Log in

Deep learning based authentication schemes for smart devices in different modalities: progress, challenges, performance, datasets and future directions

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Deep learning algorithms have shown exceptional effectiveness in a wide range of supervised and unsupervised learning tasks in a variety of fields, including image processing, computer vision, natural language processing, and speech or voice processing. In this paper, a comprehensive analysis is conducted to assess the impact of deep learning on user authentication using both physiological and behavioural biometrics. This work encompasses the diverse deep learning approaches employed in authentication schemes tailored for smart devices. Meticulous scrutiny of commonly used datasets in these authentication studies is undertaken, accompanied by a comparative assessment of performance. The deep learning models under consideration span a spectrum of architectures, including deep neural networks, convolutional neural networks, deep auto-encoders, recurrent neural networks, and their variants. To enhance the clarity and categorization of authentication techniques for smart devices, a taxonomy is proposed based on the specific authentication metrics employed: (1) Knowledge-based Authentication (KBA), (2) Physiological Biometric-based Authentication (PBBA), (3) Behavioural Biometric-based Authentication (BBBA), (4) Physiological and Behavioural Continuous Authentication (PBBCA), and (5) Multi Modal Authentication (MMA). Furthermore, potential contributions of deep learning techniques to the realms of physiological and behavioural biometrics are discussed. Significance is placed on performance metrics, including accuracy, stability, and robustness, in evaluating these deep learning-based authentication systems. The challenges and limitations that deep learning approaches must surmount when dealing with real-world biometric data in the context of biometric identification systems are examined. This work not only underscores the transformative role of deep learning in user authentication but also offers valuable insights into the evolving landscape of biometric identification on smart devices. An examination of performance metrics provides a holistic view of the strengths and areas for improvement in deep learning based authentication solutions.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (France)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Data availability

Data sharing not applicable to this article as no datasets were generated or analysed during the current study.

References

  1. O’Gorman L (2003) Comparing passwords, tokens, and biometrics for user authentication. Proc IEEE 91(12):2021–2040

    Article  Google Scholar 

  2. Adams A, Sasse MA (1999) Users are not the enemy. Commun ACM 42(12):40–46

    Article  Google Scholar 

  3. Patel VM, Chellappa R, Chandra D, Barbello B (2016) Continuous user authentication on mobile devices: recent progress and remaining challenges. IEEE Signal Process Mag 33(4):49–61

    Article  ADS  Google Scholar 

  4. Al Abdulwahid A, Clarke N, Furnell S, Stengel I, Reich C (2015) The current use of authentication technologies: an investigative review. In 2015 International Conference on Cloud Computing (ICCC). IEEE, pp 1–8

  5. Alotaibi S, Furnell S, Clarke N (2015) Transparent authentication systems for mobile device security: a review. In 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE, pp 406–413

  6. Meng W, Wong DS, Furnell S, Zhou J (2014) Surveying the development of biometric user authentication on mobile phones. IEEE Commun Surv Tutorials 17(3):1268–1293

    Article  Google Scholar 

  7. Wang C, Wang Y, Chen Y, Liu H, Liu J (2020) User authentication on mobile devices: Approaches, threats, and trends. Comput Netw 170:107118

    Article  Google Scholar 

  8. Shah SW, Kanhere SS (2019) Recent trends in user authentication–a survey. IEEE Access 7:112505–112519

    Article  Google Scholar 

  9. Rui Z, Yan Z (2018) A survey on biometric authentication: Toward secure and privacy-preserving identification. IEEE Access 7:5994–6009

    Article  Google Scholar 

  10. Ryu R, Yeom S, Kim SH, Herbert D (2021) Continuous multimodal biometric authentication schemes: a systematic review. IEEE Access 9:34541–34557

    Article  Google Scholar 

  11. Sundararajan K, Woodard DL (2018) Deep learning for biometrics: A survey. ACM Comput Surv (CSUR) 51(3):1–34

    Article  Google Scholar 

  12. Mehraj H, Mir AH (2021) A survey of biometric recognition using deep learning. EAI Endorsed Trans Energy Web 8(33):e6–e6

