Abstract
Currently most mobile phones use touch screen, In addition the behavior of user’s touch gesture is significantly important in interaction with the phone. Due to increasing demand for safer access in touch screen mobile phones, old strategies like pins, tokens, or passwords have failed to stay abreast of the challenges. However, we study user authentication scheme based on this touch dynamics features for accurate user authentication. We developed the software needed to collect readings from touch screen of mobile phone running the Android operation system. Several touch dynamics features are examined to explore the efficiency of feature and each category (similar processing and representation form). Also, the impact of normalization and seven feature selection algorithms are examined. After applying Exhaustive Search reduction technique to the observation vectors composed of all 12 extracted features, nine features are retained.
Keywords
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Feng, T., Liu, Z., Kwon, K.-A., Shi, W., Carbunar, B., Jiang, Y., et al.: Continuous mobile authentication using touchscreen gestures. In: 2012 IEEE Conference on Technologies for Homeland Security (HST), pp. 451–456. IEEE (2012)
Meng, Y., Wong, D.S., Schlegel, R., Kwok, L.-f.: Touch Gestures Based Biometric Authentication Scheme for Touchscreen Mobile Phones. In: Kutyłowski, M., Yung, M. (eds.) Inscrypt 2012. LNCS, vol. 7763, pp. 331–350. Springer, Heidelberg (2013)
Crawford, H.: Keystroke dynamics: Characteristics and opportunities. In: 2010 Eighth Annual International Conference on Privacy Security and Trust (PST), pp. 205–212. IEEE (2010)
Weiss, R., De Luca, A.: PassShapes: utilizing stroke based authentication to increase password memorability. In: Proceedings of the 5th Nordic Conference on Human-computer Interaction: Building Bridges, pp. 383–392. ACM (2008)
Zheng, N., Bai, K., Huang, H., Wang, H.: You Are How You Touch: User Verification on Smartphones via Tapping Behaviors. In: William, Mary (eds.) Department of Computer Science, pp. 1–13. WM-CS (2012)
Sesa-Nogueras, E., Faundez-Zanuy, M.: Biometric recognition using online uppercase handwritten text. Pattern Recognition 45(1), 128–144 (2012)
El-Abed, M., Giot, R., Hemery, B., Rosenberger, C.: A study of users’ acceptance and satisfaction of biometric systems. In: 2010 IEEE International Carnahan Conference on Security Technology (ICCST), pp. 170–178. IEEE (2010)
Jain, A.K., Kumar, A.: Biometrics of next generation: An overview, pp. 1–36. Springer, Berlin (2010)
Shanmugapriya, D., Padmavathi, G.: An Efficient Feature Selection Technique for User Authentication using Keystroke Dynamics. IJCSNS International Journal of Computer Science and Network Security 11(10), 191–195 (2011)
Karnan, M., Akila, M., Krishnaraj, N.: Biometric personal authentication using keystroke dynamics: A review. Applied Soft Computing 11(2), 1565–1573 (2011)
Ngugi, B., Tremaine, M., Tarasewich, P.: Biometric keypads: Improving accuracy through optimal PIN selection. Decision Support Systems 50(4), 769–776 (2011)
Zheng, N., Paloski, A., Wang, H.: An efficient user verification system via mouse movements. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, pp. 139–150. ACM (2011)
Yampolskiy, R.V., Govindaraju, V.: Taxonomy of behavioural biometrics. Behavioral Biometrics for Human Identification, 1–43 (2010)
Wolff, M.: Behavioral Biometric Identification on Mobile Devices. In: Schmorrow, D.D., Fidopiastis, C.M. (eds.) AC/HCII 2013. LNCS (LNAI), vol. 8027, pp. 783–791. Springer, Heidelberg (2013)
Sae-Bae, N., Ahmed, K., Isbister, K., Memon, N.: Biometric-rich gestures: a novel approach to authentication on multi-touch devices. In: Proceedings of the 2012 ACM Annual Conference on Human Factors in Computing Systems, pp. 977–986. ACM (2012)
Anthony, L., Brown, Q., Nias, J., Tate, B., Mohan, S.: Interaction and recognition challenges in interpreting children’s touch and gesture input on mobile devices. In: Proceedings of the 2012 ACM International Conference on Interactive Tabletops and Surfaces, pp. 225–234. ACM (2012)
Angulo, J., Wästlund, E.: Exploring touch-screen biometrics for user identification on smart phones. In: Camenisch, J., Crispo, B., Fischer-Hübner, S., Leenes, R., Russello, G. (eds.) Privacy and Identity 2011. IFIP AICT, vol. 375, pp. 130–143. Springer, Heidelberg (2012)
Guerra-Casanova, J., Sánchez-Ávila, C., Bailador, G., de Santos Sierra, A.: Authentication in mobile devices through hand gesture recognition. International Journal of Information Security 11(2), 65–83 (2012)
Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., Witten, I.H.: The WEKA data mining software: an update. ACM SIGKDD Explorations Newsletter 11(1), 10–18 (2009)
Bosch, A., Zisserman, A., Munoz, X.: Image classification using random forests and ferns. In: International Conference on Computer Vision, ICCV 2007, pp. 14–20 (2007)
Schroff, F., Criminisi, A., Zisserman, A.: Object class segmentation using random forests. In: British Machine Vision Conference, BMVC, pp. 1–4 (2008)
Meier, R.: Professional Android 4 application development. John Wiley & Sons Publishing, Inc. (2012)
Janecek, A., Gansterer, W.N., Demel, M., Ecker, G.: On the Relationship Between Feature Selection and Classification Accuracy. In: FSDM, pp. 90–105. Citeseer (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Alariki, A.A., Manaf, A.A. (2014). Investigation of Touch-Based User Authentication Features Using Android Smartphone. In: Hassanien, A.E., Tolba, M.F., Taher Azar, A. (eds) Advanced Machine Learning Technologies and Applications. AMLTA 2014. Communications in Computer and Information Science, vol 488. Springer, Cham. https://doi.org/10.1007/978-3-319-13461-1_14
Download citation
DOI: https://doi.org/10.1007/978-3-319-13461-1_14
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-13460-4
Online ISBN: 978-3-319-13461-1
eBook Packages: Computer ScienceComputer Science (R0)