Unconscious mind: Authenticating with something you don't know? Or just an infallible liveness test?

Biometrics has become a major field of study in the area of computer security. Liveness tests complement biometric systems by introducing an extra level of authentication to prevent identity forgeries. In this abstract we present the fundamental ideas behind a new authentication paradigm that captures the individual's unique signature by measuring unconsciously motivated mistakes or actions. The robustness of our system relies on the hypothesis that each individual possesses behavioural characteristics that are brought about by some unique traits (i.e. how information is processed, categorized and accessed) that are not consciously accessible to the individual and can be measured as that individual's unique behavioural signature. We will refer to this unconsciously motivated behavioural signature as the unconsciousness signature. An implicit result includes the use of our proposed system as a liveness detection mechanism. Here we describe our hypotheses and provide a rationale that indicates their suitability for further studies as a new authentication paradigm.

[1]  R. B. Ewen An introduction to theories of personality , 1980 .

[2]  Chris Roberts,et al.  Biometric attack vectors and defences , 2007, Comput. Secur..

[3]  M. Banaji,et al.  Implicit social cognition: attitudes, self-esteem, and stereotypes. , 1995, Psychological review.

[4]  Arun Ross,et al.  An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.

[5]  A. Marcel Conscious and unconscious perception: Experiments on visual masking and word recognition , 1983, Cognitive Psychology.

[6]  Satoshi Hoshino,et al.  Impact of artificial "gummy" fingers on fingerprint systems , 2002, IS&T/SPIE Electronic Imaging.

[7]  Ben Shneiderman,et al.  Designing the User Interface: Strategies for Effective Human-Computer Interaction (4th Edition) , 2004 .

[8]  Timothy D. Wilson,et al.  Telling more than we can know: Verbal reports on mental processes. , 1977 .

[9]  B. R. Hergenhahn,et al.  An Introduction to Theories of Personality , 1984 .

[10]  Gregory D. Abowd,et al.  Human-Computer Interaction (3rd Edition) , 2003 .

[11]  Z. Dienes,et al.  A theory of implicit and explicit knowledge , 1999, Behavioral and Brain Sciences.

[12]  Ezequiel Morsella,et al.  The Unconscious Mind , 2008, Perspectives on psychological science : a journal of the Association for Psychological Science.

[13]  M. Chun,et al.  Implicit, long-term spatial contextual memory. , 2003, Journal of experimental psychology. Learning, memory, and cognition.

[14]  Paul P. Maglio,et al.  On Distinguishing Epistemic from Pragmatic Action , 1994, Cogn. Sci..

[15]  Joseph F. Dumas,et al.  A Practical Guide to Usability Testing , 1993 .

[16]  D. Schacter,et al.  Implicit and explicit memory for new associations in normal and amnesic subjects. , 1985, Journal of experimental psychology. Learning, memory, and cognition.

[17]  Daniel L. Silver,et al.  Keystroke and Eye-Tracking Biometrics for User Identification , 2006, IC-AI.

[18]  A. Greenwald,et al.  Measuring individual differences in implicit cognition: the implicit association test. , 1998, Journal of personality and social psychology.

[19]  E. Piaggio A Sensing Seat for Human Authentication , 2009 .

[20]  B. Schneirdeman,et al.  Designing the User Interface: Strategies for Effective Human-Computer Interaction , 1998 .

[21]  Dieter Gollmann,et al.  Computer Security , 1979, Lecture Notes in Computer Science.

[22]  Benjamin J. Halpert Authentication interface evaluation and design for mobile devices , 2005, InfoSecCD '05.

[23]  Julie Thorpe,et al.  Pass-thoughts: authenticating with our minds , 2005, NSPW '05.