Surveying the Development of Biometric User Authentication on Mobile Phones

Designing reliable user authentication on mobile phones is becoming an increasingly important task to protect users' private information and data. Since biometric approaches can provide many advantages over the traditional authentication methods, they have become a significant topic for both academia and industry. The major goal of biometric user authentication is to authenticate legitimate users and identify impostors based on physiological and behavioral characteristics. In this paper, we survey the development of existing biometric authentication techniques on mobile phones, particularly on touch-enabled devices, with reference to 11 biometric approaches (five physiological and six behavioral). We present a taxonomy of existing efforts regarding biometric authentication on mobile phones and analyze their feasibility of deployment on touch-enabled mobile phones. In addition, we systematically characterize a generic biometric authentication system with eight potential attack points and survey practical attacks and potential countermeasures on mobile phones. Moreover, we propose a framework for establishing a reliable authentication mechanism through implementing a multimodal biometric user authentication in an appropriate way. Experimental results are presented to validate this framework using touch dynamics, and the results show that multimodal biometrics can be deployed on touch-enabled phones to significantly reduce the false rates of a single biometric system. Finally, we identify challenges and open problems in this area and suggest that touch dynamics will become a mainstream aspect in designing future user authentication on mobile phones.

[1]  Robert H. Deng,et al.  Understanding OSN-based facial disclosure against face authentication systems , 2014, AsiaCCS.

[2]  Jifeng Dai,et al.  Multifeature-Based High-Resolution Palmprint Recognition , 2011, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[3]  Endra,et al.  Online Signature Verification on Mobile Devices , 2015 .

[4]  A. Ant Ozok,et al.  A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords , 2006, SOUPS '06.

[5]  Kang Ryoung Park,et al.  A Study on Iris Localization and Recognition on Mobile Phones , 2008, EURASIP J. Adv. Signal Process..

[6]  Chuan Qin,et al.  Progressive Authentication: Deciding When to Authenticate on Mobile Phones , 2012, USENIX Security Symposium.

[7]  Alex X. Liu,et al.  Secure unlocking of mobile touch screen devices by simple gestures: you can see it but you can not do it , 2013, MobiCom.

[8]  Albrecht Schmidt,et al.  SmudgeSafe: geometric image transformations for smudge-resistant user authentication , 2014, UbiComp.

[9]  Tsuyoshi Isshiki,et al.  Narrow Fingerprint Sensor Verification with Template Updating Technique , 2012, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[10]  J. Wixted The psychology and neuroscience of forgetting. , 2004, Annual review of psychology.

[11]  Robert H. Deng,et al.  A Generic Framework for Three-Factor Authentication: Preserving Security and Privacy in Distributed Systems , 2011, IEEE Transactions on Parallel and Distributed Systems.

[12]  Alan S. Brown,et al.  Generating and remembering passwords , 2004 .

[13]  Kwang-Seok Hong,et al.  Teeth recognition based on multiple attempts in mobile device , 2010, J. Netw. Comput. Appl..

[14]  Nathan Clarke,et al.  Deployment of Keystroke Analysis on a Smartphone , 2008 .

[15]  Gonzalo Bailador,et al.  Speed-Independent Gait Identification for Mobile Devices , 2012, Int. J. Pattern Recognit. Artif. Intell..

[16]  Sungzoon Cho,et al.  Keystroke dynamics-based authentication for mobile devices , 2009, Comput. Secur..

[17]  Duncan S. Wong,et al.  The effect of adaptive mechanism on behavioural biometric based mobile phone authentication , 2014, Inf. Manag. Comput. Secur..

[18]  Prasant Mohapatra,et al.  Sensor-assisted facial recognition: an enhanced biometric authentication system for smartphones , 2014, MobiSys.

[19]  Aaron Adler,et al.  Can images be regenerated from biometric templates , 2003 .

[20]  F. Roli,et al.  Security evaluation of biometric authentication systems under real spoofing attacks , 2012, IET Biom..

[21]  Steven Furnell,et al.  Advanced user authentication for mobile devices , 2007, Comput. Secur..

[22]  George Lawton Is It Finally Time to Worry about Mobile Malware? , 2008, Computer.

[23]  Alessandro Neri,et al.  Keystroke dynamics authentication for mobile phones , 2011, SAC.

[24]  René Mayrhofer,et al.  Towards pan shot face unlock: Using biometric face information from different perspectives to unlock mobile devices , 2013, Int. J. Pervasive Comput. Commun..

[25]  Dawn Xiaodong Song,et al.  Timing Analysis of Keystrokes and Timing Attacks on SSH , 2001, USENIX Security Symposium.

[26]  Sven G. Kratz,et al.  AirAuth: a biometric authentication system using in-air hand gestures , 2014, CHI Extended Abstracts.

[27]  Emiliano Miluzzo,et al.  A survey of mobile phone sensing , 2010, IEEE Communications Magazine.

[28]  Nathan Clarke,et al.  Behaviour profiling for transparent authentication for mobile devices , 2011, ECIW 2011 2011.

[29]  Xuan Huang,et al.  Development of a Typing Behaviour Recognition Mechanism on Android , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[30]  Georgios Kambourakis,et al.  Exposing mobile malware from the inside (or what is your mobile app really doing?) , 2014, Peer-to-Peer Netw. Appl..

[31]  Maria Papadaki,et al.  Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers , 2012, Secur. Commun. Networks.

[32]  Cevat Ikibas,et al.  A personal identification system using retinal vasculature in retinal fundus images , 2011, Expert Syst. Appl..

[33]  Lee Luan Ling,et al.  Biometric Access Control Through Numerical Keyboards Based on Keystroke Dynamics , 2006, ICB.

[34]  Natalia A. Schmid,et al.  Performance analysis of iris-based identification system at the matching score level , 2006, IEEE Trans. Inf. Forensics Secur..

[35]  Kwang-Seok Hong,et al.  Multimodal biometric authentication using teeth image and voice in mobile environment , 2008, IEEE Transactions on Consumer Electronics.

[36]  Shari Trewin,et al.  Biometric authentication on a mobile device: a study of user effort, error and task disruption , 2012, ACSAC '12.

[37]  Duncan S. Wong,et al.  Touch Gestures Based Biometric Authentication Scheme for Touchscreen Mobile Phones , 2012, Inscrypt.

[38]  Lin Sun,et al.  Eyeblink-based Anti-Spoofing in Face Recognition from a Generic Webcamera , 2007, 2007 IEEE 11th International Conference on Computer Vision.

[39]  Shumin Zhai,et al.  Smart phone use by non-mobile business users , 2011, Mobile HCI.

[40]  Hao Chen,et al.  TouchLogger: Inferring Keystrokes on Touch Screen from Smartphone Motion , 2011, HotSec.

[41]  Lei Chen,et al.  Preventing Cell Phone Intrusion and Theft using Biometrics , 2013, 2013 IEEE Security and Privacy Workshops.

[42]  Reihaneh Safavi-Naini,et al.  Cancelable Key-Based Fingerprint Templates , 2005, ACISP.

[43]  René Mayrhofer,et al.  An Analysis of Different Approaches to Gait Recognition Using Cell Phone Based Accelerometers , 2013, MoMM '13.

[44]  Christoph Busch,et al.  Using Hidden Markov Models for accelerometer-based biometric gait recognition , 2011, 2011 IEEE 7th International Colloquium on Signal Processing and its Applications.

[45]  Sharath Pankanti,et al.  BIOMETRIC IDENTIFICATION , 2000 .

[46]  Lin Sun,et al.  Monocular camera-based face liveness detection by combining eyeblink and scene context , 2011, Telecommun. Syst..

[47]  Miao Wang,et al.  Mobile Authentication through Touch-Behavior Features , 2013, CCBR.

[48]  Jun Han,et al.  ACCessory: password inference using accelerometers on smartphones , 2012, HotMobile '12.

[49]  G. Padmavathi,et al.  Next generation biometric security system: an approach for mobile device security , 2012, CCSEIT '12.

[50]  Georgios Kambourakis,et al.  A cloud-based architecture to crowdsource mobile app privacy leaks , 2014, Panhellenic Conference on Informatics.

