scispace - formally typeset
Open AccessJournal ArticleDOI

Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication

Reads0
Chats0
TLDR
A classification framework that learns the touch behavior of a user during an enrollment phase and is able to accept or reject the current user by monitoring interaction with the touch screen is proposed.
Abstract
We investigate whether a classifier can continuously authenticate users based on the way they interact with the touchscreen of a smart phone. We propose a set of 30 behavioral touch features that can be extracted from raw touchscreen logs and demonstrate that different users populate distinct subspaces of this feature space. In a systematic experiment designed to test how this behavioral pattern exhibits consistency over time, we collected touch data from users interacting with a smart phone using basic navigation maneuvers, i.e., up-down and left-right scrolling. We propose a classification framework that learns the touch behavior of a user during an enrollment phase and is able to accept or reject the current user by monitoring interaction with the touch screen. The classifier achieves a median equal error rate of 0% for intrasession authentication, 2%-3% for intersession authentication, and below 4% when the authentication test was carried out one week after the enrollment phase. While our experimental findings disqualify this method as a standalone authentication mechanism for long-term authentication, it could be implemented as a means to extend screen-lock time or as a part of a multimodal biometric authentication system.

read more

Content maybe subject to copyright    Report

Citations
More filters
Posted Content

EmgAuth: Unlocking Smartphones with EMG Signals.

TL;DR: EggAuth, a novel electromyography(EMG)-based smartphone unlocking system based on the Siamese network, shows great promise to serve as a good supplement for existing screen unlocking systems to improve the safety of smartphones.
Posted Content

CALIPER: Continuous Authentication Layered with Integrated PKI Encoding Recognition

TL;DR: CALIPER as mentioned in this paper uses live hard and soft biometric samples from the user to extract a cryptographic private key embedded in a challenge posed by the CAVE and then uses this key to sign a response to the CAV.
Journal ArticleDOI

Multisensor-Based Continuous Authentication of Smartphone Users With Two-Stage Feature Extraction

TL;DR: Wang et al. as mentioned in this paper proposed a novel method combining the manual construction and the deep metric learning method to perform two-stage feature extraction, which achieved an average accuracy of 99.71% and an average equal error rate (EER) of 0.61% on the BrainRun data set.
Journal ArticleDOI

Who Is Using the Phone? Representation-Learning-Based Continuous Authentication on Smartphones

TL;DR: A novel feature representation tactic for continuous authentication named Multiple Channels Biological Graph (MCBG), which divides the smartphone usage scenarios into more fine-grained cases, including the operation interval features and represents the intrinsic differences between grown-ups and minors.
Book ChapterDOI

Research on Recognition of Multi-user Haptic Gestures

TL;DR: The basic principles of Extreme Learning Machine are introduced, and various multi-classification methods for tactile gesture recognition are used, showing that ELM compares favorably to other classification methods.
References
More filters
Journal ArticleDOI

Support-Vector Networks

TL;DR: High generalization ability of support-vector networks utilizing polynomial input transformations is demonstrated and the performance of the support- vector network is compared to various classical learning algorithms that all took part in a benchmark study of Optical Character Recognition.
Journal ArticleDOI

An introduction to variable and feature selection

TL;DR: The contributions of this special issue cover a wide range of aspects of variable selection: providing a better definition of the objective function, feature construction, feature ranking, multivariate feature selection, efficient search methods, and feature validity assessment methods.
Proceedings ArticleDOI

A training algorithm for optimal margin classifiers

TL;DR: A training algorithm that maximizes the margin between the training patterns and the decision boundary is presented, applicable to a wide variety of the classification functions, including Perceptrons, polynomials, and Radial Basis Functions.
Journal ArticleDOI

An Algorithm for Finding Best Matches in Logarithmic Expected Time

TL;DR: An algorithm and data structure are presented for searching a file containing N records, each described by k real valued keys, for the m closest matches or nearest neighbors to a given query record.
Related Papers (5)