Abstract
Deep learning algorithms have shown exceptional effectiveness in a wide range of supervised and unsupervised learning tasks in a variety of fields, including image processing, computer vision, natural language processing, and speech or voice processing. In this paper, a comprehensive analysis is conducted to assess the impact of deep learning on user authentication using both physiological and behavioural biometrics. This work encompasses the diverse deep learning approaches employed in authentication schemes tailored for smart devices. Meticulous scrutiny of commonly used datasets in these authentication studies is undertaken, accompanied by a comparative assessment of performance. The deep learning models under consideration span a spectrum of architectures, including deep neural networks, convolutional neural networks, deep auto-encoders, recurrent neural networks, and their variants. To enhance the clarity and categorization of authentication techniques for smart devices, a taxonomy is proposed based on the specific authentication metrics employed: (1) Knowledge-based Authentication (KBA), (2) Physiological Biometric-based Authentication (PBBA), (3) Behavioural Biometric-based Authentication (BBBA), (4) Physiological and Behavioural Continuous Authentication (PBBCA), and (5) Multi Modal Authentication (MMA). Furthermore, potential contributions of deep learning techniques to the realms of physiological and behavioural biometrics are discussed. Significance is placed on performance metrics, including accuracy, stability, and robustness, in evaluating these deep learning-based authentication systems. The challenges and limitations that deep learning approaches must surmount when dealing with real-world biometric data in the context of biometric identification systems are examined. This work not only underscores the transformative role of deep learning in user authentication but also offers valuable insights into the evolving landscape of biometric identification on smart devices. An examination of performance metrics provides a holistic view of the strengths and areas for improvement in deep learning based authentication solutions.
Similar content being viewed by others
Data availability
Data sharing not applicable to this article as no datasets were generated or analysed during the current study.
References
O’Gorman L (2003) Comparing passwords, tokens, and biometrics for user authentication. Proc IEEE 91(12):2021–2040
Adams A, Sasse MA (1999) Users are not the enemy. Commun ACM 42(12):40–46
Patel VM, Chellappa R, Chandra D, Barbello B (2016) Continuous user authentication on mobile devices: recent progress and remaining challenges. IEEE Signal Process Mag 33(4):49–61
Al Abdulwahid A, Clarke N, Furnell S, Stengel I, Reich C (2015) The current use of authentication technologies: an investigative review. In 2015 International Conference on Cloud Computing (ICCC). IEEE, pp 1–8
Alotaibi S, Furnell S, Clarke N (2015) Transparent authentication systems for mobile device security: a review. In 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE, pp 406–413
Meng W, Wong DS, Furnell S, Zhou J (2014) Surveying the development of biometric user authentication on mobile phones. IEEE Commun Surv Tutorials 17(3):1268–1293
Wang C, Wang Y, Chen Y, Liu H, Liu J (2020) User authentication on mobile devices: Approaches, threats, and trends. Comput Netw 170:107118
Shah SW, Kanhere SS (2019) Recent trends in user authentication–a survey. IEEE Access 7:112505–112519
Rui Z, Yan Z (2018) A survey on biometric authentication: Toward secure and privacy-preserving identification. IEEE Access 7:5994–6009
Ryu R, Yeom S, Kim SH, Herbert D (2021) Continuous multimodal biometric authentication schemes: a systematic review. IEEE Access 9:34541–34557
Sundararajan K, Woodard DL (2018) Deep learning for biometrics: A survey. ACM Comput Surv (CSUR) 51(3):1–34
