Skip to main content

Touchscreen Behavioural Biometrics Authentication in Self-contained Mobile Applications Design

  • Conference paper
  • First Online:
Business Information Systems Workshops (BIS 2019)

Part of the book series: Lecture Notes in Business Information Processing ((LNBIP,volume 373))

Included in the following conference series:

Abstract

The article presents the research connected with developing a mobile touchscreen behavioural biometrics solution that may be applicable for authentication and improving transaction security of financial services. The article aims to present the research approach and a literature review that identified research gaps and performed a critical analysis of previous results. The goal is to suggest possible improvements over the existing methods in the literature. The motivation, methodology and main problem statements of the aforementioned research are presented, focusing on the characteristics of behavioural biometrics methods. The main contribution of the article consists of the literature review focused on the characteristics of the approaches used, differences in results caused by the evaluation criteria of the research processes and their comparability. Based on it insights are derived which can be used to build touchscreen based authentication method and validate the results.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    developer.android.com/reference/android/view/MotionEventdeveloper.apple.com/documentation/uikit/uitouch.

  2. 2.

    http://www.zasyed.com/jss18dataset.html.

  3. 3.

    http://bigdata.ise.bgu.ac.il/sherlock/#/download#source_code.

References

  1. Deloitte Center for Financial Services: 2018 banking outlook. https://www2.deloitte.com/content/dam/Deloitte/global/Documents/Financial-Services/gx-fsi-dcfs-2018-banking-outlook.pdf (2018). Accessed 10 Oct 2019

  2. Visa USA: Visa biometrics payments study. https://usa.visa.com/visa-everywhere/security/how-fingerprint-authentication-works.html (2017). Accessed 10 Oct 2019

  3. Kałużny, P.: Behavioral biometrics in mobile banking and payment applications. In: Abramowicz, W., Paschke, A. (eds.) Business Information Systems Workshops, vol. 339, pp. 646–658. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-04849-5_55

    Chapter  Google Scholar 

  4. Lawless Research: Beyond the password: the future of account security (2016). https://www.telesign.com/wp-content/uploads/2016/06/Telesign-Report-Beyond-the-Password-June-2016-1.pdf. Accessed 10 Oct 2019

  5. Supplementing Directive (EU) 2015/2366 of the European Parliament and of the Council of the European Union, O.J. (2018)

    Google Scholar 

  6. Awad, A.: Collective framework for fraud detection using behavioral biometrics. In: Traoré, I., Awad, A., Woungang, I. (eds.) Information Security Practices, pp. 29–37. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-48947-6_3

    Chapter  Google Scholar 

  7. Li, L., Zhao, X., Xue, G.: Unobservable re-authentication for smartphones. In: NDSS, vol. 56, pp. 57–59 (2013)

    Google Scholar 

  8. Hevner, A.R., March, S.T., Park, J., Ram, S.: Design science in information systems research. MIS Q. 28(1), 75–105 (2004)

    Article  Google Scholar 

  9. Vaishnavi, V., Kuechler, W.: Design research in information systems (2004)

    Google Scholar 

  10. Patel, V.M., Chellappa, R., Chandra, D., Barbello, B.: Continuous user authentication on mobile devices: recent progress and remaining challenges. IEEE Signal Process. Mag. 33(4), 49–61 (2016)

    Article  Google Scholar 

  11. Hayashi, E., Riva, O., Strauss, K., Brush, A., Schechter, S.: Goldilocks and the two mobile devices: going beyond all-or-nothing access to a device’s applications. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, vol. 2, ACM (2012)

    Google Scholar 

  12. Saeed, K.: Biometrics principles and important concerns. In: Biometrics and Kansei Engineering, pp. 3–20. Springer (2012). https://doi.org/10.1007/978-1-4614-5608-7_1

  13. Fridman, L., Weber, S., Greenstadt, R., Kam, M.: Active authentication on mobile devices via stylometry, application usage, web browsing, and GPS location. IEEE Syst. J. 11(2), 513–521 (2016)

    Article  Google Scholar 

  14. Rattani, A., Derakhshani, R.: A survey of mobile face biometrics. Comput. Electr. Eng. 72, 39–52 (2018)

    Article  Google Scholar 

  15. Samet, S., Ishraque, M.T., Ghadamyari, M., Kakadiya, K., Mistry, Y., Nakkabi, Y.: TouchMetric: a machine learning based continuous authentication feature testing mobile application. Int. J. Inf. Technol. 1–7 (2019)

    Google Scholar 

  16. Bo, C., Zhang, L., Li, X.Y., Huang, Q., Wang, Y.: SilentSense: silent user identification via touch and movement behavioral biometrics. In: Proceedings of the 19th Annual International Conference on Mobile Computing and Networking, pp. 187–190. ACM (2013)

    Google Scholar 

  17. Frank, M., Biedert, R., Ma, E., Martinovic, I., Song, D.: Touchalytics: on the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE Trans. Inf. Forensics Secur. 8(1), 136–148 (2013)

    Article  Google Scholar 

  18. Saevanee, H., Bhattarakosol, P.: Authenticating user using keystroke dynamics and finger pressure. In: 2009 6th IEEE Consumer Communications and Networking Conference, pp. 1–2. IEEE (2009)

    Google Scholar 

  19. Meng, Y., Wong, D.S., Schlegel, R., Kwok, L.: Touch gestures based biometric authentication scheme for touchscreen mobile phones. In: Kutyłowski, M., Yung, M. (eds.) Inscrypt 2012. LNCS, vol. 7763, pp. 331–350. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-38519-3_21

    Chapter  Google Scholar 

  20. Serwadda, A., Phoha, V.V., Wang, Z.: Which verifiers work?: a benchmark evaluation of touch-based authentication algorithms. In: 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS), pp. 1–8. IEEE (2013)

    Google Scholar 

  21. Zhang, H., Patel, V.M., Fathy, M., Chellappa, R.: Touch gesture-based active user authentication using dictionaries. In: 2015 IEEE Winter Conference on Applications of Computer Vision, pp. 207–214. IEEE (2015)

    Google Scholar 

  22. Feng, T., et al.: Continuous mobile authentication using touchscreen gestures. In: 2012 IEEE Conference on Technologies for Homeland Security (HST), pp. 451–456. IEEE (2012)

    Google Scholar 

  23. Zhao, X., Feng, T., Shi, W.: Continuous mobile authentication using a novel graphic touch gesture feature. In: 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS), pp. 1–6. IEEE (2013)

    Google Scholar 

  24. Masood, R., Zhao, B.Z.H., Asghar, H.J., Kaafar, M.A.: Touch and you’re trapp(ck)ed: quantifying the uniqueness of touch gestures for tracking. Proc. Priv. Enhancing Technol. 2018(2), 122–142 (2018)

    Article  Google Scholar 

  25. Voris, J.: Measuring How we play: authenticating users with touchscreen gameplay. In: Murao, K., Ohmura, R., Inoue, S., Gotoh, Y. (eds.) MobiCASE 2018. LNICST, vol. 240, pp. 144–164. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-90740-6_9

    Chapter  Google Scholar 

  26. Examples of android gestures (2017). www.en.profit.me. https://en.proft.me/media/android/android_gestures.jpg. Accessed 10 Oct 2019

  27. Jain, A., Kanhangad, V.: Exploring orientation and accelerometer sensor data for personal authentication in smartphones using touchscreen gestures. Pattern Recogn. Lett. 68, 351–360 (2015)

    Article  Google Scholar 

  28. Abdulhak, S.A., Abdulaziz, A.A.: A systematic review of features identification and extraction for behavioral biometrie authentication in touchscreen mobile devices. In: 2018 20th International Conference on Advanced Communication Technology (ICACT), pp. 68–73. IEEE (2018)

    Google Scholar 

  29. Damopoulos, D., Kambourakis, G., Gritzalis, S.: From keyloggers to touchloggers: take the rough with the smooth. Comput. Secur. 32, 102–114 (2013)

    Article  Google Scholar 

  30. Syed, Z., Helmick, J., Banerjee, S., Cukic, B.: Touch gesture-based authentication on mobile devices: the effects of user posture, device size, configuration, and inter-session variability. J. Syst. Softw. 149, 158–173 (2019)

    Article  Google Scholar 

  31. Mirsky, Y., Shabtai, A., Rokach, L., Shapira, B., Elovici, Y.: Sherlock vs Moriarty: a smartphone dataset for cybersecurity research. In: Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security, pp. 1–12. ACM (2016)

    Google Scholar 

  32. Antal, M., Szabó, L.Z., Bokor, Z.: Identity information revealed from mobile touch gestures. Stud. Univ. Babes-Bolyai, Inf. 59 (2014)

    Google Scholar 

  33. Sitová, Z., et al.: HMOG: new behavioral biometric features for continuous authentication of smartphone users. IEEE Trans. Inf. Forensics Secur. 11(5), 877–892 (2016)

    Article  Google Scholar 

  34. Mahbub, U., Sarkar, S., Patel, V.M., Chellappa, R.: Active user authentication for smartphones: a challenge data set and benchmark results. In: 2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS), pp. 1–8. IEEE (2016)

    Google Scholar 

  35. Papamichail, M.D., Chatzidimitriou, K.C., Karanikiotis, T., Oikonomou, N.C.I., Symeonidis, A.L., Saripalle, S.K.: BrainRun: a behavioral biometrics dataset towards continuous implicit authentication. Data 4(2), 60 (2019)

    Article  Google Scholar 

  36. Feng, T., Yang, J., Yan, Z., Tapia, E.M., Shi, W.: Tips: context-aware implicit user identification using touch screen in uncontrolled environments. In: Proceedings of the 15th Workshop on Mobile Computing Systems and Applications, vol. 9. ACM (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Piotr Kałużny .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kałużny, P. (2019). Touchscreen Behavioural Biometrics Authentication in Self-contained Mobile Applications Design. In: Abramowicz, W., Corchuelo, R. (eds) Business Information Systems Workshops. BIS 2019. Lecture Notes in Business Information Processing, vol 373. Springer, Cham. https://doi.org/10.1007/978-3-030-36691-9_56

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-36691-9_56

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-36690-2

  • Online ISBN: 978-3-030-36691-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics