Skip to main content
Log in

Machine learning algorithms for improving security on touch screen devices: a survey, challenges and new perspectives

  • Original Article
  • Published:
Neural Computing and Applications Aims and scope Submit manuscript

Abstract

Mobile phone touch screen devices are equipped with high processing power and high memory. This led to users not only storing photos or videos but stored sensitive application such as banking applications. As a result of that the security system of the mobile phone touch screen devices becomes sacrosanct. The application of machine learning algorithms in enhancing security on mobile phone touch screen devices is gaining a tremendous popularity in both academia and the industry. However, notwithstanding the growing popularity, up to date no comprehensive survey has been conducted on machine learning algorithms solutions to improve the security of mobile phone touch screen devices. This survey aims to connect this gap by conducting a comprehensive survey on the solutions of machine learning algorithms to improve the security of mobile phone touch screen devices including the analysis and synthesis of the algorithms and methodologies provided for those solutions. This article presents a comprehensive survey and a new taxonomy of the state-of-the-art literature on machine learning algorithms in improving the security of mobile phone touch screen devices. The limitation of the methodology in each article reviewed is pointed out. Challenges of the existing approaches and new perspective of future research directions for developing more accurate and robust solutions to mobile phone touch screen security are discussed. In particular, the survey found that exploring of different aspects of deep learning solutions to improve the security of mobile phone touch screen devices is under-explored.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Shahzad M, Liu AX, Samuel A (2017) Behavior based human authentication on touch screen devices using gestures and signatures. IEEE Trans Mob Comput 16:2726–2741

    Google Scholar 

  2. Ernst M, Swan T, Cheung V, Girouard A (2017) Typhlex: exploring deformable input for blind users controlling a mobile screen reader. IEEE Pervasive Comput 16:28–35

    Google Scholar 

  3. Lai J, Zhang D (2015) ExtendedThumb: a target acquisition approach for one-handed interaction with touch-screen mobile phones. IEEE Trans Hum–Mach Syst 45:362–370

    Google Scholar 

  4. Yu J, Han H, Zhu H, Chen Y, Yang J, Zhu Y et al (2015) Sensing human-screen interaction for energy-efficient frame rate adaptation on smartphones. IEEE Trans Mob Comput 14:1698–1711

    Google Scholar 

  5. Statista (2018) Number of mobile phone users worldwide from 2015 to 2020 (in billions). https://www.statista.com/statistics/274774/forecast-of-mobile-phone-users-worldwide/. Accessed 23 Dec 2019

  6. Francese R, Risi M, Tortora G, Tucci M (2016) Visual mobile computing for mobile end-users. IEEE Trans Mob Comput 15:1033–1046

    Google Scholar 

  7. Arteaga-Falconi JS, Al Osman H, El Saddik A (2016) ECG authentication for mobile devices. IEEE Trans Instrum Meas 65:591–600

    Google Scholar 

  8. Clark GD, Lindqvist J (2015) Engineering gesture-based authentication systems. IEEE Pervasive Comput 14:18–25

    Google Scholar 

  9. Vu T, Baid A, Gao S, Gruteser M, Howard R, Lindqvist J et al (2014) Capacitive touch communication: a technique to input data through devices’ touch screen. IEEE Trans Mob Comput 13:4–19

    Google Scholar 

  10. Zhao X, Feng T, Shi W, Kakadiaris IA (2014) Mobile user authentication using statistical touch dynamics images. IEEE Trans Inf Forensics Secur 9:1780–1789

    Google Scholar 

  11. Smola AJ, Schölkopf B (2004) A tutorial on support vector regression. Stat Comput 14:199–222

    MathSciNet  Google Scholar 

  12. Meyer D, Wien FT (2001) Support vector machines. R News 1:23–26

    MathSciNet  Google Scholar 

  13. Zhou L, Burgoon JK, Twitchell DP, Qin T, Nunamaker JF Jr (2004) A comparison of classification methods for predicting deception in computer-mediated communication. J Manag Inf Syst 20:139–166

