Abdulwahab Ali Almazroi, Mohamed Meselhy Eltoukhy*
CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3729-3741, 2023, DOI:10.32604/cmc.2023.036020
- 31 March 2023
Abstract Smartphones have now become an integral part of our everyday lives. User authentication on smartphones is often accomplished by mechanisms (like face unlock, pattern, or pin password) that authenticate the user’s identity. These technologies are simple, inexpensive, and fast for repeated logins. However, these technologies are still subject to assaults like smudge assaults and shoulder surfing. Users’ touch behavior while using their cell phones might be used to authenticate them, which would solve the problem. The performance of the authentication process may be influenced by the attributes chosen (from these behaviors). The purpose of this… More >