Skip to main content

2021 | OriginalPaper | Buchkapitel

Multitrait Selfie: Low-Cost Multimodal Smartphone User Authentication

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Biometric identification is biometric-based authentication on mobile devices that nowadays has become ubiquitous, especially in unattended (e.g., access control for banks) and consumer (e.g., mobile phone unlocking) applications. While, face, fingerprint and inherent behavioral biometrics using inbuilt sensors such as accelerometer for smartphones person authentication, they have yet not achieved the desired or required level of efficiency, security and usability. This chapter presents an uncontrolled multibiometric smartphone framework utilizing multitrait selfie and behavioral biometrics. In particular, the presented system authenticates subject by ocular and face selfie features. This new multimodal biometric system also takes silently into account micro-movements of the phone, movements of the user’s finger on the touchscreen while user is capturing the multitrait selfie and entering passcode simultaneously in a split-screen mode of the smartphone. Addition of micro-movements behaviors enhances not only the performance but also robustness against noise and spoofing attacks. For this study, we collected a mobile multimodal dataset (MultiTouchMove) of touchstroke and phone-movement patterns in the wild from 95 subjects, which is made publicly available by the authors. Preliminary experimental analysis, using public MOBIO Face, VISOB ocular, and MultiTouchMove mobile datasets, on accuracy and usability shows promising results.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
Just 2 days after the iPhone5s hit the market, it was fooled by a fingerprint spoof [3].
 
3
Touch-typing is the act of typing input on the touchscreen of a smartphone.
 
4
The database is made publicly available for research purposes and can be obtained by contacting the authors.
 
8
These are our rudimentary results. We are presently developing inexpensive deep learning topologies for face recognition in-the-wild on smartphones for elevated accuracy and interoperability.
 
Literatur
1.
Zurück zum Zitat Meng, W., Wong, D. S., Furnell, S., & Zhou, J. (2015). Surveying the development of biometric user authentication on Mobile phones. IEEE Communications Surveys & Tutorials, 17(3), 1268–1293.CrossRef Meng, W., Wong, D. S., Furnell, S., & Zhou, J. (2015). Surveying the development of biometric user authentication on Mobile phones. IEEE Communications Surveys & Tutorials, 17(3), 1268–1293.CrossRef
2.
Zurück zum Zitat Schaub, F., Deyhle, R., & Weber, M. (2012). Password entry usability and shoulder surfing susceptibility on different smartphone platforms. In Proc. of the 11th Int’l Conf. on Mobile and Ubiquitous Multimedia (pp. 1–10). Schaub, F., Deyhle, R., & Weber, M. (2012). Password entry usability and shoulder surfing susceptibility on different smartphone platforms. In Proc. of the 11th Int’l Conf. on Mobile and Ubiquitous Multimedia (pp. 1–10).
3.
Zurück zum Zitat Akhtar, Z., Micheloni, C., & Foresti, G. L. (2015). Biometric liveness detection: Challenges and research opportunities. IEEE Security & Privacy, 13(5), 63–72.CrossRef Akhtar, Z., Micheloni, C., & Foresti, G. L. (2015). Biometric liveness detection: Challenges and research opportunities. IEEE Security & Privacy, 13(5), 63–72.CrossRef
4.
Zurück zum Zitat De Luca, A., Hang, A., von Zezschwitz, E., & Hussmann, H. (2015). I feel like I’m taking Selfies all day!: Towards understanding biometric authentication on smartphones. In Proc. of the 33rd Annual ACM Conference on Human Factors in Computing Systems (pp. 1411–1414).CrossRef De Luca, A., Hang, A., von Zezschwitz, E., & Hussmann, H. (2015). I feel like I’m taking Selfies all day!: Towards understanding biometric authentication on smartphones. In Proc. of the 33rd Annual ACM Conference on Human Factors in Computing Systems (pp. 1411–1414).CrossRef
5.
Zurück zum Zitat Buriro, A., Crispo, B., Delfrari, F., & Wrona, K. (2016). Hold and sign: A novel behavioral biometrics for smartphone user authentication. In IEEE Security and Privacy Workshops (pp. 276–285). San Jose, CA: IEEE. Buriro, A., Crispo, B., Delfrari, F., & Wrona, K. (2016). Hold and sign: A novel behavioral biometrics for smartphone user authentication. In IEEE Security and Privacy Workshops (pp. 276–285). San Jose, CA: IEEE.
6.
Zurück zum Zitat Harbach, M., von Zezschwitz, E., Fichtner, A., De Luca, A., & Smith, M. (2014). It’s a hard lock life: A field study of smartphone (un)locking behavior and risk perception. In Symposium On Usable Privacy and Security (pp. 213–230). Harbach, M., von Zezschwitz, E., Fichtner, A., De Luca, A., & Smith, M. (2014). It’s a hard lock life: A field study of smartphone (un)locking behavior and risk perception. In Symposium On Usable Privacy and Security (pp. 213–230).
7.
Zurück zum Zitat Maltoni, D., Maio, M., Jain, A. K., & Prabhakar, S. (2009). Handbook of Fingerprint Recognition (2nd ed.). London: Springer.CrossRef Maltoni, D., Maio, M., Jain, A. K., & Prabhakar, S. (2009). Handbook of Fingerprint Recognition (2nd ed.). London: Springer.CrossRef
8.
Zurück zum Zitat Sitov, Z., et al. (2016). HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users. IEEE Transactions on Information Forensics and Security, 11(5), 877–892.CrossRef Sitov, Z., et al. (2016). HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users. IEEE Transactions on Information Forensics and Security, 11(5), 877–892.CrossRef
9.
Zurück zum Zitat Zhu, J., Wu, P., Wang, X., & Zhang, J. (2013). Sensec: Mobile security through passive sensing. In IEEE Int’l Conf. on Computing, Networking and Communications (ICNC) (pp. 1128–1133). Zhu, J., Wu, P., Wang, X., & Zhang, J. (2013). Sensec: Mobile security through passive sensing. In IEEE Int’l Conf. on Computing, Networking and Communications (ICNC) (pp. 1128–1133).
10.
Zurück zum Zitat Buriro, A., Crispo, B., DelFrari, F., & Wrona, K. (2015). Touchstroke: Smartphone user authentication based on touch-typing biometrics. In New Trends in Image Analysis and Processing–ICIAP Workshops (pp. 27–34). Cham: Springer.CrossRef Buriro, A., Crispo, B., DelFrari, F., & Wrona, K. (2015). Touchstroke: Smartphone user authentication based on touch-typing biometrics. In New Trends in Image Analysis and Processing–ICIAP Workshops (pp. 27–34). Cham: Springer.CrossRef
11.
Zurück zum Zitat Sae-Bae, N., Ahmed, K., Isbister, K., & Memon, N. (2012). Biometric-rich gestures: A novel approach to authentication on multi-touch devices. In Proc. of Conf. on Human Factors in Computing Systems (pp. 977–986). Sae-Bae, N., Ahmed, K., Isbister, K., & Memon, N. (2012). Biometric-rich gestures: A novel approach to authentication on multi-touch devices. In Proc. of Conf. on Human Factors in Computing Systems (pp. 977–986).
12.
Zurück zum Zitat Blanco-Gonzalo, R., Sanchez-Reillo, R., Miguel-Hurtado, O., & Liu-Jimenez, J. (2013). Performance evaluation of handwritten signature recognition in mobile environments. IET Biometrics, 3(3), 139–146.CrossRef Blanco-Gonzalo, R., Sanchez-Reillo, R., Miguel-Hurtado, O., & Liu-Jimenez, J. (2013). Performance evaluation of handwritten signature recognition in mobile environments. IET Biometrics, 3(3), 139–146.CrossRef
13.
Zurück zum Zitat Bhanu, B., & Govindaraju, V. (2011). Multibiometrics for human identification. Cambridge: Cambridge University Press.CrossRef Bhanu, B., & Govindaraju, V. (2011). Multibiometrics for human identification. Cambridge: Cambridge University Press.CrossRef
14.
Zurück zum Zitat Jain, A. K., Flynn, P., & Ross, A. (2008). Handbook of multibiometrics. Cham: Springer.CrossRef Jain, A. K., Flynn, P., & Ross, A. (2008). Handbook of multibiometrics. Cham: Springer.CrossRef
15.
