Sensor-based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Survey

Mobile devices and technologies have become increasingly popular, offering comparable storage and computational capabilities to desktop computers allowing users to store and interact with sensitive and private information. The security and protection of such personal information are becoming more and more important since mobile devices are vulnerable to unauthorized access or theft. User authentication is a task of paramount importance that grants access to legitimate users at the point-of-entry and continuously through the usage session. This task is made possible with today's smartphones' embedded sensors that enable continuous and implicit user authentication by capturing behavioral biometrics and traits. In this paper, we survey more than 140 recent behavioral biometric-based approaches for continuous user authentication, including motion-based methods (27 studies), gait-based methods (23 studies), keystroke dynamics-based methods (20 studies), touch gesture-based methods (29 studies), voice-based methods (16 studies), and multimodal-based methods (33 studies). The survey provides an overview of the current state-of-the-art approaches for continuous user authentication using behavioral biometrics captured by smartphones' embedded sensors, including insights and open challenges for adoption, usability, and performance.

[1]  Yuan Feng,et al.  MotionHacker: Motion sensor based eavesdropping on handwriting via smartwatch , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[2]  Christoph Busch,et al.  Classifying accelerometer data via Hidden Markov Models to authenticate people by the way they walk , 2011, 2011 Carnahan Conference on Security Technology.

[3]  Steven Furnell,et al.  Advanced user authentication for mobile devices , 2007, Comput. Secur..

[4]  Mahbub Hassan,et al.  KEH-Gait: Using Kinetic Energy Harvesting for Gait-based User Authentication Systems , 2019, IEEE Transactions on Mobile Computing.

[5]  Margit Antal,et al.  Biometric Authentication Based on Touchscreen Swipe Patterns , 2016 .

[6]  Mikhail I. Gofman,et al.  Hidden Markov Models for feature-level fusion of biometrics on mobile devices , 2016, 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA).

[7]  Karan Singh,et al.  An Intelligent Scheme for Continuous Authentication of Smartphone Using Deep Auto Encoder and Softmax Regression Model Easy for User Brain , 2019, IEEE Access.

[8]  Jiang Zhu,et al.  KeySens: Passive User Authentication through Micro-behavior Modeling of Soft Keyboard Interaction , 2013, MobiCASE.

[9]  Jonathan Loo,et al.  Continuous authentication of smartphone users based on activity pattern recognition using passive mobile sensing , 2018, J. Netw. Comput. Appl..

[10]  Urs Hengartner,et al.  Itus: an implicit authentication framework for android , 2014, MobiCom.

[11]  Indrajit Bhattacharya,et al.  Offline Signature Verification Using Pixel Matching Technique , 2013 .

[12]  Ziming Zhao,et al.  Picture Gesture Authentication , 2015, ACM Trans. Inf. Syst. Secur..

[13]  Sanggil Kang,et al.  Code authorship identification using convolutional neural networks , 2019, Future Gener. Comput. Syst..

[14]  Hong Lin,et al.  TDSD: A Touch Dynamic and Sensor Data Based Approach for Continuous User Authentication , 2018, PACIS.

[15]  Ruby B. Lee,et al.  Implicit Smartphone User Authentication with Sensors and Contextual Machine Learning , 2017, 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).

[16]  Douglas A. Reynolds,et al.  An overview of automatic speaker recognition technology , 2002, 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[17]  Steven Furnell,et al.  Authentication of users on mobile telephones - A survey of attitudes and practices , 2005, Comput. Secur..

[18]  Mauro Conti,et al.  I Sensed It Was You: Authenticating Mobile Users with Sensor-Enhanced Keystroke Dynamics , 2014, DIMVA.

[19]  Dimitrios Koutsonikolas,et al.  ABC: Enabling Smartphone Authentication with Built-in Camera , 2018, NDSS.

[20]  Minglu Li,et al.  Lip Reading-Based User Authentication Through Acoustic Sensing on Smartphones , 2019, IEEE/ACM Transactions on Networking.