    Google Scholar 

  14. Bishop CM (1995) Neural networks for pattern recognition. Oxford University Press, Oxford

    MATH  Google Scholar 

  15. Kennedy J, Eberhart R (1995) Particle swarm optimization. In: Proceedings of IEEE international conference on neural networks, Piscataway December

  16. Venter G, Sobieszczanski-Sobieski J (2003) Particle swarm optimization. AIAA J 41:1583–1589

    Google Scholar 

  17. Peterson LE (2009) K-nearest neighbor. Scholarpedia 4:1883

    Google Scholar 

  18. Gou J, Du L, Zhang Y, Xiong T (2012) A new distance-weighted k-nearest neighbor classifier. J Inf Comput Sci 9(6):1429–1436

    Google Scholar 

  19. Svetnik V, Liaw A, Tong C, Culberson JC, Sheridan RP, Feuston BP (2003) Random forest: a classification and regression tool for compound classification and QSAR modeling. J Chem Inf Comput Sci 43:1947–1958

    Google Scholar 

  20. Pal M (2005) Random forest classifier for remote sensing classification. Int J Remote Sens 26(1):217–222

    Google Scholar 

  21. Keogh EJ, Pazzani MJ (2001) Derivative dynamic time warping. In: Proceedings of the 2001 SIAM international conference on data mining, pp 1–11

  22. De Luca A, Hang A, Brudy F, Lindner C, Hussmann H (2012) Touch me once and i know it’s you!: implicit authentication based on touch screen patterns. In: Proceedings of the SIGCHI conference on human factors in computing systems, pp 987–996

  23. Youssef AM, Abdel-Galil TK, El-Saadany EF, Salama MMA (2004) Disturbance classification utilizing dynamic time warping classifier. IEEE Trans Power Delivery 19(1):272–278

    Google Scholar 

  24. Sahami M (1996) Learning limited dependence bayesian classifiers. In: KDD, pp 335–338

  25. Friedman N, Geiger D, Goldszmidt M (1997) Bayesian network classifiers. Mach Learn 29:131–163

    MATH  Google Scholar 

  26. Alpaydin E (2004) Support vector machines. Introd Mach Learn 2004:218–225

    Google Scholar 

  27. Li F, Clarke N, Papadaki M, Dowland P (2011) Behaviour profiling for transparent authentication for mobile devices. In: Edith Cowan University Research Online, pp 307–314

  28. Campisi P, Maiorana E, Bosco ML, Neri A (2009) User authentication using keystroke dynamics for cellular phones. IET Signal Proc 3(4):333–341

    Google Scholar 

  29. Kumar P, Saini R, Roy PP, Dogra DP (2017) A bio-signal based framework to secure mobile devices. J Netw Comput Appl 89:62–71

    Google Scholar 

  30. Van Nguyen T, Sae-Bae N, Memon N (2017) DRAW-A-PIN: authentication using finger-drawn PIN on touch devices. Comput Secur 66:115–128

    Google Scholar 

  31. Ye G, Tang Z, Fang D, Chen X, Kim KI, Taylor B et al (2017) Cracking android pattern lock in five attempts. In: Proceedings of the 2017 network and distributed system security symposium 2017 (NDSS 17). Internet Society, pp 1–15. https://doi.org/10.14722/ndss.2017.23130

  32. Song Y, Cai Z, Zhang Z-L (2017) Multi-touch authentication using hand geometry and behavioral information. In: 2017 IEEE symposium on security and privacy (SP), pp 357–372

  33. Su X, Wang B, Zhang X, Wang Y, Choi D (2018) User biometric information-based secure method for smart devices. Concurr Comput Pract Exp 30:e4150

    Google Scholar 

  34. Liang Y, Cai Z, Yu J, Han Q, Li Y (2018) Deep learning based inference of private information using embedded sensors in smart devices. IEEE Netw 32:8–14

    Google Scholar 

  35. Shen S-S, Kang T-H, Lin S-H, Chien W (2017) Random graphic user password authentication scheme in mobile devices. In: 2017 International conference on applied system innovation (ICASI), pp 1251–1254

  36. Mehrnezhad M, Toreini E, Shahandashti SF, Hao F (2018) Stealing PINs via mobile sensors: actual risk versus user perception. Int J Inf Secur 17:291–313

    Google Scholar 

  37. Pitropakis N, Panaousis E, Giannetsos T, Anastasiadis E, Loukas G (2019) A taxonomy and survey of attacks against machine learning. Comput Sci Rev 34:100199

    MathSciNet  Google Scholar 

  38. Banerjee N, Giannetsos T, Panaousis E, Took CC (2018) Unsupervised Learning for Trustworthy IoT. In: 2018 IEEE international conference on fuzzy systems (FUZZ-IEEE), pp 1–8

  39. Chen B, Carvalho W, Baracaldo N, Ludwig H, Edwards B, Lee T et al (2018) Detecting backdoor attacks on deep neural networks by activation clustering. arXiv preprint arXiv:1811.03728

  40. Barreno M, Nelson B, Joseph AD, Tygar JD (2010) The security of machine learning. Mach Learn 81:121–148

    MathSciNet  Google Scholar 

  41. Zhou Y, Wang Z, Zhou W, Jiang X (2012) Hey, you, get off of my market: detecting malicious apps in official and alternative android markets. In: NDSS, pp 50–52

  42. Abubakar AI, Chiroma H, Muaz SA, Ila LB (2015) A review of the advances in cyber security benchmark datasets for evaluating data-driven based intrusion detection systems. Procedia Comput Sci 62:221–227

    Google Scholar 

  43. Shahzad M, Liu AX, Samuel A (2013) Secure unlocking of mobile touch screen devices by simple gestures: you can see it but you can not do it. In: Proceedings of the 19th annual international conference on mobile computing and networking, pp 39–50

  44. Engelstad P, Feng B, van Do T (2016) Strengthening mobile network security using machine learning. In: International conference on mobile web and information systems, pp 173–183

  45. Frank M, Biedert R, Ma E, Martinovic I, Song D (2013) Touchalytics: on the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE Trans Inf Forensics Secur 8:136–148

    Google Scholar 

  46. Bo C, Zhang L, Li X-Y, Huang Q, Wang Y (2013) Silentsense: silent user identification via touch and movement behavioral biometrics. In: Proceedings of the 19th annual international conference on Mobile computing and networking, pp 187–190

  47. Saravanan P, Clarke S, Chau DHP, Zha H (2014) Latentgesture: active user authentication through background touch analysis. In: Proceedings of the second international symposium of Chinese CHI, pp 110–113

  48. Ehatisham-ul-Haq M, Azam MA, Naeem U, Amin Y, Loo J (2018) Continuous authentication of smartphone users based on activity pattern recognition using passive mobile sensing. J Netw Comput Appl 109:24–35

    Google Scholar 

  49. Burgbacher U, Hinrichs K(2014) An implicit author verification system for text messages based on gesture typing biometrics. In: Proceedings of the SIGCHI conference on human factors in computing systems, pp 2951–2954

  50. Chen Y, Sun J, Zhang R, Zhang Y (2015) Your song your way: rhythm-based two-factor authentication for multi-touch mobile devices. In: 2015 IEEE conference on computer communications (INFOCOM), pp 2686–2694

  51. Xu H, Zhou Y, Lyu MR (2014) Towards continuous and passive authentication via touch biometrics: An experimental study on smartphones. In: Symposium on usable privacy and security, SOUPS, pp 187–198

  52. Zhang D, Kang Y, Zhou L, Lai J (2016) Continuous user authentication on touch-screen mobile phones: toward more secure and usable M-commerce. In: Workshop on E-business, pp 225–236

  53. Kambourakis G, Damopoulos D, Papamartzivanos D, Pavlidakis E (2016) Introducing touchstroke: keystroke-based authentication system for smartphones. Secur Commun Netw 9:542–554

    Google Scholar 

  54. Lin C-C, Chang C-C, Liang D, Yang C-H (2012) A new non-intrusive authentication method based on the orientation sensor for smartphone users. In: 2012 IEEE sixth international conference on software security and reliability (SERE), pp 245–252

