A Novel Non-intrusive User Authentication Method Based on Touchscreen of Smartphones

In recent years, the functionality of smartphones has been rapidly improved, then, the smartphones are not only used for telecommunication but also for various applications, such as email and social network accessing. These applications raise new security issues to smartphone users, however, the current protection mechanisms of smartphones are not sufficient due to convenience issue and shoulder-surfing issue. We therefore propose a non-intrusive authentication approach based on touch screen of smartphones. To the best of our knowledge, this work is the first publicly reported study that adopts the histogram features of touch screen to build an authentication model for smartphone users. Our empirical results for fifty-five participants show that the proposed approach is feasible. The performance of the proposed approach could be increased if users continuously operate their smartphone after a period of time. Finally, we further discuss the applications and limitations of the proposed approach.

[1]  Hsing-Kuo Kenneth Pao,et al.  Game bot identification based on manifold learning , 2008, NETGAMES.

[2]  Mohammad Najmud Doja,et al.  USER AUTHENTICATION SCHEMES FOR MOBILE AND HANDHELD DEVICES , 2008 .

[3]  L. O'Gorman,et al.  Comparing passwords, tokens, and biometrics for user authentication , 2003, Proceedings of the IEEE.

[4]  Steven Furnell,et al.  Authenticating mobile phone users using keystroke analysis , 2006, International Journal of Information Security.

[5]  Dexin Zhang,et al.  DCT-Based Iris Recognition , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[6]  Tao Feng,et al.  Continuous mobile authentication using touchscreen gestures , 2012, 2012 IEEE Conference on Technologies for Homeland Security (HST).

[7]  Jie Yang,et al.  Sweep fingerprint sequence reconstruction for portable devices , 2006 .

[8]  S.Benson Edwin Raj,et al.  A Behavioral Biometric Approach Based on Standardized Resolution in Mouse Dynamics , 2009 .

[9]  Steven Furnell,et al.  Flexible and Transparent User Authentication for Mobile Devices , 2009, SEC.

[10]  A. Ant Ozok,et al.  A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords , 2006, SOUPS '06.

[11]  Anil K. Jain,et al.  FVC2000: Fingerprint Verification Competition , 2002, IEEE Trans. Pattern Anal. Mach. Intell..

[12]  Berrin A. Yanikoglu,et al.  Identity authentication using improved online signature verification method , 2005, Pattern Recognit. Lett..

[13]  Nalini K. Ratha,et al.  Biometric perils and patches , 2002, Pattern Recognit..

[14]  Hamid Jahankhani,et al.  A Survey of User Authentication Based on Mouse Dynamics , 2008 .

[15]  Deron Liang,et al.  A New Non-intrusive Authentication Approach for Data Protection Based on Mouse Dynamics , 2012, 2012 International Symposium on Biometrics and Security Technologies.

[16]  Ahmed Awad E. Ahmed,et al.  A New Biometric Technology Based on Mouse Dynamics , 2007, IEEE Transactions on Dependable and Secure Computing.

[17]  Ana L. N. Fred,et al.  A User Authentication Technic Using a~Web Interaction Monitoring System , 2003, IbPRIA.

[18]  Heikki Ailisto,et al.  Increasing Security of Mobile Devices by Decreasing User Effort in Verification , 2007, 2007 Second International Conference on Systems and Networks Communications (ICSNC 2007).

[19]  Dugald Ralph Hutchings,et al.  Order and entropy in picture passwords , 2008, Graphics Interface.

[20]  Jun Yang,et al.  SenGuard: Passive user identification on smartphones using multiple sensors , 2011, 2011 IEEE 7th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[21]  Jouni Markkula,et al.  An integrated identity verification system for mobile terminals , 2005, Inf. Manag. Comput. Security.

[22]  Kirsi Helkala,et al.  Biometric Gait Authentication Using Accelerometer Sensor , 2006, J. Comput..

[23]  R. Tibshirani,et al.  Improvements on Cross-Validation: The 632+ Bootstrap Method , 1997 .

[24]  Volker Roth,et al.  A PIN-entry method resilient against shoulder surfing , 2004, CCS '04.

[25]  Steven Furnell,et al.  Beyond the PIN: Enhancing user authentication for mobile devices , 2008 .

[26]  Douglas A. Reynolds,et al.  SHEEP, GOATS, LAMBS and WOLVES A Statistical Analysis of Speaker Performance in the NIST 1998 Speaker Recognition Evaluation , 1998 .

[27]  Claudia Picardi,et al.  User authentication through keystroke dynamics , 2002, TSEC.

[28]  Patrick Bours,et al.  Improved Cycle Detection for Accelerometer Based Gait Authentication , 2010, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[29]  Alain Forget,et al.  Shoulder-surfing resistance with eye-gaze entry in cued-recall graphical passwords , 2010, CHI.

[30]  Kuanquan Wang,et al.  Palmprint Texture Analysis Using Derivative of Gaussian Filters , 2006, 2006 International Conference on Computational Intelligence and Security.