[51]  Heather Crawford Keystroke dynamics: Characteristics and opportunities , 2010, 2010 Eighth International Conference on Privacy, Security and Trust.

[52]  XiaoFeng Wang,et al.  Upgrading Your Android, Elevating My Malware: Privilege Escalation through Mobile OS Updating , 2014, 2014 IEEE Symposium on Security and Privacy.

[53]  DAVID ZHANG,et al.  A Comparative Study of Palmprint Recognition Algorithms , 2012, CSUR.

[54]  Haining Wang,et al.  An efficient user verification system via mouse movements , 2011, CCS '11.

[55]  Neng Gao,et al.  Remotely wiping sensitive data on stolen smartphones , 2014, AsiaCCS.

[56]  Guoliang Xue,et al.  Unobservable Re-authentication for Smartphones , 2013, NDSS.

[57]  Muhammad Ali Akbar,et al.  Secure biometric template generation for multi-factor authentication , 2015, Pattern Recognit..

[58]  Mohammad Omar Derawi Biometric options for mobile phone authentication , 2011 .

[59]  Michel Barbeau,et al.  Anomaly-based intrusion detection using mobility profiles of public transportation users , 2005, WiMob'2005), IEEE International Conference on Wireless And Mobile Computing, Networking And Communications, 2005..

[60]  Jun Yang,et al.  SenGuard: Passive user identification on smartphones using multiple sensors , 2011, 2011 IEEE 7th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[61]  Raul Sánchez-Reillo,et al.  Handwritten signature recognition in mobile scenarios: Performance evaluation , 2012, 2012 IEEE International Carnahan Conference on Security Technology (ICCST).

[62]  Christoph Busch,et al.  Fingerprint Recognition with Embedded Cameras on Mobile Phones , 2011, MobiSec.

[63]  Amitava Das,et al.  Multilingual spoken-password based user authentication in emerging economies using cellular phone networks , 2008, 2008 IEEE Spoken Language Technology Workshop.

[64]  Abdul Serwadda,et al.  Using global knowledge of users' typing traits to attack keystroke biometrics templates , 2011, MM&Sec '11.

[65]  Ahmed Awad E. Ahmed,et al.  A New Biometric Technology Based on Mouse Dynamics , 2007, IEEE Transactions on Dependable and Secure Computing.

[66]  Steven Furnell,et al.  Acceptance of Subscriber Authentication Methods For Mobile Telephony Devices , 2002, Comput. Secur..

[67]  Hao Chen,et al.  Defending against sensor-sniffing attacks on mobile phones , 2009, MobiHeld '09.

[68]  Roy A. Maxion,et al.  Keystroke biometrics with number-pad input , 2010, 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN).

[69]  Babak Naderi,et al.  Magnetic signatures in air for mobile devices , 2012, Mobile HCI.

[70]  Inwhee Joe,et al.  Design of remote control system for data protection and backup in mobile devices , 2011, The 4th International Conference on Interaction Sciences.

[71]  Christophe Rosenberger,et al.  Challenge-based speaker recognition for mobile authentication , 2012, 2012 BIOSIG - Proceedings of the International Conference of Biometrics Special Interest Group (BIOSIG).

[72]  Adam J. Aviv,et al.  Smudge Attacks on Smartphone Touch Screens , 2010, WOOT.

[73]  L. E. Myers An Exploration of Voice Biometrics , 2004 .

[74]  Yongdae Kim,et al.  Timing attacks on PIN input devices , 2010, CCS '10.

[75]  Khalid Airowaily,et al.  Oily Residuals Security Threat on Smart Phones , 2011, 2011 First International Conference on Robot, Vision and Signal Processing.

[76]  Michal Choras,et al.  Contactless palmprint and knuckle biometrics for mobile devices , 2011, Pattern Analysis and Applications.

[77]  Alex Park,et al.  Multimodal Face and Speaker Identification for Mobile Devices , 2007 .

[78]  Sancheng Peng,et al.  Smartphone Malware and Its Propagation Modeling: A Survey , 2014, IEEE Communications Surveys & Tutorials.

