Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2023 Jun 29;13(1):10515.
doi: 10.1038/s41598-023-36780-3.

Touch events and human activities for continuous authentication via smartphone

Affiliations

Touch events and human activities for continuous authentication via smartphone

Vincenzo Gattulli et al. Sci Rep. .

Abstract

The security of modern smartphones is related to the combination of Continuous Authentication approaches, Touch events, and Human Activities. The approaches of Continuous Authentication, Touch Events, and Human Activities are silent to the user but are a great source of data for Machine Learning Algorithms. This work aims to develop a method for continuous authentication while the user is sitting and scrolling documents on the smartphone. Touch Events and Smartphone Sensor Features (from the well-known H-MOG Dataset) were used with the addition, for each sensor, of the feature called Signal Vector Magnitude. Several Machine Learning Models have been considered with different experiment setups, 1-class, and 2-class, for evaluation. The results show that the 1-class SVM achieves an accuracy of 98.9% and an F1-score of 99.4%, considering the selected features and the feature Signal Vector Magnitude very significant.

PubMed Disclaimer

Conflict of interest statement

The authors declare no competing interests.

Figures

Figure 1
Figure 1
For activity 100,669,012,000,002 two records have the same activity start time and a different activity end time.
Figure 2
Figure 2
Time points.

References

    1. Shaikh FB, Rehman M, Amin A. Cyberbullying: A systematic literature review to identify the factors impelling university students towards cyberbullying. IEEE Access. 2020;8:148031–148051. doi: 10.1109/ACCESS.2020.3015669. - DOI
    1. Gattulli V, Impedovo D, Pirlo G, Sarcinella L. Human activity recognition for the identification of bullying and cyberbullying using smartphone sensors. Electronics. 2023;12:261. doi: 10.3390/electronics12020261. - DOI
    1. Islam M, Nooruddin S, Karray F, Muhammad G. Human activity recognition using tools of convolutional neural networks: A state of the art review, data sets, challenges and future prospects. Comput. Biol. Med. 2022;149:106060. doi: 10.1016/j.compbiomed.2022.106060. - DOI - PubMed
    1. Zhu, J., Wu, P., Wang, X., Zhang, J. SenSec: Mobile security through passive sensing. In 2013 International Conference on Computing, Networking and Communications, ICNC 2013 1128–1133 (2013) doi:10.1109/ICCNC.2013.6504251.
    1. Lee, W.-H., Lee, R. Multi-sensor authentication to improve smartphone security. In International Conference on Information Systems Security and Privacy (2017).

Publication types