Smartphone Authentication Based on 3D Touch Sensor and Finger Locations on Touchscreens via Decision-Making Techniques
Main Article Content
Abstract
Smartphone authentication systems must balance security and user convenience, which is a persistent challenge in the digital realm. Traditional biometrics, such as fingerprints and facial recognition, face vulnerabilities to spoofing and environmental conditions, limiting reliability. This study introduces a novel approach by integrating three-dimensional (3D) touch sensors with finger location data for authentication. The goal is to develop a system that improves accuracy while minimizing false positives and negatives, leveraging touch pressure and spatial interaction as unique biometric identifiers. Data from 20 participants, including pressure levels, spatial coordinates, and timestamps, were analysed using Random Forest (RF) and Extreme Gradient Boosting (XGBoost) models. The results showed that combining pressure sensitivity with spatial data significantly improved performance, achieving an F1- score of 0.83 and an accuracy of 83%. The system demonstrated balanced precision (0.84) and recall (0.83), effectively reducing false positives and negatives. Robustness was confirmed through cross-validation tests, which validated the consistency across datasets and real-time usability scenarios. This study establishes a foundation for secure, user-friendly smartphone authentication, highlighting the potential of 3D touch technology in addressing current biometric system limitations. This approach opens avenues for further research in mobile security, integrating multimodal biometric data with advanced machine learning techniques.
Article Details
Issue
Section

This work is licensed under a Creative Commons Attribution 4.0 International License.
How to Cite
References
[1] A. S. Jouda, A. M. Sagheer, and M. L. Shuwandy, “MagRing-SASB: Static Authentication of Magnetism Sensor Using Semi-Biometric Interaction Magnetic Ring,” 2021 IEEE 11th International Conference on System Engineering and Technology, ICSET 2021 - Proceedings, pp. 183–188, 2021, doi: 10.1109/ICSET53708.2021.9612555.
[2] M. L. Shuwandy, H. A. Aljubory, N. M. Hammash, M. M. Salih, M. A. Altaha, and Z. T. Alqaisy, “BAWS3TS: Browsing Authentication Web-Based Smartphone Using 3D Touchscreen Sensor,” 2022 IEEE 18th International Colloquium on Signal Processing and Applications, CSPA 2022 - Proceeding, no. May, pp. 425–430, 2022, doi: 10.1109/CSPA55076.2022.9781888.
[3] M. L. Shuwandy et al., “mHealth authentication approach based 3D touchscreen and microphone sensors for real-time remote healthcare monitoring system: Comprehensive review, open issues and methodological aspects,” Comput Sci Rev, vol. 38, p. 100300, 2020, doi: 10.1016/j.cosrev.2020.100300.
[4] A. S. A. Albahri, M. G. Yaseen, M. Aljanabi, A. H. A. H. Ali, and A. Kaleel, “Securing tomorrow: navigating the evolving cybersecurity landscape,” Mesopotamian Journal of CyberSecurity, vol. 4, no. 1, pp. 1–3, 2024.
[5] K. Nova, “Analyzing Keystroke Dynamics for User Authentication: A Comparative Study of Feature Extractions and Machine Learning Models,” Sage Science Review of Applied Machine Learning, vol. 5, no. 2, pp. 67–80, 2022.
[6] M. H. Jasim et al., “Emotion Detection among Muslims and Non- Muslims While Listening to Quran Recitation Using EEG,” International Journal of Academic Research in Business and Social Sciences, vol. 9, no. 14, 2019, doi: 10.6007/ijarbss/v9-i14/6500.
[7] S. Kokal, M. Vanamala, and R. Dave, “Analysis of Gait Motion Sensor Mobile Authentication with Machine Learning.,” International Journal of Advanced Computer Science & Applications, vol. 15, no. 3, 2024.
[8] A. Y. Younis and M. L. Shuwandy, “Biometric Authentication Utilizing EEG Based-on a Smartphone’s 3D Touchscreen Sensor,” in 2023 IEEE 14th Control and System Graduate Research Colloquium (ICSGRC), IEEE, 2023, pp. 169–174.
[9] M. L. Shuwandy, B. B. Zaidan, A. A. Zaidan, and A. S. Albahri, “Sensor-Based mHealth Authentication for Real-Time Remote Healthcare Monitoring System: A Multilayer Systematic Review,” J Med Syst, vol. 43, no. 2, 2019, doi: 10.1007/s10916-018-1149-5.
[10] M. L. Shuwandy, B. B. Zaidan, A. A. Zaidan, and A. S. Albahri, “Sensor-Based mHealth Authentication for Real-Time Remote Healthcare Monitoring System: A Multilayer Systematic Review,” J Med Syst, vol. 43, no. 2, 2019, doi: 10.1007/s10916-018-1149-5.
[11] R. Blanco Gonzalo et al., “Attacking a Smartphone Biometric Fingerprint System: A Novice’s Approach,” Proceedings - International Carnahan Conference on Security Technology, vol. 2018-Octob, no. 675087, pp. 1–5, 2018, doi: 10.1109/CCST.2018.8585726.
[12] S. Lee, K. Song, and J. Choi, “Access to an automated security system using gesture-based passwords,” Proceedings of the 2012 15th International Conference on Network-Based Information Systems, NBIS 2012, no. 25, pp. 760–765, 2012, doi: 10.1109/NBiS.2012.136.
[13] P. Chen, S., Pande, A., and Mohapatra, “Sensor-Assisted Facial Recognition : An Enhanced Bio- metric Authentication System for Smartphones,” In Proceedings of the 12th annual international conference on Mobile systems, applications, and services MobiSys ’14, pp. 109–122, 2014, doi: 10.1145/2594368.2594373.
[14] C. Smyth, G. Wang, R. Panicker, A. Nag, B. Cardiff, and D. John, “Continuous user authentication using iot wearable sensors,” in 2021 IEEE International Symposium on Circuits and Systems (ISCAS), IEEE, 2021,pp. 1–5.
[15] C. Esposito, M. Ficco, and B. B. Gupta, “Blockchain-based authentication and authorization for smart city applications,” Inf Process Manag, vol. 58, no. 2, p. 102468, 2021.
[16] T. O. Agboola, J. Adegede, and J. G. Jacob, “Balancing Usability and Security in Secure System Design: A Comprehensive Study on Principles, Implementation, and Impact on Usability,” International Journal of Computing Sciences Research, vol. 8, pp. 2995–3009, 2024.
[17] E. Pagnin and A. Mitrokotsa, “Privacy-Preserving Biometric Authentication: Challenges and Directions,” Security and Communication Networks, vol. 2017, 2017, doi: 10.1155/2017/7129505.
[18] A. Buriro, B. Crispo, and M. Conti, “ANSWERAUTH: A bimodal behavioral biometric-based user authentication scheme for smartphones,” Journal of Information Security and Applications, vol. 44, pp. 89–103, 2019, doi: 10.1016/j.jisa.2018.11.008.
[19] H. Lee, J. Y. Hwang, D. I. Kim, S. Lee, S. H. Lee, and J. S. Shin, “Understanding Keystroke Dynamics for Smartphone Users Authentication and Keystroke Dynamics on Smartphones Built-In Motion Sensors,” Security and Communication Networks, vol. 2018, 2018, doi: 10.1155/2018/2567463.
[20] P. K. Rayani and S. Changder, “Continuous user authentication on smartphone via behavioral biometrics: a survey,” Multimed Tools Appl, vol. 82, no. 2, pp. 1633–1667, 2023.
[21] J. Li, L. Sun, Q. Yan, Z. Li, W. Srisa-An, and H. Ye, “Significant Permission Identification for Machine Learning Based Android Malware Detection.”
[22] L. Galbally and J. Haraksim, Automatic fingerprint recognition from children to elderly. European Commission’s science and knowledge service: Technical report by the Joint Research Centre (JRC), 2018. doi: 10.2760/809183.
[23] F. Karegar, J. S. Pettersson, and S. Fischer-Hübner, “Fingerprint recognition on mobile devices: Widely deployed, rarely understood,” ACM International Conference Proceeding Series, 2018, doi: 10.1145/3230833.3234514.
[24] R. Kumar, P. P. Kundu, D. Shukla, and V. V. Phoha, “Continuous user authentication via unlabeled phone movement patterns,” IEEE International Joint Conference on Biometrics, IJCB 2017, vol. 2018-Janua, pp. 177–184, 2018, doi: 10.1109/BTAS.2017.8272696.
[25] Z. Shen, S. Li, X. Zhao, and J. Zou, “CT-Auth: Capacitive touchscreen-based continuous authentication on smartphones,” IEEE Trans Knowl Data Eng, vol. 36, no. 1, pp. 90–106, 2023.
[26] X. Yang, S. Yang, J. Liu, C. Wang, Y. Chen, and N. Saxena, “Enabling finger-touch-based mobile user authentication via physical vibrations on IoT devices,” IEEE Trans Mob Comput, vol. 21, no. 10, pp. 3565–3580, 2021.
[27] M. Silic, I. Silic, and D. Silic, “Reducing cybersecurity risks and insider computer abuse by better securing the human factor: Improving organizational it security compliance,” Global journal of Business and Integral Security, vol. 1, no. 1, 2021.
[28] L. Zhang et al., “Toward Robust and Effective Behavior Based User Authentication With Off-the-shelf Wi-Fi,” IEEE Transactions on Information Forensics and Security, 2024.
[29] H. Nguyen, H. H. Nguyen, T. Hoang, D. Choi, and T. D. Nguyen, “A Generalized Authentication Scheme For Mobile Phones Using Gait Signals,” pp. 386–407, 2016, doi: 10.1007/978-3-319-30222-5_18.
[30] T. Chen and C. Guestrin, “Xgboost: A scalable tree boosting system,” in Proceedings of the 22nd acm sigkdd international conference on knowledge discovery and data mining, 2016, pp. 785–794.
[31] D. Nastasiu et al., “A new method of secure authentication based on electromagnetic signatures of chipless RFID tags and machine learning approaches,” Sensors, vol. 20, no. 21, p. 6385, 2020.
[32] T. Feng et al., “Continuous mobile authentication using touchscreen gestures,” in 2012 IEEE conference on technologies for homeland security (HST), IEEE, 2012, pp. 451–456.
[33] P. S. Teh, N. Zhang, A. B. J. Teoh, and K. Chen, “A survey on touch dynamics authentication in mobile devices,” Comput Secur, vol. 59, pp. 210–235, 2016.
[34] Y. Wang, T. Gu, and H. Zhang, “Simultaneous Authentication of Multiple Users Using a Single mmWave Radar,” IEEE Internet Things J, 2024.
[35] C. Shen, Y. Li, Y. Chen, X. Guan, and R. A. Maxion, “Performance Analysis of Multi-Motion Sensor Behavior for Active Smartphone Authentication,” IEEE Transactions on Information Forensics and Security, vol. 13, no. 1, pp. 48–62, 2018, doi: 10.1109/TIFS.2017.2737969.
[36] D. J. S. Raja, R. Sriranjani, P. Arulmozhi, and N. Hemavathi, “Unified Random Forest and Hybrid Bat Optimization based Man-in-the-Middle Attack Detection in Advanced Metering Infrastructure,” IEEE Trans Instrum Meas, 2024.
[37] Z. Sun, G. Wang, P. Li, H. Wang, M. Zhang, and X. Liang, “An improved random forest based on the classification accuracy and correlation measurement of decision trees,” Expert Syst Appl, vol. 237, p. 121549, 2024.
[38] A. A. S. AlQahtani, T. Alshayeb, M. Nabil, and A. Patooghy, “Leveraging Machine Learning for Wi-Fi-based Environmental Continuous Two-Factor Authentication,” IEEE Access, 2024.
[39] S. Bajpai, K. Sharma, and B. K. Chaurasia, “A Hybrid Meta-heuristics Algorithm: XGBoost-Based Approach for IDS in IoT,” SN Comput Sci, vol. 5, no. 5, pp. 1–16, 2024.
[40] M. G. Ismail, M. A.-M. Salem, M. A. Abd El Ghany, E. A. Aldakheel, and S. Abbas, “Outlier detection for keystroke biometric user authentication,” PeerJ Comput Sci, vol. 10, p. e2086, 2024.
[41] J. Sharma, K. Kumar, P. Jain, R. H. C. Alfilh, and H. Alkattan, “Enhancing Intrusion Detection Systems with Adaptive Neuro-Fuzzy Inference Systems,” Mesopotamian Journal of CyberSecurity, vol. 5, no. 1, pp. 1–10, 2025.
[42] H. Jiang, H. Cao, D. Liu, J. Xiong, and Z. Cao, “SmileAuth: Using Dental Edge Biometrics for User Authentication on Smartphone,” Proc ACM Interact Mob Wearable Ubiquitous Technol, vol. 4, no. 3, 2020, doi: 10.1145/3411806.
[43] Y. L. Khaleel, M. A. Habeeb, and H. Alnabulsi , Trans., “Adversarial Attacks in Machine Learning: Key Insights and Defense Approaches ”, Applied Data Science and Analysis, vol. 2024, pp. 121–147, Aug. 2024, doi: 10.58496/ADSA/2024/011.
[44] E. Srividhya, J. P, V. Anusuya, K. J. Deepthi, P. Gopalsamy, and S. Gopalakrishnan, “Deep Learning-Driven Disease Prediction System in Cloud Environments using a Big Data Approach”, EDRAAK, vol. 2024, pp. 8–17, Jan. 2024, doi: 10.70470/EDRAAK/2024/002.