iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1145/3432192
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T18:14:54Z","timestamp":1732040094993},"reference-count":62,"publisher":"Association for Computing Machinery (ACM)","issue":"4","funder":[{"DOI":"10.13039\/501100012166","name":"National Key R&D Program of China","doi-asserted-by":"crossref","award":["2018AAA0102302"],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100004608","name":"JiangSu Natural Science Foundation","doi-asserted-by":"crossref","award":["BK20180325, BK20190293"],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61802169, 61872174, 61832008, 61906085, 61902175"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Collaborative Innovation Center of Novel Software Technology and Industrialization"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Interact. Mob. Wearable Ubiquitous Technol."],"published-print":{"date-parts":[[2020,12,17]]},"abstract":"Due to the widespread use of mobile devices, it is essential to authenticate users on mobile devices to prevent sensitive information leakage. In this paper, we propose TouchID, which combinedly uses the touch sensor and the inertial sensor for gesture analysis, to provide a touch gesture based user authentication scheme. Specifically, TouchID utilizes the touch sensor to analyze the on-screen gesture while using the inertial sensor to analyze the device's motion caused by the touch gesture, and then combines the unique features from the on-screen gesture and the device's motion for user authentication. To mitigate the intra-class difference and reduce the inter-class similarity, we propose a spatial alignment method for sensor data and segment the touch gesture into multiple sub-gestures in space domain, to keep the stability of the same user and enhance the discriminability of different users. To provide a uniform representation of touch gestures with different topological structures, we present a four-part based feature selection method, which classifies a touch gesture into a start node, an end node, the turning node(s), and the smooth paths, and then select effective features from these parts based on Fisher Score. In addition, considering the uncertainty of user's postures, which may change the sensor data of same touch gesture, we propose a multi-threshold kNN based model to adaptively tolerate the posture difference for user authentication. Finally, we implement TouchID on commercial smartphones and conduct extensive experiments to evaluate TouchID. The experiment results show that TouchID can achieve a good performance for user authentication, i.e., having a low equal error rate of 4.90%.<\/jats:p>","DOI":"10.1145\/3432192","type":"journal-article","created":{"date-parts":[[2020,12,18]],"date-time":"2020-12-18T15:39:14Z","timestamp":1608305954000},"page":"1-29","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":78,"title":["TouchID"],"prefix":"10.1145","volume":"4","author":[{"given":"Xinchen","family":"Zhang","sequence":"first","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"}]},{"given":"Yafeng","family":"Yin","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"}]},{"given":"Lei","family":"Xie","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"}]},{"given":"Hao","family":"Zhang","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"}]},{"given":"Zefan","family":"Ge","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"}]},{"given":"Sanglu","family":"Lu","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"}]}],"member":"320","published-online":{"date-parts":[[2020,12,18]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.protcy.2016.01.061"},{"key":"e_1_2_1_2_1","first-page":"1","article-title":"Smudge Attacks on Smartphone Touch Screens","volume":"10","author":"Aviv Adam J","year":"2010","unstructured":"Adam J Aviv , Katherine L Gibson , Evan Mossop , Matt Blaze , and Jonathan M Smith . 2010 . Smudge Attacks on Smartphone Touch Screens . Woot 10 (2010), 1 -- 7 . Adam J Aviv, Katherine L Gibson, Evan Mossop, Matt Blaze, and Jonathan M Smith. 2010. Smudge Attacks on Smartphone Touch Screens. Woot 10 (2010), 1--7.","journal-title":"Woot"},{"key":"e_1_2_1_3_1","unstructured":"Bloggers. 2013. Common Lock Patterns of mobiles phones Screen Lock. http:\/\/mytrickytricks.blogspotcom\/2013\/07\/commonlockpattern.html. Bloggers. 2013. Common Lock Patterns of mobiles phones Screen Lock. http:\/\/mytrickytricks.blogspotcom\/2013\/07\/commonlockpattern.html."},{"key":"e_1_2_1_4_1","unstructured":"Alipay by Ant Financial Inc. 2020. https:\/\/apps.apple.com\/us\/app\/alipay-simplify-your-life\/id333206289. Alipay by Ant Financial Inc. 2020. https:\/\/apps.apple.com\/us\/app\/alipay-simplify-your-life\/id333206289."