Optimal Weighted Logarithmic Transformation Converted HMOG Features for Automatic Smart Phone Authentication

Optimal Weighted Logarithmic Transformation Converted HMOG Features for Automatic Smart Phone Authentication

Vinod P. R., Anitha A.
Copyright: © 2022 |Volume: 13 |Issue: 1 |Pages: 23
ISSN: 1937-9412|EISSN: 1937-9404|EISBN13: 9781683180449|DOI: 10.4018/IJMCMC.301968
Cite Article Cite Article

MLA

P. R., Vinod, and Anitha A. "Optimal Weighted Logarithmic Transformation Converted HMOG Features for Automatic Smart Phone Authentication." IJMCMC vol.13, no.1 2022: pp.1-23. http://doi.org/10.4018/IJMCMC.301968

APA

P. R., V. & A., A. (2022). Optimal Weighted Logarithmic Transformation Converted HMOG Features for Automatic Smart Phone Authentication. International Journal of Mobile Computing and Multimedia Communications (IJMCMC), 13(1), 1-23. http://doi.org/10.4018/IJMCMC.301968

Chicago

P. R., Vinod, and Anitha A. "Optimal Weighted Logarithmic Transformation Converted HMOG Features for Automatic Smart Phone Authentication," International Journal of Mobile Computing and Multimedia Communications (IJMCMC) 13, no.1: 1-23. http://doi.org/10.4018/IJMCMC.301968

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

This paper intends to develop an automatic behavior-based smart phone authentication model by three major phases: feature extraction, weighted logarithmic transformation, and classification. Initially, from the data related to the touches/gesture of the smartphone user, hand movement, orientation, and grasp (HMOG), features are extracted with the aid of grasp resistance and grasp stability. These extracted features are mapped within the particular range by normalizing HMOG. These normalized data are multiplied with the weights followed by logarithmic transformation in the weighted logarithmic transformation phase. As a novelty, the decision-making process related to the logarithmic and weight selection is based on the improved optimization algorithm, called modified threshold-based whale optimization algorithm (MT-WOA). The final feature vectors are fed to DBN for recognizing the authorized users. Finally, a performance-based evaluation is performed between the MT-WOA+DBN and the existing models in terms of various relevant performance measures.