Analysis of interaction trace maps for active authentication on smart devices

被引:16
作者
Ahmad, Jamil [1 ]
Sajjad, Muhammad [2 ]
Jan, Zahoor [2 ]
Mehmood, Irfan [1 ]
Rho, Seungmin [3 ]
Baik, Sung Wook [1 ]
机构
[1] Sejong Univ, Coll Elect & Informat Engn, Seoul, South Korea
[2] Islamia Coll, Dept Comp Sci, Peshawar, Pakistan
[3] Sungkyul Univ, Dept Multimedia, Anyang, South Korea
基金
新加坡国家研究基金会;
关键词
Active authentication; Edge orientation; Interaction trace maps; Shape features; Visual analysis; IDENTIFICATION;
D O I
10.1007/s11042-016-3450-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The availability and affordability of handheld smart devices have made life easier by enabling us to do work on the go. Their widespread use brings with it concerns relating to data security and privacy. The rising demand to secure private and highly confidential data found on smart devices has motivated researchers to devise means for ensuring privacy and security at all times. This kind of continuous user authentication scheme would add an additional layer of much needed security to smart devices. In this context, touch screen interactions have recently been studied as an effective modality to perform active user authentication on mobile devices. In this paper, a visual analysis based active authentication framework has been presented. Considering the touch screen as a canvas, interaction trace maps are constructed as a result of user interactions within various applications. The user touch gestures are captured and represented as drawing strokes on the canvas. The behavioral and physiological characteristics of users are modeled as signatures by combining texture and shape features from the interaction trace maps. A two-step mechanism with support vector machines exploit this signature to perform active user authentication. Experiments conducted with various datasets show that the proposed framework compares favorably with other state-of-the-art methods.
引用
收藏
页码:4069 / 4087
页数:19
相关论文
共 31 条
[21]  
Parhi P., 2006, P 8 C HUMAN COMPUTER, P203, DOI [DOI 10.1145/1152215.1152260, 10.1145/1152215.1152260]
[22]   Comparing internet and mobile phone usage: digital divides of usage, adoption, and dropouts [J].
Rice, RE ;
Katz, JE .
TELECOMMUNICATIONS POLICY, 2003, 27 (8-9) :597-623
[23]   LatentGesture: Active User Authentication through Background Touch Analysis [J].
Saravanan, Premkumar ;
Clarke, Samuel ;
Chau, Duen Horng ;
Zha, Hongyuan .
PROCEEDINGS OF CHINESE CHI 2014: SECOND INTERNATIONAL SYMPOSIUM OF CHINESE CHI (CHINESE CHI 2014), 2014, :110-113
[24]  
Serwadda A, 2013, 2013 IEEE SIXTH INTERNATIONAL CONFERENCE ON BIOMETRICS: THEORY, APPLICATIONS AND SYSTEMS (BTAS)
[25]   Scan-Based Evaluation of Continuous Keystroke Authentication Systems [J].
Serwadda, Abdul ;
Wang, Zibo ;
Koch, Patrick ;
Govindarajan, Sathya ;
Pokala, Raviteja ;
Goodkind, Adam ;
Brizan, David-Guy ;
Rosenberg, Andrew ;
Phoha, Vir V. ;
Balagani, Kiran .
IT PROFESSIONAL, 2013, 15 (04) :20-23
[26]   Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication [J].
Shen, Chao ;
Zhang, Yong ;
Guan, Xiaohong ;
Maxion, Roy A. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (03) :498-513
[27]  
Sim T, 2007, COMPUTER VISION PATT, P1
[28]   Online risk-based authentication using behavioral biometrics [J].
Traore, Issa ;
Woungang, Isaac ;
Obaidat, Mohammad S. ;
Nakkabi, Youssef ;
Lai, Iris .
MULTIMEDIA TOOLS AND APPLICATIONS, 2014, 71 (02) :575-605
[29]  
Vapnik VladimirNaumovich., 1998, STAT LEARNING THEORY, V2
[30]   Multimodal biometric authentication based on score level fusion using support vector machine [J].
Wang, F. ;
Han, J. .
OPTO-ELECTRONICS REVIEW, 2009, 17 (01) :59-64