Fingerprint Recognition on Mobile Devices: Widely Deployed, Rarely Understood

Only a few studies have addressed the users' conception of how fingerprint recognition used for different purposes on mobile devices works. This study contributes by investigating how different groups of individuals think that the fingerprint recognition works, why they think so, and also by pointing out differences in pin code and fingerprint issues. The study furthermore yields some results concerning individuals' attitudes towards how sensitive the use of fingerprint sensors is: non-users tended to be more afraid of third-party access than users. On the other hand, users tended to regard the fingerprint pattern as more sensitive than non-users. This study also manages to give some methodological contributions, namely that mockup user interfaces do not bias the parameters studied in this paper (e.g. understanding of access to fingerprint data), and that self-estimation of knowledge in Computer Security is not a good indicator of respondents' understanding of fingerprint security and privacy. Moreover, people who connected a low degree of sensitivity to fingerprint patterns gave very different reasons for their estimation of sensitivity. This prompts for more research, as it is unclear if different groups would benefit from different information and modes of visualisation to understand what are the issues involved in fingerprint recognition on mobile devices.

[1]  Christoph Busch,et al.  Social acceptance of biometric technologies in Germany: A survey , 2013, 2013 International Conference of the BIOSIG Special Interest Group (BIOSIG).

[2]  Verena Zimmermann,et al.  "If It Wasn't Secure, They Would Not Use It in the Movies" - Security Perceptions and User Acceptance of Authentication Technologies , 2017, HCI.

[3]  M. García-Pérez,et al.  Cellwise Residual Analysis in Two-Way Contingency Tables , 2003 .

[4]  Emmanuel Bello-Ogunu,et al.  Investigating User Comprehension and Risk Perception of Apple's Touch ID Technology , 2017, ARES.

[5]  Blase Ur,et al.  Biometric authentication on iPhone and Android: Usability, perceptions, and influences on adoption , 2015 .

[6]  Serge Egelman,et al.  The Anatomy of Smartphone Unlocking: A Field Study of Android Lock Screens , 2016, CHI.

[7]  E. Higgs Fingerprints and Citizenship: The British State and the Identification of Pensioners in the Interwar Period , 2010, History workshop journal : HWJ.

[8]  M. Angela Sasse,et al.  Obstacles to the Adoption of Secure Communication Tools , 2017, 2017 IEEE Symposium on Security and Privacy (SP).

[9]  Serge Egelman,et al.  Keep on Lockin' in the Free World: A Multi-National Comparison of Smartphone Locking , 2016, CHI.

[10]  Lorie M. Liebrock,et al.  Using Fingerprint Authentication to Reduce System Security: An Empirical Study , 2011, 2011 IEEE Symposium on Security and Privacy.

[11]  Richard Green,et al.  Fingerprint asymmetry in male and female transsexuals , 2000 .

[12]  D. Kimura,et al.  DERMATOGLYPHIC ASYMMETRY : RELATION TO SEX, HANDEDNESS AND COGNITIVE PATTERN , 1995 .

[13]  Heinrich Hußmann,et al.  I Feel Like I'm Taking Selfies All Day!: Towards Understanding Biometric Authentication on Smartphones , 2015, CHI.

[14]  J. Halámek,et al.  Forensic Identification of Gender from Fingerprints. , 2015, Analytical chemistry.

[15]  Bernd Zwattendorfer,et al.  CREDENTIAL: A Framework for Privacy-Preserving Cloud-Based Data Sharing , 2016, 2016 11th International Conference on Availability, Reliability and Security (ARES).

[16]  Els Kindt The Use of Privacy Enhancing Technologies for Biometric Systems Analysed from a Legal Perspective , 2009, PrimeLife.

[17]  John Sören Pettersson,et al.  User Evaluations of an App Interface for Cloud-Based Identity Management , 2018 .

[18]  Konstantin Beznosov,et al.  On the Impact of Touch ID on iPhone Passcodes , 2015, SOUPS.

[19]  Els Kindt Biometric Data, Data Protection and the Right to Privacy , 2013 .

[20]  T. Mark Beasley,et al.  Multiple Regression Approach to Analyzing Contingency Tables: Post Hoc and Planned Comparison Procedures. , 1995 .

[21]  吉田 則裕,et al.  Android Open Source Projectを対象としたパッチレビュー活動の調査 , 2012 .

[22]  Andreas Pfitzmann Biometrics - How to Put to Use and How Not at All? , 2008, TrustBus.

[23]  Walid Maalej,et al.  A survey about user requirements for biometric authentication on smartphones , 2015, 2015 IEEE 2nd Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE).