Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (148)

Search Parameters:
Keywords = behavioral biometrics

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
16 pages, 2633 KiB  
Article
Bus Network Adjustment Pre-Evaluation Based on Biometric Recognition and Travel Spatio-Temporal Deduction
by Qingbo Wei, Nanfeng Zhang, Yuan Gao, Cheng Chen, Li Wang and Jingfeng Yang
Algorithms 2024, 17(11), 513; https://doi.org/10.3390/a17110513 - 7 Nov 2024
Viewed by 221
Abstract
A critical component of bus network adjustment is the accurate prediction of potential risks, such as the likelihood of complaints from passengers. Traditional simulation methods, however, face limitations in identifying passengers and understanding how their travel patterns may change. To address this issue, [...] Read more.
A critical component of bus network adjustment is the accurate prediction of potential risks, such as the likelihood of complaints from passengers. Traditional simulation methods, however, face limitations in identifying passengers and understanding how their travel patterns may change. To address this issue, a pre-evaluation method has been developed, leveraging the spatial distribution of bus networks and the spatio-temporal behavior of passengers. The method includes stage of travel demand analysis, accessible path set calculation, passenger assignment, and evaluation of key indicators. First, we explore the actual passengers’ origin and destination (OD) stop from bus card (or passenger Code) payment data and biometric recognition data, with the OD as one of the main input parameters. Second, a digital bus network model is constructed to represent the logical and spatial relationships between routes and stops. Upon inputting bus line adjustment parameters, these relationships allow for the precise and automatic identification of the affected areas, as well as the calculation of accessible paths of each OD pair. Third, the factors influencing passengers’ path selection are analyzed, and a predictive model is built to estimate post-adjustment path choices. A genetic algorithm is employed to optimize the model’s weights. Finally, various metrics, such as changes in travel routes and ride times, are analyzed by integrating passenger profiles. The proposed method was tested on the case of the Guangzhou 543 route adjustment. Results show that the accuracy of the number of predicted trips after adjustment is 89.6%, and the predicted flow of each associated bus line is also consistent with the actual situation. The main reason for the error is that the path selection has a certain level of irrationality, which stems from the fact that the proportion of passengers who choose the minimum cost path for direct travel is about 65%, while the proportion of one-transfer passengers is only about 50%. Overall, the proposed algorithm can quantitatively analyze the impact of rigid travel groups, occasional travel groups, elderly groups, and other groups that are prone to making complaints in response to bus line adjustment. Full article
(This article belongs to the Section Algorithms for Multidisciplinary Applications)
Show Figures

Figure 1

22 pages, 2551 KiB  
Review
A Performance Benchmark for the PostgreSQL and MySQL Databases
by Sanket Vilas Salunke and Abdelkader Ouda
Future Internet 2024, 16(10), 382; https://doi.org/10.3390/fi16100382 - 19 Oct 2024
Viewed by 529
Abstract
This study highlights the necessity for efficient database management in continuous authentication systems, which rely on large-scale behavioral biometric data such as keystroke patterns. A benchmarking framework was developed to evaluate the PostgreSQL and MySQL databases, minimizing repetitive coding through configurable functions and [...] Read more.
This study highlights the necessity for efficient database management in continuous authentication systems, which rely on large-scale behavioral biometric data such as keystroke patterns. A benchmarking framework was developed to evaluate the PostgreSQL and MySQL databases, minimizing repetitive coding through configurable functions and variables. The methodology involved experiments assessing select and insert queries under primary and complex conditions, simulating real-world scenarios. Our quantified results show PostgreSQL’s superior performance in select operations. In primary tests, PostgreSQL’s execution time for 1 million records ranged from 0.6 ms to 0.8 ms, while MySQL’s ranged from 9 ms to 12 ms, indicating that PostgreSQL is about 13 times faster. For select queries with a where clause, PostgreSQL required 0.09 ms to 0.13 ms compared to MySQL’s 0.9 ms to 1 ms, making it roughly 9 times more efficient. Insert operations were similar, with PostgreSQL at 0.0007 ms to 0.0014 ms and MySQL at 0.0010 ms to 0.0030 ms. In complex experiments with simultaneous operations, PostgreSQL maintained stable performance (0.7 ms to 0.9 ms for select queries during inserts), while MySQL’s performance degraded significantly (7 ms to 13 ms). These findings underscore PostgreSQL’s suitability for environments requiring low data latency and robust concurrent processing capabilities, making it ideal for continuous authentication systems. Full article
(This article belongs to the Special Issue Distributed Storage of Large Knowledge Graphs with Mobility Data)
Show Figures

