Biometric authentication based on eye movements by using scan-path comparison algorithms

@inproceedings{QuintanaNevrez2017BiometricAB,
  title={Biometric authentication based on eye movements by using scan-path comparison algorithms},
  author={Carlos-Alberto Quintana-Nev{\'a}rez and Francisco L{\'o}pez-Orozco and Rogelio Florencia-Ju{\'a}rez},
  year={2017}
}
This paper presents an approach for an authentication method of people by using their eye movements. Our method is based on a simple scan-path comparison. People’s eye movements were recorded by using an eye tracker when they were drawing a personal identification number (PIN) on a screen numeric pad. Data was analyzed using the Eyenalysis algorithm to measure the similarity of scan-paths by calculating and normalizing the distance in pixels for each point in the scan-paths. In the results of a… CONTINUE READING

Similar Papers

References

Publications referenced by this paper.
SHOWING 1-10 OF 23 REFERENCES

and J

J. Galbally, A. Ross, M. Gomez-Barrero, J. Fierrez
  • Ortega- Garcia, “From the iriscode to the iris: A new vulnerability of iris recognition systems,” Black Hat Briefings USA
  • 2012
VIEW 5 EXCERPTS
HIGHLY INFLUENTIAL

and J

S. Mathôt, F. Cristino, I. D. Gilchrist
  • Theeuwes, “A simple way to estimate similarity between pairs of eye movement sequences,” Journal of Eye Movement Research, vol. 5, no. 1
  • 2012
VIEW 12 EXCERPTS
HIGHLY INFLUENTIAL

and T

A. Stén, A. Kaseva
  • Virtanen, “Fooling fingerprint scannersbiometric vulnerabilities of the precise biometrics 100 sc scanner,” in Proceedings of 4th Australian Information Warfare and IT Security Conference, vol. 2003, pp. 333–340
  • 2003
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

and W

C. Song, A. Wang, K. Ren
  • Xu, “Eyeveri: A secure and usable approach for smartphone user authentication,” in Computer Communications, IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on, pp. 1–9, IEEE
  • 2016
VIEW 1 EXCERPT

and H

D. Liu, B. Dong, X. Gao
  • Wang, “Exploiting eye tracking for smartphone authentication,” in International Conference on Applied Cryptography and Network Security, pp. 457–477, Springer
  • 2015
VIEW 3 EXCERPTS

Biometric authentication via complex oculomotor behavior

  • 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS)
  • 2013
VIEW 1 EXCERPT

and A

M. Martin, T. Marija
  • Sime, “Eye tracking recognitionbased graphical authentication,” in Application of Information and Communication Technologies (AICT), 2013 7th International Conference on, pp. 1–5, IEEE
  • 2013
VIEW 1 EXCERPT