Mehraj H, Mir AH (2021) A survey of biometric recognition using deep learning. EAI Endorsed Trans Energy Web 8(33):e6–e6
Ometov A, Shubina V, Klus L, Skibińska J, Saafi S, Pascacio P, ... Lohan ES (2021) A survey on wearable technology: History, state-of-the-art and current challenges. Comput Netw 193:108074
Souppaya M, Scarfone K (2013) Guidelines for managing the security of mobile devices in the enterprise. NIST Special Publ 800(124):800-124
Uellenbeck S, Dürmuth M, Wolf C, Holz T (2013) Quantifying the security of graphical passwords: The case of android unlock patterns. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. pp 161–172
Chiasson S, Van Oorschot PC, Biddle R (2007) Graphical password authentication using cued click points. In Computer Security–ESORICS 2007: 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24—26, 2007. Proceedings 12. Springer Berlin Heidelberg, pp 359-374
Gayathri S, Raja MAM, Sumitha T (2021) Secure authentication mechanism for users using virtual reality. Ann Romanian Soc Cell Biol:8622–8628
Alhakami H (2020) Knowledge based authentication techniques and challenges. Int J Adv Comput Sci Appl 11(2):1–6
Chen Y, Liginlal D (2007) An empirical investigation of knowledge-based authentication, 265. https://aisel.aisnet.org/amcis2007/265
Chen Y, Atnafu AD, Schlattner I, Weldtsadik WT, Roh MC, Kim HJ, ... Fazli S (2016) A high-security EEG-based login system with RSVP stimuli and dry electrodes. IEEE Trans Inform Forensics Security 11(12):2635–2647
von Zezschwitz E. Using graphics and gestures to improve knowledge-based authentication for mobile devices. https://www.medien.ifi.lmu.de/forschung/konferenzen/dc2014/beitraege/DC2014-LMU-Zezschwitz-slides.pdf. Accessed 17 Oct 2022
Aviv AJ, Gibson K, Mossop E, Blaze M, Smith JM (2010) Smudge attacks on smartphone touch screens. In: 4th USENIX workshop on offensive technologies (WOOT 10), pp 1–7
Zakaria NH, Griffiths D, Brostoff S, Yan J (2011) Shoulder surfing defence for recall-based graphical passwords. In: Proceedings of the seventh symposium on usable privacy and security, pp 1–12
Owusu E, Han J, Das S, Perrig A, Zhang J (2012) Accessory: password inference using accelerometers on smartphones. In: Proceedings of the twelfth workshop on mobile computing systems & applications, pp 1–6
Wang P, Lin WH, Chao KM, Lo CC (2017) A face-recognition approach using deep reinforcement learning approach for user authentication. In 2017 IEEE 14th International Conference on e-Business Engineering (ICEBE). IEEE, pp 183–188
Raghavendra M, Omprakash P, Mukesh BR, Kamath S (2020) AuthNet: A deep learning based authentication mechanism using temporal facial feature movements. ar**v preprint ar**v:2012.02515
Ali A, Testa M, Bianchi T, Magli E (2019). Authnet: Biometric authentication through adversarial learning. In 2019 IEEE 29th International Workshop on Machine Learning for Signal Processing (MLSP). IEEE, pp 1–6
Bazrafkan S, Corcoran P (2018) Enhancing iris authentication on handheld devices using deep learning derived segmentation techniques. In 2018 IEEE international Conference on Consumer Electronics (ICCE). IEEE, pp 1–2
Phillips T, Zou X, Li F, Li N (2019) Enhancing biometric-capsule-based authentication and facial recognition via deep learning. In: Proceedings of the 24th ACM symposium on access control models and technologies, pp 141–146
Sun Y, Wang X, Tang X (2016) Sparsifying neural network connections for face recognition. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 4856–4864
Parkhi O, Vedaldi A, Zisserman A (2015) Deep face recognition. In BMVC 2015-Proceedings of the British Machine Vision Conference 2015. British Machine Vision Association
Wu X, Xu J, Wang J, Li Y, Li W, Guo Y (2019) Identity authentication on mobile devices using face verification and ID image recognition. Procedia Comput Sci 162:932–939
Taigman Y, Yang M, Ranzato MA, Wolf L (2014) Deepface: Closing the gap to human-level performance in face verification. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 1701–1708
Sun Y, Chen Y, Wang X, Tang X (2014a) Deep learning face representation by joint identification-verification. Adv Neural Inf Process Syst 27:1988–1996
Sun Y, Wang X, Tang X (2014b) Deep learning face representation from predicting 10,000 classes. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 1891–1898
Sun Y, Wang X, Tang X (2015) Deeply learned face representations are sparse, selective, and robust. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 2892–2900
Taigman Y, Yang M, Ranzato MA, Wolf L (2015) Web-scale training for face identification. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 2746–2754
Daugman J (2009) How iris recognition works. In The essential guide to image processing. Academic Press, pp 715–739
Raja KB, Raghavendra R, Vemuri VK, Busch C (2015) Smartphone based visible iris recognition using deep sparse filtering. Pattern Recogn Lett 57:33–42
Li YH, Huang PJ, Juan Y (2019) An efficient and robust iris segmentation algorithm using deep learning. Mob Inform Syst 2019:1
Jayanthi J, Lydia EL, Krishnaraj N, Jayasankar T, Babu RL, Suji RA (2021) An effective deep learning features based integrated framework for iris detection and recognition. J Ambient Intell Humaniz Comput 12:3271–3281
Severo E, Laroca R, Bezerra CS, Zanlorensi LA, Weingaertner D, Moreira G, Menotti D (2018) A benchmark for iris location and a deep learning detector evaluation. In 2018 International Joint Conference on Neural Networks (IJCNN). IEEE, pp 1–7
Nguyen K, Fookes C, Ross A, Sridharan S (2017) Iris recognition with off-the-shelf CNN features: A deep learning perspective. IEEE Access 6:18848–18855
Zhao Z, Kumar A (2017) Towards more accurate iris recognition using deeply learned spatially corresponding features. In: Proceedings of the IEEE international conference on computer vision, pp 3809–3818
Al-Waisy AS, Qahwaji R, Ipson S, Al-Fahdawi S, Nagem TA (2018) A multi-biometric iris recognition system based on a deep learning approach. Pattern Anal Appl 21:783–802
Le-Tien T, Phan-Xuan H, Nguyen-Duy P, Le-Ba L (2018). Iris-based biometric recognition using modified convolutional neural network. In 2018 International Conference on Advanced Technologies for Communications (ATC). IEEE, pp 184–188
Zheng S, Rahmat RWO, Khalid F, Nasharuddin NA (2019) Learning scale-variant features for robust iris authentication with deep learning based ensemble framework. ar**v preprint ar**v:1912.00756
Proença H, Neves JC (2019) Segmentation-less and non-holistic deep-learning frameworks for iris recognition. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops, pp 2296–2305. https://doi.org/10.1109/CVPRW.2019.00283
Redmon J, Divvala S, Girshick R, Farhadi A (2016) You only look once: Unified, real-time object detection. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 779–788
Wang R, Han C, Guo T (2016) A novel fingerprint classification method based on deep learning. In 2016 23rd International Conference on Pattern Recognition (ICPR). IEEE, pp 931–936
Jiang L, Zhao T, Bai C, Yong A, Wu M (2016) A direct fingerprint minutiae extraction approach based on convolutional neural networks. In 2016 International Joint Conference on Neural Networks (IJCNN). IEEE, pp 571–578
Ezeobiejesi J, Bhanu B (2017) Latent fingerprint image segmentation using deep neural network. In: Deep Learning for Biometrics, pp 83–107
Su HR, Chen KY, Wong WJ, Lai SH (2017) A deep learning approach towards pore extraction for high-resolution fingerprint recognition. In 2017 IEEE international conference on acoustics, speech and signal processing (ICASSP). IEEE, pp 2057–2061
Zeng F, Hu S, **ao K (2019) Research on partial fingerprint recognition algorithm based on deep learning. Neural Comput Appl 31(9):4789–4798
Hammad M, Wang K (2019) Parallel score fusion of ECG and fingerprint for human authentication based on convolution neural network. Comput Secur 81:107–122
