Behavioral, Cognitive and Virtual Biometrics

This chapter presents an overview and classification of security approaches based on computer analysis of human behavior. Overview of different methodologies is followed by an analysis of achieved accuracy rates, required equipment and prospects for future improvements. In particular the following broad categories of behavior-based authentication mechanisms are examined: Behavioral Biometrics (Authorship based, Human–Computer Interaction based, Motor Skill, and Purely Behavioral), Behavioral Passwords (syntactic, semantic, one-time methods and visual memory based), Biosignals (cognitive and semi-controllable biometrics) and Virtual Biometrics (representations of users in virtual worlds).

[1]  N. Stanietsky,et al.  The interaction of TIGIT with PVR and PVRL2 inhibits human NK cell cytotoxicity , 2009, Proceedings of the National Academy of Sciences.

[2]  Piotr Porwik,et al.  BIOMETRIC RECOGNITION SYSTEM BASED ON THE MOTION OF THE HUMAN BODY GRAVITY CENTRE ANALYSIS , 2010 .

[3]  S. K. Dahel,et al.  Accuracy performance analysis of multimodal biometrics , 2003, IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003..

[4]  Neil J. Henderson,et al.  Polymer thick-film sensors: possibilities for smartcard biometrics , 2001 .

[5]  Tomohiro Yamamura,et al.  A Driver Behavior Recognition Method Based on a Driver Model Framework , 2000 .

[6]  Tom E. Bishop,et al.  Blind Image Restoration Using a Block-Stationary Signal Model , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.

[7]  Juergen Luettin,et al.  Acoustic-labial speaker verification , 1997, Pattern Recognit. Lett..

[8]  Juha Röning,et al.  Methods for person identification on a pressure-sensitive floor: Experiments with multiple classifiers and reject option , 2008, Inf. Fusion.

[9]  Juergen Luettin,et al.  Speaker identification by lipreading , 1996, Proceeding of Fourth International Conference on Spoken Language Processing. ICSLP '96.

[10]  Nasir D. Memon,et al.  Authentication using graphical passwords: effects of tolerance and image choice , 2005, SOUPS '05.

[11]  Réjean Plamondon,et al.  Automatic signature verification and writer identification - the state of the art , 1989, Pattern Recognit..

[12]  Sharath Pankanti,et al.  Biometrics: Personal Identification in Networked Society , 2013 .

[13]  Anil K. Jain,et al.  Performance evaluation of fingerprint verification systems , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[14]  Roman V. Yampolskiy,et al.  PARAMETERIZED GENERATION OF AVATAR FACE DATASET , 2008 .

[15]  Larry Rudolph,et al.  Passdoodles; a Lightweight Authentication Method , 2004 .

[16]  Abdulmotaleb El-Saddik,et al.  Haptic: the new biometrics-embedded media to recognizing and quantifying human patterns , 2005, MULTIMEDIA '05.

[17]  Klaus Mueller,et al.  Dynamic Approach for Face Recognition Using Digital Image Skin Correlation , 2005, AVBPA.

[18]  Tom Hintz,et al.  Facial behavior as behavior biometric? an empirical study , 2007, 2007 IEEE International Conference on Systems, Man and Cybernetics.

[19]  Peter A. Dinda,et al.  Power to the people: Leveraging human physiological traits to control microprocessor frequency , 2008, 2008 41st IEEE/ACM International Symposium on Microarchitecture.

[20]  Martin R. Gibbs,et al.  Mediating intimacy: designing technologies to support strong-tie relationships , 2005, CHI.

[21]  Sharath Pankanti,et al.  Biometrics: a grand challenge , 2004, ICPR 2004.

[22]  Rolf Ingold,et al.  Combined Handwriting and Speech Modalities for User Authentication , 2009, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[23]  Venu Govindaraju,et al.  Dissimilarity functions for behavior-based biometrics , 2007, SPIE Defense + Commercial Sensing.

[24]  Carsten Maple,et al.  Musipass: authenticating me softly with "my" song , 2009, NSPW '09.