    Google Scholar 

  13. Ometov A, Shubina V, Klus L, Skibińska J, Saafi S, Pascacio P, ... Lohan ES (2021) A survey on wearable technology: History, state-of-the-art and current challenges. Comput Netw 193:108074

  14. Souppaya M, Scarfone K (2013) Guidelines for managing the security of mobile devices in the enterprise. NIST Special Publ 800(124):800-124

  15. Uellenbeck S, Dürmuth M, Wolf C, Holz T (2013) Quantifying the security of graphical passwords: The case of android unlock patterns. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. pp 161–172

  16. Chiasson S, Van Oorschot PC, Biddle R (2007) Graphical password authentication using cued click points. In Computer Security–ESORICS 2007: 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24—26, 2007. Proceedings 12. Springer Berlin Heidelberg, pp 359-374

  17. Gayathri S, Raja MAM, Sumitha T (2021) Secure authentication mechanism for users using virtual reality. Ann Romanian Soc Cell Biol:8622–8628

  18. Alhakami H (2020) Knowledge based authentication techniques and challenges. Int J Adv Comput Sci Appl 11(2):1–6

    Google Scholar 

  19. Chen Y, Liginlal D (2007) An empirical investigation of knowledge-based authentication, 265. https://aisel.aisnet.org/amcis2007/265

  20. Chen Y, Atnafu AD, Schlattner I, Weldtsadik WT, Roh MC, Kim HJ, ... Fazli S (2016) A high-security EEG-based login system with RSVP stimuli and dry electrodes. IEEE Trans Inform Forensics Security 11(12):2635–2647

  21. von Zezschwitz E. Using graphics and gestures to improve knowledge-based authentication for mobile devices. https://www.medien.ifi.lmu.de/forschung/konferenzen/dc2014/beitraege/DC2014-LMU-Zezschwitz-slides.pdf. Accessed 17 Oct 2022

  22. Aviv AJ, Gibson K, Mossop E, Blaze M, Smith JM (2010) Smudge attacks on smartphone touch screens. In: 4th USENIX workshop on offensive technologies (WOOT 10), pp 1–7

  23. Zakaria NH, Griffiths D, Brostoff S, Yan J (2011) Shoulder surfing defence for recall-based graphical passwords. In: Proceedings of the seventh symposium on usable privacy and security, pp 1–12

  24. Owusu E, Han J, Das S, Perrig A, Zhang J (2012) Accessory: password inference using accelerometers on smartphones. In: Proceedings of the twelfth workshop on mobile computing systems & applications, pp 1–6

  25. Wang P, Lin WH, Chao KM, Lo CC (2017) A face-recognition approach using deep reinforcement learning approach for user authentication. In 2017 IEEE 14th International Conference on e-Business Engineering (ICEBE). IEEE, pp 183–188

  26. Raghavendra M, Omprakash P, Mukesh BR, Kamath S (2020) AuthNet: A deep learning based authentication mechanism using temporal facial feature movements. ar**v preprint ar**v:2012.02515

  27. Ali A, Testa M, Bianchi T, Magli E (2019). Authnet: Biometric authentication through adversarial learning. In 2019 IEEE 29th International Workshop on Machine Learning for Signal Processing (MLSP). IEEE, pp 1–6

  28. Bazrafkan S, Corcoran P (2018) Enhancing iris authentication on handheld devices using deep learning derived segmentation techniques. In 2018 IEEE international Conference on Consumer Electronics (ICCE). IEEE, pp 1–2

  29. Phillips T, Zou X, Li F, Li N (2019) Enhancing biometric-capsule-based authentication and facial recognition via deep learning. In: Proceedings of the 24th ACM symposium on access control models and technologies, pp 141–146

  30. Sun Y, Wang X, Tang X (2016) Sparsifying neural network connections for face recognition. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 4856–4864

  31. Parkhi O, Vedaldi A, Zisserman A (2015) Deep face recognition. In BMVC 2015-Proceedings of the British Machine Vision Conference 2015. British Machine Vision Association

