This is a study of the behavioral biometric of smartphone motion to determine the potential accuracy of authenticating users on smartphone devices. The study used the application Sensor Kinetics Pro and the Weka machine-learning library to analyze accelerometer and gyroscope data. The study conducted three experiments for the research. They were conducted in spring 2015, fall 2015, and spring 2016. The final experiment in spring 2016 used six Android-based smartphones to capture data from 60 participants and each participant performed 20 trials of two motions: bringing the phone up to eye level for review, and then bringing the phone to the ear, resulting in 1200 runs. The resulting sensor datasets were used for machine learning training an...
In order to use mobile devices safely, many researchers have worked on topics related to mobile secu...
Current state of the art authentication systems for mobile devices primarily rely on single point of...
Abstract: Ubiquitous mobile devices like smartphones and tablets are often not se-cured against unau...
This thesis investigates the feasibility of authenticating a user through a behavioral biometric sig...
The growing trend of using smartphones as personal computing platforms to access and store private i...
In this research, we consider the problem of authentication on a smartphone based on gestures, that ...
Color poster with text, charts, and graphs.Today’s research finds that behavioral biometrics, a meth...
© 2018 Elsevier Ltd In this paper, we present a behavioral biometric-based smartphone user authentic...
Current smartphone security techniques offer less reliability. As an instance, personal identificati...
Abstract: Smartphones have become the standard personal device to store private or sensitive informa...
The authentication via accelerometer-based biometric gait recognition offers a user-friendly alterna...
Research on mobile sensor biometrics increased when mobile devices with powerful sensors, such as sm...
Current mobile user authentication systems based on PIN codes, fingerprint, and face recognition hav...
Continuous authentication modalities allow a device to authenticate users transparently without inte...
Human physical motion activity identification has many potential applications in various fields, suc...
In order to use mobile devices safely, many researchers have worked on topics related to mobile secu...
Current state of the art authentication systems for mobile devices primarily rely on single point of...
Abstract: Ubiquitous mobile devices like smartphones and tablets are often not se-cured against unau...
This thesis investigates the feasibility of authenticating a user through a behavioral biometric sig...
The growing trend of using smartphones as personal computing platforms to access and store private i...
In this research, we consider the problem of authentication on a smartphone based on gestures, that ...
Color poster with text, charts, and graphs.Today’s research finds that behavioral biometrics, a meth...
© 2018 Elsevier Ltd In this paper, we present a behavioral biometric-based smartphone user authentic...
Current smartphone security techniques offer less reliability. As an instance, personal identificati...
Abstract: Smartphones have become the standard personal device to store private or sensitive informa...
The authentication via accelerometer-based biometric gait recognition offers a user-friendly alterna...
Research on mobile sensor biometrics increased when mobile devices with powerful sensors, such as sm...
Current mobile user authentication systems based on PIN codes, fingerprint, and face recognition hav...
Continuous authentication modalities allow a device to authenticate users transparently without inte...
Human physical motion activity identification has many potential applications in various fields, suc...
In order to use mobile devices safely, many researchers have worked on topics related to mobile secu...
Current state of the art authentication systems for mobile devices primarily rely on single point of...
Abstract: Ubiquitous mobile devices like smartphones and tablets are often not se-cured against unau...