2019
DOI: 10.32604/cmc.2019.06294
|View full text |Cite
|
Sign up to set email alerts
|

Smartphone User Authentication Based on Holding Position and Touch-Typing Biometrics

Abstract: In this advanced age, when smart phones are the norm, people utilize social networking, online shopping, and even private information storage through smart phones. As a result, identity authentication has become the most critical security activity in this period of the intelligent craze. By analyzing the shortcomings of the existing authentication methods, this paper proposes an identity authentication method based on the behavior of smartphone users. Firstly, the sensor data and touch-screen data of the smart… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…This sensor can further be implemented in the Wireless Body area network (WBAN), and can be integrated into Ehealthcare platforms, owing to the advancements in digitization. Some more related literature can be studied in the references [54][55][56][57][58].…”
Section: Discussionmentioning
confidence: 99%
“…This sensor can further be implemented in the Wireless Body area network (WBAN), and can be integrated into Ehealthcare platforms, owing to the advancements in digitization. Some more related literature can be studied in the references [54][55][56][57][58].…”
Section: Discussionmentioning
confidence: 99%
“…An increasingly popular form of biometric authentication is through the recognition of mouse movements or keyboard-based behavioral patterns. Rapid User Mouse Behavior Authentication (RUMBA) [22] is a novel attempt to detect patterns in mouse movements using RNNs and the architecture of this model is represented in Figure 2. The researchers took this approach because monitoring physical characteristics requires access to extra hardware like specialized sensors.…”
Section: Mouse and Keyboard Based Authentication Methodsmentioning
confidence: 99%
“…Their model was able to achieve 9.2% EER in mobile authentication with a triplet loss function when balancing enrollment data and performance. In [53], weighted results from and RNN and a SVM were used to authenticate keystroke data. A small dataset consisting of motion sensor, touchscreen, and temporal data from 10 users was used to train the models.…”
Section: Keystroke Dynamicsmentioning
confidence: 99%