Skip to main content

Active Authentication on Mobile Devices

  • Chapter
  • First Online:
Selfie Biometrics

Abstract

In recent years, we have witnessed a significant growth in the use of mobile devices such as smartphones and tablets. In this context, security and privacy in mobile devices becomes vital as the loss of a mobile device could compromise personal information of the user. To deal with this problem, Active Authentication (AA)   systems have been proposed in the literature where users are continuously monitored after the initial access to the mobile device. In this chapter, we provide a survey of recent face-based AA methods.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Clarke N, Furnell S (2005) Authentication of users on mobile telephones: a survey of attitudes and practices. Comput Secur 24(7):519–527

    Article  Google Scholar 

  2. Vance A (2010) If your password is 123456, just make it hackme (online; posted 20 Jan 2010). Available http://www.nytimes.com (online)

  3. Aviv AJ, Gibson K, Mossop E, Blaze M, Smith JM (2010) Smudge attacks on smartphone touch screens. In: Proceedings of the 4th USENIX conference on offensive technologies, pp 1–7

    Google Scholar 

  4. Tapellini D (2014) Smart phone thefts rose to 3.1 million in 2013: industry solution falls short, while legislative efforts to curb theft continue (online; posted 28 May 2014). Available http://www.consumerreports.org/cro/news/2014/04/smart-phone-thefts-rose-to-3-1-million-last-year/index.htm (online)

  5. Khan H, Hengartner U, Vogel D (2015) Usability and security perceptions of implicit authentication: convenient, secure, sometimes annoying. In: Eleventh symposium on usable privacy and security (SOUPS 2015), pp 225–239

    Google Scholar 

  6. Egelman S, Jain S, Portnoff RS, Liao K, Consolvo S, Wagner D (2014) Are you ready to lock? In: Proceedings of the 2014 ACM SIGSAC conference on computer and communications security, pp 750–761

    Google Scholar 

  7. Harbach M, von Zezschwitz E, Fichtner A, Luca AD, Smith M (2014) It’s a hard lock life: a field study of smartphone (un)locking behavior and risk perception. In: Symposium on usable privacy and security (SOUPS 2014), pp 213–230

    Google Scholar 

  8. Guidorizzi RP (2013) Security: active authentication. IT Prof 15(4):4–7

    Article  Google Scholar 

  9. Jakobsson M, Shi E, Golle P, Chow R (2009) Implicit authentication for mobile devices. In: Proceedings of USENIX

    Google Scholar 

  10. Shi E, Niu Y, Jakobsson M, Chow R (2011) Implicit authentication through learning user behavior. In: Proceedings of the 13th international conference on information security, pp 99–113

    Google Scholar 

  11. Clarke NL (2011) Transparent user authentication—biometrics. Springer, RFID and Behavioural Profiling

    Chapter  Google Scholar 

  12. Patel VM, Chellappa R, Chandra D, Barbello B (2016) Continuous user authentication on mobile devices: recent progress and remaining challenges. IEEE Sig Process Mag 33(4):49–61

    Article  Google Scholar 

  13. Frank M, Biedert R, Ma E, Martinovic I, Song D (2013) Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE Trans Inf Forensics Secur 8(1):136–148

    Article  Google Scholar 

  14. Serwadda A, Phoha V, Wang Z (2013) Which verifiers work?: a benchmark evaluation of touch-based authentication algorithms. In: IEEE international conference on biometrics: theory. Sept, applications and systems, pp 1–8

    Google Scholar 

  15. Feng T, Liu Z, Kwon KA, Shi W, Carbunar B, Jiang Y, Nguyen N (2012) Continuous mobile authentication using touchscreen gestures. In: IEEE conference on technologies for homeland security, pp 451–456

    Google Scholar 

  16. Sherman M, Clark G, Yang Y, Sugrim S, Modig A, Lindqvist J, Oulasvirta A, Roos T (2014) User-generated free-form gestures for authentication: security and memorability. In: Proceedings of the 12th annual international conference on mobile systems, applications, and services, pp 176–189

    Google Scholar 

  17. Zhao X, Feng T, Shi W, Kakadiaris I (2014) Mobile user authentication using statistical touch dynamics images. IEEE Trans Inf Forensics Secur 9(11):1780–1789

    Article  Google Scholar 

  18. Zhang H, Patel VM, Fathy ME, Chellappa R (2015) Touch gesture-based active user authentication using dictionaries. In: IEEE winter conference on applications of computer vision

