Filters








466 Hits in 6.7 sec

Tracing One's Touches: Continuous Mobile User Authentication Based on Touch Dynamics

Dongsong Zhang, Lina Zhou, Sailakshmi Pisupati
2019 Americas Conference on Information Systems  
Despite that tremendous progress has been made in mobile user authentication (MUA) in recent years, continuous mobile user authentication (CMUA), in which authentication is performed continuously after  ...  To fill the literature gap, we developed a new CMUA method based on touch dynamics of thumb scrolling on the touchscreen of a mobile device.  ...  ACKNOWLEDGEMENTS This research was supported in part by the National Science Foundation (Award #s: CNS 1704800 and SES 1527684).  ... 
dblp:conf/amcis/ZhangZP19 fatcat:apvpgdktxnfkphn7qylgsn7d4m

Quad Swipe Pattern: A New Point-of-Entry Security Measure for Smartphone Users

James Brown, Md S. Hossain, Lisa Lancor
2021 IEEE Access  
We performed several experiments to demonstrate the effectiveness of the Quad Swipe Pattern in smartphone user authentication.  ...  In this paper, we develop a new point-of-entry security measure for smartphone users.  ...  ACKNOWLEDGMENT The authors would like to thank Carl Haberfeld, a recent graduate of Computer Science Department, Southern Connecticut State University, for his work on the data collection application that  ... 
doi:10.1109/access.2021.3132767 fatcat:37mbokm6tfdlfadwyvkeodi7oe

Luis: A Light Weight User Identification Scheme for Smartphones

Sanju Xaviar, Kalyan Sasidhar, Preeja Pradeep
2015 International Journal on Cybernetics & Informatics  
To validate the proposed scheme, an application is created which takes a gesture input characterized by time of swiping the screen, finger pressure, phone movements and location of swipe on the screen  ...  Smartphone usage has reached its peak. There has been a tremendous growth in the number of people migrating from PCs to smart phones.  ...  One sensor is activated to continuously authenticate the user in one out of four usages conditions.  ... 
doi:10.5121/ijci.2015.4203 fatcat:23rrasgrejhmzkdyn5dttwmwhi

Gesture-based Continuous Authentication for Wearable Devices: the Google Glass Case [article]

Jagmohan Chauhan, Hassan Jameel Asghar, Mohamed Ali Kaafar, Anirban Mahanti
2016 arXiv   pre-print
We study the feasibility of touch gesture behavioural biometrics for implicit authentication of users on a smartglass (Google Glass) by proposing a continuous authentication system using two classifiers  ...  Based on data collected from 30 volunteers, we show that such authentication is feasible both in terms of classification accuracy and computational load on smartglasses.  ...  For instance, due to the smaller touchpad size on Glass compared to smartphones, touch gesture based continuous authentication techniques studied in the context of smartphones (e.g., [4,12–14]) may not  ... 
arXiv:1412.2855v8 fatcat:ale2hmhegzcr5nggpjdxj5n7na

TIPS

Tao Feng, Jun Yang, Zhixian Yan, Emmanuel Munguia Tapia, Weidong Shi
2014 Proceedings of the 15th Workshop on Mobile Computing Systems and Applications - HotMobile '14  
In this work, we present TIPS, a Touch based Identity Protection Service that implicitly and unobtrusively authenticates users in the background by continuously analyzing touch screen gestures in the context  ...  Due to the dramatical increase in popularity of mobile devices in the last decade, more sensitive user information is stored and accessed on these devices everyday.  ...  RELATED WORK The research of touch screen based user identify recognition draws from multiple areas, such as implicit and continuous identity authentication and touch gesture based user recognition under  ... 
doi:10.1145/2565585.2565592 dblp:conf/wmcsa/FengYYTS14 fatcat:rsnyw3zsava5hilutrfy3mpcpi

HapticLock: Eyes-Free Authentication for Mobile Devices

Gloria Dhandapani, Jamie Ferguson, Euan Freeman
2021 Proceedings of the 2021 International Conference on Multimodal Interaction  
Users confirm selection with a double tap (c), to move to the next digit, continuing until the PIN is complete.  ...  Users select PIN digits by swiping up or down (a), with Morse Code vibration patterns (b) for feedback about the currently selected digit.  ...  However, users would often rely on the vibration if they lost count or were unsure if a swipe gesture was recognised, so there is value in continuing to deliver the full pattern.  ... 
doi:10.1145/3462244.3481001 fatcat:qfpxzdkdljfuxpl7adnrbwte6u

Exploration of Machine Learning Classification Models Used for Behavioral Biometrics Authentication [article]

Sara Kokal, Laura Pryor, Rushit Dave
2022 arXiv   pre-print
Continuing the previous work in this field, this study identifies key Machine Learning algorithms currently being used for behavioral biometric mobile authentication schemes and aims to provide a comprehensive  ...  This contrast in development between capability and security of mobile devices is a significant problem with the sensitive information of the public at risk.  ...  ACKNOWLEDGMENTS Funding for this project has been provided by the University of Wisconsin-Eau Claire's Blugold Fellowship and University of Wisconsin-Eau Claire Computer Science Department's Karlgaard  ... 
arXiv:2204.09088v1 fatcat:uo2sk5qdzzbgtpmckc5oxterx4

Different strokes for different folks? Revealing the physical characteristics of smartphone users from their swipe gestures