  32. Wu X, Xu J, Wang J, Li Y, Li W, Guo Y (2019) Identity authentication on mobile devices using face verification and ID image recognition. Procedia Comput Sci 162:932–939

    Article  Google Scholar 

  33. Taigman Y, Yang M, Ranzato MA, Wolf L (2014) Deepface: Closing the gap to human-level performance in face verification. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 1701–1708

  34. Sun Y, Chen Y, Wang X, Tang X (2014a) Deep learning face representation by joint identification-verification. Adv Neural Inf Process Syst 27:1988–1996

    Google Scholar 

  35. Sun Y, Wang X, Tang X (2014b) Deep learning face representation from predicting 10,000 classes. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 1891–1898

  36. Sun Y, Wang X, Tang X (2015) Deeply learned face representations are sparse, selective, and robust. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 2892–2900

  37. Taigman Y, Yang M, Ranzato MA, Wolf L (2015) Web-scale training for face identification. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 2746–2754

  38. Daugman J (2009) How iris recognition works. In The essential guide to image processing. Academic Press, pp 715–739

  39. Raja KB, Raghavendra R, Vemuri VK, Busch C (2015) Smartphone based visible iris recognition using deep sparse filtering. Pattern Recogn Lett 57:33–42

    Article  ADS  Google Scholar 

  40. Li YH, Huang PJ, Juan Y (2019) An efficient and robust iris segmentation algorithm using deep learning. Mob Inform Syst 2019:1

    Google Scholar 

  41. Jayanthi J, Lydia EL, Krishnaraj N, Jayasankar T, Babu RL, Suji RA (2021) An effective deep learning features based integrated framework for iris detection and recognition. J Ambient Intell Humaniz Comput 12:3271–3281

    Article  Google Scholar 

  42. Severo E, Laroca R, Bezerra CS, Zanlorensi LA, Weingaertner D, Moreira G, Menotti D (2018) A benchmark for iris location and a deep learning detector evaluation. In 2018 International Joint Conference on Neural Networks (IJCNN). IEEE, pp 1–7

  43. Nguyen K, Fookes C, Ross A, Sridharan S (2017) Iris recognition with off-the-shelf CNN features: A deep learning perspective. IEEE Access 6:18848–18855

    Article  Google Scholar 

  44. Zhao Z, Kumar A (2017) Towards more accurate iris recognition using deeply learned spatially corresponding features. In: Proceedings of the IEEE international conference on computer vision, pp 3809–3818

  45. Al-Waisy AS, Qahwaji R, Ipson S, Al-Fahdawi S, Nagem TA (2018) A multi-biometric iris recognition system based on a deep learning approach. Pattern Anal Appl 21:783–802

    Article  MathSciNet  Google Scholar 

  46. Le-Tien T, Phan-Xuan H, Nguyen-Duy P, Le-Ba L (2018). Iris-based biometric recognition using modified convolutional neural network. In 2018 International Conference on Advanced Technologies for Communications (ATC). IEEE, pp 184–188

  47. Zheng S, Rahmat RWO, Khalid F, Nasharuddin NA (2019) Learning scale-variant features for robust iris authentication with deep learning based ensemble framework. ar**v preprint ar**v:1912.00756

  48. Proença H, Neves JC (2019) Segmentation-less and non-holistic deep-learning frameworks for iris recognition. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops, pp 2296–2305. https://doi.org/10.1109/CVPRW.2019.00283

  49. Redmon J, Divvala S, Girshick R, Farhadi A (2016) You only look once: Unified, real-time object detection. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 779–788

  50. Wang R, Han C, Guo T (2016) A novel fingerprint classification method based on deep learning. In 2016 23rd International Conference on Pattern Recognition (ICPR). IEEE, pp 931–936

  51. Jiang L, Zhao T, Bai C, Yong A, Wu M (2016) A direct fingerprint minutiae extraction approach based on convolutional neural networks. In 2016 International Joint Conference on Neural Networks (IJCNN). IEEE, pp 571–578

  52. Ezeobiejesi J, Bhanu B (2017) Latent fingerprint image segmentation using deep neural network. In: Deep Learning for Biometrics, pp 83–107

  53. Su HR, Chen KY, Wong WJ, Lai SH (2017) A deep learning approach towards pore extraction for high-resolution fingerprint recognition. In 2017 IEEE international conference on acoustics, speech and signal processing (ICASSP). IEEE, pp 2057–2061

  54. Zeng F, Hu S, **ao K (2019) Research on partial fingerprint recognition algorithm based on deep learning. Neural Comput Appl 31(9):4789–4798

    Article  Google Scholar 

  55. Hammad M, Wang K (2019) Parallel score fusion of ECG and fingerprint for human authentication based on convolution neural network. Comput Secur 81:107–122

    Article  Google Scholar 

  56. Al-Nima RRO, Hasan SQ, Esmail S (2020) Exploiting the deep learning with fingerphotos to recognize people. Int J Adv Sci Technol 29(7):13035–13046

    Google Scholar 

  57. Ahsan M, Based MA, Haider J, Kowalski M (2021) An intelligent system for automatic fingerprint identification using feature fusion by Gabor filter and deep learning. Comput Electr Eng 95:107387

    Article  Google Scholar 

  58. Shao H, Zhong D, Du X (2019) Efficient deep palmprint recognition via distilled hashing coding. In: Proceedings of the IEEE/CVF conference on computer vision and pattern recognition workshops, pp 714–723

  59. Shao H, Zhong D, Li Y (2019) PalmGAN for cross-domain palmprint recognition. In 2019 IEEE International Conference on Multimedia and Expo (ICME). IEEE, pp 1390–1395

  60. Roşca V, Ignat A (2020) Quality of pre-trained deep-learning models for palmprint recognition. In 2020 22nd International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC). IEEE, pp 202–209

  61. Zhang Y, Zhang L, Zhang R, Li S, Li J, Huang F (2020) Towards palmprint verification on smartphones. ar**v preprint ar**v:2003.13266

  62. Dayal A, Paluru N, Cenkeramaddi LR, Yalavarthy PK (2021) Design and implementation of deep learning based contactless authentication system using hand gestures. Electronics 10(2):182

    Article  Google Scholar 

  63. Hong F, Wei M, You S, Feng Y, Guo Z (2015) Waving authentication: your smartphone authenticate you on motion gesture. In: Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems, pp 263–266

  64. Chauhan J, Rajasegaran J, Seneviratne S, Misra A, Seneviratne A, Lee Y (2018) Performance characterization of deep learning models for breathing-based authentication on resource-constrained devices. Proc ACM on Interact, Mob, Wearable Ubiquit Technol 2(4):1-24

  65. Bella Hendryli J, Herwindiati DE (2020) Voice authentication model for one-time password using deep learning models. In: Proceedings of the 2020 2nd international conference on big data engineering and technology, pp 35–39

  66. Wright C, Stewart DW (2020) Understanding visual lip-based biometric authentication for mobile devices. EURASIP J Inf Secur 2020(1):1–16

    MathSciNet  Google Scholar 

  67. Benedikt L, Cosker D, Rosin PL, Marshall D (2010) Assessing the uniqueness and permanence of facial actions for use in biometric applications. IEEE Trans Syst, Man, Cybernetics-Part A: Syst Humans 40(3):449–460

    Article  Google Scholar 

  68. Lu L, Yu J, Chen Y, Liu H, Zhu Y, Liu Y, Li M (2018) Lippass: Lip reading-based user authentication on smartphones leveraging acoustic signals. In IEEE INFOCOM 2018-IEEE Conference on Computer Communications. IEEE, pp 1466–1474

  69. Yang CZ, Ma J, Wang S, Liew AWC (2020) Preventing deepfake attacks on speaker authentication by dynamic lip movement analysis. IEEE Trans Inf Forensics Secur 16:1841–1854