},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2002.1046148"},{"key":"e_1_2_1_6_1","volume-title":"Root mean square error (RMSE) or mean absolute error (MAE)?-Arguments against avoiding RMSE in the literature. Geoscientific model development 7, 3","author":"Chai Tianfeng","year":"2014","unstructured":"Tianfeng Chai and Roland R Draxler . 2014. Root mean square error (RMSE) or mean absolute error (MAE)?-Arguments against avoiding RMSE in the literature. Geoscientific model development 7, 3 ( 2014 ), 1247--1250. Tianfeng Chai and Roland R Draxler. 2014. Root mean square error (RMSE) or mean absolute error (MAE)?-Arguments against avoiding RMSE in the literature. Geoscientific model development 7, 3 (2014), 1247--1250."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3300061.3300124"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218660"},{"key":"e_1_2_1_9_1","volume-title":"Interpolation and approximation","author":"Davis Philip J","unstructured":"Philip J Davis . 1975. Interpolation and approximation . Courier Corporation . Philip J Davis. 1975. Interpolation and approximation. Courier Corporation."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-03756-1_22"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/IACS.2015.7103185"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2322255"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2015.7178258"},{"key":"e_1_2_1_14_1","volume-title":"Self-aligning lidar for the continuous monitoring of the atmosphere. Applied optics 37, 21","author":"Fiorani Luca","year":"1998","unstructured":"Luca Fiorani , Mario Armenante , Roberta Capobianco , Nicola Spinelli , and Xuan Wang . 1998. Self-aligning lidar for the continuous monitoring of the atmosphere. Applied optics 37, 21 ( 1998 ), 4758--4764. Luca Fiorani, Mario Armenante, Roberta Capobianco, Nicola Spinelli, and Xuan Wang. 1998. Self-aligning lidar for the continuous monitoring of the atmosphere. Applied optics 37, 21 (1998), 4758--4764."},{"key":"e_1_2_1_15_1","volume-title":"Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication","author":"Frank Mario","year":"2012","unstructured":"Mario Frank , Ralf Biedert , Eugene Ma , Ivan Martinovic , and Dawn Song . 2012 . Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication . IEEE transactions on information forensics and security 8, 1 (2012), 136--148. Mario Frank, Ralf Biedert, Eugene Ma, Ivan Martinovic, and Dawn Song. 2012. Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE transactions on information forensics and security 8, 1 (2012), 136--148."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2016.11.002"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ITA.2016.7888145"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23780-5_45"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-012-0154-9"},{"key":"e_1_2_1_20_1","doi-asserted-by":"crossref","first-page":"814","DOI":"10.1109\/TCSVT.2013.2280076","article-title":"Face authentication with makeup changes","volume":"24","author":"Guo Guodong","year":"2013","unstructured":"Guodong Guo , Lingyun Wen , and Shuicheng Yan . 2013 . Face authentication with makeup changes . IEEE Transactions on Circuits and Systems for Video Technology 24 , 5 (2013), 814 -- 825 . Guodong Guo, Lingyun Wen, and Shuicheng Yan. 2013. Face authentication with makeup changes. IEEE Transactions on Circuits and Systems for Video Technology 24, 5 (2013), 814--825.","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"e_1_2_1_21_1","volume-title":"27th {USENIX} Security Symposium ( {USENIX} Security 18). 255--272.","author":"He Weijia","unstructured":"Weijia He , Maximilian Golla , Roshni Padhi , Jordan Ofek , Markus D\u00fcrmuth , Earlence Fernandes , and Blase Ur. 2018. Rethinking access control and authentication for the home internet of things (IoT) . In 27th {USENIX} Security Symposium ( {USENIX} Security 18). 255--272. Weijia He, Maximilian Golla, Roshni Padhi, Jordan Ofek, Markus D\u00fcrmuth, Earlence Fernandes, and Blase Ur. 2018. Rethinking access control and authentication for the home internet of things (IoT). In 27th {USENIX} Security Symposium ( {USENIX} Security 18). 255--272."},{"key":"e_1_2_1_22_1","unstructured":"healthline Inc. 2019. What's the Average Hand Size for Men Women and Children? https:\/\/www.healthline.com\/health\/average-hand-size. (2019). healthline Inc. 2019. What's the Average Hand Size for Men Women and Children? https:\/\/www.healthline.com\/health\/average-hand-size. (2019)."},{"key":"e_1_2_1_23_1","unstructured":"Battery historian by Google Inc. 2016. https:\/\/github.com\/google\/battery-historian. Battery historian by Google Inc. 2016. https:\/\/github.com\/google\/battery-historian."