Al-Nima RRO, Hasan SQ, Esmail S (2020) Exploiting the deep learning with fingerphotos to recognize people. Int J Adv Sci Technol 29(7):13035–13046
Ahsan M, Based MA, Haider J, Kowalski M (2021) An intelligent system for automatic fingerprint identification using feature fusion by Gabor filter and deep learning. Comput Electr Eng 95:107387
Shao H, Zhong D, Du X (2019) Efficient deep palmprint recognition via distilled hashing coding. In: Proceedings of the IEEE/CVF conference on computer vision and pattern recognition workshops, pp 714–723
Shao H, Zhong D, Li Y (2019) PalmGAN for cross-domain palmprint recognition. In 2019 IEEE International Conference on Multimedia and Expo (ICME). IEEE, pp 1390–1395
Roşca V, Ignat A (2020) Quality of pre-trained deep-learning models for palmprint recognition. In 2020 22nd International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC). IEEE, pp 202–209
Zhang Y, Zhang L, Zhang R, Li S, Li J, Huang F (2020) Towards palmprint verification on smartphones. ar**v preprint ar**v:2003.13266
Dayal A, Paluru N, Cenkeramaddi LR, Yalavarthy PK (2021) Design and implementation of deep learning based contactless authentication system using hand gestures. Electronics 10(2):182
Hong F, Wei M, You S, Feng Y, Guo Z (2015) Waving authentication: your smartphone authenticate you on motion gesture. In: Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems, pp 263–266
Chauhan J, Rajasegaran J, Seneviratne S, Misra A, Seneviratne A, Lee Y (2018) Performance characterization of deep learning models for breathing-based authentication on resource-constrained devices. Proc ACM on Interact, Mob, Wearable Ubiquit Technol 2(4):1-24
Bella Hendryli J, Herwindiati DE (2020) Voice authentication model for one-time password using deep learning models. In: Proceedings of the 2020 2nd international conference on big data engineering and technology, pp 35–39
Wright C, Stewart DW (2020) Understanding visual lip-based biometric authentication for mobile devices. EURASIP J Inf Secur 2020(1):1–16
Benedikt L, Cosker D, Rosin PL, Marshall D (2010) Assessing the uniqueness and permanence of facial actions for use in biometric applications. IEEE Trans Syst, Man, Cybernetics-Part A: Syst Humans 40(3):449–460
Lu L, Yu J, Chen Y, Liu H, Zhu Y, Liu Y, Li M (2018) Lippass: Lip reading-based user authentication on smartphones leveraging acoustic signals. In IEEE INFOCOM 2018-IEEE Conference on Computer Communications. IEEE, pp 1466–1474
Yang CZ, Ma J, Wang S, Liew AWC (2020) Preventing deepfake attacks on speaker authentication by dynamic lip movement analysis. IEEE Trans Inf Forensics Secur 16:1841–1854
Agarwal S, Farid H, Gu Y, He M, Nagano K, Li H (2019) Protecting world leaders against deep fakes. In: CVPR workshops, vol 1, p 38
Morikawa S, Ito SI, Ito M, Fukumi M (2018) Personal authentication by lips EMG using dry electrode and CNN. In 2018 IEEE International Conference on Internet of Things and Intelligence System (IOTAIS). IEEE, pp 180–183
Lu L, Yu J, Chen Y, Liu H, Zhu Y, Kong L, Li M (2019) Lip reading-based user authentication through acoustic sensing on smartphones. IEEE/ACM Trans Netw 27(1):447–460
Karouni A, Daya B, Bahlak S (2011) Offline signature recognition using neural networks approach. Procedia Comput Sci 3:155–161
Alajrami E, Ashqar BA, Abu-Nasser BS, Khalil AJ, Musleh MM, Barhoom AM, Abu-Naser SS (2020) Handwritten signature verification using deep learning. International Journal of Academic Multidisciplinary Research (IJAMR) 3(12):39–44
Fayyaz M, Hajizadeh Saffar M, Sabokrou M, Fathy M (2015) Feature representation for online signature verification. ar**v preprint ar**v:1505.08153
Tolosana R, Vera-Rodriguez R, Fierrez J, Ortega-Garcia J (2017) Biometric signature verification using recurrent neural networks. In 2017 14th IAPR International Conference on Document Analysis and Recognition (ICDAR), Vol. 1. IEEE, pp 652–657
Boles A, Rad P (2017) Voice biometrics: Deep learning-based voiceprint authentication system. In 2017 12th System of Systems Engineering Conference (SoSE). IEEE, pp 1–6
Liu R, Cornelius C, Rawassizadeh R, Peterson R, Kotz D (2018) Vocal resonance: Using internal body voice for wearable authentication. Proc ACM Interact, Mob, Wearable Ubiquit Technol 2(1):1-23
McLaren M, Lei Y, Scheffer N, Ferrer L (2014) Application of convolutional neural networks to speaker recognition in noisy conditions. In: 15th annual conference of the international speech communication association, pp 57–62. https://doi.org/10.1109/CAS47993.2019.9075461
Lei Y, Scheffer N, Ferrer L, McLaren M (2014) A novel scheme for speaker recognition using a phonetically-aware deep neural network. In 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, pp 1695–1699
Shila DM, Eyisi E (2018) Adversarial gait detection on mobile devices using recurrent neural networks. In 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). IEEE, pp 316–321
Li C, Min X, Sun S, Lin W, Tang Z (2017) DeepGait: A learning deep convolutional representation for view-invariant gait recognition using joint Bayesian. Appl Sci 7(3):210
Hu H, Li Y, Zhu Z, Zhou G (2018) CNNAuth: continuous authentication via two-stream convolutional neural networks. In 2018 IEEE international conference on networking, architecture and storage (NAS). IEEE, pp 1–9
Wolf T, Babaee M, Rigoll G (2016) Multi-view gait recognition using 3D convolutional neural networks. In 2016 IEEE International Conference on Image Processing (ICIP). IEEE, pp 4165–4169
Shankar V, Singh K (2019) An intelligent scheme for continuous authentication of smartphone using deep auto encoder and softmax regression model easy for user brain. IEEE Access 7:48645–48654
Zhang H, Liu J, Li K, Tan H, Wang G (2020) Gait learning based authentication for intelligent things. IEEE Trans Veh Technol 69(4):4450–4459
Wang C, **ao Y, Gao X, Li L, Wang J (2021) A framework for behavioral biometric authentication using deep metric learning on mobile devices. IEEE Trans Mob Comput 22(1):19–36
Wu Z, Huang Y, Wang L, Wang X, Tan T (2016) A comprehensive study on cross-view gait based human identification with deep cnns. IEEE Trans Pattern Anal Mach Intell 39(2):209–226
Forsen GE, Nelson MR, Staron RJ (1977) Personal attributes authentication techniques. Patt Anal Recognit Corp 0331
Killourhy KS, Maxion RA (2009) Comparing anomaly-detection algorithms for keystroke dynamics. In 2009 IEEE/IFIP International Conference on Dependable Systems & Networks. IEEE, pp 125–134
Darabseh A, Namin AS (2015) On accuracy of classification-based keystroke dynamics for continuous user authentication. In 2015 International Conference on Cyberworlds (CW). IEEE, pp 321–324
Buza K, Neubrandt D (2016) How you type is who you are. In 2016 IEEE 11th International Symposium on Applied Computational Intelligence and Informatics (SACI). IEEE, pp 453–456
Ceker H, Upadhyaya S (2015) Enhanced recognition of keystroke dynamics using Gaussian mixture models. In MILCOM 2015–2015 IEEE Military Communications Conference. IEEE, pp 1305–1310
Gascon H, Uellenbeck S, Wolf C, Rieck K (2014) Continuous authentication on mobile devices by analysis of ty** motion behavior. In: Sicherheit 2014–Sicherheit, Schutz und Zuverlässigkeit, pp 1–12
Wu JS, Lin WC, Lin CT, Wei TE (2015) Smartphone continuous authentication based on keystroke and gesture profiling. In 2015 International Carnahan Conference on Security Technology (ICCST). IEEE, pp 191–197
Ayotte B, Banavar M, Hou D, Schuckers S (2020) Fast free-text authentication via instance-based keystroke dynamics. IEEE Trans Biom, Behav, Identity Sci 2(4):377–387
Lu X, Zhang S, Hui P, Lio P (2020) Continuous authentication by free-text keystroke based on CNN and RNN. Comput Secur 96:101861
**aofeng L, Shengfei Z, Shengwei Y (2019) Continuous authentication by free-text keystroke based on CNN plus RNN. Procedia Comput Sci 147:314–318
Giot R, Rocha A (2019) Siamese networks for static keystroke dynamics authentication. In 2019 IEEE international workshop on information forensics and security (WIFS). IEEE, pp. 1–6
