Proceedings of the 12th Annual International Conference on Mobile Systems, Applications, and Services 2014
DOI: 10.1145/2594368.2594375
|View full text |Cite
|
Sign up to set email alerts
|

User-generated free-form gestures for authentication

Abstract: This paper studies the security and memorability of free-form multitouch gestures for mobile authentication. Towards this end, we collected a dataset with a generate-test-retest paradigm where participants (N=63) generated free-form gestures, repeated them, and were later retested for memory. Half of the participants decided to generate one-finger gestures, and the other half generated multifinger gestures. Although there has been recent work on templatebased gestures, there are yet no metrics to analyze secur… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
94
1

Year Published

2015
2015
2022
2022

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 94 publications
(95 citation statements)
references
References 39 publications
(78 reference statements)
0
94
1
Order By: Relevance
“…Their scheme used mutual information to select features that give high information gain. Sherman et al [32] studied free-form multitouch gestures for mobile authentication. A part of their work used mutual information to illustrate the security strength of free-form gestures.…”
Section: Related Workmentioning
confidence: 99%
“…Their scheme used mutual information to select features that give high information gain. Sherman et al [32] studied free-form multitouch gestures for mobile authentication. A part of their work used mutual information to illustrate the security strength of free-form gestures.…”
Section: Related Workmentioning
confidence: 99%
“…As mobile devices are becoming ubiquitous, recent years have witnessed growing research interest in applying behavioral biometrics to mobile authentication. Many behavioral biometrics studies have been conducted based on phone touch operations [5], [29], [32], PIN and unlock pattern operations [4], [11], online signatures [19], [10], multitouch gestures [18], [21], [22] and three-dimensional gestures [13], [30], [28]. …”
Section: Related Workmentioning
confidence: 99%
“…Compared to physiological biometrics, behavioral biometrics, which is embedded in humans’ behavior, is more difficult to steal or mimic and therefore causes less privacy concerns. Among growing interests in applying behavioral biometrics to security and privacy protection, gesture or motion based behavioral biometric authentication has attracted a great deal of research efforts (e.g., [1], [4], [18], [21], [24], [22], [19], [32], [30], [3]).…”
Section: Introductionmentioning
confidence: 99%
“…Sherman et al [21] studies the security and memorability of using userdefined free-form multi-touch gestures for authentication. These forms of data have rich biometric characteristics of the user.…”
Section: Related Workmentioning
confidence: 99%