Anastasios Drosou

Learn More
This paper presents a novel framework for unobtrusive biometric authentication based on the spatiotemporal analysis of human activities. Initially, the subject’s actions that are recorded by a stereoscopic camera, are detected utilizing motion history images. Then, two novel unobtrusive biometric traits are proposed, namely the static anthropometric profile(More)
This paper introduces activity-related behavioural features that can be automatically extracted from a computer system, with the aim to increase the effectiveness of automatic stress detection. The proposed features are based on processing of appropriate video and accelerometer recordings taken from the monitored subjects. For the purposes of the present(More)
his paper presents a novel framework for dynamic activity-related user authentication utilizing dynamic and static anthropometric information. The recognition of the performed activity is based on Radon transforms that are applied on spatiotemporal motion templates. User authentication is performed exploiting the behavioural variations between different(More)
Automatic human identification is a hot topic with many applications, mainly in security. A common type of facial features used for the purposes of biometric recognition and identification includes geometrical characteristics. To this respect, the current study is performed on a proprietary dataset of 53 subjects (with several frames per subject) by(More)
Unobtrusive Authentication Using ACTIvity-Related and Soft BIOmetrics (ACTIBIO) is an EU Specific Targeted Research Project (STREP) where new types of biometrics are combined with state-of-the-art unobtrusive technologies in order to enhance security in a wide spectrum of applications. The project aims to develop a modular, robust, multimodal biometrics(More)
Mobile devices are evolving and becoming increasingly popular over the last few years. This growth, however, has exposed mobile devices to a large number of security threats. Malware installed in smartphones can be used for a variety of malicious purposes, including stealing personal data, sending spam SMSs, and launching Denial of Service (DoS) attacks(More)