ITSME: Multi-modal and Unobtrusive Behavioural User Authentication for Smartphones

In this paper, we propose a new multi-modal behavioural biometric that uses features collected while the user slide-unlocks the smartphone to answer a call. In particular, we use the slide swipe, the arm movement in bringing the phone close to the ear and voice recognition to implement our behaviour biometric. We implemented the method on a real phone and we present a controlled user study among 26 participants in multiple scenario’s to evaluate our prototype. We show that for each tested modality the Bayesian network classifier outperforms other classifiers (Random Forest algorithm and Sequential Minimal Optimization). The multimodal system using slide and pickup features improved the unimodal result by a factor two, with a FAR of 11.01 % and a FRR of 4.12 %. The final HTER was 7.57 %.

[1]  Arun Ross,et al.  Information fusion in biometrics , 2003, Pattern Recognit. Lett..

[2]  Erik Wästlund,et al.  Exploring Touch-Screen Biometrics for User Identification on Smart Phones , 2011, PrimeLife.

[3]  M. Picheny,et al.  Comparison of Parametric Representation for Monosyllabic Word Recognition in Continuously Spoken Sentences , 2017 .

[4]  Paul A. Viola,et al.  Robust Real-Time Face Detection , 2001, International Journal of Computer Vision.

[5]  Miguel A. Ferrer,et al.  Low Cost Multimodal Biometric identification System Based on Hand Geometry, Palm and Finger Print Texture , 2007, 2007 41st Annual IEEE International Carnahan Conference on Security Technology.

[6]  Nasir D. Memon,et al.  Biometric-rich gestures: a novel approach to authentication on multi-touch devices , 2012, CHI.

[7]  Venu Govindaraju,et al.  Behavioural biometrics: a survey and classification , 2008, Int. J. Biom..

[8]  Alphonse Bertillon,et al.  Signaletic instructions including the theory and practice of anthropometrical identification , 2022 .

[9]  Kwang-Seok Hong,et al.  Multimodal biometric authentication using teeth image and voice in mobile environment , 2008, IEEE Transactions on Consumer Electronics.

[10]  B. Shane Underwood,et al.  Top-Down Cracking Prediction Tool for Hot Mix Asphalt Pavements , 2012 .

[11]  Dawn Xiaodong Song,et al.  Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication , 2012, IEEE Transactions on Information Forensics and Security.

[12]  Heinrich Hußmann,et al.  Touch me once and i know it's you!: implicit authentication based on touch screen patterns , 2012, CHI.

[13]  Helen Marie Wood,et al.  The use of passwords for controlled access to computer resources. , 1977 .

[14]  Beth Logan,et al.  Mel Frequency Cepstral Coefficients for Music Modeling , 2000, ISMIR.

[15]  José Augusto Baranauskas,et al.  How Many Trees in a Random Forest? , 2012, MLDM.

[16]  Sharath Pankanti,et al.  Multi-modal biometrics for mobile authentication , 2014, IEEE International Joint Conference on Biometrics.

[17]  Robert P. W. Duin,et al.  Is independence good for combining classifiers? , 2000, Proceedings 15th International Conference on Pattern Recognition. ICPR-2000.

[18]  Paul A. Viola,et al.  Robust Real-time Object Detection , 2001 .

[19]  Steven Furnell,et al.  Multi-modal Behavioural Biometric Authentication for Mobile Devices , 2012, SEC.

[20]  Matti Pietikäinen,et al.  Bi-Modal Person Recognition on a Mobile Phone: Using Mobile Phone Data , 2012, 2012 IEEE International Conference on Multimedia and Expo Workshops.

[21]  Arun Ross,et al.  Handbook of Biometrics , 2007 .

[22]  Bruno Crispo,et al.  Touchstroke: Smartphone User Authentication Based on Touch-Typing Biometrics , 2015, ICIAP Workshops.

[23]  Christoph Busch,et al.  Unobtrusive User-Authentication on Mobile Phones Using Biometric Gait Recognition , 2010, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[24]  Blase Ur,et al.  Biometric authentication on iPhone and Android: Usability, perceptions, and influences on adoption , 2015 .

[25]  Mauro Conti,et al.  Mind how you answer me!: transparently authenticating the user of a smartphone when answering or placing a call , 2011, ASIACCS '11.

[26]  Samy Bengio,et al.  Database, protocols and tools for evaluating score-level fusion algorithms in biometric authentication , 2006, Pattern Recognit..

[27]  Raymond N. J. Veldhuis,et al.  Biometric Authentication for a Mobile Personal Device , 2006 .