Predicting sex as a soft-biometrics from device interaction swipe gestures

This paper presents an exploratory analysis of sex prediction from swipe gestures.Details of the software and data collection protocol are provided for reproducibility.The BestFirst feature selection technique has been analysed.Naive Bayes, logistic regression, SVM and decision tree classifiers have been tested.The results confirm the possibility of sex prediction from swipe gestures. Touch and multi-touch gestures are becoming the most common way to interact with technology such as smart phones, tablets and other mobile devices. The latest touch-screen input capacities have tremendously increased the quantity and quality of available gesture data, which has led to the exploration of its use in multiple disciplines from psychology to biometrics. Following research studies undertaken in similar modalities such as keystroke and mouse usage biometrics, the present work proposes the use of swipe gesture data for the prediction of soft-biometrics, specifically the user's sex. This paper details the software and protocol used for the data collection, the feature set extracted and subsequent machine learning analysis. Within this analysis, the BestFirst feature selection technique and classification algorithms (naive Bayes, logistic regression, support vector machine and decision tree) have been tested. The results of this exploratory analysis have confirmed the possibility of sex prediction from the swipe gesture data, obtaining an encouraging 78% accuracy rate using swipe gesture data from two different directions. These results will hopefully encourage further research in this area, where the prediction of soft-biometrics traits from swipe gesture data can play an important role in enhancing the authentication processes based on touch-screen devices.

[1]  Anil K. Jain,et al.  Soft Biometric Traits for Continuous User Authentication , 2010, IEEE Transactions on Information Forensics and Security.

[2]  Mariusz Ziólko,et al.  Logitboost weka classifier speech segmentation , 2008, 2008 IEEE International Conference on Multimedia and Expo.

[3]  Nasir D. Memon,et al.  Investigating multi-touch gestures as a novel biometric modality , 2012, 2012 IEEE Fifth International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[4]  Ian H. Witten,et al.  The WEKA data mining software: an update , 2009, SKDD.

[5]  Erik Wästlund,et al.  Exploring Touch-Screen Biometrics for User Identification on Smart Phones , 2011, PrimeLife.

[6]  Claudio A. Perez,et al.  Gender Classification from Iris Images Using Fusion of Uniform Local Binary Patterns , 2014, ECCV Workshops.

[7]  Xiang-Yang Li,et al.  SilentSense: silent user identification via touch and movement behavioral biometrics , 2013, MobiCom.

[8]  Jeffrey Erman,et al.  Internet Traffic Identification using Machine Learning , 2006 .

[9]  Ji Zheng,et al.  A support vector machine classifier with automatic confidence and its application to gender classification , 2011, Neurocomputing.

[10]  Wei Hu,et al.  The Security Analysis of Graphical Passwords , 2010, 2010 International Conference on Communications and Intelligence Information Security.

[11]  Karim Faez,et al.  Gender Classification Using a Novel Gait Template: Radon Transform of Mean Gait Energy Image , 2011, ICIAR.

[12]  J. Ross Quinlan,et al.  C4.5: Programs for Machine Learning , 1992 .

[13]  N. Hamdy,et al.  Soft and hard biometrics fusion for improved identity verification , 2004, The 2004 47th Midwest Symposium on Circuits and Systems, 2004. MWSCAS '04..

[14]  Agata Kolakowska,et al.  A review of emotion recognition methods based on keystroke dynamics and mouse movements , 2013, 2013 6th International Conference on Human System Interactions (HSI).

[15]  J. Erman,et al.  QRP05-4: Internet Traffic Identification using Machine Learning , 2006, IEEE Globecom 2006.

[16]  Corinna Cortes,et al.  Support-Vector Networks , 1995, Machine Learning.

[17]  Cheng Li,et al.  Exploiting biometric measurements for prediction of emotional state: A preliminary study for healthcare applications using keystroke analysis , 2014, 2014 IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (BIOMS) Proceedings.

[18]  Durga Toshniwal,et al.  Predicting Burn Patient Survivability Using Decision Tree In WEKA Environment , 2009, 2009 IEEE International Advance Computing Conference.

[19]  Johannes Peltola,et al.  Soft biometrics - combining body weight and fat measurements with fingerprint biometrics , 2006, Pattern Recognit. Lett..

[20]  Tao Feng,et al.  Continuous mobile authentication using touchscreen gestures , 2012, 2012 IEEE Conference on Technologies for Homeland Security (HST).

[21]  Mary Czerwinski,et al.  Under pressure: sensing stress of computer users , 2014, CHI.

[22]  P. Gnanasivam,et al.  Fingerprint Gender Classification using Wavelet Transform and Singular Value Decomposition , 2012, ArXiv.

[23]  Bok-Min Goi,et al.  Recognizing Human Gender in Computer Vision: A Survey , 2012, PRICAI.

[24]  Surinder Singh Khurana,et al.  Comparison of classification techniques for intrusion detection dataset using WEKA , 2014, International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014).

[25]  Anil K. Jain,et al.  Face Matching and Retrieval Using Soft Biometrics , 2010, IEEE Transactions on Information Forensics and Security.

[26]  Subhransu Maji,et al.  Describing people: A poselet-based approach to attribute classification , 2011, 2011 International Conference on Computer Vision.

[27]  E. A. Johnson,et al.  Touch display--a novel input/output device for computers , 1965 .

[28]  Chris Bevan,et al.  Different strokes for different folks? Revealing the physical characteristics of smartphone users from their swipe gestures , 2016, Int. J. Hum. Comput. Stud..

[29]  Christophe Rosenberger,et al.  Soft biometrics for keystroke dynamics: Profiling individuals while typing passwords , 2014, Comput. Secur..

[30]  Anil K. Jain,et al.  Soft Biometric Traits for Personal Recognition Systems , 2004, ICBA.

[31]  David D. Lewis,et al.  Naive (Bayes) at Forty: The Independence Assumption in Information Retrieval , 1998, ECML.

[32]  Richard M. Guest,et al.  Biometrics within the SuperIdentity project: A new approach to spanning multiple identity domains , 2014, 2014 International Carnahan Conference on Security Technology (ICCST).

[33]  Huan Liu,et al.  Feature Selection for Classification , 1997, Intell. Data Anal..

[34]  Sadie Creese,et al.  SuperIdentity: Fusion of Identity across Real and Cyber Domains , 2012 .

[35]  D. Hosmer,et al.  Applied Logistic Regression , 1991 .

[36]  Chih-Jen Lin,et al.  LIBSVM: A library for support vector machines , 2011, TIST.

[37]  Mircea Nicolescu,et al.  Gender classification from hand shape , 2008, 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.