[79]  Kwang-Seok Hong,et al.  Person authentication using face, teeth and voice modalities for mobile device security , 2010, IEEE Transactions on Consumer Electronics.

[80]  Julian Ashbourn Biometrics in the New World , 2014, Springer International Publishing.

[81]  Sahin Albayrak,et al.  Monitoring Smartphones for Anomaly Detection , 2008, Mob. Networks Appl..

[82]  Julian Fiérrez,et al.  Towards mobile authentication using dynamic signature verification: Useful features and performance evaluation , 2008, 2008 19th International Conference on Pattern Recognition.

[83]  Theresa C McLoud,et al.  Voice Recognition , 2009, Encyclopedia of Biometrics.

[84]  R. Shepard Recognition memory for words, sentences, and pictures , 1967 .

[85]  Brett Beranek Voice biometrics: success stories, success factors and what's next , 2013 .

[86]  Yajin Zhou,et al.  Dissecting Android Malware: Characterization and Evolution , 2012, 2012 IEEE Symposium on Security and Privacy.

[87]  Jiang Zhu,et al.  KeySens: Passive User Authentication through Micro-behavior Modeling of Soft Keyboard Interaction , 2013, MobiCASE.

[88]  Jun Han,et al.  ACComplice: Location inference using accelerometers on smartphones , 2012, 2012 Fourth International Conference on Communication Systems and Networks (COMSNETS 2012).

[89]  Andreas P. Heiner,et al.  A closer look at recognition-based graphical passwords on mobile devices , 2010, SOUPS.

[90]  Erik Wästlund,et al.  Exploring Touch-Screen Biometrics for User Identification on Smart Phones , 2011, PrimeLife.

[91]  Claudia Picardi,et al.  User authentication through keystroke dynamics , 2002, TSEC.

[92]  Ashish Jain,et al.  A new mobile biometric based upon usage context , 2013, 2013 IEEE International Conference on Technologies for Homeland Security (HST).

[93]  Feng Zhou,et al.  Keyboard acoustic emanations revisited , 2005, CCS '05.

[94]  Jie Wu,et al.  SafeCode - Safeguarding Security and Privacy of User Data on Stolen iOS Devices , 2012, CSS.

[95]  Julian Fiérrez,et al.  Direct Attacks Using Fake Images in Iris Verification , 2008, BIOID.

[96]  Yang Zhang,et al.  Fingerprint attack against touch-enabled devices , 2012, SPSM '12.

[97]  Julian Ashbourn Biometrics in the New World: The Cloud, Mobile Technology and Pervasive Identity , 2014 .

[98]  Chulhan Lee,et al.  Alignment-Free Cancelable Fingerprint Templates Based on Local Minutiae Information , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[99]  Tao Feng,et al.  Continuous Mobile Authentication Using Virtual Key Typing Biometrics , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.

[100]  Robert H. Deng,et al.  Designing leakage-resilient password entry on touchscreen mobile devices , 2013, ASIA CCS '13.

[101]  Michele Nappi,et al.  FIRME: Face and Iris Recognition for Mobile Engagement , 2014, Image Vis. Comput..

[102]  Steven Furnell,et al.  Keystroke dynamics on a mobile handset: a feasibility study , 2003, Inf. Manag. Comput. Secur..

[103]  Stuart E. Schechter,et al.  Can i borrow your phone?: understanding concerns when sharing mobile phones , 2009, CHI.

[104]  Adam J. Aviv,et al.  Practicality of accelerometer side channels on smartphones , 2012, ACSAC '12.

[105]  Duncan S. Wong,et al.  Design of touch dynamics based user authentication with an adaptive mechanism on mobile phones , 2014, SAC.

[106]  Nasir D. Memon,et al.  Biometric-rich gestures: a novel approach to authentication on multi-touch devices , 2012, CHI.

[107]  Václav Matyás,et al.  Toward Reliable User Authentication through Biometrics , 2003, IEEE Secur. Priv..

[108]  Georgios Kambourakis,et al.  iSAM: An iPhone Stealth Airborne Malware , 2011, SEC.

