Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Biometrics for Continuous Authentication

  • Chapter
  • First Online:
Continuous Biometric Authentication Systems

Part of the book series: SpringerBriefs in Computer Science ((BRIEFSCOMPUTER))

  • 262 Accesses

Abstract

This section discusses the concept of biometrics and the requirements generally needed for a biometric used for authentication. Then the different physiological and behavioural modalities used in continuous biometric authentication systems are discussed. Then, multibiometrics and systems where they are used are surveyed. Finally, the chapter ends with a summary of the biometrics discussed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    However, some estimates have been made. Francis Galton estimated that two fingerprints from two people had a chance of 1 in 64 billion of matching [118], but the true figures are not known.

  2. 2.

    https://opencv.org/.

  3. 3.

    http://dlib.net/.

  4. 4.

    https://www.cl.cam.ac.uk/~jgd1000/.

  5. 5.

    https://developer.android.com/reference/android/view/MotionEvent.

References

  1. Abate, A.F., Nappi, M., Ricciardi, S.: I-am: Implicitly authenticate me—person authentication on mobile devices through ear shape and arm gesture. IEEE Trans. Syst. Man Cybernet. Syst. 49(3), 469–481 (2019)

    Article  Google Scholar 

  2. Abrams, R., Meyer, D., Kornblum, S.: Speed and accuracy of saccadic eye movements: characteristics of impulse variability in the oculomotor system. J. Experimen. Psychol. Human Percept. Perform. 15, 529–43 (1989)

    Article  Google Scholar 

  3. Abuhamad, M., Abusnaina, A., Nyang, D., Mohaisen, D.: Sensor-based continuous authentication of smartphones’ users using behavioral biometrics: a contemporary survey. IEEE Int. Things J. 8(1), 65–84 (2021)

    Article  Google Scholar 

  4. Al Abdulwahid, A., Clarke, N., Stengel, I., Furnell, S., Reich, C.: Continuous and transparent multimodal authentication: reviewing the state of the art. Cluster Comput. 19(1), 455–474 (2016)

    Article  Google Scholar 

  5. Al-Naffakh, N., Clarke, N., Li, F., Haskell-Dowland, P.: Unobtrusive gait recognition using smartwatches. In: 2017 International Conference of the Biometrics Special Interest Group (BIOSIG), pp. 1–5 (2017)

    Google Scholar 

  6. Al Solami, E., Boyd, C., Clark, A., Islam, A.K.: Continuous biometric authentication: Can it be more practical? In: 2010 IEEE 12th International Conference on High Performance Computing and Communications (HPCC), pp. 647–652 (2010)

    Google Scholar 

  7. AlGhatrif, M., Lindsay, J.: A brief review: history to understand fundamentals of electrocardiography. J. Commun. Hosp. Intern. Med. Perspect. 2(1), (2012). https://doi.org/10.3402/jchimp.v2i1.14383. 23882360[pmid]

  8. Ali Fahmi, P., Kodirov, E., Choi, D.J., Lee, G.S., Mohd Fikri Azli, A., Sayeed, S.: Implicit authentication based on ear shape biometrics using smartphone camera during a call. In: 2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 2272–2276 (2012)

    Google Scholar 

  9. Almalki, S., Chatterjee, P., Roy, K.: Continuous authentication using mouse clickstream data analysis. In: Security, Privacy, and Anonymity in Computation, Communication, and Storage: SpaCCS 2019 International Workshops, Atlanta, GA, USA, July 14–17, 2019, Proceedings 12, pp. 76–85. Springer, Berlin (2019)

    Google Scholar 

  10. Alobaidi, H., Clarke, N., Li, F., Alruban, A.: Real-world smartphone-based gait recognition. Comput. Security 113, 102557 (2022)

    Article  Google Scholar 

  11. Antal, M., Bokor, Z., Szabó, L.Z.: Information revealed from scrolling interactions on mobile devices. Pattern Recog. Lett. 56, 7–13 (2015)

    Article  Google Scholar 

  12. Aristotle: On the Gait of Animals. Kessinger Publishing, Whitefish (2004)

    Google Scholar 

  13. Arteaga-Falconi, J.S., Al Osman, H., El Saddik, A.: ECG authentication for mobile devices. IEEE Trans. Instrument. Measurem. 65(3), 591–600 (2016)

    Article  Google Scholar 

  14. Ayotte, B., Banavar, M., Hou, D., Schuckers, S.: Fast free-text authentication via instance-based keystroke dynamics. IEEE Trans. Biometr. Behavior Ident. Sci. 2(4), 377–387 (2020)

    Article  Google Scholar 

  15. Bertillon, A.: La photographie judiciaire: avec un appendice sur la classification et l’identification anthropométriques. Gauthier-Villars, Paris (1890)

    Google Scholar 

  16. Bertillon, A., McClaughry, R.W.: Signaletic Instructions Including the Theory and Practice of Anthropometrical Identification. Werner Company, Itasca (1896)

    Google Scholar 

  17. Betts, J.G., Desaix, P., Johnson, E.: Anatomy and Physiology. OpenStax, Houston (2013)

    Google Scholar 

  18. Bevan, C., Fraser, D.S.: Different strokes for different folks? Revealing the physical characteristics of smartphone users from their swipe gestures. Int. J. Human-Comput. Stud. 88, 51–61 (2016)

    Google Scholar 

  19. Biel, L., Pettersson, O., Philipson, L., Wide, P.: Ecg analysis: a new approach in human identification. IEEE Trans. Instrum. Meas. 50(3), 808–812 (2001)

    Article  Google Scholar 

  20. Bonissi, A., Labati, R.D., Perico, L., Sassi, R., Scotti, F., Sparagino, L.: A preliminary study on continuous authentication methods for photoplethysmography biometrics. In: 2013 IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications, pp. 28–33 (2013)

    Google Scholar 

  21. Bours, P., Barghouthi, H.: Continuous authentication using biometric keystroke dynamics. In: The Norwegian Information Security Conference (NISK), vol. 2009, pp. 1–12 (2009)

    Google Scholar 

  22. Buker, A.A.N., Roffo, G., Vinciarelli, A.: Type like a man! inferring gender from keystroke dynamics in live-chats. IEEE Intell. Syst. 34(6), 53–59 (2019)

    Article  Google Scholar 

  23. Burgbacher, U., Hinrichs, K.: An implicit author verification system for text messages based on gesture typing biometrics. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI ’14, p. 2951–2954. Association for Computing Machinery, New York (2014)

    Google Scholar 

  24. Camara, C., Peris-Lopez, P., Gonzalez-Manzano, L., Tapiador, J.: Real-time electrocardiogram streams for continuous authentication. Appl. Soft Comput. 68, 784–794 (2018)

    Article  Google Scholar 

  25. Cheng, Y., Ji, X., Li, X., Zhang, T., Malebary, S., Qu, X., Xu, W.: Identifying child users via touchscreen interactions. ACM Trans. Sen. Netw. 16(4), 1–25 (2020)

    Article  Google Scholar 

  26. Clarke, N.: Transparent User Authentication: Biometrics, RFID and Behavioural Profiling, 1st edn. Springer Publishing Company, New York (2011)

    Book  Google Scholar 

  27. Clarke, N.L., Furnell, S.M.: Authenticating mobile phone users using keystroke analysis. Int. J. Inf. Secur. 6(1), 1–14 (2007)

    Article  Google Scholar 

  28. Clarke, N., Karatzouni, S., Furnell, S.: Transparent facial recognition for mobile devices. In: Proceedings of the 7th Security Conference, pp. 1–13 (2008)

    Google Scholar 

  29. Cook, H.I., Harrison, K., James, H.: Individuals lacking ridge detail: a case study in adermatoglyphia. J. For. Sci. 66(1), 202–208 (2021)

    Google Scholar 

  30. Crawford, H.: Keystroke dynamics: Characteristics and opportunities. In: 2010 Eighth International Conference on Privacy, Security and Trust, pp. 205–212 (2010)

    Google Scholar 

  31. Crouse, D., Han, H., Chandra, D., Barbello, B., Jain, A.K.: Continuous authentication of mobile user: Fusion of face image and inertial measurement unit data. In: 2015 International Conference on Biometrics (ICB), pp. 135–142 (2015)

    Google Scholar 

  32. da Silva, H.P., Fred, A., Lourenço, A., Jain, A.K.: Finger ECG signal for user authentication: Usability and performance. In: 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS), pp. 1–8 (2013)

    Google Scholar 

  33. Daugman, J.: Statistical demands of identification versus verification. https://www.cl.cam.ac.uk/~jgd1000/veri/veri.html

  34. Daugman, J.: How iris recognition works. IEEE Trans. Circuits Syst. Video Technol. 14(1), 21–30 (2004)

    Article  Google Scholar 

  35. Eberz, S., Paoletti, N., Roeschlin, M., Kwiatkowska, M., Martinovic, I., Patané, A.: Broken hearted: How to attack ECG biometrics. In: Network and Distributed System Security Symposium 2017 (2017)

    Google Scholar 

  36. Eberz, S., Lovisotto, G., Rasmussen, K.B., Lenders, V., Martinovic, I.: 28 blinks later: Tackling practical challenges of eye movement biometrics. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, CCS ’19, pp. 1187–1199. Association for Computing Machinery, New York (2019)

    Google Scholar 

  37. Eberz, S., Rasmussen, K.B., Lenders, V., Martinovic, I.: Preventing lunchtime attacks: Fighting insider threats with eye movement biometrics. In: 22nd Annual Network and Distributed System Security Symposium, NDSS 2015, San Diego, California, USA, February 8–11, 2014. The Internet Society, Reston (2015)

    Google Scholar 

  38. Eglitis, T., Guest, R., Deravi, F.: Data behind mobile behavioural biometrics – a survey. IET Biom. 9, 224–237(13) (2020)

    Article  Google Scholar 

  39. Engelbart, D.C.: XY position indicator for a display system. US Patent 3(541), 541 (1970)

    Google Scholar 

  40. Fathy, M.E., Patel, V.M., Chellappa, R.: Face-based active authentication on mobile devices. In: 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1687–1691 (2015)

    Google Scholar 

  41. Feng, H., Fawaz, K., Shin, K.G.: Continuous authentication for voice assistants. In: Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking, MobiCom ’17, p. 343–355. Association for Computing Machinery, New York (2017)

    Google Scholar 

  42. Fenu, G., Marras, M., Boratto, L.: A multi-biometric system for continuous student authentication in e-learning platforms. Pattern Recogn. Lett. 113, 83–92 (2018). Integrating Biometrics and Forensics

    Google Scholar 

  43. Fierrez, J., Pozo, A., Martinez-Diaz, M., Galbally, J., Morales, A.: Benchmarking touchscreen biometrics for mobile authentication. IEEE Trans. Inf. Forensics Secur. 13(11), 2720–2733 (2018)

    Article  Google Scholar 

  44. Frank, M., Biedert, R., Ma, E., Martinovic, I., Song, D.: Touchalytics: on the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE Trans. Inf. Forensics Secur. 8(1), 136–148 (2013)

    Article  Google Scholar 

  45. Fridman, L., Stolerman, A., Acharya, S., Brennan, P., Juola, P., Greenstadt, R., Kam, M.: Multi-modal decision fusion for continuous authentication. Comput. Electr. Eng. 41, 142–156 (2015)

    Article  Google Scholar 

  46. Fridman, L., Weber, S., Greenstadt, R., Kam, M.: Active authentication on mobile devices via stylometry, application usage, web browsing, and GPS location. IEEE Syst. J. 11(2), 513–521 (2017)

    Article  Google Scholar 

  47. Gafurov, D.: A survey of biometric gait recognition: Approaches, security and challenges. In: Annual Norwegian Computer Science Conference, pp. 19–21. Annual Norwegian Computer Science Conference Norway (2007)

    Google Scholar 

  48. Galdi, C., Nappi, M., Riccio, D., Wechsler, H.: Eye movement analysis for human authentication: a critical survey. Pattern Recogn. Lett. 84, 272–283 (2016)

    Article  Google Scholar 

  49. Gamon, M.: Linguistic correlates of style: Authorship classification with deep linguistic analysis features. International Conference on Computational Linguistics (2004)

    Google Scholar 

  50. Gao, Y., Wang, W., Phoha, V.V., Sun, W., Jin, Z.: EarEcho: Using ear canal echo for wearable authentication. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 3(3), 1–24 (2019)

    Article  Google Scholar 

  51. Gunetti, D., Picardi, C.: Keystroke analysis of free text. ACM Trans. Inf. Syst. Secur. 8(3), 312–347 (2005)

    Article  Google Scholar 

  52. Gunetti, D., Picardi, C., Ruffo, G.: Dealing with different languages and old profiles in keystroke analysis of free text. In: Proceedings of the 9th Conference on Advances in Artificial Intelligence, AI*IA’05, p. 347–358. Springer, Berlin (2005)

    Google Scholar 

  53. Haasnoot, E., Barnhoorrr, J., Spreeuwers, L., Veldhuis, R., Verwey, W.: Towards understanding the effects of practice on behavioural biometric recognition performance. In: 2018 26th European Signal Processing Conference (EUSIPCO), pp. 558–562 (2018)

    Google Scholar 

  54. Halterman, M.W.: Neuroscience, 3rd edition. Neurology 64(4), 769–769–a (2005)

    Google Scholar 

  55. He, M., Horng, S.J., Fan, P., Run, R.S., Chen, R.J., Lai, J.L., Khan, M.K., Sentosa, K.O.: Performance evaluation of score level fusion in multimodal biometric systems. Pattern Recogn. 43(5), 1789–1800 (2010)

    Article  Google Scholar 

  56. Holland, C., Komogortsev, O.V.: Biometric identification via eye movement scanpaths in reading. In: 2011 International Joint Conference on Biometrics (IJCB), pp. 1–8 (2011)

    Google Scholar 

  57. Holland, C.D., Komogortsev, O.V.: Complex eye movement pattern biometrics: Analyzing fixations and saccades. In: 2013 International Conference on Biometrics (ICB), pp. 1–8 (2013)

    Google Scholar 

  58. Hoppe, S., Loetscher, T., Morey, S.A., Bulling, A.: Eye movements during everyday behavior predict personality traits. Front. Hum. Neurosci. 12, 105 (2018)

    Article  Google Scholar 

  59. Huang, J., Hou, D., Schuckers, S., Law, T., Sherwin, A.: Benchmarking keystroke authentication algorithms. In: 2017 IEEE Workshop on Information Forensics and Security (WIFS), pp. 1–6 (2017)

    Google Scholar 

  60. Hurley, D.J., Arbab-Zavar, B., Nixon, M.S.: The ear as a biometric. In: 2007 15th European Signal Processing Conference, pp. 25–29. IEEE, Piscataway (2007)

    Google Scholar 

  61. Ingale, M., Cordeiro, R., Thentu, S., Park, Y., Karimian, N.: ECG biometric authentication: a comparative analysis. IEEE Access 8, 117853–117866 (2020)

    Article  Google Scholar 

  62. Jain, A.K., Ross, A., Prabhakar, S.: An introduction to biometric recognition. IEEE Trans. Circuits Syst. Video Technol. 14(1), 4–20 (2004)

    Article  Google Scholar 

  63. Jain, A., Nandakumar, K., Ross, A.: Score normalization in multimodal biometric systems. Pattern Recogn. 38(12), 2270–2285 (2005)

    Article  Google Scholar 

  64. Jain, A.K., Ross, A.A., Nandakumar, K.: Introduction to Biometrics. Springer Publishing Company, New York (2011)

    Book  Google Scholar 

  65. Jiangyu, L., Yinggang, X., Hui, W., Guangjun, L.: A face recognition system based on improved convolutional neural network. In: Proceedings of the 2019 2nd International Conference on Algorithms, Computing and Artificial Intelligence, ACAI ’19, pp. 230–235. Association for Computing Machinery, New York (2020)

    Google Scholar 

  66. Kahn, D.: The Codebreakers: The Story of Secret Writing. Macmillan, New York (1967)

    Google Scholar 

  67. Kanwisher, N., McDermott, J., Chun, M.M.: The fusiform face area: a module in human extrastriate cortex specialized for face perception. J. Neurosci. 17(11), 4302–4311 (1997). https://doi.org/10.1523/JNEUROSCI.17-11-04302.1997