Figure 1

14 pages, 3352 KiB  
Article
Beyond Empathy: Unveiling the Co-Creation Process of Emotions through a Wearable Device
by Bach Q. Ho, Kei Shibuya and Makiko Yoshida
J. Theor. Appl. Electron. Commer. Res. 2024, 19(4), 2714-2727; https://doi.org/10.3390/jtaer19040130 - 8 Oct 2024
Viewed by 987
Abstract
Emotions fluctuate during the process of social interaction. Although the co-creation of emotions through organizational behavior has been discussed theoretically in existing research, there is no method to demonstrate how emotions are co-created. Instead, previous studies have paid much attention to empathy, in [...] Read more.
Emotions fluctuate during the process of social interaction. Although the co-creation of emotions through organizational behavior has been discussed theoretically in existing research, there is no method to demonstrate how emotions are co-created. Instead, previous studies have paid much attention to empathy, in which a person’s emotions are contagious. In contrast to self-report, which is a traditional method that can only assess emotions at a single point in time and adapts to empathy, biometric technology has made it possible to analyze emotional fluctuations over time. However, previous studies have focused only on understanding the emotional fluctuations of individuals separately. In the present study, we developed a system to measure the co-creation of emotions using a wearable device. The pulse rate was converted into valence as a positive–negative emotion, and the fluctuations in valence were analyzed by cross-correlation. We demonstrated the feasibility of the proposed system through triangulation by integrating biometrics with observation and self-report. The proposed system was verified to measure the co-creation of pair and group emotions using real-world data beyond laboratory settings. The present study contributes to business administration by proposing a critical concept for measuring the co-creation of emotions based on a constructionist approach. Full article
Show Figures

Figure 1

12 pages, 2605 KiB  
Entry
Eye-Tracking Applications in Architecture and Design
by Alexandros A. Lavdas
Encyclopedia 2024, 4(3), 1312-1323; https://doi.org/10.3390/encyclopedia4030086 - 13 Sep 2024
Viewed by 1142
Definition
Eye-tracking is a biometrics technique that has started to find applications in research related to our interaction with the built environment. Depending on the focus of a given study, the collection of valence and arousal measurements can also be conducted to acquire emotional, [...] Read more.
Eye-tracking is a biometrics technique that has started to find applications in research related to our interaction with the built environment. Depending on the focus of a given study, the collection of valence and arousal measurements can also be conducted to acquire emotional, cognitive, and behavioral insights and correlate them with eye-tracking data. These measurements can give architects and designers a basis for data-driven decision-making throughout the design process. In instances involving existing structures, biometric data can also be utilized for post-occupancy analysis. This entry will discuss eye-tracking and eye-tracking simulation in the context of our current understanding of the importance of our interaction with the built environment for both physical and mental well-being. Full article
(This article belongs to the Section Behavioral Sciences)
Show Figures

Figure 1

16 pages, 1547 KiB  
Article
Deep Learning System for User Identification Using Sensors on Doorknobs
by Jesús Vegas, A. Ravishankar Rao and César Llamas
Sensors 2024, 24(15), 5072; https://doi.org/10.3390/s24155072 - 5 Aug 2024
Viewed by 760
Abstract
Door access control systems are important to protect the security and integrity of physical spaces. Accuracy and speed are important factors that govern their performance. In this paper, we investigate a novel approach to identify users by measuring patterns of their interactions with [...] Read more.
Door access control systems are important to protect the security and integrity of physical spaces. Accuracy and speed are important factors that govern their performance. In this paper, we investigate a novel approach to identify users by measuring patterns of their interactions with a doorknob via an embedded accelerometer and gyroscope and by applying deep-learning-based algorithms to these measurements. Our identification results obtained from 47 users show an accuracy of 90.2%. When the sex of the user is used as an input feature, the accuracy is 89.8% in the case of male individuals and 97.0% in the case of female individuals. We study how the accuracy is affected by the sample duration, finding that is its possible to identify users using a sample of 0.5 s with an accuracy of 68.5%. Our results demonstrate the feasibility of using patterns of motor activity to provide access control, thus extending with it the set of alternatives to be considered for behavioral biometrics. Full article
(This article belongs to the Section Intelligent Sensors)
Show Figures

