Abstract
Today’s widespread use of stroke-based touchscreen devices creates numerous associated security concerns and requires efficient security measures in response. We propose an imitation-resistant passive authentication interface for stroke-based touch screen devices employing classifiers for each individual stroke, which is evaluated with respect to 26 features. For experimental validation, we collect stroke-based touchscreen data from 23 participants containing target and imitation stroke patterns using a photo-matching game in the form of an iOS application. The equal error rate (EER), depicting the rate at which false rejection and false acceptance of target and imitator strokes are equal, is assumed as an indicator of the classification accuracy. Leave-one-out cross-validation was employed to evaluate the datasets based on the mean EER. For each cross-validation, one out of the two target datasets, an imitator dataset, and the remaining 20 imitator datasets were selected as genuine data, imitator test data, and imitator training data, respectively. Our results confirm stroke imitation as a serious threat. Among the 26 stroke features evaluated in terms of their imitation tolerance, the stroke velocity was identified as the most difficult to imitate. Dividing classifiers based on the stroke direction was found to further contribute to classification accuracy.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Meng, W., Wong, D.S., Furnell, S., Zhou, J.: Surveying the Development of Biometric User Authentication on Mobile Phones. IEEE Commun. Surv. Tutorials 17(3), 1268–1293 (2015)
Xu, H., Zhou, Y., Lyu, M.R.: Towards continuous and passive authentication via touch biometrics: an experimental study on smartphones. In: Proceedings of the Symposium on Usable Privacy and Security, pp. 187–198. Menlo Park (2014)
Shen, C., Zhang, Y., Cai, Z., Yu, T., Guan, X.: Touch-interaction behavior for continuous user authentication on smartphones. In: International Conference on Biometrics, pp. 157–162, Phuket (2015)
Miyamoto, N., Shibata, C., Kinoshita, T.: Authentication by Touch Operation on Smartphone with Support Vector Machine. Int. J. Inf. Secur. Res. 7(2), 725–733 (2017)
Volaka, H.C., Alptekin, G., Basar, O.E., Isbilen, M., Incel, O.D.: Towards continuous authentication on mobile phones using deep learning models. Procedia Comput. Sci. 155, 177–184 (2019)
Li, Q., Chen, H.: CDAS: a continuous dynamic authentication system. In: Proceedings of the 8th International Conference on Software and Computer Applications, pp. 447–452. ACM, Penang (2019)
Shrestha, P., Mohamed, M., Saxena, N.: Slogger: Smashing motion-based touchstroke logging with transparent system noise. In: Proceedings of the 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 67–77. ACM, Darmstadt (2016)
Gong, N.Z., Payer, M., Moazzezi, R., Frank, M.: Towards forgery-resistant touch-based biometric authentication on mobile devices. In: Proceedings of the 11th ACM Asia Conference on Computer and Communications Security, pp. 499–510. ACM, Xi’an (2016)
Kudo, M., Yamana, H.: Active authentication on smartphone using touch pressure. In: Proceedings of the 31th ACM symposium on User interface software and technology, pp. 96–98. ACM, Berlin (2018)
Crammer, K., Kulesza, A., Dredze, M.: Adaptive Regularization of Weight Vectors. Proc. Adv. Neural Inf. Process. Syst. 22, 414–422 (2009)
Acknowledgements
This research was supported by NII CRIS (Center for Robust Intelligence and Social Technology) Contract Research 2019.
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Kudo, M., Yamana, H. (2020). Imitation-Resistant Passive Authentication Interface for Stroke-Based Touch Screen Devices. In: Stephanidis, C., Antona, M. (eds) HCI International 2020 - Posters. HCII 2020. Communications in Computer and Information Science, vol 1226. Springer, Cham. https://doi.org/10.1007/978-3-030-50732-9_72
Download citation
DOI: https://doi.org/10.1007/978-3-030-50732-9_72
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-50731-2
Online ISBN: 978-3-030-50732-9
eBook Packages: Computer ScienceComputer Science (R0)