Eye-Movement and Touch Dynamics: A Proposed Approach for Activity Recognition of a Web User

Behavioral Profiling is the way in which the user interacts with the mobile sensors and services. Identifying the context in which users' interaction occur is an important step toward automatic interpretation of behavior. Activity Recognition and online task monitoring are required for various context aware applications. As a result, two sources of behavioral biometric data are investigated for the development of user Web identification models. The adopted approach is based on eye-gaze movements along with touch dynamics interactions. Fusing different behavioral biometric traits, i.e, the unique characteristics of eye movements and the distinctive way a person touches on a touchscreen device, can improve the identification accuracy.

[1]  Steven Furnell,et al.  Authenticating mobile phone users using keystroke analysis , 2006, International Journal of Information Security.

[2]  Marc Pomplun,et al.  Biometric Identification Through Eye-Movement Patterns , 2017 .

[3]  Shi-Yu Peng,et al.  Histamine excites neurons of the inferior vestibular nucleus in rats by activation of H1 and H2 receptors , 2013, Neuroscience Letters.

[4]  Ning Zhang,et al.  A survey on touch dynamics authentication in mobile devices , 2016, Comput. Secur..

[5]  Lei Gao,et al.  Discriminative Robust Gaze Estimation Using Kernel-DMCCA Fusion , 2018, 2018 IEEE International Symposium on Multimedia (ISM).

[6]  Cristina Conati,et al.  User-adaptive information visualization: using eye gaze data to infer visualization tasks and user cognitive abilities , 2013, IUI '13.

[7]  Yu Wang,et al.  TouchWB: Touch behavioral user authentication based on web browsing on smartphones , 2018, J. Netw. Comput. Appl..

[8]  Otto Lappi,et al.  A new and general approach to signal denoising and eye movement classification based on segmented linear regression , 2017, Scientific Reports.

[9]  M. Hayhoe,et al.  In what ways do eye movements contribute to everyday activities? , 2001, Vision Research.

[10]  Xiaohong Guan,et al.  Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication , 2016, IEEE Transactions on Information Forensics and Security.

[11]  Oleg V. Komogortsev,et al.  Biometric identification via eye movement scanpaths in reading , 2011, 2011 International Joint Conference on Biometrics (IJCB).

[12]  Alessandro Neri,et al.  User authentication using keystroke dynamics for cellular phones , 2009 .

[13]  M. Just,et al.  Eye fixations and cognitive processes , 1976, Cognitive Psychology.

[14]  Richa Singh,et al.  Ocular biometrics: A survey of modalities and fusion approaches , 2015, Inf. Fusion.

[15]  Brian P. Bailey,et al.  Using Eye Gaze Patterns to Identify User Tasks , 2004 .

[16]  Andrew Beng Jin Teoh,et al.  A Survey of Keystroke Dynamics Biometrics , 2013, TheScientificWorldJournal.

[17]  Gianni Fenu,et al.  Continuous Authentication on Smartphone by Means of Periocular and Virtual Keystroke , 2018, NSS.

[18]  Robert Sessions Woodworth,et al.  THE ACCURACY OF VOLUNTARY MOVEMENT , 1899 .

[19]  Jiankun Hu,et al.  Continuous Authentication Using Eye Movement Response of Implicit Visual Stimuli , 2018, Proc. ACM Interact. Mob. Wearable Ubiquitous Technol..

[20]  Norman Shapiro,et al.  Authentication by Keystroke Timing: Some Preliminary Results , 1980 .

[21]  I. V. McLoughlin,et al.  Keypress biometrics for user validation in mobile consumer devices , 2009, 2009 IEEE 13th International Symposium on Consumer Electronics.

[22]  M. Land,et al.  The Roles of Vision and Eye Movements in the Control of Activities of Daily Living , 1998, Perception.

[23]  M. Akila,et al.  Biometric personal authentication using keystroke dynamics: A review , 2011, Appl. Soft Comput..

[24]  Michele Nappi,et al.  Eye movement analysis for human authentication: a critical survey , 2016, Pattern Recognit. Lett..

[25]  Bijaya K. Panigrahi,et al.  Biometric Based Personal Authentication Using Eye Movement Tracking , 2013, SEMCCO.

[26]  Heather Crawford Keystroke dynamics: Characteristics and opportunities , 2010, 2010 Eighth International Conference on Privacy, Security and Trust.

[27]  Eric Horvitz,et al.  The Lumière Project: Bayesian User Modeling for Inferring the Goals and Needs of Software Users , 1998, UAI.

[28]  L. Kubin,et al.  Pontomedullary distribution of 5‐HT2A receptor‐like protein in the rat , 2000, The Journal of comparative neurology.