作者
Shamily Shaji, Smija Das, Jubilant J Kizhakkethottam
发表日期
2015/2/25
研讨会论文
2015 International Conference on Soft-Computing and Networks Security (ICSNS)
页码范围
1-5
出版商
IEEE
简介
Conventional computer systems or mobile devices authenticate users only at the initial login session, which can be a serious critical security flaw. To resolve the problem, the systems need continuous and transparent user authentication methods that continuously monitor and authenticate users based on some biometric traits. A new method for continuous user authentication is based on the way they interact with the touch screen of a smartphone. This method authenticates smartphone users by continuously monitoring their finger movements on the touch screen. Based on a set of 30 behavioral features, the authors built proof-of-concept classifiers that can pinpoint a target user among 41 users with very low equal error rate. Given the non-trivial error rates, this kind of touch-based analysis is qualified as a complementary authentication mechanism.
引用总数
20162017201820192020202120222023202411121
学术搜索中的文章
S Shaji, S Das, JJ Kizhakkethottam - 2015 International Conference on Soft-Computing and …, 2015