Yang L, Li C, You R, Tu B (2021) A keystroke-based continuous user authentication in virtual desktop infrastructure. In 2021 IEEE 6th International Conference on Computer and Communication Systems (ICCCS). IEEE, pp 753–758
Aversano L, Bernardi ML, Cimitile M, Pecori R (2021) Continuous authentication using deep neural networks ensemble on keystroke dynamics. PeerJ Comput Sci 7:e525
Çeker H, Upadhyaya S (2017) Transfer learning in long-text keystroke dynamics. In 2017 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA). IEEE, pp 1–6
Deb D, Guirguis MM (2020) Use of auxiliary classifier generative adversarial network in touchstroke authentication. In 2020 19th IEEE International Conference on Machine Learning and Applications (ICMLA). IEEE, pp 252–257
Lee YS, Hetchily W, Shelton J, Gunn D, Roy K, Esterline A, Yuan X (2016) Touch based active user authentication using deep belief networks and random forests. In 2016 6th International Conference on Information Communication and Management (ICICM). IEEE, pp 304–308
Schweigert R, Leusmann J, Hagenmayer S, Weiß M, Le HV, Mayer S, Bulling A (2019) Knuckletouch: Enabling knuckle gestures on capacitive touchscreens using deep learning. In: Proceedings of Mensch Und Computer 2019, pp 387–397
Gunn DJ, Liu Z, Dave R, Yuan X, Roy K (2019) Touch-based active cloud authentication using traditional machine learning and LSTM on a distributed tensorflow framework. Int J Comput Intell Appl 18(04):1950022
Huang E, Troia FD, Stamp M (2022) Evaluating deep learning models and adversarial attacks on accelerometer-based gesture authentication. Artificial Intelligence for Cybersecurity. Springer International Publishing, Cham, pp 243–259
Zhu T, Weng Z, Chen G, Fu L (2020) A hybrid deep learning system for real-world mobile user authentication using motion sensors. Sensors 20(14):3876
Centeno MP, Guan Y, van Moorsel A (2018) Mobile based continuous authentication using deep features. In: Proceedings of the 2nd international workshop on embedded and mobile deep learning, pp 19–24
Mondal S, Bours P (2015) Continuous authentication in a real world settings. In 2015 eighth international conference on advances in pattern recognition (ICAPR). IEEE, pp 1–6
Abuhamad M, Abuhmed T, Mohaisen D, Nyang D (2020) AUToSen: Deep-learning-based implicit continuous authentication using smartphone sensors. IEEE Internet Things J 7(6):5008–5020
Li Y, Tao P, Deng S, Zhou G (2021) DeFFusion: CNN-based continuous authentication using deep feature fusion. ACM Trans Sensor Netw (TOSN) 18(2):1–20
Mekruksavanich S, Jitpattanakul A (2021) Deep learning approaches for continuous authentication based on activity patterns using mobile sensing. Sensors 21(22):7519
Rose J, Bourlai T (2019) Deep learning based estimation of facial attributes on challenging mobile phone face datasets. In: Proceedings of the 2019 IEEE/ACM international conference on advances in social networks analysis and mining, pp 1120–1127
Krizhevsky A, Sutskever I, Hinton GE (2012) Imagenet classification with deep convolutional neural networks. In: Advances in neural information processing systems, pp 1097–1105
Szegedy C, Liu W, Jia Y, Sermanet P, Reed S, Anguelov D, Erhan D, Vanhoucke V, Rabinovich A (2015) Going deeper with convolutions. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 1–9
Fei-Fei L, Deng J, Li K (2009) ImageNet: Constructing a large-scale image database. J Vis 9(8):1037–1037
Smith-Creasey M, Rajarajan M (2016) A continuous user authentication scheme for mobile devices. In 2016 14th Annual Conference on Privacy, Security and Trust (PST). IEEE, pp 104–113
Derman E, Salah AA (2018) Continuous real-time vehicle driver authentication using convolutional neural network based face recognition. In 2018 13th IEEE International Conference on Automatic Face & Gesture Recognition (FG 2018). IEEE, pp 577–584
Samangouei P, Chellappa R (2016) Convolutional neural networks for attribute-based active authentication on mobile devices. In 2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS). IEEE, pp 1–8
Smith-Creasey M, Albalooshi FA, Rajarajan M (2018) Continuous face authentication scheme for mobile devices with tracking and liveness detection. Microprocess Microsyst 63:147–157
Sarkar S, Patel VM, Chellappa R (2016) Deep feature-based face detection on mobile devices. In 2016 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA). IEEE, pp 1–8
Ananthakumar A (2018) Efficient face and gesture recognition for time sensitive application. In 2018 IEEE Southwest Symposium on Image Analysis and Interpretation (SSIAI). IEEE, pp 117–120
Zhang X, Yao L, Huang C, Gu T, Yang Z, Liu Y (2020) DeepKey: a multimodal biometric authentication system via deep decoding gaits and brainwaves. ACM Trans Intell Syst Technol (TIST) 11(4):1–24
Sivasankaran D, Ragab M, Sim T, Zick Y (2018) Context-aware fusion for continuous biometric authentication. In 2018 International Conference on Biometrics (ICB). IEEE, pp 233–240
Shams M, Sarhan SH, Tolba AS (2017) Adaptive deep learning vector quantisation for multimodal authentication. J Inf Hiding Multim Signal Process 8(3):702–722
Hammad M, Liu Y, Wang K (2018) Multimodal biometric authentication systems using convolution neural network based on different level fusion of ECG and fingerprint. IEEE Access 7:26527–26542
Choudhury SH, Kumar A, Laskar SH (2021) Adaptive management of multimodal biometrics—A deep learning and metaheuristic approach. Appl Soft Comput 106:107344
Alay N, Al-Baity HH (2020) Deep learning approach for multimodal biometric recognition system based on fusion of iris, face, and finger vein traits. Sensors 20(19):5523
McCool C, Marcel S, Hadid A, Pietikäinen M, Matejka P, Cernocký J, ... Cootes T (2012) Bi-modal person recognition on a mobile phone: using mobile phone data. In 2012 IEEE International Conference on Multimedia and Expo Workshops. IEEE, pp 635-640
Sarker IH (2021) Deep learning: a comprehensive overview on techniques, taxonomy, applications and research directions. SN Comput Sci 2(6):420
Albelwi S, Mahmood A (2017) A framework for designing the architectures of deep convolutional neural networks. Entropy 19(6):242
Géron A (2022) Hands-on machine learning with Scikit-Learn, Keras, and TensorFlow. O’Reilly Media, Inc
Yusof NN, Mohamed A, Abdul-Rahman S (2019) Context Enrichment Model Based Framework for Sentiment Analysis. In Soft Computing in Data Science: 5th International Conference, SCDS 2019, Iizuka, Japan, August 28–29, 2019, Proceedings 5, Springer Singapore, pp 325-335
He K, Zhang X, Ren S, Sun J (2015) Spatial pyramid pooling in deep convolutional networks for visual recognition. IEEE Trans Pattern Anal Mach Intell 37(9):1904–1916
He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 770–778
Mandic DP, Chambers JA (2001) Recurrent neural networks for prediction authored (Hardback); 0-470-84535-X (Electronic)
Hochreiter S, Schmidhuber J (1997) Long short-term memory. Neural Comput 9(8):1735–1780
Cho K, Van Merriënboer B, Gulcehre C, Bahdanau D, Bougares F, Schwenk H, Bengio Y (2014) Learning phrase representations using RNN encoder-decoder for statistical machine translation. ar**v preprint ar**v:1406.1078
Redmon J (2013–2016) Darknet: open source neural networks in C. http://pjreddie.com/darknet
Funding
This research received no specific grant from any funding agency in the public, commercial, or not-for-profit sectors.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors of this publication declare there is no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Shende, S.W., Tembhurne, J.V. & Ansari, N.A. Deep learning based authentication schemes for smart devices in different modalities: progress, challenges, performance, datasets and future directions. Multimed Tools Appl (2024). https://doi.org/10.1007/s11042-024-18350-5
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11042-024-18350-5