Skip to main content

Stimuli for Gaze Based Intrusion Detection

  • Conference paper
  • First Online:
Future Information Technology, Application, and Service

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 164))

Abstract

User authentication is an important and usually final barrier to detect and prevent illicit access. Nonetheless it can be broken or tricked, leaving the system and its data vulnerable to abuse. In this paper we consider how eye tracking can enable the system to hypothesize if the user is familiar with the system he operates, or if he is an unfamiliar intruder. Based on an eye tracking experiment conducted with 12 users and various stimuli, we investigate which conditions and measures are most suited for such an intrusion detection. We model the user’s gaze behavior as a selector for information flow via the relative conditional gaze entropy. We conclude that this feature provides the most discriminative results with static and repetitive stimuli.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Awad, A.., Ahmed, E.: Detecting computer intrusions using behavioral biometrics. Department of Electrical and Computer Engineering, University of Victoria (2005). http://citeseerx.ist.psu.edu/viewdoc/summary? doi=10.1.1.66.2289

    Google Scholar 

  2. Bledsoe, W.: The model method in facial recognition, Panoramic Research Inc.,Palo Alto (1964)

    Google Scholar 

  3. Daugman, J.G.: High confidence visual recognition of persons by a test of statistical independence. IEEE Trans. Pattern Anal. Mach Intell 15(11), 1148–1161 (1993). http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=244676

    Google Scholar 

  4. De Luca, A., Weiss, R., Hußmann, H., An, X.: Eyepass—eye-stroke authentication for public terminals. CHI EA ’08: CHI ’08 extended abstracts on Human factors in computing systems (Apr 2008). http://portal.acm.org/citation.cfm?id=1358628.1358798

    Google Scholar 

  5. Dunphy, P., Fitch, A.: Gaze-contingent passwords at the ATM. The 4th Conference on Communication by Gaze Interaction—Communication, Environment and Mobility Control by Gaze (2008)

    Google Scholar 

  6. Kasprowski, P.: Human identification using eye movements. Doctoral thesis (2004). http://www.kasprowski.pl/phd/

    Google Scholar 

  7. Kinnunen, T., Sedlak, F., Bednarik, R.: Towards task-independent person authentication using eye movement signals. In: ETRA ’10: Proceedings of the 2010 Symposium on Eye-Tracking Research & Applications. School of ComputingUniversity of Eastern Finland, Joensuu, Finland, ACM Request Permissions (Mar 2010). http://dl.acm.org/citation.cfm?id=1743666.1743712

    Google Scholar 

  8. Reichle, E.D., Rayner, K., Pollatsek, A.: Eye movement control in reading: accounting for initial fixation locations and refixations within the E-Z Reader model. Vis. Res. 39(26), 4403–4411 (1999)

    Article  Google Scholar 

  9. Schneier, B.: Secrets and Lies—Digital Security in a Networked World. Wiley, New York (2004). http://www.worldcat.org/title/secrets-and-lies-digital-security-in-a-ne tworked-world-with-new-information-about-post-911-security/oclc/443509536

    Google Scholar 

  10. Weaver, J., Mock, K., Hoanca, B.: Gaze-based password authentication through automatic clustering of gaze points. In: 2011 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 2749–2754 (2011)

    Google Scholar 

  11. Wyatte, D., Busey, T.: Low and high level changes in eye gaze behavior as a result of expertise. Eye 60(70), 80–90 (2008)

    Google Scholar 

  12. Xiao, Q.: Security issues in biometric authentication. In: Information Assurance Workshop, 2005. IAW ’05. Proceedings from the Sixth Annual IEEE SMC, pp. 8–13 (2005)

    Google Scholar 

  13. Yan, J.: Continuous authentication based on computer security. Tech. rep., Luleå University of Technology (2009. http://epubl.ltu.se/1653-0187/2009/005/LTU-PB-EX-09005-SE.pdf

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ralf Biedert .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer Science+Business Media Dortdrecht

About this paper

Cite this paper

Biedert, R., Frank, M., Martinovic, I., Song, D. (2012). Stimuli for Gaze Based Intrusion Detection. In: J. (Jong Hyuk) Park, J., Leung, V., Wang, CL., Shon, T. (eds) Future Information Technology, Application, and Service. Lecture Notes in Electrical Engineering, vol 164. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-4516-2_80

Download citation

  • DOI: https://doi.org/10.1007/978-94-007-4516-2_80

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-007-4515-5

  • Online ISBN: 978-94-007-4516-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics