Skip to main content

A Study on Touch Screen Devices: User Authentication Problems

  • Chapter
  • First Online:
Biometrics and Kansei Engineering

Abstract

The focus of this chapter is on security of touch screen devices. The emphasis is placed on smartphones – such as Apple iPhone and Android phones – and tablets – such as Apple iPad. The chapter starts with the description how the touch screen devices are winning a significant share in the market. The current state of the security methods used on these devices is discussed. Deficiencies of prevailing approaches are pointed out, and the need for new authentication mechanisms is reasoned. The hardware available in modern touch screen devices is characterized, and the sensors providing biometric data are described.

In the last part of this chapter, some of the new security means using biometric features and potential new directions are discussed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Johnson EA (1965) Touch display: a novel input/output device for computers. Electron Lett 1(8):219–220. doi:10.1049/el:19650200

    Article  Google Scholar 

  2. ABI Research (2008) Touch screen in mobile devices to deliver $5 billion next year. http://www.abiresearch.com/press/1231-Touch+Screens+in+Mobile+Devices+to+Deliver+$5+Billion+Next+Year. Accessed 14 May 2012

  3. Earnings Releases. http://investor.apple.com/results.cfm. Accessed 29 May 2012

  4. Allen M (2005) A day in the life of mobile data. Mobile security, British Computer Society. http://www.bcs.org/server.php?show=conWebDoc.2774. Accessed 14 May 2012

  5. Burnett M, Kleiman D (2005) Perfect passwords. Syngress, Rockland, MA

    Google Scholar 

  6. Ivan A, Goodfellow J (1966). Improvements in or relating to customer-operated dispensing systems. UK patent #GB1197183. doi:10.1049/el:19650200

  7. Bonneau J, Preibusch S, Anderson R (2012) A birthday present every eleven wallets? The security of customer-chosen banking PINs. Financial cryptography and data security. http://www.cl.cam.ac.uk/~jcb82/doc/BPA12-FC-banking_pin_security.pdf. Accessed 14 May 2012

  8. Aviv AJ, Gibson K, Mossop E, Blaze M, Smith JM (2010) Smudge attacks on smartphone touch screens. Workshop on offensive technology. http://static.usenix.org/event/woot10/tech/full_papers/Aviv.pdf. Accessed 14 May 2012

  9. Whisper Systems WhisperCore. http://whispersys.com/screenlock.html. Accessed 14 May 2012

  10. Loy CC, Lim CP, Lai WK (2005) Pressure-based typing biometrics user authentication using the fuzzy ARTMAP. In: Neural network international conference on neural information processing. http://www.eecs.qmul.ac.uk/~ccloy/files/iconip_2005.pdf. Accessed 14 May 2012

  11. n7player. http://www.n7mobile.com/. Accessed 15 Jun 2012

  12. Gyroscope. http://en.wikipedia.org/wiki/Gyroscope. Accessed 15 May 2012

  13. Hinckley K, Song H (2011). Sensor synaesthesia: touch in motion, and motion in touch. In: Proceedings of the 2011 annual conference on human factors in computing systems (CHI’11). ACM, New York, pp 801–810. doi:10.1145/1978942.1979059

  14. Derawi MO, Nickel C, Bours P, Busch C (2010) Unobtrusive user-authentication on mobile phones using biometric gait recognition. In: Sixth international conference on intelligent information hiding and multimedia signal processing (IIH-MSP), Darmstadt, Germany, pp 306–311. doi: 10.1109/IIHMSP.2010.83

  15. Harrison C, Schwarz J, Hudson SE (2011) TapSense: enhancing finger interaction on touch surfaces. In: Proceedings of the 24th annual ACM symposium on user interface software and technology, New York, pp 627–636. http://chrisharrison.net/projects/tapsense/tapsense.pdf. Accessed 15 May 2012

  16. Azumio Instant Heart Rate. http://www.azumio.com/apps/heart-rate/. Accessed 14 May 2012

  17. Spillane R (1975) Keyboard apparatus for personal identification. IBM Techn Disclosure Bull 17(3346). doi:10.1109/MSP.2004.89

  18. Karatzouni S, Clarke NL (2007) Keystroke analysis for thumb-based keyboards on mobile devices. In: Proceedings of the 22nd IFIP international information security conference (IFIP SEC 2007), Sandton, South Africa, 14–16 May, pp 253–263. doi:10.1007/978-0-387-72367-9_22

  19. Rybnik M, Tabędzki M, Saeed K (2008) A keystroke dynamics based system for user identification. In: Proceedings of the 7th international conference on computer information systems and industrial management applications: CISIM’08. IEEE Computer Society, pp 225–230. doi: 10.1109/CISIM.2008.8

  20. Sae-Bae N, Ahmed K, Isbister K, Memon N (2012) Biometric-rich gestures: a novel approach to authentication on multi-touch devices. In: Proceedings of the 2012 ACM annual conference on human factors in computing systems (CHI’12). ACM, New York, pp 977–986. Doi:10.1145/2207676.2208543

  21. Hashia S, Pollet C, Stamp M, Hall MQ (2005) On using mouse movements as a biometric. In: Proceedings of the international conference on computer science and its applications. http://www.cs.sjsu.edu/faculty/pollett/papers/shivanipaper.pdf. Accessed 15 May 2012

  22. Tabędzki M, Saeed K (2005) New method to test mouse movement dynamics for human identification. In: KBIB 2005 conference, Tom I, computer science telemedicine systems, Czestochowa Technical University Press, Poland, pp 467–472 (in Polish). http://home.agh.edu.pl/~saeed/arts/2005%20KBIB.pdf. Accessed 15 May 2012

  23. Gamboa H, Fred ALN, Jain AK (2007) Webbiometrics: user verification via web interaction. Biometrics Symp. doi:10.1109/BCC.2007.4430552

  24. Citty J, Tapi DRH (2010) Touch-screen authentication using partitioned images. Elon University Technical Report. http://facstaff.elon.edu/dhutchings/papers/citty2010tapi.pdf. Accessed 15 May 2012

  25. Myers L (2004) An exploration of voice biometrics. GSEC practical assignment. http://www.sans.org/reading_room/whitepapers/authentication/exploration-voice-biometrics_1436. Accessed 15 May 2012

  26. De Luca A, Hang A, Brudy F, Lindner C, Hussmann H (2012) Touch me once and i know it’s you!: implicit authentication based on touch screen patterns. In: Proceedings of the 2012 ACM annual conference on human factors in computing systems (CHI’12). ACM, New York, pp 987–996. doi:10.1145/2207676.2208544

  27. Hazen TJ, Weinstein E, Park A (2003). Towards robust person recognition on handheld devices using face and speaker identification technologies. In: Proceedings of the 5th international conference on multimodal interfaces (ICMI’03). ACM, New York, pp 289–292. doi:10.1145/958432.958485

Download references

Acknowledgement

This work was partially supported by AGH University of Science and Technology in Cracow, grant no. 11.11.220.01.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Marcin Rogowski .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer Science+Business Media New York

About this chapter

Cite this chapter

Rogowski, M., Saeed, K. (2012). A Study on Touch Screen Devices: User Authentication Problems. In: Saeed, K., Nagashima, T. (eds) Biometrics and Kansei Engineering. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-5608-7_5

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-5608-7_5

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-5607-0

  • Online ISBN: 978-1-4614-5608-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics