skip to main content
research-article

Touch-dynamics based Behavioural Biometrics on Mobile Devices – A Review from a Usability and Performance Perspective

Published: 06 December 2020 Publication History

Abstract

Over the past few years, there has been an exponential increase in the percentage of people owning and using a smart phone. These devices have sensor-rich touchscreens that can capture sensitive biometric features such as keystroke typing and finger-swiping patterns. Touch-dynamics based behavioural biometrics is a time-based assessment of how a user performs a particular touch task on a mobile device. Several performance-focused surveys already exist. In this article, building upon the existing reviews, we have examined studies on touch-dynamics based behavioural biometrics based on usability and its impact on authentication performance. We also emphasize the need for shifting the focus on usability during performance evaluations by presenting a consolidated list of usability and ergonomic-based factors that influence user interaction and cause performance variations. In this article, we report and review the usability evaluations: user acceptance studies and performance-based studies influencing the user interaction process on three specific touch-dynamics based modalities—signature, keystroke, and swipe. With regards to performance, we present a comparative analysis of error rates and accuracy of various research works undertaken. Additionally, we present a consolidated list of public datasets and discuss evolving vulnerabilities of touch-dynamics based behavioural biometrics, their adopted attack models, and their feasibility. Finally, we present our assessment of this domain's existing unresolved problems that could pave the way for future research.

References

[1]
James Moar. 2019. Mobile Biometrics: Markets, Opportunities 8 Forecasts. Juniper Research. Retrieved from https://www.juniperresearch.com/researchstore/innovation-disruption/human-interface-biometric-devices/consumer-markets-opportunities.
[2]
C. Bo, L. Zhang, T. Jung, J. Han, X. Y. Li, and Y. Wang. 2015. Continuous user identification via touch and movement behavioral biometrics. In Proceedings of the IEEE 33rd International Performance Computing and Communications Conference.
[3]
N. Zheng, K. Bai, H. Huang, and H. Wang. 2014. You are how you touch: User verification on smartphones via tapping behaviors. In Proceedingsof the International Conference on Network Protocols. 221–232.
[4]
H. Xu, Y. Zhou, and M. R. Lyu. 2014. Towards continuous and passive authentication via touch biometrics: An experimental study on smartphones. In Proceedings of the Symposium on Usable Privacy and Security. 187–198.
[5]
W. Meng, D. S. Wong, S. Furnell, and J. Zhou. 2015. Surveying the development of biometric user authentication on mobile phones. IEEE Commun. Surv. Tutor. 17, 3 (2015), 1268–1293.
[6]
R. V. Yampolskiy and V. Govindaraju. 2008. Behavioural biometrics: A survey and classification. Int. J. Biom. 1, 1 (2008), 81.
[7]
A. Alzubaidi and J. Kalita. 2016. Authentication of smartphone users using behavioral biometrics. IEEE Commun. Surv. Tutor. 18, 3 (2016).
[8]
M. Antal, Z. Bokor, and L. Z. Szabó. 2015. Information revealed from scrolling interactions on mobile devices. Pattern Recog. Lett. 56 (2015), 7--13.
[9]
T. Neal and D. Woodard. 2016. Surveying biometric authentication for mobile device security. J. Pattern Recog. Res. 11, 1 (2016).
[10]
P. S. Teh, N. Zhang, A. B. J. Teoh, and K. Chen. 2016. A survey on touch dynamics authentication in mobile devices. Comput. Secur. 59 (2016), 210–235.
[11]
R. Blanco-Gonzalo, R. Sanchez-Reillo, O. Miguel-Hurtado, and J. Liu-Jimenez. 2013. Usability analysis of dynamic signature verification in mobile environments. In Proceedings of the International Conference of the Biometrics Special Interest Group. 1–9.
[12]
E. P. Kukula, M. J. Sutton, and S. J. Elliott. 2010. The humanbiometric-sensor interaction evaluation method: Biometric performance and usability measurements. IEEE Trans. Instrum. Meas. 59, 4 (2010), 1–8.
[13]
R. Blanco-Gonzalo, R. Sanchez-Reillo, O. Miguel-Hurtado, and E. Bella-Pulgarin. 2014. Automatic usability and stress analysis in mobile biometrics. Image Vis. Comput. 32, 12 (2014), 1173–1180.
[14]
A. K. Jain, A. Ross, and S. Prabhakar. 2004. An introduction to biometric recognition. IEEE Trans. Circ. Syst. Video Technol. 14, 1 (2004), 4–20.
[15]
C. Bo, L. Zhang, X.-Y. Li, Q. Huang, and Y. Wang. 2013. SilentSense: Silent user identification via dynamics of touch and movement behavioral biometrics. In Proceedings of the International Conference on Mobile Computing and Networking. 187.
[16]
E. Shi, Y. Niu, M. Jakobsson, and R. Chow. 2011. Implicit authentication through learning user behavior. In Lecture Notes in Computer Science. Vol. 6531. 99–113.
[17]
T. Feng and Y. Jun Yang Zhixian. 2014. TIPS: Context-aware implicit user identification using touch screen in uncontrolled environments. In Proceedings of the 15th Workshop on Mobile Computing Systems and Applications (HotMobile'14). Association for Computing Machinery, New York, NY, Article 9, 1–6.
[18]
International Organization for Standardization. 1999. ISO 13407:1999. Human-centred design processes for interactive systems. Europe, 1999.
[19]
S. M. Furnell, P. S. Dowland, H. M. Illingworth, and P. L. Reynolds. 2000. Authentication and supervision: A survey of user attitudes. Comput. Secur. 19, 6 (2000), 529–539.
[20]
S. Karatzouni, S. M. Furnell, N. L. Clarke, and R. A. Botha. 2007. Perceptions of user authentication on mobile devices. In Proceedings of the 5th Australian Information Security Management Conference. 1–13.
[21]
T. Alhussain, R. AlGhamdi, S. Alkhalaf, and O. Alfarraj. 2013. Users’ perceptions of mobile phone security: A survey study in the kingdom of Saudi Arabia. Int. J. Comput. Theory Eng. 5, 5 (2013), 793–796.
[22]
H. Khan, U. Hengartner, and D. Vogel. 2015. Usability and security perceptions of implicit authentication: Convenient, secure, sometimes annoying. In Proceedings of the Symposium on Usable Privacy and Security.
[23]
S. Rasnayaka and T. Sim. 2019. Who wants continuous authentication on mobile devices? In Proceedings of the IEEE 9th International Conference on Biometrics Theory, Applications and Systems.
[24]
E. FrØkjaer, M. Hertzum, and K. Hornbæk. 2000. Measuring usability: Are effectiveness, efficiency, and satisfaction really correlated? In Proceedings of the Conference on Human Factors in Computing Systems.
[25]
R. Guest, M. Brockly, S. Elliott, and J. Scott. An assessment of the usability of biometric signature systems using the human-biometric sensor interaction model. Int. J. Comput. Appl. Technol. 53, 4 (2016), 336.
[26]
R. Blanco-Gonzalo, L. Diaz-Fernandez, O. Miguel-Hurtado, and R. Sanchez-Reillo. 2014. Usability evaluation of biometrics in mobile environments. Adv. Intell. Syst. Comput. 300 (2014), 289–300.
[27]
X. Zhao, T. Feng, W. Shi, and I. A. Kakadiaris. 2014. Mobile user authentication using statistical touch dynamics images. IEEE Trans. Inf. Forens. Secur. 9, 11 (2014), 1780–1789.
[28]
D. Buschek, A. De Luca, and F. Alt. 2015. Improving accuracy, applicability and usability of keystroke biometrics on mobile touchscreen devices. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. 1393–1402.
[29]
H. Zhang, V. M. Patel, M. Fathy, and R. Chellappa. 2015. Touch gesture-based active user authentication using dictionaries. In Proceedings of the IEEE Winter Conference on Applications of Computer Vision. 207–214.
[30]
O. Miguel-Hurtado, R. Blanco-Gonzalo, R. Guest, and C. Lunerti. 2017. Interaction evaluation of a mobile voice authentication system. In Proceedings of the International Carnahan Conference on Security Technology.
[31]
W. Karwowski. 2006. The discipline of ergonomics and human factors. In Handbook of Human Factors and Ergonomics. Wiley.
[32]
T. Feng et al. 2015. An investigation on touch biometrics: Behavioral factors on screen size, physical context and application context. In Proceedings of the IEEE International Symposium on Technologies for Homeland Security.
[33]
Y. Zhong and Y. Deng. 2015. A survey on keystroke dynamics biometrics: Approaches, advances, and evaluations. In Recent Advances in User Authentication Using Keystroke Dynamics Biometrics. Science Gate, Greece, 1--22.
[34]
R. Bixler and S. D'Mello. 2013. Detecting boredom and engagement during writing with keystroke analysis, task appraisals, and stable traits. In Proceedings of the International Conference on Intelligent User Interfaces. 225.
[35]
C. Epp, M. Lippold, and R. L. Mandryk. 2011. Identifying emotional states using keystroke dynamics. In Proceedings of the Conference on Human Factors in Computing Systems. 715.
[36]
T. Shimshon, R. Moskovitch, L. Rokach, and Y. Elovici. 2010. Clustering di-graphs for continuously verifying users according to their typing patterns. In Proceedings of the IEEE 26th Convention of Electrical and Electronics Engineers in Israel. 445–449.
[37]
H. Saevanee and P. Bhatarakosol. 2008. User authentication using combination of behavioral biometrics over the touchpad acting like touch screen of mobile device. In Proceedings of the International Conference on Computer and Electrical Engineering. 82–86.
[38]
X. Huang, G. Lund, and A. Sapeluk. 2012. Development of a typing behaviour recognition mechanism on Android. In Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications. 1342–1347.
[39]
Matthias Trojahn and Frank Ortmeier. 2012. Biometric authentication through a virtual keyboard for smarthphones. Int. J. Comput. Sci. Inf. Technol. 4, 5 (2012), 1–12.
[40]
H. Gascon and S. Uellenbeck. 2014. Continuous authentication on mobile devices by analysis of typing motion behavior. Sicherheit (2014), 1–12.
[41]
C. Giuffrida, K. Majdanik, M. Conti, and H. Bos. 2014. I sensed it was you: Authenticating mobile users with sensor-enhanced keystroke dynamics. In Lecture Notes in Computer Science. Vol. 8550. 92–111.
