Skip to main content

Advertisement

SpringerLink
  • Log in
Book cover

International Conference on Image Analysis and Processing

ICIAP 2015: New Trends in Image Analysis and Processing -- ICIAP 2015 Workshops pp 27–34Cite as

  1. Home
  2. New Trends in Image Analysis and Processing -- ICIAP 2015 Workshops
  3. Conference paper
Touchstroke: Smartphone User Authentication Based on Touch-Typing Biometrics

Touchstroke: Smartphone User Authentication Based on Touch-Typing Biometrics

  • Attaullah Buriro18,
  • Bruno Crispo18,19,
  • Filippo Del Frari18 &
  • …
  • Konrad Wrona20 
  • Conference paper
  • First Online: 01 January 2015
  • 3765 Accesses

  • 27 Citations

Part of the Lecture Notes in Computer Science book series (LNIP,volume 9281)

Abstract

Smartphones are becoming pervasive and widely used for a large variety of activities from social networking to online shopping, from message exchanging to mobile gaming, to mention just a few. Many of these activities generate private information or require storing on the phone user credentials and payment details. In spite of being so security and privacy critical, smartphones are still widely protected by traditional authentication mechanisms such as PINs and passwords, whose limitations and drawbacks are well known and documented in the security community. New accurate, user-friendly and effective authentication mechanisms are required. To this end, behavior-based authentication has recently attracted a significant amount of interest in both commercial and academic contexts.

This paper proposes a new bi-modal biometric authentication solution, Touchstroke, which makes use of the user’s hand movements while holding the device, and the timing of touch-typing(Touch-typing is the act of typing input on the touchscreen of a smartphone.) when the user enters a text-independent 4-digit PIN/password. We implemented and tested the new biometrics in real smartphones. Preliminary results are encouraging, showing high accuracy. Thus, our solution is a plausible alternative to traditional authentication mechanisms.

Keywords

  • Smartphone
  • Behavioral biometrics
  • Keystroke
  • Transparent

Download conference paper PDF

References

  1. Raza, M., Iqbal, M., Sharif, M., Haider, W.: A survey of password attacks and comparative analysis on methods for secure authentication. World Applied Sciences Journal 19, 439–444 (2012)

    Google Scholar 

  2. Teh, P.S, Teoh, A.B.J., Yue, S.: A survey of keystroke dynamics biometrics. The Scientific World Journal, Hindawi Publishing Corporation (2013)

    Google Scholar 

  3. Giuffrida, C., Majdanik, K., Conti, M., Bos, H.: I sensed it was you: authenticating mobile users with sensor-enhanced keystroke dynamics. In: Dietrich, S. (ed.) DIMVA 2014. LNCS, vol. 8550, pp. 92–111. Springer, Heidelberg (2014)

    Google Scholar 

  4. Huang, X., Lund, G., Sapeluk, A.: Development of a typing behavior recognition mechanism on android. In: Proceeding of the IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 1342–1347. IEEE, Bradford (2012)

    Google Scholar 

  5. Saevanee, H., Bhatarakosol, P.: User authentication using combination of behavioral biometrics over the touchpad acting like touch screen of mobile device. In: Proceeding of the International Conference on Computer and Electrical Engineering (ICCEE 2008), pp. 82–86. IEEE, Phuket (2008)

    Google Scholar 

  6. Saevanee, H., Bhatarakosol, P.: Authenticating user using keystroke dynamics and finger pressure, In: Proceedings of the 6th IEEE Consumer Communications and Networking Conference (CCNC 2009), pp. 1–2. IEEE, Las Vegas (2009)

    Google Scholar 

  7. Zahid, S., Shahzad, M., Khayam, S.A., Farooq, M.: Keystroke-based user identificationon smart phones. In: Kirda, E., Jha, S., Balzarotti, D. (eds.) RAID 2009. LNCS, vol. 5758, pp. 224–243. Springer, Heidelberg (2009)

    CrossRef  Google Scholar 

  8. Miluzzo, E., Varshavsky, A., Balakrishnan, S., Choudhury, R.R.: Tapprints: your finger taps have fingerprints, In: Proceedings of the 10th international conference on Mobile systems, applications, and services, pp. 323–336. ACM (2012)

    Google Scholar 

  9. Aviv, A.J., Sapp, B., Blaze, M., Smith, J.M.: Practicality of accelerometer side channels on smartphones, In: Proceedings of the 28th Annual Computer Security Applications Conference, pp. 41–50. ACM (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

  1. Department of Information Engineering and Computer Science, University of Trento, Trento, Italy

    Attaullah Buriro, Bruno Crispo & Filippo Del Frari

  2. DistrNet, KU Leuven, Leuven, Belgium

    Bruno Crispo

  3. NATO Communications and Information Agency, The Hague, Netherlands

    Konrad Wrona

Authors
  1. Attaullah Buriro
    View author publications

    You can also search for this author in PubMed Google Scholar

  2. Bruno Crispo
    View author publications

    You can also search for this author in PubMed Google Scholar

  3. Filippo Del Frari
    View author publications

    You can also search for this author in PubMed Google Scholar

  4. Konrad Wrona
    View author publications

    You can also search for this author in PubMed Google Scholar

Corresponding author

Correspondence to Attaullah Buriro .

Editor information

Editors and Affiliations

  1. Istituto Italiano di Tecnologia (IIT), Genoa, Italy

    Vittorio Murino

  2. University of Genoa, Genoa, Italy

    Enrico Puppo

  3. Istituto Italiano di Tecnologia (IIT), Genoa, Italy

    Diego Sona

  4. University of Verona, Verona, Italy

    Marco Cristani

  5. Federico II, University of Napoli Federico II, Naples, Italy

    Carlo Sansone

Rights and permissions

Reprints and Permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Buriro, A., Crispo, B., Del Frari, F., Wrona, K. (2015). Touchstroke: Smartphone User Authentication Based on Touch-Typing Biometrics. In: Murino, V., Puppo, E., Sona, D., Cristani, M., Sansone, C. (eds) New Trends in Image Analysis and Processing -- ICIAP 2015 Workshops. ICIAP 2015. Lecture Notes in Computer Science(), vol 9281. Springer, Cham. https://doi.org/10.1007/978-3-319-23222-5_4

Download citation

  • .RIS
  • .ENW
  • .BIB
  • DOI: https://doi.org/10.1007/978-3-319-23222-5_4

  • Published: 21 August 2015

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-23221-8

  • Online ISBN: 978-3-319-23222-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • The International Association for Pattern Recognition

    Published in cooperation with

    http://www.iapr.org/

Over 10 million scientific documents at your fingertips

Switch Edition
  • Academic Edition
  • Corporate Edition
  • Home
  • Impressum
  • Legal information
  • Privacy statement
  • California Privacy Statement
  • How we use cookies
  • Manage cookies/Do not sell my data
  • Accessibility
  • FAQ
  • Contact us
  • Affiliate program

Not logged in - 34.232.63.94

Not affiliated

Springer Nature

© 2023 Springer Nature Switzerland AG. Part of Springer Nature.