Recent advances in biometrics-based user authentication for wearable devices: A contemporary survey

S Liu, W Shao, T Li, W Xu, L Song - Digital Signal Processing, 2022 - Elsevier
In recent years, wearable technology is interwoven with our everyday lives because of its
commoditization and comfort. Security and privacy become a big concern as many user …

A comprehensive review of keystroke dynamics-based authentication mechanism

N Raul, R Shankarmani, P Joshi - … : Proceedings of ICICC 2019, Volume 2, 2020 - Springer
Keystroke dynamics, also called keystroke biometrics or ty** dynamics, is a biometric-
based on ty** style. Typists have unique ty** patterns that can be analyzed to confirm …

Continuous authentication using one-dimensional multi-resolution local binary patterns (1DMRLBP) in ECG biometrics

W Louis, M Komeili… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
The objective of a continuous authentication system is to continuously monitor the identity of
subjects using biometric systems. In this paper, we proposed a novel feature extraction and …

Mouse authentication without the temporal aspect–what does a 2d-cnn learn?

P Chong, YXM Tan, J Guarnizo… - 2018 IEEE Security …, 2018 - ieeexplore.ieee.org
Mouse dynamics as behavioral biometrics are under investigation for their effectiveness in
computer security systems. Previous state-of-the-art methods relied on heuristic feature …

A survey on different continuous authentication systems

S Ayeswarya, J Norman - International Journal of Biometrics, 2019 - inderscienceonline.com
There has been significant research in the provision of trustworthy initial login user
authentication, however, there is still need for continuous authentication during a user …

Pattern-growth based mining mouse-interaction behavior for an active user authentication system

C Shen, Y Chen, X Guan… - IEEE transactions on …, 2017 - ieeexplore.ieee.org
Analyzing mouse-interaction behaviors for implicitly identifying computer users has received
growing interest from security and biometric researchers. This study presents a simple but …

Performance evaluation of continuous authentication systems

P Bours, S Mondal - Iet Biometrics, 2015 - Wiley Online Library
In this study, the authors will describe how performance results for continuous authentication
(CA) should be reported. Most research on alleged CA is in fact periodic authentication, and …

Swipe gesture based continuous authentication for mobile devices

S Mondal, P Bours - 2015 international conference on …, 2015 - ieeexplore.ieee.org
In this research, we investigated the performance of a continuous biometric authentication
system for mobile devices under various different analysis techniques. We tested these on a …

Improving reliability: User authentication on smartphones using keystroke biometrics

Y Wang, C Wu, K Zheng, X Wang - IEEE Access, 2019 - ieeexplore.ieee.org
Keystroke biometrics is a well-investigated dynamic behavioral methodology that utilizes the
unique behavioral patterns of users to verify their identity when tap** keys. However, the …

Identification of trusted interactive behavior based on mouse behavior considering web User's emotions

Q Yi, S **ong, B Wang, S Yi - International Journal of Industrial Ergonomics, 2020 - Elsevier
Under existing network security technology, it is still possible for hackers to impersonate
legitimate users and invade a system for malicious destruction. Therefore, this study …