Figure 1

15 pages, 603 KiB  
Article
Combining BioTRIZ and Multi-Factor Coupling for Bionic Mechatronic System Design
by Bingxin Wang and Dehong Yu
Appl. Sci. 2024, 14(14), 6021; https://doi.org/10.3390/app14146021 - 10 Jul 2024
Viewed by 606
Abstract
To realize the design process of bionic mechatronic systems, involving mapping from engineering to biology and inversion from biology to engineering, a novel design paradigm is introduced that integrates BioTRIZ with multi-factor coupling bionics. In the mapping stage from engineering to biology, BioTRIZ [...] Read more.
To realize the design process of bionic mechatronic systems, involving mapping from engineering to biology and inversion from biology to engineering, a novel design paradigm is introduced that integrates BioTRIZ with multi-factor coupling bionics. In the mapping stage from engineering to biology, BioTRIZ is employed to frame the concrete engineering issue as a general conflicting problem. The biological solution is refined by amalgamating the BioTRIZ solution derived from the contradiction matrix with biological instances. In the inversion stage of biology to engineering, a novel approach is proposed for constructing a bionic multi-factor coupling model, drawing inspiration from the establishment of biological multi-factor coupling model. This allows for a seamless correspondence between biological elements, such as morphology and behavior, and their respective engineering counterparts, including structure and algorithms. This correspondence ultimately achieves the engineering conceptual model that is rooted in biological principles. The practical application of this methodology is exemplified through a multi-biometric fusion bionic active vision system, underscoring its feasibility and efficacy. Full article
(This article belongs to the Special Issue Mechatronics System Design in Medical Engineering)
Show Figures

Figure 1

31 pages, 382 KiB  
Article
The Emerging Challenges of Wearable Biometric Cryptosystems
by Khalid Al Ajlan, Tariq Alsboui, Omar Alshaikh, Isa Inuwa-Dute, Saad Khan and Simon Parkinson
Cryptography 2024, 8(3), 27; https://doi.org/10.3390/cryptography8030027 - 21 Jun 2024
Viewed by 1404
Abstract
Cryptographic key generation and data encryption and decryption using wearable biometric technologies is an emerging research area with significant potential for authentication and communication security. The research area is rapidly developing, and a comprehensive review of recently published literature is necessary to establish [...] Read more.
Cryptographic key generation and data encryption and decryption using wearable biometric technologies is an emerging research area with significant potential for authentication and communication security. The research area is rapidly developing, and a comprehensive review of recently published literature is necessary to establish emerging challenges. This research article aims to critically investigate and synthesize current research using biometric cryptosystems that use behavior or medico-chemical characteristics, ranging from gate analysis to gaze tracking. The study will summarize the state of knowledge, identify critical research gaps, and provide insight into promising future implications and applications that can enable the realization of user-specific and resilient solutions for authentication and secure communication demands. Full article
Show Figures