[42]
U. Burgbacher and K. Hinrichs. 2014. An implicit author verification system for text messages based on gesture typing biometrics. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 2951–2954.
[43]
H. Crawford and E. Ahmadzadeh. 2017. Authentication on the go: Assessing the effect of movement on mobile device keystroke dynamics. In Proceedings of the Symposium on Usable Privacy and Security.
[44]
K. R. Corpus, R. J. D. Gonzales, A. S. Morada, and L. A. Vea. 2016. Mobile user identification through authentication using keystroke dynamics and accelerometer biometrics. In Proceedings of the International Workshop on Mobile Software Engineering and Systems. 11–12.
[45]
Y. Zhang, M. Yang, Z. Ling, Y. Liu, and W. Wu. 2018. FingerAuth: 3D magnetic finger motion pattern based implicit authentication for mobile devices. Fut. Gen. Comp. Syst. 108 (2018), 1324–1337.
[46]
F. Alshanketi, I. Traore, and A. A. Ahmed. 2016. Improving performance and usability in mobile keystroke dynamic biometric authentication. In Proceedings of the IEEE Symposium on Security and Privacy Workshops.
[47]
X. Bi, S. Azenkot, K. Partridge, and S. Zhai. 2013. Octopus: Evaluating touchscreen keyboard correction and recognition algorithms via remulation. In Proceedings of the Conference on Human Factors in Computing Systems.
[48]
B. A. Smith, X. Bi, and S. Zhai. 2015. Optimizing touchscreen keyboards for gesture typing. In Proceedings of the Conference on Human Factors in Computing Systems. (2015), 3365--3374.
[49]
Roger Fingas. 2018. Inside iOS 11: Apple's new one-handed keyboard allows for easier typing. Retrieved from https://appleinsider.com/articles/17/09/21/inside-ios-11-apples-new-one-handed-keyboard-allows-for-easier-typing.
[50]
Peter. 2016. [K9 keyboard problem] Finding the words by ranking—updating. Retrieved from http://petercrushcode.blogspot.com/2016/04/finding-words-by-ranking-code-complete.html.
[51]
J. Cuaresma and I. MacKenzie. 2013. A study of variations of qwerty soft keyboards for mobile phones. In Proceedings of the International Conference on Multimedia and Human-computer Interaction. 1–8.
[52]
Apk Tools. 2018. Blackberry Curve Keyboard 1.1 Apk | APK Tools. Retrieved from https://apk.tools/details-blackberry-curve-keyboard-apk/.
[53]
F. Bergadano, D. Gunetti, and C. Picardi. 2002. User authentication through keystroke dynamics. ACM Trans. Inf. Syst. Secur. 5, 4 (2002).
[54]
J. M. Chang et al. 2013. Capturing cognitive fingerprints from keystroke dynamics. IT Prof. 15, 4 (2013), 24–28.
[55]
A. L. Smith and B. S. Chaparro. 2015. Smartphone text input method performance, usability, and preference with younger and older adults. Hum. Factors 57, 6 (2015), 1015–1028.
[56]
W. S. Wijesoma, K. W. Yue, K. L. Chien, and T. K. Chow. 2001. Online handwritten signature verification for electronic commerce over the internet. Web Intelligence (2001).
[57]
D. Impedovo and G. Pirlo. 2008. Automatic signature verification: The state of the art. IEEE Trans. Syst. Man Cybern. Part C Appl. Rev. 38, 5 (2008), 609–635.
[58]
Y. M. Al-Omari, S. N. H. S. Abdullah, and K. Omar. 2011. State-of-the-art in offline signature verification system. In Proceedings of the International Conference on Pattern Analysis and Intelligence Robotics 1 (2011), 59–64.
[59]
R. Plamondon and S. N. Srihari. 2000. Online and off-line handwriting recognition: A comprehensive survey. Pattern Anal. Mach. 22, 1 (2000), 63–84.
[60]
A. Mendaza-Ormaza, O. Miguel-Hurtado, R. Blanco-Gonzalo, and F. J. Diez-Jimeno. 2011. Analysis of handwritten signature performances using mobile devices. In Proceedings of the International Carnahan Conference on Security Technology.
[61]
G. Bailador, C. Sanchez-Avila, J. Guerra-Casanova, and A. De Santos Sierra. 2011. Analysis of pattern recognition techniques for in-air signature biometrics. Pattern Recog. 44, 10–11 (2011), 2468–2478.
[62]
R. P. Krish, J. Fierrez, J. Galbally, and M. Martinez-Diaz. 2013. Dynamic signature verification on smart phones. In Commun. Comput. Inf. Sci. 365 (2013), 213–222.
[63]
J. Galbally, R. P. Krish, J. Fierrez, and M. Martinez-Diaz. 2014. Mobile signature verification: Feature robustness and performance comparison. IET Biometrics 3, 4 (2014), 267–277.
[64]
R. Sanchez-Reillo, J. Liu-Jimenez, R. Blanco-Gonzalo, and O. Miguel-Hurtado. 2014. Performance evaluation of handwritten signature recognition in mobile environments. IET Biometrics 3, 3 (2014), 139–146.
[65]
S. Jabin and F. J. Zareen. 2016. Authentic mobile-biometric signature verification system. IET Biometrics 5, 1 (2016), 13–19.
[66]
M. Zalasiński, K. Cpałka, and Y. Hayashi. 2016. A new approach to the dynamic signature verification aimed at minimizing the number of global features. In Lecture Notes in Computer Science. Vol. 9693, 218–231.
[67]
K. Cpałka, M. Zalasiński, and L. Rutkowski. 2016. A new algorithm for identity verification based on the analysis of a handwritten dynamic signature. Appl. Soft Comput. J. 43 (2016), 47–56.
[68]
M. Diaz, A. Fischer, M. A. Ferrer, and R. Plamondon. 2017. Dynamic signature verification system based on one real signature. IEEE Trans. Cybern. PP, 99 (2017), 1–12.
[69]
M. E. Yahyatabar and J. Ghasemi. 2017. Online signature verification using double-stage feature extraction modelled by dynamic feature stability experiment. IET Biometrics 6, 6 (2017).
[70]
V. Bharadi, B. Pandva, and G. Cosma. 2018. Multi-modal biometric recognition using human iris and dynamic pressure variation of handwritten signatures. In Proceedings of the 5th International Conference on Social Networks Analysis, Management and Security.
[71]
C. Schmidt and K. Kraiss. 1997. Establishment of personalized templates for automatic signature verification. In Proceedings of the 4th International Conference on Document Analysis and Recognition. 263–267.
[72]
M. Shafiei and H. Rabiee. 2003. A new online signature verification algorithm using variable length segmentation and hidden markov models. In Proceedings of the 7th International Conference on Document Analysis and Recognition. 1–4.
[73]
N. Paudel, M. Querini, and G. F. Italiano. 2016. Handwritten signature verification for mobile phones. Proceedings of the International Conference on Information Systems Security and Privacy. 46–52.
[74]
M. M. Dıaz and U. Ingeniero de Telecomunicacion. 2008. Dynamic signature verification for portable devices. Thesis, 2008.
[75]
C.-C. Yu, H.-Y. Cheng, V. Gau, and C.-L. Lin. 2012. Video-based signature verification and pen-grasping posture analysis for user-dependent identification authentication. IET Comput. Vis. 6, 5 (2012), 388–396.
[76]
M. Savov, G. Gluhchev, and O. Bumbarov. 2006. Signature verification via “hand-pen” motion investigation. Cybernetics and Information Technologies 6.1 (2006).
[77]
X. Wang, T. Yu, O. Mengshoel, and P. Tague. 2017. Towards continuous and passive authentication across mobile devices: An empirical study. In Proceedings of the ACM Conference on Security and Privacy in Wireless 8 Mobile Networks.
[78]
M. Frank, R. Biedert, E. Ma, I. Martinovic, and D. Song. 2013. Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE Trans. Inf. Forens. Secur. 8, 1 (2013), 136–148.
[79]
C. Shen, Y. Zhang, X. Guan, and R. A. Maxion. 2015. Performance analysis of touch-interaction behavior for active smartphone authentication. IEEE Trans. Inf. Forens. Secur. 11, 3 (2015), 1–1.
[80]
A. Serwadda, V. V. Phoha, and Z. Wang. 2013. Which verifiers work?: A benchmark evaluation of touch-based authentication algorithms. In Proceedings of the IEEE 6th International Conference on Biometrics: Theory, Applications and Systems.
[81]
O. Miguel-Hurtado, S. V. Stevenage, C. Bevan, and R. Guest. 2016. Predicting sex as a soft-biometrics from device interaction swipe gestures. Pattern Recog. Lett. 79 (2016), 44–51.
[82]
R. Guest, O. Miguel-Hurtado, S. V. Stevenage, G. J. Neil, and S. Black. 2014. Biometrics within the superidentity project: A new approach to spanning multiple identity domains. In Proceedings of the International Carnahan Conference on Security Technology.
[83]
