REFERENCES
(2002). Fingerprint verification competition databases.
(2016). Multi-factor authentication (mfa) market. Technical
report, MarketsandMarkets.
Alzubaidi, A. and Kalita, J. (2016). Authentication of
smartphone users using behavioral biometrics. IEEE
Communications Surveys & Tutorials, 18(3):1998–
2026.
Barni, M., Bianchi, T., Catalano, D., Raimondo, M. D., La-
bati, R. D., Failla, P., Fiore, D., Lazzeretti, R., Pi-
uri, V., Piva, A., and Scotti, F. (2010). A privacy-
compliant fingerprint recognition system based on ho-
momorphic encryption and fingercode templates. In
BTAS 2010.
Beton, M., Marie, V., and Rosenberger, C. (2013). Bio-
metric secret path for mobile user authentication: A
preliminary study. In Computer and Information Tech-
nology (WCCIT), 2013 World Congress on, pages 1–6.
IEEE.
Buriro, A. (2017). Behavioral Biometrics for Smartphone
User Authentication. PhD thesis, University of Trento.
Burr, W. E., Dodson, D. F., Newton, E. M., Perlner, R. A.,
Polk, W. T., Gupta, S., and Nabbus, E. A. (2013). Nist
special publication 800-63-2: Electronic authentica-
tion guideline. Technical report, NIST.
Chabanne, H., Bringer, J., Cohen, G., Kindarji, B., and Ze-
mor, G. (2007). Optimal iris fuzzy sketches. In IEEE
first conference on biometrics BTAS.
Changa, T.-Y., Tsaib, C.-J., and Lina, J.-H. (2012). A
graphical-based password keystroke dynamic authen-
tication system for touch screen handheld mobile
devices. The Journal of Systems and Software,
85:1157?1165.
Choi, K., Toh, K.-A., and Byun, H. (2011). Realtime train-
ing on mobile devices for face recognition applica-
tions. Pattern Recognition, 44:386?400.
Clarke, N. and Furnell, S. (2007). Advanced user authen-
tication for mobile devices. Computers & Security,
26:109–119.
de Santos-Sierra, A., Sanchez-Avila, C., Guerra-Casanova,
J., and Mendaza-Ormaza, A. (2011). Hand Bio-
metrics in Mobile Devices, chapter Advanced
Biometric Technologies. InTech. Available
from: http://www.intechopen.com/books/advanced-
biometric-technologies/hand-biometrics-in-mobile-
devices1.
Galdi, C., Nappi, M., and Dugelay, J.-L. (2016). Multi-
modal authentication on smartphones: Combining iris
and sensor recognition for a double check of user iden-
tity. Pattern Recognition Letters, 82:144–153.
Hadid, A., Heikkila, J. Y., Silven, O., and Pietikainen, M.
(2007). Face and eye detection for person authentica-
tion in mobile phones. In 1st ACM/IEEE International
Conference on Distributed Smart Cameras.
Hwang, S., Cho, S., and Park, S. (2009). Keystroke
dynamics-based authentication for mobile devices.
Computer & Security, 28:85–93.
Juels, A. and Wattenberg, M. (1999). A fuzzy commitment
scheme. In ACM Conference on Computer and Com-
munications Security, pages 28–36.
Kang, J.-S. (2010). Mobile iris recognition systems: An
emerging biometric technology. In International Con-
ference on Computational Science (ICCS).
Kounoudes, A., Antonakoudi, A., Kekatos, V., and Peleties,
P. (2006). Combined speech recognition and speaker
verification over the fixed and mobile telephone net-
works. In Proceedings of the 24th IASTED Inter-
national Conference on Signal processing, Pattern
Recognition, and Applications, pages 228–233.
Luca, A. D., Hang, A., Brudy, F., Lindner, C., and Huss-
mann, H. (2012). Touch me once and i know it’s you!:
implicit authentication based on touch screen patterns.
In Proceedings of the 2012 ACM annual conference
on Human Factors in Computing Systems.
Mahbub, U., Sarkar, S., Patel, V. M., and Chellappa, R.
(2016). Active user authentication for smartphones: A
challenge data set and benchmark results. In Biomet-
rics Theory, Applications and Systems (BTAS), 2016
IEEE 8th International Conference on, pages 1–8.
IEEE.
Miluzzo, E., Varshavsky, A., Balakrishnan, S., and Choud-
hury, R. (2012). Tapprints: your finger taps have fin-
gerprints. In Proceedings of the 10th international
conference on Mobile systems, applications, and ser-
vices.
Nagar, A., Nandakumar, K., and Jain, A. K. (2010). Bio-
metric template transformation: A security analy-
sis. Proceedings of SPIE, Electronic Imaging, Media
Forensics and Security XII.
Orandi, S. and McCabe, R. M. (2009). Mobile id
device. best practice recommendation. NIST
Special Publication 500-280. Available from:
http://www.nist.gov/itl/iad/ig/upload/MobileID-
BPRS-20090825-V100.pdf.
Project, A. O. S. (2016). Fingerprint hal.
Rathgeb, C. and Uhl, A. (2011). A survey on biometric
cryptosystems and cancelable biometrics. EURASIP
J. on Information Security, 3.
Roy, A., Magimai.-Doss, M., and Marcel, S. (2012). A
fast parts-based approach to speaker verification using
boosted slice classifiers. IEEE Trans. on Information
Forensics and Security, 7:241–254.
Sae-Bae, N., Memon, N., and Isbister, K. (2012). Investigat-
ing multi-touch gestures as a novel biometric modal-
ity. In IEEE Fifth International Conference on Bio-
metrics: Theory, Applications and Systems (BTAS).
Saevanee, H., Clarke, N., Furnell, S., and Biscione, V.
(2014). Text-based active authentication for mobile
devices. In IFIP International Information Security
Conference, pages 99–112. Springer.
Safa, N. A., Safavi-Naini, R., and Shahandashti, S. F.
(2014). Privacy-preserving implicit authentication. In
IFIP International Information Security Conference,
pages 471–484. Springer.
Statista (2016). Penetration of smartphones with fingerprint
sensors worldwide from 2014 to 2018.
ICISSP 2018 - 4th International Conference on Information Systems Security and Privacy
180