Indonesi
an
Journa
l
of El
ect
ri
cal Engineer
ing
an
d
Comp
ut
er
Scie
nce
Vo
l.
1
3
,
No.
3
,
Ma
rch
201
9
, p
p.
982
~
9
89
IS
S
N:
25
02
-
4752, DO
I: 10
.11
591/ijeecs
.v1
3
.i
3
.pp
9
82
-
9
89
982
Journ
al h
om
e
page
:
http:
//
ia
es
core.c
om/j
ourn
als/i
ndex.
ph
p/ij
eecs
A
criti
cal insight
into the i
dentity a
uth
entication
sys
tems on
smartph
ones
Te
hseen
Mehr
aj
1
,
M
ir
Am
an She
hery
ar
2
,
Sa
j
aad
Ahm
e
d Lo
ne
3
, A.
H.
M
ir
4
1
,
2
Depa
rtment
of
Inform
at
ion
&
Te
chno
log
y
,
Ce
ntra
l
Univer
sit
y
of
Kashm
ir,
Srin
aga
r, Indi
a
3
Depa
rtment of
Com
pute
r
Scie
n
ce
& Engi
ne
eri
n
g,
Islami
c
Unive
rsit
y
of
Sc
ie
n
ce
&
T
ec
hnolog
y
,
Aw
ant
ipora
,
Ind
ia
4
Depa
rtment of
El
e
ct
roni
cs
&
C
om
m
unic
at
ion,
Nati
ona
l
Insti
tute
of Te
chnol
og
y
,
Srinaga
r
,
Ind
ia
Art
ic
le
In
f
o
ABSTR
A
CT
Art
ic
le
history:
Re
cei
ved
Ma
y
1,
2018
Re
vised N
ov 17
, 2
018
Accepte
d
D
ec
1
5,
2018
The
adva
n
ce
m
en
t
of
computing
p
ower
on
m
obil
e
devi
c
es
and
th
ei
r
populari
t
y
among
people
in
per
form
ing
sensiti
ve
d
at
a
ex
change
is
uncov
eri
n
g
an
urge
n
t
nee
d
for
a
high
l
y
se
cur
e
solu
ti
o
n
tha
n
th
e
exi
sti
ng
ones.
Th
e
ne
ed
for
such
a
sec
urity
solu
ti
o
n
per
sists
th
a
t
should
be
ab
le
to
thwar
t
n
ot
onl
y
the
cont
emporar
y
th
rea
ts
but
al
so
of
fer
continued
su
pport
without
bo
wing
down
to
progr
ession
i
n
technolog
y
.
T
hough
som
e
se
cur
ity
so
lut
ions
hav
e
b
ee
n
cont
empla
te
d
,
a
la
ck
of
st
anda
rd
i
sed
or
absolut
e
sec
urity
solu
ti
on
whi
ch
c
an
provide
a
fea
sib
l
e and
se
cur
e
sol
uti
on
to m
obile
phones exists
.
In
thi
s
pape
r
,
a
surve
y
base
d
o
n
var
ious
biometric
and
non
-
bi
om
et
ric
acce
ss
m
ana
gement
sche
m
es
has
bee
n
p
erf
orm
ed.
The
copi
ous
soluti
ons
put
f
orward
b
y
rese
arc
h
ers
so
f
ar
wer
e
discove
r
e
d
to
f
ai
l
in
t
rait
s
li
ke
user
ad
aptabil
i
t
y
and
eff
iciency
.
Ea
ch
of
the
works
p
ut
forward
b
y
v
ari
ous
rese
arc
he
rs
has
been
single
-
hand
edly
contem
pla
t
ed
foll
owed
b
y
anal
y
s
is.
Ul
tim
at
ely
,
open
proble
m
s a
nd
ch
al
l
enge
s wer
e
in
fer
ences from t
h
e
surve
y
conduct
ed.
Ke
yw
or
ds:
Be
hav
i
oural
bio
m
et
rics
Mult
i
m
od
al
b
i
om
et
rics
Ph
ysi
ol
og
ic
al
bio
m
et
rics
Sm
artph
ones
User aut
hen
ti
c
at
ion
Copyright
©
201
9
Instit
ut
e
o
f Ad
vanc
ed
Engi
n
ee
r
ing
and
S
cienc
e
.
Al
l
rights re
serv
ed.
Corres
pond
in
g
Aut
h
or
:
Tehsee
n
Me
hraj,
Dep
a
rtm
ent
of
Inform
at
ion
& Te
ch
no
l
og
y,
Ce
ntral Univ
er
sit
y of
Kas
hm
i
r,
Now
gam
, 1
90
015, Sr
i
na
gar
,
India.
Em
a
il
:
Tehseen
Bhat
02@g
m
ai
l.com
1.
INTROD
U
CTION
Secu
rity
and
pr
ivacy
on
sm
art
m
ob
il
e
dev
ic
es
ha
ve
beco
m
e
the
pr
im
e
con
ce
rn
s
due
t
o
thei
r
increasi
ng
popula
rity
res
ulti
ng
in
their
hi
gh
usa
ge
f
or
acce
ssin
g
s
ensiti
ve
i
nform
at
ion
an
d
as
a
c
riti
cal
platfo
rm
for
bu
si
ness
t
ran
sa
ct
ion
s
[1
]
-
[5
]
.
W
it
h
ti
m
e,
m
o
bile
de
vices
ar
e
offer
i
ng
num
erous
novel
functi
ons
of
high
qual
it
y
wh
ic
h
furthe
r
i
ncr
ease
the
c
onsu
m
ers’
intere
s
t
b
esi
de
s
rising
us
er
’s
su
sce
pti
bili
ty
to
frau
d
[
6]
-
[
8].
Re
sea
rc
h
has
rev
eal
e
d
that
82%
of
pe
ople
in
the
a
ge
gro
up
25
-
35
ye
ars
al
ong
with
70
%
of
hous
e
hold
us
e
rs
m
ake
us
e
of
m
ob
il
e
ph
ones
to
pe
rfor
m
onli
ne
banki
ng
[
9].
Furthe
rm
or
e,
it
can
be
i
nferr
e
d
f
ro
m
Figu
re
1
that
m
ill
enn
ia
l
s
pr
e
fer
th
e
us
a
ge
of
a
browser
or
a
pp
on
m
ob
il
e
dev
ic
es
in
c
om
par
ison
t
o
ot
her
existi
ng
ba
nk
i
ng
opti
ons
[10].
Perfo
rm
ing
secur
e
t
ran
s
act
ion
and
acce
ssin
g
s
uch
sen
sit
ive
in
form
ation
dem
ands
sec
ur
it
y
m
easur
es
wh
ic
h
m
us
t
deliver
str
ong se
cur
it
y agai
nst
i
m
pen
ding
th
reats as
well
as
off
e
r bett
er us
er a
doptabili
ty
[
2].
Secu
rity
m
od
ern
isa
ti
on
in
t
he
curre
nt
era
sti
ll
find
s
the
us
e
of
si
ng
le
-
factor
or
pass
word
-
base
d
appr
oach
f
or
a
ccess
m
anag
e
m
ent
across di
gital
cha
nn
el
s
as
they
o
f
fer
af
ford
a
bl
e d
e
ploym
ent,
easy
re
vo
cat
io
n
in
the
e
ve
nt
of
a
com
pr
om
ise
.
Existi
ng
di
gital
ap
plica
ti
on
se
r
vices
re
quire
a
m
ul
ti
tud
e
of
c
r
eden
ti
al
s
in
the
f
or
m
of
P
IN
s
a
nd
pass
words
t
o
be
rem
e
m
ber
ed
by
i
nd
i
vidu
al
us
e
rs
res
ulti
ng
in
hi
gh
e
r
procli
vity
of
un
s
afe
pass
word
se
le
ct
ion
by
us
ers
f
or
easy
m
e
m
or
isa
ti
on
,
wh
ic
h
pro
ves
to
be
a
s
on
e
of
the
c
onside
rab
le
c
oncern
s
associat
ed
wit
h
it
[11].
Howev
e
r,
in
the
current
era,
ra
pid
m
od
ern
isa
ti
on
a
nd
dev
el
op
m
ent
in
c
om
pu
ti
ng
te
chnolo
gy,
s
usc
eptibil
it
y
to
dicti
on
a
ry
at
ta
cks
[12],
c
op
i
ous
key
-
lo
gger
[
13
]
a
nd
pas
sw
ord
hack
i
ng
to
ols
are
Evaluation Warning : The document was created with Spire.PDF for Python.
Ind
on
esi
a
n
J
E
le
c Eng &
Co
m
p
Sci
IS
S
N:
25
02
-
4752
A Cri
ti
cal Insigh
t i
nto
t
he Ide
ntit
y Au
the
nticati
on S
y
ste
ms on S
m
ar
tp
hone
s
(
Tehs
ee
n
Me
hr
aj
)
983
avail
able
[14],
[15],
m
akin
g
pa
sswor
d
retrie
val
a
n
easi
er
ta
sk
f
or
int
ruders
.
F
urt
her,
pas
s
words
ca
n
be
s
har
e
d,
forgott
en o
r observe
d
t
hus fo
r
m
ing
an i
m
pr
act
ic
al
au
thentic
at
ion
s
olu
ti
on.
Figure
1
.
A p
re
ferred
d
e
vice
f
or sen
sit
ive
infor
m
at
ion
acces
s [Ado
pted fr
om
[
10
]
]
Var
i
ou
s
sc
hem
es
re
placi
ng
c
om
plex
passwo
r
ds
with
hard
w
are
to
ke
ns
,
chi
p
m
od
ules
an
d
sm
art
card
s
hav
e
bee
n
int
r
oduce
d
[
16]
-
[
18]
w
hich
pro
vi
de
hi
gh
e
r
de
gree
of
sec
u
rity
bu
t
la
c
k
use
r
ergo
no
m
ic
s,
pro
ve
inco
ns
ist
ent,
c
an
be
lost,
duplica
te
d,
stol
en,
e
xpen
sive
an
d
un
m
anag
eable,
the
refor
e
ham
per
in
g
the
i
r
adoptabil
it
y
[
19]
,
[20].
Als
o,
the
re
exist
se
cur
it
y
sc
hem
es
li
ke
[
21]
,
[22]
w
hich
fail
ed
to
operate
on
li
m
it
ed
resou
rc
e
dev
ic
es
su
c
h
as
sm
a
rt
m
ob
il
e
phon
es
that
are
exc
eedin
gly
us
e
d
for
se
ns
it
ive
in
form
ation
e
xc
hang
e
there
by
m
aking
them
extrem
el
y
vu
lne
rab
le
[1
]
,
[23].