[109]  Rui Zhang,et al.  TouchIn: Sightless two-factor authentication on multi-touch mobile devices , 2014, 2014 IEEE Conference on Communications and Network Security.

[110]  Urs Hengartner,et al.  Itus: an implicit authentication framework for android , 2014, MobiCom.

[111]  Alex Pentland,et al.  Reality mining: sensing complex social systems , 2006, Personal and Ubiquitous Computing.

[112]  Aditya Pabbaraju,et al.  Face Recognition in Mobile Devices , 2010 .

[113]  Michael K. Reiter,et al.  Password hardening based on keystroke dynamics , 2002, International Journal of Information Security.

[114]  Yair Frankel,et al.  On enabling secure applications through off-line biometric identification , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).

[115]  Paolo Abeni,et al.  NIS03-4: Implementing Biometrics-Based Authentication for Mobile Devices , 2006, IEEE Globecom 2006.

[116]  Penny Khaw Iris Recognition Technology for Improved Authentication , 2002 .

[117]  Paulo Lobato Correia,et al.  Smartphone-based palmprint recognition system , 2014, 2014 21st International Conference on Telecommunications (ICT).

[118]  Anil K. Jain Biometric Recognition: Overview and Recent Advances , 2007, CIARP.

[119]  Tao Zhang,et al.  RobotDroid: A Lightweight Malware Detection Framework On Smartphones , 2012, J. Networks.

[120]  Maria Papadaki,et al.  Active authentication for mobile devices utilising behaviour profiling , 2014, International Journal of Information Security.

[121]  Josef Bigün,et al.  Non-intrusive liveness detection by face images , 2009, Image Vis. Comput..

[122]  Sungzoon Cho,et al.  Keystroke dynamics-based user authentication using long and free text strings from various input devices , 2015, Inf. Sci..

[123]  Alexander H. Waibel,et al.  Multimodal error correction for speech user interfaces , 2001, TCHI.

[124]  Kiran S. Balagani,et al.  Making impostor pass rates meaningless: A case of snoop-forge-replay attack on continuous cyber-behavioral verification with keystrokes , 2011, CVPR 2011 WORKSHOPS.

[125]  Christoph Busch,et al.  Authentication of Smartphone Users Based on the Way They Walk Using k-NN Algorithm , 2012, 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[126]  Hamed Ketabdar,et al.  MagiSign : User Identification / Authentication Based on 3 D Around Device Magnetic Signatures , 2010 .

[127]  Khalid Saeed,et al.  User Authentication for Mobile Devices , 2013, CISIM.

[128]  Nathan L. Clarke,et al.  Keystroke Analysis for Thumb-based Keyboards on Mobile Devices , 2007, SEC.

[129]  Paolo Abeni,et al.  Implementing Biometrics-Based Authentication for Mobile Devices , 2006 .

[130]  Steven Furnell,et al.  Authenticating mobile phone users using keystroke analysis , 2006, International Journal of Information Security.

[131]  Christoph Busch,et al.  Unobtrusive User-Authentication on Mobile Phones Using Biometric Gait Recognition , 2010, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[132]  Nguyen Minh Duc Your face is NOT your password Face Authentication ByPassing Lenovo – Asus – Toshiba , 2009 .

[133]  Tao Feng,et al.  Continuous mobile authentication using a novel Graphic Touch Gesture Feature , 2013, 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[134]  Thang Hoang,et al.  Gait identification using accelerometer on mobile phone , 2012, 2012 International Conference on Control, Automation and Information Sciences (ICCAIS).

[135]  Venu Govindaraju,et al.  Behavioural biometrics: a survey and classification , 2008, Int. J. Biom..

[136]  Matti Pietikäinen,et al.  Face and Eye Detection for Person Authentication in Mobile Phones , 2007, 2007 First ACM/IEEE International Conference on Distributed Smart Cameras.

[137]  Daniele Sgandurra,et al.  A Survey on Security for Mobile Devices , 2013, IEEE Communications Surveys & Tutorials.

[138]  Ian Oakley,et al.  Multi-touch passwords for mobile device access , 2012, UbiComp.

