Skip to main content

Implicit Authentication System for Smartphones Users Based on Touch Data

  • Conference paper
  • First Online:
Book cover Intelligent Data Analysis and Applications

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 370))

Abstract

Currently smartphone’ users run many crucial applications (such as banking and emails) which contains a very confidential information. To secure this information, the built in sensors equipped with smartphone devices can be utilized. In this paper, based on these sensors, an implicit authentication system for smartphone’s users is proposed. A mobile App is developed to collect the data source of users’ biometrics and then features (pressure, position, size, and time) are extracted. classifiers were then applied to decide whether a user is the true owner of device or an impostor. The experimental results showed that our implicit authentication system achieved accuracy of 96.5 % which is better than a related work.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Muhammad S, Alex XL, Arjmand S (2013) Secure unlocking of mobile touch screen devices by simple gestures: you can see it but you can not do it. In: Proceedings of the 19th annual international conference on mobile computing & #38; networking. MobiCom ’13, New York, NY, USA, ACM (2013), pp 39–50

    Google Scholar 

  2. Ala AA, Azizah AM (2014) Touch gesture authentication framework for touch screen mobile devices. J Theor Appl Inf Technol 62(2)

    Google Scholar 

  3. Cheng B, Lan Z, Xiang-Yang L (2013) Silentsense: silent user identification via touch and movement behavioral biometrics. In: Proceedings of the 19th annual international conference on mobile computing & networking. MobiCom ’13, New York, NY, USA, ACM, pp 187–190

    Google Scholar 

  4. Premkumar S, Samuel C, Duen HPC, Hongyuan Z (2014) Latentgesture: active user authentication through background touch analysis. In: Proceedings of the second international symposium of Chinese CHI. Chinese CHI ’14, New York, NY, USA, ACM, pp 110–113

    Google Scholar 

  5. Cheng B, Lan Z, Xiang-Yang L (2013) Silentsense: silent user identification via dynamics of touch and movement behavioral biometrics. arXiv preprint arXiv:1309.0073

  6. Vibha KR (2011) Integration of biometric authentication procedure in customer oriented payment system in trusted mobile devices. Int J Inf Technol Conver Serv 1(6):15–25

    Google Scholar 

  7. Kresimir D, Mislav G (2004) A survey of biometric recognition methods. In: 46th International symposium on electronics in Marine. Proceedings Elmar 2004. IEEE pp 184–193

    Google Scholar 

  8. Tharwat A, Ibrahim A, Ali H (2012) Personal identification using ear images based on fast and accurate principal component analysis. In: 8th international conference on informatics and systems (INFOS), IEEE MM-56

    Google Scholar 

  9. Reham A, Tarek G, Ghada E, Aboul Ella H (2014) Biometric and traditional mobile authentication techniques: Overviews and open issues. In: Hassanien AE, Kim TH, Kacprzyk J, Awad AI (eds) Bio-inspiring cyber security and cloud services: trends and innovations, vol 70. Intelligent Systems Reference LibrarySpringer, Berlin Heidelberg, pp 423–446

    Google Scholar 

  10. Hui X, Yangfan Z, Michael RL (2014) Towards continuous and passive authentication via touch biometrics: An experimental study on smartphones. In: Symposium on usable privacy and security (SOUPS 2014), Menlo Park, CA, USENIX Association, pp 187–198

    Google Scholar 

  11. Hugo G, Sebastian U, Christopher W, Konrad R (2014) Continuous authentication on mobile devices by analysis of typing motion behavior. In: Sicherheit, vol P-228, Gesellschaft fr Informatik, Bonn, pp 1–12

    Google Scholar 

  12. Lohit J, John VM, Michael JC, Charles CT (2014) Passcode keystroke biometric performance on smartphone touchscreens is superior to that on hardware keyboards. Int J Res Comput Appl Inf Technol 2:29–33

    Google Scholar 

  13. Nan Z, Kun B, Hai H, Haining W (2014) You are how you touch: user verification on smartphones via tapping behaviors. In: IEEE 22nd international conference on network protocols (ICNP), IEEE, pp 221–232

    Google Scholar 

  14. Michael S, Gradeigh C, Yulong Y, Shridatt S, Arttu M, Janne L, Antti O, Teemu R (2014) User-generated free-form gestures for authentication: security and memorability. In; Proceedings of the 12th annual international conference on mobile systems, applications, and services, pp 176–189

    Google Scholar 

  15. Tharwat A, Gaber T, Hassanien AE, Hassanien HA, Tolba MF (2014) Cattle identification using muzzle print images based on texture features approach. In: Abraham A, Kömer P, Snášel V (eds) Proceedings of the fourth international conference on innovations in bio-inspired computing and application IBICA 2014, vol 303. AISCSpringer, Heidelberg, pp 217–227

    Google Scholar 

  16. Tharwat A, Gaber T, Hassanien AE, Shahin M, Refaat B (2015) Sift-based arabic sign language recognition system. In: Afro-european conference for industrial advancement, vol 334. Springer International Publishing, pp 359–370

    Google Scholar 

Download references

Acknowledgments

This paper has been elaborated in the framework of the project New creative teams in priorities of scientific research, reg. no. CZ.1.07/2.3.00/30.0055, supported by Operational Programme Education for Competitiveness and co-financed by the European Social Fund and the state budget of the Czech Republic and supported by the IT4Innovations Centre of Excellence project (CZ.1.05/1.1.00/ 02.0070), funded by the European Regional Development Fund and the national budget of the Czech Republic via the Research and Development for nnovations Operational Programme.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Reham Amin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Amin, R., Gaber, T., ElTaweel, G. (2015). Implicit Authentication System for Smartphones Users Based on Touch Data. In: Abraham, A., Jiang, X., Snášel, V., Pan, JS. (eds) Intelligent Data Analysis and Applications. Advances in Intelligent Systems and Computing, vol 370. Springer, Cham. https://doi.org/10.1007/978-3-319-21206-7_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-21206-7_22

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-21205-0

  • Online ISBN: 978-3-319-21206-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics