Skip to main content
Top
Published in: Neural Computing and Applications 17/2020

17-02-2020 | Original Article

Machine learning algorithms for improving security on touch screen devices: a survey, challenges and new perspectives

Authors: Auwal Ahmed Bello, Haruna Chiroma, Abdulsalam Ya’u Gital, Lubna A. Gabralla, Shafi’i M. Abdulhamid, Liyana Shuib

Published in: Neural Computing and Applications | Issue 17/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Mobile phone touch screen devices are equipped with high processing power and high memory. This led to users not only storing photos or videos but stored sensitive application such as banking applications. As a result of that the security system of the mobile phone touch screen devices becomes sacrosanct. The application of machine learning algorithms in enhancing security on mobile phone touch screen devices is gaining a tremendous popularity in both academia and the industry. However, notwithstanding the growing popularity, up to date no comprehensive survey has been conducted on machine learning algorithms solutions to improve the security of mobile phone touch screen devices. This survey aims to connect this gap by conducting a comprehensive survey on the solutions of machine learning algorithms to improve the security of mobile phone touch screen devices including the analysis and synthesis of the algorithms and methodologies provided for those solutions. This article presents a comprehensive survey and a new taxonomy of the state-of-the-art literature on machine learning algorithms in improving the security of mobile phone touch screen devices. The limitation of the methodology in each article reviewed is pointed out. Challenges of the existing approaches and new perspective of future research directions for developing more accurate and robust solutions to mobile phone touch screen security are discussed. In particular, the survey found that exploring of different aspects of deep learning solutions to improve the security of mobile phone touch screen devices is under-explored.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Shahzad M, Liu AX, Samuel A (2017) Behavior based human authentication on touch screen devices using gestures and signatures. IEEE Trans Mob Comput 16:2726–2741 Shahzad M, Liu AX, Samuel A (2017) Behavior based human authentication on touch screen devices using gestures and signatures. IEEE Trans Mob Comput 16:2726–2741
2.
go back to reference Ernst M, Swan T, Cheung V, Girouard A (2017) Typhlex: exploring deformable input for blind users controlling a mobile screen reader. IEEE Pervasive Comput 16:28–35 Ernst M, Swan T, Cheung V, Girouard A (2017) Typhlex: exploring deformable input for blind users controlling a mobile screen reader. IEEE Pervasive Comput 16:28–35
3.
go back to reference Lai J, Zhang D (2015) ExtendedThumb: a target acquisition approach for one-handed interaction with touch-screen mobile phones. IEEE Trans Hum–Mach Syst 45:362–370 Lai J, Zhang D (2015) ExtendedThumb: a target acquisition approach for one-handed interaction with touch-screen mobile phones. IEEE Trans Hum–Mach Syst 45:362–370
4.
go back to reference Yu J, Han H, Zhu H, Chen Y, Yang J, Zhu Y et al (2015) Sensing human-screen interaction for energy-efficient frame rate adaptation on smartphones. IEEE Trans Mob Comput 14:1698–1711 Yu J, Han H, Zhu H, Chen Y, Yang J, Zhu Y et al (2015) Sensing human-screen interaction for energy-efficient frame rate adaptation on smartphones. IEEE Trans Mob Comput 14:1698–1711
6.
go back to reference Francese R, Risi M, Tortora G, Tucci M (2016) Visual mobile computing for mobile end-users. IEEE Trans Mob Comput 15:1033–1046 Francese R, Risi M, Tortora G, Tucci M (2016) Visual mobile computing for mobile end-users. IEEE Trans Mob Comput 15:1033–1046
7.
go back to reference Arteaga-Falconi JS, Al Osman H, El Saddik A (2016) ECG authentication for mobile devices. IEEE Trans Instrum Meas 65:591–600 Arteaga-Falconi JS, Al Osman H, El Saddik A (2016) ECG authentication for mobile devices. IEEE Trans Instrum Meas 65:591–600
8.
go back to reference Clark GD, Lindqvist J (2015) Engineering gesture-based authentication systems. IEEE Pervasive Comput 14:18–25 Clark GD, Lindqvist J (2015) Engineering gesture-based authentication systems. IEEE Pervasive Comput 14:18–25
9.
go back to reference Vu T, Baid A, Gao S, Gruteser M, Howard R, Lindqvist J et al (2014) Capacitive touch communication: a technique to input data through devices’ touch screen. IEEE Trans Mob Comput 13:4–19 Vu T, Baid A, Gao S, Gruteser M, Howard R, Lindqvist J et al (2014) Capacitive touch communication: a technique to input data through devices’ touch screen. IEEE Trans Mob Comput 13:4–19
10.
go back to reference Zhao X, Feng T, Shi W, Kakadiaris IA (2014) Mobile user authentication using statistical touch dynamics images. IEEE Trans Inf Forensics Secur 9:1780–1789 Zhao X, Feng T, Shi W, Kakadiaris IA (2014) Mobile user authentication using statistical touch dynamics images. IEEE Trans Inf Forensics Secur 9:1780–1789
11.
go back to reference Smola AJ, Schölkopf B (2004) A tutorial on support vector regression. Stat Comput 14:199–222MathSciNet Smola AJ, Schölkopf B (2004) A tutorial on support vector regression. Stat Comput 14:199–222MathSciNet
13.
go back to reference Zhou L, Burgoon JK, Twitchell DP, Qin T, Nunamaker JF Jr (2004) A comparison of classification methods for predicting deception in computer-mediated communication. J Manag Inf Syst 20:139–166 Zhou L, Burgoon JK, Twitchell DP, Qin T, Nunamaker JF Jr (2004) A comparison of classification methods for predicting deception in computer-mediated communication. J Manag Inf Syst 20:139–166
14.
go back to reference Bishop CM (1995) Neural networks for pattern recognition. Oxford University Press, OxfordMATH Bishop CM (1995) Neural networks for pattern recognition. Oxford University Press, OxfordMATH
15.
go back to reference Kennedy J, Eberhart R (1995) Particle swarm optimization. In: Proceedings of IEEE international conference on neural networks, Piscataway December Kennedy J, Eberhart R (1995) Particle swarm optimization. In: Proceedings of IEEE international conference on neural networks, Piscataway December
16.
go back to reference Venter G, Sobieszczanski-Sobieski J (2003) Particle swarm optimization. AIAA J 41:1583–1589 Venter G, Sobieszczanski-Sobieski J (2003) Particle swarm optimization. AIAA J 41:1583–1589
17.
go back to reference Peterson LE (2009) K-nearest neighbor. Scholarpedia 4:1883 Peterson LE (2009) K-nearest neighbor. Scholarpedia 4:1883
18.
go back to reference Gou J, Du L, Zhang Y, Xiong T (2012) A new distance-weighted k-nearest neighbor classifier. J Inf Comput Sci 9(6):1429–1436 Gou J, Du L, Zhang Y, Xiong T (2012) A new distance-weighted k-nearest neighbor classifier. J Inf Comput Sci 9(6):1429–1436
19.
go back to reference Svetnik V, Liaw A, Tong C, Culberson JC, Sheridan RP, Feuston BP (2003) Random forest: a classification and regression tool for compound classification and QSAR modeling. J Chem Inf Comput Sci 43:1947–1958 Svetnik V, Liaw A, Tong C, Culberson JC, Sheridan RP, Feuston BP (2003) Random forest: a classification and regression tool for compound classification and QSAR modeling. J Chem Inf Comput Sci 43:1947–1958
20.
go back to reference Pal M (2005) Random forest classifier for remote sensing classification. Int J Remote Sens 26(1):217–222 Pal M (2005) Random forest classifier for remote sensing classification. Int J Remote Sens 26(1):217–222
21.
go back to reference Keogh EJ, Pazzani MJ (2001) Derivative dynamic time warping. In: Proceedings of the 2001 SIAM international conference on data mining, pp 1–11 Keogh EJ, Pazzani MJ (2001) Derivative dynamic time warping. In: Proceedings of the 2001 SIAM international conference on data mining, pp 1–11
22.
go back to reference De Luca A, Hang A, Brudy F, Lindner C, Hussmann H (2012) Touch me once and i know it’s you!: implicit authentication based on touch screen patterns. In: Proceedings of the SIGCHI conference on human factors in computing systems, pp 987–996 De Luca A, Hang A, Brudy F, Lindner C, Hussmann H (2012) Touch me once and i know it’s you!: implicit authentication based on touch screen patterns. In: Proceedings of the SIGCHI conference on human factors in computing systems, pp 987–996
23.
go back to reference Youssef AM, Abdel-Galil TK, El-Saadany EF, Salama MMA (2004) Disturbance classification utilizing dynamic time warping classifier. IEEE Trans Power Delivery 19(1):272–278 Youssef AM, Abdel-Galil TK, El-Saadany EF, Salama MMA (2004) Disturbance classification utilizing dynamic time warping classifier. IEEE Trans Power Delivery 19(1):272–278
24.
go back to reference Sahami M (1996) Learning limited dependence bayesian classifiers. In: KDD, pp 335–338 Sahami M (1996) Learning limited dependence bayesian classifiers. In: KDD, pp 335–338
25.
go back to reference Friedman N, Geiger D, Goldszmidt M (1997) Bayesian network classifiers. Mach Learn 29:131–163MATH Friedman N, Geiger D, Goldszmidt M (1997) Bayesian network classifiers. Mach Learn 29:131–163MATH
26.
go back to reference Alpaydin E (2004) Support vector machines. Introd Mach Learn 2004:218–225 Alpaydin E (2004) Support vector machines. Introd Mach Learn 2004:218–225
27.
go back to reference Li F, Clarke N, Papadaki M, Dowland P (2011) Behaviour profiling for transparent authentication for mobile devices. In: Edith Cowan University Research Online, pp 307–314 Li F, Clarke N, Papadaki M, Dowland P (2011) Behaviour profiling for transparent authentication for mobile devices. In: Edith Cowan University Research Online, pp 307–314
28.
go back to reference Campisi P, Maiorana E, Bosco ML, Neri A (2009) User authentication using keystroke dynamics for cellular phones. IET Signal Proc 3(4):333–341 Campisi P, Maiorana E, Bosco ML, Neri A (2009) User authentication using keystroke dynamics for cellular phones. IET Signal Proc 3(4):333–341
29.
go back to reference Kumar P, Saini R, Roy PP, Dogra DP (2017) A bio-signal based framework to secure mobile devices. J Netw Comput Appl 89:62–71 Kumar P, Saini R, Roy PP, Dogra DP (2017) A bio-signal based framework to secure mobile devices. J Netw Comput Appl 89:62–71
30.
go back to reference Van Nguyen T, Sae-Bae N, Memon N (2017) DRAW-A-PIN: authentication using finger-drawn PIN on touch devices. Comput Secur 66:115–128 Van Nguyen T, Sae-Bae N, Memon N (2017) DRAW-A-PIN: authentication using finger-drawn PIN on touch devices. Comput Secur 66:115–128
32.
go back to reference Song Y, Cai Z, Zhang Z-L (2017) Multi-touch authentication using hand geometry and behavioral information. In: 2017 IEEE symposium on security and privacy (SP), pp 357–372 Song Y, Cai Z, Zhang Z-L (2017) Multi-touch authentication using hand geometry and behavioral information. In: 2017 IEEE symposium on security and privacy (SP), pp 357–372
33.
go back to reference Su X, Wang B, Zhang X, Wang Y, Choi D (2018) User biometric information-based secure method for smart devices. Concurr Comput Pract Exp 30:e4150 Su X, Wang B, Zhang X, Wang Y, Choi D (2018) User biometric information-based secure method for smart devices. Concurr Comput Pract Exp 30:e4150
34.
go back to reference Liang Y, Cai Z, Yu J, Han Q, Li Y (2018) Deep learning based inference of private information using embedded sensors in smart devices. IEEE Netw 32:8–14 Liang Y, Cai Z, Yu J, Han Q, Li Y (2018) Deep learning based inference of private information using embedded sensors in smart devices. IEEE Netw 32:8–14
35.
go back to reference Shen S-S, Kang T-H, Lin S-H, Chien W (2017) Random graphic user password authentication scheme in mobile devices. In: 2017 International conference on applied system innovation (ICASI), pp 1251–1254 Shen S-S, Kang T-H, Lin S-H, Chien W (2017) Random graphic user password authentication scheme in mobile devices. In: 2017 International conference on applied system innovation (ICASI), pp 1251–1254
36.
go back to reference Mehrnezhad M, Toreini E, Shahandashti SF, Hao F (2018) Stealing PINs via mobile sensors: actual risk versus user perception. Int J Inf Secur 17:291–313 Mehrnezhad M, Toreini E, Shahandashti SF, Hao F (2018) Stealing PINs via mobile sensors: actual risk versus user perception. Int J Inf Secur 17:291–313
37.
go back to reference Pitropakis N, Panaousis E, Giannetsos T, Anastasiadis E, Loukas G (2019) A taxonomy and survey of attacks against machine learning. Comput Sci Rev 34:100199MathSciNet Pitropakis N, Panaousis E, Giannetsos T, Anastasiadis E, Loukas G (2019) A taxonomy and survey of attacks against machine learning. Comput Sci Rev 34:100199MathSciNet
38.
go back to reference Banerjee N, Giannetsos T, Panaousis E, Took CC (2018) Unsupervised Learning for Trustworthy IoT. In: 2018 IEEE international conference on fuzzy systems (FUZZ-IEEE), pp 1–8 Banerjee N, Giannetsos T, Panaousis E, Took CC (2018) Unsupervised Learning for Trustworthy IoT. In: 2018 IEEE international conference on fuzzy systems (FUZZ-IEEE), pp 1–8
39.
go back to reference Chen B, Carvalho W, Baracaldo N, Ludwig H, Edwards B, Lee T et al (2018) Detecting backdoor attacks on deep neural networks by activation clustering. arXiv preprint arXiv:1811.03728 Chen B, Carvalho W, Baracaldo N, Ludwig H, Edwards B, Lee T et al (2018) Detecting backdoor attacks on deep neural networks by activation clustering. arXiv preprint arXiv:​1811.​03728
40.
go back to reference Barreno M, Nelson B, Joseph AD, Tygar JD (2010) The security of machine learning. Mach Learn 81:121–148MathSciNet Barreno M, Nelson B, Joseph AD, Tygar JD (2010) The security of machine learning. Mach Learn 81:121–148MathSciNet
41.
go back to reference Zhou Y, Wang Z, Zhou W, Jiang X (2012) Hey, you, get off of my market: detecting malicious apps in official and alternative android markets. In: NDSS, pp 50–52 Zhou Y, Wang Z, Zhou W, Jiang X (2012) Hey, you, get off of my market: detecting malicious apps in official and alternative android markets. In: NDSS, pp 50–52
42.
go back to reference Abubakar AI, Chiroma H, Muaz SA, Ila LB (2015) A review of the advances in cyber security benchmark datasets for evaluating data-driven based intrusion detection systems. Procedia Comput Sci 62:221–227 Abubakar AI, Chiroma H, Muaz SA, Ila LB (2015) A review of the advances in cyber security benchmark datasets for evaluating data-driven based intrusion detection systems. Procedia Comput Sci 62:221–227
43.
go back to reference Shahzad M, Liu AX, Samuel A (2013) Secure unlocking of mobile touch screen devices by simple gestures: you can see it but you can not do it. In: Proceedings of the 19th annual international conference on mobile computing and networking, pp 39–50 Shahzad M, Liu AX, Samuel A (2013) Secure unlocking of mobile touch screen devices by simple gestures: you can see it but you can not do it. In: Proceedings of the 19th annual international conference on mobile computing and networking, pp 39–50
44.
go back to reference Engelstad P, Feng B, van Do T (2016) Strengthening mobile network security using machine learning. In: International conference on mobile web and information systems, pp 173–183 Engelstad P, Feng B, van Do T (2016) Strengthening mobile network security using machine learning. In: International conference on mobile web and information systems, pp 173–183
45.
go back to reference Frank M, Biedert R, Ma E, Martinovic I, Song D (2013) Touchalytics: on the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE Trans Inf Forensics Secur 8:136–148 Frank M, Biedert R, Ma E, Martinovic I, Song D (2013) Touchalytics: on the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE Trans Inf Forensics Secur 8:136–148
46.
go back to reference Bo C, Zhang L, Li X-Y, Huang Q, Wang Y (2013) Silentsense: silent user identification via touch and movement behavioral biometrics. In: Proceedings of the 19th annual international conference on Mobile computing and networking, pp 187–190 Bo C, Zhang L, Li X-Y, Huang Q, Wang Y (2013) Silentsense: silent user identification via touch and movement behavioral biometrics. In: Proceedings of the 19th annual international conference on Mobile computing and networking, pp 187–190
47.
go back to reference Saravanan P, Clarke S, Chau DHP, Zha H (2014) Latentgesture: active user authentication through background touch analysis. In: Proceedings of the second international symposium of Chinese CHI, pp 110–113 Saravanan P, Clarke S, Chau DHP, Zha H (2014) Latentgesture: active user authentication through background touch analysis. In: Proceedings of the second international symposium of Chinese CHI, pp 110–113
48.
go back to reference Ehatisham-ul-Haq M, Azam MA, Naeem U, Amin Y, Loo J (2018) Continuous authentication of smartphone users based on activity pattern recognition using passive mobile sensing. J Netw Comput Appl 109:24–35 Ehatisham-ul-Haq M, Azam MA, Naeem U, Amin Y, Loo J (2018) Continuous authentication of smartphone users based on activity pattern recognition using passive mobile sensing. J Netw Comput Appl 109:24–35
49.
go back to reference Burgbacher U, Hinrichs K(2014) An implicit author verification system for text messages based on gesture typing biometrics. In: Proceedings of the SIGCHI conference on human factors in computing systems, pp 2951–2954 Burgbacher U, Hinrichs K(2014) An implicit author verification system for text messages based on gesture typing biometrics. In: Proceedings of the SIGCHI conference on human factors in computing systems, pp 2951–2954
50.
go back to reference Chen Y, Sun J, Zhang R, Zhang Y (2015) Your song your way: rhythm-based two-factor authentication for multi-touch mobile devices. In: 2015 IEEE conference on computer communications (INFOCOM), pp 2686–2694 Chen Y, Sun J, Zhang R, Zhang Y (2015) Your song your way: rhythm-based two-factor authentication for multi-touch mobile devices. In: 2015 IEEE conference on computer communications (INFOCOM), pp 2686–2694
51.
go back to reference Xu H, Zhou Y, Lyu MR (2014) Towards continuous and passive authentication via touch biometrics: An experimental study on smartphones. In: Symposium on usable privacy and security, SOUPS, pp 187–198 Xu H, Zhou Y, Lyu MR (2014) Towards continuous and passive authentication via touch biometrics: An experimental study on smartphones. In: Symposium on usable privacy and security, SOUPS, pp 187–198
52.
go back to reference Zhang D, Kang Y, Zhou L, Lai J (2016) Continuous user authentication on touch-screen mobile phones: toward more secure and usable M-commerce. In: Workshop on E-business, pp 225–236 Zhang D, Kang Y, Zhou L, Lai J (2016) Continuous user authentication on touch-screen mobile phones: toward more secure and usable M-commerce. In: Workshop on E-business, pp 225–236
53.
go back to reference Kambourakis G, Damopoulos D, Papamartzivanos D, Pavlidakis E (2016) Introducing touchstroke: keystroke-based authentication system for smartphones. Secur Commun Netw 9:542–554 Kambourakis G, Damopoulos D, Papamartzivanos D, Pavlidakis E (2016) Introducing touchstroke: keystroke-based authentication system for smartphones. Secur Commun Netw 9:542–554
54.
go back to reference Lin C-C, Chang C-C, Liang D, Yang C-H (2012) A new non-intrusive authentication method based on the orientation sensor for smartphone users. In: 2012 IEEE sixth international conference on software security and reliability (SERE), pp 245–252 Lin C-C, Chang C-C, Liang D, Yang C-H (2012) A new non-intrusive authentication method based on the orientation sensor for smartphone users. In: 2012 IEEE sixth international conference on software security and reliability (SERE), pp 245–252
55.
go back to reference Buczak AL, Guven E (2016) A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun Surv Tutor 18:1153–1176 Buczak AL, Guven E (2016) A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun Surv Tutor 18:1153–1176
56.
go back to reference Buschek D, De Luca A, Alt F (2015) Improving accuracy, applicability and usability of keystroke biometrics on mobile touchscreen devices. In: Proceedings of the 33rd annual ACM conference on human factors in computing systems, pp 1393–1402 Buschek D, De Luca A, Alt F (2015) Improving accuracy, applicability and usability of keystroke biometrics on mobile touchscreen devices. In: Proceedings of the 33rd annual ACM conference on human factors in computing systems, pp 1393–1402
57.
go back to reference Feng T, Liu Z, Kwon K-A, Shi W, Carbunar B, Jiang Y et al (2012) Continuous mobile authentication using touchscreen gestures. In: 2012 IEEE conference on technologies for homeland security (HST), pp 451–456 Feng T, Liu Z, Kwon K-A, Shi W, Carbunar B, Jiang Y et al (2012) Continuous mobile authentication using touchscreen gestures. In: 2012 IEEE conference on technologies for homeland security (HST), pp 451–456
58.
go back to reference Feng T, Zhao X, Carbunar B, Shi W (2013) Continuous mobile authentication using virtual key typing biometrics. In: 2013 12th IEEE international conference on trust, security and privacy in computing and communications (TrustCom), pp 1547–1552 Feng T, Zhao X, Carbunar B, Shi W (2013) Continuous mobile authentication using virtual key typing biometrics. In: 2013 12th IEEE international conference on trust, security and privacy in computing and communications (TrustCom), pp 1547–1552
60.
go back to reference Kolly SM, Wattenhofer R, Welten S (2012) A personal touch: recognizing users based on touch screen behavior. In: Proceedings of the third international workshop on sensing applications on mobile phones, p 1 Kolly SM, Wattenhofer R, Welten S (2012) A personal touch: recognizing users based on touch screen behavior. In: Proceedings of the third international workshop on sensing applications on mobile phones, p 1
62.
go back to reference Antal M, Szabó LZ (2016) Biometric authentication based on touchscreen swipe patterns. Procedia Technol 22:862–869 Antal M, Szabó LZ (2016) Biometric authentication based on touchscreen swipe patterns. Procedia Technol 22:862–869
63.
go back to reference Alpar O (2015) Intelligent biometric pattern password authentication systems for touchscreens. Expert Syst Appl 42:6286–6294 Alpar O (2015) Intelligent biometric pattern password authentication systems for touchscreens. Expert Syst Appl 42:6286–6294
64.
go back to reference Zhou L, Kang Y, Zhang D, Lai J (2016) Harmonized authentication based on ThumbStroke dynamics on touch screen mobile phones. Decis Support Syst 92:14–24 Zhou L, Kang Y, Zhang D, Lai J (2016) Harmonized authentication based on ThumbStroke dynamics on touch screen mobile phones. Decis Support Syst 92:14–24
65.
go back to reference Alpar O, Krejcar O (2015) Pattern password authentication based on touching location. In: International conference on intelligent data engineering and automated learning, pp 395–403 Alpar O, Krejcar O (2015) Pattern password authentication based on touching location. In: International conference on intelligent data engineering and automated learning, pp 395–403
66.
go back to reference Beton M, Marie V, Rosenberger C (2013) Biometric secret path for mobile user authentication: a preliminary study. In: 2013 World congress on computer and information technology (WCCIT), pp 1–6 Beton M, Marie V, Rosenberger C (2013) Biometric secret path for mobile user authentication: a preliminary study. In: 2013 World congress on computer and information technology (WCCIT), pp 1–6
67.
go back to reference Nader J, Alsadoon A, Prasad P, Singh A, Elchouemi A (2015) Designing touch-based hybrid authentication method for smartphones. Procedia Comput Sci 70:198–204 Nader J, Alsadoon A, Prasad P, Singh A, Elchouemi A (2015) Designing touch-based hybrid authentication method for smartphones. Procedia Comput Sci 70:198–204
68.
go back to reference Meng W, Wang Y, Wong DS, Wen S, Xiang Y (2018) TouchWB: touch behavioral user authentication based on web browsing on smartphones. J Netw Comput Appl 117:1–9 Meng W, Wang Y, Wong DS, Wen S, Xiang Y (2018) TouchWB: touch behavioral user authentication based on web browsing on smartphones. J Netw Comput Appl 117:1–9
69.
go back to reference Meng Y, Wong DS, Schlegel R (2012) Touch gestures based biometric authentication scheme for touchscreen mobile phones. In: International conference on information security and cryptology, pp 331–350 Meng Y, Wong DS, Schlegel R (2012) Touch gestures based biometric authentication scheme for touchscreen mobile phones. In: International conference on information security and cryptology, pp 331–350
70.
go back to reference Meng Y, Wong DS (2014) Design of touch dynamics based user authentication with an adaptive mechanism on mobile phones. In: Proceedings of the 29th annual ACM symposium on applied computing, pp 1680–1687 Meng Y, Wong DS (2014) Design of touch dynamics based user authentication with an adaptive mechanism on mobile phones. In: Proceedings of the 29th annual ACM symposium on applied computing, pp 1680–1687
71.
go back to reference Samangouei P, Patel VM, Chellappa R (2017) Facial attributes for active authentication on mobile devices. Image Vis Comput 58:181–192 Samangouei P, Patel VM, Chellappa R (2017) Facial attributes for active authentication on mobile devices. Image Vis Comput 58:181–192
72.
go back to reference Feng T, Yang J, Yan Z, Tapia EM, Shi W (2014) Tips: context-aware implicit user identification using touch screen in uncontrolled environments. In: Proceedings of the 15th workshop on mobile computing systems and applications, p 9 Feng T, Yang J, Yan Z, Tapia EM, Shi W (2014) Tips: context-aware implicit user identification using touch screen in uncontrolled environments. In: Proceedings of the 15th workshop on mobile computing systems and applications, p 9
73.
go back to reference Watanabe Y (2014) Influence of holding smart phone for acceleration-based gait authentication. In: 2014 Fifth international conference on emerging security technologies (EST), pp 30–33 Watanabe Y (2014) Influence of holding smart phone for acceleration-based gait authentication. In: 2014 Fifth international conference on emerging security technologies (EST), pp 30–33
74.
go back to reference Crawford H, Renaud K, Storer T (2013) A framework for continuous, transparent mobile device authentication. Comput Secur 39:127–136 Crawford H, Renaud K, Storer T (2013) A framework for continuous, transparent mobile device authentication. Comput Secur 39:127–136
75.
go back to reference Mahbub U, Sarkar S, Patel VM, Chellappa R (2016) Active user authentication for smartphones: a challenge data set and benchmark results. In: 2016 IEEE 8th international conference on biometrics theory, applications and systems (BTAS), pp 1–8 Mahbub U, Sarkar S, Patel VM, Chellappa R (2016) Active user authentication for smartphones: a challenge data set and benchmark results. In: 2016 IEEE 8th international conference on biometrics theory, applications and systems (BTAS), pp 1–8
76.
go back to reference Roy A, Halevi T, Memon N (2014) An HMM-based behavior modeling approach for continuous mobile authentication. In: 2014 IEEE international conference on acoustics, speech and signal processing (ICASSP), pp 3789–3793 Roy A, Halevi T, Memon N (2014) An HMM-based behavior modeling approach for continuous mobile authentication. In: 2014 IEEE international conference on acoustics, speech and signal processing (ICASSP), pp 3789–3793
77.
go back to reference Fathy ME, Patel VM, Chellappa R (2015) Face-based active authentication on mobile devices. In: 2015 IEEE international conference on acoustics, speech and signal processing (ICASSP), pp 1687–1691 Fathy ME, Patel VM, Chellappa R (2015) Face-based active authentication on mobile devices. In: 2015 IEEE international conference on acoustics, speech and signal processing (ICASSP), pp 1687–1691
78.
go back to reference Jain A, Kanhangad V (2015) Exploring orientation and accelerometer sensor data for personal authentication in smartphones using touchscreen gestures. Pattern Recogn Lett 68:351–360 Jain A, Kanhangad V (2015) Exploring orientation and accelerometer sensor data for personal authentication in smartphones using touchscreen gestures. Pattern Recogn Lett 68:351–360
79.
go back to reference Serwadda A, Phoha VV, Wang Z (2013) Which verifiers work? A benchmark evaluation of touch-based authentication algorithms. In: 2013 IEEE sixth international conference on biometrics: theory, applications and systems (BTAS), pp 1–8 Serwadda A, Phoha VV, Wang Z (2013) Which verifiers work? A benchmark evaluation of touch-based authentication algorithms. In: 2013 IEEE sixth international conference on biometrics: theory, applications and systems (BTAS), pp 1–8
80.
go back to reference Sitová Z, Šeděnka J, Yang Q, Peng G, Zhou G, Gasti P et al (2016) HMOG: New behavioral biometric features for continuous authentication of smartphone users. IEEE Trans Inf Forensics Secur 11:877–892 Sitová Z, Šeděnka J, Yang Q, Peng G, Zhou G, Gasti P et al (2016) HMOG: New behavioral biometric features for continuous authentication of smartphone users. IEEE Trans Inf Forensics Secur 11:877–892
81.
go back to reference Renear AH, Sacchi S, Wickett KM (2010) Definitions of dataset in the scientific and technical literature. In: Proceedings of the 73rd ASIS&T annual meeting on navigating streams in an information ecosystem, vol 47, p 81 Renear AH, Sacchi S, Wickett KM (2010) Definitions of dataset in the scientific and technical literature. In: Proceedings of the 73rd ASIS&T annual meeting on navigating streams in an information ecosystem, vol 47, p 81
82.
go back to reference Snijders C, Matzat U, Reips U-D (2012) “ Big Data”: big gaps of knowledge in the field of internet science. Int J Internet Sci 7:1–5 Snijders C, Matzat U, Reips U-D (2012) “ Big Data”: big gaps of knowledge in the field of internet science. Int J Internet Sci 7:1–5
83.
go back to reference He F, Bao L, Wang R, Li J, Xu D, Zhao X (2017) A multimodal deep architecture for large-scale protein ubiquitylation site prediction. In 2017 IEEE international conference on bioinformatics and biomedicine (BIBM), pp 108–113 He F, Bao L, Wang R, Li J, Xu D, Zhao X (2017) A multimodal deep architecture for large-scale protein ubiquitylation site prediction. In 2017 IEEE international conference on bioinformatics and biomedicine (BIBM), pp 108–113
84.
go back to reference Ibrahim R, Yousri NA, Ismail MA, El-Makky NM (2014) Multi-level gene/MiRNA feature selection using deep belief nets and active learning. In: 2014 36th annual international conference of the IEEE engineering in medicine and biology society (EMBC), pp 3957–3960 Ibrahim R, Yousri NA, Ismail MA, El-Makky NM (2014) Multi-level gene/MiRNA feature selection using deep belief nets and active learning. In: 2014 36th annual international conference of the IEEE engineering in medicine and biology society (EMBC), pp 3957–3960
85.
go back to reference Yang X-S, Deb S, Fong S (2011) Accelerated particle swarm optimization and support vector machine for business optimization and applications. In: International conference on networked digital technologies, pp 53–66 Yang X-S, Deb S, Fong S (2011) Accelerated particle swarm optimization and support vector machine for business optimization and applications. In: International conference on networked digital technologies, pp 53–66
86.
go back to reference Zhang X, Wang J, Zhang K (2017) Short-term electric load forecasting based on singular spectrum analysis and support vector machine optimized by Cuckoo search algorithm. Electr Power Syst Res 146:270–285 Zhang X, Wang J, Zhang K (2017) Short-term electric load forecasting based on singular spectrum analysis and support vector machine optimized by Cuckoo search algorithm. Electr Power Syst Res 146:270–285
87.
go back to reference Tomar D, Agarwal S (2015) Twin support vector machine: a review from 2007 to 2014. Egypt Inform J 16:55–69 Tomar D, Agarwal S (2015) Twin support vector machine: a review from 2007 to 2014. Egypt Inform J 16:55–69
89.
go back to reference Zhang Q, Yang LT, Chen Z, Li P (2018) A survey on deep learning for big data. Inf Fusion 42:146–157 Zhang Q, Yang LT, Chen Z, Li P (2018) A survey on deep learning for big data. Inf Fusion 42:146–157
90.
go back to reference Wang H, Raj B (2015) A survey: time travel in deep learning space: an introduction to deep learning models and how deep learning models evolved from the initial ideas. arXiv preprint arXiv:1510.04781 Wang H, Raj B (2015) A survey: time travel in deep learning space: an introduction to deep learning models and how deep learning models evolved from the initial ideas. arXiv preprint arXiv:​1510.​04781
Metadata
Title
Machine learning algorithms for improving security on touch screen devices: a survey, challenges and new perspectives
Authors
Auwal Ahmed Bello
Haruna Chiroma
Abdulsalam Ya’u Gital
Lubna A. Gabralla
Shafi’i M. Abdulhamid
Liyana Shuib
Publication date
17-02-2020
Publisher
Springer London
Published in
Neural Computing and Applications / Issue 17/2020
Print ISSN: 0941-0643
Electronic ISSN: 1433-3058
DOI
https://doi.org/10.1007/s00521-020-04775-0

Other articles of this Issue 17/2020

Neural Computing and Applications 17/2020 Go to the issue

Premium Partner