Behavioral Biometrics Scheme with Keystroke and Swipe Dynamics for User Authentication on Mobile Platform

Due to the explosive growth of mobile devices worldwide, authentication is receiving increasing attention. Conventionally, explicit authentication methods such as password is employed. However, the system would be breached if the password is stolen. Therefore, there is a continual search for ways to strengthen authentication for mobile platforms. Behavioral biometric information such as keystroke and swipe dynamics can be used for enhancing security. This paper presents an authentication scheme which employs a combination of password, keystroke dynamics, and swipe dynamics for touchscreen mobile devices. Features extracted from swiping pattern and typing pattern were evaluated. Accuracy of the system was enhanced by using combined behavioral biometrics features, as compared with using only a single set of features. The identification accuracies increased significantly from the range of 63.03% - 88.30% to 86.59% -94.05%; while the F1 scores increased from the range of 60.42% - 85.96% to 85.43% - 93.15%.

[1]  Giancarlo Ruffo,et al.  Keystroke Analysis of Different Languages: A Case Study , 2005, IDA.

[2]  Tanapat Anusas-amornkul,et al.  Trajectory Mining for Keystroke Dynamics Authentication , 2013 .

[3]  Aaas News,et al.  Book Reviews , 1893, Buffalo Medical and Surgical Journal.

[4]  Chee Peng Lim,et al.  Keystroke Patterns Classification Using the ARTMAP-FD Neural Network , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[5]  Georgios Kambourakis,et al.  Introducing touchstroke: keystroke-based authentication system for smartphones , 2016, Secur. Commun. Networks.

[6]  David L. Hibler,et al.  Security Through Behavioral Biometrics and Artificial Intelligence , 2012, Complex Adaptive Systems.

[7]  Hai Huang,et al.  You Are How You Touch: User Verification on Smartphones via Tapping Behaviors , 2014, 2014 IEEE 22nd International Conference on Network Protocols.

[8]  H. Saevanee,et al.  User Authentication Using Combination of Behavioral Biometrics over the Touchpad Acting Like Touch Screen of Mobile Device , 2008, 2008 International Conference on Computer and Electrical Engineering.

[9]  John V. Monaco,et al.  Passcode Keystroke Biometric Performance on Smartphone Touchscreens is Superior to that on Hardware Keyboards , 2014 .

[10]  Raymond J Staron,et al.  Personal Attributes Authentication Techniques. , 1977 .

[11]  David Umphress,et al.  Identity Verification Through Keyboard Characteristics , 1985, Int. J. Man Mach. Stud..

[12]  B. Hussien,et al.  Computer-Access Security Systems Using Keystroke Dynamics , 1990, IEEE Trans. Pattern Anal. Mach. Intell..

[13]  Mudhafar M. Al-Jarrah,et al.  Statistical Keystroke Dynamics System on Mobile Devices for Experimental Data Collection and User Authentication , 2016, 2016 9th International Conference on Developments in eSystems Engineering (DeSE).

[14]  G. Padmavathi,et al.  A Survey of Biometric keystroke Dynamics: Approaches, Security and Challenges , 2009, ArXiv.

[15]  Rajneesh Kumar Pandey,et al.  Study and Analysis on Biometrics and Face Recognition Methods , 2016 .

[16]  Wahyudi,et al.  Keystroke Pressure-Based Typing Biometrics Authentication System Using Support Vector Machines , 2007, ICCSA.

[17]  M. S. Obaidat,et al.  Keystroke Dynamics Based Authentication , 1996 .

[18]  Patrick Bours Continuous keystroke dynamics: A different perspective towards biometric evaluation , 2012, Inf. Secur. Tech. Rep..

[19]  Norman Shapiro,et al.  Authentication by Keystroke Timing: Some Preliminary Results , 1980 .

[20]  Yash Shah,et al.  Literature Survey on Keystroke Dynamics for User Authentication , 2017 .

[21]  Ning Zhang,et al.  A survey on touch dynamics authentication in mobile devices , 2016, Comput. Secur..

[22]  Lior Rokach,et al.  User Authentication Based on Representative Users , 2012, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[23]  N.M. White,et al.  Use of a Novel Keypad Biometric for Enhanced User Identity Verification , 2008, 2008 IEEE Instrumentation and Measurement Technology Conference.

[24]  Stuart E. Schechter,et al.  Can i borrow your phone?: understanding concerns when sharing mobile phones , 2009, CHI.

[25]  Damon L. Woodard,et al.  Biometric Authentication and Identification using Keystroke Dynamics: A Survey , 2012 .

[26]  Andrew Beng Jin Teoh,et al.  A Survey of Keystroke Dynamics Biometrics , 2013, TheScientificWorldJournal.

[27]  Hongyuan Zha,et al.  LatentGesture: active user authentication through background touch analysis , 2014, Chinese CHI '14.

[28]  Danoush Hosseinzadeh,et al.  Gaussian Mixture Modeling of Keystroke Patterns for Biometric Applications , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[29]  Matthias Trojahn,et al.  Toward Mobile Authentication with Keystroke Dynamics on Mobile Phones and Tablets , 2013, 2013 27th International Conference on Advanced Information Networking and Applications Workshops.

[30]  Masahito Kurihara,et al.  Sensing Pressure for Authentication System Using Keystroke Dynamics , 2004, International Conference on Computational Intelligence.

[31]  Margit Antal,et al.  Keystroke Dynamics on Android Platform , 2015 .

[32]  Ahmad Faris Ismail,et al.  Design and Evaluation of a Pressure-Based Typing Biometric Authentication System , 2008, EURASIP J. Inf. Secur..

[33]  Florian Alt,et al.  Improving Accuracy, Applicability and Usability of Keystroke Biometrics on Mobile Touchscreen Devices , 2015, CHI.

[34]  Christophe Rosenberger,et al.  0 Keystroke Dynamics Authentication , 2011 .

[35]  Christophe Rosenberger,et al.  Keystroke Dynamics Overview , 2011 .

[36]  Anil K. Jain,et al.  An Introduction to Biometric Authentication Systems , 2005 .

[37]  Sung-Hyuk Cha,et al.  A Keystroke Biometric System for Long-Text Input , 2013 .