Abstract
In the digital age, many people have used mobile phones, thus, mobile phones are one of the most commonly used crime tools. Users can take security measures to their mobile devices using various authorization methods such as passwords or screen patterns (touch screen security authentication). The used security measures generally make mobile forensic analysis difficult or even impossible. In order to overcome this problem, a novel intelligent pattern lock detector is presented in this research. The proposed lock detector uses transfer learning to extract deep lightweight features, iterative feature chosen function and a shallow classifier. A feature extraction network has been created by using SqueezeNet and MobileNet-V2, which are among the deep learning architectures in this work. Iterative Minimum Redundancy Maximum Relevance (ImRMR) was used for feature selection. Linear discriminant analysis (LDA) was selected for the classifier. The proposed model has been developed on three image datasets. These datasets are named clean, slightly dirty and medium dirty. 99.75%, 98.55% and 96.50% classification accuracies have been reached on the used three datasets, respectively. The findings clearly denote that the success of the presented deep lightweight features and ImRMR-based detector.
















Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Data availability
Three new mobile phone screen patterns datasets were collected and they publicly published. The researchers can download the collected datasets using https://www.kaggle.com/omerfarukyak/pattern-lock-screen-detection.
References
Alendal G, Dyrkolbotn GO, Axelsson S (2018) Forensics acquisition — Analysis and circumvention of samsung secure boot enforced common criteria mode. Digit Investig. https://doi.org/10.1016/j.diin.2018.01.008
Garfinkel SL (2010) Digital forensics research: the next 10 years. Digit Investig. https://doi.org/10.1016/j.diin.2010.05.009
Ibrahim TM, Abdulhamid SM, Alarood AA et al (2019) Recent advances in mobile touch screen security authentication methods: a systematic literature review. Comput Secur 85:1–24
Abdulhamid SM, Waziri VO, Idris I et al (2018) A forensic evidence recovery from mobile device applications. Int J Digit Enterp Technol. https://doi.org/10.1504/ijdet.2018.10013745
Feng T, Liu Z, Kwon KA, et al (2012) Continuous mobile authentication using touchscreen gestures. In: 2012 IEEE International conference on technologies for homeland security, HST 2012
Frank M, Biedert R, Ma E et al (2013) Touchalytics: on the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE Trans Inf Foren Secur. https://doi.org/10.1109/TIFS.2012.2225048
Shahzad M, Liu AX, Samuel A (2013) Secure unlocking of mobile touch screen devices by simple gestures–You can see it but you can not do it. In: Proceedings of the annual international conference on mobile computing and networking, MOBICOM
Meng W, Wong DS, Furnell S, Zhou J (2015) Surveying the development of biometric user authentication on mobile phones. IEEE Commun Surv Tutorials. https://doi.org/10.1109/COMST.2014.2386915
Murao K, Tobise H, Terada T et al (2014) Mobile phone user authentication with grip gestures using pressure sensors. In: 12th International conference on advances in mobile computing and multimedia, MoMM 2014
Nader J, Alsadoon A, Prasad PWC et al (2015) Designing touch-based hybrid authentication method for smartphones. In: Procedia computer science
Antal M, Szabó LZ (2016) Biometric authentication based on touchscreen swipe patterns. Procedia Technol. https://doi.org/10.1016/j.protcy.2016.01.061
Andriotis P, Oikonomou G, Mylonas A, Tryfonas T (2016) A study on usability and security features of the android pattern lock screen. Inf Comput Secur. https://doi.org/10.1108/ICS-01-2015-0001
Ng’Ang’A A, Musuva PMW (2020) Enhancing accuracy in a touch operation biometric system: a case on the android pattern lock scheme. Mob Inf Syst. https://doi.org/10.1155/2020/4165457
Ye G et al. (2017) Cracking android pattern lock in five attempts. In: Proceedings of the Network and Distributed System Security Symposium 2017 (NDSS 17). Internet Society
Sedik A, Faragallah OS, El-sayed HS et al (2022) An efficient cybersecurity framework for facial video forensics detection based on multimodal deep learning. Neural Comput Appl 34:1251–1268. https://doi.org/10.1007/s00521-021-06416-6
Nour M, Öztürk Ş, Polat K (2021) A novel classification framework using multiple bandwidth method with optimized CNN for brain–computer interfaces with EEG-fNIRS signals. Neural Comput Appl. https://doi.org/10.1007/s00521-021-06202-4
Zhang Y, Yu W, He L et al (2021) Signals classification based on IA-optimal CNN. Neural Comput Appl. https://doi.org/10.1007/s00521-021-05736-x
Ma Z, Jiang M, Huang W (2020) Trusted forensics scheme based on digital watermark algorithm in intelligent VANET. Neural Comput Appl. https://doi.org/10.1007/s00521-019-04246-1
Szegedy C, Vanhoucke V, Ioffe S et al (2016) Rethinking the Inception Architecture for Computer Vision. In: Proceedings of the IEEE computer society conference on computer vision and pattern recognition
Iandola FN, Han S, Moskewicz MW et al (2016) SqueezeNet: AlexNet-level accuracy with 50x fewer parameters and <0.5MB model size. 1–13
Sandler M, Howard A, Zhu M et al (2018) MobileNetV2: inverted residuals and linear bottlenecks. In: Proceedings of the IEEE computer society conference on computer vision and pattern recognition. IEEE, pp 4510–4520
Chen J, Zeb A, Yang S et al (2021) Automatic identification of commodity label images using lightweight attention network. Neural Comput Appl. https://doi.org/10.1007/s00521-021-06081-9
Hammad M, Iliyasu AM, Subasi A et al (2021) A multitier deep learning model for arrhythmia detection. IEEE Trans Instrum Meas. https://doi.org/10.1109/TIM.2020.3033072
Ben Brahim A (2021) Stable feature selection based on instance learning, redundancy elimination and efficient subsets fusion. Neural Comput Appl. https://doi.org/10.1007/s00521-020-04971-y
Toğaçar M, Ergen B, Cömert Z (2020) Detection of lung cancer on chest CT images using minimum redundancy maximum relevance feature selection method with convolutional neural networks. Biocybern Biomed Eng. https://doi.org/10.1016/j.bbe.2019.11.004
Kandala RNVPS, Dhuli R, Pławiak P et al (2019) Towards real-time heartbeat classification: evaluation of nonlinear morphological features and voting method. Sensors (Switzerland). https://doi.org/10.3390/s19235079
Sandler M, Howard A, Zhu M et al (2018) MobileNetV2: inverted residuals and linear bottlenecks. In: Proceedings of the IEEE computer society conference on computer vision and pattern recognition
Szegedy C, Liu W, Jia Y et al (2015) Going deeper with convolutions. Proc IEEE Comput Soc Conf Comput Vis Pattern Recognit 07–12-June:1–9. https://doi.org/10.1109/CVPR.2015.7298594
He K, Zhang X, Ren S, Sun J (2016) ResNet. Proc IEEE Comput Soc Conf Comput Vis Pattern Recognit. https://doi.org/10.1109/CVPR.2016.90
Korfiatis P, Kline TL, Lachance DH et al (2017) Residual deep convolutional neural network predicts MGMT methylation status. J Digit Imaging. https://doi.org/10.1007/s10278-017-0009-z
Kang J, Gwak J (2019) Ensemble of instance segmentation models for polyp segmentation in colonoscopy images. IEEE Access 7:26440–26447. https://doi.org/10.1109/ACCESS.2019.2900672
Costa YMG, Oliveira LS, Silla CN (2017) An evaluation of convolutional neural networks for music classification using spectrograms. Appl Soft Comput J 52:28–38. https://doi.org/10.1016/j.asoc.2016.12.024
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors confirm that this article content has no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Ertam, F., Yakut, O.F. & Tuncer, T. Pattern lock screen detection method based on lightweight deep feature extraction. Neural Comput & Applic 35, 1549–1567 (2023). https://doi.org/10.1007/s00521-022-07846-6
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00521-022-07846-6