Mobile authentication through touch-behavior features

17Citations
Citations of this article
20Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The increasing use of touchscreen mobile phones to access sensitive and personal data has given rise to the need of secure and usable authentication technique. This paper presents a novel approach to authentication on touch-screen mobile devices. The basic idea was to exploit user interaction data of touchscreen mobile phone to authenticate users based on the way they perform touch operations. A filed study was conducted to design typical touch-operation scenarios and gather users' data. Behavioral features were extracted to accurately characterize users' behavior. Diverse classification methods were employed to perform the authentication task. Experiments are included to demonstrate the effectiveness of the proposed approach, which achieves a false-acceptance rate of 4.05%, and a false-rejection rate of 3.27%. This level of accuracy shows that these are indeed identity information in touch behavior that can be used as a mobile authentication mechanism. © Springer International Publishing 2013.

Cite

CITATION STYLE

APA

Cai, Z., Shen, C., Wang, M., Song, Y., & Wang, J. (2013). Mobile authentication through touch-behavior features. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8232 LNCS, pp. 386–393). https://doi.org/10.1007/978-3-319-02961-0_48

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free