    Article  Google Scholar 

  68. Kasprowski, P., Ober, J.: Eye movements in biometrics. In: Maltoni, D., Jain, A.K. (eds.) Biometric Authentication, pp. 248–258. Springer, Berlin (2004)

    Chapter  Google Scholar 

  69. Kayacik, H.G., Just, M., Baillie, L., Aspinall, D., Micallef, N.: Data driven authentication: On the effectiveness of user behaviour modelling with mobile device sensors (2014). Preprint arXiv:1410.7743

    Google Scholar 

  70. Klosterman, A.J., Ganger, G.R.: Secure continuous biometric-enhanced authentication (CMU-CS-00-134) (2001)

    Google Scholar 

  71. Korshunov, P., Marcel, S.: Vulnerability assessment and detection of deepfake videos. In: 2019 International Conference on Biometrics (ICB), pp. 1–6 (2019)

    Google Scholar 

  72. Kumar, R., Kundu, P.P., Phoha, V.V.: Continuous authentication using one-class classifiers and their fusion. In: 2018 IEEE 4th International Conference on Identity, Security, and Behavior Analysis (ISBA), pp. 1–8 (2018)

    Google Scholar 

  73. Leliveld, L.M.C.: From science to practice: a review of laterality research on ungulate livestock. Symmetry 11(9), 1157 (2019)

    Article  Google Scholar 

  74. Lu, C., Tang, X.: Surpassing human-level face verification performance on LFW with Gaussian face. In: Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, AAAI’15, p. 3811–3819. AAAI Press, Washington (2015)

    Google Scholar 

  75. Lu, H., Bernheim Brush, A., Priyantha, B., Karlson, A.K., Liu, J.: SpeakerSense: Energy efficient unobtrusive speaker identification on mobile phones. In: Pervasive Computing: 9th International Conference, Pervasive 2011, San Francisco, USA, June 12–15, 2011. Proceedings 9, pp. 188–205. Springer, Berlin (2011)

    Google Scholar 

  76. Mahbub, U., Chellappa, R.: Path: Person authentication using trace histories. In: 2016 IEEE 7th Annual Ubiquitous Computing, Electronics Mobile Communication Conference (UEMCON), pp. 1–8 (2016)

    Google Scholar 

  77. Mahbub, U., Patel, V.M., Chandra, D., Barbello, B., Chellappa, R.: Partial face detection for continuous authentication. In: 2016 IEEE International Conference on Image Processing (ICIP), pp. 2991–2995 (2016)

    Google Scholar 

  78. Meng, W., Wong, D.S., Furnell, S., Zhou, J.: Surveying the development of biometric user authentication on mobile phones. IEEE Commun. Surveys Tutor. 17(3), 1268–1293 (2015)

    Article  Google Scholar 

  79. Micallef, N., Kayacık, H.G., Just, M., Baillie, L., Aspinall, D.: Sensor use and usefulness: Trade-offs for data-driven authentication on mobile devices. In: 2015 IEEE International Conference on Pervasive Computing and Communications (PerCom), pp. 189–197 (2015)

    Google Scholar 

  80. Mittal, A., Dua, M.: Automatic speaker verification systems and spoof detection techniques: review and analysis. Int. J. Speech Technol. 25, 1–30 (2022)

    Article  Google Scholar 

  81. Mjaaland, B.B., Bours, P., Gligoroski, D.: Walk the walk: Attacking gait biometrics by imitation. In: Burmester, M., Tsudik, G., Magliveras, S., Ilić, I. (eds.) Information Security, pp. 361–380. Springer, Berlin (2011)

    Chapter  Google Scholar 

  82. Mock, K., Hoanca, B., Weaver, J., Milton, M.: Real-time continuous iris recognition for authentication using an eye tracker. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS ’12, pp. 1007–1009. Association for Computing Machinery, New York (2012)

    Google Scholar 

  83. Mondal, S., Bours, P.: Continuous authentication using mouse dynamics. In: 2013 International Conference of the BIOSIG Special Interest Group (BIOSIG), pp. 1–12 (2013)

    Google Scholar 

  84. Monrose, F., Rubin, A.: Authentication via keystroke dynamics. In: Proceedings of the 4th ACM Conference on Computer and Communications Security, CCS ’97, pp. 48–56. Association for Computing Machinery, New York (1997)

    Google Scholar 

  85. Murphy, C., Huang, J., Hou, D., Schuckers, S.: Shared dataset on natural human-computer interaction to support continuous authentication research. In: 2017 IEEE International Joint Conf. on Biometrics (IJCB), pp. 525–530 (2017)

    Google Scholar 

  86. Nagrani, A., Albanie, S., Zisserman, A.: Seeing voices and hearing faces: Cross-modal biometric matching. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR) (2018)

    Google Scholar 

  87. Neal, T., Sundararajan, K., Woodard, D.: Exploiting linguistic style as a cognitive biometric for continuous verification. In: 2018 International Conference on Biometrics (ICB), pp. 270–276 (2018)

    Google Scholar 

  88. Odinokikh, G., Korobkin, M., Solomatin, I., Efimov, I., Fartukov, A.: Iris feature extraction and matching method for mobile biometric applications. In: 2019 International Conference on Biometrics (ICB), pp. 1–6 (2019). https://doi.org/10.1109/ICB45273.2019.8987379

  89. O’Mara, S.: In Praise of Walking: The New Science of How We Walk and Why It’s Good for Us. Random House, New York (2019)

    Google Scholar 

  90. Patel, V.M., Chellappa, R., Chandra, D., Barbello, B.: Continuous user authentication on mobile devices: Recent progress and remaining challenges. IEEE Signal Process. Mag. 33(4), 49–61 (2016)

    Article  Google Scholar 

  91. Ranjan, A.: Permanence of ECG biometric: Experiments using convolutional neural networks. In: 2019 International Conference on Biometrics (ICB), pp. 1–6 (2019)

    Google Scholar 

  92. Revett, K., Jahankhani, H., De Magalhaes, S.T., Santos, H.M.: A survey of user authentication based on mouse dynamics. In: Global E-Security: 4th International Conference, ICGeS 2008, London, UK, June 23–25, 2008. Proceedings, pp. 210–219. Springer, Berlin (2008)

    Google Scholar 

  93. Reyal, S., Zhai, S., Kristensson, P.O.: Performance and User Experience of Touchscreen and Gesture Keyboards in a Lab Setting and in the Wild, pp. 679–688. Association for Computing Machinery, New York (2015)

    Google Scholar 

  94. Ross, A.A., Nandakumar, K., Jain, A.K.: Handbook of Multibiometrics, 1st edn. Springer Publishing Company, New York (2006)

    Google Scholar 

  95. Ross, A., Banerjee, S., Chen, C., Chowdhury, A., Mirjalili, V., Sharma, R., Swearingen, T., Yadav, S.: Some research problems in biometrics: The future beckons. In: 2019 International Conference on Biometrics (ICB), pp. 1–8 (2019)

    Google Scholar 

  96. Ryu, R., Yeom, S., Kim, S.H., Herbert, D.: Continuous multimodal biometric authentication schemes: a systematic review. IEEE Access 9, 34541–34557 (2021)

    Article  Google Scholar 

  97. Saevanee, H., Clarke, N., Furnell, S.: SMS linguistic profiling authentication on mobile device. In: 2011 5th International Conference on Network and System Security, pp. 224–228 (2011)

    Google Scholar 

  98. Saevanee, H., Clarke, N.L., Furnell, S.M.: Multi-modal behavioural biometric authentication for mobile devices. In: Information Security and Privacy Research: 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4–6, 2012. Proceedings 27, pp. 465–474. Springer, Berlin (2012)

    Google Scholar 

  99. Saevanee, H., Clarke, N., Furnell, S., Biscione, V.: Text-based active authentication for mobile devices. In: Cuppens-Boulahia, N., Cuppens, F., Jajodia, S., Abou El Kalam, A., Sans, T. (eds.) ICT Systems Security and Privacy Protection, pp. 99–112. Springer, Berlin (2014)

    Chapter  Google Scholar 

  100. Saevanee, H., Clarke, N., Furnell, S., Biscione, V.: Continuous user authentication using multi-modal biometrics. Comput. Secur. 53(C), 234–246 (2015)

    Article  Google Scholar 

  101. Samangouei, P., Patel, V.M., Chellappa, R.: Attribute-based continuous user authentication on mobile devices. In: 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS), pp. 1–8 (2015)

    Google Scholar 

  102. Samangouei, P., Patel, V.M., Chellappa, R.: Facial attributes for active authentication on mobile devices. Image Vision Comput. 58, 181–192 (2017)

    Article  Google Scholar 

  103. Samarin, N., Sannella, D.: A key to your heart: Biometric authentication based on ECG signals. In: Who Are You?! Adventures in Authentication Workshop, WAY ’19, pp. 1–6. Santa Clara, California, USA (2019)

    Google Scholar 

  104. Serwadda, A., Phoha, V.V., Wang, Z.: Which verifiers work?: A benchmark evaluation of touch-based authentication algorithms. In: 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS), pp. 1–8 (2013)

    Google Scholar 

  105. Sharma, N.K., Ganesh, S., Ganapathy, S., Holt, L.L.: Talker change detection: A comparison of human and machine performance. J. Acoust. Soc. Am. 145(1), 131–142 (2019)

    Article  Google Scholar 

  106. Sheehan, M.J., Nachman, M.W.: Morphological and population genomic evidence that human faces have evolved to signal individual identity. Nat. Commun. 5(1), 4800 (2014)

    Article  Google Scholar 

  107. Shelchkova, N., Poletti, M.: Modulations of foveal vision associated with microsaccade preparation. Proc. Natl. Acad. Sci. 117(20), 11178–11183 (2020)

    Article  Google Scholar 

  108. Shen, C., Li, Y., Chen, Y., Guan, X., Maxion, R.A.: Performance analysis of multi-motion sensor behavior for active smartphone authentication. IEEE Trans. Inf. Forensics Secur. 13(1), 48–62 (2018)

    Article  Google Scholar 

  109. Shepherd, S.J.: Continuous authentication by analysis of keyboard typing characteristics. In: European Convention on Security and Detection, 1995, pp. 111–114 (1995)

    Google Scholar 

  110. Shi, E., Niu, Y., Jakobsson, M., Chow, R.: Implicit authentication through learning user behavior. In: Information Security: 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25–28, 2010, Revised Selected Papers 13, pp. 99–113. Springer, Berlin (2011)

    Google Scholar 

  111. Sim, T., Zhang, S., Janakiraman, R., Kumar, S.: Continuous verification using multimodal biometrics. IEEE Trans. Pattern Anal. Mach. Intell. 29(4), 687–700 (2007)

    Article  Google Scholar 

  112. Sitová, Z., Šeděnka, J., Yang, Q., Peng, G., Zhou, G., Gasti, P., Balagani, K.S.: HMOG: New behavioral biometric features for continuous authentication of smartphone users. IEEE Trans. Inf. Forensics Secur. 11(5), 877–892 (2016)

    Article  Google Scholar 

  113. Smith-Creasey, M., Rajarajan, M.: A novel scheme to address the fusion uncertainty in multi-modal continuous authentication schemes on mobile devices. In: 2019 International Conference on Biometrics (ICB), pp. 1–8 (2019)

    Google Scholar 

  114. Smith-Creasey, M., Rajarajan, M.: A novel word-independent gesture-typing continuous authentication scheme for mobile devices. Comput. Secur. 83, 140–150 (2019)

    Article  Google Scholar 

  115. Smith-Creasey, M., Albalooshi, F.A., Rajarajan, M.: Context awareness for improved continuous face authentication on mobile devices. In: 2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech), pp. 644–652 (2018)

    Google Scholar 

  116. Smith-Creasey, M., Albalooshi, F.A., Rajarajan, M.: Continuous face authentication scheme for mobile devices with tracking and liveness detection. Microprocess. Microsyst. 63, 147–157 (2018)

