Keystroke Authentication on Mobile Devices with a Capacitive Display

Matthias Trojahn, Frank Ortmeier

2013

Abstract

Nowadays, it is common to address security problems in the newspaper. Losing or stealing of mobile devices (smartphones and tablets) is in particular an important topic. A lot of information can be stored and accessed via these devices. The one reason why this problem exists, is because the mobile devices are not secured properly. In our work we present an authentication method for these mobile devices.We are using the keystroke dynamics during typing a PIN (four or six numbers) or password. With this the security of the devices gets improved. Keystroke dynamics are already used for authentication on PCs and on mobile phones with hardware keys on a 12-key layout.

References

  1. Alsulaiman, F. A., Cha, J., and Saddik, A. (2008). User identification based on handwritten signatures with haptic information. In Proceedings of the 6th international conference on Haptics: Perception, Devices and Scenarios, EuroHaptics 7808, pages 114-121, Berlin and Heidelberg. Springer-Verlag.
  2. Buchoux, A. and Clarke, N. L. (2008). Deployment of keystroke analysis on a smartphone. In Proceedings of the 6th Australian Information Security & Management Conference.
  3. Clarke, N. L. and Furnell, S. M. (2006). Authenticating mobile phone users using keystroke analysis. In Int. J. Inf.
  4. Pan, C. S., Shell, R. L., and Schleifer, L. M. (1994). Performance variability as an indicator of fatigue and boredom effects in a vdt data-entry task. International Journal of Human-Computer Interaction, 6(1):37-45.
  5. Ross, A. A., Nandakumar, K., and Jain, A. K. (2006). Handbook of Multibiometrics (International Series on Biometrics). Springer-Verlag New York, Inc, Secaucus and NJ and USA.
  6. Shanmugapriya, D. and Padmavathi, G. (2009). A survey of biometric keystroke dynamics: Approaches, security and challenges. In International Journal of Computer Science and Information Security, volume abs/0910.0817 of Vol. 5, No. 1.
  7. Trojahn, M. and Ortmeier, F. (2012). Biometric authentication through a virtual keyboard for smartphones. In International Journal of Computer Science & Information Technology (IJCSIT).
  8. Vielhauer, C. (2006). Biometric User Authentication for IT Security: From Fundamentals to Handwriting. Advances in information security. Springer-Verlag.
  9. Vizer, L. M., Zhou, L., and Sears, A. (2009). Automated stress detection using keystroke and linguistic features: An exploratory study. International Journal of Human-Computer Studies, 67(10):870-886.
Download


Paper Citation


in Harvard Style

Trojahn M. and Ortmeier F. (2013). Keystroke Authentication on Mobile Devices with a Capacitive Display . In Proceedings of the 2nd International Conference on Pattern Recognition Applications and Methods - Volume 1: BTSA, (ICPRAM 2013) ISBN 978-989-8565-41-9, pages 637-640. DOI: 10.5220/0004344806370640


in Bibtex Style

@conference{btsa13,
author={Matthias Trojahn and Frank Ortmeier},
title={Keystroke Authentication on Mobile Devices with a Capacitive Display},
booktitle={Proceedings of the 2nd International Conference on Pattern Recognition Applications and Methods - Volume 1: BTSA, (ICPRAM 2013)},
year={2013},
pages={637-640},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004344806370640},
isbn={978-989-8565-41-9},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 2nd International Conference on Pattern Recognition Applications and Methods - Volume 1: BTSA, (ICPRAM 2013)
TI - Keystroke Authentication on Mobile Devices with a Capacitive Display
SN - 978-989-8565-41-9
AU - Trojahn M.
AU - Ortmeier F.
PY - 2013
SP - 637
EP - 640
DO - 10.5220/0004344806370640