Pattern lock screen detection method based on lightweight deep feature extraction

被引:2
作者
Ertam, Fatih [1 ]
Yakut, Omer Faruk [1 ]
Tuncer, Turker [1 ]
机构
[1] Firat Univ, Technol Fac, Dept Digital Forens Engn, Elazig, Turkey
关键词
Digital forensics; Touchscreen security authentication; Deep learning; Pattern lock screen detection; AUTHENTICATION;
D O I
10.1007/s00521-022-07846-6
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the digital age, many people have used mobile phones, thus, mobile phones are one of the most commonly used crime tools. Users can take security measures to their mobile devices using various authorization methods such as passwords or screen patterns (touch screen security authentication). The used security measures generally make mobile forensic analysis difficult or even impossible. In order to overcome this problem, a novel intelligent pattern lock detector is presented in this research. The proposed lock detector uses transfer learning to extract deep lightweight features, iterative feature chosen function and a shallow classifier. A feature extraction network has been created by using SqueezeNet and MobileNet-V2, which are among the deep learning architectures in this work. Iterative Minimum Redundancy Maximum Relevance (ImRMR) was used for feature selection. Linear discriminant analysis (LDA) was selected for the classifier. The proposed model has been developed on three image datasets. These datasets are named clean, slightly dirty and medium dirty. 99.75%, 98.55% and 96.50% classification accuracies have been reached on the used three datasets, respectively. The findings clearly denote that the success of the presented deep lightweight features and ImRMR-based detector.
引用
收藏
页码:1549 / 1567
页数:19
相关论文
共 31 条
[1]  
Abdulhamid SM., 2018, INT J DIGIT ENTERP T, DOI [10.1504/ijdet.2018.10013745, DOI 10.1504/IJDET.2018.10013745]
[2]   Forensics acquisition - Analysis and circumvention of samsung secure boot enforced common criteria mode [J].
Alendal, Gunnar ;
Dyrkolbotn, Geir Olav ;
Axelsson, Stefan .
DIGITAL INVESTIGATION, 2018, 24 :S60-S67
[3]   A study on usability and security features of the Android pattern lock screen [J].
Andriotis, Panagiotis ;
Oikonomou, George ;
Mylonas, Alexios ;
Tryfonas, Theo .
INFORMATION AND COMPUTER SECURITY, 2016, 24 (01) :53-72
[4]   Biometric authentication based on touchscreen swipe patterns [J].
Antal, Margit ;
Szabo, Laszlo Zsolt .
9TH INTERNATIONAL CONFERENCE INTERDISCIPLINARITY IN ENGINEERING, INTER-ENG 2015, 2016, 22 :862-869
[5]   Stable feature selection based on instance learning, redundancy elimination and efficient subsets fusion [J].
Ben Brahim, Afef .
NEURAL COMPUTING & APPLICATIONS, 2021, 33 (04) :1221-1232
[6]   Automatic identification of commodity label images using lightweight attention network [J].
Chen, Junde ;
Zeb, Adnan ;
Yang, Shuangyuan ;
Zhang, Defu ;
Nanehkaran, Y. A. .
NEURAL COMPUTING & APPLICATIONS, 2021, 33 (21) :14413-14428
[7]   An evaluation of Convolutional Neural Networks for music classification using spectrograms [J].
Costa, Yandre M. G. ;
Oliveira, Luiz S. ;
Silla, Carlos N., Jr. .
APPLIED SOFT COMPUTING, 2017, 52 :28-38
[8]  
Feng T, 2012, 2012 IEEE INTERNATIONAL CONFERENCE ON TECHNOLOGIES FOR HOMELAND SECURITY, P451, DOI 10.1109/THS.2012.6459891
[9]   Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication [J].
Frank, Mario ;
Biedert, Ralf ;
Ma, Eugene ;
Martinovic, Ivan ;
Song, Dawn .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (01) :136-148
[10]   Digital forensics research: The next 10 years [J].
Garfinkel, Simson L. .
DIGITAL INVESTIGATION, 2010, 7 :S64-S73