An Approach for Authenticating Smartphone Users Based on Histogram Features

In this study, we propose to adopt histogram features obtained from smartphone sensors for building authentication models, which could be used to nonintrusively authenticate smartphone users in varying operating scenarios (e.g. standing and sitting) when engaged in using stationary apps. We adopted two smartphone sensors, namely touchscreen and orientation sensor, to evaluate their feasibility. Consequently, sixteen touch-based features and thirty-three orientation-based features were separately used to construct two authentication models. To evaluate the performance of two constructed models, thirty-five subjects joined for collecting experimental data in two operating scenarios, standing and sitting. The experimental results showed that the equal error rate (EER) of touch-based model was approximately 6.56% with features extracted from ten flick touch gestures and reduced to approximately 3.05% with sixty flick touch gestures. For orientation-based model, the EERs were approximately 10.27% and 7.07%, separately. The results showed that the histogram features of the adopted two sensors are feasible for authentication purpose. Specially, this study further discusses the phenomenon of multiple behavioral pattern over the adopted two sensors caused among different operating scenarios, such as standing and sitting.

[1]  Ahmed Awad E. Ahmed,et al.  A New Biometric Technology Based on Mouse Dynamics , 2007, IEEE Transactions on Dependable and Secure Computing.

[2]  Mauro Conti,et al.  Mind how you answer me!: transparently authenticating the user of a smartphone when answering or placing a call , 2011, ASIACCS '11.

[3]  Johannes Schöning,et al.  Falling asleep with Angry Birds, Facebook and Kindle: a large scale study on mobile application usage , 2011, Mobile HCI.

[4]  Kirsi Helkala,et al.  Biometric Gait Authentication Using Accelerometer Sensor , 2006, J. Comput..

[5]  Steven Furnell,et al.  Flexible and Transparent User Authentication for Mobile Devices , 2009, SEC.

[6]  Özgür Ulusoy,et al.  A histogram-based approach for object-based query-by-shape-and-color in image and video databases , 2005, Image Vis. Comput..

[7]  M. Grgic,et al.  A survey of biometric recognition methods , 2004, Proceedings. Elmar-2004. 46th International Symposium on Electronics in Marine.

[8]  Anil K. Jain,et al.  FVC2000: Fingerprint Verification Competition , 2002, IEEE Trans. Pattern Anal. Mach. Intell..

[9]  L. Hong,et al.  Can multibiometrics improve performance , 1999 .

[10]  M. Kubát An Introduction to Machine Learning , 2017, Springer International Publishing.

[11]  Mohammad Najmud Doja,et al.  USER AUTHENTICATION SCHEMES FOR MOBILE AND HANDHELD DEVICES , 2008 .

[12]  S Kullback,et al.  LETTER TO THE EDITOR: THE KULLBACK-LEIBLER DISTANCE , 1987 .

[13]  Jie Yang,et al.  Sweep fingerprint sequence reconstruction for portable devices , 2006 .

[14]  S SawhneyHarpreet,et al.  Efficient Color Histogram Indexing for Quadratic Form Distance Functions , 1995 .

[15]  Chih-Jen Lin,et al.  LIBSVM: A library for support vector machines , 2011, TIST.

[16]  Deron Liang,et al.  A New Non-Intrusive Authentication Method Based on the Orientation Sensor for Smartphone Users , 2012, 2012 IEEE Sixth International Conference on Software Security and Reliability.

[17]  Patrick Bours,et al.  Improved Cycle Detection for Accelerometer Based Gait Authentication , 2010, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[18]  Alain Forget,et al.  Shoulder-surfing resistance with eye-gaze entry in cued-recall graphical passwords , 2010, CHI.

[19]  Taekyoung Kwon,et al.  On the Privacy-Preserving HCI Issues , 2009, HCI.

[20]  Heikki Ailisto,et al.  Increasing Security of Mobile Devices by Decreasing User Effort in Verification , 2007, 2007 Second International Conference on Systems and Networks Communications (ICSNC 2007).

[21]  R. A. Leibler,et al.  On Information and Sufficiency , 1951 .

[22]  Volker Roth,et al.  A PIN-entry method resilient against shoulder surfing , 2004, CCS '04.

[23]  Deron Liang,et al.  A Preliminary Study on Non-Intrusive User Authentication Method Using Smartphone Sensors , 2013 .

[24]  Ugur Güdükbay,et al.  A Histogram-Based Approach for Object-Based Query-by-Shape-and-Color in Multimedia Databases , 2002 .

[25]  Huy Kang Kim,et al.  User Input Pattern-Based Authentication Method to Prevent Mobile E-Financial Incidents , 2011, 2011 IEEE Ninth International Symposium on Parallel and Distributed Processing with Applications Workshops.

[26]  Tao Feng,et al.  Continuous mobile authentication using touchscreen gestures , 2012, 2012 IEEE Conference on Technologies for Homeland Security (HST).

[27]  Ian Oakley,et al.  Obfuscating authentication through haptics, sound and light , 2011, CHI EA '11.

[28]  Deron Liang,et al.  A Novel Non-intrusive User Authentication Method Based on Touchscreen of Smartphones , 2013, 2013 International Symposium on Biometrics and Security Technologies.

[29]  Steven Furnell,et al.  Beyond the PIN: Enhancing user authentication for mobile devices , 2008 .

[30]  A. Ant Ozok,et al.  A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords , 2006, SOUPS '06.

[31]  Dugald Ralph Hutchings,et al.  Order and entropy in picture passwords , 2008, Graphics Interface.

[32]  Jun Yang,et al.  SenGuard: Passive user identification on smartphones using multiple sensors , 2011, 2011 IEEE 7th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[33]  James Lee Hafner,et al.  Efficient Color Histogram Indexing for Quadratic Form Distance Functions , 1995, IEEE Trans. Pattern Anal. Mach. Intell..

[34]  Steven Furnell,et al.  Authenticating mobile phone users using keystroke analysis , 2006, International Journal of Information Security.