Abstract
The convergence of our increasing reliance on mobile devices to access online services and the increasing number of online services bring to light usability and security problems in password entry. We propose using gestures with taps to the screen as an alternative to passwords. We test the recall and forgery of gesture authentication and show, using dynamic time warping, that even simple gestures are repeatable by their creators yet hard to forge by attackers when taps are added.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Weka machine learning project, http://www.cs.waikato.ac.nz/~ml/weka
Adams, A., Sasse, M.A.: Users are not the enemy. Commun. ACM 42(12), 40–46 (1999)
Chong, M.K., Marsden, G.: Exploring the Use of Discrete Gestures for Authentication. In: Gross, T., Gulliksen, J., Kotzé, P., Oestreicher, L., Palanque, P., Prates, R.O., Winckler, M. (eds.) INTERACT 2009. LNCS, vol. 5727, pp. 205–213. Springer, Heidelberg (2009)
Czeskis, A., Koscher, K., Smith, J., Kohno, T.: Rfids and secret handshakes: defending against ghost-and-leech attacks and unauthorized reads with context-aware communications. In: CCS 2008: Proceedings of the 15th ACM Conference on Computer and Communications Security, pp. 479–490. ACM, New York (2008)
Farella, E., O’Modhrain, S., Benini, L., Riccó, B.: Gesture Signature for Ambient Intelligence Applications: A Feasibility Study. In: Fishkin, K.P., Schiele, B., Nixon, P., Quigley, A. (eds.) PERVASIVE 2006. LNCS, vol. 3968, pp. 288–304. Springer, Heidelberg (2006)
Gafurov, D., Helkala, K., Søndrol, T.: Biometric gait authentication using accelerometer sensor. Journal of Computers 1(7) (2006)
Gafurov, D., Snekkkenes, E.: Arm swing as a weak biometric for unobtrusive user authentication. In: International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 1080–1087 (2008)
Giorgino, T.: Computing and visualizing dynamic time warping alignments in r: The dtw package. Journal of Statistical Software 31(7), 1–24 (2009)
Jain, A., Bolle, R., Pankanti, S. (eds.): Biometrics: Personal Identification in Networked Society. Kluwer Academic Publishers (1999)
Jakobsson, M., Shi, E., Golle, P., Chow, R.: Implicit authentication for mobile devices. In: 4th USENIX Workshop on Hot Topics in Security, HotSec 2009 (2009)
Karlof, C., Goto, B., Wagner, D.: Conditioned-safe ceremonies and a user study of an application to web authentication. In: Sixteenth Annual Network and Distributed Systems Security Symposium (2009)
Kunze, K.: Context logger, http://contextlogger.blogspot.com/
Lei, H., Govindaraju, V.: A comparative study on the consistency of features in on-line signature verification. Pattern Recogn. Lett. 26(15), 2483–2489 (2005)
Liu, J., Wang, Z., Zhong, L., Wickramasuriya, J., Vasudevan, V.: uWave: Accelerometer-based personalized gesture recognition and its applications. In: IEEE Int. Conf. Pervasive Computing and Communication (PerCom) (March 2009)
Liu, J., Zhong, L., Wickramasuriya, J., Vasudevan, V.: User evaluation of lightweight user authentication with a single tri-axis accelerometer. In: Proceedings of the 11th International Conference on Human-Computer Interaction with Mobile Devices and Services, MobileHCI 2009, pp. 15:1–15:10. ACM, New York (2009)
Mäntyjärvi, J., Lindholm, M., Vildjiounaite, E., Mäkelä, S., Ailisto, H.: Identifying users of portable devices from gait pattern with accelerometers. In: Proceedings of IEEE Interational Conference on Acoustics, Speech, and Signal Processing, ICASSP 2005 (2005)
Nalwa, V.S.: Automatic On-line Signature Verification. In: Chin, R., Pong, T.-C. (eds.) ACCV 1998. LNCS, vol. 1351, pp. 10–15. Springer, Heidelberg (1997)
Patel, S., Pierce, J., Abowd, G.: A gesture-based authentication scheme for untrusted public terminals. In: ACM Symposium on User Interface Software and Technology, pp. 157–160. ACM Press (2004)
Poppinga, B., Schlömer, T.: wiigee: A Java based gesture recognition library for the wii remote, http://wiigee.sourceforge.net/
Pylvänäinen, T.: Accelerometer Based Gesture Recognition Using Continuous HMMs. In: Marques, J.S., Pérez de la Blanca, N., Pina, P. (eds.) IbPRIA 2005, Part I. LNCS, vol. 3522, pp. 639–646. Springer, Heidelberg (2005)
Ravi, N., Dandekar, N., Mysore, P., Littman, M.: Activity recognition from accelerometer data. In: American Association for Artificial Intelligence (2005)
Schlömer, T., Poppinga, B., Henze, N., Boll, S.: Gesture recognition with a wii controller. In: TEI 2008: Proceedings of the 2nd International Conference on Tangible and Embedded Interaction, pp. 11–14. ACM, New York (2008)
Wobbrock, J.O.: Tapsongs: tapping rhythm-based passwords on a single binary sensor. In: Proceedings of the 22nd Annual ACM Symposium on User Interface Software and Technology, UIST 2009, pp. 93–96. ACM, New York (2009)
Yan, J., Blackwell, A., Anderson, R., Grant, A.: Password memorability and security: Empirical results. IEEE Security and Privacy 2(5), 25–31 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Niu, Y., Chen, H. (2012). Gesture Authentication with Touch Input for Mobile Devices. In: Prasad, R., Farkas, K., Schmidt, A.U., Lioy, A., Russello, G., Luccio, F.L. (eds) Security and Privacy in Mobile Information and Communication Systems. MobiSec 2011. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 94. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30244-2_2
Download citation
DOI: https://doi.org/10.1007/978-3-642-30244-2_2
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-30243-5
Online ISBN: 978-3-642-30244-2
eBook Packages: Computer ScienceComputer Science (R0)