Information revealed from scrolling interactions on mobile devices

被引:42
作者
Antal, Margit [1 ]
Bokor, Zsolt [1 ]
Szabo, Laszlo Zsolt [1 ]
机构
[1] Sapientia Hungarian Univ Transylvania, Tirgn Mures 540185, Romania
关键词
Biometrics; User classification; Gestures; Touchscreen;
D O I
10.1016/j.patrec.2015.01.011
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The aim of this study is to analyze information that can be revealed from simple touch gestures such as horizontal and vertical scrolling. Touch gestures contain identity information, they can reflect the user's experience using touchscreen and they can infer the gender of the user. The statements are based on measurements on a large touch dataset collected from 71 users using 8 different mobile devices, both tablets and phones. Touch data were divided in strokes and classification measurements were investigated based on single and multiple strokes. Classification results based on single stroke are inaccurate, which can be improved by using multiple strokes. Measurements prove that identity, gender and user's touchscreen experience level can be accurately predicted from a sequence of 10 strokes. In addition to the different classification results we present statistical analysis of the collected data in order to reveal basic differences between male and female users as well as for less and more experienced touchscreen users. (C) 2015 Elsevier B.V. All rights reserved,
引用
收藏
页码:7 / 13
页数:7
相关论文
共 21 条
[1]  
Angulo J., 2012, IFIP ADV INF COMMUN, V375, P130
[2]  
[Anonymous], 2012, P ASS COMPUT MACH
[3]  
[Anonymous], 2012, INF SECUR TECH REP, DOI [DOI 10.1016/J.ISTR.2012.02.001, 10.1016/j.istr.2012.02.001]
[4]  
[Anonymous], 2013, PROC 19 ANN INT C MO
[5]  
Bo L., 2013, PROC ACM MOBICO, P187, DOI [10.1145/2500423.2504572, DOI 10.1145/2500423.2504572]
[6]  
Breiman L., 2001, Learn, V45, P5
[7]   A framework for continuous, transparent mobile device authentication [J].
Crawford, Heather ;
Renaud, Karen ;
Storer, Tim .
COMPUTERS & SECURITY, 2013, 39 :127-136
[8]   From keyloggers to touchloggers: Take the rough with the smooth [J].
Damopoulos, D. ;
Kambourakis, G. ;
Gritzalis, S. .
COMPUTERS & SECURITY, 2013, 32 :102-114
[9]  
De Luca A., Proceedings of the 2012 AC M annual conference on Human Factors in Computing Systems, ser. CHI '12. New York, NY, USA: ACM, P987, DOI [DOI 10.1145/2208516.2208544, 10.1145/2208516.2208544]
[10]  
Feng T, 2012, 2012 IEEE INTERNATIONAL CONFERENCE ON TECHNOLOGIES FOR HOMELAND SECURITY, P451, DOI 10.1109/THS.2012.6459891