The increasing use of touchscreen mobile phones to access sensitive and personal data has given rise to the need of secure and usable authentication technique. This paper presents a novel approach to authentication on touch-screen mobile devices. The basic idea was to exploit user interaction data of touchscreen mobile phone to authenticate users based on the way they perform touch operations. A filed study was conducted to design typical touch-operation scenarios and gather users' data. Behavioral features were extracted to accurately characterize users' behavior. Diverse classification methods were employed to perform the authentication task. Experiments are included to demonstrate the effectiveness of the proposed approach, which achieves a false-acceptance rate of 4.05%, and a false-rejection rate of 3.27%. This level of accuracy shows that these are indeed identity information in touch behavior that can be used as a mobile authentication mechanism. © Springer International Publishing 2013.
CITATION STYLE
Cai, Z., Shen, C., Wang, M., Song, Y., & Wang, J. (2013). Mobile authentication through touch-behavior features. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8232 LNCS, pp. 386–393). https://doi.org/10.1007/978-3-319-02961-0_48
Mendeley helps you to discover research relevant for your work.