Abstract
This section discusses the concept of biometrics and the requirements generally needed for a biometric used for authentication. Then the different physiological and behavioural modalities used in continuous biometric authentication systems are discussed. Then, multibiometrics and systems where they are used are surveyed. Finally, the chapter ends with a summary of the biometrics discussed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
However, some estimates have been made. Francis Galton estimated that two fingerprints from two people had a chance of 1 in 64 billion of matching [118], but the true figures are not known.
- 2.
- 3.
- 4.
- 5.
References
Abate, A.F., Nappi, M., Ricciardi, S.: I-am: Implicitly authenticate me—person authentication on mobile devices through ear shape and arm gesture. IEEE Trans. Syst. Man Cybernet. Syst. 49(3), 469–481 (2019)
Abrams, R., Meyer, D., Kornblum, S.: Speed and accuracy of saccadic eye movements: characteristics of impulse variability in the oculomotor system. J. Experimen. Psychol. Human Percept. Perform. 15, 529–43 (1989)
Abuhamad, M., Abusnaina, A., Nyang, D., Mohaisen, D.: Sensor-based continuous authentication of smartphones’ users using behavioral biometrics: a contemporary survey. IEEE Int. Things J. 8(1), 65–84 (2021)
Al Abdulwahid, A., Clarke, N., Stengel, I., Furnell, S., Reich, C.: Continuous and transparent multimodal authentication: reviewing the state of the art. Cluster Comput. 19(1), 455–474 (2016)
Al-Naffakh, N., Clarke, N., Li, F., Haskell-Dowland, P.: Unobtrusive gait recognition using smartwatches. In: 2017 International Conference of the Biometrics Special Interest Group (BIOSIG), pp. 1–5 (2017)
Al Solami, E., Boyd, C., Clark, A., Islam, A.K.: Continuous biometric authentication: Can it be more practical? In: 2010 IEEE 12th International Conference on High Performance Computing and Communications (HPCC), pp. 647–652 (2010)
AlGhatrif, M., Lindsay, J.: A brief review: history to understand fundamentals of electrocardiography. J. Commun. Hosp. Intern. Med. Perspect. 2(1), (2012). https://doi.org/10.3402/jchimp.v2i1.14383. 23882360[pmid]
Ali Fahmi, P., Kodirov, E., Choi, D.J., Lee, G.S., Mohd Fikri Azli, A., Sayeed, S.: Implicit authentication based on ear shape biometrics using smartphone camera during a call. In: 2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 2272–2276 (2012)
Almalki, S., Chatterjee, P., Roy, K.: Continuous authentication using mouse clickstream data analysis. In: Security, Privacy, and Anonymity in Computation, Communication, and Storage: SpaCCS 2019 International Workshops, Atlanta, GA, USA, July 14–17, 2019, Proceedings 12, pp. 76–85. Springer, Berlin (2019)
Alobaidi, H., Clarke, N., Li, F., Alruban, A.: Real-world smartphone-based gait recognition. Comput. Security 113, 102557 (2022)
Antal, M., Bokor, Z., Szabó, L.Z.: Information revealed from scrolling interactions on mobile devices. Pattern Recog. Lett. 56, 7–13 (2015)
Aristotle: On the Gait of Animals. Kessinger Publishing, Whitefish (2004)
Arteaga-Falconi, J.S., Al Osman, H., El Saddik, A.: ECG authentication for mobile devices. IEEE Trans. Instrument. Measurem. 65(3), 591–600 (2016)
Ayotte, B., Banavar, M., Hou, D., Schuckers, S.: Fast free-text authentication via instance-based keystroke dynamics. IEEE Trans. Biometr. Behavior Ident. Sci. 2(4), 377–387 (2020)
Bertillon, A.: La photographie judiciaire: avec un appendice sur la classification et l’identification anthropométriques. Gauthier-Villars, Paris (1890)
Bertillon, A., McClaughry, R.W.: Signaletic Instructions Including the Theory and Practice of Anthropometrical Identification. Werner Company, Itasca (1896)
Betts, J.G., Desaix, P., Johnson, E.: Anatomy and Physiology. OpenStax, Houston (2013)
Bevan, C., Fraser, D.S.: Different strokes for different folks? Revealing the physical characteristics of smartphone users from their swipe gestures. Int. J. Human-Comput. Stud. 88, 51–61 (2016)
Biel, L., Pettersson, O., Philipson, L., Wide, P.: Ecg analysis: a new approach in human identification. IEEE Trans. Instrum. Meas. 50(3), 808–812 (2001)
Bonissi, A., Labati, R.D., Perico, L., Sassi, R., Scotti, F., Sparagino, L.: A preliminary study on continuous authentication methods for photoplethysmography biometrics. In: 2013 IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications, pp. 28–33 (2013)
Bours, P., Barghouthi, H.: Continuous authentication using biometric keystroke dynamics. In: The Norwegian Information Security Conference (NISK), vol. 2009, pp. 1–12 (2009)
Buker, A.A.N., Roffo, G., Vinciarelli, A.: Type like a man! inferring gender from keystroke dynamics in live-chats. IEEE Intell. Syst. 34(6), 53–59 (2019)
Burgbacher, U., Hinrichs, K.: An implicit author verification system for text messages based on gesture typing biometrics. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI ’14, p. 2951–2954. Association for Computing Machinery, New York (2014)
Camara, C., Peris-Lopez, P., Gonzalez-Manzano, L., Tapiador, J.: Real-time electrocardiogram streams for continuous authentication. Appl. Soft Comput. 68, 784–794 (2018)
Cheng, Y., Ji, X., Li, X., Zhang, T., Malebary, S., Qu, X., Xu, W.: Identifying child users via touchscreen interactions. ACM Trans. Sen. Netw. 16(4), 1–25 (2020)
Clarke, N.: Transparent User Authentication: Biometrics, RFID and Behavioural Profiling, 1st edn. Springer Publishing Company, New York (2011)
Clarke, N.L., Furnell, S.M.: Authenticating mobile phone users using keystroke analysis. Int. J. Inf. Secur. 6(1), 1–14 (2007)
Clarke, N., Karatzouni, S., Furnell, S.: Transparent facial recognition for mobile devices. In: Proceedings of the 7th Security Conference, pp. 1–13 (2008)
Cook, H.I., Harrison, K., James, H.: Individuals lacking ridge detail: a case study in adermatoglyphia. J. For. Sci. 66(1), 202–208 (2021)
Crawford, H.: Keystroke dynamics: Characteristics and opportunities. In: 2010 Eighth International Conference on Privacy, Security and Trust, pp. 205–212 (2010)
Crouse, D., Han, H., Chandra, D., Barbello, B., Jain, A.K.: Continuous authentication of mobile user: Fusion of face image and inertial measurement unit data. In: 2015 International Conference on Biometrics (ICB), pp. 135–142 (2015)
da Silva, H.P., Fred, A., Lourenço, A., Jain, A.K.: Finger ECG signal for user authentication: Usability and performance. In: 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS), pp. 1–8 (2013)
Daugman, J.: Statistical demands of identification versus verification. https://www.cl.cam.ac.uk/~jgd1000/veri/veri.html
Daugman, J.: How iris recognition works. IEEE Trans. Circuits Syst. Video Technol. 14(1), 21–30 (2004)
Eberz, S., Paoletti, N., Roeschlin, M., Kwiatkowska, M., Martinovic, I., Patané, A.: Broken hearted: How to attack ECG biometrics. In: Network and Distributed System Security Symposium 2017 (2017)
Eberz, S., Lovisotto, G., Rasmussen, K.B., Lenders, V., Martinovic, I.: 28 blinks later: Tackling practical challenges of eye movement biometrics. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, CCS ’19, pp. 1187–1199. Association for Computing Machinery, New York (2019)
Eberz, S., Rasmussen, K.B., Lenders, V., Martinovic, I.: Preventing lunchtime attacks: Fighting insider threats with eye movement biometrics. In: 22nd Annual Network and Distributed System Security Symposium, NDSS 2015, San Diego, California, USA, February 8–11, 2014. The Internet Society, Reston (2015)
Eglitis, T., Guest, R., Deravi, F.: Data behind mobile behavioural biometrics – a survey. IET Biom. 9, 224–237(13) (2020)
Engelbart, D.C.: XY position indicator for a display system. US Patent 3(541), 541 (1970)
Fathy, M.E., Patel, V.M., Chellappa, R.: Face-based active authentication on mobile devices. In: 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1687–1691 (2015)
Feng, H., Fawaz, K., Shin, K.G.: Continuous authentication for voice assistants. In: Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking, MobiCom ’17, p. 343–355. Association for Computing Machinery, New York (2017)
Fenu, G., Marras, M., Boratto, L.: A multi-biometric system for continuous student authentication in e-learning platforms. Pattern Recogn. Lett. 113, 83–92 (2018). Integrating Biometrics and Forensics
Fierrez, J., Pozo, A., Martinez-Diaz, M., Galbally, J., Morales, A.: Benchmarking touchscreen biometrics for mobile authentication. IEEE Trans. Inf. Forensics Secur. 13(11), 2720–2733 (2018)
Frank, M., Biedert, R., Ma, E., Martinovic, I., Song, D.: Touchalytics: on the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE Trans. Inf. Forensics Secur. 8(1), 136–148 (2013)
Fridman, L., Stolerman, A., Acharya, S., Brennan, P., Juola, P., Greenstadt, R., Kam, M.: Multi-modal decision fusion for continuous authentication. Comput. Electr. Eng. 41, 142–156 (2015)
Fridman, L., Weber, S., Greenstadt, R., Kam, M.: Active authentication on mobile devices via stylometry, application usage, web browsing, and GPS location. IEEE Syst. J. 11(2), 513–521 (2017)
Gafurov, D.: A survey of biometric gait recognition: Approaches, security and challenges. In: Annual Norwegian Computer Science Conference, pp. 19–21. Annual Norwegian Computer Science Conference Norway (2007)
Galdi, C., Nappi, M., Riccio, D., Wechsler, H.: Eye movement analysis for human authentication: a critical survey. Pattern Recogn. Lett. 84, 272–283 (2016)
Gamon, M.: Linguistic correlates of style: Authorship classification with deep linguistic analysis features. International Conference on Computational Linguistics (2004)
Gao, Y., Wang, W., Phoha, V.V., Sun, W., Jin, Z.: EarEcho: Using ear canal echo for wearable authentication. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 3(3), 1–24 (2019)
Gunetti, D., Picardi, C.: Keystroke analysis of free text. ACM Trans. Inf. Syst. Secur. 8(3), 312–347 (2005)
Gunetti, D., Picardi, C., Ruffo, G.: Dealing with different languages and old profiles in keystroke analysis of free text. In: Proceedings of the 9th Conference on Advances in Artificial Intelligence, AI*IA’05, p. 347–358. Springer, Berlin (2005)
Haasnoot, E., Barnhoorrr, J., Spreeuwers, L., Veldhuis, R., Verwey, W.: Towards understanding the effects of practice on behavioural biometric recognition performance. In: 2018 26th European Signal Processing Conference (EUSIPCO), pp. 558–562 (2018)
Halterman, M.W.: Neuroscience, 3rd edition. Neurology 64(4), 769–769–a (2005)
He, M., Horng, S.J., Fan, P., Run, R.S., Chen, R.J., Lai, J.L., Khan, M.K., Sentosa, K.O.: Performance evaluation of score level fusion in multimodal biometric systems. Pattern Recogn. 43(5), 1789–1800 (2010)
Holland, C., Komogortsev, O.V.: Biometric identification via eye movement scanpaths in reading. In: 2011 International Joint Conference on Biometrics (IJCB), pp. 1–8 (2011)
Holland, C.D., Komogortsev, O.V.: Complex eye movement pattern biometrics: Analyzing fixations and saccades. In: 2013 International Conference on Biometrics (ICB), pp. 1–8 (2013)
Hoppe, S., Loetscher, T., Morey, S.A., Bulling, A.: Eye movements during everyday behavior predict personality traits. Front. Hum. Neurosci. 12, 105 (2018)
Huang, J., Hou, D., Schuckers, S., Law, T., Sherwin, A.: Benchmarking keystroke authentication algorithms. In: 2017 IEEE Workshop on Information Forensics and Security (WIFS), pp. 1–6 (2017)
Hurley, D.J., Arbab-Zavar, B., Nixon, M.S.: The ear as a biometric. In: 2007 15th European Signal Processing Conference, pp. 25–29. IEEE, Piscataway (2007)
Ingale, M., Cordeiro, R., Thentu, S., Park, Y., Karimian, N.: ECG biometric authentication: a comparative analysis. IEEE Access 8, 117853–117866 (2020)
Jain, A.K., Ross, A., Prabhakar, S.: An introduction to biometric recognition. IEEE Trans. Circuits Syst. Video Technol. 14(1), 4–20 (2004)
Jain, A., Nandakumar, K., Ross, A.: Score normalization in multimodal biometric systems. Pattern Recogn. 38(12), 2270–2285 (2005)
Jain, A.K., Ross, A.A., Nandakumar, K.: Introduction to Biometrics. Springer Publishing Company, New York (2011)
Jiangyu, L., Yinggang, X., Hui, W., Guangjun, L.: A face recognition system based on improved convolutional neural network. In: Proceedings of the 2019 2nd International Conference on Algorithms, Computing and Artificial Intelligence, ACAI ’19, pp. 230–235. Association for Computing Machinery, New York (2020)
Kahn, D.: The Codebreakers: The Story of Secret Writing. Macmillan, New York (1967)
Kanwisher, N., McDermott, J., Chun, M.M.: The fusiform face area: a module in human extrastriate cortex specialized for face perception. J. Neurosci. 17(11), 4302–4311 (1997). https://doi.org/10.1523/JNEUROSCI.17-11-04302.1997
Kasprowski, P., Ober, J.: Eye movements in biometrics. In: Maltoni, D., Jain, A.K. (eds.) Biometric Authentication, pp. 248–258. Springer, Berlin (2004)
Kayacik, H.G., Just, M., Baillie, L., Aspinall, D., Micallef, N.: Data driven authentication: On the effectiveness of user behaviour modelling with mobile device sensors (2014). Preprint arXiv:1410.7743
Klosterman, A.J., Ganger, G.R.: Secure continuous biometric-enhanced authentication (CMU-CS-00-134) (2001)
Korshunov, P., Marcel, S.: Vulnerability assessment and detection of deepfake videos. In: 2019 International Conference on Biometrics (ICB), pp. 1–6 (2019)
Kumar, R., Kundu, P.P., Phoha, V.V.: Continuous authentication using one-class classifiers and their fusion. In: 2018 IEEE 4th International Conference on Identity, Security, and Behavior Analysis (ISBA), pp. 1–8 (2018)
Leliveld, L.M.C.: From science to practice: a review of laterality research on ungulate livestock. Symmetry 11(9), 1157 (2019)
Lu, C., Tang, X.: Surpassing human-level face verification performance on LFW with Gaussian face. In: Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, AAAI’15, p. 3811–3819. AAAI Press, Washington (2015)
Lu, H., Bernheim Brush, A., Priyantha, B., Karlson, A.K., Liu, J.: SpeakerSense: Energy efficient unobtrusive speaker identification on mobile phones. In: Pervasive Computing: 9th International Conference, Pervasive 2011, San Francisco, USA, June 12–15, 2011. Proceedings 9, pp. 188–205. Springer, Berlin (2011)
Mahbub, U., Chellappa, R.: Path: Person authentication using trace histories. In: 2016 IEEE 7th Annual Ubiquitous Computing, Electronics Mobile Communication Conference (UEMCON), pp. 1–8 (2016)
Mahbub, U., Patel, V.M., Chandra, D., Barbello, B., Chellappa, R.: Partial face detection for continuous authentication. In: 2016 IEEE International Conference on Image Processing (ICIP), pp. 2991–2995 (2016)
Meng, W., Wong, D.S., Furnell, S., Zhou, J.: Surveying the development of biometric user authentication on mobile phones. IEEE Commun. Surveys Tutor. 17(3), 1268–1293 (2015)