    Article  Google Scholar 

  70. Agarwal S, Farid H, Gu Y, He M, Nagano K, Li H (2019) Protecting world leaders against deep fakes. In: CVPR workshops, vol 1, p 38

  71. Morikawa S, Ito SI, Ito M, Fukumi M (2018) Personal authentication by lips EMG using dry electrode and CNN. In 2018 IEEE International Conference on Internet of Things and Intelligence System (IOTAIS). IEEE, pp 180–183

  72. Lu L, Yu J, Chen Y, Liu H, Zhu Y, Kong L, Li M (2019) Lip reading-based user authentication through acoustic sensing on smartphones. IEEE/ACM Trans Netw 27(1):447–460

    Article  Google Scholar 

  73. Karouni A, Daya B, Bahlak S (2011) Offline signature recognition using neural networks approach. Procedia Comput Sci 3:155–161

    Article  Google Scholar 

  74. Alajrami E, Ashqar BA, Abu-Nasser BS, Khalil AJ, Musleh MM, Barhoom AM, Abu-Naser SS (2020) Handwritten signature verification using deep learning. International Journal of Academic Multidisciplinary Research (IJAMR) 3(12):39–44

    Google Scholar 

  75. Fayyaz M, Hajizadeh Saffar M, Sabokrou M, Fathy M (2015) Feature representation for online signature verification. ar**v preprint ar**v:1505.08153

  76. Tolosana R, Vera-Rodriguez R, Fierrez J, Ortega-Garcia J (2017) Biometric signature verification using recurrent neural networks. In 2017 14th IAPR International Conference on Document Analysis and Recognition (ICDAR), Vol. 1. IEEE, pp 652–657

  77. Boles A, Rad P (2017) Voice biometrics: Deep learning-based voiceprint authentication system. In 2017 12th System of Systems Engineering Conference (SoSE). IEEE, pp 1–6

  78. Liu R, Cornelius C, Rawassizadeh R, Peterson R, Kotz D (2018) Vocal resonance: Using internal body voice for wearable authentication. Proc ACM Interact, Mob, Wearable Ubiquit Technol 2(1):1-23

  79. McLaren M, Lei Y, Scheffer N, Ferrer L (2014) Application of convolutional neural networks to speaker recognition in noisy conditions. In: 15th annual conference of the international speech communication association, pp 57–62. https://doi.org/10.1109/CAS47993.2019.9075461

  80. Lei Y, Scheffer N, Ferrer L, McLaren M (2014) A novel scheme for speaker recognition using a phonetically-aware deep neural network. In 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, pp 1695–1699

  81. Shila DM, Eyisi E (2018) Adversarial gait detection on mobile devices using recurrent neural networks. In 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). IEEE, pp 316–321

  82. Li C, Min X, Sun S, Lin W, Tang Z (2017) DeepGait: A learning deep convolutional representation for view-invariant gait recognition using joint Bayesian. Appl Sci 7(3):210

    Article  Google Scholar 

  83. Hu H, Li Y, Zhu Z, Zhou G (2018) CNNAuth: continuous authentication via two-stream convolutional neural networks. In 2018 IEEE international conference on networking, architecture and storage (NAS). IEEE, pp 1–9

  84. Wolf T, Babaee M, Rigoll G (2016) Multi-view gait recognition using 3D convolutional neural networks. In 2016 IEEE International Conference on Image Processing (ICIP). IEEE, pp 4165–4169

  85. Shankar V, Singh K (2019) An intelligent scheme for continuous authentication of smartphone using deep auto encoder and softmax regression model easy for user brain. IEEE Access 7:48645–48654

    Article  Google Scholar 

  86. Zhang H, Liu J, Li K, Tan H, Wang G (2020) Gait learning based authentication for intelligent things. IEEE Trans Veh Technol 69(4):4450–4459

    Article  Google Scholar 

  87. Wang C, **ao Y, Gao X, Li L, Wang J (2021) A framework for behavioral biometric authentication using deep metric learning on mobile devices. IEEE Trans Mob Comput 22(1):19–36

