Skip to main content

2017 | OriginalPaper | Buchkapitel

On-line Gesture Based User Authentication System Robust to Shoulder Surfing

verfasst von : Suman Bhoi, Debi Prosad Dogra, Partha Pratim Roy

Erschienen in: Proceedings of International Conference on Computer Vision and Image Processing

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

People often prefer to preserve a lot of confidential information in different electronic devices such as laptops, desktops, tablets, etc. Access to these personalized devices are managed through well known and robust user authentication techniques. Therefore, designing authentication methodologies using various input modalities received much attention of the researchers of this domain. Since we access such personalized devices everywhere including crowded places such as offices, public places, meeting halls, etc., the risk of an imposter gaining one’s identification information becomes highly feasible. One of the oldest but effective form of identity theft by observation is known as shoulder surfing. Patterns drawn by the authentic user on tablet surfaces or keys typed through keyboard can easily be recognized through shoulder surfing. Contact-less user interface devices such as Leap Motion controller can be used to mitigate some of the limitations of existing contact-based input methodologies. In this paper, we propose a robust user authentication technique that has been designed to counter the chances of getting one’s identity stolen by shoulder surfing. Our results reveal that, the proposed methodology can be quite effective to design robust user authentication systems, especially for personalized electronic devices.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Jansen, W.: Authenticating users on handheld devices. In: Proceedings of the Canadian Information Technology Security Symposium, pp. 1–12 (2003) Jansen, W.: Authenticating users on handheld devices. In: Proceedings of the Canadian Information Technology Security Symposium, pp. 1–12 (2003)
2.
Zurück zum Zitat Iwai, Y., Shimizu, H., Yachida, M.: Real-time context-based gesture recognition using HMM and automaton. In: International Workshop on Recognition, Analysis, and Tracking of Faces and Gestures in Real-Time Systems, pp. 127–134 (1999) Iwai, Y., Shimizu, H., Yachida, M.: Real-time context-based gesture recognition using HMM and automaton. In: International Workshop on Recognition, Analysis, and Tracking of Faces and Gestures in Real-Time Systems, pp. 127–134 (1999)
3.
Zurück zum Zitat Rashid, O., Al-Hamadi, A., Michaelis, B.: A framework for the integration of gesture and posture recognition using HMM and SVM. In: IEEE International Conference on Intelligent Computing and Intelligent Systems, vol. 4, pp. 572–577 (2009) Rashid, O., Al-Hamadi, A., Michaelis, B.: A framework for the integration of gesture and posture recognition using HMM and SVM. In: IEEE International Conference on Intelligent Computing and Intelligent Systems, vol. 4, pp. 572–577 (2009)
4.
Zurück zum Zitat Shrivastava, R.: A hidden Markov model based dynamic hand gesture recognition system using OpenCV. In: 3rd IEEE International Conference on Advance Computing, pp. 947–950 (2013) Shrivastava, R.: A hidden Markov model based dynamic hand gesture recognition system using OpenCV. In: 3rd IEEE International Conference on Advance Computing, pp. 947–950 (2013)
5.
Zurück zum Zitat Rabiner, L.: A tutorial on hidden Markov models and selected applications in speech recognition. In: Proceedings of the IEEE, vol. 77, no. 2, pp. 257–286 (1989) Rabiner, L.: A tutorial on hidden Markov models and selected applications in speech recognition. In: Proceedings of the IEEE, vol. 77, no. 2, pp. 257–286 (1989)
6.
Zurück zum Zitat Yamato, J., Ohya, J., Ishii, K.: Recognizing human action in time-sequential images using hidden Markov model. In: IEEE Computer Society Conference on Computer Vision and Pattern Recognition, pp. 379–385 (1992) Yamato, J., Ohya, J., Ishii, K.: Recognizing human action in time-sequential images using hidden Markov model. In: IEEE Computer Society Conference on Computer Vision and Pattern Recognition, pp. 379–385 (1992)
7.
Zurück zum Zitat Seo, H., Kang Kim, H.: User Input Pattern-Based Authentication Method to Prevent Mobile E-Financial Incidents. In: Ninth IEEE International Symposium on Parallel and Distributed Processing with Applications Workshops (ISPAW), pp. 382–387 (2011) Seo, H., Kang Kim, H.: User Input Pattern-Based Authentication Method to Prevent Mobile E-Financial Incidents. In: Ninth IEEE International Symposium on Parallel and Distributed Processing with Applications Workshops (ISPAW), pp. 382–387 (2011)
8.
Zurück zum Zitat Sheng, Y., Phoha, V. V., Rovnyak, S. M.: A parallel decision tree-based method for user authentication based on keystroke patterns. In: IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics, vol. 35, no. 4, pp. 826–833 (2005) Sheng, Y., Phoha, V. V., Rovnyak, S. M.: A parallel decision tree-based method for user authentication based on keystroke patterns. In: IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics, vol. 35, no. 4, pp. 826–833 (2005)
9.
Zurück zum Zitat Mengyu, Q., Suiyuan, Z., Sung, A. H., Qingzhong, L.: A Novel Touchscreen-Based Authentication Scheme Using Static and Dynamic Hand Biometrics. In: 39th Annual IEEE conference on Computer Software and Applications, vol. 2, pp. 494–503 (2015) Mengyu, Q., Suiyuan, Z., Sung, A. H., Qingzhong, L.: A Novel Touchscreen-Based Authentication Scheme Using Static and Dynamic Hand Biometrics. In: 39th Annual IEEE conference on Computer Software and Applications, vol. 2, pp. 494–503 (2015)
10.
Zurück zum Zitat Syed, Z., Banerjee, S., Qi, C., Cukic, B.: Effects of User Habituation in Keystroke Dynamics on Password Security Policy. In: IEEE 13th International Symposium on High-Assurance Systems Engineering (HASE), pp. 352–359 (2011) Syed, Z., Banerjee, S., Qi, C., Cukic, B.: Effects of User Habituation in Keystroke Dynamics on Password Security Policy. In: IEEE 13th International Symposium on High-Assurance Systems Engineering (HASE), pp. 352–359 (2011)
11.
Zurück zum Zitat Frank, M., Biedert, R., Ma, E., Martinovic, I.; Song, D.: Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication. In: IEEE Transactions on Information Forensics and Security, vol. 8, no. 1, pp. 136–148 (2013) Frank, M., Biedert, R., Ma, E., Martinovic, I.; Song, D.: Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication. In: IEEE Transactions on Information Forensics and Security, vol. 8, no. 1, pp. 136–148 (2013)
12.
Zurück zum Zitat Vamsikrishna, K., Dogra, D. P., Desarkar, M. S.: Computer Vision Assisted Palm Rehabilitation With Supervised Learning. In: IEEE Transactions on Biomedical Engineering, DOI:10.1109/TBME.2015.2480881 (2015) Vamsikrishna, K., Dogra, D. P., Desarkar, M. S.: Computer Vision Assisted Palm Rehabilitation With Supervised Learning. In: IEEE Transactions on Biomedical Engineering, DOI:10.​1109/​TBME.​2015.​2480881 (2015)
13.
Zurück zum Zitat Rahman, M., Ahmed, M., Qamar, A., Hossain, D., Basalamah, S.: Modeling therapy rehabilitation sessions using non-invasive serious games. In: Proceedings of the IEEE International Symposium on Medical Measurements and Applications, pp. 1–4 (2014) Rahman, M., Ahmed, M., Qamar, A., Hossain, D., Basalamah, S.: Modeling therapy rehabilitation sessions using non-invasive serious games. In: Proceedings of the IEEE International Symposium on Medical Measurements and Applications, pp. 1–4 (2014)
Metadaten
Titel
On-line Gesture Based User Authentication System Robust to Shoulder Surfing
verfasst von
Suman Bhoi
Debi Prosad Dogra
Partha Pratim Roy
Copyright-Jahr
2017
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-2107-7_50

Neuer Inhalt