    Article  Google Scholar 

  117. Spillane, R.: Keyboard apparatus for personal identification. IBM Techn. Disclosure Bull. 17, 3346 (1975)

    Google Scholar 

  118. Stigler, S.M.: Galton and identification by fingerprints. Genetics 140(3), 857 (1995)

    Article  Google Scholar 

  119. Syed, Z., Helmick, J., Banerjee, S., Cukic, B.: Touch gesture-based authentication on mobile devices: the effects of user posture, device size, configuration, and inter-session variability. J. Syst. Softw. 149, 158–173 (2019)

    Article  Google Scholar 

  120. Tan, C.B.Y., Stephen, I.D., Whitehead, R., Sheppard, E.: You look familiar: how malaysian Chinese recognize faces. PLOS ONE 7(1), 1–4 (2012)

    Article  Google Scholar 

  121. Teh, P.S., Teoh, A.B.J., Yue, S.: A survey of keystroke dynamics biometrics. Sci. World J. 2013, 408280 (2013)

    Google Scholar 

  122. Thullier, F., Bouchard, B., Menelas, B.A.J.: A text-independent speaker authentication system for mobile devices. Cryptography 1(3), 16 (2017)

    Article  Google Scholar 

  123. Trokielewicz, M., Czajka, A., Maciejewicz, P.: Iris recognition after death. IEEE Trans. Inf. Forensics Secur. 14(6), 1501–1514 (2019)

    Article  Google Scholar 

  124. Viola, P., Jones, M.: Rapid object detection using a boosted cascade of simple features. In: Proceedings of the 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. CVPR 2001, vol. 1, pp. I–I (2001)

    Google Scholar 

  125. Wan, C., Wang, L., Phoha, V.V.: A survey on gait recognition. ACM Comput. Surv. 51(5), 1–35 (2018)

    Article  Google Scholar 

  126. Weinert, M., et al.: On the contemporary theories of the development of human language. Acad. J. Modern Philol. (12), 229–238 (2021)

    Google Scholar 

  127. Whittle, M.W.: Gait Analysis: An Introduction, 3rd edn. Butterworth-Heinemann, Oxford (2005)

    Google Scholar 

  128. Yadav, U., Abbas, S.N., Hatzinakos, D.: Evaluation of PPG biometrics for authentication in different states. In: 2018 International Conference on Biometrics (ICB), pp. 277–282 (2018)

    Google Scholar 

  129. Ye, Y., Zheng, Y., Chen, Y., Feng, J., Xie, X.: Mining individual life pattern based on location history. In: 2009 Tenth International Conference on Mobile Data Management: Systems, Services and Middleware, pp. 1–10 (2009)

    Google Scholar 

  130. Zhai, S., Kristensson, P.O.: The word-gesture keyboard: reimagining keyboard interaction (CACM research highlight). Commun. ACM 55(9), 91–101 (2012)

    Article  Google Scholar 

  131. Zhang, K., Zhang, Z., Li, Z., Qiao, Y.: Joint face detection and alignment using multitask cascaded convolutional networks. IEEE Signal Process. Lett. 23(10), 1499–1503 (2016)

    Article  Google Scholar 

  132. Zhang, Y., Hu, W., Xu, W., Chou, C.T., Hu, J.: Continuous authentication using eye movement response of implicit visual stimuli. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 1(4), 1–22 (2018)

    Google Scholar 

  133. Zhao, T., Wang, Y., Liu, J., Chen, Y.: Your heart won’t lie: PPG-based continuous authentication on wrist-worn wearable devices. In: Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, MobiCom ’18, p. 783–785. Association for Computing Machinery, New York (2018)

    Google Scholar 

  134. Zhao, T., Wang, Y., Liu, J., Chen, Y., Cheng, J., Yu, J.: Trueheart: Continuous authentication on wrist-worn wearables using PPG-based biometrics. In: IEEE INFOCOM 2020 - IEEE Conference on Computer Communications, pp. 30–39 (2020)

    Google Scholar 

  135. Zhong, Y., Deng, Y., Meltzner, G.: Pace independent mobile gait biometrics. In: 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS), pp. 1–8 (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Smith-Creasey, M. (2024). Biometrics for Continuous Authentication. In: Continuous Biometric Authentication Systems. SpringerBriefs in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-031-49071-2_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-49071-2_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-49070-5

  • Online ISBN: 978-3-031-49071-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics