{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:05:10Z","timestamp":1775001910517,"version":"3.50.1"},"reference-count":243,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Surv. Tutorials"],"published-print":{"date-parts":[[2015]]},"DOI":"10.1109\/comst.2014.2386915","type":"journal-article","created":{"date-parts":[[2014,12,31]],"date-time":"2014-12-31T19:34:06Z","timestamp":1420054446000},"page":"1268-1293","source":"Crossref","is-referenced-by-count":224,"title":["Surveying the Development of Biometric User Authentication on Mobile Phones"],"prefix":"10.1109","volume":"17","author":[{"given":"Weizhi","family":"Meng","sequence":"first","affiliation":[]},{"given":"Duncan S.","family":"Wong","sequence":"additional","affiliation":[]},{"given":"Steven","family":"Furnell","sequence":"additional","affiliation":[]},{"given":"Jianying","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2013.6698991"},{"key":"ref172","first-page":"640","article-title":"Biometric access control through numerical keyboards based on keystroke dynamics","author":"rodrigues","year":"0","journal-title":"Proc ICB Adv"},{"key":"ref171","first-page":"1","article-title":"Progressive authentication: Deciding when to authenticate on mobile phones","author":"riva","year":"0","journal-title":"Proc 21st USENIX Security Symp"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69812-8_101"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40925-7_5"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2009.4784783"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89991-4_19"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30436-1_38"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1109\/ICNSS.2011.6060004"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1147\/sj.403.0614"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.1004"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(02)00304-8"},{"key":"ref38","first-page":"1091","article-title":"Biometric gait recognition based on wireless acceleration sensor using k-nearest neighbor classification","author":"choi","year":"0","journal-title":"Proc ICNC"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1049\/iet-spr.2008.0171"},{"key":"ref32","first-page":"386","article-title":"Mobile authentication through touch-behavior features","author":"cai","year":"0","journal-title":"Proc CCBR"},{"key":"ref31","first-page":"273","article-title":"On the practicality of motion based keystroke inference attack","author":"cai","year":"0","journal-title":"Proc TRUST"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1592606.1592614"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/s10044-011-0248-4"},{"key":"ref36","first-page":"197","article-title":"Pupil and iris localization for iris recognition in mobile phones","author":"cho","year":"0","journal-title":"Proc SNDP"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2594373"},{"key":"ref34","first-page":"549","article-title":"A secured mobile phone based on embedded fingerprint recognition systems","author":"chen","year":"0","journal-title":"Proc ISIT"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2302582"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2316472"},{"key":"ref185","first-page":"17","article-title":"Soundcomber: A stealthy and context-aware sound trojan for smartphones","author":"schlegel","year":"0","journal-title":"Proc NDSS"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.1145\/2632048.2636090"},{"key":"ref183","year":"2000","journal-title":"SAGEM Points a Finger at GSM"},{"key":"ref182","author":"pramis","year":"2013","journal-title":"EyeVerify Developing an Eye-Scanning Unlock Tool for your Phone"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2009.5403026"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-008-0113-x"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.4108\/ICST.MOBILWARE2008.2492"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2006.873603"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557346"},{"key":"ref27","first-page":"1","article-title":"Deployment of keystroke analysis on a smartphone","author":"buchoux","year":"0","journal-title":"Proc 6th Australian Inf Security Manage Conf"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208543"},{"key":"ref29","first-page":"1","article-title":"Touchlogger: Inferring keystrokes on touch screen from smartphone motion","author":"cai","year":"0","journal-title":"Proc 6th USENIX Conf HotSec"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/581271.581272"},{"key":"ref22","first-page":"1","article-title":"Usability analysis of biometric authentication systems on mobile phones","author":"bhagavatula","year":"0","journal-title":"Proc SOUPS"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/S0969-4765(13)70128-0"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/11493648_1"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2011.0012"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1002\/acp.1014"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1132736.1132768"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2012.10.002"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-012-0579-1"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1109\/IIH-MSP.2012.11"},{"key":"ref153","author":"myers","year":"2004","journal-title":"An Exploration of Voice Biometrics"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1109\/CSPA.2011.5759842"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1109\/MMCS.1999.779298"},{"key":"ref150","first-page":"62500d-1","article-title":"Multimodal person authentication on a smartphone under realistic conditions","author":"morris","year":"0","journal-title":"Proc SPIE"},{"key":"ref152","first-page":"293","article-title":"An analysis of different approaches to gait recognition using cell phone based accelerometers","author":"muaaz","year":"0","journal-title":"Proc MoMM"},{"key":"ref151","first-page":"73","article-title":"Password hardening based on keystroke dynamics","author":"monrose","year":"0","journal-title":"Proc 6th ACM Conf CCS"},{"key":"ref146","first-page":"1","article-title":"I can be you: Questioning the use of keystroke dynamics as biometrics","author":"meng","year":"0","journal-title":"Proc NDSS"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1145\/1814433.1814437"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307666"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1109\/ICT.2014.6845158"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1998.674831"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.818350"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/34.244676"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/SLT.2008.4777826"},{"key":"ref55","first-page":"11","article-title":"Retinal recognition&#x2014;Biometric technology in practice","volume":"22","author":"das","year":"2007","journal-title":"Keesing Journal of Documents & Identity"},{"key":"ref54","doi-asserted-by":"crossref","first-page":"945","DOI":"10.1109\/TPAMI.2010.164","article-title":"Multifeature-based high-resolution palmprint recognition","volume":"33","author":"dai","year":"2011","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-012-0179-x"},{"key":"ref52","first-page":"1","article-title":"The best of both worlds. A framework for the synergistic operation of host and cloud anomaly-based IDS for smartphones","author":"damopoulos","year":"0","journal-title":"Proc 7th EuroSec Workshop Syst"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1108\/09685220310489526"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2011.5981729"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.070813.00214"},{"key":"ref165","author":"pabbaraju","year":"2010","journal-title":"Face Recognition in Mobile Devices"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1145\/1409240.1409304"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1155\/2008\/281943"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1145\/2645791.2645799"},{"key":"ref161","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1007\/s11235-010-9313-3","article-title":"Monocular camera-based face liveness detection by combining eye-blink and scene context","volume":"47","author":"pan","year":"2009","journal-title":"J Telecommun Syst"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2007.4409068"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2007.70207"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/RVSP.2011.92"},{"key":"ref6","first-page":"130","article-title":"Exploring touch screen biometrics for user identification on smart phones","author":"angulo","year":"0","journal-title":"Privacy and Identity Management for Life"},{"key":"ref5","first-page":"242","article-title":"Cancelable key-based fingerprint templates","author":"ang","year":"0","journal-title":"Proc ACISP"},{"key":"ref8","year":"0","journal-title":"Find my iPhone iPad iPod touch or Mac"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2013.19"},{"key":"ref7","year":"2012","journal-title":"Apple Invents Facial Recognition Locking & Unlocking System"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1002\/sec.341"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370329"},{"key":"ref9","first-page":"499","article-title":"AirAuth: A biometric authentication system using in-air hand gestures","author":"aumi","year":"0","journal-title":"Proc CHI"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1145\/2162081.2162095"},{"key":"ref46","author":"daniel","year":"2013","journal-title":"HTC One Max and Sense 5 5 All the New Features Review"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2010.5593258"},{"key":"ref48","first-page":"17","article-title":"iSAM: An iPhone stealth airborne Malware","author":"damopoulos","year":"0","journal-title":"Proc IFIP Int Inf SEC"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2004.21"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-006-0006-6"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2005.08.003"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.08.008"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1108\/09685220710759559"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2322255"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0900282106"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-005-0046-3"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837114"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2013.272"},{"key":"ref77","author":"fingas","year":"2012","journal-title":"Lenovo A586 Touts Voice Unlock Through BAIDU A*STAR Verification