skip to main content
10.1145/3206505.3206571acmconferencesArticle/Chapter ViewAbstractPublication PagesaviConference Proceedingsconference-collections
poster

Simple shape-based touch behavioral biometrics authentication for smart mobiles

Published: 29 May 2018 Publication History

Abstract

One of the main concerns during usage of the current smart mobile devices in public is the vulnerability of password hacking by shoulder-suffering or smudge attack. The traditional user authentication techniques such as PIN code or patterns-based password are easy target of such attacks. In this paper, we propose using simple shapes (e.g., circle, triangle, etc.) to get users' touch behavioral biometrics data. The users are asked to draw over these shapes while the developed system extracts 25 different features (e.g., finger middle stroke and its pressure, velocity, mobile orientation, etc.) for the model training and authentication purpose. The proposed solution is simple for all kinds of users and could solve the problem of password hacking through shoulder-suffering or smudge attacks.

References

[1]
Burgbacher, U., Prätorius, M., and Hinrichs, K. A Behavioral Biometric Challenge and Response Approach to User Authentication on Smartphones. IEEE International Conference on Systems, Man, and Cybernetics (SMC), San Diego, CA, pp. 3328--3335, 2014.
[2]
Deshmane, K. D. and Ghodake, S. A. Android Software Based Multi-touch Gestures Recognition for Secure Biometric Modality. International Conference on Information Technology (ICIT), Bhubaneswar, pp. 107--112, 2015.
[3]
Feng, T, Liu, Z., Kwon, K., Shi, W., Carbunar, B., Jiang, Y., and Nguyen, N. Continuous Mobile Authentication using Touchscreen Gestures. IEEE Conference on Technologies for Homeland Security (HST), Waltham, MA, pp. 451--456, 2012.
[4]
Feng, F., Yang, Y. Yan, Z. Tapia, E. M. and Shi, W. TIPS: Context-Aware Implicit User Identification using Touch Screen in Uncontrolled Environments. HotMobile 2014, 2014.
[5]
Frank, M., Biedert, R., Ma, E., Martinovic, I. and Song, D. Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication. IEEE Transactions on Information Forensics and Security, vol. 8 (1) pp. 136--148, Jan. 2013.
[6]
Gugenheimer, J., De Luca, A., Hess, H., Karg, S, Wolf, D., and Rukzio, E. ColorSnakes: Using Colored Decoys to Secure Authentication in Sensitive Contexts. 17th International Conference on Human-Computer Interaction with Mobile Devices and Services (MobileHCI '15), ACM, New York, NY, USA, pp. 274--283, 2015.
[7]
Meng, Y., Wong, D. S. Schlegel, R., and Kwok, L. Touch Gestures Based Biometric Authentication Scheme for Touchscreen Mobile Phones. Information Security and Cryptology, Springer Berlin Heidelberg, pp. 331--350, 2013.
[8]
Saravanan, P., Clarke, S., Chau, D. H., and Zha, H. LatentGesture: Active User Authentication through Background Touch Analysis. In Proceedings of the Second International Symposium of Chinese CHI (Chinese CHI '14), ACM, New York, NY, USA, pp. 110--113, 2014.
[9]
Steinwart, I. and Christmann, A. Support Vector Machines. Springer Science & Business Media, 2015.
[10]
Sun, H., Wang, K., Li, X., Qin, N., and Chen, Z. PassApp: My App is My Password!. 17th International Conference on Human-Computer Interaction with Mobile Devices and Services (MobileHCI '15), ACM, New York, NY, USA, pp. 306--315, 2015.
[11]
Xu, H. and Zhou, Y. and Lyu, M. R. Towards Continuous and Passive Authentication via Touch Biometrics: An Experimental Study on Smartphones. 10th Symposium On Usable Privacy and Security (SOUPS 2014), pp. 187--198, 2014.
[12]
Zhao, X., Feng, T. and Shi, W. Continuous Mobile Authentication using A Novel Graphic Touch Gesture Feature. IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS), Arlington, VA, pp. 1--6, 2013.

Cited By

View all
  • (2024)Act2Auth – A Novel Authentication Concept based on Embedded Tangible Interaction at DesksProceedings of the Eighteenth International Conference on Tangible, Embedded, and Embodied Interaction10.1145/3623509.3633360(1-15)Online publication date: 11-Feb-2024
  • (2024)Authentication Method Using Opening GesturesHCI for Cybersecurity, Privacy and Trust10.1007/978-3-031-61382-1_12(186-203)Online publication date: 1-Jun-2024
  • (2022)Touch-behavioral Authentication on Smartphones using Machine LearningCompanion Proceedings of the 27th International Conference on Intelligent User Interfaces10.1145/3490100.3516456(105-108)Online publication date: 22-Mar-2022
  • Show More Cited By

Index Terms

  1. Simple shape-based touch behavioral biometrics authentication for smart mobiles

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      AVI '18: Proceedings of the 2018 International Conference on Advanced Visual Interfaces
      May 2018
      430 pages
      ISBN:9781450356169
      DOI:10.1145/3206505
      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 29 May 2018

      Check for updates

      Author Tags

      1. biometrics authentication
      2. machine learning application

      Qualifiers

      • Poster

      Conference

      AVI '18
      AVI '18: 2018 International Conference on Advanced Visual Interfaces
      May 29 - June 1, 2018
      Grosseto, Castiglione della Pescaia, Italy

      Acceptance Rates

      AVI '18 Paper Acceptance Rate 19 of 77 submissions, 25%;
      Overall Acceptance Rate 128 of 490 submissions, 26%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)9
      • Downloads (Last 6 weeks)1
      Reflects downloads up to 27 Jan 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Act2Auth – A Novel Authentication Concept based on Embedded Tangible Interaction at DesksProceedings of the Eighteenth International Conference on Tangible, Embedded, and Embodied Interaction10.1145/3623509.3633360(1-15)Online publication date: 11-Feb-2024
      • (2024)Authentication Method Using Opening GesturesHCI for Cybersecurity, Privacy and Trust10.1007/978-3-031-61382-1_12(186-203)Online publication date: 1-Jun-2024
      • (2022)Touch-behavioral Authentication on Smartphones using Machine LearningCompanion Proceedings of the 27th International Conference on Intelligent User Interfaces10.1145/3490100.3516456(105-108)Online publication date: 22-Mar-2022
      • (2022)Hold On and Swipe: A Touch-Movement Based Continuous Authentication Schema based on Machine Learning2022 Asia Conference on Algorithms, Computing and Machine Learning (CACML)10.1109/CACML55074.2022.00081(442-447)Online publication date: Mar-2022
      • (2020)SGFAProceedings of the 21st International Conference on Computer Systems and Technologies10.1145/3407982.3408021(35-42)Online publication date: 19-Jun-2020
      • (2020)Toward supervised shape-based behavioral authentication on smartphonesJournal of Information Security and Applications10.1016/j.jisa.2020.10259155(102591)Online publication date: Dec-2020

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media