Skip to main content

Investigation of Touch-Based User Authentication Features Using Android Smartphone

  • Conference paper
Advanced Machine Learning Technologies and Applications (AMLTA 2014)

Abstract

Currently most mobile phones use touch screen, In addition the behavior of user’s touch gesture is significantly important in interaction with the phone. Due to increasing demand for safer access in touch screen mobile phones, old strategies like pins, tokens, or passwords have failed to stay abreast of the challenges. However, we study user authentication scheme based on this touch dynamics features for accurate user authentication. We developed the software needed to collect readings from touch screen of mobile phone running the Android operation system. Several touch dynamics features are examined to explore the efficiency of feature and each category (similar processing and representation form). Also, the impact of normalization and seven feature selection algorithms are examined. After applying Exhaustive Search reduction technique to the observation vectors composed of all 12 extracted features, nine features are retained.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Feng, T., Liu, Z., Kwon, K.-A., Shi, W., Carbunar, B., Jiang, Y., et al.: Continuous mobile authentication using touchscreen gestures. In: 2012 IEEE Conference on Technologies for Homeland Security (HST), pp. 451–456. IEEE (2012)

    Google Scholar 

  2. Meng, Y., Wong, D.S., Schlegel, R., Kwok, L.-f.: Touch Gestures Based Biometric Authentication Scheme for Touchscreen Mobile Phones. In: Kutyłowski, M., Yung, M. (eds.) Inscrypt 2012. LNCS, vol. 7763, pp. 331–350. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  3. Crawford, H.: Keystroke dynamics: Characteristics and opportunities. In: 2010 Eighth Annual International Conference on Privacy Security and Trust (PST), pp. 205–212. IEEE (2010)

    Google Scholar 

  4. Weiss, R., De Luca, A.: PassShapes: utilizing stroke based authentication to increase password memorability. In: Proceedings of the 5th Nordic Conference on Human-computer Interaction: Building Bridges, pp. 383–392. ACM (2008)

    Google Scholar 

  5. Zheng, N., Bai, K., Huang, H., Wang, H.: You Are How You Touch: User Verification on Smartphones via Tapping Behaviors. In: William, Mary (eds.) Department of Computer Science, pp. 1–13. WM-CS (2012)

    Google Scholar 

  6. Sesa-Nogueras, E., Faundez-Zanuy, M.: Biometric recognition using online uppercase handwritten text. Pattern Recognition 45(1), 128–144 (2012)

    Article  Google Scholar 

  7. El-Abed, M., Giot, R., Hemery, B., Rosenberger, C.: A study of users’ acceptance and satisfaction of biometric systems. In: 2010 IEEE International Carnahan Conference on Security Technology (ICCST), pp. 170–178. IEEE (2010)

    Google Scholar 

  8. Jain, A.K., Kumar, A.: Biometrics of next generation: An overview, pp. 1–36. Springer, Berlin (2010)

    Google Scholar 

  9. Shanmugapriya, D., Padmavathi, G.: An Efficient Feature Selection Technique for User Authentication using Keystroke Dynamics. IJCSNS International Journal of Computer Science and Network Security 11(10), 191–195 (2011)

    Google Scholar 

  10. Karnan, M., Akila, M., Krishnaraj, N.: Biometric personal authentication using keystroke dynamics: A review. Applied Soft Computing 11(2), 1565–1573 (2011)

    Article  Google Scholar 

  11. Ngugi, B., Tremaine, M., Tarasewich, P.: Biometric keypads: Improving accuracy through optimal PIN selection. Decision Support Systems 50(4), 769–776 (2011)

    Article  Google Scholar 

  12. Zheng, N., Paloski, A., Wang, H.: An efficient user verification system via mouse movements. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, pp. 139–150. ACM (2011)

    Google Scholar 

  13. Yampolskiy, R.V., Govindaraju, V.: Taxonomy of behavioural biometrics. Behavioral Biometrics for Human Identification, 1–43 (2010)

    Google Scholar 

  14. Wolff, M.: Behavioral Biometric Identification on Mobile Devices. In: Schmorrow, D.D., Fidopiastis, C.M. (eds.) AC/HCII 2013. LNCS (LNAI), vol. 8027, pp. 783–791. Springer, Heidelberg (2013)

    Google Scholar 

  15. Sae-Bae, N., Ahmed, K., Isbister, K., Memon, N.: Biometric-rich gestures: a novel approach to authentication on multi-touch devices. In: Proceedings of the 2012 ACM Annual Conference on Human Factors in Computing Systems, pp. 977–986. ACM (2012)

    Google Scholar 

  16. Anthony, L., Brown, Q., Nias, J., Tate, B., Mohan, S.: Interaction and recognition challenges in interpreting children’s touch and gesture input on mobile devices. In: Proceedings of the 2012 ACM International Conference on Interactive Tabletops and Surfaces, pp. 225–234. ACM (2012)

    Google Scholar 

  17. Angulo, J., Wästlund, E.: Exploring touch-screen biometrics for user identification on smart phones. In: Camenisch, J., Crispo, B., Fischer-Hübner, S., Leenes, R., Russello, G. (eds.) Privacy and Identity 2011. IFIP AICT, vol. 375, pp. 130–143. Springer, Heidelberg (2012)

    Google Scholar 

  18. Guerra-Casanova, J., Sánchez-Ávila, C., Bailador, G., de Santos Sierra, A.: Authentication in mobile devices through hand gesture recognition. International Journal of Information Security 11(2), 65–83 (2012)

    Article  Google Scholar 

  19. Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., Witten, I.H.: The WEKA data mining software: an update. ACM SIGKDD Explorations Newsletter 11(1), 10–18 (2009)

    Article  Google Scholar 

  20. Bosch, A., Zisserman, A., Munoz, X.: Image classification using random forests and ferns. In: International Conference on Computer Vision, ICCV 2007, pp. 14–20 (2007)

    Google Scholar 

  21. Schroff, F., Criminisi, A., Zisserman, A.: Object class segmentation using random forests. In: British Machine Vision Conference, BMVC, pp. 1–4 (2008)

    Google Scholar 

  22. Meier, R.: Professional Android 4 application development. John Wiley & Sons Publishing, Inc. (2012)

    Google Scholar 

  23. Janecek, A., Gansterer, W.N., Demel, M., Ecker, G.: On the Relationship Between Feature Selection and Classification Accuracy. In: FSDM, pp. 90–105. Citeseer (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Alariki, A.A., Manaf, A.A. (2014). Investigation of Touch-Based User Authentication Features Using Android Smartphone. In: Hassanien, A.E., Tolba, M.F., Taher Azar, A. (eds) Advanced Machine Learning Technologies and Applications. AMLTA 2014. Communications in Computer and Information Science, vol 488. Springer, Cham. https://doi.org/10.1007/978-3-319-13461-1_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-13461-1_14

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-13460-4

  • Online ISBN: 978-3-319-13461-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics