U-Stroke Pattern Modeling for End User Identity Verification Through Ubiquitous Input Device
read more
Citations
Typing Pattern Analysis for Fake Profile Detection in Social Media.
References
Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication
Touch me once and i know it's you!: implicit authentication based on touch screen patterns
Touch me once and I know it's you! Implicit Authentication Based on Touch Screen
The smart phone: a ubiquitous input device
TapLogger: inferring user inputs on smartphone touchscreens using on-board motion sensors
Related Papers (5)
Bayesian and behavior networks for context-adaptive user interface in a ubiquitous home environment
Theoretical and architectural support for input device adaptation
Frequently Asked Questions (15)
Q2. What future works have the authors mentioned in the paper "U-stroke pattern modeling for end user identity verification through ubiquitous input device" ?
Hopefully, direction of this research will be valuable for the further research on this domain.
Q3. What are the efficient ways of gaining access to a mobile device?
Instead of entering text into a soft keyboard, gestures like sliding towards a special direction or taps are most efficiently used.
Q4. What is the main requirement to maintain confidentiality and integrity in uncontrolled environment?
Accurate identity verification of end-user is becoming a major requirement to preserve confidentiality and integrity in uncontrolled environment.
Q5. What are the main features of touch devices?
Since touch devices comprise sensors to capture environmental changes, they offer more capabilities to authenticate users accurately.
Q6. What are the different parameters that can be collected?
Different parameters can be collected like acceleration values, touching pressure, touched area on the screen, different temporal values like key-hold time or inter-key time.
Q7. What is a type of tap stroke?
T-Stroke (Tap stroke) –If touch_down, and touch_up events occur due to the stroke similar to single click, double lick, long tap or short tap on touch screen and screen unlock, it is a type of T-Stroke.
Q8. What is the main purpose of this paper?
Researchers are very much interested to work on human computer interaction to be considered as a means of verification of end-user identity [3, 4, 5, 6, 7, 8, 9].
Q9. what is the activity category of the u-streoke?
activity- P- KeyStroke, Touch-Stroke, V-KeyStroke, S-Stroke, W-Stroke, Z-Stroke, P-Stroke, T-stroke - all are under activity category.
Q10. What is the purpose of this paper?
Target of their proposed work is to apply end-user verification (H2HV) on cheap smart devices that can be used by any people within budget.
Q11. What is the definition of a CCDA?
A type of H2UID interaction based on U-Stroke pattern processing model CCDA, is classified into two sub-classes- distinction class (1: m verification, where n = m) and authentication class (1:2 verification, where n = 2).
Q12. What is the probability of error for device usage?
probability of error for device usage (like V-Keystroke, W-Stroke, T-Stroke) is directly proportional to the size of fingertip.
Q13. What is the CCDA processing model of UID?
CCDA processing model of UID enables effective modeling of end-user’s usage pattern from U-Stroke and creation of hybrid profile of end-user after extracting multiple features.
Q14. What is the main reason why Fitts’ law is so popular?
As finger touch on smart phones and tablets becomes popular, examining Fitts’ law [11] for finger touch attracts attention of many HCI researchers.
Q15. What is the main contribution of this paper?
The major contribution of this paper is to propose a novel H2UID (human to ubiquitous input device) interaction mechanism U-Stroke (ubiquitous stroke) that can be applied to any computing device.