Tech"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/ICHB.2011.6094309"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2012.6459891"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1108\/IJPCC-05-2013-0012"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2225048"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2013.12.014"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1142\/S0218001412600130"},{"key":"ref61","first-page":"987","article-title":"Touch me once and I know its you! Implicit authentication based on touch screen patterns","author":"de luca","year":"0","journal-title":"Proc CHI"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(02)00038-9"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/IIHMSP.2010.83"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30244-2_12"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1016\/S0969-4765(11)70170-9"},{"key":"ref67","first-page":"1","article-title":"Your face is not your password","author":"duc","year":"0","journal-title":"Proc Black Hat Conference"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2009.02.007"},{"key":"ref69","first-page":"184","article-title":"Keysens: Passive user authentication through micro-behavior modeling of soft keyboard interaction","author":"draffin","year":"0","journal-title":"Proc 5th Int Conf Mobile Comput Appl Serv"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208352"},{"key":"ref198","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2014.04.008"},{"key":"ref199","doi-asserted-by":"publisher","DOI":"10.1587\/transfun.E95.A.346"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2010.03.046"},{"key":"ref194","doi-asserted-by":"publisher","DOI":"10.1016\/S0022-5371(67)80067-7"},{"key":"ref195","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2011.6085412"},{"key":"ref196","first-page":"99","article-title":"Implicit authentication through learning user behavior","author":"shi","year":"0","journal-title":"Proc ISCAS"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.10.002"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2012.127"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1145\/2037252.2037263"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2010.206"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.2"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/ICIEA.2008.4582896"},{"key":"ref192","first-page":"39","article-title":"Secure unlocking of mobile touch screen devices by simple gestures: You can see it but you can not do it","author":"shahzad","year":"0","journal-title":"Proc Mobicom"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-49346-4_9"},{"key":"ref90","first-page":"1","article-title":"ACComplice: Location inference using accelerometers on smartphones","author":"han","year":"0","journal-title":"Proc Int Conf Commun Syst Netw"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1145\/328236.328110"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.7840\/KICS.2011.36B.1.37"},{"key":"ref96","year":"0","journal-title":"Principles of Iris Biometrics"},{"key":"ref97","first-page":"13","article-title":"Biometrie recognition: Overview and recent advances","author":"jain","year":"0","journal-title":"Proc CIARP"},{"key":"ref82","year":"0","journal-title":"FVC2006 The Fourth International Fingerprint Verification Competition"},{"key":"ref81","year":"2013","journal-title":"Worldwide Mobile Phone Market Forecast to Grow 7 3% in 2013"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1016\/S0969-4765(14)70088-8"},{"key":"ref83","first-page":"1","author":"gosset","year":"1997","journal-title":"ASPeCT Fraud detection concepts Final report"},{"key":"ref80","first-page":"1581","article-title":"Activity and gait recognition with time-delay embeddings","author":"frank","year":"0","journal-title":"Proc AAAI Conf Artif Intell"},{"key":"ref89","first-page":"1184","article-title":"Embedded palmprint recognition system on mobile devices","author":"han","year":"0","journal-title":"Proc Int Conf Biometrics"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-012-0154-9"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08509-8_6"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/ICDSC.2007.4357512"},{"key":"ref88","first-page":"17","article-title":"Anomaly-based intrusion detection using mobility profiles of public transportation users","author":"hall","year":"0","journal-title":"Proc WiMob"},{"key":"ref200","first-page":"25:1","article-title":"Timing analysis of keystrokes and timing attacks on SSH","author":"song","year":"0","journal-title":"Proc 10th Conf Usenix Security Symp"},{"key":"ref101","first-page":"87120p-1","article-title":"Secure voice based authentication for mobile devices: Vaulted voice verification","author":"johnson","year":"0","journal-title":"Proc SPIE"},{"key":"ref100","author":"john","year":"2011","journal-title":"Motorola ATRIX 4G Review"},{"key":"ref209","doi-asserted-by":"publisher","DOI":"10.1145\/1143120.1143128"},{"key":"ref203","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.10.001"},{"key":"ref204","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.101613.00077"},{"key":"ref201","year":"2013","journal-title":"Password Unseated by &#x201C;123456&#x201D; on SplashData's Annual Worst Passwords List"},{"key":"ref202","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35362-8_2"},{"key":"ref207","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2014.6997513"},{"key":"ref208","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2009.2037873"},{"key":"ref205","doi-asserted-by":"publisher","DOI":"10.1145\/2393216.2393280"},{"key":"ref206","doi-asserted-by":"publisher","DOI":"10.1145\/371127.371166"},{"key":"ref211","first-page":"1","article-title":"PlaceRaider: Virtual theft in physical spaces with smartphones","author":"templeman","year":"0","journal-title":"Proc NDSS"},{"key":"ref210","doi-asserted-by":"publisher","DOI":"10.1002\/sec.776"},{"key":"ref212","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAIS.2012.6466615"},{"key":"ref213","author":"trader","year":"2012","journal-title":"Vodaphone in UK Using M2SYS Hybrid Biometric Platform & Palm Vein Biometrics at Summer Festivals"},{"key":"ref214","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420976"},{"key":"ref215","author":"victor","year":"2013","journal-title":"Apple iPhone 5S 7 New Features of the Seventh Generation iPhone"},{"key":"ref216","first-page":"1","article-title":"Compromising electromagnetic emanations of wired and wireless keyboards","author":"vuagnoux","year":"0","journal-title":"Proc 18th Conf USENIX Security Symp"},{"key":"ref217","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2184095"},{"key":"ref218","author":"warman","year":"2013","journal-title":"Say Goodbye to the Pin Voice Recognition Takes Over at Barclays Wealth"},{"key":"ref219","first-page":"13","article-title":"PSiOS: Bring your own privacy & security to iOS devices","author":"werthmann","year":"0","journal-title":"Proc ASIACCS"},{"key":"ref220","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.psych.55.090902.141555"},{"key":"ref222","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.1797"},{"key":"ref221","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39454-6_84"},{"key":"ref229","author":"yang","year":"2012","journal-title":"Trends and Forecast for 2013 Touch Panel Market"},{"key":"ref228","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484318"},{"key":"ref227","first-page":"187","article-title":"Towards continuous and passive authentication via touch biometrics: An experimental study on smartphones","author":"xu","year":"0","journal-title":"Proc SOUPS"},{"key":"ref226","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185465"},{"key":"ref225","doi-asserted-by":"publisher","DOI":"10.1145\/1514274.1514285"},{"key":"ref224","first-page":"393","article-title":"Upgrading your android, elevating my malware: Privilege escalation through mobile OS updating","author":"xing","year":"0","journal-title":"Proc IEEE Symp Security Privacy"},{"key":"ref223","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2009.5198785"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2008.159"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2010.5560598"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.013012.00028"},{"key":"ref124","first-page":"79","article-title":"Continuous speaker verification in realtime","author":"kunz","year":"0","journal-title":"Proc Int Conf Biometrics Special Interest Group"},{"key":"ref129","author":"lee","year":"2011","journal-title":"The State of the Touch-Screen Panel Market in 2011"},{"key":"ref128","doi-asserted-by":"crossref","first-page":"980","DOI":"10.1109\/TSMCB.2007.896999","article-title":"Alignment-free cancelable fingerprint templates based on local minutia information","volume":"37","author":"lee","year":"2007","journal-title":"IEEE Trans Syst Man Cybern B Cybern"},{"key":"ref130","first-page":"1","article-title":"Unobservable re-authentication for smartphones","author":"li","year":"0","journal-title":"Proc NDSS"},{"key":"ref133","first-page":"413","article-title":"Understanding OSN-based facial disclosure against face authentication systems","author":"li","year":"0","journal-title":"Proc ASIACCS"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2012.6227456"},{"key":"ref131","first-page":"307","article-title":"Behaviour profiling for transparent authentication for mobile devices","author":"li","year":"0","journal-title":"Proc Eur Conf Inf Warfare Security"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-013-0209-6"},{"key":"ref232","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590318"},{"key":"ref233","first-page":"224","article-title":"Keystroke-based user identification on Smart phones","author":"zahid","year":"0","journal-title":"Proc RAID"},{"key":"ref230","doi-asserted-by":"publisher","DOI":"10.1504\/IJBM.2008.018665"},{"key":"ref231","author":"yirka","year":"2012","journal-title":"Japanese Partnership Results in Palm Recognition Security for Smartphones"},{"key":"ref239","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.8.2.469-476"},{"key":"ref238","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.7.4.715-722"},{"key":"ref235","doi-asserted-by":"publisher","DOI":"10.1145\/2071389.2071391"},{"key":"ref234","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2009.04.017"},{"key":"ref237","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2013.6712747"},{"key":"ref236","doi-asserted-by":"publisher","DOI":"10.1145\/2381934.2381947"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/34.990140"},{"key":"ref135","first-page":"1","article-title":"Biometrics: The future of mobile phones","author":"long","year":"0","journal-title":"Proc Interactive Multimedia Conf"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2005.1415569"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1145\/1982185.1982190"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046771"},{"key":"ref140","first-page":"1","article-title":"Towards mobile authentication using dynamic signature verification: Useful features and performance evaluation","author":"martinez-diaz","year":"0","journal-title":"Proc ICPR"},{"key":"ref141","first-page":"201","article-title":"Keystroke biometrics with number-pad input","author":"maxion","year":"0","journal-title":"Proc DSN"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1203221"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38519-3_21"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1145\/2554850.2554931"},{"key":"ref2","first-page":"1","article-title":"Can images be regenerated from biometric templates?","author":"adler","year":"0","journal-title":"Proc Biometric Conf"},{"key":"ref145","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1108\/IMCS-09-2013-0062","article-title":"The effect of adaptive mechanism on behavioural biometric based mobile phone authentication","volume":"22","author":"meng","year":"2014","journal-title":"Inf Manage Comput Security"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2006.276"},{"key":"ref241","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046725"},{"key":"ref242","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"},{"key":"ref243","first-page":"1128","article-title":"SenSec: Mobile security through passive sensing","author":"zhu","year":"0","journal-title":"Proc 13th ICN"},{"key":"ref240","doi-asserted-by":"publisher","DOI":"10.1145\/1609956.1609959"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1145\/2371664.2371705"},{"key":"ref108","first-page":"549","article-title":"Document utilising biometrics for transparent user authentication on mobile devices","author":"karatzouni","year":"0","journal-title":"Proc ITA"},{"key":"ref107","first-page":"253","article-title":"Keystroke analysis for thumb-based keyboards on mobile devices","author":"karatzouni","year":"0","journal-title":"Proc IFIP Int Inf SEC"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518953"},{"key":"ref105","article-title":"Keystroke dynamics-based user authentication using long and free text strings from various input devices","author":"kang","year":"2014","journal-title":"Inf Sci"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2010.04.051"},{"key":"ref103","first-page":"31","article-title":"MagiSign: User identification\/authentication based on 3D around device magnetic signatures","author":"kamer","year":"0","journal-title":"Proc UBICOMM"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1145\/1314333.1314352"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2014.08.024"},{"key":"ref112","author":"khaw","year":"2002","journal-title":"Iris Recognition Technology for Improved Authentication"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1145\/2639108.2639141"},{"key":"ref10","first-page":"1","article-title":"Smudge attacks on smartphone touch screens","author":"aviv","year":"0","journal-title":"Proc 8th USENIX WOOT"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420957"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301311"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-04159-9","author":"ashbourn","year":"2014","journal-title":"Biometrics in the New World The Cloud Mobile Technology and Pervasive Identity"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2013.6699045"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2012.6393554"},{"key":"ref16","first-page":"1","article-title":"Challenge-based speaker recognition for mobile authentication","author":"baloul","year":"0","journal-title":"Proc BIOSIGNAL"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2008.4563115"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2037373.2037440"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2012.6288895"},{"key":"ref18","author":"baumann","year":"0","journal-title":"Voice Recognition"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.29"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2007.05.004"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2010.5681156"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2013.10.001"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2009.12.016"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2008.4711236"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2009.01.018"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.04.141"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11569-6_40"},{"key":"ref123","first-page":"678","article-title":"Timing attacks on PIN input devices","author":"kune","year":"0","journal-title":"Proc ACM Conf CCS"}],"container-title":["IEEE Communications Surveys &amp; Tutorials"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9739\/7214344\/07000543.pdf?arnumber=7000543","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T15:59:13Z","timestamp":1642003153000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7000543\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"references-count":243,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/comst.2014.2386915","relation":{},"ISSN":["1553-877X"],"issn-type":[{"value":"1553-877X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]}}}