Abstract
Mobile devices applied to many businesses applications. Constructing a useful security system for a mobile device is necessary. As to lots of personal information on the mobile device, it must protect completely. Now, the mobile device has many protection mechanisms. However, even we have these mechanisms that still cannot protect someone who wants to use your passcode to intrude private information. The 3D-Touch features use people’s habit and action. According to these functions, we construct them to become a decision tree. In this paper, we will use 3D-Touch techniques to propose an enhanced passcode mechanisms for protection mobile device system. Experimental results show that the method is feasible and efficient.
Keywords
- 3D-touch
- Decision tree
- Machine learning
- Identity recognition
This is a preview of subscription content, access via your institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Rainie, L.: Tablet and e-book reader ownership nearly double over the holiday gift-giving period. Pew Internet. Pew Research Center (2012)
Smith, A.: Nearly half of American adults are smartphone owners. Pew Internet. Pew Research Center (2012)
Hooten, E.R., Hayes, S.T., Adams, J.A.: Communicative modalities for mobile device interaction. Hum. Comput. Stud. 71, 998–1002 (2013)
Kruger, H., Kearney, W.: A prototype for assessing information security awareness. Comput. Secur. 25, 223–229 (2006)
Stirling, D., Pan, Z., Ros, M.: Recognizing human motions through mixture modeling of inertial data Matthew field. Pattern Recognit. 48, 2394–2406 (2015)
Green, N.: Who’s watching whom? Monitoring and accountability in mobile relations. In: Brown, B., Green, N., Harper, R. (eds.) Wireless World. Computer Supported Cooperative Work, pp. 32–45. Springer, London (2002). https://doi.org/10.1007/978-1-4471-0665-4_3
Jones, O., Williams, M., Fleuriot, C.: “A new sense of place?” The implications of mobile wearable ICT devices for the geographies of urban childhood. Child. Geograph. 1(2), 165–180 (2003)
Fox S.: Online Banking. Report of Pew Internet (2013). http://www.pewinternet.org/Reports/2013/online-banking.aspx
Kennedy, N., Sifiso, N.: On privacy calculus and underlying consumer concerns influencing mobile banking subscriptions. In: Information Security for South Africa (ISSA), pp. 1–9, August 2012
Moço, N.F., Correia, P.L., Soares, L.D.: Smartphone-based palmprint recognition system. In: Telecommunications (ICT), pp. 457–461, May 2014
Johansson, G.: Visual motion perception. Sci. Am. 232(6), 76–88 (1975)
Alex, M., Vasilescu, O.: Human motion signatures: analysis, synthesis, recognition. Department of Computer Science, University of Toronto, vol. 3, pp. 456–460. IEEE, August 2002
Lqbal, M.R.A., Rahman, S., Nabil S.I.: Knowledge based decision tree construction with feature importance domain knowledge. In: Electrical Computer Engineering (ICECE), pp. 659–662, December 2012
Clayton, A.: A Practical Guide to Knowledge Acquisition. Addison-Wesley, Reading (1991)
Mitchell, T.M.: Machine Learning. McGraw-Hill, New York (1997)
Mitchell T.M.: Artificial Neural Networks, pp. 81–126. McGraw-Hill Science/Engineering/Math (1997)
Vapnik, V.N.: Statistical Learning Theory. Wiley, New York (1998)
Imam, I.F., Michalski, R.S.: Should decision trees be learned from examples or from decision rules? In: Komorowski, J., Raś, Z.W. (eds.) ISMIS 1993. LNCS, vol. 689, pp. 395–404. Springer, Heidelberg (1993). https://doi.org/10.1007/3-540-56804-2_37
Yukun, C., Yunfeng, L.: An intelligent fuzzy-based recommendation system for consumer electronic products. Expert Syst. Appl. 33, 230–240 (2007)
Acknowledgements
This work was supported by Ministry of Science and Technology, Taiwan, R.O.C. (Grant No. MOST-104-2221-E-324-019-MY2; MOST-106-2221-E-324; MOST-106-2218-E-324-002).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this paper
Cite this paper
Shih, HY., Guo, S., Chen, RC., Peng, CY. (2018). Enhanced Passcode Recognition Based on Press Force and Time Interval. In: Nguyen, N., Hoang, D., Hong, TP., Pham, H., Trawiński, B. (eds) Intelligent Information and Database Systems. ACIIDS 2018. Lecture Notes in Computer Science(), vol 10752. Springer, Cham. https://doi.org/10.1007/978-3-319-75420-8_30
Download citation
DOI: https://doi.org/10.1007/978-3-319-75420-8_30
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-75419-2
Online ISBN: 978-3-319-75420-8
eBook Packages: Computer ScienceComputer Science (R0)