Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








5,459 Hits in 3.8 sec

A survey on behavioral biometric authentication on smartphones

Ahmed Mahfouz, Tarek M. Mahmoud, Ahmed Sharaf Eldin
2017 Journal of Information Security and Applications  
active authentication systems and their evaluation on smartphones.  ...  Recent research has shown the possibility of using smartphones' sensors and accessories to extract some behavioral attributes such as touch dynamics, keystroke dynamics and gait recognition.  ...  Acknowledgments We would like to thank our colleagues for their feedback on the earlier version of this Paper.  ... 
doi:10.1016/j.jisa.2017.10.002 fatcat:tuhwquiijrhyzf6xasqfmmy3rm

A multimodal data set for evaluating continuous authentication performance in smartphones

Qing Yang, Ge Peng, David T. Nguyen, Xin Qi, Gang Zhou, Zdeňka Sitová, Paolo Gasti, Kiran S. Balagani
2014 Proceedings of the 12th ACM Conference on Embedded Network Sensor Systems - SenSys '14  
There is a multitude of signals that can be harnessed for continuous authentication on mobile devices, such as touch input, accelerometer, and gyroscope, etc.  ...  To fill this gap, we performed a large-scale user study to collect a wide spectrum of signals on smartphones.  ...  during a user's interaction with the touch screen of smartphone.  ... 
doi:10.1145/2668332.2668366 dblp:conf/sensys/YangPNQZSGB14 fatcat:nmg6ya4qg5fzpdaqxs5u7ke5uq

Smartphone Sensors for Modeling Human-Computer Interaction: General Outlook and Research Datasets for User Authentication [article]

Alejandro Acien and Aythami Morales and Ruben Vera-Rodriguez and Julian Fierrez
2020 arXiv   pre-print
In this paper we list the sensors commonly available in modern smartphones and provide a general outlook of the different ways these sensors can be used for modeling the interaction between human and smartphones  ...  Very promising results are achieved with accuracies up to 87% for person authentication based on a simple and fast touch gesture.  ...  These results prove the richness of touch gestures to model the interaction between humans and smartphones, in particular for user authentication.  ... 
arXiv:2006.00790v1 fatcat:3c276eyoffcj3keajywovrzr5y

POSTER

Ahmed Mahfouz, Tarek M. Mahmoud, Ahmed Sharaf Eldin
2017 Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security - ASIA CCS '17  
In order to protect smartphones data against these sort of attacks, we propose a behavioral biometric authentication framework that leverages the user's behavioral patterns such as touchscreen actions,  ...  To this end, we developed only one modality, a gesture authentication modality, which authenticate smartphone users based on touch gesture.  ...  We collected data related to user behavioral activities and we are developing a multimodal behavioral biometric authentication framework to authenticate smartphone users based on different contexts.  ... 
doi:10.1145/3052973.3055160 dblp:conf/ccs/MahfouzME17 fatcat:eqbuzr23tzhxvbks6hxxyyjuai

Graphical-Based Password Keystroke Dynamic Authentication System for Android Phone

Miss. Aarti Raman Sonawane, Prof. Kumbhar H. V.
2016 IJARCCE  
An important usability goal of an authentication system is to support users for selecting the better password.  ...  Most of the existing authentication system has certain drawbacks for that reason graphical passwords are most preferable authentication system where users click on images to authenticate themselves.  ...  LITERATURE SURVEY In paper [1] , This work is the first to evaluate diverse types of touch-interaction behavior for active authentication across various application tasks and various application scenarios  ... 
doi:10.17148/ijarcce.2016.51287 fatcat:mmc3dafexbebzns4pqmrz243zu

Secure privacy-preserving protocols for outsourcing continuous authentication of smartphone users with touch data

Sathya Govindarajan, Paolo Gasti, Kiran S. Balagani
2013 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS)  
Our protocols allow a smartphone to privately perform continuous and unobtrusive authentication using touch behaviors.  ...  We introduce new secure privacy-preserving protocols for outsourcing continuous authentication of smartphone users.  ...  Lately, behavioral modalities that have been used for active authentication include on-screen touch and gestures [13, 23] , hand or smartphone movement and orientation [12] , geolocation patterns and  ... 
doi:10.1109/btas.2013.6712742 dblp:conf/btas/GovindarajanGB13 fatcat:rmuxdw2qqfdi7phfet77nf62xy

MultiLock: Mobile Active Authentication based on Multiple Biometric and Behavioral Patterns [article]

Alejandro Acien, Aythami Morales, Ruben Vera-Rodriguez, Julian Fierrez
2019 arXiv   pre-print
For active authentication we take advantage of mobile user behavior across multiple sessions by updating a confidence value of the authentication score.  ...  In this paper we evaluate mobile active authentication based on an ensemble of biometrics and behavior-based profiling signals. We consider seven different data channels and their combination.  ...  The contributions of this work are: i) performance analysis of user authentication based on 4 biometric data channels (touch gestures, keystroking, accelerometer, and gyroscope) and 3 behavior profiling  ... 
arXiv:1901.10312v1 fatcat:xz4x4xep45gstainrl7m7wb36m

Authentication of Smartphone Users Using Behavioral Biometrics [article]

Abdulaziz Alzubaidi, Jugal Kalita
2019 arXiv   pre-print
This paper highlights the potential risks that occur when smartphones are stolen or seized, discusses the concept of continuous authentication, and analyzes current approaches and mechanisms of behavioral  ...  In addition, this might enable pervasive observation or imitation of one's movements and activities, such as sending messages to contacts, accessing private communication, shopping with a credit card,  ...  After observing the user behavior for a period of time, the system learns characteristics of behavior data by performing statistical analysis or using machine learning.  ... 
arXiv:1911.04104v1 fatcat:yxx7pagj3ff6rok7zaq3f5psua

Smartphone User Authentication Based on Holding Position and Touch-Typing Biometrics

Yu Sun, Qiyuan Gao, Xiaofan Du, Zhao Gu
2019 Computers Materials & Continua  
By analyzing the shortcomings of the existing authentication methods, this paper proposes an identity authentication method based on the behavior of smartphone users.  ...  As a result, identity authentication has become the most critical security activity in this period of the intelligent craze.  ...  Authentication model and system framework The identity authentication model based on smartphone user behavior mainly includes three parts: data acquisition part, behavior analysis part, and behavior modeling  ... 
doi:10.32604/cmc.2019.06294 fatcat:nvhptal24zgtjotuvtglthkmti

Continuous mobile authentication using touchscreen gestures

Tao Feng, Ziyi Liu, Kyeong-An Kwon, Weidong Shi, Bogdan Carbunar, Yifei Jiang, Nhung Nguyen
2012 2012 IEEE Conference on Technologies for Homeland Security (HST)  
We use touch data collected from 40 users to show that FAST achieves a False Accept Rate (FAR) of 4.66% and False Reject Rate of 0.13% for the continuous post-login user authentication.  ...  Besides extracting touch data from touchscreen equipped smartphones, FAST complements and validates this data using a digital sensor glove that we have built using off-the-shelf components.  ...  We use these features to validate and complement touch gesture extracted features, for the user authentication process that occurs during normal smartphone interactions.  ... 
doi:10.1109/ths.2012.6459891 fatcat:vaj7a7mrojheja2r5o4oioaf2i

Sensor-based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Contemporary Survey [article]

Mohammed Abuhamad, Ahmed Abusnaina, DaeHun Nyang, David Mohaisen
2020 arXiv   pre-print
The survey provides an overview of the current state-of-the-art approaches for continuous user authentication using behavioral biometrics captured by smartphones' embedded sensors, including insights and  ...  open challenges for adoption, usability, and performance.  ...  The authors reported an analysis of the system performance when the smartphone is placed at five different locations on the user's body. Amini et al.  ... 
arXiv:2001.08578v2 fatcat:ykt7jpmeefgadil3n3y52z43t4

Demystifying Authentication Concepts in Smartphones: Ways and Types to Secure Access

Sandeep Gupta, Attaullah Buriro, Bruno Crispo
2018 Mobile Information Systems  
User authentication is the first line of defense to prevent unauthorized access to the smartphone.  ...  On a positive side, smartphones have improved the quality of life by providing multiple services that users desire, for example, anytime-anywhere computing.  ...  Touch-based solutions authenticate users based on their unique interactions with the device, while they perform a specific task.  ... 
doi:10.1155/2018/2649598 fatcat:dulbgwxnbnd53bnhalsisrxqly

Continuous Authentication on Mobile Devices Using Power Consumption, Touch Gestures and Physical Movement of Users [chapter]

Rahul Murmuria, Angelos Stavrou, Daniel Barbará, Dan Fleck
2015 Lecture Notes in Computer Science  
Users perform different activities on different applications: we consider application context when we model user behavior.  ...  Handheld devices today do not continuously verify the identity of the user while sensitive activities are performed.  ...  Conclusion We have introduced a novel system that performs authentication on Android mobile devices by leveraging user behavior captured though three distinct modalities -power consumption, touch gestures  ... 
doi:10.1007/978-3-319-26362-5_19 fatcat:aizawpmebzhv3gjfnjur6ppngi

Dense Deep Neural Network Architecture for Keystroke Dynamics Authentication in Mobile Phone

Lubna Abdelkareim Gabralla
2020 Advances in Science, Technology and Engineering Systems  
to improve the security system of the mobile smartphone touch screen devices.  ...  In this paper, we propose a deep learning -dense neural network to avoid the limitation of the classical algorithms and build a mobile smartphone touch screen authentication scheme based on keystroke dynamics  ...  The proposed model authenticates smartphone users is based on user's password typing behavior on a touch screen.  ... 
doi:10.25046/aj050637 fatcat:jdtzdtznyjar3kssdmtbs5q5ma

Smartphone Security Using Swipe Behavior-based Authentication

Adnan Bin Amanat Ali, Vasaki Ponnusamy, Anbuselvan Sangodiah, Roobaea Alroobaea, N. Z. Jhanjhi, Uttam Ghosh, Mehedi Masud
2021 Intelligent Automation and Soft Computing  
Behavioral authentication is an emerging security technique that is gaining attention for its uniqueness and transparency.  ...  The system is tested on three smartphones, and it is found that a minimum of seven swipes is sufficient to check user authenticity.  ...  Acknowledgement: We thank LetPub (www.letpub.com) for its linguistic assistance during the preparation of this manuscript. Funding Statement: Taif University Researchers Supporting Project (no.  ... 
doi:10.32604/iasc.2021.015913 fatcat:nkife4tbejcjlbhhktfjstq45y
« Previous Showing results 1 — 15 out of 5,459 results