  55. Buczak AL, Guven E (2016) A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun Surv Tutor 18:1153–1176

    Google Scholar 

  56. Buschek D, De Luca A, Alt F (2015) Improving accuracy, applicability and usability of keystroke biometrics on mobile touchscreen devices. In: Proceedings of the 33rd annual ACM conference on human factors in computing systems, pp 1393–1402

  57. Feng T, Liu Z, Kwon K-A, Shi W, Carbunar B, Jiang Y et al (2012) Continuous mobile authentication using touchscreen gestures. In: 2012 IEEE conference on technologies for homeland security (HST), pp 451–456

  58. Feng T, Zhao X, Carbunar B, Shi W (2013) Continuous mobile authentication using virtual key typing biometrics. In: 2013 12th IEEE international conference on trust, security and privacy in computing and communications (TrustCom), pp 1547–1552

  59. Khalidd A (2017) Identifying smartphone users based on their activity patterns via mobile sensing. Procedia Comput Sci 113(2017):202–209. https://doi.org/10.1016/j.procs.2017.08.349

    Article  Google Scholar 

  60. Kolly SM, Wattenhofer R, Welten S (2012) A personal touch: recognizing users based on touch screen behavior. In: Proceedings of the third international workshop on sensing applications on mobile phones, p 1

  61. Zhang Y, Yang M, Ling Z, Liu Y, Wu W (2018) FingerAuth: 3D magnetic finger motion pattern based implicit authentication for mobile devices. Future Gener Comput Syst. https://doi.org/10.1016/j.future.2018.02.006

    Article  Google Scholar 

  62. Antal M, Szabó LZ (2016) Biometric authentication based on touchscreen swipe patterns. Procedia Technol 22:862–869

    Google Scholar 

  63. Alpar O (2015) Intelligent biometric pattern password authentication systems for touchscreens. Expert Syst Appl 42:6286–6294

    Google Scholar 

  64. Zhou L, Kang Y, Zhang D, Lai J (2016) Harmonized authentication based on ThumbStroke dynamics on touch screen mobile phones. Decis Support Syst 92:14–24

    Google Scholar 

  65. Alpar O, Krejcar O (2015) Pattern password authentication based on touching location. In: International conference on intelligent data engineering and automated learning, pp 395–403

  66. Beton M, Marie V, Rosenberger C (2013) Biometric secret path for mobile user authentication: a preliminary study. In: 2013 World congress on computer and information technology (WCCIT), pp 1–6

  67. Nader J, Alsadoon A, Prasad P, Singh A, Elchouemi A (2015) Designing touch-based hybrid authentication method for smartphones. Procedia Comput Sci 70:198–204

    Google Scholar 

  68. Meng W, Wang Y, Wong DS, Wen S, Xiang Y (2018) TouchWB: touch behavioral user authentication based on web browsing on smartphones. J Netw Comput Appl 117:1–9

    Google Scholar 

  69. Meng Y, Wong DS, Schlegel R (2012) Touch gestures based biometric authentication scheme for touchscreen mobile phones. In: International conference on information security and cryptology, pp 331–350

  70. Meng Y, Wong DS (2014) Design of touch dynamics based user authentication with an adaptive mechanism on mobile phones. In: Proceedings of the 29th annual ACM symposium on applied computing, pp 1680–1687

  71. Samangouei P, Patel VM, Chellappa R (2017) Facial attributes for active authentication on mobile devices. Image Vis Comput 58:181–192

    Google Scholar 

  72. Feng T, Yang J, Yan Z, Tapia EM, Shi W (2014) Tips: context-aware implicit user identification using touch screen in uncontrolled environments. In: Proceedings of the 15th workshop on mobile computing systems and applications, p 9

  73. Watanabe Y (2014) Influence of holding smart phone for acceleration-based gait authentication. In: 2014 Fifth international conference on emerging security technologies (EST), pp 30–33

  74. Crawford H, Renaud K, Storer T (2013) A framework for continuous, transparent mobile device authentication. Comput Secur 39:127–136