P. Saravanan, S. Clarke, D. H. (Polo) Chau, and H. Zha. 2013. LatentGesture: Active user authentication through background touch analysis. In Proceedings of the 2nd International Symposium of Chinese CHI. 110–113.
[84]
L. Li, X. Zhao, and G. Xue. 2013. Unobservable re-authentication for smartphones. In Proceedings of the Network and Distributed System Security Symposium. 1–16.
[85]
V. Sharma and R. Enbody. 2017. User authentication and identification from user interface interactions on touch-enabled devices. In Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks. 1–11.
[86]
J. Ahmad, M. Sajjad, Z. Jan, I. Mehmood, S. Rho, and S. W. Baik. 2017. Analysis of interaction trace maps for active authentication on smart devices. Multimedia Tools Appl. 76, 3 (2017), 4069–4087.
[87]
J. Fierrez, A. Pozo, M. Martinez-Diaz, J. Galbally, and A. Morales. 2018. Benchmarking touchscreen biometrics for mobile authentication. IEEE Trans. Inf. Forens. Secur. 13, 11 (2018).
[88]
C. Bevan and D. S. Fraser. 2016. Different strokes for different folks? Revealing the physical characteristics of smartphone users from their swipe gestures. Int. J. Hum. Comput. Stud. 88 (2016), 51–61.
[89]
D. Buschek, A. De Luca, and F. Alt. 2016. Evaluating the influence of targets and hand postures on touch-based behavioural biometrics. In Proceedings of the ACM Conference on Human Factors in Computing Systems. 1349–1361.
[90]
L. Fridman, S. Weber, R. Greenstadt, and M. Kam. 2017. Active authentication on mobile devices via stylometry, application usage, web browsing, and GPS location. IEEE Syst. J. 11, 2 (2017), 513–521.
[91]
N. Clarke, S. Karatzouni, and S. Furnell. 2009. Flexible and transparent user authentication for mobile devices. In Emerging Challenges for Security, Privacy and Trust. Springer, 1–12.
[92]
W. Shi, J. Yang, Y. Jiang, F. Yang, and Y. Xiong. 2011. SenGuard: Passive user identification on smartphones using multiple sensors. In Proceedings of the International Conference on Wireless and Mobile Computing, Networking and Communications. 141–148.
[93]
H. Saevanee, N. L. Clarke, and S. M. Furnell. 2012. Multi-modal behavioural biometric authentication for mobile devices. In Proceedings of the IFIP Advances in Information and Communication Technology. 465–474.
[94]
H. Crawford, K. Renaud, and T. Storer. 2013. A framework for continuous, transparent mobile device authentication. Comput. Secur. Part B 39 (2013), 127–136.
[95]
M. Tanviruzzaman and S. I. Ahamed. 2014. Your phone knows you: Almost transparent authentication for smartphones. In Proceedings of the International Computer Software and Applications Conference. 374–383.
[96]
H. Aronowitz et al. 2014. Multi-modal biometrics for mobile authentication. In Proceedings of the International Joint Conference on Biometrics.
[97]
F. Li, N. Clarke, M. Papadaki, and P. Dowland. 2010. Behaviour profiling on mobile devices. In Proceedings of the International Conference on Emerging Security Technologies. 77–82.
[98]
H. Saevanee, N. Clarke, and S. Furnell. 2011. SMS linguistic profiling authentication on mobile device. In Proceedings of the 5th International Conference on Network and System Security. 224–228.
[99]
N. L. Clarke and S. M. Furnell. 2007. Authenticating mobile phone users using keystroke analysis. Int. J. Inf. Secur. 6, 1 (2007), 1–14.
[100]
M. D. Papamichail, K. C. Chatzidimitriou, T. Karanikiotis, N.-C. I. Oikonomou, A. L. Symeonidis, and S. K. Saripalle. 2019. BrainRun: A behavioral biometrics dataset towards continuous implicit authentication. Data 4, 2 (2019), 60.
[101]
U. Mahbub, S. Sarkar, V. M. Patel, and R. Chellappa. 2016. Active user authentication for smartphones: A challenge data set and benchmark results. In Proceedings of the IEEE 8th International Conference on Biometrics Theory, Applications and Systems.
[102]
A. Morales et al. 2016. KBOC: Keystroke biometrics ongoing competition. In Proceedings of the IEEE 8th International Conference on Biometrics Theory, Applications and Systems.
[103]
M. El-Abed, M. Dafer, and R. El Khayat. 2014. RHU Keystroke: A mobile-based benchmark for keystroke dynamics systems. In Proceedings of the International Carnahan Conference on Security Technology.
[104]
C. J. Tasia, T. Y. Chang, P. C. Cheng, and J. H. Lin. 2014. Two novel biometric features in keystroke dynamics authentication systems for touch screen devices. Secur. Commun. Netw. 7, 4 (2014), 750–758.
[105]
Z. Sitova et al. 2016. HMOG: New behavioral biometric features for continuous authentication of smartphone users. IEEE Trans. Inf. Forens. Secur. 11, 5 (2016), 877–892.
[106]
M. Antal, L. Z. Szabó, and I. László. 2015. Keystroke dynamics on Android platform. Procedia Technol. 19 (2015), 820–826.
[107]
R. Tolosana, R. Vera-Rodriguez, J. Fierrez, A. Morales, and J. Ortega-Garcia. 2017. Benchmarking desktop and mobile handwriting across COTS devices: The e-biosign biometric database. PLoS One 12, 5 (2017).
[108]
J. Galbally, M. Diaz-Cabrera, M. A. Ferrer, M. Gomez-Barrero, A. Morales, and J. Fierrez. 2015. On-line signature recognition through the combination of real dynamic data and synthetically generated static data. Pattern Recog. 48 (2015), 2921--2934.
[109]
J. Galbally, M. Martinez-Diaz, and J. Fierrez. 2013. Aging in biometrics: An experimental analysis on on-line signature. PLoS One 8, 7 (2013).
[110]
L. C. F. Araujo, L. H. R. Sucupira, M. G. Lizarraga, L. L. Ling, and J. B. T. Yabu-Uti. 2004. User authentication through typing biometrics features. Lecture Notes in Computer Science. 53, 2 (2004).
[111]
K. A. Rahman, K. S. Balagani, and V. V. Phoha. 2013. Snoop-forge-replay attacks on continuous verification with keystrokes. IEEE Trans. Inf. Forens. Secur. 8, 3 (2013).
[112]
Z. Wang, A. Serwadda, K. S. Balagani, and V. V. Phoha. 2012. Transforming animals in a cyber-behavioral biometric menagerie with frog-boiling attacks. In Proceedings of the IEEE 5th International Conference on Biometrics: Theory, Applications and Systems.
[113]
A. Serwadda, V. V. Phoha, Z. Wang, R. Kumar, and D. Shukla. 2016. Toward robotic robbery on the touch screen. ACM Trans. Inf. Syst. Secur. 18, 4 (2016).
[114]
M. Harbach, E. von Zezschwitz, A. Fichtner, A. De Luca, and M. Smith. 2016. It's a hard lock life: A field study of smartphone (Un)locking behavior and risk perception. In Proceedings of the 10th Symposium on Usable Privacy and Security.
[115]
M. A. Sasse, S. Brostoff, and D. Weirich. Transforming the “weakest link”—A human/computer interaction approach to usable and effective security. BT Technol. J. 19, 3 (2001).
[116]
United Nations General Assembly. 2014. The Right to Privacy in the Digital Age. Retrieved from http://www.ohchr.org/Documents/Issues/DigitalAge/A-HRC-27-37_en.doc.
[117]
J. D. Woodward, K. W. Webb, E. M. Newton, M. A. Bradley, D. Rubenson, K. Larson, J. Lilly, K. Smythe, B. Houghton, H. A. Pincus, J. Schachter, and P. S. Steinberg. 2001. Army Biometric Applications: Identifying and Addressing Sociocultural Concerns. RAND Corporation, Santa Monica, CA, 2001. Retrieved from https://www.rand.org/pubs/monograph_reports/MR1237.html.
[118]
S. Roy, D. Sinha, and U. Roy. 2017. User authentication: Keystroke dynamics with soft biometric features. In Internet of Things (IoT): Technologies, Applications, Challenges and Solutions. Taylor 8 Francis Group.
[119]
M. Abreu and M. Fairhurst. 2009. Improving identity prediction in signature-based unimodal systems using soft biometrics. In Lecture Notes in Computer Science. 5707 (2009).
[120]
The European Parliament and The Council. 2016. GDPR—General Data Protection Regulation. Retrieved from http://ec.europa.eu/justice/data-protection/reform/files/regulation_oj_en.pdf.
[121]
N. Whiskerd, J. Dittmann, and C. Vielhauer. 2018. A requirement analysis for privacy preserving biometrics in view of universal human rights and data protection regulation. In Proceedings of the European Signal Processing Conference.
[122]
S. Trewin, C. Swart, L. Koved, J. Martino, K. Singh, and S. Ben-David. 2012. Biometric authentication on a mobile device: A study of user effort, error and task disruption. In Proceedings of the 28th Annual Computer Security Applications Conference (ACSAC'12). 159--168.

Cited By

View all
  • (2024)Accurate authentication based on ECG using deep learningJournal of Computer Security10.3233/JCS-22013732:5(425-446)Online publication date: 18-Nov-2024
  • (2024)Performance and Reliability of Touch Screen: A Game-Oriented Research2024 5th International Conference on Machine Learning and Human-Computer Interaction (MLHMI)10.1109/MLHMI63000.2024.00016(31-36)Online publication date: 14-Mar-2024
  • (2024)ADEAS: Authentication Using Doppler Effect of Acoustic Signals Caused by Hands MovingIEEE Internet of Things Journal10.1109/JIOT.2024.345069211:24(40009-40025)Online publication date: 15-Dec-2024
  • Show More Cited By

Index Terms

  1. Touch-dynamics based Behavioural Biometrics on Mobile Devices – A Review from a Usability and Performance Perspective

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Computing Surveys
    ACM Computing Surveys  Volume 53, Issue 6
    Invited Tutorial and Regular Papers
    November 2021
    803 pages
    ISSN:0360-0300
    EISSN:1557-7341
    DOI:10.1145/3441629
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 06 December 2020
    Revised: 01 September 2020
    Online AM: 07 May 2020
    Accepted: 01 April 2020
    Received: 01 March 2020
    Published in CSUR Volume 53, Issue 6

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Behavioural biometrics
    2. dynamic signature
    3. keystroke dynamics
    4. mobile biometrics
    5. performance
    6. swipe
    7. touch dynamics
    8. usability

    Qualifiers

    • Research-article
    • Research
    • Refereed

    Funding Sources

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)158
    • Downloads (Last 6 weeks)8
    Reflects downloads up to 16 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Accurate authentication based on ECG using deep learningJournal of Computer Security10.3233/JCS-22013732:5(425-446)Online publication date: 18-Nov-2024
    • (2024)Performance and Reliability of Touch Screen: A Game-Oriented Research2024 5th International Conference on Machine Learning and Human-Computer Interaction (MLHMI)10.1109/MLHMI63000.2024.00016(31-36)Online publication date: 14-Mar-2024
    • (2024)ADEAS: Authentication Using Doppler Effect of Acoustic Signals Caused by Hands MovingIEEE Internet of Things Journal10.1109/JIOT.2024.345069211:24(40009-40025)Online publication date: 15-Dec-2024
    • (2024)AttAuth: An Implicit Authentication Framework for Smartphone Users Using Multimodality DataIEEE Internet of Things Journal10.1109/JIOT.2023.331471711:4(6928-6942)Online publication date: 15-Feb-2024
    • (2024)Touch-Based Continuous Mobile Device Authentication Using One-vs-One Classification Approach2024 IEEE International Conference on Big Data and Smart Computing (BigComp)10.1109/BigComp60711.2024.00034(167-174)Online publication date: 18-Feb-2024
    • (2024)A Novel Capacitive Touch Sensing Approach and Its Application in Gender ClassificationIEEE Access10.1109/ACCESS.2024.348633712(157313-157328)Online publication date: 2024
    • (2024)Exploration of a method for insight into accessibility design flaws based on touch dynamicsHumanities and Social Sciences Communications10.1057/s41599-024-03234-811:1Online publication date: 1-Jun-2024
    • (2024)Biometrics 2.0 for the Security of Smart CitiesMachine Intelligence Research10.1007/s11633-023-1444-621:6(1121-1144)Online publication date: 28-Nov-2024
    • (2023)Extraction of Hidden Authentication Factors from Possessive InformationJournal of Sensor and Actuator Networks10.3390/jsan1204006212:4(62)Online publication date: 11-Aug-2023
    • (2023)1DIEN: Cross-session Electrocardiogram Authentication Using 1D Integrated EfficientNetACM Transactions on Multimedia Computing, Communications, and Applications10.1145/360980020:1(1-17)Online publication date: 17-Jul-2023
    • Show More Cited By

    View Options

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media