Abstract
The focus of this chapter is on security of touch screen devices. The emphasis is placed on smartphones – such as Apple iPhone and Android phones – and tablets – such as Apple iPad. The chapter starts with the description how the touch screen devices are winning a significant share in the market. The current state of the security methods used on these devices is discussed. Deficiencies of prevailing approaches are pointed out, and the need for new authentication mechanisms is reasoned. The hardware available in modern touch screen devices is characterized, and the sensors providing biometric data are described.
In the last part of this chapter, some of the new security means using biometric features and potential new directions are discussed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Johnson EA (1965) Touch display: a novel input/output device for computers. Electron Lett 1(8):219–220. doi:10.1049/el:19650200
ABI Research (2008) Touch screen in mobile devices to deliver $5 billion next year. http://www.abiresearch.com/press/1231-Touch+Screens+in+Mobile+Devices+to+Deliver+$5+Billion+Next+Year. Accessed 14 May 2012
Earnings Releases. http://investor.apple.com/results.cfm. Accessed 29 May 2012
Allen M (2005) A day in the life of mobile data. Mobile security, British Computer Society. http://www.bcs.org/server.php?show=conWebDoc.2774. Accessed 14 May 2012
Burnett M, Kleiman D (2005) Perfect passwords. Syngress, Rockland, MA
Ivan A, Goodfellow J (1966). Improvements in or relating to customer-operated dispensing systems. UK patent #GB1197183. doi:10.1049/el:19650200
Bonneau J, Preibusch S, Anderson R (2012) A birthday present every eleven wallets? The security of customer-chosen banking PINs. Financial cryptography and data security. http://www.cl.cam.ac.uk/~jcb82/doc/BPA12-FC-banking_pin_security.pdf. Accessed 14 May 2012
Aviv AJ, Gibson K, Mossop E, Blaze M, Smith JM (2010) Smudge attacks on smartphone touch screens. Workshop on offensive technology. http://static.usenix.org/event/woot10/tech/full_papers/Aviv.pdf. Accessed 14 May 2012
Whisper Systems WhisperCore. http://whispersys.com/screenlock.html. Accessed 14 May 2012
Loy CC, Lim CP, Lai WK (2005) Pressure-based typing biometrics user authentication using the fuzzy ARTMAP. In: Neural network international conference on neural information processing. http://www.eecs.qmul.ac.uk/~ccloy/files/iconip_2005.pdf. Accessed 14 May 2012
n7player. http://www.n7mobile.com/. Accessed 15 Jun 2012
Gyroscope. http://en.wikipedia.org/wiki/Gyroscope. Accessed 15 May 2012
Hinckley K, Song H (2011). Sensor synaesthesia: touch in motion, and motion in touch. In: Proceedings of the 2011 annual conference on human factors in computing systems (CHI’11). ACM, New York, pp 801–810. doi:10.1145/1978942.1979059
Derawi MO, Nickel C, Bours P, Busch C (2010) Unobtrusive user-authentication on mobile phones using biometric gait recognition. In: Sixth international conference on intelligent information hiding and multimedia signal processing (IIH-MSP), Darmstadt, Germany, pp 306–311. doi: 10.1109/IIHMSP.2010.83
Harrison C, Schwarz J, Hudson SE (2011) TapSense: enhancing finger interaction on touch surfaces. In: Proceedings of the 24th annual ACM symposium on user interface software and technology, New York, pp 627–636. http://chrisharrison.net/projects/tapsense/tapsense.pdf. Accessed 15 May 2012
Azumio Instant Heart Rate. http://www.azumio.com/apps/heart-rate/. Accessed 14 May 2012
Spillane R (1975) Keyboard apparatus for personal identification. IBM Techn Disclosure Bull 17(3346). doi:10.1109/MSP.2004.89
Karatzouni S, Clarke NL (2007) Keystroke analysis for thumb-based keyboards on mobile devices. In: Proceedings of the 22nd IFIP international information security conference (IFIP SEC 2007), Sandton, South Africa, 14–16 May, pp 253–263. doi:10.1007/978-0-387-72367-9_22
Rybnik M, Tabędzki M, Saeed K (2008) A keystroke dynamics based system for user identification. In: Proceedings of the 7th international conference on computer information systems and industrial management applications: CISIM’08. IEEE Computer Society, pp 225–230. doi: 10.1109/CISIM.2008.8
Sae-Bae N, Ahmed K, Isbister K, Memon N (2012) Biometric-rich gestures: a novel approach to authentication on multi-touch devices. In: Proceedings of the 2012 ACM annual conference on human factors in computing systems (CHI’12). ACM, New York, pp 977–986. Doi:10.1145/2207676.2208543
Hashia S, Pollet C, Stamp M, Hall MQ (2005) On using mouse movements as a biometric. In: Proceedings of the international conference on computer science and its applications. http://www.cs.sjsu.edu/faculty/pollett/papers/shivanipaper.pdf. Accessed 15 May 2012
Tabędzki M, Saeed K (2005) New method to test mouse movement dynamics for human identification. In: KBIB 2005 conference, Tom I, computer science telemedicine systems, Czestochowa Technical University Press, Poland, pp 467–472 (in Polish). http://home.agh.edu.pl/~saeed/arts/2005%20KBIB.pdf. Accessed 15 May 2012
Gamboa H, Fred ALN, Jain AK (2007) Webbiometrics: user verification via web interaction. Biometrics Symp. doi:10.1109/BCC.2007.4430552
Citty J, Tapi DRH (2010) Touch-screen authentication using partitioned images. Elon University Technical Report. http://facstaff.elon.edu/dhutchings/papers/citty2010tapi.pdf. Accessed 15 May 2012
Myers L (2004) An exploration of voice biometrics. GSEC practical assignment. http://www.sans.org/reading_room/whitepapers/authentication/exploration-voice-biometrics_1436. Accessed 15 May 2012
De Luca A, Hang A, Brudy F, Lindner C, Hussmann H (2012) Touch me once and i know it’s you!: implicit authentication based on touch screen patterns. In: Proceedings of the 2012 ACM annual conference on human factors in computing systems (CHI’12). ACM, New York, pp 987–996. doi:10.1145/2207676.2208544
Hazen TJ, Weinstein E, Park A (2003). Towards robust person recognition on handheld devices using face and speaker identification technologies. In: Proceedings of the 5th international conference on multimodal interfaces (ICMI’03). ACM, New York, pp 289–292. doi:10.1145/958432.958485
Acknowledgement
This work was partially supported by AGH University of Science and Technology in Cracow, grant no. 11.11.220.01.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer Science+Business Media New York
About this chapter
Cite this chapter
Rogowski, M., Saeed, K. (2012). A Study on Touch Screen Devices: User Authentication Problems. In: Saeed, K., Nagashima, T. (eds) Biometrics and Kansei Engineering. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-5608-7_5
Download citation
DOI: https://doi.org/10.1007/978-1-4614-5608-7_5
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-5607-0
Online ISBN: 978-1-4614-5608-7
eBook Packages: Computer ScienceComputer Science (R0)