Micallef, N., Kayacık, H.G., Just, M., Baillie, L., Aspinall, D.: Sensor use and usefulness: Trade-offs for data-driven authentication on mobile devices. In: 2015 IEEE International Conference on Pervasive Computing and Communications (PerCom), pp. 189–197 (2015)
Mittal, A., Dua, M.: Automatic speaker verification systems and spoof detection techniques: review and analysis. Int. J. Speech Technol. 25, 1–30 (2022)
Mjaaland, B.B., Bours, P., Gligoroski, D.: Walk the walk: Attacking gait biometrics by imitation. In: Burmester, M., Tsudik, G., Magliveras, S., Ilić, I. (eds.) Information Security, pp. 361–380. Springer, Berlin (2011)
Mock, K., Hoanca, B., Weaver, J., Milton, M.: Real-time continuous iris recognition for authentication using an eye tracker. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS ’12, pp. 1007–1009. Association for Computing Machinery, New York (2012)
Mondal, S., Bours, P.: Continuous authentication using mouse dynamics. In: 2013 International Conference of the BIOSIG Special Interest Group (BIOSIG), pp. 1–12 (2013)
Monrose, F., Rubin, A.: Authentication via keystroke dynamics. In: Proceedings of the 4th ACM Conference on Computer and Communications Security, CCS ’97, pp. 48–56. Association for Computing Machinery, New York (1997)
Murphy, C., Huang, J., Hou, D., Schuckers, S.: Shared dataset on natural human-computer interaction to support continuous authentication research. In: 2017 IEEE International Joint Conf. on Biometrics (IJCB), pp. 525–530 (2017)
Nagrani, A., Albanie, S., Zisserman, A.: Seeing voices and hearing faces: Cross-modal biometric matching. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR) (2018)
Neal, T., Sundararajan, K., Woodard, D.: Exploiting linguistic style as a cognitive biometric for continuous verification. In: 2018 International Conference on Biometrics (ICB), pp. 270–276 (2018)
Odinokikh, G., Korobkin, M., Solomatin, I., Efimov, I., Fartukov, A.: Iris feature extraction and matching method for mobile biometric applications. In: 2019 International Conference on Biometrics (ICB), pp. 1–6 (2019). https://doi.org/10.1109/ICB45273.2019.8987379
O’Mara, S.: In Praise of Walking: The New Science of How We Walk and Why It’s Good for Us. Random House, New York (2019)
Patel, V.M., Chellappa, R., Chandra, D., Barbello, B.: Continuous user authentication on mobile devices: Recent progress and remaining challenges. IEEE Signal Process. Mag. 33(4), 49–61 (2016)
Ranjan, A.: Permanence of ECG biometric: Experiments using convolutional neural networks. In: 2019 International Conference on Biometrics (ICB), pp. 1–6 (2019)
Revett, K., Jahankhani, H., De Magalhaes, S.T., Santos, H.M.: A survey of user authentication based on mouse dynamics. In: Global E-Security: 4th International Conference, ICGeS 2008, London, UK, June 23–25, 2008. Proceedings, pp. 210–219. Springer, Berlin (2008)
Reyal, S., Zhai, S., Kristensson, P.O.: Performance and User Experience of Touchscreen and Gesture Keyboards in a Lab Setting and in the Wild, pp. 679–688. Association for Computing Machinery, New York (2015)
Ross, A.A., Nandakumar, K., Jain, A.K.: Handbook of Multibiometrics, 1st edn. Springer Publishing Company, New York (2006)
Ross, A., Banerjee, S., Chen, C., Chowdhury, A., Mirjalili, V., Sharma, R., Swearingen, T., Yadav, S.: Some research problems in biometrics: The future beckons. In: 2019 International Conference on Biometrics (ICB), pp. 1–8 (2019)
Ryu, R., Yeom, S., Kim, S.H., Herbert, D.: Continuous multimodal biometric authentication schemes: a systematic review. IEEE Access 9, 34541–34557 (2021)
