Mobile user authentication using statistical touch dynamics images

X Zhao, T Feng, W Shi… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
Behavioral biometrics have recently begun to gain attention for mobile user authentication.
The feasibility of touch gestures as a novel modality for behavioral biometrics has been …

AttAuth: An Implicit Authentication Framework for Smartphone Users Using Multi-Modality Data

C Zhao, F Gao, Z Shen - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
Smartphones have become the most important devices for users to communicate and
interact with different forms of media, and at the same time stored a large amount of sensitive …

Integrating handcrafted features with deep representations for smartphone authentication

Y Song, Z Cai - Proceedings of the ACM on Interactive, Mobile …, 2022 - dl.acm.org
Recent research demonstrates the potential of touch dynamics as a usable and privacy-
preserving scheme for smartphone authentication. Most existing approaches rely on …

Hold on and swipe: a touch-movement based continuous authentication schema based on machine learning

J Mallet, L Pryor, R Dave, N Seliya… - … Asia Conference on …, 2022 - ieeexplore.ieee.org
In recent years, the amount of secure information being stored on mobile devices has grown
exponentially. However, current security schemas for mobile devices such as physiological …

Continuous user authentication on smartphone via behavioral biometrics: a survey

PK Rayani, S Changder - Multimedia Tools and Applications, 2023 - Springer
The use of ubiquitous devices is increasing worldwide due to signs of progress in
sophisticated hardware technology with cutting-edge features. These features offer most …

AnswerAuth: A bimodal behavioral biometric-based user authentication scheme for smartphones

A Buriro, B Crispo, M Conti - Journal of information security and …, 2019 - Elsevier
In this paper, we present a behavioral biometric-based smartphone user authentication
mechanism, namely, AnswerAuth, which relies on the very common users' behavior …

Contauth: Continual learning framework for behavioral-based user authentication

J Chauhan, YD Kwon, P Hui, C Mascolo - Proceedings of the ACM on …, 2020 - dl.acm.org
User authentication is key in user authorization on smart and personal devices. Over the
years, several authentication mechanisms have been proposed: these also include …

Touch-based continuous mobile device authentication: State-of-the-art, challenges and opportunities

AZ Zaidi, CY Chong, Z Jin, R Parthiban… - Journal of Network and …, 2021 - Elsevier
The advancement in the computational capability and storage size of a modern mobile
device has evolved it into a multi-purpose smart device for individual and business needs …

Comparison of PIN-and pattern-based behavioral biometric authentication on mobile devices

Y Li, J Yang, M Xie, D Carlson… - MILCOM 2015-2015 …, 2015 - ieeexplore.ieee.org
Personal identification numbers (PIN) and unlock patterns are highly popular authentication
mechanisms on smart mobile devices but they are not sufficiently secure. PIN or pattern …

Towards continuous and passive authentication across mobile devices: an empirical study

X Wang, T Yu, O Mengshoel, P Tague - … of the 10th ACM Conference on …, 2017 - dl.acm.org
Mobile devices, such as smartphones and tablets, have become prevalent given their ample
functionality brought by a variety of applications. Unfortunately, these devices face security …