F
ur
therm
or
e,
a
va
riet
y
of
facil
it
i
es
exist
li
ke
c
loud
te
chnolo
gy,
w
hich
ai
m
at
of
f
erin
g
m
any
serv
ic
es
to
it
s
cus
tom
ers.
But,
th
e
data
sh
a
rin
g
appr
oach
util
iz
ed
by
the
cl
ou
d
te
ch
nolo
gy
unc
overs
m
any
flaws
a
nd
hence
re
su
lt
s
in
it
s
s
us
cepti
bi
li
t
y
to
num
erous
at
ta
ck
s
[
24]
-
[27].
User
a
doptabil
it
y
is
a
pri
m
e
con
ce
r
n
for
di
gital
ve
ndors.
Currentl
y,
us
er
s
de
sire
for
co
nv
e
nient
an
d
si
m
ple
exp
erie
nces.
T
he
c
onf
luence
of
us
er
adoptabil
it
y
an
d
secu
rity
chall
eng
es
de
velo
pe
d
a
m
o
m
entou
s
rise
in
bio
m
et
ric
secur
it
y
so
luti
on
s.
Acc
ordin
g
t
o
a
re
port
by
the
Wo
rl
d
Ec
onom
ic
Fo
ru
m
(W
EF
)
[
28
]
,
bi
om
et
ric
s
can
pro
vi
de
a
po
te
ntial
so
lu
ti
on
offer
i
ng
se
cur
it
y
an
d
us
e
r
co
nv
e
nie
nces
,
par
ti
c
ularly
in
fina
ncial
ser
vices.
Nev
e
rtheless
,
t
her
e
e
xist
m
ult
iple
points
where
bio
m
et
ric
syst
e
m
s
can
be
br
eac
he
d
[29].
S
om
e
threats
ha
ve
been
ad
dr
e
ssed
by
resea
rc
her
s
in
[
30]
, a
nd
sti
ll
, biom
et
ric
sy
stem
s
re
m
ai
n susce
ptible
to
s
poofi
ng
an
d s
m
ud
ge
at
ta
cks.
E
ven
if
there
e
xist
syst
e
m
s
of
fe
rin
g
protect
io
n
to
bio
m
et
ric
tem
plate
s
by
revok
i
ng
bi
om
et
ric
cred
e
ntial
s,
s
uc
h
s
olu
ti
ons
ha
ve
li
m
i
te
d
av
ai
la
bili
ty
,
and
unde
rd
e
velo
pe
d
sta
nd
a
r
ds
e
xi
st
to
e
valuate
su
c
h
so
lut
io
ns
.
U
nfor
t
un
at
el
y,
bi
om
et
ric
syst
e
m
s
appear
t
o
be
highly
su
sce
pt
ible
to
re
play
at
ta
cks
[
19
]
.
Hen
ce
,
secur
it
y s
olu
ti
ons
base
d on bi
om
et
rics alon
e
offer wea
ker s
ecur
it
y eve
n
i
f t
hey pro
vid
e
h
i
gh u
s
er a
dopta
bili
ty
.
The
ultim
at
e
go
al
of
the
pa
pe
r
is
to
c
ont
em
p
la
te
nu
m
ero
us
secur
it
y
so
l
ution
s
in
acce
s
s
m
anag
em
ent
offer
e
d
i
n
the
past.
T
he
rem
ai
nin
g
pa
pe
r
is
orga
nised
as:
S
ect
ion
2
is
enti
rely
de
vo
te
d
t
o
a
detai
le
d
s
urvey
of
bio
m
et
ric
authen
ti
cat
ion
an
d
non
-
bi
om
et
ric
authe
ntica
ti
on
.
Sect
ion
3
em
ph
asi
ses
the
po
t
entia
l
chall
enges
a
nd
op
e
n
issue
s
a
s
rev
eal
e
d
by
th
e
rese
arc
h
w
ork
re
viewe
d.
Fi
nally
,
Sect
io
n
4
c
oncl
udes
th
e
pa
pe
r
with
cl
inching
rem
ark
s.
2.
BACKG
ROU
ND WO
RK
This
sect
io
n
i
nvol
ves
t
he
detai
le
d
stu
dy
of
num
ero
us
secu
ri
ty
so
luti
ons
pr
e
valent
i
n
the
fi
el
d
of
secu
re
us
er
a
uth
e
ntica
ti
on
.
T
he
resea
rch
f
ur
t
her
in
volves
sec
ur
it
y
schem
es
sect
ion
ed
int
o
t
wo
c
at
egories:
bi
om
et
ric
-
base
d
a
nd no
n
-
bio
m
et
ric b
ase
d
sc
hem
es.
2
.
1.
Bi
ome
tri
c
-
b
as
ed
Sy
s
te
ms
A l
ar
ge
num
ber
of
secu
rity
m
echan
ism
s
are
base
d
on
bi
ome
tric
s
w
hich
in
cl
ud
es
both
the
be
hav
i
oural
and physi
cal
/p
hysiolo
gical
cha
racteri
sti
cs of
a p
er
son.
S
om
e
secu
rity
so
luti
on
s
b
a
sed o
n b
iom
e
tr
ic
s h
ave
been
re
vie
wed as
under.
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2502
-
4752
Ind
on
esi
a
n
J
E
le
c Eng
&
Co
m
p
Sci,
Vo
l.
1
3
, N
o.
3
,
Ma
rc
h
201
9
:
9
82
–
9
89
984
2
.
1.
1
Au
t
hen
ticat
i
on
ba
se
d
on Ph
ys
iol
og
ic
al
C
h
ara
c
terist
ic
s
The
ph
ysi
cal
f
eat
ur
es
or
ch
a
racter
ist
ic
s
of
an
in
div
i
du
al
form
the
basis
for
physi
olog
ic
al
based
authe
ntica
ti
on
bio
m
et
ric
sche
m
es.
Face,
reti
na/iri
s,
palm
/hand
geo
m
et
ry,
fin
gerpr
i
nt
f
or
m
the
ph
ysi
cal
featur
e
s
wh
ic
h
a
re r
el
at
ively
u
nc
ha
nge
d wit
h
the
p
a
ss
age
of tim
e.
a.
Fing
e
r
pr
int
rec
ogniti
on
Fing
e
r
pr
int
a
ut
hen
ti
cat
ion
is
a
hot
resea
r
ch
area
f
or
a
uth
e
ntica
ti
on
on
m
ob
il
e
phon
e
s.
T
he
authe
ntica
ti
on
schem
es
based
on
fin
gerp
rint
s
have
bee
n
al
read
y
im
ple
m
e
nted
on
m
ob
il
e
phones
a
nd
can
be
seen
as
a
us
e
r
adoptable
s
olu
t
ion
for
ide
ntify
ing
a
n
in
div
i
dua
ls’
i
den
ti
ty
.
In
[31],
a
fin
ge
rprint
a
uth
e
ntica
ti
on
schem
e
has
be
en
pr
opos
e
d,
wh
ic
h
is
bei
ng
i
m
ple
m
ented
as
an
Android
app
li
cat
io
n
a
nd
r
unning
on
act
ual
m
ob
il
e
dev
ic
es
.
T
hr
ee
a
uth
e
ntica
ti
on
al
go
rith
m
s
fo
r
fin
gerp
r
int
pr
ocessin
g
hav
e
been
int
rodu
ce
d
each
of
wh
ic
h
is
evaluated
ac
cordin
g
to
t
heir
accuracy
rate
and
s
pee
d.
Wh
il
e
in
[
32
]
,
a
sec
ur
e
,
lo
w
-
c
os
t,
a
nd
r
obus
t
fi
ng
e
rprin
t
authe
ntica
ti
on
schem
e
on
m
ob
il
e
ph
on
e
devi
ces
has
been
pro
posed
.
The
s
yst
e
m
has
bee
n
im
ple
m
ented
us
i
ng
an
O
pen
C
V
(C
om
pu
te
r
Visio
n)
li
b
ra
ry
a
nd
A
ndr
oi
d.
The
RGB
m
at
ching
al
gorithm
has
bee
n
util
ise
d.
Thes
e
fin
gerpr
i
nt
-
ba
s
ed
a
uth
e
ntica
ti
on
sc
hem
es
app
ear
chea
p,
eas
y
to
us
e
with
out
co
ns
um
ing
m
uch
batte
ry
po
wer
on
resou
rce
-
c
onstrai
ne
d
m
ob
il
e
phone
de
vices.
Ne
ver
t
heless,
the
la
ck
of
ha
r
dw
a
re
o
n
m
ob
i
le
de
vices
ca
pa
ble
of
com
plete
acqu
isi
ti
on
of en
ti
re
fin
gerpr
i
nt alo
ng
with inc
ompati
bili
ty
o
f
fin
gerpr
i
nt m
a
tc
hin
g
al
gorithm
s i
n
the
pr
ese
nce
of
dir
t
or
cuts
,
m
akes
secu
rity
so
l
ution
s
base
d
on
f
ing
e
rprint
a
ppe
ar
as
a
weak
c
on
te
nd
e
r
i
n
th
e
fiel
d
of f
or
m
ing
a se
cur
e
and a
dopt
able use
r sol
ution.
b.
Face rec
ogniti
on
The
face
rec
ogniti
on
-
base
d
a
uth
e
ntica
ti
on
s
chem
es
inv
olve
the
us
e
of
fa
ci
al
featur
es
obta
ined
from
vid
e
o
fr
am
es
or
di
gital
i
m
age
for
ver
ific
at
io
n
or
ide
ntific
at
io
n
of
a
n
i
nd
i
vidual.
T
he
face
r
e
cogniti
on
al
so
form
s
a potenti
al
r
ese
arch
a
rea i
n
the
f
ie
ld
of
m
ob
il
e auth
e
ntica
ti
on.
T
he
a
utho
rs i
n
[
33
]
have int
rod
uced
a
n
e
ff
i
ci
ent
op
e
n
f
ace
rec
ogniti
on
syst
em
on
t
he
A
ndr
oid
platf
or
m
.
Th
e
propose
d
sys
tem
i
m
p
lem
ent
s
face,
ey
e
det
ect
ion
,
LBP
(L
ocal
Bi
n
ary
Patt
er
n)
for
feat
ur
e
e
xtracti
on,
pr
e
-
processi
ng
for
Re
gion
of
Int
erest
(RO
I),
f
eat
ure
dim
ension
al
it
y
reducti
on
base
d
on
Linea
r
Di
scrim
inant
A
na
ly
sis
(LD
A
)
re
f
err
e
d
to
as
Fis
he
rf
ace
a
nd
P
rin
ci
pal
Com
po
ne
nt
Anal
ysi
s
(P
CA)
re
ferred
to
as
Eig
enf
ace
,
an
d
E
u
cl
idean
dista
nc
e
as
a
m
ini
m
u
m
distance
cl
assifi
er.
