Skip to main content

2020 | OriginalPaper | Buchkapitel

Mobile Active Authentication based on Multiple Biometric and Behavioral Patterns

verfasst von : Alejandro Acien, Aythami Morales, Ruben Vera-Rodriguez, Julian Fierrez

Erschienen in: Securing Social Identity in Mobile Platforms

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this chapter we evaluate mobile active authentication based on an ensemble of biometrics and behavior-based profiling signals. We consider seven different data channels and their combination. Touch dynamics (touch gestures and keystroking), accelerometer, gyroscope, WiFi, GPS location and app usage are all collected during human-mobile interaction to authenticate the users. We evaluate two approaches: one-time authentication and active authentication. In one-time authentication, we employ the information of all channels available during one session. For active authentication we take advantage of mobile user behavior across multiple sessions by updating a confidence value of the authentication score. Our experiments are conducted on the semi-uncontrolled UMDAA-02 database. This database comprises of smartphone sensor signals acquired during natural human-mobile interaction. Our results show that different traits can be complementary in terms of mobile user authentication and multimodal systems clearly increase the performance when compared to individual biometrics systems with accuracies ranging from 82.2% to 98.0% depending on the authentication scenario.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
Indicate the value below which a given percentage of observation (samples in this case) in a group of observation falls.
 
2
EER refers to the value where False Acceptance Rate (percentage of impostors classified as genuine) and False Rejection Rate (percentage of genuine users classified as impostors) are equal.
 
