2021
DOI: 10.1007/s12652-021-03301-x
|View full text |Cite
|
Sign up to set email alerts
|

A broad review on non-intrusive active user authentication in biometrics

Abstract: Authentication is the process of keeping the user's personal information as confidential in digital applications. Moreover, the user authentication process in the digital platform is employed to verify the own users by some authentication methods like biometrics, voice recognition, and so on. Traditionally, a one-time login based credential verification method was utilized for user authentication. Recently, several new approaches were proposed to enhance the user authentication framework but those approaches h… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(7 citation statements)
references
References 108 publications
(94 reference statements)
0
7
0
Order By: Relevance
“…A review of non-intrusive active user authentication using biometrics to investigate the merits and demerits of authentication system was investigated in [15]. An overview of numerous continuous authentication systems on mobile devices was analyzed in [16].…”
Section: Continuous User Authentication Progress and Challengesmentioning
confidence: 99%
“…A review of non-intrusive active user authentication using biometrics to investigate the merits and demerits of authentication system was investigated in [15]. An overview of numerous continuous authentication systems on mobile devices was analyzed in [16].…”
Section: Continuous User Authentication Progress and Challengesmentioning
confidence: 99%
“…It can capture coordinates of a pointing device (such as a mouse) including clientX/Y, pageX/Y, offsetX/Y, and movementX/Y in addition to its events such as click, dblclick, and mousemove without requiring any permission. Beginning as early as 2004 [84], there has been a steady stream of studies demonstrating how mouse movements can be used to identify (or authenticate) users [99]. FP-Radar first detects the abuse of mouserelated keywords for user behavior fingerprinting in 2016 and since then has detected other properties such as movementX/Y, deltaX/Y/Z, and wheelDelta.…”
Section: Analysis Of Apis In the Fingerprinting Clustermentioning
confidence: 99%
“…TouchEvent interface, standardized in 2011 [67] and supported by all major browsers including mobile version of browsers since 2013, 5 is a non-permissioned interface that is similar to mouse interfaces except that it supports simultaneous touches and at different locations on the touch surface. Beginning as early as 2013 [92], there has been a steady stream of studies demonstrating how touch events can be use to identify (or authenticate) users [99]. Specifically, frequency of tapping (captured by events such as ontouchstart, touchenter, touchleave, and touchmove) and strength of tapping (captured by force) can be used for user behavior fingerprinting.…”
Section: Analysis Of Apis In the Fingerprinting Clustermentioning
confidence: 99%
“…For example, fingerprint sensors can deceive using fake fingerprints 4 and voice recognition systems can be fooled using voice recordings or mimics. 5 These biometrics can be forged easily and hence are highly susceptible to being misused or failing to provide the level of security the users desire. These forgeries can potentially lead to menacing consequences.…”
Section: Introductionmentioning
confidence: 99%