Demo of PassFrame: Generating Image-based Passwords from Egocentric Videos. Nguyen, L. N. & Sigg, S. In 2017 IEEE International Conference on Pervasive Computing and Communication (demo), March, 2017.
abstract   bibtex   
We demonstrate a personalized user authentication mechanism based on first-person-view videos. Our proposed algorithm forms temporary image-based authentication challenges which benefit a variety of purposes such as unlocking a mobile device or fallback authentication. First, representative frames are extracted from the egocentric videos. Then, they are split into distinguishable segments before repetitive scenes are discarded through a clustering procedure. We integrate eye tracking data to select informative sequences of video frames and suggest an alternative method based on image quality. For evaluation, we perform experiments in different settings including object-interaction activities and traveling contexts. We assessed the authentication scheme in the presence of an informed attacker and observed that the entry time is significantly higher than that of the legitimate user.
@INPROCEEDINGS{LeDemo_2017_PerCom,
author={Le Ngu Nguyen and Stephan Sigg},
booktitle={2017 IEEE International Conference on Pervasive Computing and Communication (demo)},
title={Demo of PassFrame: Generating Image-based Passwords from Egocentric Videos},
year={2017},
abstract={We demonstrate a personalized user authentication mechanism based on first-person-view videos. Our proposed algorithm forms temporary image-based authentication challenges which benefit a variety of purposes such as unlocking a mobile device or fallback authentication. First, representative frames are extracted from the egocentric videos. Then, they are split into distinguishable segments before repetitive scenes are discarded through a clustering procedure. We integrate eye tracking data to select informative sequences of video frames and suggest an alternative method based on image quality. For evaluation, we perform experiments in different settings including object-interaction activities and traveling contexts. We assessed the authentication scheme in the presence of an informed attacker and observed that the entry time is significantly higher than that of the legitimate user.
},
%doi={10.1109/PERCOMW.2016.7457119},
month={March},
project={passframe},
group = {ambience}}

Downloads: 0