Time series distances measures to analyze in-air signatures to authenticate users on mobile phones

Improving the security of mobile phones is one of the crucial points required to assure the personal information and the operations that can be performed from them. This article presents an authentication procedure consisting of verifying the identity of people by making a signature in the air while holding the mobile phone. Different temporal distance algorithms have been proposed and evaluated through a database of 50 people making their signatures in the air and 6 people trying to forge each of them by studying their records. Approaches based on DTW have obtained better EER results than those based on LCS (2.80% against 3.34%). Besides, different signal normalization methods have been evaluated not finding any with better EER results that when no normalization has carried out.

[1]  Shihong Lao,et al.  Security Management for Mobile Devices by Face Recognition , 2006, 7th International Conference on Mobile Data Management (MDM'06).

[2]  Anil K. Jain,et al.  Biometric Systems: Technology, Design and Performance Evaluation , 2004 .

[3]  Tzuu-Hseng S. Li,et al.  Design and implementation of interaction system between Humanoid robot and human hand gesture , 2010, Proceedings of SICE Annual Conference 2010.

[4]  Raymond N. J. Veldhuis,et al.  Biometric Authentication for a Mobile Personal Device , 2006 .

[5]  Manuel Bernal-Urbina,et al.  Dynamic signature verification through the Longest Common Subsequence Problem and Genetic Algorithms , 2010, IEEE Congress on Evolutionary Computation.

[6]  A. N. Rajagopalan,et al.  Off-line signature verification using DTW , 2007, Pattern Recognit. Lett..

[7]  Gonzalo Bailador,et al.  A Real-Time In-Air Signature Biometric Technique Using a Mobile Device Embedding an Accelerometer , 2010, NDT.

[8]  Yin-Te Tsai,et al.  The constrained longest common subsequence problem , 2003, Inf. Process. Lett..

[9]  Tom Fawcett,et al.  An introduction to ROC analysis , 2006, Pattern Recognit. Lett..

[10]  W. Marsden I and J , 2012 .

[11]  Steven Furnell,et al.  Authenticating mobile phone users using keystroke analysis , 2006, International Journal of Information Security.

[12]  Hyeran Byun,et al.  Visual recognition of aircraft marshalling signals using gesture phase analysis , 2008, 2008 IEEE Intelligent Vehicles Symposium.

[13]  Kang Ryoung Park,et al.  Iris Recognition in Mobile Phone Based on Adaptive Gabor Filter , 2006, ICB.

[14]  Muzaffar Bashir,et al.  Person authentication with RDTW based on handwritten PIN and signature with a novel biometric smart pen device , 2009, 2009 IEEE Workshop on Computational Intelligence in Biometrics: Theory, Algorithms, and Applications.

[15]  A. Anthony Irudhayaraj,et al.  Biometric system , 2011, 2011 3rd International Conference on Electronics Computer Technology.

[16]  Yanggon Kim,et al.  Pupil and Iris Localization for Iris Recognition in Mobile Phones , 2006, Seventh ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD'06).

[17]  P. Suganthi,et al.  Mobile Phones Security Using Biometrics , 2007, International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007).

[18]  John Chirillo,et al.  Implementing Biometric Security , 2003 .

[19]  S. Chiba,et al.  Dynamic programming algorithm optimization for spoken word recognition , 1978 .

[20]  Donald J. Berndt,et al.  Using Dynamic Time Warping to Find Patterns in Time Series , 1994, KDD Workshop.

[21]  Gonzalo Bailador,et al.  Score optimization and template updating in a biometric technique for authentication in mobiles based on gestures , 2011, J. Syst. Softw..

[22]  Kun-Mao Chao,et al.  A fast algorithm for computing a longest common increasing subsequence , 2005, Inf. Process. Lett..

[23]  Gonzalo Bailador,et al.  Acceleration Axis Selection in Biometric Technique Based on Gesture Recognition , 2010, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[24]  Sean R Eddy,et al.  What is dynamic programming? , 2004, Nature Biotechnology.

[25]  Shahrokh Valaee,et al.  Accelerometer-based gesture recognition via dynamic-time warping, affinity propagation, & compressive sensing , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.

[26]  L. Bergroth,et al.  A survey of longest common subsequence algorithms , 2000, Proceedings Seventh International Symposium on String Processing and Information Retrieval. SPIRE 2000.

[27]  Stan Salvador,et al.  FastDTW: Toward Accurate Dynamic Time Warping in Linear Time and Space , 2004 .

[28]  Eamonn J. Keogh,et al.  Derivative Dynamic Time Warping , 2001, SDM.

[29]  Daniel S. Hirschberg,et al.  Algorithms for the Longest Common Subsequence Problem , 1977, JACM.

[30]  N. Ramaraj,et al.  Enhancing the Efficiency of Regression Testing through Intelligent Agents , 2007, International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007).

[31]  Larry S. Davis,et al.  Towards 3-D model-based tracking and recognition of human movement: a multi-view approach , 1995 .