Proceedings of the 29th Annual ACM Symposium on Applied Computing 2014
DOI: 10.1145/2554850.2554931
|View full text |Cite
|
Sign up to set email alerts
|

Design of touch dynamics based user authentication with an adaptive mechanism on mobile phones

Abstract: Behavioral-biometric based authentication schemes on mobile phones usually begin by establishing a normal-behavioral model using machine learning classifiers and then identify behavioral anomalies through comparing current behavioral events with the established model. If an anomaly is detected, this kind of schemes will require the user for validation (i.e., input correct PIN). In this paper, we first propose a lightweight touch-dynamics-based user authentication scheme on a touchscreen mobile phone, which con… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 29 publications
(17 citation statements)
references
References 21 publications
0
17
0
Order By: Relevance
“…However, in certain situations, this approach may not be practical. For example, the data acquisition experiments conducted by (Draffin et al, 2014;Y. Meng et al, 2014;Meng et al, 2013) were aimed at acquiring all the touch dynamics data over an entire interaction session with a device.…”
Section: Fig 8 the Numbers Of Publications On Reporting The Degree mentioning
confidence: 99%
See 2 more Smart Citations
“…However, in certain situations, this approach may not be practical. For example, the data acquisition experiments conducted by (Draffin et al, 2014;Y. Meng et al, 2014;Meng et al, 2013) were aimed at acquiring all the touch dynamics data over an entire interaction session with a device.…”
Section: Fig 8 the Numbers Of Publications On Reporting The Degree mentioning
confidence: 99%
“…Most experiments recruited less than 50 subjects (Buschek et al, 2015;Kambourakis et al, 2014;Y. Meng et al, 2014), with some less than 5 subjects (Nixon et al, 2014;Rao et al, 2014).…”
Section: Subject Sizementioning
confidence: 99%
See 1 more Smart Citation
“…Meng et al [89] implemented a lightweight approach, which used 8 touch gestures in order to decrease the time needed for processing data. These gestures were based on a number of touch movements, single and multiple touches and have different speeds, durations and pressures.…”
Section: ) Lightweight Touch Dynamics Approachmentioning
confidence: 99%
“…smart phone or tablet) is generally implemented as a one-time proof of identity during the initial log on procedure [4,5,11]. The validity of the user is assumed to be the same during the full session.…”
Section: Introductionmentioning
confidence: 99%