The
e
xperim
ental
resu
lt
s
ha
ve
at
ta
ined
96.0%
accu
racy
in
face
recog
niti
on
by
im
ple
m
enting
the
Fish
erf
ace
al
gorithm
and
93.8%
acc
ur
a
c
y
with
the
Eig
enf
ace
al
go
rith
m
.
Face
f
or
m
s
the
le
adi
ng
bio
m
et
ric
trai
t
to
be
consi
der
e
d
on
m
ob
il
e
phon
e
de
vices
[
6
]
,
[
34
]
i
n
c
omparis
on
to
fi
nger
pr
i
nt
a
nd
i
ris.
E
ve
n
t
hough
the
authe
ntica
ti
on
schem
e
is
m
o
stl
y
acce
ptable
by
m
ob
il
e
phon
e
us
ers
sti
ll
there
e
xists
i
ssu
es
re
gardin
g
t
he
perform
ance
of
the
secur
it
y
sol
ution
re
ga
rd
i
ng
certai
n
c
ondi
ti
on
s
li
ke
face
ang
le
s
,
poor
li
ghti
ng
c
ondit
ions
,
an
d
div
e
rse
e
xpress
ion
s
.
2
.
1.
2
Au
t
hen
ticat
i
on
ba
se
d
on Be
havi
ou
r
al C
h
ar
act
eri
s
tics
Keyst
roke
dynam
ic
s
or
ty
pin
g
rh
yt
hm
,
sign
at
ur
e
,
voic
e
,
gait
and
be
ha
viour
prof
il
in
g
f
or
m
the
beh
a
viou
ral
tra
it
s f
or the
au
t
he
ntica
ti
on
syst
e
m
s b
ased
on b
ehav
i
oural
biom
et
rics
.
a.
Be
hav
i
our
P
r
ofi
li
ng
How
t
he
i
nd
i
vid
uals
interact
with
t
heir
m
obil
e
dev
ic
es
to
a
vail
num
ero
us
serv
ic
es
f
or
m
the
basis
of
identific
at
ion
i
n
su
c
h
te
c
hn
i
qu
e
s;
exam
ples
inclu
de
ap
pl
ic
at
ion
s
us
a
ge,
locat
ion
et
c.
In
[35],
be
ha
vi
oural
bio
m
et
rics
data
has
bee
n
c
ollec
te
d
a
nd
anal
yse
d
f
r
om
different
A
ndro
i
d
m
ob
il
e
dev
ic
es
to
pro
vid
e
a
s
olu
ti
on
for
act
ive
a
uth
entic
at
io
n
ai
m
ed
to
ve
rify
the
ide
ntit
y
of
a
le
gitim
ate
us
e
r
co
ntin
uous
ly
.
F
our
bi
om
et
ri
c
par
am
et
ers:
i)
te
xt
entere
d
th
r
ough
a
s
of
t
key
bo
a
r
d,
ii
)
de
vic
e'
s
ph
ysi
cal
locat
ion
as
per
GPS
(out
doors)
or
W
i
-
Fi
(in
doors
)
ii
i)
us
e
d
ap
plica
ti
on
s
,
i
v)
visit
ed
web
sit
es
ha
ve
been
c
on
si
der
e
d.
A
cl
assifi
er
has
bee
n
im
plem
ented
and
te
ste
d
f
or
ever
y
m
od
al
it
y,
an
d
these
cl
a
ssifie
rs
ha
ve
be
en
orga
nise
d
in
a
par
al
le
l
bi
nar
y
-
decisi
on
f
us
io
n
desig
n.
F
urt
her,
A
no
vel
acce
ss
con
t
ro
l
m
ec
han
ism
based
on
par
ti
cula
r
use
r
co
ntext
ha
s
been
im
ple
m
e
nted
i
n
[36],
w
hic
h
dy
nam
ic
al
ly
gr
ants
or
revo
kes
pr
i
vileges
t
o
us
ers
.
T
he
a
u
thors
ha
ve
w
or
ked
on
the
A
ndr
oid
restrict
ion
te
c
hniq
ues.
T
he
co
ntext
im
ple
m
e
ntati
on
is
capa
ble
of
dif
fer
e
nt
ia
ti
ng
betwee
n
var
i
ou
s
cl
os
el
y
locat
e
d
su
b
-
a
reas
withi
n
t
he
sam
e
loc
at
ion
.
Th
e
set
ti
ng
in
this
pa
pe
r
has
bee
n
def
i
ned
in
te
rm
s
of
ti
m
e
and
l
oca
ti
on
,
the
locat
io
n i
s
sp
eci
fied
in
te
r
m
s
of
visible
W
i
-
Fi
acce
ss
points
t
og
et
her
with
thei
r si
gnal
stren
gth
s
, i
n
add
it
io
n
to
cel
lular
tria
ngulati
on
a
nd
GP
S
as
pe
r
a
va
il
abili
ty
.
Even
t
hough,
s
uc
h
secu
rity
sche
m
es
seem
to
be
feasi
ble
on
m
ob
il
e
phone
dev
ic
es.
Ne
ver
t
heless,
perform
ance
inco
ns
ist
ency
re
su
l
ti
ng
f
r
om
un
ex
pected
i
nteract
ion
by
us
ers'
is the
pri
m
ary weakness
experie
nced b
y suc
h
syst
em
s
.
b.
Keyst
roke
Dyn
a
m
ic
s
An
in
div
i
dual
s'
ty
pin
g
r
hyth
m
and
m
ann
e
r
are
bein
g
util
is
ed
by
this
ap
proach.
Keyst
r
ok
e
dy
nam
ic
s
fou
n
d
thei
r
pla
ce
on
m
ob
il
e
phone
dev
ic
es
t
he
lo
ng
ti
m
e
a
go.
The
a
uthor
s
in
[
37
]
aim
t
o
im
pr
ov
e
the
existi
ng
syst
e
m
s
based
on
t
he key
str
oke
dy
nam
ic
s
a
uth
e
ntica
ti
on
t
o en
ha
nce
the
s
ecur
it
y
of
sm
artphon
e
s
by
inc
reasin
g
us
er
e
rgo
no
m
i
cs,
al
lo
wing
a
us
e
r
to
cha
nge
t
he
PIN
w
it
ho
ut
Keyst
r
oke
-
Dynam
ic
s
-
Ba
sed
-
A
uth
e
ntica
ti
on
(KDA)
syst
em
to
be
re
trai
ne
d.
The
syst
em
ca
n
disti
ng
uish
bet
ween
a
n
im
po
ste
r
a
nd
a
le
gi
tim
a
te
us
er,
no
ta
bly
wh
e
n
the
us
e
r
s
change
th
ei
r
pass
words.
O
ver
al
l
in
c
on
tr
ast
to
ph
ysi
ologica
l
authe
ntica
ti
on
-
base
d
sc
hem
es,
Evaluation Warning : The document was created with Spire.PDF for Python.
Ind
on
esi
a
n
J
E
le
c Eng &
Co
m
p
Sci
IS
S
N:
25
02
-
4752
A Cri
ti
cal Insigh
t i
nto
t
he Ide
ntit
y Au
the
nticati
on S
y
ste
ms on S
m
ar
tp
hone
s
(
Tehs
ee
n
Me
hr
aj
)
985
beh
a
viou
ral
bi
om
et
rics
of
fer
a
so
luti
on
to
at
ta
in
trans
pa
ren
t
a
ct
ive
a
ut
hen
ti
cat
io
n
wi
thout
any
a
dd
i
ti
on
al
hard
war
e
re
quirem
ents.
Th
us
,
form
ing
a
c
hea
per
s
olu
ti
on
a
s
com
par
ed
to
ph
ysi
olo
gical
a
ut
hen
ti
cat
io
n
sc
hem
es.
Fr
om
the
surv
e
y
cond
ucted,
t
he
physi
ologica
l
authe
ntica
ti
on
schem
es
e
m
erg
e
to
be
vulne
ra
ble
to
rep
la
y
a
tt
acks,
wh
e
re
t
he
i
ntr
ud
e
r
can
e
xp
l
oi
t
the
im
ages
of
th
e
ph
ysi
cal
featur
e
s
by
repl
ay
ing
them
la
te
r.
M
or
e
over
,
i
n
t
he
case
of
be
ha
vi
oural
a
uth
e
ntica
ti
on
schem
es
com
pu
lsi
on
f
or
en
ha
ncin
g
the
sec
ur
it
y
e
xists.
Se
ve
ral
a
ppr
oa
ches
can
be
a
dopte
d t
o
th
wa
rt su
c
h s
us
ce
ptibil
it
ie
s at the sam
e ti
m
e streng
t
he
n sec
ur
it
y.
In
[
38]
,
a
f
ram
ewor
k
c
om
bin
ing
the
per
m
uted
s
eq
ue
nce
for
m
ing
a
be
ha
vi
oural
fin
gerpr
i
nt
with
t
he
ph
ysi
ologica
l
f
ing
e
rprint
t
o
bri
ng
to
gethe
r
th
e
reli
abili
ty
an
d
acc
ur
a
cy
of
e
ach
has
bee
n
pro
posed
.
Be
ha
vioura
l
fin
gerpr
i
nt
act
s
as
a
fire
wall
wh
ic
h
de
la
ys
or
blo
c
ks
una
uthorise
d
acce
ss
to
the
syst
e
m
in
case
the
us
er'
s
fin
gerpr
i
nt
wa
s
com
pr
om
ised
.
T
he
pr
opose
d
be
ha
vioura
l
fing
e
rprint
f
ram
ewo
rk
i
de
ntifie
s
the
r
oo
t
of
a
fin
gerpr
i
nt a
nd it
s f
i
ng
e
rprint
seq
u
ence
. It
is
m
or
e eff
ic
ie
nt
than
the
m
ultim
od
al
b
iom
et
ri
c ap
proac
hes
without
requirin
g
any
a
dd
it
io
nal
hard
war
e
.
F
urt
he
r,
in
[
39]
,
a
bio
m
et
ric
m
ultim
od
al
syst
e
m
has
be
en
pro
posed
,
wh
i
c
h
util
ise
s
bio
m
etr
ic
char
act
e
risti
cs
li
ke
iris,
fa
ce
and
per
i
ocul
ar
for
ac
cess
c
on
t
ro
l.