[25]  Shahram Latifi,et al.  A Survey of Unimodal Biometric Methods , 2006, Security and Management.

[26]  Moshe Koppel,et al.  Authorship verification as a one-class classification problem , 2004, ICML.

[27]  Michael Schatz,et al.  Learning Program Behavior Profiles for Intrusion Detection , 1999, Workshop on Intrusion Detection and Network Monitoring.

[28]  Kuldip K. Paliwal,et al.  Information fusion for robust speaker verification , 2001, INTERSPEECH.

[29]  David L. Dowe,et al.  Inductive Inference of Chess Player Strategy , 2000, PRICAI.

[30]  E. Delp,et al.  Security, steganography, and watermarking of multimedia contents , 2004 .

[31]  Mohammad Bagher Shamsollahi,et al.  Person Identification by Using AR Model for EEG Signals , 2007 .

[32]  Jan Ramon,et al.  Opponent modeling by analysing play , 2002 .

[33]  Venu Govindaraju,et al.  Behavioural biometrics: a survey and classification , 2008, Int. J. Biom..

[34]  José del R. Millán,et al.  Person Authentication Using Brainwaves (EEG) and Maximum A Posteriori Model Adaptation , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[35]  Mark S. Nixon,et al.  A floor sensor system for gait recognition , 2005, Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID'05).

[36]  Adrian Stoica Towards Recognition of Humans and their Behaviors from Space and Airborne Platforms: Extracting the Information in the Dynamics of Human Shadows , 2008, 2008 Bio-inspired, Learning and Intelligent Systems for Security.

[37]  Roman V. Yampolskiy Human Computer Interaction Based Intrusion Detection , 2007, Fourth International Conference on Information Technology (ITNG'07).

[38]  Lucas Ballard,et al.  Evaluating the Security of Handwriting Biometrics , 2006 .

[39]  Jeha Ryu,et al.  The User Identification System Using Walking Pattern over the ubiFloor , 2003 .

[40]  Karen Renaud,et al.  Quantifying the quality of web authentication mechanisms: a usability perspective , 2004 .

[41]  Anil K. Jain,et al.  Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.

[42]  Roland Auckenthaler,et al.  Lip signatures for automatic person recognition , 1999, 1999 IEEE Third Workshop on Multimedia Signal Processing (Cat. No.99TH8451).

[43]  Daniel P. Lopresti,et al.  Biometric Authentication Revisited: Understanding the Impact of Wolves in Sheep's Clothing , 2006, USENIX Security Symposium.

[44]  Stephanie Schuckers,et al.  Spoofing and Anti-Spoofing Measures , 2002, Inf. Secur. Tech. Rep..

[45]  Jin-Woo Jung,et al.  Dynamic-footprint based person identification using mat-type pressure sensor , 2003, Proceedings of the 25th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (IEEE Cat. No.03CH37439).

[46]  Pieter H. Hartel,et al.  Biometric verification based on grip-pattern recognition , 2004, IS&T/SPIE Electronic Imaging.

[47]  Richard P. Ayers,et al.  Picture Password: A Visual Login Technique for Mobile Devices , 2003 .

[48]  Issa Traoré,et al.  New Physiological Biometrics Based on Human Cognitive Factors , 2009, 2009 International Conference on Complex, Intelligent and Software Intensive Systems.

[49]  Ron Henderson,et al.  Cost-effective computer security: cognitive and associative passwords , 1996, Proceedings Sixth Australian Conference on Computer-Human Interaction.

[50]  Neil M. White,et al.  Sensing pressure for authentication , 2002 .

[51]  Xiaofan Lin,et al.  Phoneme-less hierarchical accent classification , 2004, Conference Record of the Thirty-Eighth Asilomar Conference on Signals, Systems and Computers, 2004..

[52]  Mikael Lindvall in Software Engineering , 2002 .

[53]  Arun Ross,et al.  An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.

[54]  Ryo Kurazume,et al.  Person Identification using Shadow Analysis , 2010, BMVC.

[55]  P. Bhattarakosol,et al.  Authenticating User Using Keystroke Dynamics and Finger Pressure , 2009, 2009 6th IEEE Consumer Communications and Networking Conference.

[56]  Arslan Brömme,et al.  Using an Active Shape Structural Model for Biometric Sketch Recognition , 2003, DAGM-Symposium.

[57]  Malcolm Crompton,et al.  Biometrics and Privacy the End of the World as We Know it or the White Knight of Privacy? , 2004 .

[58]  O. Aalen,et al.  Understanding the shape of the hazard rate: A proce ss point of view , 2002 .

[59]  Roman V. Yampolskiy,et al.  Action-based user authentication , 2008, Int. J. Electron. Secur. Digit. Forensics.

[60]  Tieniu Tan,et al.  Biometric personal identification based on handwriting , 2000, Proceedings 15th International Conference on Pattern Recognition. ICPR-2000.

[61]  Ioannis Pitas,et al.  Recent advances in biometric person authentication , 2002, 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[62]  Roy A. Maxion,et al.  Masquerade detection using truncated command lines , 2002, Proceedings International Conference on Dependable Systems and Networks.

[63]  David R. Bull,et al.  Projective image restoration using sparsity regularization , 2013, 2013 IEEE International Conference on Image Processing.

[64]  Sharath Pankanti,et al.  Guide to Biometrics , 2003, Springer Professional Computing.

[65]  Peter John Graham,et al.  The new wave , 1968 .

[66]  Dorothy E. Denning,et al.  An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.

[67]  Richard Youmaran,et al.  Towards a Measure of Biometric Information , 2006, 2006 Canadian Conference on Electrical and Computer Engineering.

[68]  Venu Govindaraju,et al.  Accent classification in speech , 2005, Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID'05).

[69]  Jiqing Zhang,et al.  People Identification Using Floor Pressure Sensing and Analysis , 2010, IEEE Sensors Journal.

[70]  Tracy L. Westeyn,et al.  Recognizing song-based blink patterns: applications for restricted and universal access , 2004, Sixth IEEE International Conference on Automatic Face and Gesture Recognition, 2004. Proceedings..

[71]  Hans van Halteren,et al.  Linguistic Profiling for Authorship Recognition and Verification , 2004, ACL.

[72]  Ana L. N. Fred,et al.  An Identity Authentication System Based On Human Computer Interaction Behaviour , 2003, PRIS.

[73]  Raymond N. J. Veldhuis,et al.  Grip-Pattern Recognition for Smart Guns , 2003 .

[74]  Peter L. Williams,et al.  Gray's Anatomy: The Anatomical Basis of Medicine and Surgery , 1996 .

[75]  Paul L. Rosin,et al.  Assessing the Uniqueness and Permanence of Facial Actions for Use in Biometric Applications , 2010, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[76]  A. Murat Tekalp,et al.  Multimodal person recognition for human-vehicle interaction , 2006, IEEE Multimedia.

[77]  Efstathios Stamatatos,et al.  Source Code Authorship Analysis For Supporting the Cybercrime Investigation Process , 2010, Handbook of Research on Computational Forensics, Digital Crime, and Investigation.

[78]  V. S. Nalwa Automatic on-line signature verification , 1997 .

[79]  Harold Joseph Highland,et al.  15th National Computer Security Conference , 1993 .

[80]  I. Traore,et al.  Anomaly intrusion detection based on biometrics , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.

[81]  Efstathios Stamatatos,et al.  Automatic Authorship Attribution , 1999, EACL.

[82]  Arun Ross,et al.  Score normalization in multimodal biometric systems , 2005, Pattern Recognit..

[83]  A.K. Jain,et al.  Webbiometrics: User Verification Via Web Interaction , 2007, 2007 Biometrics Symposium.

[84]  Ralf Steinmetz,et al.  Biometric applications based on handwriting , 2002, Proceedings. IEEE International Conference on Multimedia and Expo.

[85]  S. Sridharan,et al.  Gaze based user authentication for personal computer applications , 2004, Proceedings of 2004 International Symposium on Intelligent Multimedia, Video and Speech Processing, 2004..

[86]  Alex Pentland,et al.  Graphical models for driver behavior recognition in a SmartCar , 2000, Proceedings of the IEEE Intelligent Vehicles Symposium 2000 (Cat. No.00TH8511).

[87]  Karen Renaud Quantifying the quality of web authentication mechanisms , 2004 .

[88]  Neill W Campbell,et al.  ACM Multimedia 98 , 1998 .

[89]  R.V. Yampolskiy Indirect Human Computer Interaction-Based Biometrics for Intrusion Detection Systems , 2007, 2007 41st Annual IEEE International Carnahan Conference on Security Technology.

[90]  A. Garg,et al.  Profiling Users in GUI Based Systems for Masquerade Detection , 2006, 2006 IEEE Information Assurance Workshop.

[91]  Anil K. Jain,et al.  Soft Biometric Traits for Personal Recognition Systems , 2004, ICBA.

[92]  Tom Fawcett,et al.  Adaptive Fraud Detection , 1997, Data Mining and Knowledge Discovery.

[93]  S. Cerutti,et al.  Quantitative evaluation of distant student psychophysical responses during the e-learning processes , 2005, 2005 IEEE Engineering in Medicine and Biology 27th Annual Conference.

[94]  Larry S. Davis,et al.  Person identification using automatic height and stride estimation , 2002, Object recognition supported by user interaction for service robots.

[95]  V N P Dao,et al.  Profiling users in the UNIX os environment , 2000 .

[96]  Gregory D. Abowd,et al.  The smart floor: a mechanism for natural user identification and tracking , 2000, CHI Extended Abstracts.

[97]  Adrian Perrig,et al.  This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. Déjà Vu: A User Study Using Images for Authentication , 2000 .

[98]  Issa Traoré,et al.  Detecting Computer Intrusions Using Behavioral Biometrics , 2005, PST.

[99]  Olga Papaemmanouil,et al.  Dynamic Recommendations in Internet Retailing , 2001, ECIS.

[100]  Richard A. Kemmerer,et al.  State Transition Analysis: A Rule-Based Intrusion Detection Approach , 1995, IEEE Trans. Software Eng..

[101]  Ana L. N. Fred,et al.  A behavioral biometric system based on human-computer interaction , 2004, SPIE Defense + Commercial Sensing.

[102]  Paola Britos,et al.  Detecting Fraud in Mobile Telephony Using Neural Networks , 2005, IEA/AIE.

[103]  Hsin-Min Wang,et al.  Automatic singer recognition of popular music recordings via estimation and modeling of solo vocal signals , 2006, IEEE Transactions on Audio, Speech, and Language Processing.

[104]  Eugene H. Spafford,et al.  Software forensics: Can we track code to its authors? , 1993, Comput. Secur..

[105]  Hong Kong 2001 International Symposium on Intelligent Multimedia, Video and Speech Processing , 2001 .

[106]  Akinori Ito,et al.  Smile and laughter recognition using speech processing and face recognition from conversation video , 2005, 2005 International Conference on Cyberworlds (CW'05).

[107]  A. El Saddik,et al.  Automatic Identification of Participants in Haptic Systems , 2005, 2005 IEEE Instrumentationand Measurement Technology Conference Proceedings.

[108]  Antonella De Angeli,et al.  USABILITY AND USER AUTHENTICATION: PICTORIAL PASSWORDS VS. PIN , 2004 .

[109]  Salvatore J. Stolfo,et al.  Combining Behavior Models to Secure Email Systems , 2003 .

[110]  Josef Kittler,et al.  Audio- and Video-Based Biometric Person Authentication, 5th International Conference, AVBPA 2005, Hilton Rye Town, NY, USA, July 20-22, 2005, Proceedings , 2005, AVBPA.

[111]  Marina L. Gavrilova,et al.  Applying Biometric Principles to Avatar Recognition , 2010, 2010 International Conference on Cyberworlds.

