Abstract
The availability and affordability of handheld smart devices have made life easier by enabling us to do work on the go. Their widespread use brings with it concerns relating to data security and privacy. The rising demand to secure private and highly confidential data found on smart devices has motivated researchers to devise means for ensuring privacy and security at all times. This kind of continuous user authentication scheme would add an additional layer of much needed security to smart devices. In this context, touch screen interactions have recently been studied as an effective modality to perform active user authentication on mobile devices. In this paper, a visual analysis based active authentication framework has been presented. Considering the touch screen as a canvas, interaction trace maps are constructed as a result of user interactions within various applications. The user touch gestures are captured and represented as drawing strokes on the canvas. The behavioral and physiological characteristics of users are modeled as signatures by combining texture and shape features from the interaction trace maps. A two-step mechanism with support vector machines exploit this signature to perform active user authentication. Experiments conducted with various datasets show that the proposed framework compares favorably with other state-of-the-art methods.










Similar content being viewed by others
References
Bevan C, Fraser DS (2016) Different strokes for different folks? Revealing the physical characteristics of smartphone users from their swipe gestures. Int J Hum Comput Stud 88:51–61. doi:10.1016/j.ijhcs.2016.01.001
Budulan Ş, Burceanu E, Rebedea T, Chiru C (2015) Continuous user authentication using machine learning on touch dynamics. In: Neural information processing. Springer, pp 591–598
Burnette E (2015) Hello, Android: introducing Google's mobile development platform. The pragmatic programmers, 4 edn. The Pragmatic Bookshelf, Dallas
Calix K, Connors M, Levy D, Manzar H, MCabe G, Westcott S (2008) Stylometry for e-mail author identification and authentication. Proceedings of CSIS Research Day, Pace University, pp 1048–1054
Canales O, Monaco V, Murphy T, Zych E, Stewart J, Castro C, Sotoye O, Torres L, Truley G (2011) A stylometry system for authenticating students taking online tests. P of Student-Faculty Research Day, Ed, CSIS Pace University
Chen B-W, Chen C-Y, Wang J-F (2013) Smart homecare surveillance system: behavior identification based on state-transition support vector machines and sound directivity pattern analysis. IEEE Trans Syst Man Cybern Syst 43(6):1279–1289
Chen B-W, He X, Ji W, Rho S, Kung S-Y (2015) Support vector analysis of large-scale data based on kernels with iteratively increasing order. J Supercomput. doi:10.1007/s11227-015-1404-1
Eom M, Jeon Y, Choi Y (2005) Fast Extraction of Edge Histogram in Dct Domain based on Mpeg-7. ITC-CSCC: 2005 Proceedings volume 4:1609–1610
Fathy ME, Patel VM, Yeh T, Zhang Y, Chellappa R, Davis LS (2014) Screen-based active user authentication. Pattern Recogn Lett 42:122–127
Feng T, Liu Z, Kwon K-A, Shi W, Carbunar B, Jiang Y, Nguyen N (2012) Continuous mobile authentication using touchscreen gestures. In: Homeland Security (HST), 2012 IEEE Conference on Technologies for. IEEE, pp 451–456
Frank M, Biedert R, Ma E, Martinovic I, Song D (2013) Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE Trans Inf Forensics Secur 8(1):136–148
Furnell S, Clarke N, Karatzouni S (2008) Beyond the pin: enhancing user authentication for mobile devices. Comput Fraud Secur 2008(8):12–17
Guidorizzi RP (2013) Security: active authentication. IT Prof 15(4):4–7
Guna J, Stojmenova E, Lugmayr A, Humar I, Pogačnik M (2014) User identification approach based on simple gestures. Multimedia Tools and Applications 71(1):179–194
Hazen TJ, Weinstein E, Heisele B, Park A, Ming J (2007) Multimodal face and speaker identification for mobile devices. In: Hammoud RI, Abidi BR, Abidi MA (eds) Face biometrics for personal identification: Multi-sensory multi-modal systems. Springer Berlin Heidelberg, Berlin, Heidelberg, pp 123–138
Li F, Clarke N, Papadaki M, Dowland P (2014) Active authentication for mobile devices utilising behaviour profiling. Int J Inf Secur 13(3):229–244
Lin C-L, Hwang T (2003) A password authentication scheme with secure password updating. Comput Secur 22(1):68–72
Matsumiya K, Aoki S, Murase M, Tokuda H (2003) Active authentication for pervasive computing environments. In: Software security—theories and Systems. Springer, pp 28–41
Parhi P, Karlson AK, Bederson BB (2006) Target size study for one-handed thumb use on small touchscreen devices. In: Proceedings of the 8th conference on Human-computer interaction with mobile devices and services. ACM, pp 203–210
Rice RE, Katz JE (2003) Comparing internet and mobile phone usage: digital divides of usage, adoption, and dropouts. Telecommun Policy 27(8):597–623
Saravanan P, Clarke S, Chau DHP, Zha H (2014) LatentGesture: active user authentication through background touch analysis. In: Proceedings of the Second International Symposium of Chinese CHI, ACM, pp 110–113
Serwadda A, Phoha VV, Wang Z (2013) Which verifiers work?: A benchmark evaluation of touch-based authentication algorithms. In: Biometrics: Theory, Applications and Systems (BTAS), 2013 IEEE Sixth International Conference on, Sept. 29 2013-Oct. 2 2013, pp 1–8. doi:10.1109/BTAS.2013.6712758
Serwadda A, Wang Z, Koch P, Govindarajan S, Pokala R, Goodkind A, Brizan D-G, Rosenberg A, Phoha VV, Balagani K (2013) Scan-based evaluation of continuous keystroke authentication systems. IT Prof 15(4):0020–0023
Shen C, Cai Z, Maxion RA, Xiang G, Guan X (2012) Comparing classification algorithm for mouse dynamics based user identification. In: Biometrics: Theory, Applications and Systems (BTAS), 2012 IEEE Fifth International Conference on. IEEE, pp 61–66
Shen C, Zhang Y, Guan X, Maxion RA (2016) Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication. IEEE Trans Inf Forensics Secur 11(3):498–513. doi:10.1109/TIFS.2015.2503258
Sim T, Janakiraman R (2007) Are digraphs good for free-text keystroke dynamics? In: Computer vision and pattern recognition, 2007. CVPR’07. IEEE Conference on. IEEE, pp 1–6
Traore I, Woungang I, Obaidat MS, Nakkabi Y, Lai I (2014) Online risk-based authentication using behavioral biometrics. Multimed Tools Appl 71(2):575–605
Vapnik VN, Vapnik V (1998) Statistical learning theory, vol 2. Wiley, New York
Vielhauer C (2005) Biometric user authentication for IT security: from fundamentals to handwriting, vol 18. Springer Science & Business Media, Berlin
Wang F, Han J (2008) Multimodal biometric authentication based on score level fusion using support vector machine. Opto-Electron Rev 17(1):59–64. doi:10.2478/s11772-008-0054-8
Zhang H, Patel VM, Fathy M, Chellappa (2015) R touch gesture-based active user authentication using dictionaries. In: Applications of Computer Vision (WACV), 2015 IEEE Winter Conference on, IEEE, pp 207–214
Acknowledgments
This research is supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (2013R1A1A2012904).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Ahmad, J., Sajjad, M., Jan, Z. et al. Analysis of interaction trace maps for active authentication on smart devices. Multimed Tools Appl 76, 4069–4087 (2017). https://doi.org/10.1007/s11042-016-3450-y
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-016-3450-y