Skip to main content
Top

2022 | OriginalPaper | Chapter

On-Demand Biometric Authentication for System-User Management

Author : Isao Nakanishi

Published in: HCI for Cybersecurity, Privacy and Trust

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

To realize a secure system-user management, continuous authentication must be implemented in the system. In addition, only limited biometrics that can be measured passively are applicable for continuous authentication. However, continuous authentication is a heavy processing load for the system. In this study, possible methods for conducting a continuous authentication are examined from the viewpoint of reducing the processing load, and two types of on-demand authentication approaches are confirmed to be effective.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
If the threshold for determining whether a user of a system is genuine becomes high, the security of the system increases, whereas the usability is decreased because a user may be rejected many times even if the user is genuine.
 
2
Even if the user changes into someone else after authentication, it is possible to deal with the spoofing by authenticating the user nonperiodically while increasing the frequency of the authentication, that is, applying a processing load. The authentication frequency should be determined by considering the increase in the processing load.
 
3
The break is assumed to be temporal, for instance, a temporary interruption to think while using a computer, or a temporary stop at a traffic signal while driving. If the user leaves the system, it is considered that the work has been completed and a log-in authentication will be required again.
 
4
In on-demand authentication, passively detectable biometrics are also used for a login authentication, whereas action-related authentication requires the user to use other biometrics or a password/ID card for login authentication.
 
Literature
1.
go back to reference Baig, A.F., Eskeland, S.: Security, privacy, and usability in continuous authentication: a survey. Sensors 21, 1–26 (2021)CrossRef Baig, A.F., Eskeland, S.: Security, privacy, and usability in continuous authentication: a survey. Sensors 21, 1–26 (2021)CrossRef
3.
go back to reference Jain, A., Bolle, R., Pankanti, S.: BIOMETRICS Personal Identification in Networked Society. Kluwer Academic Publishers, Norwell (1999) Jain, A., Bolle, R., Pankanti, S.: BIOMETRICS Personal Identification in Networked Society. Kluwer Academic Publishers, Norwell (1999)
4.
go back to reference EU privacy watchdogs call for ban on facial recognition in public spaces. Reuters Tech News, 21 June 2021 EU privacy watchdogs call for ban on facial recognition in public spaces. Reuters Tech News, 21 June 2021
5.
go back to reference Nakanishi, I.: Unconscious biometrics for continuous user verification. In: Proceedings of the 8th International Conference on Signal Processing Systems (ICSPS2016), pp. 20–25 (2016) Nakanishi, I.: Unconscious biometrics for continuous user verification. In: Proceedings of the 8th International Conference on Signal Processing Systems (ICSPS2016), pp. 20–25 (2016)
6.
go back to reference Nakanishi, I., Yorikane, Y., Itoh, Y., Fukui, Y.: Biometric identity verification using intra-body propagation signal. In: Proceedings of 2007 Biometrics Symposium (2007) Nakanishi, I., Yorikane, Y., Itoh, Y., Fukui, Y.: Biometric identity verification using intra-body propagation signal. In: Proceedings of 2007 Biometrics Symposium (2007)
7.
go back to reference Nakanishi, I., Sodani, Y., Li, S.: User verification based on the support vector machine using intra-body propagation signals. Int. J. Biometrics 5(3/4), 288–305 (2013)CrossRef Nakanishi, I., Sodani, Y., Li, S.: User verification based on the support vector machine using intra-body propagation signals. Int. J. Biometrics 5(3/4), 288–305 (2013)CrossRef
8.
go back to reference Inada, T., Sodani, Y., Nakanishi, I.: Intra-palm propagation signals as suitable biometrics for successive authentication. J. Comput. Technol. Appl. 7(2), 65–72 (2016) Inada, T., Sodani, Y., Nakanishi, I.: Intra-palm propagation signals as suitable biometrics for successive authentication. J. Comput. Technol. Appl. 7(2), 65–72 (2016)
9.
go back to reference Nakanishi, I., Ogushi, I., Nishi, R., Murakami, T.: Effect of propagation signal and path on verification performance using intra-body propagation signals. In: Proceedings of 2017 International Conference on Biometrics Engineering and Application (ICBEA2017), pp. 80–84 (2017) Nakanishi, I., Ogushi, I., Nishi, R., Murakami, T.: Effect of propagation signal and path on verification performance using intra-body propagation signals. In: Proceedings of 2017 International Conference on Biometrics Engineering and Application (ICBEA2017), pp. 80–84 (2017)
10.
go back to reference Fujita, K., Ishimoto, Y., Nakanishi, I.: Person verification using intra-palm propagation signals with a new phase spectrum. In: Proceedings of 12th International Conference on Knowledge and Smart Technology (KST2020), pp. 86–90 (2020) Fujita, K., Ishimoto, Y., Nakanishi, I.: Person verification using intra-palm propagation signals with a new phase spectrum. In: Proceedings of 12th International Conference on Knowledge and Smart Technology (KST2020), pp. 86–90 (2020)
11.
go back to reference Nakanishi, I., Miyamoto, C., Baba, C.: EEG based biometric authentication using new spectral features. In: Proceedings of 2009 IEEE International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS2009), pp. 651–654 (2009) Nakanishi, I., Miyamoto, C., Baba, C.: EEG based biometric authentication using new spectral features. In: Proceedings of 2009 IEEE International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS2009), pp. 651–654 (2009)
12.
go back to reference Nakanishi, I., Baba, S., Miyamoto, C., Li, S.: Person authentication using a new feature vector of the brain wave. J. Commun. Comput. 9(1), 101–105 (2012) Nakanishi, I., Baba, S., Miyamoto, C., Li, S.: Person authentication using a new feature vector of the brain wave. J. Commun. Comput. 9(1), 101–105 (2012)
13.
go back to reference Nakanishi, I., Miyamoto, C., Li, S.: Brain waves as biometrics in relaxed and mentally tasked conditions with eyes closed. Int. J. Biometrics 4(4), 357–372 (2012)CrossRef Nakanishi, I., Miyamoto, C., Li, S.: Brain waves as biometrics in relaxed and mentally tasked conditions with eyes closed. Int. J. Biometrics 4(4), 357–372 (2012)CrossRef
14.
go back to reference Nakanishi, I., Baba, S., Ozaki, K., Li, S.: Using brain waves as transparent biometrics for on-demand driver authentication. Int. J. Biometrics 5(3/4), 321–335 (2013)CrossRef Nakanishi, I., Baba, S., Ozaki, K., Li, S.: Using brain waves as transparent biometrics for on-demand driver authentication. Int. J. Biometrics 5(3/4), 321–335 (2013)CrossRef
15.
go back to reference Nakanishi, I., Yoshikawa, T.: Brain waves as unconscious biometrics towards continuous authentication - the effects of introducing PCA into feature extraction. In: Proceedings of 2015 IEEE International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS2015), pp. 422–425 (2015) Nakanishi, I., Yoshikawa, T.: Brain waves as unconscious biometrics towards continuous authentication - the effects of introducing PCA into feature extraction. In: Proceedings of 2015 IEEE International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS2015), pp. 422–425 (2015)
16.
go back to reference Nakanishi, I., Maruoka, T.: Biometrics using electroencephalograms stimulated by personal ultrasound and multidimensional nonlinear features. Electronics 9(24), 1–18 (2020) Nakanishi, I., Maruoka, T.: Biometrics using electroencephalograms stimulated by personal ultrasound and multidimensional nonlinear features. Electronics 9(24), 1–18 (2020)
17.
go back to reference Zhang, S., Janakiraman, R., Sim, T., Kumar, S.: Continuous verification using multimodal biometrics. In: Proceedings of International Conference on Biometrics (ICB2006), pp. 562–570 (2006) Zhang, S., Janakiraman, R., Sim, T., Kumar, S.: Continuous verification using multimodal biometrics. In: Proceedings of International Conference on Biometrics (ICB2006), pp. 562–570 (2006)
18.
go back to reference Niinuma, K., Park, U., Jain, A.K.: Soft biometric traits for continuous user authentication. IEEE Trans. Inf. Forensics Secur. 5, 771–780 (2010)CrossRef Niinuma, K., Park, U., Jain, A.K.: Soft biometric traits for continuous user authentication. IEEE Trans. Inf. Forensics Secur. 5, 771–780 (2010)CrossRef
19.
go back to reference Altinok, A., Turk, M.: Temporal integration for continuous multimodal biometrics. In: Proceedings of 2003 Workshop on Multimodal User Authentication, pp. 207–214 (2003) Altinok, A., Turk, M.: Temporal integration for continuous multimodal biometrics. In: Proceedings of 2003 Workshop on Multimodal User Authentication, pp. 207–214 (2003)
21.
go back to reference Frank, M., Biedert, R., Ma, E., Martinovic, I., Song, D.: Touchalytics: on the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE Trans. Inf. Forensics Secur. 8, 136–148 (2012)CrossRef Frank, M., Biedert, R., Ma, E., Martinovic, I., Song, D.: Touchalytics: on the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE Trans. Inf. Forensics Secur. 8, 136–148 (2012)CrossRef
22.
go back to reference Kumar, R., Phoha, V.V., Serwadda, A.: Continuous authentication of smartphone users by fusing typing, swiping, and phone movement patterns. In: Proceedings of 2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS2016) (2016) Kumar, R., Phoha, V.V., Serwadda, A.: Continuous authentication of smartphone users by fusing typing, swiping, and phone movement patterns. In: Proceedings of 2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS2016) (2016)
23.
go back to reference Crawford, H., Renaud, K., Storer, T.: A framework for continuous, transparent mobile device authentication. Comput. Secur. 39, 127–136 (2013)CrossRef Crawford, H., Renaud, K., Storer, T.: A framework for continuous, transparent mobile device authentication. Comput. Secur. 39, 127–136 (2013)CrossRef
24.
go back to reference Crouse, D., Han, H., Chandra, D., Barbello, B., Jain, A.: Continuous authentication of mobile user: fusion of face image and inertial measurement unit data. In: Proceedings of 2015 International Conference on Biometrics (ICB2015) (2015) Crouse, D., Han, H., Chandra, D., Barbello, B., Jain, A.: Continuous authentication of mobile user: fusion of face image and inertial measurement unit data. In: Proceedings of 2015 International Conference on Biometrics (ICB2015) (2015)
25.
go back to reference Patel, V.M., Chellappa, R., Chandra, D., Barbello, B.: Continuous user authentication on mobile devices: recent progress and remaining challenges. IEEE Signal Process. Mag. 33, 49–61 (2016)CrossRef Patel, V.M., Chellappa, R., Chandra, D., Barbello, B.: Continuous user authentication on mobile devices: recent progress and remaining challenges. IEEE Signal Process. Mag. 33, 49–61 (2016)CrossRef
26.
go back to reference Mondal, S., Bours, P.: A computational approach to the continuous authentication biometric system. Inf. Sci. 304, 28–53 (2015)CrossRef Mondal, S., Bours, P.: A computational approach to the continuous authentication biometric system. Inf. Sci. 304, 28–53 (2015)CrossRef
27.
go back to reference Mondal, S., Bours, P.: A study on continuous authentication using a combination of keystroke and mouse biometrics. Neurocomputing 230, 1–22 (2017)CrossRef Mondal, S., Bours, P.: A study on continuous authentication using a combination of keystroke and mouse biometrics. Neurocomputing 230, 1–22 (2017)CrossRef
29.
go back to reference Nakanishi, I., Baba, S., Li, S.: Evaluation of brain waves as biometrics for driver authentication using simplified driving simulator. In: Proceedings of 2011 International Conference on Biometrics and Kansei Engineering (ICBAKE2011), pp. 71–76 (2011) Nakanishi, I., Baba, S., Li, S.: Evaluation of brain waves as biometrics for driver authentication using simplified driving simulator. In: Proceedings of 2011 International Conference on Biometrics and Kansei Engineering (ICBAKE2011), pp. 71–76 (2011)
30.
go back to reference Nakanishi, I., Baba, S., Li, S.: Driver authentication using brain waves while route tracing as a mental task. In: Proceedings of the 6th International Conference on Security and Cryptography (SECRYPT2011), pp. 90–96 (2011) Nakanishi, I., Baba, S., Li, S.: Driver authentication using brain waves while route tracing as a mental task. In: Proceedings of the 6th International Conference on Security and Cryptography (SECRYPT2011), pp. 90–96 (2011)
31.
go back to reference Nakanishi, I., Fukuda, H. and Li, S.: Biometric verification using brain waves toward on-demand user management systems - performance differences between divided regions in alpha-beta wave band. In: Proceedings of the 6th International Conference on Security of Information and Networks (SIN2013), pp. 131–135 (2013) Nakanishi, I., Fukuda, H. and Li, S.: Biometric verification using brain waves toward on-demand user management systems - performance differences between divided regions in alpha-beta wave band. In: Proceedings of the 6th International Conference on Security of Information and Networks (SIN2013), pp. 131–135 (2013)
Metadata
Title
On-Demand Biometric Authentication for System-User Management
Author
Isao Nakanishi
Copyright Year
2022
DOI
https://doi.org/10.1007/978-3-031-05563-8_16