Skip to main content

2021 | OriginalPaper | Buchkapitel

CNN-Based Continuous Authentication on Smartphones with Auto Augmentation Search

verfasst von : Shaojiang Deng, Jiaxing Luo, Yantao Li

Erschienen in: Information and Communications Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this paper, we present CAuSe, a CNN-based Continuous Authentication on smartphones using Auto Augmentation Search, where the CNN is specially designed for deep feature extraction and the auto augmentation search is exploited for CNN training data augmentation. Specifically, CAuSe consists of three stages of the offline stage, registration stage and authentication stage. In the offline stage, we utilize auto augmentation search on the collected data to find an optimal strategy for CNN training data augmentation. Then, we specially design a CNN to learn and extract deep features from the augmented data and train the LOF classifier after 95 features are selected by PCA in the registration stage. With the trained CNN and LOF classifier, CAuSe identifies the current user as a legitimate user or an impostor in the authentication stage. Based on our dataset, we evaluate the effectiveness of optimal strategy and the performance of CAuSe. The experimental results demonstrate that the strategy of Time-Warping(0.6)+Time-Warping(0.6) reaches the highest accuracy of 93.19% with data size 400 and CAuSe achieves the best authentication accuracy of 96.93%, respectively, comparing with other strategies and classifiers.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Abeni, P., Baltatu, M., D’Alessandro, R.: Nis03-4: Implementing biometrics-based authentication for mobile devices. In: IEEE Globecom 2006. pp. 1–5. IEEE (2006) Abeni, P., Baltatu, M., D’Alessandro, R.: Nis03-4: Implementing biometrics-based authentication for mobile devices. In: IEEE Globecom 2006. pp. 1–5. IEEE (2006)
2.
Zurück zum Zitat Al-Hadithy, N., Gikas, P.D., Al-Nammari, S.S.: Smartphones in orthopaedics. Int. Orthop. 36(8), 1543–1547 (2012)CrossRef Al-Hadithy, N., Gikas, P.D., Al-Nammari, S.S.: Smartphones in orthopaedics. Int. Orthop. 36(8), 1543–1547 (2012)CrossRef
3.
Zurück zum Zitat Bonneau, J., Herley, C., van Oorschot, P.C., Stajano, F.: Passwords and the evolution of imperfect authentication. Commun. ACM 58(7), 78–87 (2015)CrossRef Bonneau, J., Herley, C., van Oorschot, P.C., Stajano, F.: Passwords and the evolution of imperfect authentication. Commun. ACM 58(7), 78–87 (2015)CrossRef
4.
Zurück zum Zitat Breunig, M.M., Kriegel, H.P., Ng, R.T., Sander, J.: Lof: identifying density-based local outliers. SIGMOD Rec. 29(2), 93–104 (2000)CrossRef Breunig, M.M., Kriegel, H.P., Ng, R.T., Sander, J.: Lof: identifying density-based local outliers. SIGMOD Rec. 29(2), 93–104 (2000)CrossRef
5.
Zurück zum Zitat Centeno, M.P., Guan, Y., van Moorsel, A.: Mobile based continuous authentication using deep features. In: Proceedings of the 2nd International Workshop on Embedded and Mobile Deep Learning, pp. 19–24 (2018) Centeno, M.P., Guan, Y., van Moorsel, A.: Mobile based continuous authentication using deep features. In: Proceedings of the 2nd International Workshop on Embedded and Mobile Deep Learning, pp. 19–24 (2018)
6.
Zurück zum Zitat Cubuk, E.D., Zoph, B., Mane, D., Vasudevan, V., Le, Q.V.: Autoaugment: learning augmentation strategies from data. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 113–123 (2019) Cubuk, E.D., Zoph, B., Mane, D., Vasudevan, V., Le, Q.V.: Autoaugment: learning augmentation strategies from data. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 113–123 (2019)
8.
Zurück zum Zitat Feng, H., Fawaz, K., Shin, K.G.: Continuous authentication for voice assistants. In: Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking, pp. 343–355 (2017) Feng, H., Fawaz, K., Shin, K.G.: Continuous authentication for voice assistants. In: Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking, pp. 343–355 (2017)
9.
Zurück zum Zitat Frank, M., Biedert, R., Ma, E., Martinovic, I., Song, D.: Touchalytics: on the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE Trans. Inf. Forensics Secur. 8(1), 136–148 (2012)CrossRef Frank, M., Biedert, R., Ma, E., Martinovic, I., Song, D.: Touchalytics: on the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE Trans. Inf. Forensics Secur. 8(1), 136–148 (2012)CrossRef
10.
Zurück zum Zitat Gascon, H., Uellenbeck, S., Wolf, C., Rieck, K.: Continuous authentication on mobile devices by analysis of typing motion behavior. Sicherheit 2014-Sicherheit, Schutz und Zuverlässigkeit (2014) Gascon, H., Uellenbeck, S., Wolf, C., Rieck, K.: Continuous authentication on mobile devices by analysis of typing motion behavior. Sicherheit 2014-Sicherheit, Schutz und Zuverlässigkeit (2014)
11.
Zurück zum Zitat Gonzalez-Manzano, L., Mahbub, U., de Fuentes, J.M., Chellappa, R.: Impact of injection attacks on sensor-based continuous authentication for smartphones. Comput. Commun. 163, 150–161 (2020)CrossRef Gonzalez-Manzano, L., Mahbub, U., de Fuentes, J.M., Chellappa, R.: Impact of injection attacks on sensor-based continuous authentication for smartphones. Comput. Commun. 163, 150–161 (2020)CrossRef
13.
Zurück zum Zitat Li, Y., Hu, H., Zhou, G.: Using data augmentation in continuous authentication on smartphones. IEEE Internet Things J. 6(1), 628–640 (2018)CrossRef Li, Y., Hu, H., Zhou, G.: Using data augmentation in continuous authentication on smartphones. IEEE Internet Things J. 6(1), 628–640 (2018)CrossRef
14.
Zurück zum Zitat Li, Y., Hu, H., Zhou, G., Deng, S.: Sensor-based continuous authentication using cost-effective kernel ridge regression. IEEE Access 6, 32554–32565 (2018)CrossRef Li, Y., Hu, H., Zhou, G., Deng, S.: Sensor-based continuous authentication using cost-effective kernel ridge regression. IEEE Access 6, 32554–32565 (2018)CrossRef
16.
Zurück zum Zitat Lin, C., et al.: Online hyper-parameter learning for auto-augmentation strategy. In: Proceedings of the IEEE/CVF International Conference on Computer Vision, pp. 6579–6588 (2019) Lin, C., et al.: Online hyper-parameter learning for auto-augmentation strategy. In: Proceedings of the IEEE/CVF International Conference on Computer Vision, pp. 6579–6588 (2019)
17.
Zurück zum Zitat Luo, Y., Lu, B.L.: Eeg data augmentation for emotion recognition using a conditional wasserstein gan. In: 2018 40th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), pp. 2535–2538. IEEE (2018) Luo, Y., Lu, B.L.: Eeg data augmentation for emotion recognition using a conditional wasserstein gan. In: 2018 40th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), pp. 2535–2538. IEEE (2018)
18.
19.
Zurück zum Zitat Mahbub, U., Patel, V.M., Chandra, D., Barbello, B., Chellappa, R.: Partial face detection for continuous authentication. In: 2016 IEEE International Conference on Image Processing (ICIP), pp. 2991–2995. IEEE (2016) Mahbub, U., Patel, V.M., Chandra, D., Barbello, B., Chellappa, R.: Partial face detection for continuous authentication. In: 2016 IEEE International Conference on Image Processing (ICIP), pp. 2991–2995. IEEE (2016)
20.
Zurück zum Zitat Mosenia, A., Sur-Kolay, S., Raghunathan, A., Jha, N.K.: Caba: continuous authentication based on bioaura. IEEE Trans. Comput. 66(5), 759–772 (2016)MathSciNetCrossRef Mosenia, A., Sur-Kolay, S., Raghunathan, A., Jha, N.K.: Caba: continuous authentication based on bioaura. IEEE Trans. Comput. 66(5), 759–772 (2016)MathSciNetCrossRef
21.
Zurück zum Zitat Muaaz, M., Mayrhofer, R.: An analysis of different approaches to gait recognition using cell phone based accelerometers. In: Proceedings of International Conference on Advances in Mobile Computing & Multimedia, pp. 293–300 (2013) Muaaz, M., Mayrhofer, R.: An analysis of different approaches to gait recognition using cell phone based accelerometers. In: Proceedings of International Conference on Advances in Mobile Computing & Multimedia, pp. 293–300 (2013)
22.
