Abstract
Currently smartphone’ users run many crucial applications (such as banking and emails) which contains a very confidential information. To secure this information, the built in sensors equipped with smartphone devices can be utilized. In this paper, based on these sensors, an implicit authentication system for smartphone’s users is proposed. A mobile App is developed to collect the data source of users’ biometrics and then features (pressure, position, size, and time) are extracted. classifiers were then applied to decide whether a user is the true owner of device or an impostor. The experimental results showed that our implicit authentication system achieved accuracy of 96.5 % which is better than a related work.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Muhammad S, Alex XL, Arjmand S (2013) Secure unlocking of mobile touch screen devices by simple gestures: you can see it but you can not do it. In: Proceedings of the 19th annual international conference on mobile computing & #38; networking. MobiCom ’13, New York, NY, USA, ACM (2013), pp 39–50
Ala AA, Azizah AM (2014) Touch gesture authentication framework for touch screen mobile devices. J Theor Appl Inf Technol 62(2)
Cheng B, Lan Z, Xiang-Yang L (2013) Silentsense: silent user identification via touch and movement behavioral biometrics. In: Proceedings of the 19th annual international conference on mobile computing & networking. MobiCom ’13, New York, NY, USA, ACM, pp 187–190
Premkumar S, Samuel C, Duen HPC, Hongyuan Z (2014) Latentgesture: active user authentication through background touch analysis. In: Proceedings of the second international symposium of Chinese CHI. Chinese CHI ’14, New York, NY, USA, ACM, pp 110–113
Cheng B, Lan Z, Xiang-Yang L (2013) Silentsense: silent user identification via dynamics of touch and movement behavioral biometrics. arXiv preprint arXiv:1309.0073
Vibha KR (2011) Integration of biometric authentication procedure in customer oriented payment system in trusted mobile devices. Int J Inf Technol Conver Serv 1(6):15–25
Kresimir D, Mislav G (2004) A survey of biometric recognition methods. In: 46th International symposium on electronics in Marine. Proceedings Elmar 2004. IEEE pp 184–193
Tharwat A, Ibrahim A, Ali H (2012) Personal identification using ear images based on fast and accurate principal component analysis. In: 8th international conference on informatics and systems (INFOS), IEEE MM-56
Reham A, Tarek G, Ghada E, Aboul Ella H (2014) Biometric and traditional mobile authentication techniques: Overviews and open issues. In: Hassanien AE, Kim TH, Kacprzyk J, Awad AI (eds) Bio-inspiring cyber security and cloud services: trends and innovations, vol 70. Intelligent Systems Reference LibrarySpringer, Berlin Heidelberg, pp 423–446
Hui X, Yangfan Z, Michael RL (2014) Towards continuous and passive authentication via touch biometrics: An experimental study on smartphones. In: Symposium on usable privacy and security (SOUPS 2014), Menlo Park, CA, USENIX Association, pp 187–198
Hugo G, Sebastian U, Christopher W, Konrad R (2014) Continuous authentication on mobile devices by analysis of typing motion behavior. In: Sicherheit, vol P-228, Gesellschaft fr Informatik, Bonn, pp 1–12
Lohit J, John VM, Michael JC, Charles CT (2014) Passcode keystroke biometric performance on smartphone touchscreens is superior to that on hardware keyboards. Int J Res Comput Appl Inf Technol 2:29–33
Nan Z, Kun B, Hai H, Haining W (2014) You are how you touch: user verification on smartphones via tapping behaviors. In: IEEE 22nd international conference on network protocols (ICNP), IEEE, pp 221–232
Michael S, Gradeigh C, Yulong Y, Shridatt S, Arttu M, Janne L, Antti O, Teemu R (2014) User-generated free-form gestures for authentication: security and memorability. In; Proceedings of the 12th annual international conference on mobile systems, applications, and services, pp 176–189
Tharwat A, Gaber T, Hassanien AE, Hassanien HA, Tolba MF (2014) Cattle identification using muzzle print images based on texture features approach. In: Abraham A, Kömer P, Snášel V (eds) Proceedings of the fourth international conference on innovations in bio-inspired computing and application IBICA 2014, vol 303. AISCSpringer, Heidelberg, pp 217–227
Tharwat A, Gaber T, Hassanien AE, Shahin M, Refaat B (2015) Sift-based arabic sign language recognition system. In: Afro-european conference for industrial advancement, vol 334. Springer International Publishing, pp 359–370
Acknowledgments
This paper has been elaborated in the framework of the project New creative teams in priorities of scientific research, reg. no. CZ.1.07/2.3.00/30.0055, supported by Operational Programme Education for Competitiveness and co-financed by the European Social Fund and the state budget of the Czech Republic and supported by the IT4Innovations Centre of Excellence project (CZ.1.05/1.1.00/ 02.0070), funded by the European Regional Development Fund and the national budget of the Czech Republic via the Research and Development for nnovations Operational Programme.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Amin, R., Gaber, T., ElTaweel, G. (2015). Implicit Authentication System for Smartphones Users Based on Touch Data. In: Abraham, A., Jiang, X., Snášel, V., Pan, JS. (eds) Intelligent Data Analysis and Applications. Advances in Intelligent Systems and Computing, vol 370. Springer, Cham. https://doi.org/10.1007/978-3-319-21206-7_22
Download citation
DOI: https://doi.org/10.1007/978-3-319-21206-7_22
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-21205-0
Online ISBN: 978-3-319-21206-7
eBook Packages: EngineeringEngineering (R0)