Touch-based continuous mobile device authentication: State-of-the-art, challenges and opportunities

AZ Zaidi, CY Chong, Z **, R Parthiban… - Journal of Network and …, 2021 - Elsevier
The advancement in the computational capability and storage size of a modern mobile
device has evolved it into a multi-purpose smart device for individual and business needs …

Task-driven biometric authentication of users in virtual reality (VR) environments

A Kupin, B Moeller, Y Jiang, NK Banerjee… - … Conference, MMM 2019 …, 2019 - Springer
In this paper, we provide an approach for authenticating users in virtual reality (VR)
environments by tracking the behavior of users as they perform goal-oriented tasks, such as …

[PDF][PDF] Surveying biometric authentication for mobile device security

TJ Neal, DL Woodard - Journal of Pattern Recognition Research, 2016 - cse.usf.edu
Mobile devices, such as smartphones and tablets, are frequently used for creation and
transmission of private and sensitive messages and files. While personal identification …

Touch keystroke dynamics for demographic classification

L Cascone, M Nappi, F Narducci, C Pero - Pattern Recognition Letters, 2022 - Elsevier
Soft biometric traits are not fully distinctive in recognition tasks, but they can effectively
added to biometric recognition systems to improve the overall performance. In this work, the …

Affective states recognition through touch dynamics

F Balducci, D Impedovo, N Macchiarulo… - Multimedia Tools and …, 2020 - Springer
Abstract This work exploits Touch Dynamics to recognize affective states of a user while
using a mobile device. To the aim, the acquired touch pattern is segmented in swipes …

Multimodal continuous user authentication on mobile devices via interaction patterns

X Zhang, P Zhang, H Hu - Wireless Communications and …, 2021 - Wiley Online Library
Behavior‐based continuous authentication is an increasingly popular methodology that
utilizes behavior modeling and sensing for authentication and account access authorization …

A behavioral authentication method for mobile gesture against resilient user posture

Q Liu, M Wang, P Zhao, C Yan… - 2016 3rd International …, 2016 - ieeexplore.ieee.org
The password pattern has become a widely used mobile authentication method. However,
there are still some potential security problems since the passwords are easy to be cracked …

Exploring mobile biometric performance through identification of core factors and relationships

M Boakes, R Guest, F Deravi… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Biometrics, as a form of authentication, has existed for several decades and shows no signs
of slowing down. Extensive research has been carried out into enhancing systems either by …

Empirical techniques to detect and mitigate the effects of irrevocably evolving user profiles in touch-based authentication systems

N Palaskar, Z Syed, S Banerjee… - 2016 IEEE 17th …, 2016 - ieeexplore.ieee.org
Touch dynamics (or touch based authentication) refers to a behavioral biometric for
touchscreen devices wherein a user is authenticated based on his/her executed touch …

Behavior-based biometrics for virtual reality

R Miller - 2022 - search.proquest.com
As VR systems become prevalent in domains such as healthcare, education, and
teleoperation, sensitive data must be protected from access by malicious agents. Unlike …