Skip to main content
Top

2020 | OriginalPaper | Chapter

Imitation-Resistant Passive Authentication Interface for Stroke-Based Touch Screen Devices

Authors : Masashi Kudo, Hayato Yamana

Published in: HCI International 2020 - Posters

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Today’s widespread use of stroke-based touchscreen devices creates numerous associated security concerns and requires efficient security measures in response. We propose an imitation-resistant passive authentication interface for stroke-based touch screen devices employing classifiers for each individual stroke, which is evaluated with respect to 26 features. For experimental validation, we collect stroke-based touchscreen data from 23 participants containing target and imitation stroke patterns using a photo-matching game in the form of an iOS application. The equal error rate (EER), depicting the rate at which false rejection and false acceptance of target and imitator strokes are equal, is assumed as an indicator of the classification accuracy. Leave-one-out cross-validation was employed to evaluate the datasets based on the mean EER. For each cross-validation, one out of the two target datasets, an imitator dataset, and the remaining 20 imitator datasets were selected as genuine data, imitator test data, and imitator training data, respectively. Our results confirm stroke imitation as a serious threat. Among the 26 stroke features evaluated in terms of their imitation tolerance, the stroke velocity was identified as the most difficult to imitate. Dividing classifiers based on the stroke direction was found to further contribute to classification accuracy.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Meng, W., Wong, D.S., Furnell, S., Zhou, J.: Surveying the Development of Biometric User Authentication on Mobile Phones. IEEE Commun. Surv. Tutorials 17(3), 1268–1293 (2015)CrossRef Meng, W., Wong, D.S., Furnell, S., Zhou, J.: Surveying the Development of Biometric User Authentication on Mobile Phones. IEEE Commun. Surv. Tutorials 17(3), 1268–1293 (2015)CrossRef
2.
go back to reference Xu, H., Zhou, Y., Lyu, M.R.: Towards continuous and passive authentication via touch biometrics: an experimental study on smartphones. In: Proceedings of the Symposium on Usable Privacy and Security, pp. 187–198. Menlo Park (2014) Xu, H., Zhou, Y., Lyu, M.R.: Towards continuous and passive authentication via touch biometrics: an experimental study on smartphones. In: Proceedings of the Symposium on Usable Privacy and Security, pp. 187–198. Menlo Park (2014)
3.
go back to reference Shen, C., Zhang, Y., Cai, Z., Yu, T., Guan, X.: Touch-interaction behavior for continuous user authentication on smartphones. In: International Conference on Biometrics, pp. 157–162, Phuket (2015) Shen, C., Zhang, Y., Cai, Z., Yu, T., Guan, X.: Touch-interaction behavior for continuous user authentication on smartphones. In: International Conference on Biometrics, pp. 157–162, Phuket (2015)
4.
go back to reference Miyamoto, N., Shibata, C., Kinoshita, T.: Authentication by Touch Operation on Smartphone with Support Vector Machine. Int. J. Inf. Secur. Res. 7(2), 725–733 (2017) Miyamoto, N., Shibata, C., Kinoshita, T.: Authentication by Touch Operation on Smartphone with Support Vector Machine. Int. J. Inf. Secur. Res. 7(2), 725–733 (2017)
5.
go back to reference Volaka, H.C., Alptekin, G., Basar, O.E., Isbilen, M., Incel, O.D.: Towards continuous authentication on mobile phones using deep learning models. Procedia Comput. Sci. 155, 177–184 (2019)CrossRef Volaka, H.C., Alptekin, G., Basar, O.E., Isbilen, M., Incel, O.D.: Towards continuous authentication on mobile phones using deep learning models. Procedia Comput. Sci. 155, 177–184 (2019)CrossRef
6.
go back to reference Li, Q., Chen, H.: CDAS: a continuous dynamic authentication system. In: Proceedings of the 8th International Conference on Software and Computer Applications, pp. 447–452. ACM, Penang (2019) Li, Q., Chen, H.: CDAS: a continuous dynamic authentication system. In: Proceedings of the 8th International Conference on Software and Computer Applications, pp. 447–452. ACM, Penang (2019)
7.
go back to reference Shrestha, P., Mohamed, M., Saxena, N.: Slogger: Smashing motion-based touchstroke logging with transparent system noise. In: Proceedings of the 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 67–77. ACM, Darmstadt (2016) Shrestha, P., Mohamed, M., Saxena, N.: Slogger: Smashing motion-based touchstroke logging with transparent system noise. In: Proceedings of the 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 67–77. ACM, Darmstadt (2016)
8.
go back to reference Gong, N.Z., Payer, M., Moazzezi, R., Frank, M.: Towards forgery-resistant touch-based biometric authentication on mobile devices. In: Proceedings of the 11th ACM Asia Conference on Computer and Communications Security, pp. 499–510. ACM, Xi’an (2016) Gong, N.Z., Payer, M., Moazzezi, R., Frank, M.: Towards forgery-resistant touch-based biometric authentication on mobile devices. In: Proceedings of the 11th ACM Asia Conference on Computer and Communications Security, pp. 499–510. ACM, Xi’an (2016)
9.
go back to reference Kudo, M., Yamana, H.: Active authentication on smartphone using touch pressure. In: Proceedings of the 31th ACM symposium on User interface software and technology, pp. 96–98. ACM, Berlin (2018) Kudo, M., Yamana, H.: Active authentication on smartphone using touch pressure. In: Proceedings of the 31th ACM symposium on User interface software and technology, pp. 96–98. ACM, Berlin (2018)
10.
go back to reference Crammer, K., Kulesza, A., Dredze, M.: Adaptive Regularization of Weight Vectors. Proc. Adv. Neural Inf. Process. Syst. 22, 414–422 (2009)MATH Crammer, K., Kulesza, A., Dredze, M.: Adaptive Regularization of Weight Vectors. Proc. Adv. Neural Inf. Process. Syst. 22, 414–422 (2009)MATH
Metadata
Title
Imitation-Resistant Passive Authentication Interface for Stroke-Based Touch Screen Devices
Authors
Masashi Kudo
Hayato Yamana
Copyright Year
2020
DOI
https://doi.org/10.1007/978-3-030-50732-9_72