Identifying users by their hand tracking data in augmented and virtual reality

J Liebers, S Brockel, U Gruenefeld… - International Journal of …, 2024 - Taylor & Francis
Abstract Nowadays, Augmented and Virtual Reality devices are widely available and are
often shared among users due to their high cost. Thus, distinguishing users to offer …

It's All in the Touch: Authenticating Users with HOST Gestures on Multi-Touch Screen Devices

C Wu, H Cao, G Xu, C Zhou, J Sun… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
As smartphones proliferate, secure and user-friendly authentication methods are
increasingly critical. Existing behavioral biometrics, however, are often compromised by …

Capauth: Identifying and differentiating user handprints on commodity capacitive touchscreens

A Guo, R Xiao, C Harrison - … of the 2015 International Conference on …, 2015 - dl.acm.org
User identification and differentiation have implications in many application domains,
including security, personalization, and co-located multiuser systems. In response, dozens …

Exploring the hand and finger-issued behaviors toward natural authentication

H Wang, T Chen, X Liu, J Chen - IEEE Access, 2020 - ieeexplore.ieee.org
As wearables, such as smartwatches and data gloves, become ubiquitous in our daily lives,
it is possible to capture users' behaviors as they go, and then to authenticate them using …

Evaluating the influence of targets and hand postures on touch-based behavioural biometrics

D Buschek, A De Luca, F Alt - Proceedings of the 2016 CHI Conference …, 2016 - dl.acm.org
Users' individual differences in their mobile touch behaviour can help to continuously verify
identity and protect personal data. However, little is known about the influence of GUI …

YouTouch! Low-cost user identification at an interactive display wall

U von Zadow, P Reipschläger, D Bösel… - Proceedings of the …, 2016 - dl.acm.org
We present YouTouch!, a system that tracks users in front of an interactive display wall and
associates touches with users. With their large size, display walls are inherently suitable for …

Evaluation of a User Authentication Schema Using Behavioral Biometrics and Machine Learning

L Pryor, J Mallet, R Dave, N Seliya, M Vanamala… - arXiv preprint arXiv …, 2022 - arxiv.org
The amount of secure data being stored on mobile devices has grown immensely in recent
years. However, the security measures protecting this data have stayed static, with few …

Behavioral biometric identification on mobile devices

M Wolff - Foundations of Augmented Cognition: 7th International …, 2013 - Springer
We show that accelerometers, touch screens and software keyboards, which are standard
components of modern mobile phones, can be used to differentiate different test subjects …

Identification of user behavioral biometrics for authentication using keystroke dynamics and machine learning

S Krishnamoorthy, L Rueda, S Saad… - Proceedings of the 2018 …, 2018 - dl.acm.org
This paper focuses on the effective classification of the behavior of users accessing
computing devices to authenticate them. The authentication is based on keystroke dynamics …

Not quite yourself today: Behaviour-based continuous authentication in IoT environments

A Krašovec, D Pellarini, D Geneiatakis… - Proceedings of the …, 2020 - dl.acm.org
The shortcomings of the traditional password-based authentication mechanism are
becoming increasingly apparent as we transition from" one user-one device" to a richer" …