M
ulti
-
m
od
al
fu
sio
n
ha
s
bee
n
perform
ed
us
ing
iris
,
face
a
nd
per
i
ocu
la
r
data
an
d
wei
ghte
d
f
us
i
on
a
ppr
oac
h
ha
ve
be
en
util
ise
d
f
or
f
us
in
g
com
par
ison
sc
or
e
of
disti
ncti
ve
featu
re
extr
act
ion
schem
es.
T
his
m
et
ho
d
exp
l
or
es
nu
m
erous
sco
re
-
le
ve
l
f
us
io
n
to
us
e
t
he
c
om
ple
m
entary
inf
or
m
at
ion
fro
m
the
three
m
od
al
it
ie
s
.
Table
1
has
f
orm
ula
te
d
the
va
rio
us
con
t
rib
ution
s
a
nd all
ie
d
we
ak
nesses
.
2.2.
Non
-
Bi
om
etri
c
-
b
as
ed
Sy
s
te
ms
Othe
r
tha
n
bi
om
et
ric
-
based
s
ecur
it
y
so
luti
ons,
researc
hes
hav
e
bee
n
di
re
ct
ed
on
sec
ur
it
y
schem
es
centre
d
on
m
od
ifie
d
pas
sw
ords,
so
ci
al
netw
orks,
locat
io
n
i
nfor
m
at
ion
,
public
key
c
rypto
gr
a
phy,
sm
art
dev
ic
e
s
and p
e
rm
issi
on
contr
ol on
m
ob
il
e d
e
vices
.
In
[41],
the
au
thors
ha
ve
put
forw
a
rd
a
novel
m
e
tho
d
t
o
stren
gth
e
n
the
acce
ss
co
ntro
l
m
echan
ism
base
d o
n pass
words.
T
he
le
ve
l o
f dif
ficult
y
in
br
eac
hing
th
e pa
sswo
rd is
incr
ease
d
by a
ddin
g f
ree
ra
ndom
text
wh
ic
h
furthe
r
m
akes
the
syst
e
m
i
m
m
un
e
ag
ai
ns
t
pre
-
c
om
pu
te
d
rain
bow
a
nd
dicti
onary
a
tt
acks
in
a
ddit
ion
to
sh
oul
der
s
urfin
g
a
nd
re
play
at
t
acks.
I
n
[
42]
,
a
su
it
able
a
nd
e
ffec
ti
ve
schem
e
for
L
AN
has
be
en
propose
d,
wh
ic
h
so
lves
com
plex
issu
es
s
uch
as
authe
ntica
ti
on,
m
anag
em
e
nt,
a
nd
a
utho
risat
ion
,
t
hus
si
m
pl
ify
ing
the
var
i
ous
netw
ork
sec
uri
ty
m
easur
es
a
nd
poli
ci
es
int
ern
al
t
o
the
ne
twork
.
A
no
ve
l
acce
ss
co
nt
ro
l
sc
hem
e
has
bee
n
introd
uced
w
hi
ch
m
akes
us
e
of
Use
r
-
Acces
s
-
Co
ntr
ol
-
Ta
ble
(
UA
T
)
a
nd
US
B
i
n
L
ocal
-
Ar
ea
-
Net
wor
k
(LAN
)
.
It provide
s
pr
i
vilege m
anag
e
m
ent in L
AN a
t sm
a
ll
er co
sts.
A
novel
W
i
-
Fi
authe
ntica
ti
on
m
echan
ism
has
bee
n
pr
ese
nte
d
i
n
[
43
]
im
ple
m
enting
so
ci
al
netw
orks
as
the
crit
eria
f
or
pro
vid
in
g
m
or
e
us
er
-
f
rien
dline
ss
an
d
sec
ur
e
a
uth
e
ntica
ti
on
.
The
syst
em
aban
do
ns
the
centr
al
iz
ed
appr
oach
w
hich
ent
ren
c
hes
s
ocial
netw
orks
for
W
i
-
Fi
a
uth
entic
at
io
n
ins
te
ad
the
syst
e
m
has
intr
oduc
ed
a
decen
t
ra
li
zed
appr
oach
E
AP
-
Soc
-
TL
S,
f
or
auth
ori
zat
ion
an
d
a
uth
e
ntica
ti
on
of
W
i
-
F
i
acce
ss
po
i
nts
a
nd
nu
m
erous
ad
di
ti
on
al
de
vices,
thu
s
pro
vid
in
g
a
m
uch
bette
r
s
olu
ti
on
in
te
rm
s
of
scal
a
bili
ty
than
the
c
onve
ntion
al
centrali
zed
a
ppr
oac
hes
wh
ic
h
fac
e
sin
gle
point
f
ai
l
ur
e
pro
blem
s
and
rais
e
pr
i
vacy
co
nc
ern
s
.
A
pract
ic
al
an
d
secur
e
a
uth
e
ntica
ti
on
m
echan
is
m
founde
d
on
sm
art
card
s
has
bee
n
pr
opos
e
d
i
n
[21].
The
pro
pose
d
syst
e
m
delivers
pr
otect
ion
a
gainst
vari
ou
s
su
sce
ptibi
li
ti
es
wh
il
e
at
the
sam
e
tim
e
i
m
pr
ov
in
g
e
xisti
ng
se
c
uri
ty
schem
es.
The
m
echan
ism
per
m
it
s
us
er
s
to
sel
ect
t
heir
pa
sswo
rd
s
c
onven
ie
ntly
with
the
pr
i
vilege
of
m
od
ify
ing
it
offli
ne
.
The
sm
art car
d d
oes
n'
t ho
ld
a
ny cr
ucial
in
form
ation
, t
hu
s
s
afeguar
ding a
ga
i
ns
t st
olen
use
r
sm
artcard risk.
In
[
44]
,
t
he
a
uthors
p
r
opose
d
a
bilat
eral
rec
urrin
g
aut
hen
ti
cat
io
n
m
et
hod
nam
el
y
Zer
o
-
Ef
fort
-
Bi
la
te
ral
-
Re
cur
rin
g
-
A
uth
e
ntica
ti
on
(ZEBR
A)
.
T
he
syst
e
m
util
ise
s
a
ha
rdwar
e
t
ok
e
n
in
t
he
f
or
m
of
a
brace
le
t
wh
ic
h
has
buil
t
-
in
ra
di
o,
gyr
osc
ope,
a
nd
acc
el
ero
m
et
er
to
pro
vid
e
c
onti
nued
au
t
he
ntica
ti
on
.
T
he
si
gn
al
s
sent
from
the
brace
l
et
w
orn
on
the
us
er'
s
wr
ist
are
correla
te
d
with
the
te
rm
inal'
s
op
e
rati
ons
t
o
c
onfirm
the
c
onti
nu
e
d
pr
ese
nce
of
t
he
us
er
if
t
he
two
m
ov
em
ents
corres
pond
a
ccordin
g
to
a
few
c
oarse
-
gr
a
ined
act
io
ns
.
I
n
[
45
]
,
locat
i
on
i
nform
at
ion
has
be
en
use
d
as
a
m
od
al
ity
fo
r
use
r
aut
hen
ti
cat
ion
.
The
pa
per
has
pr
ese
nted
a
novel
al
gorithm
as
Hidd
e
n
Ma
rko
v
Mod
el
acc
om
pan
ie
d
with
m
arg
inal
sm
oo
thin
g
m
et
ho
d
for
lo
cat
ion
a
uth
e
ntica
ti
on
.
The
pro
po
se
d s
chem
e
ou
tpe
rfor
m
s
oth
er
m
eth
ods
re
gar
ding
the
E
qu
al
Er
ror R
at
e
(EER
)
of
20.
73%.
H
owever,
the
re
quirem
ent
to
posses
s
in
f
or
m
at
ion
relat
ed
to
ge
nuine
us
er
r
ou
ti
ne
le
aves
t
he
ar
ra
ngem
ent
vu
ln
er
able
to
at
ta
cks
pl
us
th
e
schem
e
sh
ou
ld
co
ns
i
der
f
usi
on
with
oth
e
r
m
od
al
it
ie
s
to
achieve
bette
r
pe
rfor
m
an
ce.
I
n
[46],
sensiti
ve
data
le
akag
e
pr
e
ve
ntion
m
echan
i
sm
fo
r
Androi
d
m
ob
il
e
dev
i
ces
has
be
en
pro
po
se
d.
Ma
l
ic
iou
s
app
li
cat
io
ns
ar
e
detect
ed
whic
h
are
respo
nsi
ble
for
the
l
eakag
e
of
crit
ic
al
data
util
isi
ng
J8
-
cl
assifi
c
at
ion
al
gorithm
.
The
schem
e
achiev
ed
98.
6%
acc
ur
acy
in
detect
io
n
of
ben
i
gn
a
nd
m
alici
ou
s
a
pps
.
Ta
ble
2
has
f
r
a
m
ed
the pr
os
a
nd cons
of num
ero
us n
on
-
bio
m
et
ri
c schem
es d
isc
us
se
d
ea
rlie
r
as
foll
ow
s:
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2502
-
4752
Ind
on
esi
a
n
J
E
le
c Eng
&
Co
m
p
Sci,
Vo
l.
1
3
, N
o.
3
,
Ma
rc
h
201
9
:
9
82
–
9
89
986
Table
1.
Re
vie
w of
bi
om
et
ric
schem
es
Au
th
o
r
Co
n
tribu
tio
n
Li
m
itat
io
n
s
(And
reeva
et
al.,
2
0
1
2
)
[
2
1
]
Prop
o
se
s
Co
n
ti
n
u
o
u
s
access
co
n
trol
m
e
ch
an
is
m
ex
p
lo
itin
g
heart sou
n
d
s.
Prolo
n
g
ed
au
th
en
t
icatio
n
can'
t
b
e
e
x
p
ected
b
y
th
e
syste
m
as
th
e
h
ea
rt
so
u
n
d
co
n
d
itio
n
s
o
f
h
u
m
an
s
d
o
n
o
t
re
m
a
in
the sa
m
e
w
ith
ti
m
e.
A
syste
m
is
estab
lish
ed
o
n
BAN
en
g
ag
es
co
m
p
lex
co
n
stru
ctio
n
an
d
s
ev
eral
sen
so
rs,
h
in
d
ering
ad
eq
u
ate
u
ser ado
p
tab
ility.
Ris
k
of
intru
sion ex
ists
du
ring
data trans
m
iss
io
n
.
(Kavita
et
al.,
2
0
1
3
)
[
3
2
]
Prop
o
sed
a
secu
re
,
lo
w
co
st,
an
d
ro
b
u
st
b
io
m
et
ric
au
th
en
ticatio
n
sch
e
m
e
o
n
m
o
b
ile
ph
o
n
es.
