A Biometric Approach for Continuous User Authentication by Fusing Hard and Soft Traits

Most existing computer and network systems authenticate a user only at the initial login session. This could be a critical security weakness, especially for high-security systems because it enables an impostor to access the system resources with the initial access permission. To address this security flaw, Continuous authentication of the user is necessary, to continuously monitors and authenticates the user throughout the session. Existing continuous authentication schemes primarily uses hard biometric traits, which is inconvenient to the user. To mitigate this problem, a new continuous user authentication scheme is designed to authenticate the user irrespective of their posture in front of the system. The system continuously monitors the user by using soft biometrics (color of user’s clothing and facial skin) along with hard biometrics. It automatically registers soft biometric traits every time the user logs in and fuses soft biometric matching with the conventional face biometric authentication.

[1]  Matti Pietikäinen,et al.  Face Recognition by Exploring Information Jointly in Space, Scale and Orientation , 2011, IEEE Transactions on Image Processing.

[2]  Siraj Ahmed Shaikh,et al.  A Biometric Authentication Protocol for 3G Mobile Systems: Modelled and Validated Using CSP and Rank Functions , 2007, Int. J. Netw. Secur..

[3]  Mingwu Zhang,et al.  Multibiometric Based Secure Encryption, Authentication Scheme with Fuzzy Extractor , 2011, Int. J. Netw. Secur..

[4]  Dorin Comaniciu,et al.  Mean Shift: A Robust Approach Toward Feature Space Analysis , 2002, IEEE Trans. Pattern Anal. Mach. Intell..

[5]  Shanq-Jang Ruan,et al.  A Simple and Accurate Color Face Detection Algorithm in Complex Background , 2006, 2006 IEEE International Conference on Multimedia and Expo.

[6]  Stanislav Kurkovsky,et al.  Approaches and Issues in Location-Aware Continuous Authentication , 2010, 2010 13th IEEE International Conference on Computational Science and Engineering.

[7]  Vijayan K. Asari,et al.  Face detection technique based on intensity and skin color distribution , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[8]  Anil K. Jain,et al.  Soft Biometric Traits for Continuous User Authentication , 2010, IEEE Transactions on Information Forensics and Security.

[9]  Graça Bressan,et al.  A Continuous Authentication System Based on User Behavior Analysis , 2010, 2010 International Conference on Availability, Reliability and Security.

[10]  Stan Z. Li,et al.  Face Recognition with Local Gabor Textons , 2007, ICB.

[11]  Wen Gao,et al.  Local Gabor binary pattern histogram sequence (LGBPHS): a novel non-statistical model for face representation and recognition , 2005, Tenth IEEE International Conference on Computer Vision (ICCV'05) Volume 1.

[12]  M. R. Spiegel E and M , 1981 .

[13]  Azad M. Madni,et al.  Leveraging Biometrics for User Authentication in Online Learning: A Systems Perspective , 2009, IEEE Systems Journal.

[14]  Min-Shiang Hwang,et al.  A modified remote user authentication scheme using smart cards , 2003, IEEE Trans. Consumer Electron..

[15]  Arslan Brömme,et al.  A Risk Analysis Approach for Biometric Authentication Technology , 2006, Int. J. Netw. Secur..

[16]  Sandeep Kumar,et al.  Using continuous biometric verification to protect interactive login sessions , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).

[17]  G. Jaffré,et al.  Costume: a new feature for automatic video content indexing , 2004 .

[18]  Matti Pietikäinen,et al.  Face Description with Local Binary Patterns: Application to Face Recognition , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[19]  Cheng-Chi Lee,et al.  Security Enhancement on a New Authentication Scheme With Anonymity for Wireless Environments , 2006, IEEE Transactions on Industrial Electronics.

[20]  Cheng-Chi Lee,et al.  A password authentication scheme over insecure networks , 2006, J. Comput. Syst. Sci..

[21]  Peter Xiaoping Liu,et al.  Structural Results for Combined Continuous User Authentication and Intrusion Detection in High Security Mobile Ad-Hoc Networks , 2011, IEEE Transactions on Wireless Communications.

[22]  Colin Boyd,et al.  User-representative feature selection for keystroke dynamics , 2011, 2011 5th International Conference on Network and System Security.

[23]  Yu Xiuyuan A Modified Remote User Authentication Scheme Using Smart Cards , 2008 .