    Article  Google Scholar 

  88. Wu Z, Huang Y, Wang L, Wang X, Tan T (2016) A comprehensive study on cross-view gait based human identification with deep cnns. IEEE Trans Pattern Anal Mach Intell 39(2):209–226

    Article  PubMed  Google Scholar 

  89. Forsen GE, Nelson MR, Staron RJ (1977) Personal attributes authentication techniques. Patt Anal Recognit Corp 0331

  90. Killourhy KS, Maxion RA (2009) Comparing anomaly-detection algorithms for keystroke dynamics. In 2009 IEEE/IFIP International Conference on Dependable Systems & Networks. IEEE, pp 125–134

  91. Darabseh A, Namin AS (2015) On accuracy of classification-based keystroke dynamics for continuous user authentication. In 2015 International Conference on Cyberworlds (CW). IEEE, pp 321–324

  92. Buza K, Neubrandt D (2016) How you type is who you are. In 2016 IEEE 11th International Symposium on Applied Computational Intelligence and Informatics (SACI). IEEE, pp 453–456

  93. Ceker H, Upadhyaya S (2015) Enhanced recognition of keystroke dynamics using Gaussian mixture models. In MILCOM 2015–2015 IEEE Military Communications Conference. IEEE, pp 1305–1310

  94. Gascon H, Uellenbeck S, Wolf C, Rieck K (2014) Continuous authentication on mobile devices by analysis of ty** motion behavior. In: Sicherheit 2014–Sicherheit, Schutz und Zuverlässigkeit, pp 1–12

  95. Wu JS, Lin WC, Lin CT, Wei TE (2015) Smartphone continuous authentication based on keystroke and gesture profiling. In 2015 International Carnahan Conference on Security Technology (ICCST). IEEE, pp 191–197

  96. Ayotte B, Banavar M, Hou D, Schuckers S (2020) Fast free-text authentication via instance-based keystroke dynamics. IEEE Trans Biom, Behav, Identity Sci 2(4):377–387

    Article  Google Scholar 

  97. Lu X, Zhang S, Hui P, Lio P (2020) Continuous authentication by free-text keystroke based on CNN and RNN. Comput Secur 96:101861

    Article  Google Scholar 

  98. **aofeng L, Shengfei Z, Shengwei Y (2019) Continuous authentication by free-text keystroke based on CNN plus RNN. Procedia Comput Sci 147:314–318

    Article  Google Scholar 

  99. Giot R, Rocha A (2019) Siamese networks for static keystroke dynamics authentication. In 2019 IEEE international workshop on information forensics and security (WIFS). IEEE, pp. 1–6

  100. Yang L, Li C, You R, Tu B (2021) A keystroke-based continuous user authentication in virtual desktop infrastructure. In 2021 IEEE 6th International Conference on Computer and Communication Systems (ICCCS). IEEE, pp 753–758

  101. Aversano L, Bernardi ML, Cimitile M, Pecori R (2021) Continuous authentication using deep neural networks ensemble on keystroke dynamics. PeerJ Comput Sci 7:e525

    Article  Google Scholar 

  102. Çeker H, Upadhyaya S (2017) Transfer learning in long-text keystroke dynamics. In 2017 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA). IEEE, pp 1–6

  103. Deb D, Guirguis MM (2020) Use of auxiliary classifier generative adversarial network in touchstroke authentication. In 2020 19th IEEE International Conference on Machine Learning and Applications (ICMLA). IEEE, pp 252–257

  104. Lee YS, Hetchily W, Shelton J, Gunn D, Roy K, Esterline A, Yuan X (2016) Touch based active user authentication using deep belief networks and random forests. In 2016 6th International Conference on Information Communication and Management (ICICM). IEEE, pp 304–308

  105. Schweigert R, Leusmann J, Hagenmayer S, Weiß M, Le HV, Mayer S, Bulling A (2019) Knuckletouch: Enabling knuckle gestures on capacitive touchscreens using deep learning. In: Proceedings of Mensch Und Computer 2019, pp 387–397