Zurück zum Zitat Quan, F., Fei, S., Anni, C., Feifei, Z.: Cracking cancelable fingerprint template of ratha. In: 2008 International Symposium on Computer Science and Computational Technology, vol. 2, pp. 572–575. IEEE (2008) Quan, F., Fei, S., Anni, C., Feifei, Z.: Cracking cancelable fingerprint template of ratha. In: 2008 International Symposium on Computer Science and Computational Technology, vol. 2, pp. 572–575. IEEE (2008)
23.
Zurück zum Zitat Sitová, Z., Šeděnka, J., Yang, Q., Peng, G., Zhou, G., Gasti, P., Balagani, K.S.: HMOG: new behavioral biometric features for continuous authentication of smartphone users. IEEE Trans. Inf. Forensics Secur. 11(5), 877–892 (2015)CrossRef Sitová, Z., Šeděnka, J., Yang, Q., Peng, G., Zhou, G., Gasti, P., Balagani, K.S.: HMOG: new behavioral biometric features for continuous authentication of smartphone users. IEEE Trans. Inf. Forensics Secur. 11(5), 877–892 (2015)CrossRef
24.
Zurück zum Zitat Tschuchnig, M.E., Ferner, C., Wegenkittl, S.: Sequential IoT data augmentation using generative adversarial networks. In: ICASSP 2020–2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 4212–4216. IEEE (2020) Tschuchnig, M.E., Ferner, C., Wegenkittl, S.: Sequential IoT data augmentation using generative adversarial networks. In: ICASSP 2020–2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 4212–4216. IEEE (2020)
25.
Zurück zum Zitat Um, T.T., et al.: Data augmentation of wearable sensor data for parkinson’s disease monitoring using convolutional neural networks. In: Proceedings of the 19th ACM International Conference on Multimodal Interaction, pp. 216–220 (2017) Um, T.T., et al.: Data augmentation of wearable sensor data for parkinson’s disease monitoring using convolutional neural networks. In: Proceedings of the 19th ACM International Conference on Multimodal Interaction, pp. 216–220 (2017)
26.
Zurück zum Zitat Wang, D., Gu, Q., Huang, X., Wang, P.: Understanding human-chosen pins: characteristics, distribution and security. In: 2017 ACM on Asia Conference on Computer and Communications Security (ASIA CCS 2017), pp. 372–385. ACM (2017) Wang, D., Gu, Q., Huang, X., Wang, P.: Understanding human-chosen pins: characteristics, distribution and security. In: 2017 ACM on Asia Conference on Computer and Communications Security (ASIA CCS 2017), pp. 372–385. ACM (2017)
27.
Zurück zum Zitat Wang, D., Zhang, Z., Wang, P., Yan, J., Huang, X.: Targeted online password guessing: an underestimated threat. In: 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS 2016), pp. 1242–1254. ACM (2016) Wang, D., Zhang, Z., Wang, P., Yan, J., Huang, X.: Targeted online password guessing: an underestimated threat. In: 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS 2016), pp. 1242–1254. ACM (2016)
28.
Zurück zum Zitat Xu, H., Zhou, Y., Lyu, M.R.: Towards continuous and passive authentication via touch biometrics: an experimental study on smartphones. In: 10th Symposium On Usable Privacy and Security (SOUPS 2014), pp. 187–198 (2014) Xu, H., Zhou, Y., Lyu, M.R.: Towards continuous and passive authentication via touch biometrics: an experimental study on smartphones. In: 10th Symposium On Usable Privacy and Security (SOUPS 2014), pp. 187–198 (2014)
30.
Zurück zum Zitat Zhou, B., Lohokare, J., Gao, R., Ye, F.: Echoprint: two-factor authentication using acoustics and vision on smartphones. In: MobiCom, pp. 321–336. ACM (2018) Zhou, B., Lohokare, J., Gao, R., Ye, F.: Echoprint: two-factor authentication using acoustics and vision on smartphones. In: MobiCom, pp. 321–336. ACM (2018)
31.
Zurück zum Zitat Zhu, X., Liu, Y., Qin, Z., Li, J.: Data augmentation in emotion classification using generative adversarial networks. arXiv preprint arXiv:1711.00648 (2017) Zhu, X., Liu, Y., Qin, Z., Li, J.: Data augmentation in emotion classification using generative adversarial networks. arXiv preprint arXiv:​1711.​00648 (2017)
Metadaten
Titel
CNN-Based Continuous Authentication on Smartphones with Auto Augmentation Search
verfasst von
Shaojiang Deng
Jiaxing Luo
Yantao Li
Copyright-Jahr
2021
DOI
https://doi.org/10.1007/978-3-030-86890-1_10

Premium Partner