Until such a dataset is available, we can qualitatively analyze different approaches to gesture security. To this end, we offer here four contributions: a survey of common gesture recognizers;
design considerations for gesture-based authentication systems; suggestions for comparing recognizers; and an evaluation of gesture based authentication compared to text-based passwords.