Figure 1

16 pages, 1194 KiB  
Article
CoreTemp: Coreset Sampled Templates for Multimodal Mobile Biometrics
by Jaeho Yoon, Jaewoo Park, Jungyun Kim and Andrew Beng Jin Teoh
Appl. Sci. 2024, 14(12), 5183; https://doi.org/10.3390/app14125183 - 14 Jun 2024
Viewed by 847
Abstract
Smart devices have become the core ingredient in maintaining human society, where their applications span basic telecommunication, entertainment, education, and even critical security tasks. However, smartphone security measures have not kept pace with their ubiquitousness and convenience, exposing users to potential security breaches. [...] Read more.
Smart devices have become the core ingredient in maintaining human society, where their applications span basic telecommunication, entertainment, education, and even critical security tasks. However, smartphone security measures have not kept pace with their ubiquitousness and convenience, exposing users to potential security breaches. Shading light on shortcomings of traditional security measures such as PINs gives rise to biometrics-based security measures. Open-set authentication with pretrained Transformers especially shows competitive performance in this context. Bringing this closer to practice, we propose CoreTemp, a greedy coreset sampled template, which offers substantially faster authentication speeds. In parallel with CoreTemp, we design a fast match algorithm where the combination shows robust performance in open-set mobile biometrics authentication. Designed to resemble the effects of ensembles with marginal increment in computation, we propose PIEformer+, where its application with CoreTemp has state-of-the-art performance. Benefiting from much more efficient authentication speeds to the best of our knowledge, we are the first to attempt identification in this context. Our proposed methodology achieves state-of-the-art results on HMOG and BBMAS datasets, particularly with much lower computational costs. In summary, this research introduces a novel integration of greedy coreset sampling with an advanced form of pretrained, implicitly ensembled Transformers (PIEformer+), greatly enhancing the speed and efficiency of mobile biometrics authentication, and also enabling identification, which sets a new benchmark in the relevant field. Full article
(This article belongs to the Section Computing and Artificial Intelligence)
Show Figures

Figure 1

16 pages, 526 KiB  
Article
The Improved Biometric Identification of Keystroke Dynamics Based on Deep Learning Approaches
by Łukasz Wyciślik, Przemysław Wylężek and Alina Momot
Sensors 2024, 24(12), 3763; https://doi.org/10.3390/s24123763 - 9 Jun 2024
Viewed by 1126
Abstract
In an era marked by escalating concerns about digital security, biometric identification methods have gained paramount importance. Despite the increasing adoption of biometric techniques, keystroke dynamics analysis remains a less explored yet promising avenue. This study highlights the untapped potential of keystroke dynamics, [...] Read more.
In an era marked by escalating concerns about digital security, biometric identification methods have gained paramount importance. Despite the increasing adoption of biometric techniques, keystroke dynamics analysis remains a less explored yet promising avenue. This study highlights the untapped potential of keystroke dynamics, emphasizing its non-intrusive nature and distinctiveness. While keystroke dynamics analysis has not achieved widespread usage, ongoing research indicates its viability as a reliable biometric identifier. This research builds upon the existing foundation by proposing an innovative deep-learning methodology for keystroke dynamics-based identification. Leveraging open research datasets, our approach surpasses previously reported results, showcasing the effectiveness of deep learning in extracting intricate patterns from typing behaviors. This article contributes to the advancement of biometric identification, shedding light on the untapped potential of keystroke dynamics and demonstrating the efficacy of deep learning in enhancing the precision and reliability of identification systems. Full article
(This article belongs to the Special Issue AI Technology for Cybersecurity and IoT Applications)
Show Figures

Figure 1

57 pages, 30349 KiB  
Review
Recent Trends of Authentication Methods in Extended Reality: A Survey
by Louisa Hallal, Jason Rhinelander and Ramesh Venkat
Appl. Syst. Innov. 2024, 7(3), 45; https://doi.org/10.3390/asi7030045 - 28 May 2024
Viewed by 2417
Abstract
Extended Reality (XR) is increasingly gaining momentum in industries such as retail, health, and education. To protect users’ personal data, establishing a secure authentication system for XR devices becomes essential. Recently, the focus on authentication methods for XR devices has been limited. To [...] Read more.
Extended Reality (XR) is increasingly gaining momentum in industries such as retail, health, and education. To protect users’ personal data, establishing a secure authentication system for XR devices becomes essential. Recently, the focus on authentication methods for XR devices has been limited. To further our understanding of this topic, we surveyed authentication schemes, particularly systems and methods deployed in XR settings. In this survey, we focused on reviewing and evaluating papers published during the last decade (between 2014 and 2023). We compared knowledge-based authentication, physical biometrics, behavioral biometrics, and multi-model methods in terms of accuracy, security, and usability. We also highlighted the benefits and drawbacks of those methods. These highlights will direct future Human–computer Interaction (HCI) and security research to develop secure, reliable, and practical authentication systems. Full article
Show Figures

