An Implicit Identity Authentication System Considering Changes of Gesture Based on Keystroke Behaviors

Smartphones have become ubiquitous personal devices so that much of sensitive and private information will be saved in the phone, and users have their own unique behavioral characteristics when using smartphones, so, to prevent private information from falling into the hands of impostors, there is a kind of identity authentication system based on user's behavioral features while the user is unlocking. However, due to the impact of environmental factors, changes of gesture will introduce bias into the feature data, which results in a diminishment of the system performance. To solve this problem, we propose an implicit identity authentication system based on keystroke behaviors, and it is the first attempt to consider the changes of a user's gesture. This system collects five keystroke features in the background and analyzes to identify different users without additional hardware supporting. We present our work with an experimental study, and our experiments show that the accuracy of identity authentication system we proposed is up to 99.1329%. Comparing with the identity authentication system without considering the impact of gesture changes, the EER of the system considering the impact of gesture changes is decreased by 1.2514%.

[1]  Dawn Xiaodong Song,et al.  Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication , 2012, IEEE Transactions on Information Forensics and Security.

[2]  Heinrich Hußmann,et al.  Touch me once and i know it's you!: implicit authentication based on touch screen patterns , 2012, CHI.

[3]  Vinod Namboodiri,et al.  What, Why, and How: Surveying what consumers want in new mobile phones. , 2015, IEEE Consumer Electronics Magazine.

[4]  Yuan Feng,et al.  Waving Authentication: Your Smartphone Authenticate You on Motion Gesture , 2015, CHI Extended Abstracts.

[5]  Calton Pu,et al.  Active authentication using scrolling behaviors , 2015, 2015 6th International Conference on Information and Communication Systems (ICICS).

[6]  Aaron Striegel,et al.  Modifying smartphone user locking behavior , 2013, SOUPS.

[7]  Jiang Zhu,et al.  KeySens: Passive User Authentication through Micro-behavior Modeling of Soft Keyboard Interaction , 2013, MobiCASE.

[8]  Shwetak N. Patel,et al.  ContextType: using hand posture information to improve mobile touch screen text entry , 2013, CHI.

[9]  Irina Vorobyeva,et al.  Benefits and issues of biometric technologies. Are biometrics worth using? , 2014, IEEE SOUTHEASTCON 2014.

[10]  Vinayak Ashok Bharadi,et al.  Multimodal biometric recognition using iris & fingerprint: By texture feature extraction using hybrid wavelets , 2014, 2014 5th International Conference - Confluence The Next Generation Information Technology Summit (Confluence).

[11]  Cheng-Jung Tsai,et al.  A graphical-based password keystroke dynamic authentication system for touch screen handheld mobile devices , 2012, J. Syst. Softw..

[12]  Vyas Sekar,et al.  Measuring user confidence in smartphone security and privacy , 2012, SOUPS.

[13]  Bruce A. Draper,et al.  An introduction to the good, the bad, & the ugly face recognition challenge problem , 2011, Face and Gesture 2011.

[14]  Shwetak N. Patel,et al.  GripSense: using built-in sensors to detect hand posture and pressure on commodity mobile phones , 2012, UIST.

[15]  Ling Huang,et al.  Short paper: smartphones: not smart enough? , 2012, SPSM '12.

[16]  Hyunsoo Yoon,et al.  Protecting Mobile Devices from Adversarial User by Fine-Grained Analysis of User Behavior , 2014 .

[17]  Gelson da Cruz,et al.  Authentication system using behavioral biometrics through keystroke dynamics , 2014, 2014 IEEE Symposium on Computational Intelligence in Biometrics and Identity Management (CIBIM).

[18]  Ting-Yi Chang,et al.  Implementing multiple biometric features for a recall-based graphical keystroke dynamics authentication system on a smart phone , 2015, J. Netw. Comput. Appl..

[19]  Larry S. Davis,et al.  Toward a non-intrusive, physio- behavioral biometric for smartphones , 2014, MobileHCI '14.

[20]  Michael R. Lyu,et al.  Towards Continuous and Passive Authentication via Touch Biometrics: An Experimental Study on Smartphones , 2014, SOUPS.

[21]  Zhi Xu,et al.  TapLogger: inferring user inputs on smartphone touchscreens using on-board motion sensors , 2012, WISEC '12.

[22]  Ruby B. Lee,et al.  Multi-sensor authentication to improve smartphone security , 2015, 2015 International Conference on Information Systems Security and Privacy (ICISSP).

[23]  Sunny Consolvo,et al.  Are You Ready to Lock? Understanding User Motivations for Smartphone Locking Behaviors , 2014 .

[24]  David A. Wagner,et al.  Are You Ready to Lock? , 2014, CCS.

[25]  Roy A. Maxion,et al.  Keystroke biometrics with number-pad input , 2010, 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN).

[26]  James S. Okolica,et al.  User identification and authentication using multi-modal behavioral biometrics , 2014 .

[27]  Hao Chen,et al.  TouchLogger: Inferring Keystrokes on Touch Screen from Smartphone Motion , 2011, HotSec.

[28]  Hai Huang,et al.  You Are How You Touch: User Verification on Smartphones via Tapping Behaviors , 2014, 2014 IEEE 22nd International Conference on Network Protocols.