A perspective analysis of handwritten signature technology
Handwritten signatures are biometric traits at the center of debate in the scientific
community. Over the last 40 years, the interest in signature studies has grown steadily …
community. Over the last 40 years, the interest in signature studies has grown steadily …
Authentication of smartphone users using behavioral biometrics
A Alzubaidi, J Kalita - IEEE Communications Surveys & …, 2016 - ieeexplore.ieee.org
Smartphones and tablets have become ubiquitous in our daily lives. Smartphones, in
particular, have become more than personal assistants. These devices have provided new …
particular, have become more than personal assistants. These devices have provided new …
HMOG: New behavioral biometric features for continuous authentication of smartphone users
We introduce hand movement, orientation, and grasp (HMOG), a set of behavioral features
to continuously authenticate smartphone users. HMOG features unobtrusively capture subtle …
to continuously authenticate smartphone users. HMOG features unobtrusively capture subtle …
[HTML][HTML] Deep learning approaches for continuous authentication based on activity patterns using mobile sensing
S Mekruksavanich, A Jitpattanakul - Sensors, 2021 - mdpi.com
Smartphones as ubiquitous gadgets are rapidly becoming more intelligent and context-
aware as sensing, networking, and processing capabilities advance. These devices provide …
aware as sensing, networking, and processing capabilities advance. These devices provide …
Behavioral biometrics & continuous user authentication on mobile devices: A survey
This paper offers an up-to-date, comprehensive, extensive and targeted survey on
Behavioral Biometrics and Continuous Authentication technologies for mobile devices. Our …
Behavioral Biometrics and Continuous Authentication technologies for mobile devices. Our …
Performance analysis of multi-motion sensor behavior for active smartphone authentication
The increasing use of smartphones as personal computing platforms to access personal
information has stressed the demand for secure and usable authentication techniques, and …
information has stressed the demand for secure and usable authentication techniques, and …
Silentsense: silent user identification via touch and movement behavioral biometrics
In this work, we present SilentSense, a framework to authenticate users silently and
transparently by exploiting the user touch behavior biometrics and leveraging the integrated …
transparently by exploiting the user touch behavior biometrics and leveraging the integrated …
User authentication on mobile devices: Approaches, threats and trends
Mobile devices have brought a great convenience to us these years, which allow the users
to enjoy the anytime and anywhere various applications such as the online shopping …
to enjoy the anytime and anywhere various applications such as the online shopping …
Towards continuous and passive authentication via touch biometrics: An experimental study on smartphones
Current smartphones generally cannot continuously authenticate users during runtime. This
poses severe security and privacy threats: A malicious user can manipulate the phone if …
poses severe security and privacy threats: A malicious user can manipulate the phone if …
Secure unlocking of mobile touch screen devices by simple gestures: You can see it but you can not do it
With the rich functionalities and enhanced computing capabilities available on mobile
computing devices with touch screens, users not only store sensitive information (such as …
computing devices with touch screens, users not only store sensitive information (such as …