Chris Bevan, Danaë Stanton Fraser
2016 International Journal of Human-Computer Studies  
In this study, we examined whether it is feasible that the length of a person's thumb could be revealed from the way in which they complete swipe gestures on a touchscreen-based smartphone.  ...  From a corpus of approx. 19,000 swipe gestures captured from 178 volunteers, we found that people with longer thumbs complete swipe gestures with shorter completion times, higher speeds and with higher  ...  The authors would like to thank Dr Lia Emanuel (University of Bath), Prof. Sue Black (University of Dundee) Dr. Sarah Stevenage and Dr. Greg Neil (University of Southampton), Dr.  ... 
doi:10.1016/j.ijhcs.2016.01.001 fatcat:gvrir4ho25fblnfb5f35s7fjmi

Continuous User Authentication via Unlabeled Phone Movement Patterns [article]

Rajesh Kumar, Partha Pratim Kundu, Diksha Shukla, Vir V. Phoha
2017 arXiv   pre-print
In this paper, we propose a novel continuous authentication system for smartphone users.  ...  The data was collected in a completely unconstrained environment over five to twelve days. The contexts of phone usage were identified using k-means clustering.  ...  This work was supported in part by DARPA Active Authentication contract FA #8750-13-2-0274 and by National Science Foundation Award SaTC #1527795.  ... 
arXiv:1708.04399v1 fatcat:gpv5avebajealpejjtya6g5yci

Sensor-based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Contemporary Survey [article]

Mohammed Abuhamad, Ahmed Abusnaina, DaeHun Nyang, David Mohaisen
2020 arXiv   pre-print
In this paper, we survey more than 140 recent behavioral biometric-based approaches for continuous user authentication, including motion-based methods (28 studies), gait-based methods (19 studies), keystroke  ...  The survey provides an overview of the current state-of-the-art approaches for continuous user authentication using behavioral biometrics captured by smartphones' embedded sensors, including insights and  ...  Common open challenges of using motion-based continuous authentication on smartphones include the following. 1 Power Consumption: Intuitively, continuous authentication schemes, in general, consume power  ... 
arXiv:2001.08578v2 fatcat:ykt7jpmeefgadil3n3y52z43t4

BrainRun: A Behavioral Biometrics Dataset towards Continuous Implicit Authentication

Michail D. Papamichail, Kyriakos C. Chatzidimitriou, Thomas Karanikiotis, Napoleon-Christos I. Oikonomou, Andreas L. Symeonidis, Sashi K. Saripalle
2019 Data  
more advanced techniques are considering continuous implicit authentication on the basis of behavioral biometrics.  ...  In this context, and in an effort to create a solid information basis upon which continuous authentication models can be built, we employ the real-world application "BrainRun", a brain-training game aiming  ...  In fact, there are several studies in the context of continuous implicit authentication that focus on the capturing of gestures (touch sequences) [9, 10] .  ... 
doi:10.3390/data4020060 fatcat:673z6dgn2fbmzo3sal7xsme5vi

Touch and You're Trapp(ck)ed: Quantifying the Uniqueness of Touch Gestures for Tracking

Rahat Masood, Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Mohamed Ali Kaafar
2018 Proceedings on Privacy Enhancing Technologies  
We demonstrate the likelihood of touch-based tracking by focusing on touch gestures widely used to interact with touch devices such as swipes and taps..  ...  Our results show that writing samples (on a touch pad) can reveal 73.7% of information (when measured in bits), and left swipes can reveal up to 68.6% of information.  ...  [14] presented an Implicit Authentication (IA) scheme named 'Touchalytics' to authenticate user based on their finger movements on a touch screen of a smartphone.  ... 
doi:10.1515/popets-2018-0016 dblp:journals/popets/MasoodZAK18 fatcat:yfmwkgywpfgnbbl35o4ylv7mou

Towards continuous and passive authentication across mobile devices

Xiao Wang, Tong Yu, Ole Mengshoel, Patrick Tague
2017 Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks - WiSec '17  
In this paper, we conduct an empirical study on how a behavioral model created on one device can be transferred to other devices to bootstrap continuous authentication.  ...  Mobile devices, such as smartphones and tablets, have become prevalent given their ample functionality brought by a variety of applications.  ...  [29] investigated continuous and passive authentication based on the way a user interacts with the touchscreen. Jain et al.  ... 
doi:10.1145/3098243.3098244 dblp:conf/wisec/WangYMT17 fatcat:6qnc6ouoene5xa5vv7qeiyhega

Hold On and Swipe: A Touch-Movement Based Continuous Authentication Schema based on Machine Learning [article]

Rushit Dave, Naeem Seliya, Laura Pryor, Mounika Vanamala, Evelyn Sowells, Jacob mallet
2022 arXiv   pre-print
In recent years the amount of secure information being stored on mobile devices has grown exponentially.  ...  This study aims to contribute to this innovative research by evaluating the performance of a multimodal behavioral biometric based user authentication scheme using touch dynamics and phone movement.  ...  Komulainen, “Effect of context in swipe gesture-based continuous authentication on smartphones,” [6] J. Mason, R.  ... 
arXiv:2201.08564v1 fatcat:teizq3pt7rhoficu5b76nneoza

Augmented Unlocking Techniques for Smartphones Using Pre-Touch Information [article]

Matthew Lakier, Dimcho Karakashev, Yixin Wang, Ian Goldberg
2019 arXiv   pre-print
Smartphones store a significant amount of personal and private information, and are playing an increasingly important role in people's lives.  ...  Our 3D Pattern technique takes advantage of a new input paradigm called pre-touch, which could soon allow smartphones to sense a user's finger position at some distance from the screen.  ...  [7] considered the threat not only in the context of authentication, but also in the context of routine smartphone usage.  ... 
arXiv:1908.09165v1 fatcat:ged7zxqiwjc3raq6doowga6lz4
« Previous Showing results 1 — 15 out of 466 results