A perspective analysis of handwritten signature technology

M Diaz, MA Ferrer, D Impedovo, MI Malik… - Acm Computing …, 2019 - dl.acm.org
Handwritten signatures are biometric traits at the center of debate in the scientific
community. Over the last 40 years, the interest in signature studies has grown steadily …

Authentication of smartphone users using behavioral biometrics

A Alzubaidi, J Kalita - IEEE Communications Surveys & …, 2016 - ieeexplore.ieee.org
Smartphones and tablets have become ubiquitous in our daily lives. Smartphones, in
particular, have become more than personal assistants. These devices have provided new …

HMOG: New behavioral biometric features for continuous authentication of smartphone users

Z Sitová, J Šeděnka, Q Yang, G Peng… - IEEE Transactions …, 2015 - ieeexplore.ieee.org
We introduce hand movement, orientation, and grasp (HMOG), a set of behavioral features
to continuously authenticate smartphone users. HMOG features unobtrusively capture subtle …

[HTML][HTML] Deep learning approaches for continuous authentication based on activity patterns using mobile sensing

S Mekruksavanich, A Jitpattanakul - Sensors, 2021 - mdpi.com
Smartphones as ubiquitous gadgets are rapidly becoming more intelligent and context-
aware as sensing, networking, and processing capabilities advance. These devices provide …

Behavioral biometrics & continuous user authentication on mobile devices: A survey

I Stylios, S Kokolakis, O Thanou, S Chatzis - Information Fusion, 2021 - Elsevier
This paper offers an up-to-date, comprehensive, extensive and targeted survey on
Behavioral Biometrics and Continuous Authentication technologies for mobile devices. Our …

Performance analysis of multi-motion sensor behavior for active smartphone authentication

C Shen, Y Li, Y Chen, X Guan… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
The increasing use of smartphones as personal computing platforms to access personal
information has stressed the demand for secure and usable authentication techniques, and …

Silentsense: silent user identification via touch and movement behavioral biometrics

C Bo, L Zhang, XY Li, Q Huang, Y Wang - Proceedings of the 19th …, 2013 - dl.acm.org
In this work, we present SilentSense, a framework to authenticate users silently and
transparently by exploiting the user touch behavior biometrics and leveraging the integrated …

User authentication on mobile devices: Approaches, threats and trends

C Wang, Y Wang, Y Chen, H Liu, J Liu - Computer Networks, 2020 - Elsevier
Mobile devices have brought a great convenience to us these years, which allow the users
to enjoy the anytime and anywhere various applications such as the online shopping …

Towards continuous and passive authentication via touch biometrics: An experimental study on smartphones

H Xu, Y Zhou, MR Lyu - 10th Symposium On Usable Privacy and …, 2014 - usenix.org
Current smartphones generally cannot continuously authenticate users during runtime. This
poses severe security and privacy threats: A malicious user can manipulate the phone if …

Secure unlocking of mobile touch screen devices by simple gestures: You can see it but you can not do it

M Shahzad, AX Liu, A Samuel - Proceedings of the 19th annual …, 2013 - dl.acm.org
With the rich functionalities and enhanced computing capabilities available on mobile
computing devices with touch screens, users not only store sensitive information (such as …