Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3230833.3234514acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaresConference Proceedingsconference-collections
research-article
Open access

Fingerprint Recognition on Mobile Devices: Widely Deployed, Rarely Understood

Published: 27 August 2018 Publication History

Abstract

Only a few studies have addressed the users' conception of how fingerprint recognition used for different purposes on mobile devices works. This study contributes by investigating how different groups of individuals think that the fingerprint recognition works, why they think so, and also by pointing out differences in pin code and fingerprint issues. The study furthermore yields some results concerning individuals' attitudes towards how sensitive the use of fingerprint sensors is: non-users tended to be more afraid of third-party access than users. On the other hand, users tended to regard the fingerprint pattern as more sensitive than non-users.
This study also manages to give some methodological contributions, namely that mockup user interfaces do not bias the parameters studied in this paper (e.g. understanding of access to fingerprint data), and that self-estimation of knowledge in Computer Security is not a good indicator of respondents' understanding of fingerprint security and privacy. Moreover, people who connected a low degree of sensitivity to fingerprint patterns gave very different reasons for their estimation of sensitivity. This prompts for more research, as it is unclear if different groups would benefit from different information and modes of visualisation to understand what are the issues involved in fingerprint recognition on mobile devices.

References

[1]
Ruba Abu-Salma, M. Angela Sasse, Joseph Bonneau, Anastasia Danilova, Alena Naiakshina, and Matthew Smith. 2017. Obstacles to the adoption of secure communication tools. In 2017 IEEE Symposium on Security and Privacy (SP). IEEE, 137--153.
[2]
Apple. 2018. iOS security, iOS 11. https://www.apple.com/business/docs/iOS_Securi1y_Guide.pdf. (January 2018). Accessed April 23, 2018.
[3]
T Mark Beasley and Randall E Schumacker. 1995. Multiple regression approach to analyzing contingency tables: Post hoc and planned comparison procedures. The Journal of Experimental Education 64, 1 (1995), 79--93.
[4]
Rasekhar Bhagavatula, Blase Ur, Kevin Iacovino, Su Mon Kywe, Lorrie Faith Cranor, and Marios Savvides. 2015. Biometric authentication on iPhone and Android: Usability, perceptions, and influences on adoption. In Proc. USEC'15. Internet Society, 1--10.
[5]
Ivan Cherapau, Ildar Muslukhov, Nalin Asanka, and Konstantin Beznosov. 2015. On the impact of Touch ID on iPhone passcodes. In SOUPS 2015. USENIX Association, 257--276.
[6]
Alexander De Luca, Alina Hang, Emanuel Von Zezschwitz, and Heinrich Hussmann. 2015. I feel like I'm taking selfies all day!: towards understanding biometric authentication on smartphones. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. ACM, 1411--1414.
[7]
Miguel A Garcia-Perez and Vicente Nunez-Anton. 2003. Cellwise residual analysis in two-way contingency tables. Educational and psychological measurement 63, 5 (2003), 825--839.
[8]
Richard Green and Robert Young. 2000. Fingerprint asymmetry in male and female transsexuals. Personality and Individual Differences 29, 5 (2000), 933--942.
[9]
Marian Harbach, Alexander De Luca, and Serge Egelman. 2016. The anatomy of smartphone unlocking: A field study of android lock screens. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. ACM, 4806--4817.
[10]
Marian Harbach, Alexander De Luca, Nathan Malkin, and Serge Egelman. 2016. Keep on lockin'in the free world: A multi-national comparison of smartphone locking. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. ACM, 4823--4827.
[11]
Edward Higgs. 2010. Fingerprints and citizenship: the British state and the identification of pensioners in the interwar period. In History Workshop Journal, Vol. 69. Oxford University Press, 52--67.
[12]
Felix Hörandner, Stephan Krenn, Andrea Migliavacca, Florian Thiemer, and Bernd Zwattendorfer. 2016. CREDENTIAL: a framework for privacy-preserving cloud-based data sharing. In Availability, Reliability and Security (ARES), 2016 11th International Conference on. IEEE, 742--749.
[13]
Crystal Huynh, Erica Brunelle, Lenka Halámková, Juliana Agudelo, and Jan Halámek. 2015. Forensic identification of gender from fingerprints. Analytical chemistry 87, 22 (2015), 11531--11536.
[14]
Yousra Javed, Mohamed Shehab, and Emmanuel Bello-Ogunu. 2017. Investigating user comprehension and risk perception of Apple's Touch ID technology. In Proceedings of the 12th International Conference on Availability, Reliability and Security. ACM, 35.
[15]
Farzaneh Karegar, Daniel Lindegren, John Sören Pettersson, and Simone Fischer-Hübner. 2018. User evaluations of an app interface for cloud-based identity management. In Advances in Information Systems Development, Nearchos Paspallis, Marios Raspopoulos, Chris Barry, Michael Lang, Henry Linger, and Christoph Schneider (Eds.). Springer, 205--223.
[16]
Doreen Kimura and Michael W Carson. 1995. Dermatoglyphic asymmetry: Relation to sex, handedness and cognitive pattern. Personality and Individual Differences 19, 4 (1995), 471--478.
[17]
Els J Kindt. 2009. The use of privacy enhancing technologies for biometric systems analysed from a legal perspective. In IFIP PrimeLife International Summer School on Privacy and Identity Management for Life. Springer, 134--145.
[18]
Els J. Kindt. 2013. Biometric data, data protection and the right to privacy. Springer Netherlands, Dordrecht, 87--272.
[19]
Alina Krupp, Christian Rathgeb, and Christoph Busch. 2013. Social acceptance of biometric technologies in Germany: A survey. In Biometrics Special Interest Group (BIOSIG), 2013 International Conference of the. IEEE, 1--5.
[20]
Andreas Pfitzmann. 2008. Biometrics--how to put to use and how not at all?. In International Conference on Trust, Privacy and Security in Digital Business. Springer, 1--7.
[21]
Android Open Source Project. 2018. Android Security. https://source.android.com/security/. (March 2018). Accessed April 23, 2018.
[22]
Hugh Wimberly and Lorie M Liebrock. 2011. Using fingerprint authentication to reduce system security: An empirical study. In Security and Privacy (SP), 2011 IEEE Symposium on. IEEE, 32--46.
[23]
Verena Zimmermann and Nina Gerber. 2017. "If it wasn't secure, they would not use it in the movies "--Security perceptions and user acceptance of authentication technologies. In International Conference on Human Aspects of Information Security, Privacy, and Trust. Springer, 265--283.
[24]
Nedaa Zirjawi, Zijad Kurtanovic, and Walid Maalej. 2015. A survey about user requirements for biometric authentication on smartphones. In Evolving Security and Privacy Requirements Engineering (ESPRE), 2015 IEEE 2nd Workshop on. IEEE, 1--6.

Cited By

View all
  • (2024)Sensor-based authentication in smartphone: A systematic reviewJournal of Engineering Research10.1016/j.jer.2024.02.003Online publication date: Feb-2024
  • (2023)Fingerprint forgery training: Easy to learn, hard to performProceedings of the 18th International Conference on Availability, Reliability and Security10.1145/3600160.3604990(1-7)Online publication date: 29-Aug-2023
  • (2022)A New Multi-Filter Framework for Texture Image Representation Improvement Using Set of Pattern Descriptors to Fingerprint Liveness DetectionIEEE Access10.1109/ACCESS.2022.321833510(117681-117706)Online publication date: 2022
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
ARES '18: Proceedings of the 13th International Conference on Availability, Reliability and Security
August 2018
603 pages
ISBN:9781450364485
DOI:10.1145/3230833
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

  • Universität Hamburg: Universität Hamburg

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 27 August 2018

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Data Privacy
  2. Fingerprint Pattern
  3. Sensitive Information
  4. User Perception

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Funding Sources

  • European Union's Horizon 2020 research and innovation programme

Conference

ARES 2018

Acceptance Rates

ARES '18 Paper Acceptance Rate 128 of 260 submissions, 49%;
Overall Acceptance Rate 228 of 451 submissions, 51%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)180
  • Downloads (Last 6 weeks)24
Reflects downloads up to 16 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Sensor-based authentication in smartphone: A systematic reviewJournal of Engineering Research10.1016/j.jer.2024.02.003Online publication date: Feb-2024
  • (2023)Fingerprint forgery training: Easy to learn, hard to performProceedings of the 18th International Conference on Availability, Reliability and Security10.1145/3600160.3604990(1-7)Online publication date: 29-Aug-2023
  • (2022)A New Multi-Filter Framework for Texture Image Representation Improvement Using Set of Pattern Descriptors to Fingerprint Liveness DetectionIEEE Access10.1109/ACCESS.2022.321833510(117681-117706)Online publication date: 2022
  • (2021)Towards Using Police Officers’ Business Smartphones for Contactless Fingerprint Acquisition and Enabling Fingerprint Comparison against Contact-Based DatasetsSensors10.3390/s2107224821:7(2248)Online publication date: 24-Mar-2021
  • (2021)AuthGuide: Analyzing Security, Privacy and Usability Trade-Offs in Multi-factor AuthenticationTrust, Privacy and Security in Digital Business10.1007/978-3-030-86586-3_11(155-170)Online publication date: 27-Sep-2021
  • (2020)Psychological Effects and Their Role in Online Privacy Interactions: A ReviewIEEE Access10.1109/ACCESS.2020.29695628(21236-21260)Online publication date: 2020
  • (2019)An evaluation of three designs to engage users when providing their consent on smartphonesBehaviour & Information Technology10.1080/0144929X.2019.169789840:4(398-414)Online publication date: 17-Dec-2019

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media