[21]  Aziz Mohaisen,et al.  Digitalseal: a Transaction Authentication Tool for Online and Offline Transactions , 2018, 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[22]  Xiaohong Guan,et al.  Performance Analysis of Motion-Sensor Behavior for User Authentication on Smartphones , 2016, Sensors.

[23]  Frankie Inguanez,et al.  Multi-Model authentication using keystroke dynamics for Smartphones , 2018, 2018 IEEE 8th International Conference on Consumer Electronics - Berlin (ICCE-Berlin).

[24]  Xiao Wang,et al.  SenSec: Mobile security through passive sensing , 2013, 2013 International Conference on Computing, Networking and Communications (ICNC).

[25]  Bin Guo,et al.  A continuous smartphone authentication method based on gait patterns and keystroke dynamics , 2018, J. Ambient Intell. Humaniz. Comput..

[26]  Vir V. Phoha,et al.  Music and images as contexts in a context-aware touch-based authentication system , 2015, 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS).

[27]  Michael R. Lyu,et al.  Towards Continuous and Passive Authentication via Touch Biometrics: An Experimental Study on Smartphones , 2014, SOUPS.

[28]  Mauro Conti,et al.  On the Effectiveness of Sensor-enhanced Keystroke Dynamics Against Statistical Attacks , 2016, CODASPY.

[29]  Jie Yang,et al.  Hearing Your Voice is Not Enough: An Articulatory Gesture Based Liveness Detection for Voice Authentication , 2017, CCS.

[30]  Gopal K. Gupta,et al.  Identity authentication based on keystroke latencies , 1990, Commun. ACM.

[31]  Sabah Jassim,et al.  Multimodal person authentication on a smartphone under realistic conditions , 2006, SPIE Defense + Commercial Sensing.

[32]  R. C. Johnson,et al.  Secure voice-based authentication for mobile devices: vaulted voice verification , 2012, Defense, Security, and Sensing.

[33]  Dimitrios Tzovaras,et al.  Gait Matching by Mapping Wearable to Camera Privacy-Preserving Recordings: Experimental Comparison of Multiple Settings , 2019, 2019 6th International Conference on Control, Decision and Information Technologies (CoDIT).

[34]  Thang Hoang,et al.  Gait identification using accelerometer on mobile phone , 2012, 2012 International Conference on Control, Automation and Information Sciences (ICCAIS).

[35]  Jun Zhong,et al.  Towards unsupervised physical activity recognition using smartphone accelerometers , 2016, Multimedia Tools and Applications.

[36]  Karen Renaud,et al.  Understanding user perceptions of transparent authentication on a mobile device , 2014, Journal of Trust Management.

[37]  Edward David Moreno,et al.  Keystroke-based biometric authentication in mobile devices , 2011, IEEE Latin America Transactions.

[38]  Fabian Monrose,et al.  Keystroke dynamics as a biometric for authentication , 2000, Future Gener. Comput. Syst..

[39]  Philip S. Yu,et al.  DeepAuth: A Framework for Continuous User Re-authentication in Mobile Apps , 2018, CIKM.

[40]  Jie Yang,et al.  VoiceLive: A Phoneme Localization based Liveness Detection for Voice Authentication on Smartphones , 2016, CCS.

[41]  Tao Feng,et al.  Investigating Mobile Device Picking-up motion as a novel biometric modality , 2013, 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[42]  Einar Snekkenes,et al.  Gait Recognition Using Wearable Motion Recording Sensors , 2009, EURASIP J. Adv. Signal Process..

[43]  Aboul Ella Hassanien,et al.  Biometric and Traditional Mobile Authentication Techniques: Overviews and Open Issues , 2014, Bio-inspiring Cyber Security and Cloud Services.

[44]  Kwang-Seok Hong,et al.  Multimodal biometric authentication using teeth image and voice in mobile environment , 2008, IEEE Transactions on Consumer Electronics.

[45]  Lynne Baillie,et al.  Data Driven Authentication: On the Effectiveness of User Behaviour Modelling with Mobile Device Sensors , 2014, ArXiv.

[46]  Nathan Clarke,et al.  Deployment of Keystroke Analysis on a Smartphone , 2008 .

[47]  Sungzoon Cho,et al.  Keystroke dynamics-based authentication for mobile devices , 2009, Comput. Secur..

[48]  Christoph Busch,et al.  Classification of Acceleration Data for Biometric Gait Recognition on Mobile Devices , 2011, BIOSIG.

[49]  Abdulmotaleb El-Saddik,et al.  User Identification Based on Handwritten Signatures with Haptic Information , 2008, EuroHaptics.

[50]  Jie Liu,et al.  SpeakerSense: Energy Efficient Unobtrusive Speaker Identification on Mobile Phones , 2011, Pervasive.

[51]  Sheikh Iqbal Ahamed,et al.  Seeing Beyond Visibility: A Four Way Fusion of User Authentication for Efficient Usable Security on Mobile Devices , 2014, 2014 IEEE Eighth International Conference on Software Security and Reliability-Companion.

[52]  Biplab Sikdar,et al.  Two-Factor Authentication for IoT With Location Information , 2019, IEEE Internet of Things Journal.

[53]  Sharath Pankanti,et al.  Biometrics: a tool for information security , 2006, IEEE Transactions on Information Forensics and Security.

[54]  Krzysztof Joachimiak,et al.  Model for adaptable context-based biometric authentication for mobile devices , 2016, Personal and Ubiquitous Computing.

[55]  I. V. McLoughlin,et al.  Keypress biometrics for user validation in mobile consumer devices , 2009, 2009 IEEE 13th International Symposium on Consumer Electronics.

[56]  M. Akila,et al.  Biometric personal authentication using keystroke dynamics: A review , 2011, Appl. Soft Comput..

[57]  Roozbeh Jafari,et al.  Orientation Independent Activity/Gesture Recognition Using Wearable Motion Sensors , 2019, IEEE Internet of Things Journal.

[58]  B. Atal Effectiveness of linear prediction characteristics of the speech wave for automatic speaker identification and verification. , 1974, The Journal of the Acoustical Society of America.

[59]  Kim Schaffer Expanding Continuous Authentication with Mobile Devices , 2015, Computer.

[60]  Nathan L. Clarke,et al.  The application of signature recognition to transparent handwriting verification for mobile devices , 2007, Inf. Manag. Comput. Secur..

[61]  Yingnan Sun,et al.  An Artificial Neural Network Framework for Gait-Based Biometrics , 2019, IEEE Journal of Biomedical and Health Informatics.

[62]  S.R. Mahadeva Prasanna,et al.  Multimodal biometric person authentication system using speech and signature features , 2008, TENCON 2008 - 2008 IEEE Region 10 Conference.

[63]  Dijiang Huang,et al.  Multifactor User Authentication with In-Air-Handwriting and Hand Geometry , 2018, 2018 International Conference on Biometrics (ICB).

[64]  Qing Yang,et al.  HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users , 2015, IEEE Transactions on Information Forensics and Security.

[65]  Yan Chen,et al.  RiskCog: Unobtrusive Real-Time User Authentication on Mobile Devices in the Wild , 2020, IEEE Transactions on Mobile Computing.

[66]  Davide Carneiro,et al.  Continuous Authentication in Mobile Devices Using Behavioral Biometrics , 2019, ISAmI.

[67]  Vivek Kanhangad,et al.  Exploring orientation and accelerometer sensor data for personal authentication in smartphones using touchscreen gestures , 2015, Pattern Recognit. Lett..

[68]  Jiankun Hu,et al.  Continuous Authentication Using Eye Movement Response of Implicit Visual Stimuli , 2018, Proc. ACM Interact. Mob. Wearable Ubiquitous Technol..

[69]  Mikhail I. Gofman,et al.  Multimodal biometrics for enhanced mobile device security , 2016, Commun. ACM.

[70]  Bo Yu,et al.  Convolutional Neural Networks for human activity recognition using mobile sensors , 2014, 6th International Conference on Mobile Computing, Applications and Services.

[71]  Susmita Sur-Kolay,et al.  CABA: Continuous Authentication Based on BioAura , 2017, IEEE Transactions on Computers.

[72]  Heikki Ailisto,et al.  Identifying users of portable devices from gait pattern with accelerometers , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..

[73]  Alireza Sahami Shirazi,et al.  Assessing the vulnerability of magnetic gestural authentication to video-based shoulder surfing attacks , 2012, CHI.

[74]  Heinrich Hußmann,et al.  Touch me once and i know it's you!: implicit authentication based on touch screen patterns , 2012, CHI.

[75]  Bruno Crispo,et al.  DIALERAUTH: A Motion-assisted Touch-based Smartphone User Authentication Scheme , 2018, CODASPY.

[76]  Gonzalo Bailador,et al.  A Real-Time In-Air Signature Biometric Technique Using a Mobile Device Embedding an Accelerometer , 2010, NDT.

[77]  Kiran B. Raja,et al.  Fusion of face and periocular information for improved authentication on smartphones , 2015, 2015 18th International Conference on Information Fusion (Fusion).

[78]  Burak Kantarci,et al.  Gesture and Sociability-based Continuous Authentication on Smart Mobile Devices , 2018, MobiWac.

[79]  Bojan Cukic,et al.  Touch gesture-based authentication on mobile devices: The effects of user posture, device size, configuration, and inter-session variability , 2019, J. Syst. Softw..

[80]  Yufei Chen,et al.  Performance Analysis of Multi-Motion Sensor Behavior for Active Smartphone Authentication , 2018, IEEE Transactions on Information Forensics and Security.

[81]  Samad Ahmadi,et al.  Securing smartphones via typing heat maps , 2016, 2016 IEEE 6th International Conference on Consumer Electronics - Berlin (ICCE-Berlin).

[82]  Shan Chang,et al.  ShakeIn: Secure User Authentication of Smartphones with Single-Handed Shakes , 2017, IEEE Transactions on Mobile Computing.

[83]  Ozlem Durmaz Incel,et al.  Towards Continuous Authentication on Mobile Phones using Deep Learning Models , 2019, Procedia Computer Science.

[84]  Charles C. Tappert,et al.  A Behavioral Biometrics User Authentication Study Using Motion Data from Android Smartphones , 2016, 2016 European Intelligence and Security Informatics Conference (EISIC).

[85]  Kiran B. Raja,et al.  Feature level fused templates for multi-biometric system on smartphones , 2017, 2017 5th International Workshop on Biometrics and Forensics (IWBF).

[86]  Rytis Maskeliunas,et al.  Smartphone User Identity Verification Using Gait Characteristics , 2016, Symmetry.

[87]  Arun Ross,et al.  An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.

[88]  Haizhou Li,et al.  An overview of text-independent speaker recognition: From features to supervectors , 2010, Speech Commun..

[89]  Tempestt J. Neal,et al.  Surveying Biometric Authentication for Mobile Device Security , 2016 .

[90]  Satyajit Das,et al.  Medical diagnosis with the aid of using fuzzy logic and intuitionistic fuzzy logic , 2016, Applied Intelligence.

[91]  Tao Feng,et al.  TIPS: context-aware implicit user identification using touch screen in uncontrolled environments , 2014, HotMobile.

[92]  Soumik Mondal,et al.  Continuous authentication and identification for mobile devices: Combining security and forensics , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).

[93]  Zhen Yu,et al.  Usable Authentication Mechanisms for Mobile Devices: An Exploration of 3D Graphical Passwords , 2016, 2016 International Conference on Platform Technology and Service (PlatCon).

[94]  Lina Yao,et al.  Inferring User Profile Attributes From Multidimensional Mobile Phone Sensory Data , 2019, IEEE Internet of Things Journal.

[95]  Soumik Mondal,et al.  Swipe gesture based Continuous Authentication for mobile devices , 2015, 2015 International Conference on Biometrics (ICB).

[96]  William Melicher,et al.  Passive user identification using sequential analysis of proximity information in touchscreen usage patterns , 2015, 2015 Eighth International Conference on Mobile Computing and Ubiquitous Networking (ICMU).

[97]  Adam J. Aviv,et al.  Smudge Attacks on Smartphone Touch Screens , 2010, WOOT.

[98]  Georgios Kambourakis,et al.  Introducing touchstroke: keystroke-based authentication system for smartphones , 2016, Secur. Commun. Networks.

[99]  Maria Papadaki,et al.  Active authentication for mobile devices utilising behaviour profiling , 2014, International Journal of Information Security.

[100]  Patrick Bours,et al.  Studying WiFi and Accelerometer Data Based Authentication Method on Mobile Phones , 2018, ICBEA '18.

[101]  Tim Storer,et al.  A framework for continuous, transparent mobile device authentication , 2013, Comput. Secur..

[102]  H. Saevanee,et al.  User Authentication Using Combination of Behavioral Biometrics over the Touchpad Acting Like Touch Screen of Mobile Device , 2008, 2008 International Conference on Computer and Electrical Engineering.

[103]  Yiran Chen,et al.  SlowMo - enhancing mobile gesture-based authentication schemes via sampling rate optimization , 2016, 2016 21st Asia and South Pacific Design Automation Conference (ASP-DAC).

[104]  Muddassar Farooq,et al.  Keystroke-Based User Identification on Smart Phones , 2009, RAID.

[105]  Chris Bevan,et al.  Different strokes for different folks? Revealing the physical characteristics of smartphone users from their swipe gestures , 2016, Int. J. Hum. Comput. Stud..

[106]  Xinwen Fu,et al.  CIM: Camera in Motion for Smartphone Authentication , 2019, IEEE Transactions on Information Forensics and Security.

[107]  Ruili Wang,et al.  Speaker identification features extraction methods: A systematic review , 2017, Expert Syst. Appl..

[108]  Yuan Feng,et al.  Waving Authentication: Your Smartphone Authenticate You on Motion Gesture , 2015, CHI Extended Abstracts.

[109]  Julian Fiérrez,et al.  Towards mobile authentication using dynamic signature verification: Useful features and performance evaluation , 2008, 2008 19th International Conference on Pattern Recognition.

[110]  Dae Jung Kim,et al.  A Multisensor Mobile Interface for Industrial Environment and Healthcare Monitoring , 2017, IEEE Transactions on Industrial Electronics.

[111]  Tempestt J. Neal,et al.  Mobile device application, Bluetooth, and Wi-Fi usage data as behavioral biometric traits , 2015, 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS).

[112]  Zulfiqar Ali Memon,et al.  Biometric authentication technique using smartphone sensor , 2016, 2016 13th International Bhurban Conference on Applied Sciences and Technology (IBCAST).

[113]  Aziz Mohaisen,et al.  Large-Scale and Language-Oblivious Code Authorship Identification , 2018, CCS.

[114]  Aziz Mohaisen,et al.  Two-Thumbs-Up: Physical protection for PIN entry secure against recording attacks , 2018, Comput. Secur..

[115]  Urs Hengartner,et al.  Towards application-centric implicit authentication on smartphones , 2014, HotMobile.

[116]  Heikki Ailisto,et al.  Unobtrusive Multimodal Biometrics for Ensuring Privacy and Information Security with Personal Devices , 2006, Pervasive.

[117]  Antti Oulasvirta,et al.  Free-Form Gesture Authentication in the Wild , 2016, CHI.

[118]  Andrew Beng Jin Teoh,et al.  A Survey of Keystroke Dynamics Biometrics , 2013, TheScientificWorldJournal.

[119]  Gianni Fenu,et al.  Controlling User Access to Cloud-Connected Mobile Applications by Means of Biometrics , 2018, IEEE Cloud Computing.

[120]  Julian Fiérrez,et al.  MultiLock: Mobile Active Authentication based on Multiple Biometric and Behavioral Patterns , 2019, Advanced Sciences and Technologies for Security Applications.

[121]  Delphine Reinhardt,et al.  Pick Me Up and I Will Tell You Who You Are: Analyzing Pick-Up Motions to Authenticate Users , 2018, 2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).

[122]  Dimitrios Tzovaras,et al.  Activity and Event Related Biometrics , 2012 .

[123]  Zheng Yan,et al.  A Usable Authentication System Based on Personal Voice Challenge , 2016, 2016 International Conference on Advanced Cloud and Big Data (CBD).

