Abstract
Mobile phone touch screen devices are equipped with high processing power and high memory. This led to users not only storing photos or videos but stored sensitive application such as banking applications. As a result of that the security system of the mobile phone touch screen devices becomes sacrosanct. The application of machine learning algorithms in enhancing security on mobile phone touch screen devices is gaining a tremendous popularity in both academia and the industry. However, notwithstanding the growing popularity, up to date no comprehensive survey has been conducted on machine learning algorithms solutions to improve the security of mobile phone touch screen devices. This survey aims to connect this gap by conducting a comprehensive survey on the solutions of machine learning algorithms to improve the security of mobile phone touch screen devices including the analysis and synthesis of the algorithms and methodologies provided for those solutions. This article presents a comprehensive survey and a new taxonomy of the state-of-the-art literature on machine learning algorithms in improving the security of mobile phone touch screen devices. The limitation of the methodology in each article reviewed is pointed out. Challenges of the existing approaches and new perspective of future research directions for developing more accurate and robust solutions to mobile phone touch screen security are discussed. In particular, the survey found that exploring of different aspects of deep learning solutions to improve the security of mobile phone touch screen devices is under-explored.
Similar content being viewed by others
References
Shahzad M, Liu AX, Samuel A (2017) Behavior based human authentication on touch screen devices using gestures and signatures. IEEE Trans Mob Comput 16:2726–2741
Ernst M, Swan T, Cheung V, Girouard A (2017) Typhlex: exploring deformable input for blind users controlling a mobile screen reader. IEEE Pervasive Comput 16:28–35
Lai J, Zhang D (2015) ExtendedThumb: a target acquisition approach for one-handed interaction with touch-screen mobile phones. IEEE Trans Hum–Mach Syst 45:362–370
Yu J, Han H, Zhu H, Chen Y, Yang J, Zhu Y et al (2015) Sensing human-screen interaction for energy-efficient frame rate adaptation on smartphones. IEEE Trans Mob Comput 14:1698–1711
Statista (2018) Number of mobile phone users worldwide from 2015 to 2020 (in billions). https://www.statista.com/statistics/274774/forecast-of-mobile-phone-users-worldwide/. Accessed 23 Dec 2019
Francese R, Risi M, Tortora G, Tucci M (2016) Visual mobile computing for mobile end-users. IEEE Trans Mob Comput 15:1033–1046
Arteaga-Falconi JS, Al Osman H, El Saddik A (2016) ECG authentication for mobile devices. IEEE Trans Instrum Meas 65:591–600
Clark GD, Lindqvist J (2015) Engineering gesture-based authentication systems. IEEE Pervasive Comput 14:18–25
Vu T, Baid A, Gao S, Gruteser M, Howard R, Lindqvist J et al (2014) Capacitive touch communication: a technique to input data through devices’ touch screen. IEEE Trans Mob Comput 13:4–19
Zhao X, Feng T, Shi W, Kakadiaris IA (2014) Mobile user authentication using statistical touch dynamics images. IEEE Trans Inf Forensics Secur 9:1780–1789
Smola AJ, Schölkopf B (2004) A tutorial on support vector regression. Stat Comput 14:199–222
Meyer D, Wien FT (2001) Support vector machines. R News 1:23–26
Zhou L, Burgoon JK, Twitchell DP, Qin T, Nunamaker JF Jr (2004) A comparison of classification methods for predicting deception in computer-mediated communication. J Manag Inf Syst 20:139–166
Bishop CM (1995) Neural networks for pattern recognition. Oxford University Press, Oxford
Kennedy J, Eberhart R (1995) Particle swarm optimization. In: Proceedings of IEEE international conference on neural networks, Piscataway December
Venter G, Sobieszczanski-Sobieski J (2003) Particle swarm optimization. AIAA J 41:1583–1589
Peterson LE (2009) K-nearest neighbor. Scholarpedia 4:1883
Gou J, Du L, Zhang Y, Xiong T (2012) A new distance-weighted k-nearest neighbor classifier. J Inf Comput Sci 9(6):1429–1436
Svetnik V, Liaw A, Tong C, Culberson JC, Sheridan RP, Feuston BP (2003) Random forest: a classification and regression tool for compound classification and QSAR modeling. J Chem Inf Comput Sci 43:1947–1958
Pal M (2005) Random forest classifier for remote sensing classification. Int J Remote Sens 26(1):217–222
Keogh EJ, Pazzani MJ (2001) Derivative dynamic time warping. In: Proceedings of the 2001 SIAM international conference on data mining, pp 1–11
De Luca A, Hang A, Brudy F, Lindner C, Hussmann H (2012) Touch me once and i know it’s you!: implicit authentication based on touch screen patterns. In: Proceedings of the SIGCHI conference on human factors in computing systems, pp 987–996
Youssef AM, Abdel-Galil TK, El-Saadany EF, Salama MMA (2004) Disturbance classification utilizing dynamic time warping classifier. IEEE Trans Power Delivery 19(1):272–278
Sahami M (1996) Learning limited dependence bayesian classifiers. In: KDD, pp 335–338
Friedman N, Geiger D, Goldszmidt M (1997) Bayesian network classifiers. Mach Learn 29:131–163
Alpaydin E (2004) Support vector machines. Introd Mach Learn 2004:218–225
Li F, Clarke N, Papadaki M, Dowland P (2011) Behaviour profiling for transparent authentication for mobile devices. In: Edith Cowan University Research Online, pp 307–314
Campisi P, Maiorana E, Bosco ML, Neri A (2009) User authentication using keystroke dynamics for cellular phones. IET Signal Proc 3(4):333–341
Kumar P, Saini R, Roy PP, Dogra DP (2017) A bio-signal based framework to secure mobile devices. J Netw Comput Appl 89:62–71
Van Nguyen T, Sae-Bae N, Memon N (2017) DRAW-A-PIN: authentication using finger-drawn PIN on touch devices. Comput Secur 66:115–128
Ye G, Tang Z, Fang D, Chen X, Kim KI, Taylor B et al (2017) Cracking android pattern lock in five attempts. In: Proceedings of the 2017 network and distributed system security symposium 2017 (NDSS 17). Internet Society, pp 1–15. https://doi.org/10.14722/ndss.2017.23130
Song Y, Cai Z, Zhang Z-L (2017) Multi-touch authentication using hand geometry and behavioral information. In: 2017 IEEE symposium on security and privacy (SP), pp 357–372
Su X, Wang B, Zhang X, Wang Y, Choi D (2018) User biometric information-based secure method for smart devices. Concurr Comput Pract Exp 30:e4150
Liang Y, Cai Z, Yu J, Han Q, Li Y (2018) Deep learning based inference of private information using embedded sensors in smart devices. IEEE Netw 32:8–14
Shen S-S, Kang T-H, Lin S-H, Chien W (2017) Random graphic user password authentication scheme in mobile devices. In: 2017 International conference on applied system innovation (ICASI), pp 1251–1254
Mehrnezhad M, Toreini E, Shahandashti SF, Hao F (2018) Stealing PINs via mobile sensors: actual risk versus user perception. Int J Inf Secur 17:291–313
Pitropakis N, Panaousis E, Giannetsos T, Anastasiadis E, Loukas G (2019) A taxonomy and survey of attacks against machine learning. Comput Sci Rev 34:100199
Banerjee N, Giannetsos T, Panaousis E, Took CC (2018) Unsupervised Learning for Trustworthy IoT. In: 2018 IEEE international conference on fuzzy systems (FUZZ-IEEE), pp 1–8
Chen B, Carvalho W, Baracaldo N, Ludwig H, Edwards B, Lee T et al (2018) Detecting backdoor attacks on deep neural networks by activation clustering. arXiv preprint arXiv:1811.03728
Barreno M, Nelson B, Joseph AD, Tygar JD (2010) The security of machine learning. Mach Learn 81:121–148
Zhou Y, Wang Z, Zhou W, Jiang X (2012) Hey, you, get off of my market: detecting malicious apps in official and alternative android markets. In: NDSS, pp 50–52
Abubakar AI, Chiroma H, Muaz SA, Ila LB (2015) A review of the advances in cyber security benchmark datasets for evaluating data-driven based intrusion detection systems. Procedia Comput Sci 62:221–227
Shahzad M, Liu AX, Samuel A (2013) Secure unlocking of mobile touch screen devices by simple gestures: you can see it but you can not do it. In: Proceedings of the 19th annual international conference on mobile computing and networking, pp 39–50
Engelstad P, Feng B, van Do T (2016) Strengthening mobile network security using machine learning. In: International conference on mobile web and information systems, pp 173–183
Frank M, Biedert R, Ma E, Martinovic I, Song D (2013) Touchalytics: on the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE Trans Inf Forensics Secur 8:136–148
Bo C, Zhang L, Li X-Y, Huang Q, Wang Y (2013) Silentsense: silent user identification via touch and movement behavioral biometrics. In: Proceedings of the 19th annual international conference on Mobile computing and networking, pp 187–190
Saravanan P, Clarke S, Chau DHP, Zha H (2014) Latentgesture: active user authentication through background touch analysis. In: Proceedings of the second international symposium of Chinese CHI, pp 110–113
Ehatisham-ul-Haq M, Azam MA, Naeem U, Amin Y, Loo J (2018) Continuous authentication of smartphone users based on activity pattern recognition using passive mobile sensing. J Netw Comput Appl 109:24–35
Burgbacher U, Hinrichs K(2014) An implicit author verification system for text messages based on gesture typing biometrics. In: Proceedings of the SIGCHI conference on human factors in computing systems, pp 2951–2954
Chen Y, Sun J, Zhang R, Zhang Y (2015) Your song your way: rhythm-based two-factor authentication for multi-touch mobile devices. In: 2015 IEEE conference on computer communications (INFOCOM), pp 2686–2694
Xu H, Zhou Y, Lyu MR (2014) Towards continuous and passive authentication via touch biometrics: An experimental study on smartphones. In: Symposium on usable privacy and security, SOUPS, pp 187–198
Zhang D, Kang Y, Zhou L, Lai J (2016) Continuous user authentication on touch-screen mobile phones: toward more secure and usable M-commerce. In: Workshop on E-business, pp 225–236
Kambourakis G, Damopoulos D, Papamartzivanos D, Pavlidakis E (2016) Introducing touchstroke: keystroke-based authentication system for smartphones. Secur Commun Netw 9:542–554
Lin C-C, Chang C-C, Liang D, Yang C-H (2012) A new non-intrusive authentication method based on the orientation sensor for smartphone users. In: 2012 IEEE sixth international conference on software security and reliability (SERE), pp 245–252
Buczak AL, Guven E (2016) A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun Surv Tutor 18:1153–1176
Buschek D, De Luca A, Alt F (2015) Improving accuracy, applicability and usability of keystroke biometrics on mobile touchscreen devices. In: Proceedings of the 33rd annual ACM conference on human factors in computing systems, pp 1393–1402
Feng T, Liu Z, Kwon K-A, Shi W, Carbunar B, Jiang Y et al (2012) Continuous mobile authentication using touchscreen gestures. In: 2012 IEEE conference on technologies for homeland security (HST), pp 451–456
Feng T, Zhao X, Carbunar B, Shi W (2013) Continuous mobile authentication using virtual key typing biometrics. In: 2013 12th IEEE international conference on trust, security and privacy in computing and communications (TrustCom), pp 1547–1552
Khalidd A (2017) Identifying smartphone users based on their activity patterns via mobile sensing. Procedia Comput Sci 113(2017):202–209. https://doi.org/10.1016/j.procs.2017.08.349
Kolly SM, Wattenhofer R, Welten S (2012) A personal touch: recognizing users based on touch screen behavior. In: Proceedings of the third international workshop on sensing applications on mobile phones, p 1
Zhang Y, Yang M, Ling Z, Liu Y, Wu W (2018) FingerAuth: 3D magnetic finger motion pattern based implicit authentication for mobile devices. Future Gener Comput Syst. https://doi.org/10.1016/j.future.2018.02.006
Antal M, Szabó LZ (2016) Biometric authentication based on touchscreen swipe patterns. Procedia Technol 22:862–869
Alpar O (2015) Intelligent biometric pattern password authentication systems for touchscreens. Expert Syst Appl 42:6286–6294
Zhou L, Kang Y, Zhang D, Lai J (2016) Harmonized authentication based on ThumbStroke dynamics on touch screen mobile phones. Decis Support Syst 92:14–24
Alpar O, Krejcar O (2015) Pattern password authentication based on touching location. In: International conference on intelligent data engineering and automated learning, pp 395–403
Beton M, Marie V, Rosenberger C (2013) Biometric secret path for mobile user authentication: a preliminary study. In: 2013 World congress on computer and information technology (WCCIT), pp 1–6
Nader J, Alsadoon A, Prasad P, Singh A, Elchouemi A (2015) Designing touch-based hybrid authentication method for smartphones. Procedia Comput Sci 70:198–204
Meng W, Wang Y, Wong DS, Wen S, Xiang Y (2018) TouchWB: touch behavioral user authentication based on web browsing on smartphones. J Netw Comput Appl 117:1–9
Meng Y, Wong DS, Schlegel R (2012) Touch gestures based biometric authentication scheme for touchscreen mobile phones. In: International conference on information security and cryptology, pp 331–350
Meng Y, Wong DS (2014) Design of touch dynamics based user authentication with an adaptive mechanism on mobile phones. In: Proceedings of the 29th annual ACM symposium on applied computing, pp 1680–1687
Samangouei P, Patel VM, Chellappa R (2017) Facial attributes for active authentication on mobile devices. Image Vis Comput 58:181–192
Feng T, Yang J, Yan Z, Tapia EM, Shi W (2014) Tips: context-aware implicit user identification using touch screen in uncontrolled environments. In: Proceedings of the 15th workshop on mobile computing systems and applications, p 9
Watanabe Y (2014) Influence of holding smart phone for acceleration-based gait authentication. In: 2014 Fifth international conference on emerging security technologies (EST), pp 30–33
Crawford H, Renaud K, Storer T (2013) A framework for continuous, transparent mobile device authentication. Comput Secur 39:127–136
Mahbub U, Sarkar S, Patel VM, Chellappa R (2016) Active user authentication for smartphones: a challenge data set and benchmark results. In: 2016 IEEE 8th international conference on biometrics theory, applications and systems (BTAS), pp 1–8
Roy A, Halevi T, Memon N (2014) An HMM-based behavior modeling approach for continuous mobile authentication. In: 2014 IEEE international conference on acoustics, speech and signal processing (ICASSP), pp 3789–3793
Fathy ME, Patel VM, Chellappa R (2015) Face-based active authentication on mobile devices. In: 2015 IEEE international conference on acoustics, speech and signal processing (ICASSP), pp 1687–1691
Jain A, Kanhangad V (2015) Exploring orientation and accelerometer sensor data for personal authentication in smartphones using touchscreen gestures. Pattern Recogn Lett 68:351–360
Serwadda A, Phoha VV, Wang Z (2013) Which verifiers work? A benchmark evaluation of touch-based authentication algorithms. In: 2013 IEEE sixth international conference on biometrics: theory, applications and systems (BTAS), pp 1–8
Sitová Z, Šeděnka J, Yang Q, Peng G, Zhou G, Gasti P et al (2016) HMOG: New behavioral biometric features for continuous authentication of smartphone users. IEEE Trans Inf Forensics Secur 11:877–892
Renear AH, Sacchi S, Wickett KM (2010) Definitions of dataset in the scientific and technical literature. In: Proceedings of the 73rd ASIS&T annual meeting on navigating streams in an information ecosystem, vol 47, p 81
Snijders C, Matzat U, Reips U-D (2012) “ Big Data”: big gaps of knowledge in the field of internet science. Int J Internet Sci 7:1–5
He F, Bao L, Wang R, Li J, Xu D, Zhao X (2017) A multimodal deep architecture for large-scale protein ubiquitylation site prediction. In 2017 IEEE international conference on bioinformatics and biomedicine (BIBM), pp 108–113
Ibrahim R, Yousri NA, Ismail MA, El-Makky NM (2014) Multi-level gene/MiRNA feature selection using deep belief nets and active learning. In: 2014 36th annual international conference of the IEEE engineering in medicine and biology society (EMBC), pp 3957–3960
Yang X-S, Deb S, Fong S (2011) Accelerated particle swarm optimization and support vector machine for business optimization and applications. In: International conference on networked digital technologies, pp 53–66
Zhang X, Wang J, Zhang K (2017) Short-term electric load forecasting based on singular spectrum analysis and support vector machine optimized by Cuckoo search algorithm. Electr Power Syst Res 146:270–285
Tomar D, Agarwal S (2015) Twin support vector machine: a review from 2007 to 2014. Egypt Inform J 16:55–69
Newman LH (2018) Exploiting decades-old telephone tech to break into android devices. https://www.wired.com. Accessed 20 Dec 2019
Zhang Q, Yang LT, Chen Z, Li P (2018) A survey on deep learning for big data. Inf Fusion 42:146–157
Wang H, Raj B (2015) A survey: time travel in deep learning space: an introduction to deep learning models and how deep learning models evolved from the initial ideas. arXiv preprint arXiv:1510.04781
Acknowledgement
This research is supported by TETFund Institutional Based Research Grant through Federal College of Education (Technical), Gombe, Nigeria.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declared that there is no conflict of interest.
Ethical approval
This is a literature review article and does not involve human subject for data collection. There is no need for ethical approval.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Bello, A.A., Chiroma, H., Gital, A.Y. et al. Machine learning algorithms for improving security on touch screen devices: a survey, challenges and new perspectives. Neural Comput & Applic 32, 13651–13678 (2020). https://doi.org/10.1007/s00521-020-04775-0
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00521-020-04775-0