Literatur
1.
Zurück zum Zitat Radicati S (2018) Mobile statistics report, 2014–2018. The Radicati Group, INC. A Techonology Market Research Firm, Palo Alto Radicati S (2018) Mobile statistics report, 2014–2018. The Radicati Group, INC. A Techonology Market Research Firm, Palo Alto
2.
Zurück zum Zitat Cho G, Huh JH, Cho J, Oh S, Song Y, Kim H (2017) SysPal: system-guided pattern locks for android. In: Proceedings of IEEE Symposium on Security and Privacy, California, UE Cho G, Huh JH, Cho J, Oh S, Song Y, Kim H (2017) SysPal: system-guided pattern locks for android. In: Proceedings of IEEE Symposium on Security and Privacy, California, UE
3.
Zurück zum Zitat Harbach M, von Zezschwitz E, Fichtner A, Luca AD, Smith M (2014) It’s a hard lock life: a field study of smartphone (un)locking behavior and risk perception. In: Proceedings of symposium on usable privacy and security, California, USA Harbach M, von Zezschwitz E, Fichtner A, Luca AD, Smith M (2014) It’s a hard lock life: a field study of smartphone (un)locking behavior and risk perception. In: Proceedings of symposium on usable privacy and security, California, USA
4.
Zurück zum Zitat Molla R (2018) Mary Meeker’s 2018 internet trends report: all the slides, plus analysis. In Recode Molla R (2018) Mary Meeker’s 2018 internet trends report: all the slides, plus analysis. In Recode
5.
Zurück zum Zitat Martinez-Diaz M, Fierrez J, Galbally J (2016) Graphical password-based user authentication with free-form doodles. IEEE Trans Human-Machine Syst 46(4):607–661CrossRef Martinez-Diaz M, Fierrez J, Galbally J (2016) Graphical password-based user authentication with free-form doodles. IEEE Trans Human-Machine Syst 46(4):607–661CrossRef
6.
Zurück zum Zitat Crouse D, Han H, Chandra D, Barbello B, Jain AK (2015) Continuous authentication of Mobile user: fusion of face image and inertial measurement unit data. In: Proceedings of IAPR international conference on biometrics, Phuket, Thailand Crouse D, Han H, Chandra D, Barbello B, Jain AK (2015) Continuous authentication of Mobile user: fusion of face image and inertial measurement unit data. In: Proceedings of IAPR international conference on biometrics, Phuket, Thailand
7.
Zurück zum Zitat Patel VM, Chellappa R, Chandra D, Barbello B (2016) Continuous user authentication on mobile devices: recent progress and remaining challenges. IEEE Signal Process Mag 33(4):49–61CrossRef Patel VM, Chellappa R, Chandra D, Barbello B (2016) Continuous user authentication on mobile devices: recent progress and remaining challenges. IEEE Signal Process Mag 33(4):49–61CrossRef
8.
Zurück zum Zitat Mahbub U, Sarkar S, Patel VM, Chellappa R (2016) Active user authentication for smartphones: a challenge data set and benchmark results. In: Proceedings of IEEE 8th international conference on biometrics theory, applications and systems, New York, USA Mahbub U, Sarkar S, Patel VM, Chellappa R (2016) Active user authentication for smartphones: a challenge data set and benchmark results. In: Proceedings of IEEE 8th international conference on biometrics theory, applications and systems, New York, USA
9.
Zurück zum Zitat Fierrez J, Pozo A, Martinez-Diaz M, Galbally J, Morales A (2018) Benchmarking touchscreen biometrics for Mobile authentication. IEEE Trans Inf Forensics Sec 13(11):2720–2733CrossRef Fierrez J, Pozo A, Martinez-Diaz M, Galbally J, Morales A (2018) Benchmarking touchscreen biometrics for Mobile authentication. IEEE Trans Inf Forensics Sec 13(11):2720–2733CrossRef
10.
Zurück zum Zitat G. Li and P. Bours (2018). Studying WiFi and accelerometer data based authentication method on mobile phones. In: Proceedings of 2nd international conference on biometric engineering and applications, Amsterdam, Netherlands G. Li and P. Bours (2018). Studying WiFi and accelerometer data based authentication method on mobile phones. In: Proceedings of 2nd international conference on biometric engineering and applications, Amsterdam, Netherlands
11.
Zurück zum Zitat Buschek D, De Luca A, Alt F (2015) Improving accuracy, applicability and usability of keystroke biometrics on mobile touchscreen devices. In: Proceedings of 33rd annual ACM conference on human factors in computing systems, Seoul, Republic of Korea Buschek D, De Luca A, Alt F (2015) Improving accuracy, applicability and usability of keystroke biometrics on mobile touchscreen devices. In: Proceedings of 33rd annual ACM conference on human factors in computing systems, Seoul, Republic of Korea
12.
Zurück zum Zitat Li G, Bours P (2018) A novel mobilephone application authentication approach based on accelerometer and gyroscope data. In: Proceedings of 17th international conference of the biometrics specials interest group, Fraunhofer, Germany Li G, Bours P (2018) A novel mobilephone application authentication approach based on accelerometer and gyroscope data. In: Proceedings of 17th international conference of the biometrics specials interest group, Fraunhofer, Germany
13.
Zurück zum Zitat Mahbub U, Chellappa R (2016) PATH: person authentication using trace histories. In: Proceedings of ubiquitous computing, electronics & mobile communication conference, IEEE, New York, USA Mahbub U, Chellappa R (2016) PATH: person authentication using trace histories. In: Proceedings of ubiquitous computing, electronics & mobile communication conference, IEEE, New York, USA
14.
Zurück zum Zitat Mahbub U, Komulainen J, Ferreira D, Chellappa R (2018) Continuous authentication of smartphones based on application usage. IEEE Transactions on Biometrics, Behavior, and Identity Science 1(3):165–180 Mahbub U, Komulainen J, Ferreira D, Chellappa R (2018) Continuous authentication of smartphones based on application usage. IEEE Transactions on Biometrics, Behavior, and Identity Science 1(3):165–180
15.
Zurück zum Zitat Monaco JV, Tappert CC (2018) The partially observable hidden Markov model and its application to keystroke dynamics. Pattern Recogn 76:449–462CrossRef Monaco JV, Tappert CC (2018) The partially observable hidden Markov model and its application to keystroke dynamics. Pattern Recogn 76:449–462CrossRef
16.
Zurück zum Zitat Fierrez J, Morales A, Vera-Rodriguez R, Camacho D (2018) Multiple classifiers in biometrics. Part 2: trends and challenges. Inf Fusion 44:103–112CrossRef Fierrez J, Morales A, Vera-Rodriguez R, Camacho D (2018) Multiple classifiers in biometrics. Part 2: trends and challenges. Inf Fusion 44:103–112CrossRef
17.
Zurück zum Zitat Marcel S, Nixon MS, Fierrez J, Evans N (2019) Handbook of biometric anti-spoofing. presentation attack detection, Advances in computer vision and pattern recognition. Springer, ChamCrossRef Marcel S, Nixon MS, Fierrez J, Evans N (2019) Handbook of biometric anti-spoofing. presentation attack detection, Advances in computer vision and pattern recognition. Springer, ChamCrossRef
18.
Zurück zum Zitat Shi W, Yang J, Jiang Y, Yang F, Xiong Y (2011) Senguard: passive user identification on smartphones using multiple sensors. In: Proceedings of 7th IEEE international conference on wireless and mobile computing, networking and communications, Shangai, China, pp 141–148 Shi W, Yang J, Jiang Y, Yang F, Xiong Y (2011) Senguard: passive user identification on smartphones using multiple sensors. In: Proceedings of 7th IEEE international conference on wireless and mobile computing, networking and communications, Shangai, China, pp 141–148
19.
Zurück zum Zitat Fridman L, Weber S, Greenstadt R, Kam M (2015) Active authentication on mobile devices via stylometry, GPS location, web browsing behavior, and application usage patterns. IEEE Syst J 11(2):513–521CrossRef Fridman L, Weber S, Greenstadt R, Kam M (2015) Active authentication on mobile devices via stylometry, GPS location, web browsing behavior, and application usage patterns. IEEE Syst J 11(2):513–521CrossRef
20.
Zurück zum Zitat Liu X, Shen C, Chen Y (2018) Multi-source interactive behavior analysis for continuous user authentication on smartphones. In: Proceedings of Chinese conference on biometric recognition, Urumchi, China Liu X, Shen C, Chen Y (2018) Multi-source interactive behavior analysis for continuous user authentication on smartphones. In: Proceedings of Chinese conference on biometric recognition, Urumchi, China
21.
Zurück zum Zitat Li G, Bours P (2018) A mobile app authentication approach by fusing the scores from multi-modal data. In: Proceedings of 21st international conference on information fusion, Cambridge, UK Li G, Bours P (2018) A mobile app authentication approach by fusing the scores from multi-modal data. In: Proceedings of 21st international conference on information fusion, Cambridge, UK
22.
Zurück zum Zitat Deb D, Ross A, Jain AK, Prakah-Asante K,Prasad KV (2019) Actions Speak Louder Than (Pass) words: Passive Authentication of Smartphone Users via Deep Temporal Features. In: Proceedings of the 12th IAPR International Conference on Biometrics, Crete, Greece Deb D, Ross A, Jain AK, Prakah-Asante K,Prasad KV (2019) Actions Speak Louder Than (Pass) words: Passive Authentication of Smartphone Users via Deep Temporal Features. In: Proceedings of the 12th IAPR International Conference on Biometrics, Crete, Greece
23.
Zurück zum Zitat Martinez-Diaz M, Fierrez J, Krish RP, Galbally J (2014) Mobile signature verification: feature robustness and performance comparison. IET Biometrics 3(4):267–277CrossRef Martinez-Diaz M, Fierrez J, Krish RP, Galbally J (2014) Mobile signature verification: feature robustness and performance comparison. IET Biometrics 3(4):267–277CrossRef
24.
Zurück zum Zitat O’Neal M, Balagani K, Phoha V, Rosenberg A, Serwadda A, Karim ME (2016) Context-aware active authentication using touch gestures, typing patterns and body movement. Louisiana Tech University, RustonCrossRef O’Neal M, Balagani K, Phoha V, Rosenberg A, Serwadda A, Karim ME (2016) Context-aware active authentication using touch gestures, typing patterns and body movement. Louisiana Tech University, RustonCrossRef
25.
Zurück zum Zitat Morales JF, Tolosana R, Ortega-Garcia J, Galbally J, Gomez-Barrero M, Anjos A (2016) Keystroke biometrics ongoing competition. IEEE Access 4:7736–7746CrossRef Morales JF, Tolosana R, Ortega-Garcia J, Galbally J, Gomez-Barrero M, Anjos A (2016) Keystroke biometrics ongoing competition. IEEE Access 4:7736–7746CrossRef
26.
Zurück zum Zitat Perera P, Patel VM (2018) Efficient and low latency detection of intruders in mobile active authentication. IEEE Trans Inf Forensics Secur 13(6):1392–1405CrossRef Perera P, Patel VM (2018) Efficient and low latency detection of intruders in mobile active authentication. IEEE Trans Inf Forensics Secur 13(6):1392–1405CrossRef
27.
Zurück zum Zitat Ernst R (2019) Mobile phone afterlife – why the second-hand market will be all the rage in 2019. In RCR Wireless News Ernst R (2019) Mobile phone afterlife – why the second-hand market will be all the rage in 2019. In RCR Wireless News
Metadaten
Titel
Mobile Active Authentication based on Multiple Biometric and Behavioral Patterns
verfasst von
Alejandro Acien
Aythami Morales
Ruben Vera-Rodriguez
Julian Fierrez
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-39489-9_9