Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014, Article ID 438254, 8 pages
http://dx.doi.org/10.1155/2014/438254
Research Article

Secure and Privacy Enhanced Gait Authentication on Smart Phone

Department of Electronics and Computer Engineering, Chonnam National University, Gwangju 500-757, Republic of Korea

Received 29 January 2014; Accepted 26 February 2014; Published 14 May 2014

Academic Editors: Y. Pan and J. H. Park

Copyright © 2014 Thang Hoang and Deokjai Choi. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Citations to this Article [15 citations]

The following is the list of published articles that have cited the current article.

  • Yingnan Sun, Charence Wong, Guang-Zhong Yang, and Benny Lo, “Secure key generation using gait features for Body Sensor Networks,” 2017 IEEE 14th International Conference on Wearable and Implantable Body Sensor Networks (BSN), pp. 206–210, . View at Publisher · View at Google Scholar
  • Yi Cai, Haotian Jiang, Diliang Chen, and Ming-Chun Huang, “Online learning classifier based behavioral biometrie authentication,” 2018 IEEE 15th International Conference on Wearable and Implantable Body Sensor Networks (BSN), pp. 62–65, . View at Publisher · View at Google Scholar
  • Saud Alotaibi, Steven Furnell, and Nathan Clarke, “Transparent authentication systems for mobile device security: A review,” 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), pp. 406–413, . View at Publisher · View at Google Scholar
  • Weitao Xu, Yiran Shen, Neil Bergmann, and Wen Hu, “Sensor-Assisted Face Recognition System on Smart Glass via Multi-View Sparse Representation Classification,” 2016 15th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN), pp. 1–12, . View at Publisher · View at Google Scholar
  • Weitao Xu, Girish Revadigar, Chengwen Luo, Neil Bergmann, and Wen Hu, “Walkie-Talkie: Motion-Assisted Automatic Key Generation for Secure On-Body Device Communication,” 2016 15th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN), pp. 1–12, . View at Publisher · View at Google Scholar
  • Sebastijan Sprager, and Matjaz B. Juric, “Inertial Sensor-Based Gait Recognition: A Review,” Sensors, vol. 15, no. 9, pp. 22089–22127, 2015. View at Publisher · View at Google Scholar
  • Sebastijan Sprager, and Matjaz B. Juric, “An Efficient HOS-Based Gait Authentication of Accelerometer Data,” Ieee Transactions On Information Forensics And Security, vol. 10, no. 7, pp. 1486–1498, 2015. View at Publisher · View at Google Scholar
  • Christoforos Ntantogian, Stefanos Malliaros, and Christos Xenakis, “Gaithashing: A two-factor authentication scheme based on gait features,” Computers & Security, 2015. View at Publisher · View at Google Scholar
  • Christina-Angeliki Toli, and Bart Preneel, “A survey on multimodal biometrics and the protection of their templates,” IFIP Advances in Information and Communication Technology, vol. 457, pp. 169–184, 2015. View at Publisher · View at Google Scholar
  • Syeda Mariam Muzammal, Munam Ali Shah, Si-Jing Zhang, and Hong-Ji Yang, “Conceivable security risks and authentication techniques for Smart devices: A comparative evaluation of security practices,” International Journal of Automation and Computing, 2016. View at Publisher · View at Google Scholar
  • Muhammad Fiqri Muthohar, I Gde Dharma Nugraha, and Deokjai Choi, “Exploring significant motion sensor for energy-efficient continuous motion and location sampling in mobile sensing application,” International Journal of Technology, vol. 7, no. 1, pp. 38–49, 2016. View at Publisher · View at Google Scholar
  • Alexandre Ferreira, Geise Santos, Anderson Rocha, and Siome Goldenstein, “User-Centric Coordinates for Applications Leveraging 3-Axis Accelerometer Data,” IEEE Sensors Journal, vol. 17, no. 16, pp. 5231–5243, 2017. View at Publisher · View at Google Scholar
  • Zhongliang Deng, and Wenliang Lin, “A novel error correction and encryption algorithm combined fountain code and AES,” International Journal of Communication Systems, vol. 30, no. 16, 2017. View at Publisher · View at Google Scholar
  • Girish Revadigar, Chitra Javali, Weitao Xu, Athanasios V. Vasilakos, Wen Hu, and Sanjay Jha, “Accelerometer and Fuzzy Vault-Based Secure Group Key Generation and Sharing Protocol for Smart Wearables,” IEEE Transactions on Information Forensics and Security, vol. 12, no. 10, pp. 2467–2482, 2017. View at Publisher · View at Google Scholar
  • Weitao Xu, Chitra Javali, Girish Revadigar, Chengwen Luo, Neil Bergmann, and Wen Hu, “Gait-Key,” ACM Transactions on Sensor Networks, vol. 13, no. 1, pp. 1–27, 2017. View at Publisher · View at Google Scholar