    Google Scholar 

  75. Mahbub U, Sarkar S, Patel VM, Chellappa R (2016) Active user authentication for smartphones: a challenge data set and benchmark results. In: 2016 IEEE 8th international conference on biometrics theory, applications and systems (BTAS), pp 1–8

  76. Roy A, Halevi T, Memon N (2014) An HMM-based behavior modeling approach for continuous mobile authentication. In: 2014 IEEE international conference on acoustics, speech and signal processing (ICASSP), pp 3789–3793

  77. Fathy ME, Patel VM, Chellappa R (2015) Face-based active authentication on mobile devices. In: 2015 IEEE international conference on acoustics, speech and signal processing (ICASSP), pp 1687–1691

  78. Jain A, Kanhangad V (2015) Exploring orientation and accelerometer sensor data for personal authentication in smartphones using touchscreen gestures. Pattern Recogn Lett 68:351–360

    Google Scholar 

  79. Serwadda A, Phoha VV, Wang Z (2013) Which verifiers work? A benchmark evaluation of touch-based authentication algorithms. In: 2013 IEEE sixth international conference on biometrics: theory, applications and systems (BTAS), pp 1–8

  80. Sitová Z, Šeděnka J, Yang Q, Peng G, Zhou G, Gasti P et al (2016) HMOG: New behavioral biometric features for continuous authentication of smartphone users. IEEE Trans Inf Forensics Secur 11:877–892

    Google Scholar 

  81. Renear AH, Sacchi S, Wickett KM (2010) Definitions of dataset in the scientific and technical literature. In: Proceedings of the 73rd ASIS&T annual meeting on navigating streams in an information ecosystem, vol 47, p 81

  82. Snijders C, Matzat U, Reips U-D (2012) “ Big Data”: big gaps of knowledge in the field of internet science. Int J Internet Sci 7:1–5

    Google Scholar 

  83. He F, Bao L, Wang R, Li J, Xu D, Zhao X (2017) A multimodal deep architecture for large-scale protein ubiquitylation site prediction. In 2017 IEEE international conference on bioinformatics and biomedicine (BIBM), pp 108–113

  84. Ibrahim R, Yousri NA, Ismail MA, El-Makky NM (2014) Multi-level gene/MiRNA feature selection using deep belief nets and active learning. In: 2014 36th annual international conference of the IEEE engineering in medicine and biology society (EMBC), pp 3957–3960

  85. Yang X-S, Deb S, Fong S (2011) Accelerated particle swarm optimization and support vector machine for business optimization and applications. In: International conference on networked digital technologies, pp 53–66

  86. Zhang X, Wang J, Zhang K (2017) Short-term electric load forecasting based on singular spectrum analysis and support vector machine optimized by Cuckoo search algorithm. Electr Power Syst Res 146:270–285

    Google Scholar 

  87. Tomar D, Agarwal S (2015) Twin support vector machine: a review from 2007 to 2014. Egypt Inform J 16:55–69

    Google Scholar 

  88. Newman LH (2018) Exploiting decades-old telephone tech to break into android devices. https://www.wired.com. Accessed 20 Dec 2019

  89. Zhang Q, Yang LT, Chen Z, Li P (2018) A survey on deep learning for big data. Inf Fusion 42:146–157

    Google Scholar 

  90. Wang H, Raj B (2015) A survey: time travel in deep learning space: an introduction to deep learning models and how deep learning models evolved from the initial ideas. arXiv preprint arXiv:1510.04781

Download references

Acknowledgement

This research is supported by TETFund Institutional Based Research Grant through Federal College of Education (Technical), Gombe, Nigeria.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shafi’i M. Abdulhamid.

Ethics declarations

Conflict of interest

The authors declared that there is no conflict of interest.

Ethical approval

This is a literature review article and does not involve human subject for data collection. There is no need for ethical approval.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Bello, A.A., Chiroma, H., Gital, A.Y. et al. Machine learning algorithms for improving security on touch screen devices: a survey, challenges and new perspectives. Neural Comput & Applic 32, 13651–13678 (2020). https://doi.org/10.1007/s00521-020-04775-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00521-020-04775-0

Keywords

Navigation