Continuous user authentication on mobile devices: Recent progress and remaining challenges

VM Patel, R Chellappa, D Chandra… - IEEE Signal …, 2016 - ieeexplore.ieee.org
Recent developments in sensing and communication technologies have led to an explosion
in the use of mobile devices such as smart phones and tablets. With the increase in the use …

Surveying the development of biometric user authentication on mobile phones

W Meng, DS Wong, S Furnell… - … Surveys & Tutorials, 2014 - ieeexplore.ieee.org
Designing reliable user authentication on mobile phones is becoming an increasingly
important task to protect users' private information and data. Since biometric approaches can …

HMOG: New behavioral biometric features for continuous authentication of smartphone users

Z Sitová, J Šeděnka, Q Yang, G Peng… - IEEE Transactions …, 2015 - ieeexplore.ieee.org
We introduce hand movement, orientation, and grasp (HMOG), a set of behavioral features
to continuously authenticate smartphone users. HMOG features unobtrusively capture subtle …

Behavioral biometrics & continuous user authentication on mobile devices: A survey

I Stylios, S Kokolakis, O Thanou, S Chatzis - Information Fusion, 2021 - Elsevier
This paper offers an up-to-date, comprehensive, extensive and targeted survey on
Behavioral Biometrics and Continuous Authentication technologies for mobile devices. Our …

Driver classification and driving style recognition using inertial sensors

M Van Ly, S Martin, MM Trivedi - 2013 IEEE intelligent vehicles …, 2013 - ieeexplore.ieee.org
Currently there are many research focused on using smartphone as a data collection device.
Many have shown its sensors ability to replace a lab test bed. These inertial sensors can be …

Continuous mobile authentication using touchscreen gestures

T Feng, Z Liu, KA Kwon, W Shi… - … IEEE conference on …, 2012 - ieeexplore.ieee.org
Securing the sensitive data stored and accessed from mobile devices makes user
authentication a problem of paramount importance. The tension between security and …

Performance analysis of multi-motion sensor behavior for active smartphone authentication

C Shen, Y Li, Y Chen, X Guan… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
The increasing use of smartphones as personal computing platforms to access personal
information has stressed the demand for secure and usable authentication techniques, and …

Deep residual network for smartwatch-based user identification through complex hand movements

S Mekruksavanich, A Jitpattanakul - Sensors, 2022 - mdpi.com
Wearable technology has advanced significantly and is now used in various entertainment
and business contexts. Authentication methods could be trustworthy, transparent, and non …

Silentsense: silent user identification via touch and movement behavioral biometrics

C Bo, L Zhang, XY Li, Q Huang, Y Wang - Proceedings of the 19th …, 2013 - dl.acm.org
In this work, we present SilentSense, a framework to authenticate users silently and
transparently by exploiting the user touch behavior biometrics and leveraging the integrated …

Towards continuous and passive authentication via touch biometrics: An experimental study on smartphones

H Xu, Y Zhou, MR Lyu - 10th Symposium On Usable Privacy and …, 2014 - usenix.org
Current smartphones generally cannot continuously authenticate users during runtime. This
poses severe security and privacy threats: A malicious user can manipulate the phone if …