[139]  Ting-Yi Chang,et al.  Two novel biometric features in keystroke dynamics authentication systems for touch screen devices , 2014, Secur. Commun. Networks.

[140]  Tao Zhang,et al.  A Smartphone Malware Detection Framework Based on Artificial Immunology , 2013, J. Networks.

[141]  Munaga V. N. K. Prasad,et al.  Generating cancellable fingerprint templates based on Delaunay triangle feature set construction , 2016, IET Biom..

[142]  Yuval Elovici,et al.  Google Android: A Comprehensive Security Assessment , 2010, IEEE Security & Privacy.

[143]  Anil K. Jain,et al.  FVC2000: Fingerprint Verification Competition , 2002, IEEE Trans. Pattern Anal. Mach. Intell..

[144]  Patrick Traynor,et al.  (sp)iPhone: decoding vibrations from nearby keyboards using mobile phone accelerometers , 2011, CCS '11.

[145]  Zhi Xu,et al.  TapLogger: inferring user inputs on smartphone touchscreens using on-board motion sensors , 2012, WISEC '12.

[146]  Ahmad-Reza Sadeghi,et al.  PSiOS: bring your own privacy & security to iOS devices , 2013, ASIA CCS '13.

[147]  P. Bhattarakosol,et al.  Authenticating User Using Keystroke Dynamics and Finger Pressure , 2009, 2009 6th IEEE Consumer Communications and Networking Conference.

[148]  Matt Wolff Behavioral Biometric Identification on Mobile Devices , 2013, HCI.

[149]  Duke Lee,et al.  The State of the Touch‐Screen Panel Market in 2011 , 2011 .

[150]  Tao Feng,et al.  Continuous mobile authentication using touchscreen gestures , 2012, 2012 IEEE Conference on Technologies for Homeland Security (HST).

[151]  Xinjian Chen,et al.  A Secured Mobile Phone Based on Embedded Fingerprint Recognition Systems , 2005, ISI.

[152]  Fan Zhang,et al.  Stealthy video capturer: a new video-based spyware in 3G smartphones , 2009, WiSec '09.

[153]  Steven Furnell,et al.  Authentication of users on mobile telephones - A survey of attitudes and practices , 2005, Comput. Secur..

[154]  Annie I. Antón,et al.  Towards understanding user perceptions of authentication technologies , 2007, WPES '07.

[155]  Michael R. Lyu,et al.  Towards Continuous and Passive Authentication via Touch Biometrics: An Experimental Study on Smartphones , 2014, SOUPS.

[156]  Steven Furnell,et al.  Multi-modal Behavioural Biometric Authentication for Mobile Devices , 2012, SEC.

[157]  Sahin Albayrak,et al.  Smartphone malware evolution revisited: Android next target? , 2009, 2009 4th International Conference on Malicious and Unwanted Software (MALWARE).

[158]  Chng Eng Siong,et al.  Vulnerability of speaker verification systems against voice conversion spoofing attacks: The case of telephone speech , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[159]  Jiankun Hu,et al.  Biometric Mobile Template Protection: A Composite Feature Based Fingerprint Fuzzy Vault , 2009, 2009 IEEE International Conference on Communications.

[160]  Hao Chen,et al.  On the Practicality of Motion Based Keystroke Inference Attack , 2012, TRUST.

[161]  Yuval Elovici,et al.  Intrusion detection for mobile devices using the knowledge-based, temporal abstraction method , 2010, J. Syst. Softw..

[162]  Jin-Suk Kang,et al.  Mobile iris recognition systems: An emerging biometric technology , 2010, ICCS.

[163]  Markus Jakobsson,et al.  Implicit Authentication through Learning User Behavior , 2010, ISC.

[164]  Sébastien Marcel,et al.  Cross-Pollination of Normalization Techniques From Speaker to Face Authentication Using Gaussian Mixture Models , 2012, IEEE Transactions on Information Forensics and Security.

[165]  Apu Kapadia,et al.  Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones , 2011, NDSS.

[166]  Ibrahim Khalil,et al.  Data mining in mobile ECG based biometric identification , 2014, J. Netw. Comput. Appl..

[167]  Jean-Marc Robert,et al.  Security and usability: the case of the user authentication methods , 2006, IHM '06.

[168]  Klaus H. Hinrichs,et al.  An implicit author verification system for text messages based on gesture typing biometrics , 2014, CHI.

[169]  Romit Roy Choudhury,et al.  Tapprints: your finger taps have fingerprints , 2012, MobiSys '12.

[170]  Alan Goode Bring your own finger – how mobile is bringing biometrics to consumers , 2014 .

[171]  Yanggon Kim,et al.  Pupil and Iris Localization for Iris Recognition in Mobile Phones , 2006, Seventh ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD'06).

[172]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[173]  Heikki Ailisto,et al.  Identifying users of portable devices from gait pattern with accelerometers , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..

[174]  Dawn Xiaodong Song,et al.  Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication , 2012, IEEE Transactions on Information Forensics and Security.

[175]  Debin Gao,et al.  I can be You: Questioning the use of Keystroke Dynamics as Biometrics , 2013, NDSS.

[176]  Alireza Sahami Shirazi,et al.  Assessing the vulnerability of magnetic gestural authentication to video-based shoulder surfing attacks , 2012, CHI.

[177]  Heinrich Hußmann,et al.  Touch me once and i know it's you!: implicit authentication based on touch screen patterns , 2012, CHI.

[178]  Felix C. Freiling,et al.  Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices , 2011, 2011 IEEE Symposium on Security and Privacy.

[179]  Nathan L. Clarke,et al.  The application of signature recognition to transparent handwriting verification for mobile devices , 2007, Inf. Manag. Comput. Secur..

[180]  Julian Fiérrez,et al.  Combining Biometric Evidence for Person Authentication , 2003, Advanced Studies in Biometrics.

[181]  Shangling Song,et al.  An embedded real-time finger-vein recognition system for mobile devices , 2012, IEEE Transactions on Consumer Electronics.

[182]  Springer-Verlag London Limited User privacy and modern mobile services: are they on the same path? , 2013 .

[183]  Nasir D. Memon,et al.  Multitouch Gesture-Based Authentication , 2014, IEEE Transactions on Information Forensics and Security.

[184]  Lei Zhang,et al.  Palmprint Verification on Mobile Phones Using Accelerated Competitive Code , 2011, 2011 International Conference on Hand-Based Biometrics.

[185]  David J. Crandall,et al.  PlaceRaider: Virtual Theft in Physical Spaces with Smartphones , 2012, NDSS.

[186]  Jiankun Hu,et al.  Mobile device access control: an improved correlation based face authentication scheme and its Java ME application , 2012, Concurr. Comput. Pract. Exp..

[187]  Jaehyun Park,et al.  Touch key design for target selection on a mobile phone , 2008, Mobile HCI.

[188]  Hareesh Ravi,et al.  A novel method for touch-less finger print authentication , 2013, 2013 IEEE International Conference on Technologies for Homeland Security (HST).

[189]  Jong-Hoon Youn,et al.  Biometric gait recognition based on wireless acceleration sensor using k-nearest neighbor classification , 2014, 2014 International Conference on Computing, Networking and Communications (ICNC).

[190]  Alessandro Neri,et al.  User authentication using keystroke dynamics for cellular phones , 2009 .

[191]  Adam Krzyzak,et al.  Cell Phones Personal Authentication Systems Using Multimodal Biometrics , 2008, ICIAR.

[192]  Georgios Kambourakis,et al.  From keyloggers to touchloggers: Take the rough with the smooth , 2013, Comput. Secur..

[193]  Herbert Reininger,et al.  Continuous Speaker Verification in Realtime , 2011, BIOSIG.

[194]  John Daugman,et al.  High Confidence Visual Recognition of Persons by a Test of Statistical Independence , 1993, IEEE Trans. Pattern Anal. Mach. Intell..

[195]  Jianying Hu,et al.  User interface for a PCS smart phone , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.

[196]  Mauro Conti,et al.  I Sensed It Was You: Authenticating Mobile Users with Sensor-Enhanced Keystroke Dynamics , 2014, DIMVA.

[197]  Yongsheng Gao,et al.  Face recognition across pose: A review , 2009, Pattern Recognit..

[198]  Xiao Wang,et al.  SenSec: Mobile security through passive sensing , 2013, 2013 International Conference on Computing, Networking and Communications (ICNC).

[199]  J. Hu Mobile fingerprint template protection: Progress and open issues , 2008, 2008 3rd IEEE Conference on Industrial Electronics and Applications.

[200]  Georgios Kambourakis,et al.  The best of both worlds: a framework for the synergistic operation of host and cloud anomaly-based IDS for smartphones , 2014, EuroSec '14.

[201]  Sabah Jassim,et al.  Multimodal person authentication on a smartphone under realistic conditions , 2006, SPIE Defense + Commercial Sensing.

[202]  Tieniu Tan,et al.  Embedded Palmprint Recognition System on Mobile Devices , 2007, ICB.

[203]  Shie Mannor,et al.  Activity and Gait Recognition with Time-Delay Embeddings , 2010, AAAI.

[204]  Deian Stefan,et al.  Robustness of keystroke-dynamics based biometrics against synthetic forgeries , 2012, Comput. Secur..

[205]  Sébastien Marcel,et al.  Bi-modal biometric authentication on mobile phones in challenging conditions , 2014, Image Vis. Comput..

[206]  R. C. Johnson,et al.  Secure voice-based authentication for mobile devices: vaulted voice verification , 2012, Defense, Security, and Sensing.

[207]  Gonzalo Bailador,et al.  Authentication in mobile devices through hand gesture recognition , 2012, International Journal of Information Security.

[208]  Muddassar Farooq,et al.  Keystroke-Based User Identification on Smart Phones , 2009, RAID.

[209]  John Daugman,et al.  How iris recognition works , 2002, IEEE Transactions on Circuits and Systems for Video Technology.

[210]  Zhigang Liu,et al.  Darwin phones: the evolution of sensing and inference on mobile phones , 2010, MobiSys '10.

[211]  David Zhang,et al.  A survey of palmprint recognition , 2009, Pattern Recognit..

[212]  Rakesh Agrawal,et al.  Keyboard acoustic emanations , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[213]  Sébastien Marcel,et al.  Spoofing Face Recognition With 3D Masks , 2014, IEEE Transactions on Information Forensics and Security.

[214]  Raymond N. J. Veldhuis,et al.  Biometric Authentication System on Mobile Personal Devices , 2010, IEEE Transactions on Instrumentation and Measurement.

[215]  Tom Martin,et al.  Mobile phones as computing devices: the viruses are coming! , 2004, IEEE Pervasive Computing.

[216]  Martin Vuagnoux,et al.  Compromising Electromagnetic Emanations of Wired and Wireless Keyboards , 2009, USENIX Security Symposium.

[217]  Juan E. Tapiador,et al.  Evolution, Detection and Analysis of Malware for Smart Devices , 2014, IEEE Communications Surveys & Tutorials.

[218]  Lauren Long Biometrics : The Future of Mobile Phones , 2013 .

[219]  Sébastien Marcel,et al.  Cross-pollination of normalisation techniques from speaker to face authentication using Gaussian mixture models , 2012 .

[220]  Nalini K. Ratha,et al.  Generating Cancelable Fingerprint Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[221]  Josef Bigün,et al.  Verifying liveness by multiple experts in face biometrics , 2008, 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.

[222]  Steven Furnell,et al.  SMS linguistic profiling authentication on mobile device , 2011, 2011 5th International Conference on Network and System Security.

[223]  Chandrasekhar Bhagavatula,et al.  Usability Analysis of Biometric Authentication Systems on Mobile Phones , 2014 .

[224]  Stephanie Schuckers,et al.  Determination of vitality from a non-invasive biomedical measurement for use in fingerprint scanners , 2003, Pattern Recognit..

[225]  Nicolae Duta,et al.  A survey of biometric technology based on hand shape , 2009, Pattern Recognit..

[226]  David Lazer,et al.  Inferring friendship network structure by using mobile phone data , 2009, Proceedings of the National Academy of Sciences.