    Google Scholar 

  19. Bo C, Zhang L, Li XY, Huang Q, Wang Y (2013) Silentsense: silent user identification via touch and movement behavioral biometrics. In: Proceedings of the 19th annual international conference on mobile computing & networking, ser. MobiCom ’13. ACM, New York, NY, USA, pp 187–190

    Google Scholar 

  20. Fridman L, Weber S, Greenstadt R, Kam M (2015) Active authentication on mobile devices via stylometry, GPS location, web browsing behavior, and application usage patterns. IEEE Syst J

    Google Scholar 

  21. McCool C, Marcel S, Hadid A, Pietikainen M, Matejka P, Cernocky J, Poh N, Kittler J, Larcher A, Levy C, Matrouf D, Bonastre JF, Tresadern P, Cootes T (2012) Bi-modal person recognition on a mobile phone: using mobile phone data. In: IEEE international conference on multimedia and expo workshops, pp 635–640

    Google Scholar 

  22. Fathy ME, Patel VM, Chellappa R (2015) Face-based active authentication on mobile devices. In: IEEE international conference on acoustics, speech and signal processing

    Google Scholar 

  23. Samangouei P, Patel VM, Chellappa R (2015) Attribute-based continuous user authentication on mobile devices. In: IEEE international conference on biometrics: theory, applications and systems

    Google Scholar 

  24. Hadid A, Heikkila J, Silven O, Pietikainen M (2007) Face and eye detection for person authentication in mobile phones. In: ACM/IEEE international conference on distributed smart cameras, pp 101–108

    Google Scholar 

  25. Derawi M, Nickel C, Bours P, Busch C (2010) Unobtrusive user-authentication on mobile phones using biometric gait recognition. In: International conference on intelligent information hiding and multimedia signal processing, pp 306–311

    Google Scholar 

  26. Primo A, Phoha V, Kumar R, Serwadda A (2014) Context-aware active authentication using smartphone accelerometer measurements. In: IEEE conference on computer vision and pattern recognition workshops, pp 98–105

    Google Scholar 

  27. Crouse D, Han H, Chandra D, Barbello B, Jain AK (2015) Continuous authentication of mobile user: fusion of face image and inertial measurement unit data. In: International conference on biometrics

    Google Scholar 

  28. Zhang H, Patel VM, Chellappa R (2015) Robust multimodal recognition via multitask multivariate low-rank representations. In: IEEE international conference on automatic face and gesture recognition, vol 1, pp 1–8

    Google Scholar 

  29. Zhang H, Patel VM, Shekhar S, Chellappa R (2015) Domain adaptive sparse representation-based classification. In IEEE international conference on automatic face and gesture recognition, vol 1, pp 1–8

    Google Scholar 

  30. Abramson M, Aha DW (2013) User authentication from web browsing behavior. In: Florida artificial intelligence research society conference. AAAI Press

    Google Scholar 

  31. Li F, Clarke N, Papadaki M, Dowland P (2014) Active authentication for mobile devices utilising behaviour profiling. Int J Inf Secur 13(3):229–244

    Article  Google Scholar 

  32. Saevanee H, Clarke N, Furnell S, Biscione V (2014) Text-based active authentication for mobile devices. In: Cuppens-Boulahia N, Cuppens F, Jajodia S, Abou El Kalam A, Sans T (eds) ICT systems security and privacy protection, ser. IFIP advances in information and communication technology. Springer, Berlin, Heidelberg, vol 428, pp 99–112

    Chapter  Google Scholar 

  33. Gascon H, Uellenbeck S, Wolf C, Rieck K (2014) Continuous authentication on mobile devices by analysis of typing motion behavior. Sicherheit 2014:1–12

    Article  Google Scholar 

  34. Holz C, Buthpitiya S, Knaust M (2015) Bodyprint: biometric user identification on mobile devices using the capacitive touchscreen to scan body parts. In: Proceedings of the 33rd annual ACM conference on human factors in computing systems. ACM, New York, NY, USA, pp 3011–3014

    Google Scholar 

  35. Perera P, Patel VM (2017) Extreme value analysis for mobile active user authentication. In: IEEE international conference on automatic face and gesture recognition

    Google Scholar 

  36. Perera P, Patel VM (2017) Towards multiple user active authentication in mobile devices. In: IEEE international conference on automatic face and gesture recognition

