SCANet

Continuous authentication monitors the security of a system throughout the login session on mobile devices. In this paper, we present SCANet, a two-stream convolutional neural network based continuous authentication system that leverages the accelerometer and gyroscope on smartphones to monitor users’ behavioral patterns. We are among the first to use two streams of data frequency domain data and temporal difference domain data from the two sensors as the inputs of the convolutional neural network (CNN). SCANet utilizes the two-stream CNN to learn and extract representative features, and then performs the principal component analysis (PCA) to select the top 25 features with high discriminability. With the CNN-extracted features, SCANet exploits the one-class support vector machine (one-class SVM) to train the classifier in the enrollment phase. Based on the trained CNN and classifier, SCANet identifies the current user as a legitimate user or an impostor in the continuous authentication phase. We evaluate the effectiveness of the two-stream CNN and the performance of SCANet on our dataset and BrainRun dataset, and the experimental results demonstrate that CNN achieves 90.04% accuracy, and SCANet reaches an average of 5.14% equal error rate (EER) on two datasets and takes approximately 3 seconds for user authentication.

[1]  Matteo Gadaleta,et al.  IDNet: Smartphone-based Gait Recognition with Convolutional Neural Networks , 2016, Pattern Recognit..

[2]  Guoliang Xue,et al.  Unobservable Re-authentication for Smartphones , 2013, NDSS.

[3]  Oral Büyüköztürk,et al.  Deep Learning‐Based Crack Damage Detection Using Convolutional Neural Networks , 2017, Comput. Aided Civ. Infrastructure Eng..

[4]  Yu Guan,et al.  Mobile Based Continuous Authentication Using Deep Features , 2018, EMDL@MobiSys.

[5]  Gene Tsudik,et al.  Authentication using pulse-response biometrics , 2017, NDSS.

[6]  Kang G. Shin,et al.  Continuous Authentication for Voice Assistants , 2017, MobiCom.

[7]  Sun-Yuan Kung,et al.  Cost-effective kernel ridge regression implementation for keystroke-based active authentication system , 2017, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[8]  Prasant Mohapatra,et al.  Sensor-assisted facial recognition: an enhanced biometric authentication system for smartphones , 2014, MobiSys.

[9]  Xiang-Yang Li,et al.  SilentSense: silent user identification via touch and movement behavioral biometrics , 2013, MobiCom.

[10]  Shuangquan Wang,et al.  Continuous Authentication With Touch Behavioral Biometrics and Voice on Wearable Glasses , 2017, IEEE Transactions on Human-Machine Systems.

[11]  Leif E. Peterson K-nearest neighbor , 2009, Scholarpedia.

[12]  Yufei Chen,et al.  Performance Analysis of Multi-Motion Sensor Behavior for Active Smartphone Authentication , 2018, IEEE Transactions on Information Forensics and Security.

[13]  Yantao Li,et al.  Using Feature Fusion Strategies in Continuous Authentication on Smartphones , 2020, IEEE Internet Computing.

[14]  Yantao Li,et al.  Touch-based Smartphone Authentication Using Import Vector Domain Description , 2018, 2018 IEEE 29th International Conference on Application-specific Systems, Architectures and Processors (ASAP).

[15]  Andrea Lagorio,et al.  On the Use of SIFT Features for Face Authentication , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).

[16]  Agathoniki Trigoni,et al.  Deepauth: in-situ authentication for smartwatches via deeply learned behavioural biometrics , 2018, UbiComp.

[17]  Tao Feng,et al.  TIPS: context-aware implicit user identification using touch screen in uncontrolled environments , 2014, HotMobile.

[18]  Jasper Snoek,et al.  Spectral Representations for Convolutional Neural Networks , 2015, NIPS.

[19]  Stéphane Mallat,et al.  Rigid-Motion Scattering for Texture Classification , 2014, ArXiv.

[20]  Gang Zhou,et al.  Sensor-Based Continuous Authentication Using Cost-Effective Kernel Ridge Regression , 2018, IEEE Access.

[21]  Anil K. Jain,et al.  Integrating Faces and Fingerprints for Personal Identification , 1998, IEEE Trans. Pattern Anal. Mach. Intell..

[22]  François Chollet,et al.  Xception: Deep Learning with Depthwise Separable Convolutions , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[23]  Gang Zhou,et al.  Using Data Augmentation in Continuous Authentication on Smartphones , 2019, IEEE Internet of Things Journal.

[24]  Tsuyoshi Isshiki,et al.  Fingerprint authentication on touch sensor using Phase-Only Correlation method , 2016, 2016 7th International Conference of Information and Communication Technology for Embedded Systems (IC-ICTES).

[25]  Geoffrey E. Hinton,et al.  ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.

[26]  Xiaohong Guan,et al.  Performance Analysis of Motion-Sensor Behavior for User Authentication on Smartphones , 2016, Sensors.

[27]  C. Sanchez-Avilaa,et al.  Two different approaches for iris recognition using Gabor filters and multiscale zero-crossing representation , 2004 .

[28]  Malik Yousef,et al.  One-Class SVMs for Document Classification , 2002, J. Mach. Learn. Res..

[29]  Gang Zhou,et al.  CNNAuth: Continuous Authentication via Two-Stream Convolutional Neural Networks , 2018, 2018 IEEE International Conference on Networking, Architecture and Storage (NAS).

[30]  Kyriakos C. Chatzidimitriou,et al.  BrainRun: A Behavioral Biometrics Dataset towards Continuous Implicit Authentication , 2019, Data.

[31]  Jian Sun,et al.  Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[32]  Matti Pietikäinen,et al.  Face and Eye Detection for Person Authentication in Mobile Phones , 2007, 2007 First ACM/IEEE International Conference on Distributed Smart Cameras.

[33]  Susmita Sur-Kolay,et al.  CABA: Continuous Authentication Based on BioAura , 2017, IEEE Transactions on Computers.

[34]  Andrew Zisserman,et al.  Two-Stream Convolutional Networks for Action Recognition in Videos , 2014, NIPS.

[35]  Aaron C. Courville,et al.  Recurrent Batch Normalization , 2016, ICLR.

[36]  Bo Chen,et al.  MobileNets: Efficient Convolutional Neural Networks for Mobile Vision Applications , 2017, ArXiv.

[37]  ChaYoung-Jin,et al.  Deep Learning-Based Crack Damage Detection Using Convolutional Neural Networks , 2017 .

[38]  Heikki Ailisto,et al.  Identifying users of portable devices from gait pattern with accelerometers , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..

[39]  Jimmy Ba,et al.  Adam: A Method for Stochastic Optimization , 2014, ICLR.

[40]  Oral Büyüköztürk,et al.  Autonomous Structural Visual Inspection Using Region‐Based Deep Learning for Detecting Multiple Damage Types , 2018, Comput. Aided Civ. Infrastructure Eng..

[41]  Anil K. Jain,et al.  Soft Biometric Traits for Continuous User Authentication , 2010, IEEE Transactions on Information Forensics and Security.

[42]  Xiang-Yang Li,et al.  Continuous user identification via touch and movement behavioral biometrics , 2014, 2014 IEEE 33rd International Performance Computing and Communications Conference (IPCCC).

[43]  Andrew Beng Jin Teoh,et al.  A Survey of Keystroke Dynamics Biometrics , 2013, TheScientificWorldJournal.

[44]  Xue-wen Chen,et al.  Comparison of One-Class SVM and Two-Class SVM for Fold Recognition , 2006, ICONIP.

[45]  Rama Chellappa,et al.  Partial face detection for continuous authentication , 2016, 2016 IEEE International Conference on Image Processing (ICIP).

[46]  Andrew Zisserman,et al.  Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.

[47]  Douglas A. Reynolds,et al.  A Tutorial on Text-Independent Speaker Verification , 2004, EURASIP J. Adv. Signal Process..

[48]  Mark Sandler,et al.  MobileNetV2: Inverted Residuals and Linear Bottlenecks , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.

[49]  Qing Yang,et al.  HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users , 2015, IEEE Transactions on Information Forensics and Security.

[50]  Ruby B. Lee,et al.  Implicit Sensor-based Authentication of Smartphone Users with Smartwatch , 2016, HASP 2016.

[51]  Shaohan Hu,et al.  DeepSense: A Unified Deep Learning Framework for Time-Series Mobile Sensing Data Processing , 2016, WWW.

[52]  Ying Zhang,et al.  n-Gram Geo-trace Modeling , 2011, Pervasive.

[53]  Aad van Moorsel,et al.  Smartphone Continuous Authentication Using Deep Learning Autoencoders , 2017, 2017 15th Annual Conference on Privacy, Security and Trust (PST).

[54]  Xiangyu Zhang,et al.  ShuffleNet: An Extremely Efficient Convolutional Neural Network for Mobile Devices , 2017, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.

[55]  Nasir D. Memon,et al.  An HMM-based multi-sensor approach for continuous mobile authentication , 2015, MILCOM 2015 - 2015 IEEE Military Communications Conference.