I Know It's You: Touch Behavioral Characteristics Recognition on Smartphone Based on Pattern Password
نویسندگان
چکیده
In recent years, pattern password has been widely used for user authentication on smartphones and other mobile devices in addition to the traditional password protection approach. However, pattern password authentication mechanism is incapable of protecting users from losses when a user's login credential information is stolen. We propose an identity verification scheme based on user’s touching behaviors when inputting a pattern password on the smartphone screen. By exploiting the biometrical features, such as position, pressure, size, and time when a user inputs a pattern password to a smartphone, the proposed user verification mechanism can validate whether the user is the true owner of the smartphone. We adopted fuzzy logic, artificial neural network, and support vector machine, to build classifiers, using the behavioral data collected from 10 users. The experimental results show that all the three algorithms have significant recognition capacity, and the fuzzy logic algorithm is the best one with its false acceptance rate and false rejection rate as 4.7% and 4.468% respectively.
منابع مشابه
Fingerprint Classification and Matching
The problem of resolving the identity of a person can be categorized into two fundamentally distinct types of problems with different inherent complexities [1]: (i) verification and (ii) recognition. Verification (authentication) refers to the problem of confirming or denying a person’s claimed identity (Am I who I claim I am?). Recognition (Who am I?) refers to the problem of establishing a su...
متن کاملBiometric Recognition: Security and Privacy Concerns
PUBLISHED BY THE IEEE COMPUTER SOCIETY 1540-7993/03/$17.00 © 2003 IEEE IEEE SECURITY & PRIVACY 33 I s Alice authorized to enter this facility? Is Bob entitled to access this Web site or privileged information? Are we administering our service exclusively to the enrolled users? Does Charlie have a criminal record? Every day, a variety of organizations pose questions such as these about personal ...
متن کاملDevelopment of Multimedia Application for Smartphones
Information security and verify the user's identity has become one of the biggest concerns of institutions and individuals; this interest emerged many types of authentication. Security field uses three different ways; in the oldest documentation of these methods depending on the specific information such as a password or name. The second type depends on something you have his key, such as ...
متن کاملSmudge Attacks on Smartphone Touch Screens
Touch screens are an increasingly common feature on personal computing devices, especially smartphones, where size and user interface advantages accrue from consolidating multiple hardware components (keyboard, number pad, etc.) into a single software definable user interface. Oily residues, or smudges, on the touch screen surface, are one side effect of touches from which frequently used patte...
متن کاملAlgorithm for Biometric Detection Application to Iris
Biometric system is a technology for identification or authentication of a living person grounded on a behavioral or physiological characteristic. There are so many biometric systems like fingerprints, voice, gait, iris etc. Other identification systems are available like PIN, password etc Among these biometric authentication system, iris identification has got increasing tending due to its hig...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015