[124]  Abdulmotaleb El-Saddik,et al.  ECG Authentication for Mobile Devices , 2016, IEEE Transactions on Instrumentation and Measurement.

[125]  Fan Ye,et al.  Multi-Modal Face Authentication using Deep Visual and Acoustic Features , 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).

[126]  Li Yang,et al.  MineAuth: Mining Behavioural Habits for Continuous Authentication on a Smartphone , 2019, ACISP.

[127]  Soumik Mondal,et al.  Person Identification by Keystroke Dynamics Using Pairwise User Coupling , 2017, IEEE Transactions on Information Forensics and Security.

[128]  Jain-Shing Wu,et al.  Smartphone continuous authentication based on keystroke and gesture profiling , 2015, 2015 International Carnahan Conference on Security Technology (ICCST).

[129]  Florian Alt,et al.  GazeTouchPass: Multimodal Authentication Using Gaze and Touch on Mobile Devices , 2016, CHI Extended Abstracts.

[130]  Judith Liu-Jimenez,et al.  Gait recognition using smartphone , 2016, 2016 IEEE International Carnahan Conference on Security Technology (ICCST).

[131]  Abeer Alsadoon,et al.  Designing Touch-Based Hybrid Authentication Method for Smartphones , 2015 .

[132]  Lynne Baillie,et al.  Sensor use and usefulness: Trade-offs for data-driven authentication on mobile devices , 2015, 2015 IEEE International Conference on Pervasive Computing and Communications (PerCom).

[133]  Deron Liang,et al.  A New Non-Intrusive Authentication Method Based on the Orientation Sensor for Smartphone Users , 2012, 2012 IEEE Sixth International Conference on Software Security and Reliability.

[134]  Maurizio Rebaudengo,et al.  On gait recognition with smartphone accelerometer , 2015, 2015 4th Mediterranean Conference on Embedded Computing (MECO).

[135]  Hao Chen,et al.  TouchLogger: Inferring Keystrokes on Touch Screen from Smartphone Motion , 2011, HotSec.

[136]  Feng Hong,et al.  MGRA: Motion Gesture Recognition via Accelerometer , 2016, Sensors.

[137]  Kiran B. Raja,et al.  Multi-modal authentication system for smartphones using face, iris and periocular , 2015, 2015 International Conference on Biometrics (ICB).

[138]  Gang Qian,et al.  People Identification Using Gait Via Floor Pressure Sensing and Analysis , 2008, EuroSSC.

[139]  Ryuya Uda,et al.  Personal Identification by Flick Input Using Self-Organizing Maps with Acceleration Sensor and Gyroscope , 2016, IMCOM.

[140]  Tieniu Tan,et al.  Fusion of static and dynamic body biometrics for gait recognition , 2004, IEEE Trans. Circuits Syst. Video Technol..

[141]  Gang Zhou,et al.  Using Data Augmentation in Continuous Authentication on Smartphones , 2019, IEEE Internet of Things Journal.

[142]  Yong Man Ro,et al.  Multimodal Face Biometrics by Using Convolutional Neural Networks , 2017 .

[143]  Ying Wah Teh,et al.  Deep learning algorithms for human activity recognition using mobile and wearable sensor networks: State of the art and research challenges , 2018, Expert Syst. Appl..

[144]  Guest Richard,et al.  Interaction evaluation of a mobile voice authentication system , 2016 .

[145]  Thuc Dinh Nguyen,et al.  Adaptive Cross-Device Gait Recognition Using a Mobile Accelerometer , 2013, J. Inf. Process. Syst..

[146]  Richard M. Guest,et al.  Predicting sex as a soft-biometrics from device interaction swipe gestures , 2016, Pattern Recognit. Lett..

[147]  Wenyao Xu,et al.  EyeVeri: A secure and usable approach for smartphone user authentication , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.

[148]  Ruby B. Lee,et al.  Multi-sensor authentication to improve smartphone security , 2015, 2015 International Conference on Information Systems Security and Privacy (ICISSP).

