Behavioral Biometrics: Categorization and Review

This work categorizes and reviews behavioral biometrics with the inclusion of future-oriented techniques. A general introduction to this field is given alongside the benefits of this non-intrusive approach. It presents the examination and analysis of the current research in the field and the different types of behavior-centric features. Accuracy rates for verifying users with different behavioral biometric approaches are compared. Privacy issues that will or may arise in the future with behavioral biometrics are also addressed. Finally, the general properties of behavior, the influence of environmental factors on observed behavior and the potential directions for future research in the field of behavioral biometrics are discussed.

[1]  Tom Fawcett,et al.  Adaptive Fraud Detection , 1997, Data Mining and Knowledge Discovery.

[2]  Venu Govindaraju,et al.  Similarity Measure Functions for Strategy-Based Biometrics , 2008 .

[3]  Tomohiro Yamamura,et al.  A Driver Behavior Recognition Method Based on a Driver Model Framework , 2000 .

[4]  David L. Dowe,et al.  Inductive Inference of Chess Player Strategy , 2000, PRICAI.

[5]  Larry S. Davis,et al.  Person identification using automatic height and stride estimation , 2002, Object recognition supported by user interaction for service robots.

[6]  Nong Ye,et al.  A Markov Chain Model of Temporal Behavior for Anomaly Detection , 2000 .

[7]  Tracy L. Westeyn,et al.  Recognizing song-based blink patterns: applications for restricted and universal access , 2004, Sixth IEEE International Conference on Automatic Face and Gesture Recognition, 2004. Proceedings..

[8]  Christoph C. Michael,et al.  Using Finite Automata to Mine Execution Data for Intrusion Detection: A Preliminary Report , 2000, Recent Advances in Intrusion Detection.

[9]  Réjean Plamondon,et al.  Automatic signature verification and writer identification - the state of the art , 1989, Pattern Recognit..

[10]  Venu Govindaraju,et al.  Behavioural biometrics: a survey and classification , 2008, Int. J. Biom..

[11]  José del R. Millán,et al.  Person Authentication Using Brainwaves (EEG) and Maximum A Posteriori Model Adaptation , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[12]  Venu Govindaraju,et al.  ER2: an intuitive similarity measure for on-line signature verification , 2004, IWFHR.

[13]  Alex Pentland,et al.  Graphical models for driver behavior recognition in a SmartCar , 2000, Proceedings of the IEEE Intelligent Vehicles Symposium 2000 (Cat. No.00TH8511).

[14]  Nalini K. Ratha,et al.  Automated Biometrics , 2001, ICAPR.

[15]  Abdulmotaleb El-Saddik,et al.  Haptic-Based Biometrics: A Feasibility Study , 2006, 2006 14th Symposium on Haptic Interfaces for Virtual Environment and Teleoperator Systems.

[16]  Anil K. Jain,et al.  Performance evaluation of fingerprint verification systems , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[17]  Ting-Peng Liang,et al.  Discovering user interests from Web browsing behavior: an application to Internet news services , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.

[18]  Koichi Shinoda,et al.  A statistical approach for person verification using human behavioral patterns , 2013, EURASIP J. Image Video Process..

[19]  Roland Auckenthaler,et al.  Lip signatures for automatic person recognition , 1999, 1999 IEEE Third Workshop on Multimedia Signal Processing (Cat. No.99TH8451).

[20]  Yiannis E. Papelis,et al.  Mathematical Model to Assess the Relative Effectiveness of Rift Valley Fever Countermeasures , 2011, Int. J. Artif. Life Res..

[21]  Dorothy E. Denning,et al.  An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.

[22]  Wing Hong Lau,et al.  Person authentication using ASM based lip shape and intensity information , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[23]  M. Grgic,et al.  A survey of biometric recognition methods , 2004, Proceedings. Elmar-2004. 46th International Symposium on Electronics in Marine.

[24]  Juergen Luettin,et al.  Speaker identification by lipreading , 1996, Proceeding of Fourth International Conference on Spoken Language Processing. ICSLP '96.

[25]  Venu Govindaraju,et al.  Use of behavioral biometrics in intrusion detection and online gaming , 2006, SPIE Defense + Commercial Sensing.

[26]  Rama Chellappa,et al.  Identification of humans using gait , 2004, IEEE Transactions on Image Processing.

[27]  Julie Thorpe,et al.  Pass-thoughts: authenticating with our minds , 2005, NSPW '05.

[28]  Abdulmotaleb El-Saddik,et al.  Haptic: the new biometrics-embedded media to recognizing and quantifying human patterns , 2005, MULTIMEDIA '05.

[29]  Hongwei Mo,et al.  Handbook of Research on Artificial Immune Systems and Natural Computing: Applying Complex Adaptive Technologies , 2008 .

[30]  Klaus Mueller,et al.  Dynamic Approach for Face Recognition Using Digital Image Skin Correlation , 2005, AVBPA.

[31]  Xiaofan Lin,et al.  Phoneme-less hierarchical accent classification , 2004, Conference Record of the Thirty-Eighth Asilomar Conference on Signals, Systems and Computers, 2004..

[32]  Gaurav Gupta,et al.  Digital Forensic Analysis of E-Mails: A Trusted E-Mail Protocol , 2004, Int. J. Digit. EVid..

[33]  Arun Ross,et al.  An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.

[34]  Faouzi Alaya Cheikh,et al.  Gait Recognition using Time-of-Flight Sensor , 2011, BIOSIG.

[35]  Venu Govindaraju,et al.  Accent classification in speech , 2005, Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID'05).

[36]  Michael K. Reiter,et al.  The Design and Analysis of Graphical Passwords , 1999, USENIX Security Symposium.

[37]  Sharath Pankanti,et al.  Biometrics, Personal Identification in Networked Society: Personal Identification in Networked Society , 1998 .

[38]  Tieniu Tan,et al.  Biometric personal identification based on handwriting , 2000, Proceedings 15th International Conference on Pattern Recognition. ICPR-2000.

[39]  Marilde Terezinha Prado Santos,et al.  WOntoVLab: A Virtual Laboratory Authorship Process Based on Workflow and Ontologies , 2010, 2010 10th IEEE International Conference on Advanced Learning Technologies.

[40]  Ioannis Pitas,et al.  Recent advances in biometric person authentication , 2002, 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[41]  Issa Traoré,et al.  Detecting Computer Intrusions Using Behavioral Biometrics , 2005, PST.

[42]  Philip C. Woodland,et al.  Maximum likelihood linear regression for speaker adaptation of continuous density hidden Markov models , 1995, Comput. Speech Lang..

[43]  Richard A. Kemmerer,et al.  State Transition Analysis: A Rule-Based Intrusion Detection Approach , 1995, IEEE Trans. Software Eng..

[44]  Paola Britos,et al.  Detecting Fraud in Mobile Telephony Using Neural Networks , 2005, IEA/AIE.

[45]  Daniel J. Ragsdale,et al.  A hybrid approach to the profile creation and intrusion detection , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.

[46]  Anil K. Jain,et al.  Soft Biometric Traits for Personal Recognition Systems , 2004, ICBA.

[47]  Arun Ross,et al.  Score normalization in multimodal biometric systems , 2005, Pattern Recognit..

[48]  Yoohwan Kim,et al.  Baseline Profile Stability for Network Anomaly Detection , 2006, Third International Conference on Information Technology: New Generations (ITNG'06).

[49]  Kenneth A. Kaufman,et al.  An Application of Symbolic Learning to Intrusion Detection: Preliminary Results from the LUS Methodology , 2003 .

[50]  George M. Mohay,et al.  Mining e-mail content for author identification forensics , 2001, SGMD.

[51]  Venu Govindaraju,et al.  Direct and Indirect Human Computer Interaction Based Biometrics , 2007, J. Comput..

[52]  Fabian Monrose,et al.  Keystroke dynamics as a biometric for authentication , 2000, Future Gener. Comput. Syst..

[53]  Anil K. Jain,et al.  Can soft biometric traits assist user recognition? , 2004, SPIE Defense + Commercial Sensing.

[54]  Claudia Picardi,et al.  User authentication through keystroke dynamics , 2002, TSEC.

[55]  Rasmus Larsen,et al.  Analysis of Gait Using a Treadmill and a Time-of-Flight Camera , 2009, Dyn3D.

[56]  Peter Eckersley,et al.  How Unique Is Your Web Browser? , 2010, Privacy Enhancing Technologies.

[57]  Sharath Pankanti,et al.  Biometrics: a grand challenge , 2004, ICPR 2004.

[58]  Venu Govindaraju,et al.  Dissimilarity functions for behavior-based biometrics , 2007, SPIE Defense + Commercial Sensing.

[59]  Anil K. Jain,et al.  On-line signature verification, , 2002, Pattern Recognit..

[60]  Sridha Sridharan,et al.  Person authentication using lip information , 1997, TENCON '97 Brisbane - Australia. Proceedings of IEEE TENCON '97. IEEE Region 10 Annual Conference. Speech and Image Technologies for Computing and Telecommunications (Cat. No.97CH36162).

[61]  Fernando José Von Zuben,et al.  Ecosystems Computing: Introduction to Biogeographic Computation , 2011, Int. J. Nat. Comput. Res..

[62]  Rolf Ingold,et al.  Combined Handwriting and Speech Modalities for User Authentication , 2009, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[63]  Mohammad Bagher Shamsollahi,et al.  Person Identification by Using AR Model for EEG Signals , 2007 .

[64]  Jan Ramon,et al.  Opponent modeling by analysing play , 2002 .

[65]  Stephanie Schuckers,et al.  Spoofing and Anti-Spoofing Measures , 2002, Inf. Secur. Tech. Rep..

[66]  Nasir D. Memon,et al.  Biometric-rich gestures: a novel approach to authentication on multi-touch devices , 2012, CHI.

[67]  Pieter H. Hartel,et al.  Biometric verification based on grip-pattern recognition , 2004, IS&T/SPIE Electronic Imaging.

[68]  Anil K. Jain,et al.  Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.

[69]  Dawn Xiaodong Song,et al.  Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication , 2012, IEEE Transactions on Information Forensics and Security.

[70]  Heinrich Hußmann,et al.  Touch me once and i know it's you!: implicit authentication based on touch screen patterns , 2012, CHI.

[71]  Raymond N. J. Veldhuis,et al.  Grip-Pattern Recognition for Smart Guns , 2003 .

[72]  Giancarlo Ruffo,et al.  Keystroke Analysis of Different Languages: A Case Study , 2005, IDA.

[73]  Kimihiro Yamanaka,et al.  Biometric verification using the motion of fingers: a combination of physical and behavioural biometrics , 2010, Int. J. Biom..

[74]  Matthew Lichtenberger An implementation of a multi-touch draw-a-secret password schema for windows-based computers , 2011 .

[75]  Roy A. Maxion,et al.  Masquerade detection using truncated command lines , 2002, Proceedings International Conference on Dependable Systems and Networks.

[76]  V. S. Nalwa Automatic on-line signature verification , 1997 .

[77]  Hsin-Min Wang,et al.  Automatic singer recognition of popular music recordings via estimation and modeling of solo vocal signals , 2006, IEEE Transactions on Audio, Speech, and Language Processing.

[78]  Claude Castelluccia,et al.  On the uniqueness of Web browsing history patterns , 2014, Ann. des Télécommunications.

[79]  A. El Saddik,et al.  Automatic Identification of Participants in Haptic Systems , 2005, 2005 IEEE Instrumentationand Measurement Technology Conference Proceedings.

[80]  Roman V. Yampolskiy Human Computer Interaction Based Intrusion Detection , 2007, Fourth International Conference on Information Technology (ITNG'07).

[81]  Efstathios Stamatatos,et al.  Automatic Authorship Attribution , 1999, EACL.

[82]  Hyeyoung Park,et al.  A New Similarity Measure Based on Intraclass Statistics for Biometrie Systems , 2003 .

[83]  Roman V. Yampolskiy Secure Network Authentication with PassText , 2007, Fourth International Conference on Information Technology (ITNG'07).

[84]  Siwei Lyu,et al.  A digital technique for art authentication , 2004, Proc. Natl. Acad. Sci. USA.

[85]  A. Bromme A classification of biometric signatures , 2003, 2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698).

[86]  Jr. J.P. Campbell,et al.  Speaker recognition: a tutorial , 1997, Proc. IEEE.

[87]  Hakan Erdogan,et al.  Multi-modal Person Recognition for Vehicular Applications , 2005, Multiple Classifier Systems.

[88]  Yong-Sheng Ding,et al.  Immune Based Bio-Network Architecture and its Simulation Platform for Future Internet , 2009 .

[89]  Alexey Tsymbal,et al.  The problem of concept drift: definitions and related work , 2004 .

[90]  Yongjian Fu,et al.  A Framework for Personal Web Usage Mining , 2002, International Conference on Internet Computing.

[91]  Rüdiger W. Brause,et al.  Neural data mining for credit card fraud detection , 1999, Proceedings 11th International Conference on Tools with Artificial Intelligence.

[92]  H. Saevanee,et al.  User Authentication Using Combination of Behavioral Biometrics over the Touchpad Acting Like Touch Screen of Mobile Device , 2008, 2008 International Conference on Computer and Electrical Engineering.

[93]  Moshe Koppel,et al.  Authorship verification as a one-class classification problem , 2004, ICML.

[94]  Kuldip K. Paliwal,et al.  Information fusion for robust speaker verification , 2001, INTERSPEECH.

[95]  Richard Youmaran,et al.  Towards a Measure of Biometric Information , 2006, 2006 Canadian Conference on Electrical and Computer Engineering.

[96]  Roger Wattenhofer,et al.  A personal touch: recognizing users based on touch screen behavior , 2012, PhoneSense '12.

[97]  Kenneth Revett,et al.  Behavioral Biometrics: A Remote Access Approach , 2008 .

[98]  Carla E. Brodley,et al.  User re-authentication via mouse movements , 2004, VizSEC/DMSEC '04.

[99]  Sushil Jajodia,et al.  Enhancing Profiles for Anomaly Detection Using Time Granularities , 2002, J. Comput. Secur..

[100]  Peter L. Williams,et al.  Gray's Anatomy: The Anatomical Basis of Medicine and Surgery , 1996 .

[101]  A. Murat Tekalp,et al.  Multimodal person recognition for human-vehicle interaction , 2006, IEEE Multimedia.

[102]  Arslan Brömme,et al.  Using an Active Shape Structural Model for Biometric Sketch Recognition , 2003, DAGM-Symposium.

[103]  Malcolm Crompton,et al.  Biometrics and Privacy the End of the World as We Know it or the White Knight of Privacy? , 2004 .

[104]  Karl N. Levitt,et al.  Automated detection of vulnerabilities in privileged programs by execution monitoring , 1994, Tenth Annual Computer Security Applications Conference.

[105]  S. Gosling,et al.  PERSONALITY PROCESSES AND INDIVIDUAL DIFFERENCES The Do Re Mi’s of Everyday Life: The Structure and Personality Correlates of Music Preferences , 2003 .

[106]  Yuxin Ding,et al.  Host-based intrusion detection using dynamic and static behavioral models , 2003, Pattern Recognit..

[107]  Jude W. Shavlik,et al.  Learning users' interests by unobtrusively observing their normal behavior , 2000, IUI '00.

[108]  Seppo Puuronen,et al.  Anomaly Intrusion Detection Systems: Handling Temporal Relations Between Events , 1999, Recent Advances in Intrusion Detection.

[109]  Lei Yang,et al.  OpenSesame: Unlocking smart phone through handshaking biometrics , 2013, 2013 Proceedings IEEE INFOCOM.

[110]  Terran Lane,et al.  An Application of Machine Learning to Anomaly Detection , 1999 .

[111]  Salvatore J. Stolfo,et al.  A Behavior-Based Approach to Securing Email Systems , 2003, MMM-ACNS.

[112]  Kimihiro Yamanaka,et al.  A Biometric Identification Using the Motion of Fingers , 2009, 2009 International Conference on Biometrics and Kansei Engineering.

[113]  Diane Lambert,et al.  Detecting fraud in the real world , 2002 .

[114]  Piotr Porwik,et al.  BIOMETRIC RECOGNITION SYSTEM BASED ON THE MOTION OF THE HUMAN BODY GRAVITY CENTRE ANALYSIS , 2010 .

[115]  S. K. Dahel,et al.  Accuracy performance analysis of multimodal biometrics , 2003, IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003..

[116]  Juergen Luettin,et al.  Acoustic-labial speaker verification , 1997, Pattern Recognit. Lett..

[117]  Christoph C. Michael Finding the vocabulary of program behavior data for anomaly detection , 2003, Proceedings DARPA Information Survivability Conference and Exposition.

[118]  Karen Renaud,et al.  Quantifying the quality of web authentication mechanisms: a usability perspective , 2004 .

[119]  J. Piecha,et al.  The body balance measures for neurological disease estimation and classification , 2003 .

[120]  Hans van Halteren,et al.  Linguistic Profiling for Authorship Recognition and Verification , 2004, ACL.

[121]  Hüseyin Abut,et al.  Biometric identification using driving behavioral signals , 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763).

[122]  R.V. Yampolskiy Indirect Human Computer Interaction-Based Biometrics for Intrusion Detection Systems , 2007, 2007 41st Annual IEEE International Carnahan Conference on Security Technology.

[123]  Roman V. Yampolskiy Behavioral Modeling: an Overview , 2008 .

[124]  Mark E. Oxley,et al.  Cohort selection and word grammar effects for speaker recognition , 1996, 1996 IEEE International Conference on Acoustics, Speech, and Signal Processing Conference Proceedings.