    Google Scholar 

  37. Perera P, Patel VM (2016) Quickest intrusion detection in mobile active user authentication. In: International conference on biometrics theory, applications and systems

    Google Scholar 

  38. Samangouei P, Patel VM, Chellappa R (2016) Facial attributes for active authentication on mobile devices. Image Vis Comput 58:181–192

    Article  Google Scholar 

  39. Samangouei P, Chellappa R (2016) Convolutional neural networks for attribute-based active authentication on mobile devices. In: IEEE international conference on biometrics: theory, applications, and systems

    Google Scholar 

  40. Perera P, Patel VM (2018) Facebased multiple user active authentication on mobile devices. IEEE Trans Inf Forensics Secur 14:1240–1250

    Article  Google Scholar 

  41. Perera P, Patel VM (2018) Efficient and low latency detection of intruders in mobile active authentication. IEEE Trans Inf Forensics Secur 13(6):1392–1405

    Article  Google Scholar 

  42. Sarkar S, Patel VM, Chellappa R (2016) Deep feature-based face detection on mobile devices. In: IEEE international conference on identity, security and behavior analysis

    Google Scholar 

  43. Krizhevsky A, Sutskever I, Hinton GE (2012) Imagenet classification with deep convolutional neural networks. In: Advances in neural information processing systems, p 2012

    Google Scholar 

  44. Mahbub U, Patel VM, Chandra D, Barbello B, Chellappa R (2016) Partial face detection for continuous authentication. In: IEEE international conference on image processing

    Google Scholar 

  45. Abeni P, Baltatu M, D’Alessandro R (2006) Nis03-4: implementing biometrics-based authentication for mobile devices. In: IEEE global telecommunications conference, pp 1–5

    Google Scholar 

  46. Viola PA, Jones MJ (2004) Robust real-time face detection. Int J Comput Vis 57(2):137–154

    Article  Google Scholar 

  47. Kumar N, Berg A, Belhumeur P, Nayar S (2011) Describable visual attributes for face verification and image search. IEEE Trans Pattern Anal Mach Intell 33(10):1962–1977

    Article  Google Scholar 

  48. Perera P, Patel VM (2018) Dual-minimax probability machines for one-class mobile active authentication. In: IEEE international conference on biometrics: theory, applications, and systems

    Google Scholar 

  49. Oza PB, Patel VM (2018) One-class convolutional neural network. IEEE Sig Process Lett 26:277–281

    Article  Google Scholar 

  50. Clarke N, Karatzouni S, Furnell S (2009) Flexible and Transparent User Authentication for Mobile Devices. In: Emerging challenges for security, privacy and trust: 24th IFIP TC 11 international information security conference, SEC 2009, Pafos, Cyprus, 18–20 May 2009. Proceedings. Springer, Berlin, Heidelberg, pp 1–12

    Google Scholar 

  51. Crawford H, Renaud K (2014) Understanding user perceptions of transparent authentication on a mobile device. J Trust Manag 1(7):1–28

    Google Scholar 

  52. Meng W, Wong DS, Furnell S, Zhou J (2015) Surveying the development of biometric user authentication on mobile phones. IEEE Commun Surv Tutorials 17(3):1268–1293

    Article  Google Scholar 

  53. Li JGWD, Hao S, Halfond GJ (2014) An empirical study of the energy consumption of android applications. In: IEEE international conference on software maintenance and evolution (ICSME)

    Google Scholar 

  54. Lee W (2013) Mobile apps and power consumption—basics, part 1. Available https://developer.qualcomm.com/blog/mobile-apps-and-power-consumption-basics-part-1 (online)

  55. Mahbub U, Sakar S, Patel V, Chellappa R (2016) Active authentication for smartphones: a challenge data set and benchmark results. In: IEEE international conference on biometrics: theory applications and systems

    Google Scholar 

Download references

Acknowledgements

This work was supported by US Office of Naval Research (ONR) Grant YIP N00014-16-1-3134.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vishal M. Patel .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Perera, P., Patel, V.M. (2019). Active Authentication on Mobile Devices. In: Rattani, A., Derakhshani, R., Ross, A. (eds) Selfie Biometrics. Advances in Computer Vision and Pattern Recognition. Springer, Cham. https://doi.org/10.1007/978-3-030-26972-2_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-26972-2_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-26971-5

  • Online ISBN: 978-3-030-26972-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics