no code implementations • 16 Jan 2019 • Debayan Deb, Arun Ross, Anil K. Jain, Kwaku Prakah-Asante, K. Venkatesh Prasad
Prevailing user authentication schemes on smartphones rely on explicit user interaction, where a user types in a passcode or presents a biometric cue such as face, fingerprint, or iris.