37
Views
3
CrossRef citations to date
0
Altmetric
Articles

An improved user authentication scheme on smartphone using dominating attribute of touch data

&

References

  • P. S. Teh, N. Zhang, A. B. J. Teoh, and K. Chen, “A survey on touch dynamics authentication in mobile devices,” Computers & Security, vol. 59, pp. 210-235, (2016). doi: 10.1016/j.cose.2016.03.003
  • M. Frank, R. Biedert, E. Ma, I. Martinovic, and D. Song, “Touchalytics: On the applicability of touchscreen input as a behavioural biometric for continuous authentication,” IEEE transactions on information forensics and security, vol. 8, no. 1, pp. 136-148, (2013). doi: 10.1109/TIFS.2012.2225048
  • P. Faruki, A. Bharmal, V. Laxmi, V. Ganmoor, M. S. Gaur, M. Conti, and M. Rajarajan, “Android security: a survey of issues, malware penetration, and defenses,” IEEE communications surveys & tutorials, vol. 17, no. 2, pp. 998-1022, (2015). doi: 10.1109/COMST.2014.2386139
  • H. Saevanee and P. Bhatarakosol, “User authentication using combination of behavioural biometrics over the touchpad acting like touch screen of mobile device,” in Computer and Electrical Engineering, 2008. ICCEE 2008. International Conference on. IEEE, pp.82-86(2008).
  • H. Witte, C. Rathgeb, and C. Busch, “Context-aware mobile biometric authentication based on support vector machines,” in Emerging Security Technologies (EST), 2013 Fourth International Conference on. IEEE, pp. 29-32(2013).
  • C. Bo, L. Zhang, X.-Y. Li, Q. Huang, and Y. Wang, “Silentsense: silent user identification via touch and movement behavioural biometrics,” in Proceedings of the 19th annual international conference on Mobile computing & networking. ACM, pp. 187-190(2013).
  • Y. Song, Z. Cai, and Z.-L. Zhang, “Multi-touch authentication using hand geometry and behavioral information,” in Security and Privacy (SP), 2017 IEEE Symposium on. IEEE, pp. 357-372(2017).
  • P. Saravanan, S. Clarke, D. H. P. Chau, and H. Zha, “Latentgesture: active user authentication through background touch analysis,” in Proceedings of the Second International Symposium of Chinese CHI. ACM, pp.110-113(2014).
  • F. E. Sandnes and X. Zhang, “User identification based on touch dynamics,” in Ubiquitous Intelligence & Computing and 9th International Conference on Autonomic & Trusted Computing (UIC/ATC), 2012 9th International Conference on. IEEE, pp. 256-263(2012).
  • Y. S. Lee, W. Hetchily, J. Shelton, D. Gunn, K. Roy, A. Esterline, and X. Yuan, “Touch based active user authentication using deep belief networks and random forests,” in Information Communication and Management (ICICM), International Conference on. IEEE, pp. 304-308, (2016).
  • L. Li, X. Zhao, and G. Xue, “Systems and methods for authenticating a user through an unobservable re-authentication system,” Jun. 12 2018, US Patent 9,996,803(2018).
  • M. Ehatisham-ulHaq, M. A. Azam, U. Naeem, Y. Amin, and J. Loo, “Continuous authentication of smartphone users based on activity pattern recognition using passive mobile sensing,” Journal of Network and Computer Applications, vol. 109, pp. 24-35, (2018). doi: 10.1016/j.jnca.2018.02.020
  • X. Zhao, T. Feng, W. Shi, and I. A. Kakadiaris, “Mobile user authentication using statistical touch dynamics images,” IEEE Transactions on Information Forensics and Security, vol. 9, no. 11, pp. 1780-1789, (2014). doi: 10.1109/TIFS.2014.2350916
  • S. Mondal and P. Bours, “A continuous combination of security & forensics for mobile devices,” Journal of information security and applications, vol. 40, pp. 63-77, (2018). doi: 10.1016/j.jisa.2018.03.001
  • Y. Li, H. Hu, G. Zhou, and S. Deng, “Sensor-based continuous authentication using cost-effective kernel ridge regression,” IEEE Access, (2018).
  • J. Fierrez, A. Pozo, M. Martinez-Diaz, J. Galbally, and A. Morales, “Benchmarking touchscreen biometrics for mobile authentication,” IEEE Transactions on Information Forensics and Security, vol. 13, no. 11, pp. 2720-2733,(2018). doi: 10.1109/TIFS.2018.2833042
  • C. Shen, Y. Li, Y. Chen, X. Guan, and R. A. Maxion, “Performance analysis of multi-motion sensor behavior for active smartphone authentication,” IEEE Transactions on Information Forensics and Security, vol. 13, no. 1,pp. 48-62, (2018). doi: 10.1109/TIFS.2017.2737969
  • J. Fierrez-Aguilar, L. Nanni, J. Lopez-Peñalba, J. Ortega-Garcia, and D. Maltoni, “An on-line signature verification system based on fusion of local and global information,” in International Conference on Audio-and Video-Based Biometric Person Authentication. Springer, pp. 523-532, (2005).
  • R. P. Bunker and F. Thabtah, “A machine learning framework for sport result prediction,” Applied Computing and Informatics, (2017).
  • P. Berens et al., “Circstat: a matlab toolbox for circular statistics,” J Stat Software, vol. 31, no. 10, pp. 1-21, (2009). doi: 10.18637/jss.v031.i10
  • Kumari, A., YahyaAbbasi, M., Kumar, V., & Khan, A. A. (2019). A secure user authentication protocol using elliptic curve cryptography. Journal of Discrete Mathematical Sciences and Cryptography, 22(4), 521-530. doi: 10.1080/09720529.2019.1637155
  • A. Gupta, R. Agrawal, and B. Kaur, “Performance enhancement of mental task classification using eeg signal: a study of multivariate feature selection methods,” Soft Computing, vol. 19, no. 10, pp. 2799-2812, (2015). doi: 10.1007/s00500-014-1443-1
  • Kumar, D., Singh, H. K., & Ahlawat, C. (2019). A secure three-factor authentication scheme for wireless sensor networks using ECC. Journal of Discrete Mathematical Sciences and Cryptography, 1-22. doi: 10.1080/09720529.2019.1627072
  • Wu, X., Qu, J., & Feng, Y. (2018). Security enhancement on an anonymous authentication scheme for wireless communications using smart cards. Journal of Discrete Mathematical Sciences and Cryptography, 21(5), 1139-1155. doi: 10.1080/09720529.2018.1489426

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.