Lacks
in
o
b
tain
in
g
crucial
f
eatu
res
a
s
lo
w
d
ef
in
itio
n
ca
m
e
ra
is
co
n
sid
ered.
Facto
rs
lik
e
b
ackg
rou
n
d
,
lig
h
tin
g
,
an
d
o
rientatio
n
n
eed to
be con
sid
ered hin
d
ering
us
er
ad
o
p
tab
ility.
Perf
o
r
m
an
ce
an
aly
sis
regardin
g
th
e
accurac
y
o
f
th
e
syste
m
an
d
th
e
res
o
u
rces
co
n
su
m
ed
o
n
m
o
b
ile
d
ev
ices
ha
s n
o
t been
do
n
e.
Hig
h
er
f
alse
acc
ep
tan
ce
rate
wh
il
e
co
n
te
m
p
l
ated
s
m
aller
data
-
set
.
(Co
n
ti et
al.
,
2
0
1
4
)
[
3
1
]
Presen
ted
a
b
io
m
e
tri
c
au
th
en
ticatio
n
sch
e
m
e
as
an
An
d
roid
ap
p
licatio
n
in
real
-
ti
m
e
m
o
b
ile dev
ice
s.
Lacks
in
a
co
m
p
let
e
acqu
isitio
n
o
f
th
e
f
in
g
erprint
th
u
s
redu
cin
g
recog
n
itio
n
rate
an
d
h
en
ce
u
ser
ad
ap
tab
ility
.
(Darwais
h
et
al
.,
2
0
1
4
)
[
2
]
Intro
d
u
ced
o
ff
l
in
e
f
ace
-
recog
n
itio
n
m
e
ch
an
is
m
on
m
o
b
ile dev
ices.
Co
m
p
a
riso
n
with
v
ariou
s
av
ailab
le
state
-
of
-
art
alg
o
rith
m
s
is des
ir
ed
.
(T
sai et
al.
,
2
0
1
4
)
[
3
7
]
Prop
o
sed
an
i
m
p
rov
ed
k
ey
st
rok
e
d
y
n
a
m
ics au
th
en
ti
catio
n
m
echan
is
m
.
Discards
the r
etrai
n
in
g
ph
ase.
Au
th
en
ticatio
n
failure
is
n
o
t
b
ein
g
h
an
d
led
ap
p
rop
riately
le
ad
in
g
to redu
ced u
ser er
g
o
n
o
m
ics.
Su
scep
tib
le
to
s
m
u
d
g
e
attacks
,
accele
ro
m
ete
r,
ti
m
in
g
attack
s, keyst
rok
e
in
f
erence attacks
.
(Daniel
et
al.,
2
0
1
5
)
[
1
9
]
Prop
o
sed
a
m
e
ch
an
is
m
to
th
w
art
reply
attack
ai
m
in
g
f
ace
recog
n
itio
n
o
n
s
m
art
d
ev
ices.
Variou
s
f
acto
rs
su
c
h
as
en
v
iron
m
en
tal
co
n
d
itio
n
s,
an
d
ca
m
e
ra
settin
g
s etc
.,
a
re
n
o
t con
sid
ere
d
.
I
m
p
le
m
en
tatio
n
on
co
m
p
u
ter
s
y
ste
m
s
on
ly
.
(Fr
id
m
an
et
al.,
2
0
1
5
)
[
3
3
]
Desig
n
ed
an
activ
e
au
th
en
ticatio
n
m
e
ch
an
is
m
on
m
o
b
ile dev
ices.
Utilized
GPS
as
Locatio
n
class
if
ier,
wh
ich
f
ails
to
d
eliv
er
p
recise
au
th
en
ticatio
n
.
(Jav
ier
et
al.
,
2
0
1
5
)
[
4
0
]
Desig
n
ed
a
n
o
v
el
so
f
tware
-
b
ased
f
ak
e
d
etectio
n
tech
n
iq
u
e
th
warting
f
raud
u
len
t
access to
nu
m
erou
s b
io
m
e
tric
s
y
ste
m
s.
I
m
p
le
m
en
tatio
n
is
p
erfo
r
m
ed
o
n
co
m
p
u
te
r
s
y
ste
m
s
an
d
no
t on
m
o
b
ile
d
ev
ices.
The state
-
of
-
art
alg
o
rith
m
s
no
t sp
ecif
ied
.
(Jiawei
et
al
.,
2
0
1
5
)
[
3
3
]
Pres
en
ted
a
f
ace
re
co
g
n
itio
n
syste
m
t
itled
XFace a
i
m
ed
f
o
r
t
h
e And
roid
platf
o
r
m
.
The s
m
all
datas
et
h
as b
een co
n
te
m
p
l
ated
.
(Kir
an
e
t al.
,
2
0
1
5
)
[
3
9
]
Prop
o
sed
a
b
io
m
et
ric
m
u
lti
-
m
o
d
al
s
y
ste
m
in
co
rpo
rating
b
io
m
e
tri
c
ch
a
racte
ri
stics
lik
e
iris,
f
ace
an
d
p
eriocu
lar
f
o
r
a
c
cess
co
n
trol.
Dif
f
erent
d
istan
ce
s
to
a
ca
m
er
a,
ca
m
e
ra
p
rop
erties
,
f
ace
an
g
les
an
d
ex
p
ressio
n
s
h
av
e
n
o
t
b
een
co
n
te
m
p
lat
ed
.
Req
u
ires
h
ig
h
d
efinitio
n
ca
m
era
an
d
in
cu
rs
a
h
ig
h
co
m
p
u
tatio
n
cos
t.
Perf
o
r
m
an
ce
an
al
y
sis
regardin
g
th
e
lim
i
ted
reso
u
rces
o
f
a
s
m
ar
tp
h
o
n
e
su
ch
as
m
e
m
o
ry
an
d
b
atter
y
co
n
su
m
p
tio
n
has
no
t been
do
n
e.
(M
a
ria
et
al.
,
2
0
1
5
)
[
6
]
Intro
d
u
ced
a
b
io
m
et
ric
m
u
lti
m
o
d
al
secu
rity
m
echan
is
m
o
n
m
o
b
ile dev
ic
es.
Acq
u
isitio
n
u
n
d
er
ex
tre
m
el
y
co
n
trolled
situ
atio
n
s
to
acqu
ire
iris hin
d
eri
n
g
us
er
ad
o
p
tab
ilit
y
.
(M
en
g
et
al.,
20
1
5
)
[
2
2
]
A
n
o
v
el
au
th
en
ticatio
n
f
ra
m
e
wo
rk
i
m
p
l
e
m
en
tin
g
m
u
l
ti
-
m
o
d
al
b
io
m
etric
u
ser
au
th
en
ticatio
n
.
Hav
e
co
n
sid
ered
to
u
ch
screen
d
y
n
am
i
c
d
e
m
an
d
in
g
h
ig
h
p
erf
o
r
m
an
ce
an
d
accuracy
,
wh
ich
is
d
iff
icu
lt
to
achi
ev
e on
m
o
b
ile
d
ev
ices.
Su
scep
tib
le to to
u
ch
log
g
er
d
etectio
n
attacks
.
(Sheb
aro
et
al.,
2
0
1
5
)
[
3
6
]
Presen
ted
a
n
o
v
el
access
c
o
n
trol
m
e
ch
an
is
m
d
y
n
a
m
i
call
y
g
r
an
tin
g
o
r
revo
k
in
g
priv
ileg
e
s to
us
ers.
1
6
% o
f
f
alse p
o
siti
v
es h
av
e been
f
o
u
n
d
.
Su
f
f
ers fro
m
m
e
m
o
ry
ov
erhead
.
(Yang
et
al
.,
20
1
5
)
[
1
1
]
Ad
d
ressed
two
p
o
ss
ib
le
co
m
p
lic
atio
n
s
related to i
m
p
licit
au
th
en
ticatio
n
.
Perf
o
r
m
an
ce
o
n
s
m
a
rtph
o
n
es
o
n
wh
ich
th
e
i
m
p
lici
t
au
th
en
ticatio
n
is widely
i
m
p
l
e
m
en
ted
is no
t sh
o
wn
.
The
d
ataset
wit
h
weak
m
o
d
alit
ies
h
as
b
een
co
n
te
m
p
lat
ed
.
Vu
ln
erable
to
m
i
m
ic
attacks
,
s
y
n
th
etic
attack,
sen
so
r
-
sn
iff
in
g
attacks
.
(T
eo
et
al.
,
20
1
7
)
[
3
8
]
Desig
n
ed
a
n
ew
f
ra
m
e
wo
rk
co
m
b
in
in
g
th
e
p
er
m
u
ted
seq
u
en
c
e
f
o
r
m
in
g
a
b
eh
av
io
u
ral
f
in
g
erprint
with
th
e
p
h
y
sio
lo
g
ical
f
in
g
erprint
.
Usab
ility
n
eeds
to
b
e
tak
en
in
to
co
n
sid
erat
io
n
as
th
e
seq
u
en
ce
m
u
st
be
m
e
m
o
rised
by
th
e
u
ser.
Ad
d
itio
n
al
h
ardware
requ
ire
m
en
ts
as
th
e
p
ri
m
a
ry
sen
so
r
f
o
r
f
in
g
erpr
in
t acqu
isitio
n
is d
esired.
Evaluation Warning : The document was created with Spire.PDF for Python.
Ind
on
esi
a
n
J
E
le
c Eng &
Co
m
p
Sci
IS
S
N:
25
02
-
4752
A Cri
ti
cal Insigh
t i
nto
t
he Ide
ntit
y Au
the
nticati
on S
y
ste
ms on S
m
ar
tp
hone
s
(
Tehs
ee
n
Me
hr
aj
)
987
Table
2.
Re
vie
w of
non
-
bio
m
et
ric schem
es
Au
th
o
r
Co
n
tribu
tio
n
Li
m
itat
io
n
s
(Z
h
an
g
et
al.
,
2
0
1
0
)
[
4
2
]
A
n
o
v
el
sch
e
m
e
LAN's
access
co
n
trol
cent
red o
n
UAT
a
n
d
USB in LAN
.
USB as ad
d
itio
n
al
h
ardware.
Lacks in
m
a
in
tain
in
g
us
er
ergo
n
o
m
ic
s.
(Abo
u
d
et
al.,
20
1
4
)
[
1
7
]
Presen
ted
an
e
f
f
ectiv
e
an
d
se
cu
re
au
th
en
ticatio
n
m
e
ch
an
is
m
f
o
u
n
d
ed
u
p
o
n
s
m
art
car
d
s.
Usag
e
o
f
an
ad
d
itio
n
al
to
k
en
s
h
all
p
rov
e
ex
p
en
siv
e
f
o
r
se
rvice
p
rov
id
er
a
n
d
caus
e
d
if
f
ic
u
lty
to u
sers.
(Dur
m
u
s
et al.
,
2
0
1
4
)
[
4
3
]
Presen
ted
a
n
o
v
el
W
i
-
Fi
au
th
en
tica
tio
n
m
e
ch
an
is
m
i
m
p
le
m
e
n
tin
g
so
cial
n
etwo
rks
as
th
e
crit
eria
f
o
r
p
rov
id
in
g
a
m
o
re
u
ser
-
f
riend
ly
an
d
s
ecure
au
th
en
ticatio
n
m
e
ch
an
is
m
.
De
m
an
d
s
p
rof
ile
o
f
o
wn
er
o
n
th
e
so
cial
n
etwo
rk.
Privacy
co
n
ce
rns
ex
ist
as
co
m
p
let
e
f
riend
sh
i
p
in
f
o
r
m
atio
n
is anti
cip
ated
to b
e op
en
f
o
r
all.
Secu
rity
co
n
ce
rns
arise
as
wo
rn
-
o
u
t
c
aches
u
sed
to
perf
o
r
m
of
f
li
n
e auth
en
ticatio
n
.
Own
ersh
ip
r
elated
iss
u
es are
no
t con
te
m
p
lated
.
(Shrirang
et
al.,
20
1
4
)
[
4
4
]
Prop
o
sed
an active au
th
en
ticatio
n
sch
e
m
e
ZE
BR
A.
Lacks in
us
er
ad
o
p
tab
ility.
Bracelet
as
an
ad
d
itio
n
al
h
ardware
re
q
u
ire
m
en
t.
(
Up
al and
Ra
m
a.,
2
0
1
6
)
[45
]
Presen
ted
an
activ
e
au
th
en
ticatio
n
syste
m
e
m
p
lo
y
in
g
tr
ac
e hi
sto
ry
.
A
requ
ire
m
en
t
to
h
av
e
in
f
o
r
m
atio
n
related
to
g
en
u
in
e
u
ser
rou
t
in
e
leav
es
th
e
arran
g
e
m
en
t
v
u
ln
erable to attac
k
s.
(Ch
o
wd
h
u
ry
et
al.
,
20
1
7
)
[
4
1
]
Fo
rwar
d
ed
a
n
o
v
el
tech
n
iq
u
e
to
stren
g
th
en
th
e
acc
ess
co
n
trol
m
echa
n
is
m
b
ased
on
pas
swo
rd
s.
An
au
th
en
ticatio
n
f
ailu
re
o
ccurs
f
ro
m
th
e
p
ass
wo
rds
cac
h
ed
in v
ariou
s n
ewest b
rows
ers.
User
ad
o
p
tab
ility
i
s
n
o
t
u
p
to
th
e
m
ar
k
as
m
o
re
th
in
g
s
n
eed
t
o
b
e
re
m
e
m
b
e
red
b
y
th
e
u
ser,
u
n
lik
e the exis
tin
g
syste
m
.
Su
scep
tib
le to k
ey
stro
k
e attac
k
.
(Yavu
z et
al
.,
20
1
7
)
[
4
6
]
Presen
ted
a
sen
sitiv
e
d
ata
leak
ag
e
p
reven
tio
n
m
e
ch
an
is
m
.
S
m
all dat
a
-
set h
as
b
een co
n
te
m
p
lat
ed
.
3.
OPEN
ISS
UE
S
Af
te
r
prese
nting
the
stu
dy
of
var
io
us
s
ecur
it
y
sch
em
es
avail
able
i
n
acce
ss
m
anag
em
ent
as
com
ple
m
ented
by
resea
rch
e
rs,
it
can
be
c
oncl
ud
e
d
t
hat
there
sti
ll
hap
pe
n
to
be
lo
ophole
s
in
the
offe
re
d
sec
ur
it
y
so
luti
ons.
T
he
chall
en
ges
i
de
ntifie
d
range
from
secur
it
y
vu
l
ner
a
bili
ty
t
o
c
om
pu
ta
ti
onal
com
plexity
to
us
e
r
adoptabil
it
y. Con
cl
us
ively
, t
he
prog
re
ssive
r
eview c
onduct
ed wil
l end wit
h
the
foll
owin
g o
pen issue
s:
a)
Re
du
ce
d
us
er
a
doptabili
ty
persi
sts
du
e
to
e
xt
ra
ha
rdwa
re
re
qu
i
rem
ents
existi
ng
in
t
he
f
orm
of
sm
art
card
s,
sp
eci
al
ly
f
eat
ured
hard
war
e
[
13]
, [2
1], [4
0], [38
]
,
[43
]
.
b)
Pr
om
inent
pro
cessi
ng
powe
r
and
e
xecu
ti
on
t
i
m
e
su
bs
ist
[21
]
,
[22]
,
res
ulti
ng
i
n
s
ubseq
ue
nt
incom
patibil
ity
to ope
rate o
n g
ener
ic
m
ob
il
e
dev
ic
es
.
c)
Databases
us
e
d
to
trai
n
t
he
bi
om
et
ric
reco
gnit
ion
sc
hem
es
are
far
from
the
da
ta
that
exists
in
the
real
w
or
l
d
[33],
[39],
[40], [4
6]
, thu
s,
offe
rin
g
re
duced
accuracy
w
hen su
c
h
s
olu
ti
ons
are
e
xpos
e
d
t
o real
ist
ic
d
at
a.
d)
Be
hav
i
oural
bi
om
et
rics
ease
a
us
er
i
n
te
rm
s
of
us
e
r
ad
opta
bi
li
ty
[1
1],
[33],
[36]
;
howe
ver
,
the
accu
racy
of
su
c
h
syst
em
s d
rops
a
bru
ptly
w
he
n use
r beh
aves i
nv
e
rsely
.
e)
In
a
bili
ty
to
protect
a
gainst
va
rio
us
t
hr
eat
s
[11],
[
22
]
,
[
37
]
,
[
42
]
,
[
44]
,
wh
ic
h
sm
art
m
ob
il
e
dev
ic
e
s
ar
e
su
sce
ptible t
o,
li
ke
tou
c
h
-
lo
gger/key
-
lo
gger
, l
iveness dete
ct
ion, m
i
m
ic
att
a
cks, et
c.
f)
Choosin
g
a
s
uitable
set
of
bio
m
et
ric
ch
aracte
risti
cs
is
a
crit
ic
al
ch
al
le
ng
e
in
cas
e
of
bi
om
et
ri
c
authe
ntica
ti
on
par
ti
cula
rly
w
hen
c
onside
rin
g
m
ulti
-
m
od
al
bio
m
et
ric
secur
it
y
schem
es
[13],
[
22]
,
[
33]
,
[39],
[
46
]
.
D
es
ign
in
g
reli
able
aut
he
ntica
ti
on
syst
em
s
capabl
e
of
sel
ect
ing
or
decidin
g
on
an
a
ppr
opriat
e
bio
m
et
ric set exist
s.
g)
Pe
rfo
rm
ance
analy
sis
on
t
he
m
ob
il
e
platform
has
not
bee
n
cond
ucted
ye
t
[
11
]
,
[36],
[
39]
[
40
]
-
[
44
]
res
ulti
ng
in a lack
of
be
nch
m
ark
.
Thus
, im
ped
ing
t
he im
ple
m
entat
io
n of suc
h
s
che
m
es o
n ge
ner
ic
m
ob
il
e d
evice
s.
4.
CONCL
US
I
O
N
In
this
pa
per
,
a
n
ap
prai
sal
of
pr
i
or
a
uth
e
ntica
ti
on
te
ch
niqu
es
centre
d
on
bi
om
e
tric
and
non
-
bio
m
et
ric
appr
oach
es
ha
ve
bee
n
perfor
m
ed.
T
he
s
ub
sta
ntial
con
t
ribu
ti
ons
an
d
dr
awb
ac
ks
of
t
he
res
pecti
ve
s
ecur
it
y
so
luti
ons
ha
ve
been
pa
rtic
ular
ise
d
ex
plici
tl
y.
All
the
aut
he
ntica
ti
on
sc
hem
es
rev
ie
wed
we
re
fou
nd
t
o
be
la
c
king
in
on
e
co
ntext
or
the
ot
her
.
T
he
nee
d
for
s
uc
h
a
sec
ur
it
y
so
l
ution
per
sist
s
t
hat
s
hould
be
a
ble
to
th
war
t
not
on
ly
the conte
m
po
r
ary threats
bu
t
al
so
off
e
r
co
ntinu
e
d
s
upport
without b
owin
g
do
wn
t
o
pro
gressi
on in
te
c
hnol
og
y.
At
t
he
sam
e
tim
e,
us
e
r
er
gonom
ic
s
sh
ould
no
t
be
i
gnored
a
nd
treat
e
d
wi
th
e
qual
im
po
r
ta
nce.
Be
sides,
op
e
n
pro
blem
s
and
chall
enges
nee
d
to
be
delib
er
at
ed
w
hile
desi
gn
i
ng
su
c
h
sys
tem
s
with
the
hope
to
dri
ve
f
ur
t
he
r
researc
h
i
n
the
area.
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2502
-
4752
Ind
on
esi
a
n
J
E
le
c Eng
&
Co
m
p
Sci,
Vo
l.
1
3
, N
o.
3
,
Ma
rc
h
201
9
:
9
82
–
9
89
988
REFERE
NCE
S
[1]
Islam
SH
,
Biswas
GP
.
“
A
m
ore
eff
i
cient
and
se
cur
e
ID
-
base
d
r
emote
m
utual
a
uthe
ntica
ti
on
wi
th
ke
y
ag
ree
m
e
nt
sche
m
e
for
m
obi
le
d
evi
c
es
on
el
l
ipt
ic
cur
v
e
cr
y
pt
os
y
stem
”
.
Journ
al
of
Syste
ms
an
d
Soft
ware
1;84(
11):1892
-
8.
Nov
.
2011.
[2]
Darwai
sh
SF
,
M
ora
dia
n
E
,
R
ah
m
ani
T
,
Knau
er
M.
“
Biom
et
ri
c
ide
nti
f
icati
on
on
Android
sm
art
p
hones
”
.
Proce
d
i
a
Computer
Scien
ce
.
35:
832
-
841.
1.
Jan
.
2014
.
[3]
Khan
BUI,
Olan
rewa
ju
RF
,
Bab
a
AM
,
La
ngoo
AA
,
As
sad
S.
“
A
c
om
pendi
ous
study
of
onl
ine
p
a
y
m
ent
s
y
st
ems
:
Past
deve
lopments,
p
rese
nt
impac
t,
a
nd
future
consid
era
t
ions
”
.
In
te
rn
ati
onal
Journal
of
Adv
an
ce
d
Co
mputer
Sci
en
ce
and
Appl
ic
a
ti
ons
;
8(
5):
256
-
271.
1
Ma
y
2017
.
[4]
Pam
pori
BR,
Mehra
j
T
,
Khan
B
UI,
Bab
a
AM
,
Naja
r
ZA.
“
Sec
ure
l
y
er
adi
c
at
in
g
c
el
lu
la
r
dep
en
dency
for
e
-
ban
king
appl
i
ca
t
ions.
In
t
ernati
onal
Journ
al
of
Adv
an
ce
d
Computer
Scien
ce
and
App
li
ca
tions
.
385
-
398,
20
18
.
[5]
Hus
sain
S,
Kha
n
BUI,
Anw
ar
F,
Olanr
ewa
ju
RF
.
“
Secur
e
an
nihi
lation
of
ou
t
-
of
-
band
aut
ho
r
iz
a
ti
on
for
online
tra
nsac
ti
ons
”
.
In
dian
Journal
of
Sci
en
ce and
Tec
hnology
.
11(5)
:
1
-
9,
11
Feb
2018
.
[6]
De
Marsic
o
M,
Galdi
C
,
Nappi
M,
Ri
cc
io
D.
Fir
m
e:
“
Face
and
ir
is
re
cogni
t
ion
fo
r
m
obil
e
eng
agem
ent
”
.
Image
an
d
Vi
sion Computi
n
g
.
32(12):
1161
-
1
172,
1
Dec
2014
.
[7]
Masihuddin
M,
Khan
BUI,
Mat
too
MM
,
Olanr
ewa
ju
RF
.
“
A
surve
y
on
e
-
pa
ym
ent
s
y
stems
:
e
le
m
ent
s,
adopt
io
n
,
arc
hi
te
c
ture,
challe
ng
es
and
se
cu
rity
concept
s
”
.
I
ndian
Journal
o
f
Sc
ie
nc
e
and
Tec
hnology
.
10(20)
1
-
19,
25
Ma
y
20
17
[8]
Olanr
ewa
ju
RF
,
Khan
BUI,
Mat
t
oo
MM
,
Anw
ar
F,
Nordin
AN
,
M
ir
RN.
“
Secur
i
ng
el
e
ct
roni
c
tr
ansa
ct
ions
vi
a
p
a
y
m
e
nt
gat
ewa
y
s
–
a
s
y
st
emati
c
rev
ie
w
”
.
Inte
rnational
Jo
urnal
of
In
te
rne
t
Technol
og
y
and
Sec
ured
Tr
ansacti
ons
.
7(3)
:
245
-
269,
2017
.
[9]
Buriro
A,
Gupt
a
S,
Cr
ispo
B.
“
Eva
lua
t
ion
of
Motion
-
base
d
T
ouch
-
t
y
ping
B
io
m
et
ric
s
for
on
line
Banki
ng
”
.
2
017
Inte
rnational
Co
nfe
renc
e
of
th
e B
iomet
rics
Sp
ec
ia
l
Int
ere
st Group
(
BIOSIG
)
:
1
-
5,
2017
.
[10]
Marous
J.
“
Mill
e
nnia
ls
Ar
e
Leadi
ng
th
e
Dig
it
a
l
B
a
nking
Revo
lut
io
n
[Int
ern
et
]
”.
Th
e
Fin
anc
i
al
Bran
d
2017
.
Avai
la
b
l
e
from
:
htt
ps:/
/t
hef
ina
nc
ia
lbr
and.co
m
/64369/
m
il
le
n
nia
ls
-
m
obil
e
-
b
an
king
-
digi
t
al
-
eng
age
m
ent
-
tr
ends/
.
30
April
2018
[11]
Yang
Y,
Sun
JS
,
Zha
ng
C
,
L
i
P.
R
et
ra
ini
ng
and
d
ynamic
priv
il
eg
e
f
or
implic
i
t
aut
he
nti
c
at
ion
s
y
stem
s
.
2015
IE
EE
12
t
h
Inte
rnational
Co
nfe
renc
e
on
Mob
il
e
Ad
Ho
c
and
S
ensor Sy
stems (
MASS)
.
IEEE
:
1
63
-
171,
19
Oct
2
015
.
[12]
Nara
y
ana
n
A,
S
hm
at
ikov
V
.
“
Fast
diction
ar
y
a
t
ta
cks
on
p
assw
ords
using
ti
m
e
-
spac
e
tra
d
eof
f
”
.
Proce
ed
ings
of
t
he
12th
ACM
confe
renc
e
on
Compu
te
r and comm
uni
cat
ions se
curit
y
.
ACM
:
364
-
372
.
7
Nov 20
17
.
[13]
Online
fr
aud
ha
ppene
d
h
ac
king
m
y
icici
bank
c
red
it
ca
rd
[Inte
r
net
]
.
2013
[c
it
e
d
30
April
2018
]
.
Avail
able
fro
m
:
htt
p://ww
w.gra
h
akse
va.com/complai
nts/130310
/o
nli
ne
-
fr
aud
-
happ
ene
d
-
ha
cki
ng
-
my
-
i
cici
-
bank
-
credit
-
c
ard
[14]
Goel
CK,
Ar
y
a
G.
Hac
king
of
p
assw
ords
in
windows
envi
ronm
ent
.
Int
ernati
onal
Journal
of
Com
pute
r
Scienc
e
&
Comm
unic
ati
on
Net
works
.
2(3):
4
30
-
435,
2012
.
[15]
Adhikar
y
N,
Sh
riva
stav
a
R,
Kum
ar
A,
Verm
a
SK
,
Bag
M,
Sin
gh
V.
“
Bat
t
eri
n
g
ke
y
logge
rs
an
d
scre
en
r
ec
ord
i
ng
software
b
y
fab
r
ic
a
ti
ng
p
assw
ords
”
.
In
te
r
nati
ona
l
Journal
of
Computer
Ne
twork
a
nd
Information
Sec
urit
y
.
1;
4(5)
:
13
-
21,
Jun 2012
.
[16]
Le
e
W
H,
Lee
R
.
“
Im
pli
ci
t
sensor
-
base
d
au
the
nt
i
ca
t
ion
of
sm
art
p
hone
users
with
sm
art
watc
h
”
.
P
roce
edi
ngs
of
th
e
Har
dware
and
A
rchit
e
ct
ural
Sup
port
for Securit
y
and
Pri
va
c
y.
ACM
.
2016
[17]
Aboud
SJ
.
“
Secu
re
Pass
word
Aut
hent
i
ca
t
ion
S
y
st
em
Us
ing
Sm
art Ca
rd
”
.
Journal
o
f
Eme
rging
Tr
ends
&
Technol
og
y
in
Computer
S
cienc
e
(
IJE
TT
CS)
,
2014;
3(1)
:
75
-
7
9.
[18]
Jeong
J,
Chung
MY
,
Choo
H
.
“
Inte
gra
te
d
OT
P
-
base
d
user
au
the
ntica
ti
on
and
a
cc
ess
cont
ro
l
sche
m
e
in
hom
e
net
works
”
.
Proc
ee
dings
o
f
the
4
1st
Annual
Haw
aii
In
te
rnationa
l
Confe
ren
ce
on
Syste
m
S
ci
en
ce
s.
Springer,
B
erli
n,
Heide
lb
erg
.
W
aikoloa, HI,
2
008; 1
-
7.
[19]
Sm
it
h
DF
,
W
ili
em
A,
Lov
el
l
B
C.
“
Fac
e
re
cogn
it
ion
on
consum
er
d
evice
s:
Ref
l
ec
t
ions
on
r
epl
a
y
a
ttacks
”
.
IEEE
Tr
ansacti
ons on Inform
ati
on
For
ensic
s and
S
ec
ur
it
y
,
2015;
10(4):
736
-
745.
[20]
O'
Gorm
an
L
.
“
C
om
par
ing
passw
ords,
tok
ens,
and
biometrics
for
u
ser
au
the
nt
ic
a
ti
o
n
”,
Proceedi
ngs
of
th
e
IEEE
,
200
3;
91(12):
2021
-
20
40.
[21]
Andree
va
E
.
“
Secr
e
t
sh
ari
n
g
in
con
ti
nuous
acc
ess
cont
ro
l
s
y
st
em,
using
he
art
sounds
”
.
2012
XII
I
In
te
rnation
al
Symposium on
P
roblems of
R
edu
ndancy
in
In
form
ati
on
and
Con
t
rol Sy
stems (
RED
)
,
IEE
E
,
5:
5
-
6
,
Sep
2012
[22]
Meng
W
,
W
ong
DS
,
Furnell
S,
Zhou
J.
“
Surve
y
ing
the
develop
m
ent
of
biome
tr
ic
user
aut
hen
tic
at
ion
on
m
obil
e
phones
”,
IEEE C
omm
unic
ati
ons Surve
ys
&
Tuto
rials
,
17(3):
126
8
-
1293,
1
Jul 20
15.
[23]
Mehra
j
T
,
R
aso
ol
B
,
Khan
BUI,
B
aba
A,
Lon
e
P.
“
Conte
m
pl
at
ion
of
Eff
ecti
ve
Se
cur
ity
Me
asure
s
in
Ac
ce
s
s
Mana
gement
fro
m
Adoptabi
li
t
y
P
erspe
ctiv
e
”
.
In
ter
nati
onal
Journa
l
of
Ad
vanced
Co
mputer
Sci
en
ce
a
nd
Appl
i
cat
ions
.
2015;
6(8):
188
-
201.
[24]
Olanr
ewa
ju
RF
,
Khan
BUI,
Ma
ttoo
MM
,
Anw
ar
F,
Nordin
AN
,
Mir
RN,
Noor
Z
.
“
Adoption
of
C
loud
Com
puti
ng
in
Higher
L
ea
rn
ing
Instit
ut
ions:
A S
y
stemat
ic Re
vi
e
w
”
.
Indian
Jour
nal
of
Scienc
e
a
nd
Technol
og
y
.
2017;
10(36):
1
-
19.
[25]
Olanr
ewa
ju
RF
,
Khan
BUI,
B
aba
A,
Mir
RN,
Lon
e
SA
.
“
RF
DA:
R
el
i
abl
e
fr
amework
for
da
ta
admini
strat
ion
bas
ed
o
n
split
-
m
erg
e
po
li
c
y
”
.
S
AI
Comput
i
ng
Confe
ren
ce (
SAI)
.
IEEE
.
201
6
Jul 13
:
545
-
55
2.
[26]
Khan
BU,
Bab
a
AM
,
Olanr
ew
aj
u
RF
,
Lone
SA
,
Z
ulkurna
in
NF
.
“
SS
M:
Secur
e
-
Split
-
Merg
e
d
ata
d
i
stribut
ion
in
c
lou
d
infra
struc
ture
”
.
2015
IEEE
Conf
ere
nce on
Open
Syste
ms
(
ICOS
)
.
IEE
E
.
2015
Aug 24:
40
-
45
.
[27]
Mir
MS
,
Suhai
m
i
B,
Adam
M,
Khan
BUI,
Mat
too
MM
UI,
Ola
nre
waj
u
RF
.
“
Crit
ical
sec
uri
t
y
c
hal
l
enge
s
in
cl
o
ud
computing
envi
r
onm
ent
:
an
appr
ai
sal
”
.
Journal
of
Theore
ti
ca
l
&
Appl
ie
d
Infor
mation
Te
chnology
.
2017
Ma
y
31;
95(10):
2234
-
22
48.
[28]
McW
at
ers
R.
“
A Bl
uepr
int
fo
r
Di
git
al Ide
n
ti
t
y
”
.
World
Ec
onomi
c
Forum
.
2016
.
Evaluation Warning : The document was created with Spire.PDF for Python.
Ind
on
esi
a
n
J
E
le
c Eng &
Co
m
p
Sci
IS
S
N:
25
02
-
4752
A Cri
ti
cal Insigh
t i
nto
t
he Ide
ntit
y Au
the
nticati
on S
y
ste
ms on S
m
ar
tp
hone
s
(
Tehs
ee
n
Me
hr
aj
)
989
[29]
Rat
ha
NK
,
Con
nel
l
JH
,
Boll
e
R
M.
“
An
ana
l
y
sis
of
m
inut
i
ae
m
a
tc
hing
strengt
h
”
.
3
rd
Int
ernati
ona
l
Confe
r
enc
e
on
Audi
o
-
and
V
ideo
-
Based
Bi
ome
tric
P
erson
Aut
he
nti
cation
(
AV
BPA)
.
Springer,
Be
rli
n,
H
ei
de
lbe
rg
.
2001
Jun
6:
22
3
-
228.
[30]
Mää
ttä
J,
Had
id
A,
Pietikäi
n
en
M.
“
Face
s
poofi
ng
detec
t
ion
fro
m
single
images
using
m
ic
ro
-
t
ex
ture
ana
l
y
sis
”
.
2
011
Inte
rnational
Jo
i
nt
Conf
ere
nce o
n
Bi
ome
tric
s (
IJ
CB)
.
IEEE.
2011
;
Oct
11:
1
-
7.
[31]
Conti
V,
Col
lot
t
a
M,
Pau
G,
Vi
ta
bile
S.
“
Us
ability
Ana
l
y
s
is
of
a
Novel
B
iometri
c
Auth
ent
i
cati
on
Approac
h
fo
r
Android
-
Based
Mobile
Devi
ce
s
”
.
Journal
o
f
Tel
ec
omm
unic
at
ion
s
and
Information
Technol
ogy
.
2
014
Oct
1;
(4):
3
4
-
43.
[32]
Rat
hi
K,
Sawark
ar
S.
“
Finger
Print
Matc
hing
Alg
orit
hm
for
Andr
oid
”
.
In
te
rnation
al
Journal
of
En
gine
ering
Re
sea
rc
h
&
Technol
ogy
(
IJE
RT)
.
2013;
2(
10):
3819
-
3823.
[33]
Hu
J,
Peng
L,
Zhe
ng
L
.
“
XF
ac
e:
A
Fac
e
Re
c
ognit
ion
S
y
s
te
m
for
Android
Mobile
Phones
”
.
2015
IEEE
3rd
Inte
rnational
Co
nfe
renc
e
on
Cyb
er
-
Phy
sica
l
Syst
ems,
Net
works
,
a
nd
Appl
i
cations
(
CPSNA
)
,
IEE
E
,
2015
Aug
19:
1
3
-
18.
[34]
Lovi
sotto
G
,
Ma
li
k
R
,
Sluganov
i
c
I,
Roesch
li
n
M,
Tru
eman
P,
Ma
rti
novic
I
.
Mobi
l
e
biome
tric
s in
f
i
nanci
al
services:
A
f
iv
e
fa
ct
or f
ra
mework
.
T
ec
hn
i
ca
l
Report CS
-
RR
-
17
-
03,
Oxford
Univer
sit
y
.
201
7.
[35]
Fridm
an
L,
W
eb
er
S,
Gre
ensta
dt
R,
Kam
M.
“
Acti
v
e
aut
hen
ti
c
ation
on
m
obil
e
d
evi
c
es
vi
a
st
y
l
o
m
et
r
y
,
appl
i
cati
on
usage
,
w
eb
brow
sing,
and
GP
S lo
ca
t
ion
”
.
IE
EE Sys
te
ms
Journal.
2
017
Jun;
11(2);
513
-
521.
[36]
Shebar
o
B,
Olu
wati
m
i
O,
Ber
ti
n
o
E.
“
Conte
x
t
-
ba
sed
ac
c
ess
cont
r
ol
s
y
stems
for
m
obil
e
d
evi
c
es
”
.
I
EE
E
Tr
ansacti
o
ns
on
Depe
ndabl
e and Se
cure
Com
puti
ng
.
2015
Ma
r
1;
12(2)
:150
-
6
3.
[37]
Tsai
CJ,
Peng
C
C,
Chia
ng
ML
,
Chang
TY,
Ts
ai
W
J,
W
u
H
S.
“
W
ork
in
progre
ss
:
a
new
appr
o
a
ch
of
cha
ng
ea
b
l
e
passw
ord
for
ke
y
stroke
d
y
nami
c
s
aut
hen
ti
c
ation
s
y
stem
on
sm
art
phones
”
.
2014
9th
Int
ernati
ona
l
Conf
ere
nc
e
on
Comm
un
ic
ati
ons and
Ne
tworki
ng
in
Ch
ina
(
CHINACOM)
.
IEE
E
.
2014
Aug 14;
35
3
-
356.
[38]
Te
o
CC,
Neo
H
F.
“
Proce
ed
ings
of
th
e
9
th
Intern
at
ion
al
Confer
en
ce
on
Bioi
nform
at
i
cs
and
B
iomedic
a
l
Technol
og
y
.
Be
hav
ioral
F
ing
erprint
Au
the
nt
i
cat
ion:
The
N
ex
t
Fut
ure
.
ACM
.
2
017
Ma
y
14:
1
-
5.
[39]
Raj
a
KB,
R
aghavendra
R
,
Stokk
ene
s
M,
Busch
C.
“
Multi
-
m
odal
aut
h
ent
i
cation
s
y
stem
for
sm
artphones
using
fa
ce,
iri
s a
nd
per
ioc
ul
ar
”
.
2015
In
te
rn
ati
onal
Con
fe
ren
ce
on
B
iomet
rics
(
ICB)
.
IEE
E
.
20
15
Ma
y
19;
143
-
150.
[40]
Galba
l
l
y
J,
Marc
el
S,
Fierr
ez
J.
“
I
m
age
qualit
y
assess
m
ent
for
fak
e
biometri
c
detec
tion:
Appli
ca
t
ion
t
o
iri
s,
fing
erp
rint,
and
fa
ce recogni
ti
on
”
.
I
EE
E
tran
sacti
ons on image
proce
ss
ing
.
20
14
Feb;
23(2)
:
7
10
-
724.
[41]
Chowdhur
y
EW,
Rahman
MS
,
Al
Islam
AA
,
Rahman
MS
.
“
Salty
Se
cre
t
:
Let
us
sec
retl
y
sa
l
t
th
e
se
cre
t
”
.
20
17
Inte
rnational
Co
nfe
renc
e
on
Networ
ki
ng,
S
yste
m
s and
Sec
uri
ty (
NSysS)
.
IEE
E
.
2
017
Jan
5;
115
-
1
23.
[42]
Zha
ng
P,
Pei
Y
.
“
A
Te
chnol
og
y
of
Us
er
Acc
ess
-
Control
T
abl
e
an
d
Ide
ntit
y
Authe
nti
c
at
ion
B
ase
d
on
US
B
in
LAN
”
.
2010
Inte
rnat
ion
al
Conf
ere
nce o
n
Bi
omed
ic
al
En
gine
ering
and
C
omputer
Scienc
e
(
ICBE
CS)
.
IEEE
.
2010
;
1
-
3
.
[43]
Durm
us
Y,
L
an
gendoe
n
K,
“
W
ifi
aut
h
ent
i
catio
n
through
soc
ial
n
et
works
—
A
dec
en
tra
l
ized
an
d
con
te
xt
-
awa
r
e
appr
oac
h
”,
201
4
IEEE
In
te
rn
ati
onal
Con
fe
re
nce
on
P
erv
asi
ve
Comput
ing
and
Comm
uni
c
ati
o
ns
Worksho
p
s
(
PE
RCOM
Workshops)
,
IEEE
,
20
14
Mar
24:
532
-
538.
[44]
Mare
S,
Markh
a
m
AM
,
Cornel
iu
s
C,
Pete
rson
R
,
Kotz
D.
“
Ze
br
a:
Ze
ro
-
eff
or
t
bi
la
t
era
l
r
ec
urr
ing
au
t
hent
i
ca
t
ion
”,
20
14
IEE
E
Symposi
u
m on
Se
curit
y
an
d
Priv
a
cy (
SP)
,
IEE
E
,
2014
Ma
y
18;
705
-
720.
[45]
Ma
hbub
U,
Che
l
la
ppa
R.
PA
TH,
“
per
son
aut
henti
ca
t
ion
usin
g
t
race
histories”,
IE
E
E
Annual
Ubiqui
tous
Computing,
El
e
ct
ronics
&
M
obil
e
Comm
unic
ati
on
Conf
ere
nc
e
(
UEMCON)
,
IEE
E
,
2016
Oct
2
0;
1
-
8.
[46]
Canbay
Y,
Ulke
r
M,
Sagi
roglu
S.
“
Dete
c
ti
on
of
m
obil
e
appl
i
cat
ions
le
aki
ng
sen
siti
ve
data
”,
201
7
5th
In
te
rnatio
na
l
Symposium on
Digit
al
Forensi
c
a
nd
Sec
uri
t
y
(
ISD
FS)
.
IEEE.
2017
Apr 26;
1
-
5.
Evaluation Warning : The document was created with Spire.PDF for Python.