},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3191744"},{"key":"e_1_2_1_25_1","unstructured":"Cisco Systems Inc. 2020. Fingerprint cloning: Myth or reality? https:\/\/blog.talosintelligence.com\/2020\/04\/fingerprint-research.html. (2020). Cisco Systems Inc. 2020. Fingerprint cloning: Myth or reality? https:\/\/blog.talosintelligence.com\/2020\/04\/fingerprint-research.html. (2020)."},{"key":"e_1_2_1_26_1","unstructured":"Google Inc. 2020. android.view.MotionEvent. https:\/\/developer.android.com\/reference\/android\/view\/MotionEvent. (2020). Google Inc. 2020. android.view.MotionEvent. https:\/\/developer.android.com\/reference\/android\/view\/MotionEvent. (2020)."},{"key":"e_1_2_1_27_1","volume-title":"Smartphone Challenges Continue","author":"IDC Inc. 2020.","year":"2019","unstructured":"IDC Inc. 2020. Smartphone Challenges Continue in 2019 . https:\/\/www.idc.com\/getdoc.jsp?containerId=prUS45487719. (2020). IDC Inc. 2020. Smartphone Challenges Continue in 2019. https:\/\/www.idc.com\/getdoc.jsp?containerId=prUS45487719. (2020)."},{"key":"e_1_2_1_28_1","volume-title":"Smartphone unit shipments worldwide by screen size from 2018 to","author":"Statista Inc. 2020.","year":"2022","unstructured":"Statista Inc. 2020. Smartphone unit shipments worldwide by screen size from 2018 to 2022 . https:\/\/www.statista.com\/statistics\/684294\/global-smartphone-shipments-by-screen-size\/. (2020). Statista Inc. 2020. Smartphone unit shipments worldwide by screen size from 2018 to 2022. https:\/\/www.statista.com\/statistics\/684294\/global-smartphone-shipments-by-screen-size\/. (2020)."},{"key":"e_1_2_1_29_1","volume-title":"Touchscreens with the 3rd dimension. https:\/\/www.wavetouch.com\/technology\/pressure-detection\/. (2020)","author":"WaveTouch Inc. 2020.","unstructured":"WaveTouch Inc. 2020. Touchscreens with the 3rd dimension. https:\/\/www.wavetouch.com\/technology\/pressure-detection\/. (2020) . WaveTouch Inc. 2020. Touchscreens with the 3rd dimension. https:\/\/www.wavetouch.com\/technology\/pressure-detection\/. (2020)."},{"key":"e_1_2_1_30_1","volume-title":"Exploring orientation and accelerometer sensor data for personal authentication in smartphones using touchscreen gestures. Pattern recognition letters 68","author":"Jain Ankita","year":"2015","unstructured":"Ankita Jain and Vivek Kanhangad . 2015. Exploring orientation and accelerometer sensor data for personal authentication in smartphones using touchscreen gestures. Pattern recognition letters 68 ( 2015 ), 351--360. Ankita Jain and Vivek Kanhangad. 2015. Exploring orientation and accelerometer sensor data for personal authentication in smartphones using touchscreen gestures. Pattern recognition letters 68 (2015), 351--360."},{"key":"e_1_2_1_31_1","volume-title":"Quality monitoring of GPS signals","author":"Jakab Andrew Jonathan","unstructured":"Andrew Jonathan Jakab . 2001. Quality monitoring of GPS signals . University of Calgary . Andrew Jonathan Jakab. 2001. Quality monitoring of GPS signals. University of Calgary."},{"key":"e_1_2_1_32_1","volume-title":"Robust point set registration using gaussian mixture models","author":"Jian Bing","year":"2010","unstructured":"Bing Jian and Baba C Vemuri . 2010. Robust point set registration using gaussian mixture models . IEEE transactions on pattern analysis and machine intelligence 33, 8 ( 2010 ), 1633--1645. Bing Jian and Baba C Vemuri. 2010. Robust point set registration using gaussian mixture models. IEEE transactions on pattern analysis and machine intelligence 33, 8 (2010), 1633--1645."},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2389148.2389149"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3300061.3345434"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3307334.3326093"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2019.2891733"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1117\/12.462719"},{"key":"e_1_2_1_38_1","volume-title":"Point set registration: Coherent point drift","author":"Myronenko Andriy","year":"2010","unstructured":"Andriy Myronenko and Xubo Song . 2010. Point set registration: Coherent point drift . IEEE transactions on pattern analysis and machine intelligence 32, 12 ( 2010 ), 2262--2275. Andriy Myronenko and Xubo Song. 2010. Point set registration: Coherent point drift. IEEE transactions on pattern analysis and machine intelligence 32, 12 (2010), 2262--2275."