[149]  Aziz Mohaisen,et al.  Keylogging-Resistant Visual Authentication Protocols , 2014, IEEE Transactions on Mobile Computing.

[150]  René Mayrhofer,et al.  An Analysis of Different Approaches to Gait Recognition Using Cell Phone Based Accelerometers , 2013, MoMM '13.

[151]  Yu Guan,et al.  Mobile Based Continuous Authentication Using Deep Features , 2018, EMDL@MobiSys.

[152]  Li Lu,et al.  Safeguard: User Reauthentication on Smartphones via Behavioral Biometrics , 2015, IEEE Transactions on Computational Social Systems.

[153]  Zhide Chen,et al.  An Implicit Identity Authentication System Considering Changes of Gesture Based on Keystroke Behaviors , 2015, Int. J. Distributed Sens. Networks.

[154]  Siome Goldenstein,et al.  User-Centric Coordinates for Applications Leveraging 3-Axis Accelerometer Data , 2017, IEEE Sensors Journal.

[155]  Christoph Busch,et al.  Authentication of Smartphone Users Based on the Way They Walk Using k-NN Algorithm , 2012, 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[156]  Xiangyang Luo,et al.  VoicePop: A Pop Noise based Anti-spoofing System for Voice Authentication on Smartphones , 2019, IEEE INFOCOM 2019 - IEEE Conference on Computer Communications.

[157]  Maurizio Talamo,et al.  Movement based biometric authentication with smartphones , 2015, 2015 International Carnahan Conference on Security Technology (ICCST).

[158]  Christoph Busch,et al.  Unobtrusive User-Authentication on Mobile Phones Using Biometric Gait Recognition , 2010, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[159]  Vinny Cahill,et al.  A framework for developing mobile, context-aware applications , 2004, Second IEEE Annual Conference on Pervasive Computing and Communications, 2004. Proceedings of the.

[160]  Ming-Hung Shih,et al.  A flick biometric authentication mechanism on mobile devices , 2015, 2015 International Conference on Informative and Cybernetics for Computational Social Systems (ICCSS).

[161]  Steven Furnell,et al.  Continuous and transparent multimodal authentication: reviewing the state of the art , 2015, Cluster Computing.

[162]  Steven Furnell,et al.  Continuous user authentication using multi-modal biometrics , 2015, Comput. Secur..

[163]  Jong Hyuk Park,et al.  Design and Implementation of Improved Authentication System for Android Smartphone Users , 2012, 2012 26th International Conference on Advanced Information Networking and Applications Workshops.

[164]  Tanapat Anusas-Amornkul Strengthening Password Authentication using Keystroke Dynamics and Smartphone Sensors , 2019, ICICM 2019.

[165]  Jugal K. Kalita,et al.  Authentication of Smartphone Users Using Behavioral Biometrics , 2016, IEEE Communications Surveys & Tutorials.

[166]  Thuc Dinh Nguyen,et al.  Gait authentication on mobile phone using biometric cryptosystem and fuzzy commitment scheme , 2015, International Journal of Information Security.

[167]  T. Santhanam,et al.  Keystroke dynamics for biometric authentication — A survey , 2013, 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering.

[168]  Douglas A. Reynolds,et al.  Speaker Verification Using Adapted Gaussian Mixture Models , 2000, Digit. Signal Process..

[169]  Christoph Busch,et al.  Scenario test of accelerometer-based biometric gait recognition , 2011, 2011 Third International Workshop on Security and Communication Networks (IWSCN).

[170]  Xiaohong Guan,et al.  Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication , 2016, IEEE Transactions on Information Forensics and Security.

[171]  Richard E. Ladner,et al.  PassChords: secure multi-touch authentication for blind people , 2012, ASSETS '12.

[172]  Yong Qi,et al.  Towards a User-Friendly and Secure Hand Shaking Authentication for Smartphones , 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).

[173]  Steven Furnell,et al.  Beyond the PIN: Enhancing user authentication for mobile devices , 2008 .

[174]  Gonzalo Bailador,et al.  Speed-Independent Gait Identification for Mobile Devices , 2012, Int. J. Pattern Recognit. Artif. Intell..