Saevanee, H., Clarke, N., Furnell, S.: SMS linguistic profiling authentication on mobile device. In: 2011 5th International Conference on Network and System Security, pp. 224–228 (2011)
Saevanee, H., Clarke, N.L., Furnell, S.M.: Multi-modal behavioural biometric authentication for mobile devices. In: Information Security and Privacy Research: 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4–6, 2012. Proceedings 27, pp. 465–474. Springer, Berlin (2012)
Saevanee, H., Clarke, N., Furnell, S., Biscione, V.: Text-based active authentication for mobile devices. In: Cuppens-Boulahia, N., Cuppens, F., Jajodia, S., Abou El Kalam, A., Sans, T. (eds.) ICT Systems Security and Privacy Protection, pp. 99–112. Springer, Berlin (2014)
Saevanee, H., Clarke, N., Furnell, S., Biscione, V.: Continuous user authentication using multi-modal biometrics. Comput. Secur. 53(C), 234–246 (2015)
Samangouei, P., Patel, V.M., Chellappa, R.: Attribute-based continuous user authentication on mobile devices. In: 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS), pp. 1–8 (2015)
Samangouei, P., Patel, V.M., Chellappa, R.: Facial attributes for active authentication on mobile devices. Image Vision Comput. 58, 181–192 (2017)
Samarin, N., Sannella, D.: A key to your heart: Biometric authentication based on ECG signals. In: Who Are You?! Adventures in Authentication Workshop, WAY ’19, pp. 1–6. Santa Clara, California, USA (2019)
Serwadda, A., Phoha, V.V., Wang, Z.: Which verifiers work?: A benchmark evaluation of touch-based authentication algorithms. In: 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS), pp. 1–8 (2013)
Sharma, N.K., Ganesh, S., Ganapathy, S., Holt, L.L.: Talker change detection: A comparison of human and machine performance. J. Acoust. Soc. Am. 145(1), 131–142 (2019)
Sheehan, M.J., Nachman, M.W.: Morphological and population genomic evidence that human faces have evolved to signal individual identity. Nat. Commun. 5(1), 4800 (2014)
Shelchkova, N., Poletti, M.: Modulations of foveal vision associated with microsaccade preparation. Proc. Natl. Acad. Sci. 117(20), 11178–11183 (2020)
Shen, C., Li, Y., Chen, Y., Guan, X., Maxion, R.A.: Performance analysis of multi-motion sensor behavior for active smartphone authentication. IEEE Trans. Inf. Forensics Secur. 13(1), 48–62 (2018)
Shepherd, S.J.: Continuous authentication by analysis of keyboard typing characteristics. In: European Convention on Security and Detection, 1995, pp. 111–114 (1995)
Shi, E., Niu, Y., Jakobsson, M., Chow, R.: Implicit authentication through learning user behavior. In: Information Security: 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25–28, 2010, Revised Selected Papers 13, pp. 99–113. Springer, Berlin (2011)
Sim, T., Zhang, S., Janakiraman, R., Kumar, S.: Continuous verification using multimodal biometrics. IEEE Trans. Pattern Anal. Mach. Intell. 29(4), 687–700 (2007)
Sitová, Z., Šeděnka, J., Yang, Q., Peng, G., Zhou, G., Gasti, P., Balagani, K.S.: HMOG: New behavioral biometric features for continuous authentication of smartphone users. IEEE Trans. Inf. Forensics Secur. 11(5), 877–892 (2016)
Smith-Creasey, M., Rajarajan, M.: A novel scheme to address the fusion uncertainty in multi-modal continuous authentication schemes on mobile devices. In: 2019 International Conference on Biometrics (ICB), pp. 1–8 (2019)
Smith-Creasey, M., Rajarajan, M.: A novel word-independent gesture-typing continuous authentication scheme for mobile devices. Comput. Secur. 83, 140–150 (2019)
Smith-Creasey, M., Albalooshi, F.A., Rajarajan, M.: Context awareness for improved continuous face authentication on mobile devices. In: 2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech), pp. 644–652 (2018)
Smith-Creasey, M., Albalooshi, F.A., Rajarajan, M.: Continuous face authentication scheme for mobile devices with tracking and liveness detection. Microprocess. Microsyst. 63, 147–157 (2018)
Spillane, R.: Keyboard apparatus for personal identification. IBM Techn. Disclosure Bull. 17, 3346 (1975)
Stigler, S.M.: Galton and identification by fingerprints. Genetics 140(3), 857 (1995)
Syed, Z., Helmick, J., Banerjee, S., Cukic, B.: Touch gesture-based authentication on mobile devices: the effects of user posture, device size, configuration, and inter-session variability. J. Syst. Softw. 149, 158–173 (2019)
Tan, C.B.Y., Stephen, I.D., Whitehead, R., Sheppard, E.: You look familiar: how malaysian Chinese recognize faces. PLOS ONE 7(1), 1–4 (2012)
Teh, P.S., Teoh, A.B.J., Yue, S.: A survey of keystroke dynamics biometrics. Sci. World J. 2013, 408280 (2013)
Thullier, F., Bouchard, B., Menelas, B.A.J.: A text-independent speaker authentication system for mobile devices. Cryptography 1(3), 16 (2017)
Trokielewicz, M., Czajka, A., Maciejewicz, P.: Iris recognition after death. IEEE Trans. Inf. Forensics Secur. 14(6), 1501–1514 (2019)
Viola, P., Jones, M.: Rapid object detection using a boosted cascade of simple features. In: Proceedings of the 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. CVPR 2001, vol. 1, pp. I–I (2001)
Wan, C., Wang, L., Phoha, V.V.: A survey on gait recognition. ACM Comput. Surv. 51(5), 1–35 (2018)
Weinert, M., et al.: On the contemporary theories of the development of human language. Acad. J. Modern Philol. (12), 229–238 (2021)
Whittle, M.W.: Gait Analysis: An Introduction, 3rd edn. Butterworth-Heinemann, Oxford (2005)
Yadav, U., Abbas, S.N., Hatzinakos, D.: Evaluation of PPG biometrics for authentication in different states. In: 2018 International Conference on Biometrics (ICB), pp. 277–282 (2018)
Ye, Y., Zheng, Y., Chen, Y., Feng, J., Xie, X.: Mining individual life pattern based on location history. In: 2009 Tenth International Conference on Mobile Data Management: Systems, Services and Middleware, pp. 1–10 (2009)
Zhai, S., Kristensson, P.O.: The word-gesture keyboard: reimagining keyboard interaction (CACM research highlight). Commun. ACM 55(9), 91–101 (2012)
Zhang, K., Zhang, Z., Li, Z., Qiao, Y.: Joint face detection and alignment using multitask cascaded convolutional networks. IEEE Signal Process. Lett. 23(10), 1499–1503 (2016)
Zhang, Y., Hu, W., Xu, W., Chou, C.T., Hu, J.: Continuous authentication using eye movement response of implicit visual stimuli. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 1(4), 1–22 (2018)
Zhao, T., Wang, Y., Liu, J., Chen, Y.: Your heart won’t lie: PPG-based continuous authentication on wrist-worn wearable devices. In: Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, MobiCom ’18, p. 783–785. Association for Computing Machinery, New York (2018)
Zhao, T., Wang, Y., Liu, J., Chen, Y., Cheng, J., Yu, J.: Trueheart: Continuous authentication on wrist-worn wearables using PPG-based biometrics. In: IEEE INFOCOM 2020 - IEEE Conference on Computer Communications, pp. 30–39 (2020)
Zhong, Y., Deng, Y., Meltzner, G.: Pace independent mobile gait biometrics. In: 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS), pp. 1–8 (2015)
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Smith-Creasey, M. (2024). Biometrics for Continuous Authentication. In: Continuous Biometric Authentication Systems. SpringerBriefs in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-031-49071-2_4
Download citation
DOI: https://doi.org/10.1007/978-3-031-49071-2_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-49070-5
Online ISBN: 978-3-031-49071-2
eBook Packages: Computer ScienceComputer Science (R0)