scispace - formally typeset
Open AccessJournal ArticleDOI

Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication

Reads0
Chats0
TLDR
A classification framework that learns the touch behavior of a user during an enrollment phase and is able to accept or reject the current user by monitoring interaction with the touch screen is proposed.
Abstract
We investigate whether a classifier can continuously authenticate users based on the way they interact with the touchscreen of a smart phone. We propose a set of 30 behavioral touch features that can be extracted from raw touchscreen logs and demonstrate that different users populate distinct subspaces of this feature space. In a systematic experiment designed to test how this behavioral pattern exhibits consistency over time, we collected touch data from users interacting with a smart phone using basic navigation maneuvers, i.e., up-down and left-right scrolling. We propose a classification framework that learns the touch behavior of a user during an enrollment phase and is able to accept or reject the current user by monitoring interaction with the touch screen. The classifier achieves a median equal error rate of 0% for intrasession authentication, 2%-3% for intersession authentication, and below 4% when the authentication test was carried out one week after the enrollment phase. While our experimental findings disqualify this method as a standalone authentication mechanism for long-term authentication, it could be implemented as a means to extend screen-lock time or as a part of a multimodal biometric authentication system.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

BubbleMap: Privilege Mapping for Behavior-based Implicit Authentication Systems

TL;DR: Zhang et al. as discussed by the authors proposed BubbleMap (BMap), a framework that can be seamlessly incorporated into any existing implicit authentication system to balance between security (reducing false positives and usability) and reducing false negatives.
Proceedings ArticleDOI

Facial StO2: A New Promising Biometric Identity

TL;DR: In this article , the authors introduced a new biometric identity, facial tissue oxygen saturation (StO2), which is an index of blood oxygen content in tissues and is related to blood vessel distribution pattern and metabolic rate.
Book ChapterDOI

Fuzzy Vault for Behavioral Authentication System

TL;DR: This work designs and analyzes a fuzzy vault based on the user’s behavioral data that employs a novel soft-decision decoding algorithm and implements the design for two behavioral authentication (BA) systems.
Book ChapterDOI

Real-Time Tweets Streaming and Comparison Using Naïve Bayes Classifier

Jing He
TL;DR: In this paper , a solution to improve comparison between Twitter accounts besides trying to implement Naive Bayes using perception vibrant data for training from of the Twitter database is described, which can help increase tweet accuracy rate by providing hope and optimism, hatefulness, and integrity ratings for phrases in Twitter messages.
Posted Content

Smartphone Impostor Detection with Built-in Sensors and Deep Learning.

TL;DR: It is shown that sensor-based impostor detection with deep learning can achieve excellent impostors detection accuracy at lower hardware cost compared to past work on sensor- based user authentication (the inverse problem) which used more conventional machine learning algorithms.
References
More filters
Journal ArticleDOI

Support-Vector Networks

TL;DR: High generalization ability of support-vector networks utilizing polynomial input transformations is demonstrated and the performance of the support- vector network is compared to various classical learning algorithms that all took part in a benchmark study of Optical Character Recognition.
Journal ArticleDOI

An introduction to variable and feature selection

TL;DR: The contributions of this special issue cover a wide range of aspects of variable selection: providing a better definition of the objective function, feature construction, feature ranking, multivariate feature selection, efficient search methods, and feature validity assessment methods.
Proceedings ArticleDOI

A training algorithm for optimal margin classifiers

TL;DR: A training algorithm that maximizes the margin between the training patterns and the decision boundary is presented, applicable to a wide variety of the classification functions, including Perceptrons, polynomials, and Radial Basis Functions.
Journal ArticleDOI

An Algorithm for Finding Best Matches in Logarithmic Expected Time

TL;DR: An algorithm and data structure are presented for searching a file containing N records, each described by k real valued keys, for the m closest matches or nearest neighbors to a given query record.
Related Papers (5)