Zurück zum Zitat Kisku, D. R., Rattani, A., Gupta, P., & Sing, J. K. (2009). Biometric sensor image fusion for identity verification: A case study with wavelet-based fusion rules graph matching. In IEEE Conference on Technologies for Homeland Security (pp. 433–439). Kisku, D. R., Rattani, A., Gupta, P., & Sing, J. K. (2009). Biometric sensor image fusion for identity verification: A case study with wavelet-based fusion rules graph matching. In IEEE Conference on Technologies for Homeland Security (pp. 433–439).
16.
Zurück zum Zitat Akhtar, Z., Buriro, A., Crispo, B., & Falk, T. (2017). Multimodal smartphone user authentication using Touchstroke, phone-movement and face patterns. In IEEE Global Conference on Signal and Information Processing (GlobalSIP) (pp. 1368–1372).CrossRef Akhtar, Z., Buriro, A., Crispo, B., & Falk, T. (2017). Multimodal smartphone user authentication using Touchstroke, phone-movement and face patterns. In IEEE Global Conference on Signal and Information Processing (GlobalSIP) (pp. 1368–1372).CrossRef
17.
Zurück zum Zitat Akhtar, Z., (2012). Security of multimodal biometric systems against spoof attacks. PhD thesis, University of Cagliari, Italy. Akhtar, Z., (2012). Security of multimodal biometric systems against spoof attacks. PhD thesis, University of Cagliari, Italy.
18.
Zurück zum Zitat Abeni, P., Baltatu, M., & D’Alessandro, R. (2006). Implementing biometrics based authentication for mobile devices (pp. 1–5). San Francisco, CA: IEEE Globecom. Abeni, P., Baltatu, M., & D’Alessandro, R. (2006). Implementing biometrics based authentication for mobile devices (pp. 1–5). San Francisco, CA: IEEE Globecom.
19.
Zurück zum Zitat Hadid, A., Heikkila, J. Y., Silvén, O., & Pietikainen, M. Face and eye detection for person authentication in mobile phones. In First ACM/IEEE International Conference on Distributed Smart Cameras (pp. 101–108). Hadid, A., Heikkila, J. Y., Silvén, O., & Pietikainen, M. Face and eye detection for person authentication in mobile phones. In First ACM/IEEE International Conference on Distributed Smart Cameras (pp. 101–108).
20.
Zurück zum Zitat Tao, Q., & Veldhuis, R. (2010). Biometric authentication system on mobile personal devices. IEEE Transactions on Instrumentation and Measurement, 59, 763–773.CrossRef Tao, Q., & Veldhuis, R. (2010). Biometric authentication system on mobile personal devices. IEEE Transactions on Instrumentation and Measurement, 59, 763–773.CrossRef
21.
Zurück zum Zitat Chen, S., Pande, A., & Mohapatra, P. (2014). Sensor-assisted facial recognition: An enhanced biometric authentication system for smartphones. In Proceedings of the 12th Annual International Conference on Mobile Systems, Applications, and Services (pp. 109–122). Chen, S., Pande, A., & Mohapatra, P. (2014). Sensor-assisted facial recognition: An enhanced biometric authentication system for smartphones. In Proceedings of the 12th Annual International Conference on Mobile Systems, Applications, and Services (pp. 109–122).
22.
Zurück zum Zitat Akhtar, Z., Buriro, A., Crispo, B., & Falk, T. H. (2017). Multimodal smartphone user authentication using touchstroke, phone-movement and face patterns. In Proceedings of the IEEE Global Conference on Signal and Information Processing (GlobalSIP) (pp. 1368–1372). Akhtar, Z., Buriro, A., Crispo, B., & Falk, T. H. (2017). Multimodal smartphone user authentication using touchstroke, phone-movement and face patterns. In Proceedings of the IEEE Global Conference on Signal and Information Processing (GlobalSIP) (pp. 1368–1372).
23.
Zurück zum Zitat McCool, C., Marcel, S., Hadid, A., Pietikinen, M., Matejka, P., Cernock, J., Poh, N., Kittler, J., Larcher, A., Lvy, C., Matrouf, D., Bonastre, J., Tresadern, P., & Cootes, T. (2012). Bi-Modal Person Recognition on a Mobile Phone: using mobile phone data. In IEEE ICME Workshop on Hot Topics in Mobile Multimedia (pp. 1–6). McCool, C., Marcel, S., Hadid, A., Pietikinen, M., Matejka, P., Cernock, J., Poh, N., Kittler, J., Larcher, A., Lvy, C., Matrouf, D., Bonastre, J., Tresadern, P., & Cootes, T. (2012). Bi-Modal Person Recognition on a Mobile Phone: using mobile phone data. In IEEE ICME Workshop on Hot Topics in Mobile Multimedia (pp. 1–6).
24.
Zurück zum Zitat Teh, P. S., Zhang, N., Jin Teoh, A. B., & Chen, K. (2016). A survey on touch dynamics authentication in mobile devices. Computers & Security, 59(2), 210–235.CrossRef Teh, P. S., Zhang, N., Jin Teoh, A. B., & Chen, K. (2016). A survey on touch dynamics authentication in mobile devices. Computers & Security, 59(2), 210–235.CrossRef
25.
Zurück zum Zitat Buriro, A., Crispo, B., Del Frari, F., Klardie, J., & Wrona, K. (2014). ITSME: Multi-modal and unobtrusive behavioural user authentication for smartphones. In International conference on passwords (pp. 45–61). Buriro, A., Crispo, B., Del Frari, F., Klardie, J., & Wrona, K. (2014). ITSME: Multi-modal and unobtrusive behavioural user authentication for smartphones. In International conference on passwords (pp. 45–61).
26.
Zurück zum Zitat Vidas, T., Votipka, D., & Christin, N. (2011). All your droid are belong to us: A survey of current android attacks. In USENIX Conf. on Offensive Technologies (pp. 1–10). Vidas, T., Votipka, D., & Christin, N. (2011). All your droid are belong to us: A survey of current android attacks. In USENIX Conf. on Offensive Technologies (pp. 1–10).
27.
Zurück zum Zitat Shi, W., Yang, J., Jiang, Y., Yang, F., & Xiong, Y. (2011). SenGuard: Passive user identification on smartphones using multiple sensors. In Proc. of the 2011 IEEE 7th International Conference on Wireless and Mobile Computing, Networking and Communications (pp. 141–148). Shi, W., Yang, J., Jiang, Y., Yang, F., & Xiong, Y. (2011). SenGuard: Passive user identification on smartphones using multiple sensors. In Proc. of the 2011 IEEE 7th International Conference on Wireless and Mobile Computing, Networking and Communications (pp. 141–148).
28.
Zurück zum Zitat Zhauniarovich, Y., Russello, G., Conti, M., Crispo, B., & Fernandes, E. (2014). MOSES: Supporting and enforcing security profiles on smartphones. IEEE Transactions on Dependable and Secure Computing, 11(3), 211–223.CrossRef Zhauniarovich, Y., Russello, G., Conti, M., Crispo, B., & Fernandes, E. (2014). MOSES: Supporting and enforcing security profiles on smartphones. IEEE Transactions on Dependable and Secure Computing, 11(3), 211–223.CrossRef
29.
Zurück zum Zitat Riva, O., Qin, C., Strauss, K., & Lymberopoulos, D. (2012). Progressive authentication: Deciding when to authenticate on mobile phones. In Proc. of the 21st USENIX Conference on Security Symposium (pp. 1–15). Riva, O., Qin, C., Strauss, K., & Lymberopoulos, D. (2012). Progressive authentication: Deciding when to authenticate on mobile phones. In Proc. of the 21st USENIX Conference on Security Symposium (pp. 1–15).
30.
Zurück zum Zitat Hayashi, E., Das, S., Shahriyar, S., Hong, J., & Oakley, I. (2013). CASA: Context-aware scalable authentication. In Symposium on Usable Privacy and Security (pp. 1–10). Hayashi, E., Das, S., Shahriyar, S., Hong, J., & Oakley, I. (2013). CASA: Context-aware scalable authentication. In Symposium on Usable Privacy and Security (pp. 1–10).
31.
Zurück zum Zitat Lienhart, R., Kuranov, A., & Pisarevsky, V. (2003). Empirical analysis of detection cascades of boosted classifiers for rapid object detection. In Proc. of the 25th DAGM Symposium on Pattern Recognition (pp. 297–304). Lienhart, R., Kuranov, A., & Pisarevsky, V. (2003). Empirical analysis of detection cascades of boosted classifiers for rapid object detection. In Proc. of the 25th DAGM Symposium on Pattern Recognition (pp. 297–304).
32.
