2019
DOI: 10.1016/j.cose.2019.04.008
|View full text |Cite
|
Sign up to set email alerts
|

Recent advances in mobile touch screen security authentication methods: A systematic literature review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 15 publications
(4 citation statements)
references
References 42 publications
1
3
0
Order By: Relevance
“…It has been observed from the performance metrics analysis as shown in Section 6 that different studies used different performance evaluation criteria depending on the study. Similar findings were reported in mobile phone authentication system [91], [92]. This signified that this research domain lacks uniform performance metrics in evaluating the efficacy of deep learning based smart device.…”
Section: Open Research Challenges and Future Directionsupporting
confidence: 80%
“…It has been observed from the performance metrics analysis as shown in Section 6 that different studies used different performance evaluation criteria depending on the study. Similar findings were reported in mobile phone authentication system [91], [92]. This signified that this research domain lacks uniform performance metrics in evaluating the efficacy of deep learning based smart device.…”
Section: Open Research Challenges and Future Directionsupporting
confidence: 80%
“…Though the purpose of this review is to examine the current scope of literature on behavioral biometrics through the lens of its application to public health (i.e., screen time measurement), it is necessary to also distinguish this from the domain of behavioral biometrics research for security. Given the vast amount of sensitive information stored on mobile devices, secure user authentication has become a prominent concern and a highly studied concept over recent years [ 22 , 160 , 161 ]. User authentication has shifted from “what you know,” such as an ID, PIN, or password, to “what you are,” or biometric authentication, with behavioral biometrics referring to the specific user-device interaction.…”
Section: Discussionmentioning
confidence: 99%
“…Modern mobile devices contain a variety of sensors (e.g., accelerometer, gyroscope, magnetometer, touch) that collect multiple data streams and can provide characteristic information about the user. These sensors provide the basis for behavioral biometric authentication [ 20 22 ]. Unlike physiological biometrics (e.g., fingerprint, iris, facial recognition), behavioral biometrics do not require additional hardware in modern mobile devices [ 23 , 24 ], making it a feasible research tactic for screen time measurement.…”
Section: Introductionmentioning
confidence: 99%
“…The development of technology today focuses a lot on security for touch screen technology, which is often used on mobile devices [3]. However, after the widespread introduction of the mobile operating system a few years ago, many alternatives to device authentication emerged, such as the introduction of the Personal Identification Number (PIN), which is now widely used for information security, as well as other alternatives, such as biometrics, patterns, gestures, and graphical authentication [4,5].…”
Section: Introductionmentioning
confidence: 99%