappi,et al.  Mobile Iris Challenge Evaluation (MICHE)-I, biometric iris dataset and protocols , 2015, Pattern Recognit. Lett..

[5]  Albrecht Schmidt,et al.  Implicit human computer interaction through context , 2000, Personal Technologies.

[6]  Andrea F. Abate,et al.  I-Am: Implicitly Authenticate Me—Person Authentication on Mobile Devices Through Ear Shape and Arm Gesture , 2019, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[7]  Paul A. Viola,et al.  Rapid object detection using a boosted cascade of simple features , 2001, Proceedings of the 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. CVPR 2001.

[8]  Antonella De Angeli,et al.  Usability and biometric verification at the ATM interface , 2003, CHI '03.

[9]  Andrew S. Patrick,et al.  Usability and Acceptability of Biometric Security Systems , 2004, Financial Cryptography.

[10]  Maria De Marsico,et al.  Biometric Walk Recognizer , 2015, ICIAP Workshops.