Analysis of interaction trace maps for active authentication on smart devices

被引:16
作者
Ahmad, Jamil [1 ]
Sajjad, Muhammad [2 ]
Jan, Zahoor [2 ]
Mehmood, Irfan [1 ]
Rho, Seungmin [3 ]
Baik, Sung Wook [1 ]
机构
[1] Sejong Univ, Coll Elect & Informat Engn, Seoul, South Korea
[2] Islamia Coll, Dept Comp Sci, Peshawar, Pakistan
[3] Sungkyul Univ, Dept Multimedia, Anyang, South Korea
基金
新加坡国家研究基金会;
关键词
Active authentication; Edge orientation; Interaction trace maps; Shape features; Visual analysis; IDENTIFICATION;
D O I
10.1007/s11042-016-3450-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The availability and affordability of handheld smart devices have made life easier by enabling us to do work on the go. Their widespread use brings with it concerns relating to data security and privacy. The rising demand to secure private and highly confidential data found on smart devices has motivated researchers to devise means for ensuring privacy and security at all times. This kind of continuous user authentication scheme would add an additional layer of much needed security to smart devices. In this context, touch screen interactions have recently been studied as an effective modality to perform active user authentication on mobile devices. In this paper, a visual analysis based active authentication framework has been presented. Considering the touch screen as a canvas, interaction trace maps are constructed as a result of user interactions within various applications. The user touch gestures are captured and represented as drawing strokes on the canvas. The behavioral and physiological characteristics of users are modeled as signatures by combining texture and shape features from the interaction trace maps. A two-step mechanism with support vector machines exploit this signature to perform active user authentication. Experiments conducted with various datasets show that the proposed framework compares favorably with other state-of-the-art methods.
引用
收藏
页码:4069 / 4087
页数:19
相关论文
共 31 条
  • [1] [Anonymous], HELLO ANDROID INTRO
  • [2] [Anonymous], ITC CSCC 2005 P
  • [3] [Anonymous], STYLOMETRY SYSTEMFOR
  • [4] [Anonymous], 2005, BIOMETRIC USER AUTHE
  • [5] Different strokes for different folks? Revealing the physical characteristics of smartphone users from their swipe gestures
    Bevan, Chris
    Fraser, Danae Stanton
    [J]. INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, 2016, 88 : 51 - 61
  • [6] Continuous User Authentication Using Machine Learning on Touch Dynamics
    Budulan, Stefania
    Burceanu, Elena
    Rebedea, Traian
    Chiru, Costin
    [J]. NEURAL INFORMATION PROCESSING, PT I, 2015, 9489 : 591 - 598
  • [7] Calix K., 2008, Proceedings of CSIS Research Day, Pace University, P1048
  • [8] Chao Shen, 2012, 2012 IEEE Fifth International Conference On Biometrics: Theory, Applications And Systems (BTAS 2012), P61, DOI 10.1109/BTAS.2012.6374551
  • [9] Support vector analysis of large-scale data based on kernels with iteratively increasing order
    Chen, Bo-Wei
    He, Xinyu
    Ji, Wen
    Rho, Seungmin
    Kung, Sun-Yuan
    [J]. JOURNAL OF SUPERCOMPUTING, 2016, 72 (09) : 3297 - 3311
  • [10] Smart Homecare Surveillance System: Behavior Identification Based on State-Transition Support Vector Machines and Sound Directivity Pattern Analysis
    Chen, Bo-Wei
    Chen, Chen-Yu
    Wang, Jhing-Fa
    [J]. IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2013, 43 (06): : 1279 - 1289