Analysis of interaction trace maps for active authentication on smart devices

被引:16
作者
Ahmad, Jamil [1 ]
Sajjad, Muhammad [2 ]
Jan, Zahoor [2 ]
Mehmood, Irfan [1 ]
Rho, Seungmin [3 ]
Baik, Sung Wook [1 ]
机构
[1] Sejong Univ, Coll Elect & Informat Engn, Seoul, South Korea
[2] Islamia Coll, Dept Comp Sci, Peshawar, Pakistan
[3] Sungkyul Univ, Dept Multimedia, Anyang, South Korea
基金
新加坡国家研究基金会;
关键词
Active authentication; Edge orientation; Interaction trace maps; Shape features; Visual analysis; IDENTIFICATION;
D O I
10.1007/s11042-016-3450-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The availability and affordability of handheld smart devices have made life easier by enabling us to do work on the go. Their widespread use brings with it concerns relating to data security and privacy. The rising demand to secure private and highly confidential data found on smart devices has motivated researchers to devise means for ensuring privacy and security at all times. This kind of continuous user authentication scheme would add an additional layer of much needed security to smart devices. In this context, touch screen interactions have recently been studied as an effective modality to perform active user authentication on mobile devices. In this paper, a visual analysis based active authentication framework has been presented. Considering the touch screen as a canvas, interaction trace maps are constructed as a result of user interactions within various applications. The user touch gestures are captured and represented as drawing strokes on the canvas. The behavioral and physiological characteristics of users are modeled as signatures by combining texture and shape features from the interaction trace maps. A two-step mechanism with support vector machines exploit this signature to perform active user authentication. Experiments conducted with various datasets show that the proposed framework compares favorably with other state-of-the-art methods.
引用
收藏
页码:4069 / 4087
页数:19
相关论文
共 31 条
  • [21] Parhi P., 2006, P 8 C HUMAN COMPUTER, P203, DOI [DOI 10.1145/1152215.1152260, 10.1145/1152215.1152260]
  • [22] Comparing internet and mobile phone usage: digital divides of usage, adoption, and dropouts
    Rice, RE
    Katz, JE
    [J]. TELECOMMUNICATIONS POLICY, 2003, 27 (8-9) : 597 - 623
  • [23] LatentGesture: Active User Authentication through Background Touch Analysis
    Saravanan, Premkumar
    Clarke, Samuel
    Chau, Duen Horng
    Zha, Hongyuan
    [J]. PROCEEDINGS OF CHINESE CHI 2014: SECOND INTERNATIONAL SYMPOSIUM OF CHINESE CHI (CHINESE CHI 2014), 2014, : 110 - 113
  • [24] Serwadda A, 2013, 2013 IEEE SIXTH INTERNATIONAL CONFERENCE ON BIOMETRICS: THEORY, APPLICATIONS AND SYSTEMS (BTAS)
  • [25] Scan-Based Evaluation of Continuous Keystroke Authentication Systems
    Serwadda, Abdul
    Wang, Zibo
    Koch, Patrick
    Govindarajan, Sathya
    Pokala, Raviteja
    Goodkind, Adam
    Brizan, David-Guy
    Rosenberg, Andrew
    Phoha, Vir V.
    Balagani, Kiran
    [J]. IT PROFESSIONAL, 2013, 15 (04) : 20 - 23
  • [26] Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication
    Shen, Chao
    Zhang, Yong
    Guan, Xiaohong
    Maxion, Roy A.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (03) : 498 - 513
  • [27] Sim T, 2007, COMPUTER VISION PATT, P1
  • [28] Online risk-based authentication using behavioral biometrics
    Traore, Issa
    Woungang, Isaac
    Obaidat, Mohammad S.
    Nakkabi, Youssef
    Lai, Iris
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2014, 71 (02) : 575 - 605
  • [29] Vapnik VladimirNaumovich., 1998, STAT LEARNING THEORY, V2
  • [30] Multimodal biometric authentication based on score level fusion using support vector machine
    Wang, F.
    Han, J.
    [J]. OPTO-ELECTRONICS REVIEW, 2009, 17 (01) : 59 - 64