{"title":"A flick biometric authentication mechanism on mobile devices","authors":"Dong-Her Shih, Chia-Ming Lu, Ming-Hung Shih","doi":"10.1109/ICCSS.2015.7281144","DOIUrl":null,"url":null,"abstract":"Smartphones nowadays are used not only for communication but also for many emerging applications, such as m-commerce. And, biometric methods can provide promising applications to secure mobile devices. In this paper, we propose a novel authentication mechanism using the information collected from the accelerometer sensor and touchscreen of the smartphone. We design an authentication mechanism that adopts features transformed from those readings. Experimental result show that the proposed mechanism can build a robust authentication environment for smartphone users.","PeriodicalId":299619,"journal":{"name":"2015 International Conference on Informative and Cybernetics for Computational Social Systems (ICCSS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"14","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 International Conference on Informative and Cybernetics for Computational Social Systems (ICCSS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCSS.2015.7281144","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 14
Abstract
Smartphones nowadays are used not only for communication but also for many emerging applications, such as m-commerce. And, biometric methods can provide promising applications to secure mobile devices. In this paper, we propose a novel authentication mechanism using the information collected from the accelerometer sensor and touchscreen of the smartphone. We design an authentication mechanism that adopts features transformed from those readings. Experimental result show that the proposed mechanism can build a robust authentication environment for smartphone users.