},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/WACV.2000.895399"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2691658"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICTEmSys.2016.7467127"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2500423.2500434"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2737969"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2503258"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2594375"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2506542"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.54"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3264946"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143120.1143128"},{"key":"e_1_2_1_50_1","first-page":"2579","article-title":"Visualizing Data using t-SNE","volume":"9","author":"van der Maaten Laurens","year":"2008","unstructured":"Laurens van der Maaten and Geoffrey Hinton . 2008 . Visualizing Data using t-SNE . Journal of Machine Learning Research 9 (2008), 2579 -- 2605 . http:\/\/www.jmlr.org\/papers\/v9\/vandermaaten08a.html Laurens van der Maaten and Geoffrey Hinton. 2008. Visualizing Data using t-SNE. Journal of Machine Learning Research 9 (2008), 2579--2605. http:\/\/www.jmlr.org\/papers\/v9\/vandermaaten08a.html","journal-title":"Journal of Machine Learning Research"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-15582-1_11"},{"key":"e_1_2_1_52_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3264950","article-title":"Unlock with your heart: Heartbeat-based authentication on commercial mobile phones","volume":"2","author":"Wang Lei","year":"2018","unstructured":"Lei Wang , Kang Huang , Ke Sun , Wei Wang , Chen Tian , Lei Xie , and Qing Gu . 2018 . Unlock with your heart: Heartbeat-based authentication on commercial mobile phones . Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 2 , 3 (2018), 1 -- 22 . Lei Wang, Kang Huang, Ke Sun, Wei Wang, Chen Tian, Lei Xie, and Qing Gu. 2018. Unlock with your heart: Heartbeat-based authentication on commercial mobile phones. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 2, 3 (2018), 1--22.","journal-title":"Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLC.2007.4370317"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133265.1133303"},{"key":"e_1_2_1_55_1","volume-title":"10th Symposium On Usable Privacy and Security ({SOUPS}","author":"Xu Hui","year":"2014","unstructured":"Hui Xu , Yangfan Zhou , and Michael R Lyu . 2014 . Towards continuous and passive authentication via touch biometrics: An experimental study on smartphones . In 10th Symposium On Usable Privacy and Security ({SOUPS} 2014). 187--198. Hui Xu, Yangfan Zhou, and Michael R Lyu. 2014. Towards continuous and passive authentication via touch biometrics: An experimental study on smartphones. In 10th Symposium On Usable Privacy and Security ({SOUPS} 2014). 187--198."},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185465"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23130"},{"key":"e_1_2_1_58_1","unstructured":"Safe Vault Hide your photos by FT Apps Inc. 2020. https:\/\/apps.apple.com\/us\/app\/safe-vault-hide-your-photos\/id1200107476. Safe Vault Hide your photos by FT Apps Inc. 2020. https:\/\/apps.apple.com\/us\/app\/safe-vault-hide-your-photos\/id1200107476."},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/WACV.2015.35"},{"key":"e_1_2_1_60_1","volume-title":"Continuous mobile authentication using a novel graphic touch gesture feature. In 2013 IEEE sixth international conference on biometrics: theory, applications and systems (BTAS)","author":"Zhao Xi","unstructured":"Xi Zhao , Tao Feng , and Weidong Shi . 2013. Continuous mobile authentication using a novel graphic touch gesture feature. In 2013 IEEE sixth international conference on biometrics: theory, applications and systems (BTAS) . IEEE , 1--6. Xi Zhao, Tao Feng, and Weidong Shi. 2013. Continuous mobile authentication using a novel graphic touch gesture feature. In 2013 IEEE sixth international conference on biometrics: theory, applications and systems (BTAS). IEEE, 1--6."},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2014.43"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243777"}],"container-title":["Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3432192","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T19:20:47Z","timestamp":1672600847000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3432192"}},"subtitle":["User Authentication on Mobile Devices via Inertial-Touch Gesture Analysis"],"short-title":[],"issued":{"date-parts":[[2020,12,17]]},"references-count":62,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2020,12,17]]}},"alternative-id":["10.1145\/3432192"],"URL":"http:\/\/dx.doi.org\/10.1145\/3432192","relation":{},"ISSN":["2474-9567"],"issn-type":[{"value":"2474-9567","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,12,17]]},"assertion":[{"value":"2020-12-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}