Abstract
PurposeThe popularity of mobile devices and the evolving nature of the services and information they can delivery make them increasingly desirable targets for misuse. The ability to provide effective authentication of the user becomes imperative if protection against misuse of personally and financially sensitive information is to be provided. This paper discusses the application of biometrics to a mobile device in a transparent and continuous fashion and the subsequent advantages and disadvantages that are in contention with various biometric techniques.Design/methodology/approachAn investigation was conducted to evaluate the feasibility of utilising signature recognition, to verify users based upon written words and not signatures, thereby enabling transparent handwriting verification. Participants were required to write a number of common words, such as “hello” “sorry” and “thank you”. The ability to correctly verify against their own template and to reject impostors was then established.FindingsTotally, 20 users participated in the study and an average FAR and FRR of 0 and 1.2 per cent, respectively, were experienced across eight common words.Research limitations/implicationsThe initial study has proven very successful, however, further investigations need to be established with a larger population of users and a wider vocabulary of words.Originality/valueThis study has verified the feasibility of applying an existing signature recognition technique to transparent handwriting verification.
Subject
Library and Information Sciences,Management Science and Operations Research,Business and International Management,Management Information Systems
Reference16 articles.
1. ARC Group (2003), Mobile Content & Applications 2003, Arc Group, San Antonio, TX, available at: www.3g.co.uk/3GHomeSearch.htm.
2. Ashbourn, J. (2000), Biometrics: Advanced Identity Verification, Springer, London.
3. Clarke, N. and Furnell, S. (2005a), “Authentication of users on mobile telephones – a survey of attitudes and opinions”, Computers & Security, Vol. 24 No. 7, pp. 519‐27.
4. Clarke, N. and Furnell, S. (2005b), “User authentication for mobile devices: a composite approach”, Proceedings of the 6th Australian Information Warfare and Security Conference, Geelong, pp. 48‐56.
5. Clarke, N., Furnell, S., Lines, B. and Reynolds, P. (2003), “Using keystroke analysis as a mechanism for subscriber authentication on mobile handsets”, Proceedings of the IFIP SEC 2003 Conference, Athens, Greece, May, pp. 97‐108.
Cited by
17 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献