Digital Services        F A Q


Soft Biometrics and Continuous Authentication

Dept. of Computer Science (January 12, 2017)

CONFERENCE / SYMPOSIUM : IAPR/IEEE Winter School on Biometrics

Biometric Data Analysis
Multimodal Biometrics with Auxiliary Information: Quality, User-specific, ...
2D and 3D Face Recognition
Human Identification via Gait Recognition
Hand-Based Biometrics
Recent Progress of Iris Recognition
Mobile Biometrics: Trends and Issues
Deep Learning in Face Analysis
Fingerprint Recognition
Machine Learning for Person Identification
Soft Biometrics and Continuous Authentication
Secure Scalable CCTV, Mobile, and Wearable Video Face Recognition
Biometric Indexing
Face Recognition System Security: Template Protection and Anti-spoofing
MAJOR SPEAKER : Sim, Terence
LENGTH : 99 min.
ACCESS : Open to all
SUMMARY : Most authentication is done as a one-time procedure, before access to a protected resource is granted to the authorized user. For some situations, this one-time authentication may not be sufficient. A highly secure application may wish to guard against 'session hijacking', in which an unauthorized user forcibly takes over an authenticated login session after the legitimate user has successfully logged in. Continuous Authentication is thus necessary. A secure system must be able to, at any time, determine whether or not the authorized user is still the one using the system. Any change in the continued presence of the user, whether by his temporary absence, or by an imposter, must be quickly detected to avoid compromising security.

Continuous Authentication presents numerous challenges: (i) it must be done passively, since it would be impractical to keep interrupting the user to re-authenticate using traditional methods; (ii) it must have minimal computational overhead, as otherwise the system may be too slow to be usable; (iii) it must achieve low false accepts and false rejects; (iv) it must provide authentication certainty even when the user is not using the keyboard or mouse or other input devices.

This lecture will discuss these issues in depth, and explore techniques in which practical Continuous Authentication may be achieved. In particular, the choice of Soft Biometrics (defined as biometrics that, under normal circumstances, does not uniquely identify any particular person, eg. gender) instead of Hard Biometrics, may prove sufficient and efficient for Continuous Authentication. The ubiquity of smart mobile devices provides a new platform for Continuous Authentication to become more mainstream.  [Go to the full record in the library's catalogue]

  ●  Persistent link:
  ●  XML Dublin Core code for metadata harvesting

Recommended for You

This video is presented here with the permission of the speakers. Any downloading, storage, reproduction, and redistribution are strictly prohibited without the prior permission of the respective speakers. Go to Full Disclaimer.

  For enquiries, please contact Digital and Multimedia Services Section

© 2009-2023 All rights reserved