Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014, Article ID 438254, 8 pages
http://dx.doi.org/10.1155/2014/438254
Research Article

Secure and Privacy Enhanced Gait Authentication on Smart Phone

Department of Electronics and Computer Engineering, Chonnam National University, Gwangju 500-757, Republic of Korea

Received 29 January 2014; Accepted 26 February 2014; Published 14 May 2014

Academic Editors: Y. Pan and J. H. Park

Copyright © 2014 Thang Hoang and Deokjai Choi. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. J. C. Augusto, V. Callaghan, D. Cook, A. Kameas, and I. Satoh, “Intelligent Environments: a manifesto,” Human-Centric Computing and Information Sciences, vol. 3, no. 1, pp. 1–23, 2013. View at Publisher · View at Google Scholar
  2. C. L. Tsai, C. J. Chen, and D. J. Zhuang, “Trusted M-banking Verification Scheme based on a combination of OTP and Biometrics,” Journal of Convergence, vol. 3, no. 3, pp. 23–29, 2012. View at Google Scholar
  3. J. K. Y. Ng, “Ubiquitous healthcare: healthcare systems and applications enabled by mobile and wireless technologies,” Journal of Convergence, vol. 3, no. 2, pp. 15–20, 2012. View at Google Scholar
  4. J. Ahn and R. Han, “An indoor augmented-reality evacuation system for the Smartphone using personalized Pedometry,” Human-Centric Computing and Information Sciences, vol. 2, no. 1, pp. 1–23, 2012. View at Google Scholar
  5. T. Teraoka, “Organization and exploration of heterogeneous personal data collected in daily life,” Human-Centric Computing and Information Sciences, vol. 2, no. 1, pp. 1–15, 2012. View at Google Scholar
  6. L. Birgale and M. Kokare, “Iris recognition using ridgelets,” Journal of Information Processing Systems, vol. 8, no. 3, pp. 445–458, 2012. View at Google Scholar
  7. S. D. Bharkad and M. Kokare, “Hartley transform based fingerprint matching,” Journal of Information Processing Systems, vol. 8, no. 1, pp. 85–100, 2012. View at Google Scholar
  8. M. P. Satone and G. K. Kharate, “Face recognition based on PCA on wavelet subband of Average-Half-Face,” Journal of Information Processing Systems, vol. 8, no. 3, pp. 483–494, 2012. View at Google Scholar
  9. T. Hoang, T. Nguyen, C. Luong, S. Do, and D. Choi, “Adaptive cross-device gait recognition using a mobile accelerometer,” Journal of Information Processing Systems, vol. 9, no. 2, pp. 333–348, 2013. View at Publisher · View at Google Scholar
  10. A. Juels and M. Wattenberg, “Fuzzy commitment scheme,” in Proceedings of the 6th ACM Conference on Computer and Communications Security (CCS '99), pp. 28–36, November 1999. View at Scopus
  11. C. Rathgeb and A. Uhl, “A survey on biometric cryptosystems and cancelable biometrics,” EURASIP Journal on Information Security, vol. 2011, article 3, 2011. View at Publisher · View at Google Scholar
  12. R. Álvarez Mariño, F. H. Álvarez, and L. H. Encinas, “A crypto-biometric scheme based on iris-templates with fuzzy extractors,” Information Sciences, vol. 195, pp. 91–102, 2012. View at Publisher · View at Google Scholar
  13. M. van der Veen, T. Kevenaar, G.-J. Schrijen, T. H. Akkermans, and F. Zuo, “Face biometrics with renewable templates,” in Security, Steganography, and Watermarking of Multimedia Contents VIII, vol. 6072 of Proceedings of the SPIE, January 2006. View at Publisher · View at Google Scholar · View at Scopus
  14. P. Li, X. Yang, H. Qiao, K. Cao, E. Liu, and J. Tian, “An effective biometric cryptosystem combining fingerprints with error correction codes,” Expert Systems with Applications, vol. 39, no. 7, pp. 6562–6574, 2012. View at Publisher · View at Google Scholar · View at Scopus
  15. E. Maiorana, “Biometric cryptosystem using function based on-line signature recognition,” Expert Systems with Applications, vol. 37, no. 4, pp. 3454–3461, 2010. View at Publisher · View at Google Scholar · View at Scopus
  16. B. Carrara and C. Adams, “You are the key: generating cryptographic keys from voice biometrics,” in Proceedings of the 8th International Conference on Privacy, Security and Trust (PST '10), pp. 213–222, August 2010. View at Publisher · View at Google Scholar · View at Scopus
  17. F. Hao, R. Anderson, and J. Daugman, “Combining crypto with biometrics effectively,” IEEE Transactions on Computers, vol. 55, no. 9, pp. 1081–1088, 2006. View at Publisher · View at Google Scholar · View at Scopus
  18. Y. Dodis, L. Reyzin, and A. Smith, “Fuzzy extractors: how to generate strong keys from biometrics and other noisy data,” in Advances in Cryptology-Eurocrypt 2004, pp. 523–540, Springer, Berlin, Germany, 2004. View at Google Scholar
  19. Q. Li, Y. Sutcu, and N. Memon, “Secure sketch for biometric templates,” in Advances in Cryptology-ASIACRYPT 2006, pp. 99–113, Springer, Berlin, Germany, 2006. View at Google Scholar
  20. R. H. Morelos-Zaragoza, The Art of Error Correcting Coding, John Wiley & Sons, Chichester, UK, 2002.