TY - GEN
T1 - Touch-interaction behavior for continuous user authentication on smartphones
AU - Shen, Chao
AU - Zhang, Yong
AU - Cai, Zhongmin
AU - Yu, Tianwen
AU - Guan, Xiaohong
N1 - Publisher Copyright:
© 2015 IEEE.
PY - 2015/6/29
Y1 - 2015/6/29
N2 - The increasing use of smartphones to access sensitive and privacy data has given rise to the need of secure authentication technique. Existing authentication mechanisms on smartphones can only provide one-time verification, but the verified users are still vulnerable to the session hijacking. In this article, we propose a transparent and continuous authentication system based on users' touch interaction data. We consider four common types of touch operations, and extract behavioral features to characterize users' touch behavior. Distance-measurement technique is applied to mitigate the behavioral variability. Then a multiple decision procedure is developed to perform continuous authentication, in which one-class classification algorithms are applied for classification. The efficacy of our approach is validated through a series of experiments in four real-world application scenarios. Our experimental results show that the proposed approach could verify a user in an accurate and timely manner, and suffice to be an enhancement for traditional authentication mechanisms in smartphones.
AB - The increasing use of smartphones to access sensitive and privacy data has given rise to the need of secure authentication technique. Existing authentication mechanisms on smartphones can only provide one-time verification, but the verified users are still vulnerable to the session hijacking. In this article, we propose a transparent and continuous authentication system based on users' touch interaction data. We consider four common types of touch operations, and extract behavioral features to characterize users' touch behavior. Distance-measurement technique is applied to mitigate the behavioral variability. Then a multiple decision procedure is developed to perform continuous authentication, in which one-class classification algorithms are applied for classification. The efficacy of our approach is validated through a series of experiments in four real-world application scenarios. Our experimental results show that the proposed approach could verify a user in an accurate and timely manner, and suffice to be an enhancement for traditional authentication mechanisms in smartphones.
UR - https://www.scopus.com/pages/publications/84943223459
U2 - 10.1109/ICB.2015.7139046
DO - 10.1109/ICB.2015.7139046
M3 - 会议稿件
AN - SCOPUS:84943223459
T3 - Proceedings of 2015 International Conference on Biometrics, ICB 2015
SP - 157
EP - 162
BT - Proceedings of 2015 International Conference on Biometrics, ICB 2015
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 8th IAPR International Conference on Biometrics, ICB 2015
Y2 - 19 May 2015 through 22 May 2015
ER -