Biometric secret path for mobile user authentication: A preliminary study

In this paper, we study a recent biometric modality for user authentication on mobile devices. The proposed solution is a two-factor user authentication scheme and gives some high guarantees on user's identity. We first use the knowledge of user's password represented by a secret path on a grid composed of 9 points. Second, the behavior of the user while giving its path is analyzed to verify its identity. This solution is implemented as an Android application for mobile devices. Experimental results on an own made biometric database show promising results.

[1]  F. Williams Measuring the Information Society , 1988 .

[2]  Heinrich Hußmann,et al.  Touch me once and i know it's you!: implicit authentication based on touch screen patterns , 2012, CHI.

[3]  T. K. Vintsyuk Speech discrimination by dynamic programming , 1968 .

[4]  Nasir D. Memon,et al.  Investigating multi-touch gestures as a novel biometric modality , 2012, 2012 IEEE Fifth International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[5]  Javier Guerra-Casanova,et al.  Hand Biometrics in Mobile Devices , 2011 .

[6]  Steven Furnell,et al.  Advanced user authentication for mobile devices , 2007, Comput. Secur..

[7]  Jin-Suk Kang,et al.  Mobile iris recognition systems: An emerging biometric technology , 2010, ICCS.

[8]  Kwontaeg Choi,et al.  Realtime training on mobile devices for face recognition applications , 2011, Pattern Recognit..

[9]  Cheng-Jung Tsai,et al.  A graphical-based password keystroke dynamic authentication system for touch screen handheld mobile devices , 2012, J. Syst. Softw..

[10]  Shuo Wang,et al.  Biometrics on mobile phone , 2011 .

[11]  Matti Pietikäinen,et al.  Face and Eye Detection for Person Authentication in Mobile Phones , 2007, 2007 First ACM/IEEE International Conference on Distributed Smart Cameras.

[12]  Romit Roy Choudhury,et al.  Tapprints: your finger taps have fingerprints , 2012, MobiSys '12.

[13]  Uno Andre Johansen Keystroke Dynamics on a Device with Touch Screen , 2012 .

[14]  Fengshou Gu,et al.  Phase-compensation-based dynamic time warping for fault diagnosis using the motor current signal , 2012 .

[15]  Sébastien Marcel,et al.  A Fast Parts-Based Approach to Speaker Verification Using Boosted Slice Classifiers , 2012, IEEE Transactions on Information Forensics and Security.

[16]  Sungzoon Cho,et al.  Keystroke dynamics-based authentication for mobile devices , 2009, Comput. Secur..

[17]  Franci Pivec,et al.  Measuring the information society , 2003 .

[18]  Bradford J. Wing Mobile ID Device Best Practice Recommendation Version 2.0 , 2015 .

[19]  Vassilis Kekatos,et al.  Combined Speech Recognition and Speaker Verification over the Fixed and Mobile Telephone Networks , 2006, SPPRA.

[20]  Nasir D. Memon,et al.  Biometric-rich gestures: a novel approach to authentication on multi-touch devices , 2012, CHI.

[21]  Jacob Scharcanski,et al.  Signal and Image Processing for Biometrics , 2014 .