In this study, we produce a new continuous authentication scheme for gesture-typing on mobile devices. Our scheme is the first scheme that authenticates gesture-typing interactions in a word-independent format. The scheme relies on groupings of features extracted from the word gesture after it has been reduced to parts common to all gestures. We show that movement sensors are also important in differentiating between users. We describe the feature extraction processes and analyse our proposed feature set. The unique process of our authentication scheme is presented and described. We collect our own gesture typing dataset including data collected during sitting, standing and walking activities for realism. We test our features against state-...
Touchscreens, the dominant input type for mobile devices, require unique authentication solutions. G...
Common authentication mechanisms in mobile devices such as passwords and Personal Identification Num...
Current state of the art authentication systems for mobile devices primarily rely on single point of...
Mobile devices are one of the most popular technologies in the world. Sales have increased yearly an...
Mobile devices are one of the most popular technologies in the world. Sales have increased yearly an...
Mobile devices are one of the most popular technologies in the world. Sales have increased yearly an...
This article proposes an innovative biometric technique based on the idea of authenticating a person...
This article proposes an innovative biometric technique based on the idea of authenticating a person...
The most commonly used system on desktop computers is a simple username and password approach which ...
The most commonly used system on desktop computers is a simple username and password approach which ...
The most commonly used system on desktop computers is a simple username and password approach which ...
This paper focuses on how touch interactions on smartphones can provide a continuous user authentica...
This paper focuses on how touch interactions on smartphones can provide a continuous user authentica...
This paper focuses on how touch interactions on smartphones can provide a continuous user authentica...
With the booming of smart phone and high-speed wireless networks in recent years, applications and d...
Touchscreens, the dominant input type for mobile devices, require unique authentication solutions. G...
Common authentication mechanisms in mobile devices such as passwords and Personal Identification Num...
Current state of the art authentication systems for mobile devices primarily rely on single point of...
Mobile devices are one of the most popular technologies in the world. Sales have increased yearly an...
Mobile devices are one of the most popular technologies in the world. Sales have increased yearly an...
Mobile devices are one of the most popular technologies in the world. Sales have increased yearly an...
This article proposes an innovative biometric technique based on the idea of authenticating a person...
This article proposes an innovative biometric technique based on the idea of authenticating a person...
The most commonly used system on desktop computers is a simple username and password approach which ...
The most commonly used system on desktop computers is a simple username and password approach which ...
The most commonly used system on desktop computers is a simple username and password approach which ...
This paper focuses on how touch interactions on smartphones can provide a continuous user authentica...
This paper focuses on how touch interactions on smartphones can provide a continuous user authentica...
This paper focuses on how touch interactions on smartphones can provide a continuous user authentica...
With the booming of smart phone and high-speed wireless networks in recent years, applications and d...
Touchscreens, the dominant input type for mobile devices, require unique authentication solutions. G...
Common authentication mechanisms in mobile devices such as passwords and Personal Identification Num...
Current state of the art authentication systems for mobile devices primarily rely on single point of...