201
Views
1
CrossRef citations to date
0
Altmetric
Articles

Performance Analysis for a Touch Dynamic Authentication System with Reduced Feature Set Using Neural Networks

, &

References

  • M. Frank, and R. Biedert, E. Ma, I. Martinovic, and D. Song, “Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication” IEEE Transactions on Information Forensics and Security, Vol. 8, no. 1, pp. 136–148, Jan. 2013.
  • M. Derawi, C. Nickel, P. Bours, and C. Busch, “Unobtrusive, user authentication on mobile phones using biometric gait recognition,” in Proceedings of the 6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Darmstadt, 2010, pp. 306–11.
  • N. L. Clarke, S. Karatzouni, and S. Furnell, “Flexible and transparent user authentication for mobile devices,” in SEC., Pafos, Cyprus, 2009, pp. 1–12.
  • S. Zahid, M. Shahzad, S. Khayam, and M. Farooq, “Keystroke-based user identification on smart phones,” in Recent Advances in Intrusion Detection, Lecture Notes in Computer Science, Vol. 5758, E., Kirda, S., Jha, D., Balzarotti, Eds. Berlin: Springer, 2009, pp. 224–43.
  • E. Maiorana, P. Campisi, N. Gonz_alez-Carballo, and A. Neri, “Keystroke dynamics authentication for mobile phones,” in Proceedings of the 2011 ACM Symposium on Applied Computing. ACM, Taiwan, 2011, pp. 21–6.
  • Y. Meng, S. W. Duncan, and S. Roman, “Touch gestures based biometric authentication scheme for touch screen mobile phones,” In Inform. Security Cryptol., Vol. 7763, pp. 331–350, 2013.
  • R. Spillane, “Keyboard apparatus for personal identification,” IBM Tech, Disclosure Bull., Vol. 17, pp. 3346, Apr. 1975.
  • S. Obaidat, and B. Sadoun, “Keystroke dynamics based authentication in Biometrics,” in Biometrics Personal Identification in Networked Society, A. K. Jain, R. Bolle, and S. Pankanti, Eds. New York: Springer, 1996, pp. 213–29.
  • P. Campisi, E. Maiorana, M. Lo Bosco, and A. Neri, “User authentication using keystroke dynamics for cellular phones,” IET Signal Proc., Vol. 3, no. 4, pp. 333–41, Jun. 2009.
  • M. Trojahn, and F. Ortmeier, “Biometric authentication through a virtual keyboard for smartphones.” Int. J. Comput. Sci. Inform. Technol., Vol. 4, no. 5, pp. 1–12, Oct. 2012.
  • J. Koreman, A. C. Morris, D. Wu, S. Jassim, H. Sellahewa, J. Ehlers, G. Chollet, G. Versano, H. Bredin, S. Garcia-salicetti, L. Allano, B. L. Van, and B. Dorizzi, “Multi -modal biometric authentication on the Secure Phone PDA,” in Proceedings of the Second workshop on Multi-Modal User Authentication Workshop, Toulouse, 2006, pp. 1–8.
  • K. Niinuma, and A. K. Jain, “Continuous user authentication using temporal information,” in Biometric Technology for Human Identification VII, Vol. 7667, B. V. K. V. Kumar, S. Prabhakar, and A. A. Ross, Eds. Bellingham, WA: SPIE Press, 2010.
  • H. Saevaneeand, and P. Bhatarakosol, “User authentication using combination of behavioral biometrics over the touch pad acting like touch screen of mobile device,” in Proceedings of the International Conference on Computer and Electrical Engineering, Phuket, 2008, pp. 82–6.
  • A. De Luca, A. Hang, F. Brudy, C. Lindner, and H. Hussmann, “Touch me once and i know it's you!: Implicit authentication based on touch screen patterns,” in Proceedings of the ACM Annual Conference on Human Factors in Computing Systems, New York, NY, 2012. pp. 987–96.
  • L. L. Lee, T. Berger, and E. Aviczer, “Reliable on-line human signature verification systems,” IEEE Trans. Pattern Anal. Mach. Intell. Vol. 18, no. 6, pp. 643—7, Jun. 1996.
  • A. K. Jain, and G. S. D. Connell, “On-linesignature verification(2002),” Pattern Recog. Inform. Syst., Vol. 35, no. 12, pp. 2963–72, Dec. 2002.
  • J. Angulo, and E. Wästlund, “Exploring touch screen biometrics for user identification on smart phones,” Privacy and Identity Management for Life, Berlin: Springer, Vol. 375, 2012, pp. 130–43.
  • G. Kambourakis, D. Damopoulos, D. Papamartzivanos, and E. Pavlidakis, “Introducing touchstroke: Keystroke-based authentication system for smartphones,” Security and Communication Networks, Jul. 2014. Available: http://dx.doi.org/10.1002/sec.1061
  • G. Ho, “Tap dynamics: Strengthening user authentication on mobile phones using keystroke dynamics,” Technical report, Stanford University, 2014.
  • Available: http://developer.android.com/guide/topics/sensors/sensors_motion.html#sensors-motion-accel dated 1.6. 2015.
  • L. Cai, and H. Chen, “TouchLogger: Inferring keystrokes on touch screen from smartphone motion,” in Proceedings of the 6th USENIX Conference on Hot Topics in Security, Berkeley, CA, 2011, p. 9.
  • M. Antal, Z. Bokor, and L. Z. Szabo, “Information revealed from scrolling interactions on mobile devices,” Pattern Recog. Lett., Vol. 56, pp. 7–13, Apr. 2015.
  • M. Antal, L. Z. Szabo, and Z. Bokor, “Identity information revealed from mobile touch gestures,” in 10th Joint Conference on Mathematics and Computer Science, Cluj-Napoca, 2014, pp. 5–14.
  • C.-J. Tsai, T.-Y. Chang, and J.-H. Lin, “Two novel biometric features in keystroke dynamics authentication systems for touch screen devices,” Security Communication Networks, Vol. 7, pp. 750–8, Apr. 2014.
  • A. Serwadda, and Z. Wang, “Which verifiers work?: A Benchmark evaluation of touch based authentication algorithms,” in IEEE BTAS, Washington, DC, 2013, pp. 1–8.
  • M. El-Abed, M. Dafer, and R. El Khayat, “RHU Keystroke: A mobile-based benchmark for keystroke dynamics systems”, in IEEE ICCST 2014 Conference, Rome, Italy, 2014, pp. 1–4.
  • N. Zheng, K. Bai, H. Huang, and H. Wang, “You are how you touch: User verification on smartphones via tapping behaviour,” Technical report, College of William & Mary, 2012.
  • S. J. Alghamdi, and L. A. Elrefaei, “Dynamic user verification using touch keystroke based on median vectors proximity,” in 7th International Conference on Computational Intelligence, Communication Systems and Networks, Riga, Latvia, 2015, pp. 121–6.
  • N. L. Clarke, and S. Furnell, “Authenticating mobile phone users usin g keystroke analysis”, Int. J. Inf. Sec., Vol. 6, no. 1, pp. 1–14, Jan. 2007.
  • A. Buchoux, and N. L. Clarke, “Deployment of keystroke analysis on a smartphone,” in Australian Information Security Management Conference, Australia, 2008, pp. 48–54.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.