Figure 1

14 pages, 546 KiB  
Review
Wearable Sensors in Other Medical Domains with Application Potential for Orthopedic Trauma Surgery—A Narrative Review
by Carolina Vogel, Bernd Grimm, Meir T. Marmor, Sureshan Sivananthan, Peter H. Richter, Seth Yarboro, Andrew M. Hanflik, Tina Histing and Benedikt J. Braun
J. Clin. Med. 2024, 13(11), 3134; https://doi.org/10.3390/jcm13113134 - 27 May 2024
Viewed by 1255
Abstract
The use of wearable technology is steadily increasing. In orthopedic trauma surgery, where the musculoskeletal system is directly affected, focus has been directed towards assessing aspects of physical functioning, activity behavior, and mobility/disability. This includes sensors and algorithms to monitor real-world walking speed, [...] Read more.
The use of wearable technology is steadily increasing. In orthopedic trauma surgery, where the musculoskeletal system is directly affected, focus has been directed towards assessing aspects of physical functioning, activity behavior, and mobility/disability. This includes sensors and algorithms to monitor real-world walking speed, daily step counts, ground reaction forces, or range of motion. Several specific reviews have focused on this domain. In other medical fields, wearable sensors and algorithms to monitor digital biometrics have been used with a focus on domain-specific health aspects such as heart rate, sleep, blood oxygen saturation, or fall risk. This review explores the most common clinical and research use cases of wearable sensors in other medical domains and, from it, derives suggestions for the meaningful transfer and application in an orthopedic trauma context. Full article
Show Figures

Figure 1

11 pages, 2095 KiB  
Communication
Enhancing Resilience in Biometric Research: Generation of 3D Synthetic Face Data Using Advanced 3D Character Creation Techniques from High-Fidelity Video Games and Animation
by Florian Erwin Blümel, Mathias Schulz, Ralph Breithaupt, Norbert Jung and Robert Lange
Sensors 2024, 24(9), 2750; https://doi.org/10.3390/s24092750 - 25 Apr 2024
Viewed by 1070
Abstract
Biometric authentication plays a vital role in various everyday applications with increasing demands for reliability and security. However, the use of real biometric data for research raises privacy concerns and data scarcity issues. A promising approach using synthetic biometric data to address the [...] Read more.
Biometric authentication plays a vital role in various everyday applications with increasing demands for reliability and security. However, the use of real biometric data for research raises privacy concerns and data scarcity issues. A promising approach using synthetic biometric data to address the resulting unbalanced representation and bias, as well as the limited availability of diverse datasets for the development and evaluation of biometric systems, has emerged. Methods for a parameterized generation of highly realistic synthetic data are emerging and the necessary quality metrics to prove that synthetic data can compare to real data are open research tasks. The generation of 3D synthetic face data using game engines’ capabilities of generating varied realistic virtual characters is explored as a possible alternative for generating synthetic face data while maintaining reproducibility and ground truth, as opposed to other creation methods. While synthetic data offer several benefits, including improved resilience against data privacy concerns, the limitations and challenges associated with their usage are addressed. Our work shows concurrent behavior in comparing semi-synthetic data as a digital representation of a real identity with their real datasets. Despite slight asymmetrical performance in comparison with a larger database of real samples, a promising performance in face data authentication is shown, which lays the foundation for further investigations with digital avatars and the creation and analysis of fully synthetic data. Future directions for improving synthetic biometric data generation and their impact on advancing biometrics research are discussed. Full article
(This article belongs to the Special Issue New Trends in Biometric Sensing and Information Processing)
Show Figures

