Hand Dynamics for Behavioral User Authentication

We propose and evaluate a method to authenticate individuals by their unique hand dynamics, based on measurements from wearable sensors. Our approach utilises individual characteristics of hand movement when opening a door. We implement a sensor-fusion machine learning algorithm to classify individuals based on their hand movement and conduct a lab study with 20 participants to test the feasibility of the concept in the context of accessing physical doors as found in office buildings. Our results show that our approach yields an accuracy of 92% in classifying an individual and thus highlights the potential for behavioral hand dynamics for authentication.

[1]  Wenyuan Xu,et al.  AccelPrint: Imperfections of Accelerometers Make Smartphones Trackable , 2014, NDSS.

[2]  Tao Feng,et al.  TIPS: context-aware implicit user identification using touch screen in uncontrolled environments , 2014, HotMobile.

[3]  Nikita Borisov,et al.  Do You Hear What I Hear?: Fingerprinting Smart Devices Through Embedded Acoustic Components , 2014, CCS.

[4]  Mi Zhang,et al.  Motion primitive-based human activity recognition using a bag-of-features approach , 2012, IHI '12.

[5]  Yuansong Qiao,et al.  Experimental evaluation of mobile phone sensors , 2013 .

[6]  Christoph Busch,et al.  Unobtrusive User-Authentication on Mobile Phones Using Biometric Gait Recognition , 2010, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[7]  Chih-Jen Lin,et al.  A Comparison of Methods for Multi-class Support Vector Machines , 2015 .

[8]  Woo Chaw Seng,et al.  A review of biometric technology along with trends and prospects , 2014, Pattern Recognit..

[9]  Luis A. Hernández Gómez,et al.  Usability evaluation of multi-modal biometric verification systems , 2006, Interact. Comput..

[10]  Luminita Vasiu,et al.  Biometric Recognition - Security and Privacy Concerns , 2004, ICETE.

[11]  Deokjai Choi,et al.  Arm's Flex when Responding Call for Implicit User Authentication in Smartphone , 2012 .

[12]  Blase Ur,et al.  How Does Your Password Measure Up? The Effect of Strength Meters on Password Creation , 2012, USENIX Security Symposium.

[13]  Xiaoxin Shang,et al.  Local Absolute Binary Patterns as Image Preprocessing for Grip-Pattern Recognition in Smart Gun , 2007, 2007 First IEEE International Conference on Biometrics: Theory, Applications, and Systems.

[14]  Gérard Dreyfus,et al.  Single-layer learning revisited: a stepwise procedure for building and training a neural network , 1989, NATO Neurocomputing.

[15]  Blase Ur,et al.  Measuring password guessability for an entire university , 2013, CCS.

[16]  Moshe Kam,et al.  User Authentication Through Biometric Sensors and Decision Fusion , 2015, 2013 47th Annual Conference on Information Sciences and Systems (CISS).

[17]  Bernt Schiele,et al.  A tutorial on human activity recognition using body-worn inertial sensors , 2014, CSUR.

[18]  Héctor Pomares,et al.  Dealing with the Effects of Sensor Displacement in Wearable Activity Recognition , 2014, Sensors.

[19]  Ivan Martinovic,et al.  Preventing Lunchtime Attacks: Fighting Insider Threats With Eye Movement Biometrics , 2015, NDSS.

[20]  Michael L. Littman,et al.  Activity Recognition from Accelerometer Data , 2005, AAAI.

[21]  Bernt Schiele,et al.  Analyzing features for activity recognition , 2005, sOc-EUSAI '05.

[22]  Mi Zhang,et al.  A feature selection-based framework for human activity recognition using wearable multimodal sensors , 2011, BODYNETS.

[23]  Chih-Jen Lin,et al.  LIBSVM: A library for support vector machines , 2011, TIST.

[24]  Gabi Nakibly,et al.  Mobile Device Identification via Sensor Fingerprinting , 2014, ArXiv.

[25]  Patrick Bours,et al.  Gait and activity recognition using commercial phones , 2013, Comput. Secur..

[26]  Emiliano Miluzzo,et al.  A survey of mobile phone sensing , 2010, IEEE Communications Magazine.

[27]  Frank Stajano,et al.  The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes , 2012, 2012 IEEE Symposium on Security and Privacy.

[28]  Gabi Nakibly,et al.  Gyrophone: Recognizing Speech from Gyroscope Signals , 2014, USENIX Security Symposium.

[29]  Ling Bao,et al.  Activity Recognition from User-Annotated Acceleration Data , 2004, Pervasive.

[30]  Moshe Kam,et al.  Decision Fusion for Multimodal Active Authentication , 2013, IT Professional.