ABSTRACT
Identity authentication plays an important role in maintaining social security. With the rapid growth of population, an important issue is put in front of people. How to identify people more accurately and faster? This paper presents a novel behavioral biometric authentication mechanism for smartphones, named PickupAuth. PickupAuth relies on a combined movement, which is the user picks up the phone to his chest and clicks on the touch screen. PickupAuth uses the built-in smartphone sensors to collect the force of the click screen, the acceleration data, the magnetic field data, and the rotation rate. A new proposed feature subset selection algorithm based on the correlation and weight values and Random Forest classification algorithm are used to analyze the sensor data. Experiments on 110 identity users show that the accuracy reaches 98.44% in sitting posture and 97.46% in standing posture. Besides, PickupAuth is more efficient than state of the art considering the training data acquisition time and the training time.
- The World Bank. [n.d.]. Population, total. https://data.worldbank.org/indicator/SP.POP.TOTL.Google Scholar
- Attaullah Buriro, Bruno Crispo, and Mauro Conti. 2019. AnswerAuth: A bimodal behavioral biometric-based user authentication scheme for smartphones. Journal of Information Security and Applications 44 (2019), 89 - 103. https://doi.org/10.1016/j.jisa.2018.11.008Google ScholarCross Ref
- A. Buriro, B. Crispo, F. Delfrari, and K. Wrona. 2016. Hold and Sign: A Novel Behavioral Biometrics for Smartphone User Authentication. In 2016 IEEE Security and Privacy Workshops (SPW). 276--285. https://doi.org/10.1109/SPW.2016.20Google Scholar
- A. Buriro, B. Crispo, and Y. Zhauniarovich. 2017. Please hold on: Unobtrusive user authentication using smartphone's built-in sensors. In 2017 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA). 1--8. https://doi.org/10.1109/ISBA.2017.7947684Google ScholarCross Ref
- H. Choi, B. Lee, and S. Yoon. 2016. Biometric Authentication Using Noisy Electrocardiograms Acquired by Mobile Sensors. IEEE Access 4 (2016), 1266--1273. https://doi.org/10.1109/ACCESS.2016.2548519Google ScholarCross Ref
- Mark A. Hall. 2000. Correlation-based Feature Selection for Discrete and Numeric Class Machine Learning. In Proceedings of the Seventeenth International Conference on Machine Learning (ICML '00). Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 359--366. http://dl.acm.org/citation.cfm?id=645529.657793Google ScholarDigital Library
- Feng Hong, Meiyu Wei, Shujuan You, Yuan Feng, and Zhongwen Guo. 2015. Waving Authentication: Your Smartphone Authenticate You on Motion Gesture. In Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems (Seoul, Republic of Korea) (CHI EA '15). ACM, New York, NY, USA, 263--266. https://doi.org/10.1145/2702613.2725444Google ScholarDigital Library
- Wei-Han Lee, Xiaochen Liu, Yilin Shen, Hongxia Jin, and Ruby Lee. 2017. Secure Pick Up: Implicit Authentication When You Start Using the Smartphone. 67--78. https://doi.org/10.1145/3078861.3078870Google ScholarDigital Library
- L. Li, X. Zhao, and G. Xue. 2013. Unobservable Re-authentication for Smartphones. Ndss (2013).Google Scholar
- V. Matyas and Z. Riha. 2003. Toward reliable user authentication through biometrics. IEEE Security Privacy 1, 3 (May 2003), 45--49. https://doi.org/10.1109/MSECP.2003.1203221Google ScholarDigital Library
- Shahla Nemati and Mohammad Ehsan Basiri. 2011. Text-independent speaker verification using ant colony optimization-based selected features. Expert Systems with Applications 38, 1 (2011), 620 - 630. https://doi.org/10.1016/j.eswa.2010.07.011Google ScholarDigital Library
- Paulo Henrique Pisani, Romain Giot, André C.P.L.F. de Carvalho, and Ana Carolina Lorena. 2016. Enhanced template update: Application to keystroke dynamics. Computers & Security 60 (2016), 134 - 153. https://doi.org/10.1016/j.cose.2016.04.004Google ScholarDigital Library
- C. Shen, Y. Zhang, X. Guan, and R. A. Maxion. 2016. Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication. IEEE Transactions on Information Forensics and Security 11, 3 (March 2016), 498--513. https://doi.org/10.1109/TIFS.2015.2503258Google ScholarDigital Library
- Tanmay Tulsidas Verlekar, Luís Ducla Soares, and Paulo Lobato Correia. 2018. Gait recognition in the wild using shadow silhouettes. Image and Vision Computing 76 (2018), 1 - 13. https://doi.org/10.1016/j.imavis.2018.05.002Google ScholarCross Ref
Index Terms
- A Novel Smartphone Identity Authentication Mechanism
Recommendations
Strengthening Password Authentication using Keystroke Dynamics and Smartphone Sensors
ICICM '19: Proceedings of the 9th International Conference on Information Communication and ManagementPresently, a password authentication is a weak point for security in the authentication scheme because a password is easy to be stolen and a user may ignore the security by using a simple password, which is easy to remember or using the same password for ...
Biometric Authentication by Handwriting Using Leap Motion
IMCOM '16: Proceedings of the 10th International Conference on Ubiquitous Information Management and CommunicationIn recent years, biometrics authentication becomes popular. No key is required in biometrics authentication while password must be remembered in password authentication. Moreover, living parts for biometrics authentication cannot be stolen with usual ...
Online joint palmprint and palmvein verification
As a unique and reliable biometric characteristic, palmprint verification has achieved a great success. However, palmprint alone may not be able to meet the increasing demand of highly accurate and robust biometric systems. Recently, palmvein, which ...
Comments