Skip to main content
Erschienen in: International Journal of Information Security 6/2015

01.11.2015 | Regular Contribution

Gait authentication on mobile phone using biometric cryptosystem and fuzzy commitment scheme

verfasst von: Thang Hoang, Deokjai Choi, Thuc Nguyen

Erschienen in: International Journal of Information Security | Ausgabe 6/2015

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Authentication systems using gait captured from inertial sensors have been recently developed to enhance the limitation of existing mechanisms on mobile devices and achieved promising results. However, most these systems employed pattern recognition and machine learning techniques in which biometric templates are stored insecurely, which could leave critical security and user privacy issues. Specifically, a compromise of original gait templates could result in everlasting forfeiture. In this paper, two main results will be presented. Firstly, we propose a novel gait authentication system on mobile devices in which the security and privacy are preserved by employing a fuzzy commitment scheme. Instead of storing original gait templates for user verification like in conventional approaches, we verify the user via a stored key which is biometrically encrypted by gait templates collected from a mobile accelerometer. Secondly, the discriminability of sensor-based gait templates are investigated to determine appropriate parameter values to construct an effective gait-based biometric cryptosystem. The performance of our proposed system is evaluated on the dataset including gait signals of 34 volunteers. We achieved the zeroFAR and the False Rejection Rate of approximately 16.18 % corresponding to the key length, as well as the system security level of 139 bits. The results from our experiment show that accelerometer-based gait could be further investigated to construct a biometric cryptosystem, as effective as other biometric traits such as iris, fingerprint, voice, and signature.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
Gait cycle is defined as the time interval between two successive occurrences of one of the repetitive events during walking, as illustrated in Fig. 2b
 
Literatur
2.
Zurück zum Zitat Galbally, J., Cappelli, R., Lumini, A., Gonzalez-de-Rivera, G., Maltoni, D., Fierrez, J., Ortega-Garcia, J., Maio, D.: An evaluation of direct attacks using fake fingers generated from ISO templates. Pattern Recognit. Lett. 31(8), 725–732 (2010). doi:10.1016/j.patrec.2009.09.032 CrossRef Galbally, J., Cappelli, R., Lumini, A., Gonzalez-de-Rivera, G., Maltoni, D., Fierrez, J., Ortega-Garcia, J., Maio, D.: An evaluation of direct attacks using fake fingers generated from ISO templates. Pattern Recognit. Lett. 31(8), 725–732 (2010). doi:10.​1016/​j.​patrec.​2009.​09.​032 CrossRef
3.
Zurück zum Zitat Ngo, T.T., Makihara, Y., Nagahara, H., Mukaigawa, Y., Yagi, Y.: The largest inertial sensor-based gait database and performance evaluation of gait-based personal authentication. Pattern Recognit. 47(1), 228–237 (2014). doi:10.1016/j.patcog.2013.06.028 CrossRef Ngo, T.T., Makihara, Y., Nagahara, H., Mukaigawa, Y., Yagi, Y.: The largest inertial sensor-based gait database and performance evaluation of gait-based personal authentication. Pattern Recognit. 47(1), 228–237 (2014). doi:10.​1016/​j.​patcog.​2013.​06.​028 CrossRef
6.
Zurück zum Zitat Frank, J., Mannor, S., Precup, D.: Activity and gait recognition with time-delay embeddings. In: AAAI, pp 1581–1586 (2010) Frank, J., Mannor, S., Precup, D.: Activity and gait recognition with time-delay embeddings. In: AAAI, pp 1581–1586 (2010)
7.
Zurück zum Zitat Hoang, T., Choi, D., Vo, V., Nguyen, A., Nguyen, T.: A lightweight gait authentication on mobile phone regardless of installation error. In: Security and Privacy Protection in Information Processing Systems, pp. 83–101. Springer, Berlin (2013). doi:10.1007/978-3-642-39218-4_7 Hoang, T., Choi, D., Vo, V., Nguyen, A., Nguyen, T.: A lightweight gait authentication on mobile phone regardless of installation error. In: Security and Privacy Protection in Information Processing Systems, pp. 83–101. Springer, Berlin (2013). doi:10.​1007/​978-3-642-39218-4_​7
8.
Zurück zum Zitat Lu, H., Huang, J., Saha, T., Nachman, L.: Unobtrusive gait verification for mobile phones. In: Proceedings of the 2014 ACM International Symposium on Wearable Computers, pp. 91–98. ACM (2014). doi:10.1145/2634317.2642868 Lu, H., Huang, J., Saha, T., Nachman, L.: Unobtrusive gait verification for mobile phones. In: Proceedings of the 2014 ACM International Symposium on Wearable Computers, pp. 91–98. ACM (2014). doi:10.​1145/​2634317.​2642868
10.
Zurück zum Zitat Mjaaland, B. B., Bours, P., Gligoroski, D.: Walk the walk: attacking gait biometrics by imitation. In: Information Security (pp. 361–380). Springer, Berlin, Heidelberg (2011). doi:10.1007/978-3-642-18178-8_31 Mjaaland, B. B., Bours, P., Gligoroski, D.: Walk the walk: attacking gait biometrics by imitation. In: Information Security (pp. 361–380). Springer, Berlin, Heidelberg (2011). doi:10.​1007/​978-3-642-18178-8_​31
11.
Zurück zum Zitat Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In: Proceedings of the 6th ACM Conference on Computer and Communications Security, pp. 28–36. ACM (1999). doi:10.1145/319709.319714 Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In: Proceedings of the 6th ACM Conference on Computer and Communications Security, pp. 28–36. ACM (1999). doi:10.​1145/​319709.​319714
12.
Zurück zum Zitat Van Der Veen, M., Kevenaar, T., Schrijen, G. J., Akkermans, T. H., Zuo, F.: Face biometrics with renewable templates. In: Proceedings of SPIE (vol. 6072, No. 1, p. 60720J) (2006). doi:10.1117/12.643176 Van Der Veen, M., Kevenaar, T., Schrijen, G. J., Akkermans, T. H., Zuo, F.: Face biometrics with renewable templates. In: Proceedings of SPIE (vol. 6072, No. 1, p. 60720J) (2006). doi:10.​1117/​12.​643176
13.
Zurück zum Zitat Morelos-Zaragoza, R.H.: The Art of Error Correcting Coding. Wiley, New York (2006)CrossRef Morelos-Zaragoza, R.H.: The Art of Error Correcting Coding. Wiley, New York (2006)CrossRef
19.
Zurück zum Zitat Carrara, B., Adams, C.: You are the key: generating cryptographic keys from voice biometrics. In: 2010 Eighth Annual International Conference on Privacy Security and Trust (PST) (pp. 213–222). IEEE (2010). doi:10.1109/PST.2010.5593251 Carrara, B., Adams, C.: You are the key: generating cryptographic keys from voice biometrics. In: 2010 Eighth Annual International Conference on Privacy Security and Trust (PST) (pp. 213–222). IEEE (2010). doi:10.​1109/​PST.​2010.​5593251
21.
Zurück zum Zitat Argyropoulos, S., Tzovaras, D., Ioannidis, D., Strintzis, M.G.: A channel coding approach for human authentication from gait sequences. IEEE Trans. Inf. Forensics Secur. 4(3), 428–440 (2009). doi:10.1109/TIFS.2009.2025858 CrossRef Argyropoulos, S., Tzovaras, D., Ioannidis, D., Strintzis, M.G.: A channel coding approach for human authentication from gait sequences. IEEE Trans. Inf. Forensics Secur. 4(3), 428–440 (2009). doi:10.​1109/​TIFS.​2009.​2025858 CrossRef
22.
Zurück zum Zitat Menezes, A.J., Van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Washington (2010) Menezes, A.J., Van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Washington (2010)
25.
Zurück zum Zitat Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. In: Advances in Cryptology-Eurocrypt 2004, pp. 523–540. Springer, Berlin, Heidelberg (2004). doi:10.1007/978-3-540-24676-3_31 Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. In: Advances in Cryptology-Eurocrypt 2004, pp. 523–540. Springer, Berlin, Heidelberg (2004). doi:10.​1007/​978-3-540-24676-3_​31
26.
Zurück zum Zitat Li, Q., Sutcu, Y., Memon, N.: Secure sketch for biometric templates. In: Advances in CryptologyASIACRYPT 2006, pp. 99–113. Springer, Berlin, Heidelberg (2006). doi:10.1007/11935230_7 Li, Q., Sutcu, Y., Memon, N.: Secure sketch for biometric templates. In: Advances in CryptologyASIACRYPT 2006, pp. 99–113. Springer, Berlin, Heidelberg (2006). doi:10.​1007/​11935230_​7
Metadaten
Titel
Gait authentication on mobile phone using biometric cryptosystem and fuzzy commitment scheme
verfasst von
Thang Hoang
Deokjai Choi
Thuc Nguyen
Publikationsdatum
01.11.2015
Verlag
Springer Berlin Heidelberg
Erschienen in
International Journal of Information Security / Ausgabe 6/2015
Print ISSN: 1615-5262
Elektronische ISSN: 1615-5270
DOI
https://doi.org/10.1007/s10207-015-0273-1

Weitere Artikel der Ausgabe 6/2015

International Journal of Information Security 6/2015 Zur Ausgabe