2016
DOI: 10.1016/j.protcy.2016.01.061
|View full text |Cite
|
Sign up to set email alerts
|

Biometric Authentication Based on Touchscreen Swipe Patterns

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
31
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 42 publications
(31 citation statements)
references
References 10 publications
0
31
0
Order By: Relevance
“…Similarly, in [20] a touch-gesture continuous authentication scheme is produced but limited to swipe-based gestures. In [2] and [1], touch-gestures are used to authenticate but gestures are limited to swipes in a non-continuous architecture. Authors of [10] benchmark their touch-gesture authentication scheme against the state-of-the-art by using multiple touch-gesture datasets.…”
Section: Related Workmentioning
confidence: 99%
“…Similarly, in [20] a touch-gesture continuous authentication scheme is produced but limited to swipe-based gestures. In [2] and [1], touch-gestures are used to authenticate but gestures are limited to swipes in a non-continuous architecture. Authors of [10] benchmark their touch-gesture authentication scheme against the state-of-the-art by using multiple touch-gesture datasets.…”
Section: Related Workmentioning
confidence: 99%
“…Examples include face recognition [12], typist recognition [9], smart-stroke [8], touch [5], and mouse dynamics [16]. Antal et al [5] used four OCC that included Parzen density estimator, the k nearest-neighbor (kNN), Gaussian mixtures method and Support Vector Data Description method in order to build authentication systems based on swipe gestures, however, it was unclear whether their authentication framework was one-time or continuous. Moreover, the swipe gestures and micro-movements of the device were collected in a constrained environment under a very specific scenario -while responding to psychological questionnaire.…”
Section: Related Workmentioning
confidence: 99%
“…The disadvantages of using M CC is that they require samples from both genuine and impostor classes to determine respective decision boundaries. In other words, to build an M CC-based biometric system, both genuine and impostor samples must be collected [5]. For training and testing the classification models, researchers have conventionally used samples from other users than the genuine one as impostors [1,6,7].…”
Section: Introductionmentioning
confidence: 99%
“…Behavioral biometrics use a user's operational habits and preferences as identify information, and hand gesture is a typical example investigated for authentication to capture biometric information on many smartphone platforms. Many researchers tried to distinguish users based on their input patterns and touch characteristics by extracting information from touch movements on smartphones [18][19][20][21][22][23]. These studies concluded that it is possible to positively improve the security of password patterns on touchscreens by integrating behavioral biometrics.…”
Section: Background and Related Studiesmentioning
confidence: 99%