GazeLockPatterns: Comparing Authentication Using Gaze and Touch for Entering Lock Patterns

被引:2
|
作者
Abdrabou, Yasmeen [1 ]
Pfeuffer, Ken [1 ]
Khamis, Mohamed [2 ]
Alt, Florian [1 ]
机构
[1] Bundeswehr Univ Munich, Munich, Germany
[2] Univ Glasgow, Glasgow, Lanark, Scotland
关键词
Gaze Patterns; Touch Patterns; Authentication;
D O I
10.1145/3379156.3391371
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this work, we present a comparison between Android's lock patterns for mobile devices (TouchLockPatterns) and an implementation of lock patterns that uses gaze input (GazeLockPatterns). We report on results of a between subjects study (N=40) to show that for the same layout of authentication interface, people employ comparable strategies for pattern composition. We discuss the pros and cons of adapting lock patterns to gaze-based user interfaces. We conclude by opportunities for future work, such as using data collected during authentication for calibrating eye trackers.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] Touch-based Smartphone Authentication Using Import Vector Domain Description
    Zou, Bin
    Li, Yantao
    [J]. 2018 IEEE 29TH INTERNATIONAL CONFERENCE ON APPLICATION-SPECIFIC SYSTEMS, ARCHITECTURES AND PROCESSORS (ASAP), 2018, : 85 - 88
  • [32] Fingerprint Authentication on Touch Sensor using Phase-Only Correlation Method
    Shabrina, Nabilah
    Isshiki, Tsuyoshi
    Kunieda, Hiroaki
    [J]. 7TH INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION TECHNOLOGY FOR EMBEDDED SYSTEMS 2016 (IC-ICTES 2016), 2016, : 85 - 89
  • [33] Analysis of Strong Password Using Keystroke Dynamics Authentication in Touch Screen Devices
    Salem, Asma
    Zaidan, Dema
    Swidan, Andraws
    Saifan, Ramzi
    [J]. 2016 CYBERSECURITY AND CYBERFORENSICS CONFERENCE (CCC), 2016, : 15 - 21
  • [34] Towards Continuous User Authentication Using Personalised Touch-Based Behaviour
    Aaby, Peter
    Giuffrida, Mario Valerio
    Buchanan, William J.
    Tan, Zhiyuan
    [J]. 2020 IEEE INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, INTL CONF ON CLOUD AND BIG DATA COMPUTING, INTL CONF ON CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/CBDCOM/CYBERSCITECH), 2020, : 41 - 48
  • [35] Behavior Based Human Authentication on Touch Screen Devices Using Gestures and Signatures
    Shahzad, Muhammad
    Liu, Alex X.
    Samuel, Arjmand
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2017, 16 (10) : 2726 - 2741
  • [36] An improved user authentication scheme on smartphone using dominating attribute of touch data
    Shankar, Vishnu
    Singh, Karan
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2019, 22 (08): : 1549 - 1561
  • [37] Continuous authentication for smartphones using face images and touch-screen operation
    Kinoshita, Shuto
    Watanabe, Yuka
    Yamazaki, Yasushi
    [J]. PROCEEDINGS OF 2022 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2022, : 1556 - 1560
  • [38] Investigation of Touch-Based User Authentication Features Using Android Smartphone
    Alariki, Ala Abdulhakim
    Manaf, Azizah Abdul
    [J]. ADVANCED MACHINE LEARNING TECHNOLOGIES AND APPLICATIONS, AMLTA 2014, 2014, 488 : 135 - 144
  • [39] Effects of different methods of reflection on nurses' gaze and judgement in a task using a touch panel
    Nishimura, Ayako
    [J]. JOURNAL OF CLINICAL NURSING, 2018, 27 (3-4) : e569 - e577
  • [40] A simulation of diffraction patterns using a lock-in detection code
    Kolmanovsky, M.
    Hill, T.
    Kim, W. J.
    [J]. AMERICAN JOURNAL OF PHYSICS, 2024, 92 (08) : 593 - 596