A Survey of User Preferences on Biometric Authentication for Smartphones

  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract

    The search for improving users’ security needs, awareness and concerns in the context of mobile phones still has been conducting in today’s society. Biometric systems identify a person or verify the identity of a person using purportedly unique physical traits or behaviour of that individual. In order to understand user requirements for biometric authentication, it is important to focus on several key issues, including the importance of smartphones in implementing biometric authentication, users’ general knowledge and perception towards biometric authentication, and users’ trust and practice when using different biometric technology for securing their smartphone’s data. A preliminary study in the form of an online survey was conducted. The idea of this study was to conduct a survey on users about their general knowledge and perceptions towards different biometric authentication on smartphones. The results of the study indicate that smartphone is an important tool in implementing biometric authentication. Moreover, users knew what biometric technology is and they are not reluctant to use them. Furthermore, users knew how to protect their smartphone’s data and practice the related preventions. The results are expected to give an insight of deploying biometric technology into mobile devices and further researching onto others biometric authentication. 


  • Keywords

    Authentication; Biometric; Smartphones.

  • References

      [1] Srivastava, S., & Sudhish, P. S. (2016). Continuous multi-biometric user authentication fusion of face recognition and keystroke dynamics. Proceedings of the IEEE Region 10 Humanitarian Technology Conference, pp. 1–7.

      [2] Li, Y., Yang, J., Xie, M., Carlson, D., Jang, H. G., & Bian, J. (2015). Comparison of PIN- and pattern-based behavioral biometric authentication on mobile devices. Proceedings of the IEEE Military Communications Conference, pp. 1317–1322.

      [3] Herley, C., & Oorschot, P. V. (2012) A research agenda acknowledging the persistence of passwords. IEEE Security and Privacy, 10(1), 28–36.

      [4] Gorman, L. (2003). Comparing passwords, tokens, and biometrics for user authentication. Proceedings of the IEEE, 91(12), 2020–2021.

      [5] Jung, E., & Hong, K. (2015). Biometric verification based on facial profile images for mobile security. Journal of Systems and Information Technology, 17(1), 91–100.

      [6] Mastali, N., & Agbinya, J. I. (2010). Authentication of subjects and devices using biometrics and identity management systems for persuasive mobile computing: A survey paper. Proceedings of the 5th International Conference on Broadband and Biomedical Communications, pp. 1-6.

      [7] Zirjawi, N. (2015). A survey about user requirements for biometric authentication on smartphones. Proceedings of the IEEE 2nd Workshop on Evolving Security and Privacy Requirements Engineering, pp. 1–6.

      [8] Abate, A. F., Nappi, M., & Ricciardi, S. (2016). Smartphone enabled person authentication based on ear biometrics and arm gesture. Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, pp. 3719–3724.

      [9] Mayron, L. M. (2015). Biometric Authentication on Mobile Devices. IEEE Security and Privacy, 13(3), 70–73.

      [10] Holz, C., Buthpitiya, S., & Knaust, M. (2015). Bodyprint: Biometric user identification on mobile devices using the capacitive touchscreen to scan body parts. Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, pp. 3011–3014.

      [11] Liu, C. L., Tsai, C. J., Chang, T. Y., Tsai, W. J., & Zhong, P. K. (2015). Implementing multiple biometric features for a recall-based graphical keystroke dynamics authentication system on a smart phone. Journal of Network and Computer Applications, 53, 128–139.

      [12] Machado, A. W. (2014). 10 commandments of smile esthetics. Dental Press Journal of Orthodontics, 19(4), 136–157.

      [13] Duggal, S. (2012). The esthetic zone of Smile. Virtual Journal of Orthodontics, 9(4), 10–22.

      [14] Schmidt, K. L., Cohn, J. F., & Tian, Y. (2003). Signal characteristics of spontaneous facial expressions: Automatic movement in solitary and social smiles. Biological Psychology, 65(1), 49–66.

      [15] Matthews, T. G., Blatterfein, L., Morrow, R. M., & Payne, S. H. (1978). The anatomy of a smile. Journal of Prosthetic Dentistry, 39(2), 128–134.

      [16] Findling, R. D., & Mayrhofer, R. (2013). Towards pan shot face unlock: Using biometric face information from different perspectives to unlock mobile devices. International Journal of Pervasive Computing and Communications, 9(3), 190–208.

      [17] Tao, Q. & Veldhuis, R. N. J. (2006). Biometric authentication for a mobile personal device. Proceedings of the 3rd Annual International Conference on Mobile Ubiquitous Systems - Workshops, pp. 6–8.

      [18] Tao, Q., & Veldhuis, R. (2010). Biometric authentication system on mobile personal devices. IEEE Transactions on Instrumentation and Measurement, 59(4), 763–773.

      [19] Yuan, X., & Rahim, M. S. (2010). User authentication on mobile devices with dynamical selection of biometric techniques for optimal performance. Proceedings of the IEEE International Conference on Robotics and Biomimetics, pp. 333–338.

      [20] Derawi, M. O. (2011). Biometric options for mobile phone authentication. Biometric Technology Today, 2011(10), 5–7.

      [21] Trewin, S., Swart, C., Koved, L., & Martino, J. (2012). Biometric authentication on a mobile device: a study of user effort, error and task disruption. Proceedings of the 28th Annual Computer Security Applications Conference, pp. 159–168.

      [22] Akhtar, Z., Michelon, C., & Foresti, G. L. (2014). Liveness detection for biometric authentication in mobile applications. Proceedings of the International Carnahan Conference on Security Technology, pp. 1–6.

      [23] Saari, M. Y., Dietzenbacher, E., & Los, B. (2014). Income distribution across ethnic groups in Malaysia: Results from a new social accounting matrix. Asian Economic Journal, 28(3), 259–278.

      [24] Gronli, T. M., Hansen, J., Ghinea, G., & Younas, M. (2014). Mobile application platform heterogeneity: Android vs windows phone vs iOS vs Firefox OS. Proceedings of the IEEE 28th International Conference on Advanced Information Networking and Applications, pp. 635–641.




Article ID: 25763
DOI: 10.14419/ijet.v7i4.15.25763

Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.