Zurück zum Zitat Kannala, J., & Rahtu, E. (2012). BSIF: Binarized statistical image features. In International Conference on Pattern Recognition (ICPR) (pp. 1363–1366). Kannala, J., & Rahtu, E. (2012). BSIF: Binarized statistical image features. In International Conference on Pattern Recognition (ICPR) (pp. 1363–1366).
33.
Zurück zum Zitat Hyvearinen, A., Hurri, J., & Hoyer, P. O. (2009). Natural image statistics (Vol. 39). Berlin: Springer-Verlag.CrossRef Hyvearinen, A., Hurri, J., & Hoyer, P. O. (2009). Natural image statistics (Vol. 39). Berlin: Springer-Verlag.CrossRef
34.
Zurück zum Zitat Rattani, A., Derakhshani, R., Saripalle, S. K., & Gottemukkula, V. (2016). ICIP 2016 competition on mobile ocular biometric recognition. In IEEE International Conference on Image Processing (ICIP) (pp. 320–324).CrossRef Rattani, A., Derakhshani, R., Saripalle, S. K., & Gottemukkula, V. (2016). ICIP 2016 competition on mobile ocular biometric recognition. In IEEE International Conference on Image Processing (ICIP) (pp. 320–324).CrossRef
35.
Zurück zum Zitat Holmes, G., et al. (1994). Weka: A machine learning workbench. In Proc. Australian and New Zealand Conference on Intelligent Information Systems (pp. 357–361). Holmes, G., et al. (1994). Weka: A machine learning workbench. In Proc. Australian and New Zealand Conference on Intelligent Information Systems (pp. 357–361).
36.
Zurück zum Zitat Shahzad, M., Liu, A. X., & Samuel, A. (2016). Behavior based human authentication on touch screen devices using gestures and signatures. IEEE Transactions on Mobile Computing, 15(12), 1–14. Shahzad, M., Liu, A. X., & Samuel, A. (2016). Behavior based human authentication on touch screen devices using gestures and signatures. IEEE Transactions on Mobile Computing, 15(12), 1–14.
37.
Zurück zum Zitat Zhauniarovich, Y., Russello, G., Conti, M., Crispo, B., & Fernandes, E. (2014). MOSES: Supporting and enforcing security profiles on smartphones. IEEE Transactions on Dependable and Secure Computing, 11(3), 211–223.CrossRef Zhauniarovich, Y., Russello, G., Conti, M., Crispo, B., & Fernandes, E. (2014). MOSES: Supporting and enforcing security profiles on smartphones. IEEE Transactions on Dependable and Secure Computing, 11(3), 211–223.CrossRef
38.
Zurück zum Zitat Riva, O., Qin, C., Strauss, K., & Lymberopoulos, D. (2012). Progressive authentication: Deciding when to authenticate on Mobile phones. In Proc. of the 21st USENIX Conference on Security Symposium (pp. 1–15). Riva, O., Qin, C., Strauss, K., & Lymberopoulos, D. (2012). Progressive authentication: Deciding when to authenticate on Mobile phones. In Proc. of the 21st USENIX Conference on Security Symposium (pp. 1–15).
39.
Zurück zum Zitat Sitova, Z., Sedenka, J., Yang, Q., Peng, G., Zhou, G., Gasti, P., et al. (2015). HMOG: A new biometric modality for continuous authentication of smartphone users. arXiv preprint arXiv:1501.01199. Sitova, Z., Sedenka, J., Yang, Q., Peng, G., Zhou, G., Gasti, P., et al. (2015). HMOG: A new biometric modality for continuous authentication of smartphone users. arXiv preprint arXiv:1501.01199.
40.
Zurück zum Zitat Buschek, D., De Luca, A., & Alt, F. (2015). Improving accuracy, applicability and usability of keystroke biometrics on mobile touchscreen devices. In 33rd Annual ACM Conference on Human Factors in Computing Systems (pp. 1393–1402). Buschek, D., De Luca, A., & Alt, F. (2015). Improving accuracy, applicability and usability of keystroke biometrics on mobile touchscreen devices. In 33rd Annual ACM Conference on Human Factors in Computing Systems (pp. 1393–1402).
Metadaten
Titel
Multitrait Selfie: Low-Cost Multimodal Smartphone User Authentication
verfasst von
Zahid Akhtar
Attaullah Buriro
Copyright-Jahr
2021
DOI
https://doi.org/10.1007/978-3-030-48378-4_11

Neuer Inhalt