  106. Gunn DJ, Liu Z, Dave R, Yuan X, Roy K (2019) Touch-based active cloud authentication using traditional machine learning and LSTM on a distributed tensorflow framework. Int J Comput Intell Appl 18(04):1950022

    Article  Google Scholar 

  107. Huang E, Troia FD, Stamp M (2022) Evaluating deep learning models and adversarial attacks on accelerometer-based gesture authentication. Artificial Intelligence for Cybersecurity. Springer International Publishing, Cham, pp 243–259

    Chapter  Google Scholar 

  108. Zhu T, Weng Z, Chen G, Fu L (2020) A hybrid deep learning system for real-world mobile user authentication using motion sensors. Sensors 20(14):3876

    Article  PubMed  PubMed Central  ADS  Google Scholar 

  109. Centeno MP, Guan Y, van Moorsel A (2018) Mobile based continuous authentication using deep features. In: Proceedings of the 2nd international workshop on embedded and mobile deep learning, pp 19–24

  110. Mondal S, Bours P (2015) Continuous authentication in a real world settings. In 2015 eighth international conference on advances in pattern recognition (ICAPR). IEEE, pp 1–6

  111. Abuhamad M, Abuhmed T, Mohaisen D, Nyang D (2020) AUToSen: Deep-learning-based implicit continuous authentication using smartphone sensors. IEEE Internet Things J 7(6):5008–5020

    Article  Google Scholar 

  112. Li Y, Tao P, Deng S, Zhou G (2021) DeFFusion: CNN-based continuous authentication using deep feature fusion. ACM Trans Sensor Netw (TOSN) 18(2):1–20

    CAS  Google Scholar 

  113. Mekruksavanich S, Jitpattanakul A (2021) Deep learning approaches for continuous authentication based on activity patterns using mobile sensing. Sensors 21(22):7519

    Article  PubMed  PubMed Central  ADS  Google Scholar 

  114. Rose J, Bourlai T (2019) Deep learning based estimation of facial attributes on challenging mobile phone face datasets. In: Proceedings of the 2019 IEEE/ACM international conference on advances in social networks analysis and mining, pp 1120–1127

  115. Krizhevsky A, Sutskever I, Hinton GE (2012) Imagenet classification with deep convolutional neural networks. In: Advances in neural information processing systems, pp 1097–1105

  116. Szegedy C, Liu W, Jia Y, Sermanet P, Reed S, Anguelov D, Erhan D, Vanhoucke V, Rabinovich A (2015) Going deeper with convolutions. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 1–9

  117. Fei-Fei L, Deng J, Li K (2009) ImageNet: Constructing a large-scale image database. J Vis 9(8):1037–1037

    Article  Google Scholar 

  118. Smith-Creasey M, Rajarajan M (2016) A continuous user authentication scheme for mobile devices. In 2016 14th Annual Conference on Privacy, Security and Trust (PST). IEEE, pp 104–113

  119. Derman E, Salah AA (2018) Continuous real-time vehicle driver authentication using convolutional neural network based face recognition. In 2018 13th IEEE International Conference on Automatic Face & Gesture Recognition (FG 2018). IEEE, pp 577–584

  120. Samangouei P, Chellappa R (2016) Convolutional neural networks for attribute-based active authentication on mobile devices. In 2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS). IEEE, pp 1–8

  121. Smith-Creasey M, Albalooshi FA, Rajarajan M (2018) Continuous face authentication scheme for mobile devices with tracking and liveness detection. Microprocess Microsyst 63:147–157

    Article  Google Scholar 

  122. Sarkar S, Patel VM, Chellappa R (2016) Deep feature-based face detection on mobile devices. In 2016 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA). IEEE, pp 1–8

  123. Ananthakumar A (2018) Efficient face and gesture recognition for time sensitive application. In 2018 IEEE Southwest Symposium on Image Analysis and Interpretation (SSIAI). IEEE, pp 117–120

