User Verification using Safe Handwritten Passwords on Smartphones

被引:0
|
作者
Kutzner, Tobias [1 ]
Ye, Fanyu [1 ]
Boenninger, Ingrid [1 ]
Travieso, Carlos [2 ]
Dutta, Malay Kishore [3 ]
Singh, Anushikha [3 ]
机构
[1] Brandenburg Tech Univ Cottbus Senftenberg, Senftenberg, Germany
[2] Univ Las Palmas Gran Canaria, IDeTIC, Dept Senales & Comunicac, Las Palmas Gran Canaria, Spain
[3] Amity Univ, Amity Sch Engn & Technol, Noida, India
关键词
Biometric; Verification; Feature selection; Classification;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This article focuses on the writer verification using safe handwritten passwords on smartphones. We extract and select 25 static and dynamic biometric features from a handwritten character password sequence on an android touch-screen device. For the writer verification we use the classification algorithms of WEKA framework. Our 32 test persons wrote generated safe passwords with a length of 8 characters. Each person wrote their password 12 times. The approach works with 384 training samples on a supervised system. The best result of 98.72% success rate for a correct classification, the proposal reached with the KStar and k-Nearest Neighbor classifier after ranking with Fisher Score feature selection. The best result of 10.42% false accepted rate is reached with KStar classifier.
引用
收藏
页码:48 / 53
页数:6
相关论文
共 50 条
  • [41] Demo: ASSV: Handwritten Signature Verification Using Acoustic Signals
    Ding, Feng
    Wang, Dong
    Zhang, Qian
    Zhao, Run
    UBICOMP/ISWC'19 ADJUNCT: PROCEEDINGS OF THE 2019 ACM INTERNATIONAL JOINT CONFERENCE ON PERVASIVE AND UBIQUITOUS COMPUTING AND PROCEEDINGS OF THE 2019 ACM INTERNATIONAL SYMPOSIUM ON WEARABLE COMPUTERS, 2019, : 274 - 277
  • [42] Secure User Authentication with Graphical Passwords and PassText
    Mohd, Raj Mohammed
    Bindu, C. Shoba
    Vasumathi, D.
    PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INFORMATICS, ICCII 2016, 2017, 507 : 523 - 533
  • [43] User Perceptions of Five-Word Passwords
    Wu, Xiaoyuan
    Munyendo, Collins W.
    Cosic, Eddie
    Flynn, Genevieve A.
    Legault, Olivia
    Aviv, Adam J.
    PROCEEDINGS OF THE 38TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, ACSAC 2022, 2022, : 605 - 618
  • [44] Methods of Generating Key Sequences Based on Parameters of Handwritten Passwords and Signatures
    Lozhnikov, Pavel
    Sulavko, Alexey
    Eremenko, Alexander
    Volkov, Danil
    INFORMATION, 2016, 7 (04)
  • [45] Tracking User Information Using Motion Data through Smartphones
    Kelishomi, Aghil Esmaeili
    Cai, Zhongmin
    Shayesteh, Mohammad Hossein
    2017 IEEE INTERNATIONAL JOINT CONFERENCE ON BIOMETRICS (IJCB), 2017, : 286 - 293
  • [46] SmileAuth: Using Dental Edge Biometrics for User Authentication on Smartphones
    Jiang, Hongbo
    Cao, Hangcheng
    Liu, Daibo
    Xiong, Jie
    Cao, Zhichao
    PROCEEDINGS OF THE ACM ON INTERACTIVE MOBILE WEARABLE AND UBIQUITOUS TECHNOLOGIES-IMWUT, 2020, 4 (03):
  • [47] What a smartphone is to me: understanding user values in using smartphones
    Jung, Yoonhyuk
    INFORMATION SYSTEMS JOURNAL, 2014, 24 (04) : 299 - 321
  • [48] Comparing passwords, tokens, and biometrics for user authentication
    Esch, J
    PROCEEDINGS OF THE IEEE, 2003, 91 (12) : 2019 - 2020
  • [49] Automatic Registration of User Drawn Graphical Passwords
    Jebriel, Salem
    Poet, Ron
    2014 6TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSIT), 2014, : 172 - 177
  • [50] Verification of handwritten signatures: an overview
    Impedovo, S.
    Pirlo, G.
    14TH INTERNATIONAL CONFERENCE ON IMAGE ANALYSIS AND PROCESSING, PROCEEDINGS, 2007, : 191 - 196