[112]  Mark E. Oxley,et al.  Cohort selection and word grammar effects for speaker recognition , 1996, 1996 IEEE International Conference on Acoustics, Speech, and Signal Processing Conference Proceedings.

[113]  Young-Bae Kim,et al.  International Conference on Control, Automation and Systems , 2007 .

[114]  Zygmunt Ciota Speaker verification for multimedia application , 2004, 2004 IEEE International Conference on Systems, Man and Cybernetics (IEEE Cat. No.04CH37583).

[115]  Venu Govindaraju,et al.  Behavioral biometrics for verification and recognition of malicious software agents , 2008, SPIE Defense + Commercial Sensing.

[116]  Gang Qian,et al.  People Identification Using Gait Via Floor Pressure Sensing and Analysis , 2008, EuroSSC.

[117]  Jr. J.P. Campbell,et al.  Speaker recognition: a tutorial , 1997, Proc. IEEE.

[118]  Hakan Erdogan,et al.  Multi-modal Person Recognition for Vehicular Applications , 2005, Multiple Classifier Systems.

[119]  A. Karr,et al.  Computer Intrusion: Detecting Masquerades , 2001 .

[120]  Alexey Tsymbal,et al.  The problem of concept drift: definitions and related work , 2004 .

[121]  Yongjian Fu,et al.  A Framework for Personal Web Usage Mining , 2002, International Conference on Internet Computing.

[122]  Rüdiger W. Brause,et al.  Neural data mining for credit card fraud detection , 1999, Proceedings 11th International Conference on Tools with Artificial Intelligence.

[123]  Wing Hong Lau,et al.  Person authentication using ASM based lip shape and intensity information , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[124]  M. Grgic,et al.  A survey of biometric recognition methods , 2004, Proceedings. Elmar-2004. 46th International Symposium on Electronics in Marine.

[125]  Venu Govindaraju,et al.  Use of behavioral biometrics in intrusion detection and online gaming , 2006, SPIE Defense + Commercial Sensing.

[126]  Francesco Beritelli,et al.  Biometric Identification Based on Frequency Analysis of Cardiac Sounds , 2007, IEEE Transactions on Information Forensics and Security.

[127]  Rama Chellappa,et al.  Identification of humans using gait , 2004, IEEE Transactions on Image Processing.

[128]  Julie Thorpe,et al.  Pass-thoughts: authenticating with our minds , 2005, NSPW '05.

[129]  Clinton Fookes,et al.  A visual attention approach to personal identification , 2003 .

[130]  Hamid Aghvami,et al.  Dynamic QoS Aware Route Optimization for Networks with Mobility Agents , 2009, 2009 6th IEEE Consumer Communications and Networking Conference.

[131]  Mark S. Nixon,et al.  On gait as a biometric: Progress and prospects , 2004, 2004 12th European Signal Processing Conference.

[132]  Weibo Gong,et al.  Anomaly detection using call stack information , 2003, 2003 Symposium on Security and Privacy, 2003..

[133]  Salvatore J. Stolfo,et al.  A Behavior-Based Approach to Securing Email Systems , 2003, MMM-ACNS.

[134]  Vinayak Ashok Bharadi Biometric Authentication Systems , 2012 .

[135]  Kimihiro Yamanaka,et al.  A Biometric Identification Using the Motion of Fingers , 2009, 2009 International Conference on Biometrics and Kansei Engineering.

[136]  Karen Renaud,et al.  PASSWORD CUEING WITH CUE(INK)BLOTS 1 , 2008 .

[137]  Susan Wiedenbeck,et al.  Authentication Using Graphical Passwords: Basic Results , 2005 .

[138]  Nasrullah Memon,et al.  The Role of Service Oriented Architecture in Telemedicine Healthcare System , 2009, 2009 International Conference on Complex, Intelligent and Software Intensive Systems.

[139]  Brian A. Jacob,et al.  To Catch a Cheat. , 2004 .

[140]  Kenneth Revett,et al.  Behavioral Biometrics: A Remote Access Approach , 2008 .

[141]  Carla E. Brodley,et al.  User re-authentication via mouse movements , 2004, VizSEC/DMSEC '04.

[142]  Craig A. N. Soules,et al.  Storage-based Intrusion Detection: Watching Storage Activity for Suspicious Behavior , 2003, USENIX Security Symposium.

[143]  Venu Govindaraju,et al.  ER2: an intuitive similarity measure for on-line signature verification , 2004, IWFHR.

[144]  Ivan Koychev,et al.  Adaptation to Drifting User's Interests , 2000 .

[145]  Sameer Singh International Conference on Advances in Pattern Recognition , 1999, Springer London.

[146]  Woontack Woo,et al.  User Identification Using User's Walking Pattern over the ubiFloorII , 2005, CIS.

[147]  Jude W. Shavlik,et al.  Learning users' interests by unobtrusively observing their normal behavior , 2000, IUI '00.

[148]  F. Livesey,et al.  The ORL active floor [sensor system] , 1997, IEEE Wirel. Commun..

[149]  Anil K. Jain,et al.  On-line signature verification, , 2002, Pattern Recognit..

[150]  Sridha Sridharan,et al.  Person authentication using lip information , 1997, TENCON '97 Brisbane - Australia. Proceedings of IEEE TENCON '97. IEEE Region 10 Annual Conference. Speech and Image Technologies for Computing and Telecommunications (Cat. No.97CH36162).

[151]  Michael J. Lyons,et al.  Avatar creation using automatic face processing , 1998, MULTIMEDIA '98.

[152]  Nalini K. Ratha,et al.  Automated Biometrics , 2001, ICAPR.

[153]  Abdulmotaleb El-Saddik,et al.  Haptic-Based Biometrics: A Feasibility Study , 2006, 2006 14th Symposium on Haptic Interfaces for Virtual Environment and Teleoperator Systems.

[154]  Julie Thorpe,et al.  Towards secure design choices for implementing graphical passwords , 2004, 20th Annual Computer Security Applications Conference.

[155]  Sargur N. Srihari,et al.  Image Pattern Recognition - Synthesis and Analysis in Biometrics , 2007, Image Pattern Recognition.

[156]  Nasir D. Memon,et al.  PassPoints: Design and longitudinal evaluation of a graphical password system , 2005, Int. J. Hum. Comput. Stud..

[157]  Hyeyoung Park,et al.  A New Similarity Measure Based on Intraclass Statistics for Biometrie Systems , 2003 .

[158]  Siwei Lyu,et al.  A digital technique for art authentication , 2004, Proc. Natl. Acad. Sci. USA.

[159]  Patrick Brézillon,et al.  Lecture Notes in Artificial Intelligence , 1999 .

[160]  A. Bromme A classification of biometric signatures , 2003, 2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698).

[161]  Daniel J. Ragsdale,et al.  A hybrid approach to the profile creation and intrusion detection , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.

[162]  Omar Hamdy,et al.  Cognitive-Based Biometrics System for Static User Authentication , 2009, 2009 Fourth International Conference on Internet Monitoring and Protection.

[163]  Anil K. Jain,et al.  Can soft biometric traits assist user recognition? , 2004, SPIE Defense + Commercial Sensing.

[164]  Claudia Picardi,et al.  User authentication through keystroke dynamics , 2002, TSEC.

[165]  Arslan Brömme,et al.  Multifactor Biometric Sketch Authentication , 2003, BIOSIG.

[166]  Michael K. Reiter,et al.  The Design and Analysis of Graphical Passwords , 1999, USENIX Security Symposium.

[167]  Arun Ross,et al.  Biometric Technology for Human Identification IV , 2007 .

[168]  George M. Mohay,et al.  Mining e-mail content for author identification forensics , 2001, SGMD.

[169]  Salvatore J. Stolfo,et al.  Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses , 2002, RAID.

[170]  F. Livesey,et al.  The ORL Acfive Floor , 1997 .