Research Interest:

Current Research:

  1. Pixie: Camera-based 2-factor authentication for mobile and wearable devices.
    We introduce Pixie, a novel, camera based two factor authentication solution for mobile and wearable devices. A quick and familiar user action of snapping a photo is sufficient for Pixie to simultaneously perform a graphical password authentication and a physical token based authentication, yet it does not require any expensive, uncommon hardware. Pixie establishes trust based on both the knowledge and possession of an arbitrary physical object readily accessible to the user, called trinket. Users choose their trinkets similar to setting a password, and authenticate by presenting the same trinket to the camera. The fact that the object is the trinket, is secret to the user. Pixie extracts robust, novel features from trinket images, and leverages a supervised learning classifier to effectively address inconsistencies between images of the same trinket captured in different circumstances.

  2. Movee and VAMOS: Sensor Based Liveness Verifications for Mobile Videos.
    We introduce a "liveness" verification solution based on video motion, that accommodates the full range of camera movements, and supports videos of arbitrary length. Movee and Vamos uses the agreement between video motion and camera movement to corroborate the video authenticity. Vamos can be integrated into any mobile video capture application without requiring special user training. We develop novel attacks that target liveness verification solutions. The attacks leverage both fully automated algorithms and trained human experts.

  3. Exploring the usability of Movee, a mobile application for video liveness verification.
    In this research, we design several Graphical User Interfaces (GUIs) for video liveness verification system that are intended to communicate the goals and the proper usage of this application to users.

  4. Exploring different attacks in online social networks and devising schemas for helping the users to detect and prevent those attacks.

See the list of publications here.