  124. Zhang X, Yao L, Huang C, Gu T, Yang Z, Liu Y (2020) DeepKey: a multimodal biometric authentication system via deep decoding gaits and brainwaves. ACM Trans Intell Syst Technol (TIST) 11(4):1–24

    Google Scholar 

  125. Sivasankaran D, Ragab M, Sim T, Zick Y (2018) Context-aware fusion for continuous biometric authentication. In 2018 International Conference on Biometrics (ICB). IEEE, pp 233–240

  126. Shams M, Sarhan SH, Tolba AS (2017) Adaptive deep learning vector quantisation for multimodal authentication. J Inf Hiding Multim Signal Process 8(3):702–722

    Google Scholar 

  127. Hammad M, Liu Y, Wang K (2018) Multimodal biometric authentication systems using convolution neural network based on different level fusion of ECG and fingerprint. IEEE Access 7:26527–26542

    Article  Google Scholar 

  128. Choudhury SH, Kumar A, Laskar SH (2021) Adaptive management of multimodal biometrics—A deep learning and metaheuristic approach. Appl Soft Comput 106:107344

    Article  Google Scholar 

  129. Alay N, Al-Baity HH (2020) Deep learning approach for multimodal biometric recognition system based on fusion of iris, face, and finger vein traits. Sensors 20(19):5523

    Article  PubMed  PubMed Central  ADS  Google Scholar 

  130. McCool C, Marcel S, Hadid A, Pietikäinen M, Matejka P, Cernocký J, ... Cootes T (2012) Bi-modal person recognition on a mobile phone: using mobile phone data. In 2012 IEEE International Conference on Multimedia and Expo Workshops. IEEE, pp 635-640

  131. Sarker IH (2021) Deep learning: a comprehensive overview on techniques, taxonomy, applications and research directions. SN Comput Sci 2(6):420

    Article  PubMed  PubMed Central  Google Scholar 

  132. Albelwi S, Mahmood A (2017) A framework for designing the architectures of deep convolutional neural networks. Entropy 19(6):242

    Article  ADS  Google Scholar 

  133. Géron A (2022) Hands-on machine learning with Scikit-Learn, Keras, and TensorFlow. O’Reilly Media, Inc

    Google Scholar 

  134. Yusof NN, Mohamed A, Abdul-Rahman S (2019) Context Enrichment Model Based Framework for Sentiment Analysis. In Soft Computing in Data Science: 5th International Conference, SCDS 2019, Iizuka, Japan, August 28–29, 2019, Proceedings 5, Springer Singapore, pp 325-335

  135. He K, Zhang X, Ren S, Sun J (2015) Spatial pyramid pooling in deep convolutional networks for visual recognition. IEEE Trans Pattern Anal Mach Intell 37(9):1904–1916

    Article  PubMed  Google Scholar 

  136. He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 770–778

  137. Mandic DP, Chambers JA (2001) Recurrent neural networks for prediction authored (Hardback); 0-470-84535-X (Electronic)

  138. Hochreiter S, Schmidhuber J (1997) Long short-term memory. Neural Comput 9(8):1735–1780

    Article  CAS  PubMed  Google Scholar 

  139. Cho K, Van Merriënboer B, Gulcehre C, Bahdanau D, Bougares F, Schwenk H, Bengio Y (2014) Learning phrase representations using RNN encoder-decoder for statistical machine translation. ar**v preprint ar**v:1406.1078

  140. Redmon J (2013–2016) Darknet: open source neural networks in C. http://pjreddie.com/darknet

Download references

Funding

This research received no specific grant from any funding agency in the public, commercial, or not-for-profit sectors.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jitendra V. Tembhurne.

Ethics declarations

Conflict of interest

The authors of this publication declare there is no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shende, S.W., Tembhurne, J.V. & Ansari, N.A. Deep learning based authentication schemes for smart devices in different modalities: progress, challenges, performance, datasets and future directions. Multimed Tools Appl (2024). https://doi.org/10.1007/s11042-024-18350-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11042-024-18350-5

Keywords

Navigation