A Review on Dynamics Authentication in Touchscreen Mobile

Authors(2) :-M. F. Gaikwad, Puja Kumbharde

This paper based on user interaction with touchscreens of mobile which is based on swipe gestures for personal authentication. There is an comparions of existing systems (based on SVM and GMM using selected features from the literature) exploiting independent processing of the swipes according to their orientation.By analysising the database user always sliding one finger on the screeen which having various behavioral patterns.Owing to the widespread use of touchscreen mobile devices, it is need for us to study the different techniques and their effectiveness in the area of touch dynamics biometrics. This paper provide some comparative analysis in the topic area with additional data acquisition protocols,data representation and decision making techniques.so we can understand differnet challenging issues.

Authors and Affiliations

M. F. Gaikwad
Department of Information Technology, MCOERC ,University of Pune, Nashik,India
Puja Kumbharde
Dr. D.Y. Patil College of Engineering, Pune, Nashik, India

Active authentication, biometrics, smartphone, touchscreen, human computer interaction

  1. Prof. Abdulsalam H, Skillicorn DB, Martin P. Classification using streaming random forests. IEEE Trans Knowl Data Eng 2011;23:22–36. doi:10.1109/TKDE.2010.36.
  2. Alghamdi SJ, Elrefaei LA. 2015. Dynamic user verification using touch keystroke based on medians vector proximity. Presented at the 2015 7th International Conference on Computational Intelligence, Communication Systems and Networks (CICSyN), pp. 121–6. doi:10.1109/CICSyN.2015.31.
  3. Alotaibi N, Bruno EP, Coakley M, Gazarov A, Monaco V, Winard S, et al., 2014. Text input biometric system design for handheld devices. Proceedings of Student-Faculty Research Day. pp. B7.1–8.
  4. Antal M, Szabó LZ. 2014. Keystroke dynamics on Android platform. Proceedings of the 8th International Conference Interdisciplinarity in Engineering, INTER-ENG 2014, Romania, pp. 131–6.
  5. Antal M, Szabó Z-L. 2015. An evaluation of one-class and two class classification algorithms for keystroke dynamics authentication on mobile devices. doi:10.1109/CSCS.2015.16.
  6. Aviv AJ, Sapp B, Blaze M, Smith JM. 2012. Practicality of accelerometer side channels on smartphones. Proceedings of the 28th Annual Computer Security Applications Conference, ACSAC ’12. ACM, New York, NY, USA, pp. 41–50. doi:10.1145/ 2420950.2420957.
  7. Babaeizadeh M, Bakhtiari M, Maarof MA. Authentication method through keystrokes measurement of mobile users in cloud environment. Int J Adv Soft Comput Appl 2014;6:94–112.
  8. Bartlow N, Cukic B. 2006. Evaluating the reliability of credential hardening through keystroke dynamics. 17th International Symposium on Software Reliability Engineering, 2006, pp. 117–26. doi:10.1109/ISSRE.2006.25.
  9. Bellinger C, Sharma S, Japkowicz N. 2012. One-class versus binary classification: which and When? Presented at the 2012 11th International Conference on Machine Learning and Applications (ICMLA), pp. 102–6. doi:10.1109/ICMLA.2012.212.
  10. Bo C, Zhang L, Jung T, Han J, Li X-Y, Wang Y. 2014. Continuous user identification via touch and movement behavioral biometrics. IEEE International Performance Computing and Communications Conference (IPCCC), 2014, pp. 1–8. doi:10.1109/PCCC.2014.7017067.
  11. Bond WF, Ahmed Awad EA. 2015. Touch-based static authentication using a virtual grid. Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec ’15. ACM, New York,NY,USA,pp.129–34.doi:10.1145/2756601.2756602.

Publication Details

Published in : Volume 3 | Issue 5 | May-June 2018
Date of Publication : 2018-06-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 339-349
Manuscript Number : CSEIT183579
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

M. F. Gaikwad, Puja Kumbharde, "A Review on Dynamics Authentication in Touchscreen Mobile", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 5, pp.339-349, May-June-2018.
Journal URL : http://ijsrcseit.com/CSEIT183579

Article Preview