Figure 1

24 pages, 20100 KiB  
Article
Continuous Authentication in the Digital Age: An Analysis of Reinforcement Learning and Behavioral Biometrics
by Priya Bansal and Abdelkader Ouda
Computers 2024, 13(4), 103; https://doi.org/10.3390/computers13040103 - 18 Apr 2024
Cited by 1 | Viewed by 2410
Abstract
This research article delves into the development of a reinforcement learning (RL)-based continuous authentication system utilizing behavioral biometrics for user identification on computing devices. Keystroke dynamics are employed to capture unique behavioral biometric signatures, while a reward-driven RL model is deployed to authenticate [...] Read more.
This research article delves into the development of a reinforcement learning (RL)-based continuous authentication system utilizing behavioral biometrics for user identification on computing devices. Keystroke dynamics are employed to capture unique behavioral biometric signatures, while a reward-driven RL model is deployed to authenticate users throughout their sessions. The proposed system augments conventional authentication mechanisms, fortifying them with an additional layer of security to create a robust continuous authentication framework compatible with static authentication systems. The methodology entails training an RL model to discern atypical user typing patterns and identify potentially suspicious activities. Each user’s historical data are utilized to train an agent, which undergoes preprocessing to generate episodes for learning purposes. The environment involves the retrieval of observations, which are intentionally perturbed to facilitate learning of nonlinear behaviors. The observation vector encompasses both ongoing and summarized features. A binary and minimalist reward function is employed, with principal component analysis (PCA) utilized for encoding ongoing features, and the double deep Q-network (DDQN) algorithm implemented through a fully connected neural network serving as the policy net. Evaluation results showcase training accuracy and equal error rate (EER) ranging from 94.7% to 100% and 0 to 0.0126, respectively, while test accuracy and EER fall within the range of approximately 81.06% to 93.5% and 0.0323 to 0.11, respectively, for all users as encoder features increase in number. These outcomes are achieved through RL’s iterative refinement of rewards via trial and error, leading to enhanced accuracy over time as more data are processed and incorporated into the system. Full article
(This article belongs to the Section ICT Infrastructures for Cybersecurity)
Show Figures

Figure 1

16 pages, 1280 KiB  
Article
Versatile Machine Learning-Based Authentications by Using Enhanced Time-Sliced Electrocardiograms
by Yi Zhao and Song-Kyoo Kim
Information 2024, 15(4), 187; https://doi.org/10.3390/info15040187 - 29 Mar 2024
Viewed by 1112
Abstract
This paper addresses the enhancement of modern security through the integration of electrocardiograms (ECGs) into biometric authentication systems. As technology advances, the demand for reliable identity authentication systems has grown, given the rise in breaches associated with traditional techniques that rely on unique [...] Read more.
This paper addresses the enhancement of modern security through the integration of electrocardiograms (ECGs) into biometric authentication systems. As technology advances, the demand for reliable identity authentication systems has grown, given the rise in breaches associated with traditional techniques that rely on unique biological and behavioral traits. These techniques are emerging as more reliable alternatives. Among the biological features used for authentication, ECGs offer unique advantages, including resistance to forgery, real-time detection, and continuous identification ability. A key contribution of this work is the introduction of a variant of the ECG time-slicing technique that outperforms existing ECG-based authentication methods. By leveraging machine learning algorithms and tailor-made compact data learning techniques, this research presents a more robust, reliable biometric authentication system. The findings could lead to significant advancements in network information security, with potential applications across various internet and mobile services. Full article
(This article belongs to the Section Information Applications)
Show Figures

Figure 1

15 pages, 2136 KiB  
Article
Self-Supervised Open-Set Speaker Recognition with Laguerre–Voronoi Descriptors
by Abu Quwsar Ohi and Marina L. Gavrilova
Sensors 2024, 24(6), 1996; https://doi.org/10.3390/s24061996 - 21 Mar 2024
Viewed by 963
Abstract
Speaker recognition is a challenging problem in behavioral biometrics that has been rigorously investigated over the last decade. Although numerous supervised closed-set systems inherit the power of deep neural networks, limited studies have been made on open-set speaker recognition. This paper proposes a [...] Read more.
Speaker recognition is a challenging problem in behavioral biometrics that has been rigorously investigated over the last decade. Although numerous supervised closed-set systems inherit the power of deep neural networks, limited studies have been made on open-set speaker recognition. This paper proposes a self-supervised open-set speaker recognition that leverages the geometric properties of speaker distribution for accurate and robust speaker verification. The proposed framework consists of a deep neural network incorporating a wider viewpoint of temporal speech features and Laguerre–Voronoi diagram-based speech feature extraction. The deep neural network is trained with a specialized clustering criterion that only requires positive pairs during training. The experiments validated that the proposed system outperformed current state-of-the-art methods in open-set speaker recognition and cluster representation. Full article
(This article belongs to the Section Sensor Networks)
Show Figures

Figure 1

Back to TopTop