2016
DOI: 10.1109/tifs.2015.2503258
|View full text |Cite
|
Sign up to set email alerts
|

Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
53
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
4
1

Relationship

1
8

Authors

Journals

citations
Cited by 85 publications
(54 citation statements)
references
References 21 publications
1
53
0
Order By: Relevance
“…However, due to the simplicity and easy guessability of the PIN and pattern passcodes [ 12 ] (e.g., shoulder surfing attack [ 13 ] and smudge attack [ 8 ]), and the risk of fingerprint loss from public events (e.g., attackers can get fingerprints from public events with the help of a standard camera [ 9 ]), a growing number of biometric features ( i.e. , signature or gesture based methods [ 14 , 15 ], touch dynamics [ 16 , 17 ], and keystroke dynamics [ 18 , 19 ]) has been applied to strengthen smartphone authentication [ 14 , 15 , 16 , 17 , 18 , 19 ].…”
Section: Background and Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…However, due to the simplicity and easy guessability of the PIN and pattern passcodes [ 12 ] (e.g., shoulder surfing attack [ 13 ] and smudge attack [ 8 ]), and the risk of fingerprint loss from public events (e.g., attackers can get fingerprints from public events with the help of a standard camera [ 9 ]), a growing number of biometric features ( i.e. , signature or gesture based methods [ 14 , 15 ], touch dynamics [ 16 , 17 ], and keystroke dynamics [ 18 , 19 ]) has been applied to strengthen smartphone authentication [ 14 , 15 , 16 , 17 , 18 , 19 ].…”
Section: Background and Related Workmentioning
confidence: 99%
“…, pressure, area, duration, position, velocity, and acceleration), and employed a support vector machine (SVM) to perform user authentication task in a lab scenario. Shen et al [ 17 ] developed a continuous smartphone authentication system based on users’ touch-sliding operations. The system analyzed four types of touch behavior ( i.e.…”
Section: Background and Related Workmentioning
confidence: 99%
“…This method can be implemented by employing existing sensors embedded in a mobile device, so it is comparatively cheaper than other biometrics authentication method. In addition, this method is non-intrusive and can operate in parallel with a person's normal mobile device usage activities (Shen et al, 2016). The existing passcode authentication method has a wide social acceptance, and the touch dynamics authentication method is also expected to be widely acceptable by the general public (Campisi et al, 2009).…”
Section: Introductionmentioning
confidence: 99%
“…Leaving aside the signature (for a while), it has been already showed that the interaction with the touchscreen results in different patterns (e.g. swipe or touch dynamics) can be used for user identification aims [23], [88]. In general, high intra-class variability due to time, emotional state, change of the part of the screen which has been touched and task performed has been observed [23].…”
Section: A Accessibility and Usabilitymentioning
confidence: 99%