Unlock the Smartphones. In 2017 Second Interna-
tional Conference on Recent Trends and Challenges in
Computational Models (ICRTCCM), pages 153–158.
Google (2019). Firebase. https://firebase.google.com.
Guse, D. (2011a). Gesture-based User Authentication on
Mobile Devices using Accelerometer and Gyroscope.
Master’s thesis, Berlin Institue of Technology.
Guse, D. (2011b). Gesture-based user authentication on
mobile devices using accelerometer and gyroscope.
Master thesis, Technische Universit
¨
at Berlin.
Huang, C., Yang, Z., Chen, H., and Zhang, Q. (2017). Sign-
ing in the Air w/o Constraints: Robust Gesture-Based
Authentication for Wrist Wearables. In GLOBECOM
2017 - 2017 IEEE Global Communications Confer-
ence, pages 1–6.
Huang, J., Troia, F. D., and Stamp, M. (2018). Acoustic gait
analysis using support vector machines. In 4th Inter-
national Conference on Information Systems Security
and Privacy, ICISSP 2018, pages 545–552.
Imura, S. and Hosobe, H. (2018). A hand gesture-based
method for biometric authentication. http://www.
hosobe.org/wp-content/uploads/hcii2018.pdf.
Liu, C., Clark, G. D., and Lindqvist, J. (2017). Guessing
Attacks on User-Generated Gesture Passwords. Proc.
ACM Interact. Mob. Wearable Ubiquitous Technol.,
1(1):3:1–3:24.
Liu, J., Zhong, L., Wickramasuriya, J., and Vasudevan, V.
(2009a). uWave: Accelerometer-based personalized
gesture recognition and its applications. Pervasive and
Mobile Computing, 5(6):657 – 675. PerCom 2009.
Liu, J., Zhong, L., Wickramasuriya, J., and Vasudevan, V.
(2009b). uWave: Accelerometer-based personalized
gesture recognition and its applications. Pervasive and
Mobile Computing, 5:657–675.
Lu, D., Xu, K., and Huang, D. (2018). A data driven in-
air-handwriting biometric authentication system. In
IEEE International Joint Conference on Biometrics,
IJCB 2017, pages 531–537.
Meng, Y., Wong, D. S., Schlegel, R., and Kwok, L.-f.
(2013). Touch gestures based biometric authenti-
cation scheme for touchscreen mobile phones. In
Kutyłowski, M. and Yung, M., editors, Information
Security and Cryptology, pages 331–350.
Mitra, S. and Acharya, T. (2007). Gesture Recognition:
A Survey. IEEE Transactions on Systems, Man,
and Cybernetics, Part C (Applications and Reviews),
37(3):311–324.
Polamuri, S. (2017). SVM classifier implemen-
tation in Python with scikit-learn. http:
//dataaspirant.com/2017/01/25/svm-classifier-
implemenation-python-scikit-learn/.
Rabiner, L. R. (1989). A tutorial on hidden Markov models
and selected applications in speech recognition. Pro-
ceedings of the IEEE, 77(2):257–286.
Shlens, J. (2005). A tutorial on principal component analy-
sis. http://www.cs.cmu.edu/
∼
elaw/papers/pca.pdf.
Singh, M. S., Pondenkandath, V., Zhou, B., Lukowicz, P.,
and Liwickit, M. (2017). Transforming sensor data
to the image domain for deep learning - An appli-
cation to footstep detection. In 2017 International
Joint Conference on Neural Networks (IJCNN), pages
2665–2672.
Stamp, M. (2011). Information Security: Principles and
Practice. Wiley, 2nd edition.
Stamp, M. (2017). Introduction to Machine Learning with
Applications in Information Security. Chapman and
Hall/CRC, Boca Raton.
Sundaravaradhan, P. (2019). Gesture dataset. gestureData.
zip.
Suriya Prakash, J., Annamalai Vignesh, K., Ashok, C., and
Adithyan, R. (2012). Multi class support vector ma-
chines classifier for machine vision application. In
2012 International Conference on Machine Vision and
Image Processing, MVIP 2012, pages 197–199.
Yang, J., Li, Y., and Xie, M. (2015). MotionAuth: Motion-
based authentication for wrist worn smart devices.
In 2015 IEEE International Conference on Pervasive
Computing and Communication Workshops (PerCom
Workshops), pages 550–555.
Yang, L., Guo, Y., Ding, X., Han, J., Liu, Y., Wang, C.,
and Hu, C. (2015). Unlocking Smart Phone through
Handwaving Biometrics. IEEE Transactions on Mo-
bile Computing, 14(5):1044–1055.
ForSE 2021 - 5th International Workshop on FORmal methods for Security Engineering
780