Skip to main content
Log in

Analysis of interaction trace maps for active authentication on smart devices

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The availability and affordability of handheld smart devices have made life easier by enabling us to do work on the go. Their widespread use brings with it concerns relating to data security and privacy. The rising demand to secure private and highly confidential data found on smart devices has motivated researchers to devise means for ensuring privacy and security at all times. This kind of continuous user authentication scheme would add an additional layer of much needed security to smart devices. In this context, touch screen interactions have recently been studied as an effective modality to perform active user authentication on mobile devices. In this paper, a visual analysis based active authentication framework has been presented. Considering the touch screen as a canvas, interaction trace maps are constructed as a result of user interactions within various applications. The user touch gestures are captured and represented as drawing strokes on the canvas. The behavioral and physiological characteristics of users are modeled as signatures by combining texture and shape features from the interaction trace maps. A two-step mechanism with support vector machines exploit this signature to perform active user authentication. Experiments conducted with various datasets show that the proposed framework compares favorably with other state-of-the-art methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Bevan C, Fraser DS (2016) Different strokes for different folks? Revealing the physical characteristics of smartphone users from their swipe gestures. Int J Hum Comput Stud 88:51–61. doi:10.1016/j.ijhcs.2016.01.001

  2. Budulan Ş, Burceanu E, Rebedea T, Chiru C (2015) Continuous user authentication using machine learning on touch dynamics. In: Neural information processing. Springer, pp 591–598

  3. Burnette E (2015) Hello, Android: introducing Google's mobile development platform. The pragmatic programmers, 4 edn. The Pragmatic Bookshelf, Dallas

  4. Calix K, Connors M, Levy D, Manzar H, MCabe G, Westcott S (2008) Stylometry for e-mail author identification and authentication. Proceedings of CSIS Research Day, Pace University, pp 1048–1054

  5. Canales O, Monaco V, Murphy T, Zych E, Stewart J, Castro C, Sotoye O, Torres L, Truley G (2011) A stylometry system for authenticating students taking online tests. P of Student-Faculty Research Day, Ed, CSIS Pace University

  6. Chen B-W, Chen C-Y, Wang J-F (2013) Smart homecare surveillance system: behavior identification based on state-transition support vector machines and sound directivity pattern analysis. IEEE Trans Syst Man Cybern Syst 43(6):1279–1289

    Article  Google Scholar 

  7. Chen B-W, He X, Ji W, Rho S, Kung S-Y (2015) Support vector analysis of large-scale data based on kernels with iteratively increasing order. J Supercomput. doi:10.1007/s11227-015-1404-1

  8. Eom M, Jeon Y, Choi Y (2005) Fast Extraction of Edge Histogram in Dct Domain based on Mpeg-7. ITC-CSCC: 2005 Proceedings volume 4:1609–1610

  9. Fathy ME, Patel VM, Yeh T, Zhang Y, Chellappa R, Davis LS (2014) Screen-based active user authentication. Pattern Recogn Lett 42:122–127

  10. Feng T, Liu Z, Kwon K-A, Shi W, Carbunar B, Jiang Y, Nguyen N (2012) Continuous mobile authentication using touchscreen gestures. In: Homeland Security (HST), 2012 IEEE Conference on Technologies for. IEEE, pp 451–456

  11. Frank M, Biedert R, Ma E, Martinovic I, Song D (2013) Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE Trans Inf Forensics Secur 8(1):136–148

  12. Furnell S, Clarke N, Karatzouni S (2008) Beyond the pin: enhancing user authentication for mobile devices. Comput Fraud Secur 2008(8):12–17

    Article  Google Scholar 

  13. Guidorizzi RP (2013) Security: active authentication. IT Prof 15(4):4–7

    Article  Google Scholar 

  14. Guna J, Stojmenova E, Lugmayr A, Humar I, Pogačnik M (2014) User identification approach based on simple gestures. Multimedia Tools and Applications 71(1):179–194

  15. Hazen TJ, Weinstein E, Heisele B, Park A, Ming J (2007) Multimodal face and speaker identification for mobile devices. In: Hammoud RI, Abidi BR, Abidi MA (eds) Face biometrics for personal identification: Multi-sensory multi-modal systems. Springer Berlin Heidelberg, Berlin, Heidelberg, pp 123–138

  16. Li F, Clarke N, Papadaki M, Dowland P (2014) Active authentication for mobile devices utilising behaviour profiling. Int J Inf Secur 13(3):229–244

  17. Lin C-L, Hwang T (2003) A password authentication scheme with secure password updating. Comput Secur 22(1):68–72

    Article  Google Scholar 

  18. Matsumiya K, Aoki S, Murase M, Tokuda H (2003) Active authentication for pervasive computing environments. In: Software security—theories and Systems. Springer, pp 28–41

  19. Parhi P, Karlson AK, Bederson BB (2006) Target size study for one-handed thumb use on small touchscreen devices. In: Proceedings of the 8th conference on Human-computer interaction with mobile devices and services. ACM, pp 203–210

  20. Rice RE, Katz JE (2003) Comparing internet and mobile phone usage: digital divides of usage, adoption, and dropouts. Telecommun Policy 27(8):597–623

    Article  Google Scholar 

  21. Saravanan P, Clarke S, Chau DHP, Zha H (2014) LatentGesture: active user authentication through background touch analysis. In: Proceedings of the Second International Symposium of Chinese CHI, ACM, pp 110–113

  22. Serwadda A, Phoha VV, Wang Z (2013) Which verifiers work?: A benchmark evaluation of touch-based authentication algorithms. In: Biometrics: Theory, Applications and Systems (BTAS), 2013 IEEE Sixth International Conference on, Sept. 29 2013-Oct. 2 2013, pp 1–8. doi:10.1109/BTAS.2013.6712758

  23. Serwadda A, Wang Z, Koch P, Govindarajan S, Pokala R, Goodkind A, Brizan D-G, Rosenberg A, Phoha VV, Balagani K (2013) Scan-based evaluation of continuous keystroke authentication systems. IT Prof 15(4):0020–0023

  24. Shen C, Cai Z, Maxion RA, Xiang G, Guan X (2012) Comparing classification algorithm for mouse dynamics based user identification. In: Biometrics: Theory, Applications and Systems (BTAS), 2012 IEEE Fifth International Conference on. IEEE, pp 61–66

  25. Shen C, Zhang Y, Guan X, Maxion RA (2016) Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication. IEEE Trans Inf Forensics Secur 11(3):498–513. doi:10.1109/TIFS.2015.2503258

  26. Sim T, Janakiraman R (2007) Are digraphs good for free-text keystroke dynamics? In: Computer vision and pattern recognition, 2007. CVPR’07. IEEE Conference on. IEEE, pp 1–6

  27. Traore I, Woungang I, Obaidat MS, Nakkabi Y, Lai I (2014) Online risk-based authentication using behavioral biometrics. Multimed Tools Appl 71(2):575–605

  28. Vapnik VN, Vapnik V (1998) Statistical learning theory, vol 2. Wiley, New York

    MATH  Google Scholar 

  29. Vielhauer C (2005) Biometric user authentication for IT security: from fundamentals to handwriting, vol 18. Springer Science & Business Media, Berlin

    Google Scholar 

  30. Wang F, Han J (2008) Multimodal biometric authentication based on score level fusion using support vector machine. Opto-Electron Rev 17(1):59–64. doi:10.2478/s11772-008-0054-8

  31. Zhang H, Patel VM, Fathy M, Chellappa (2015) R touch gesture-based active user authentication using dictionaries. In: Applications of Computer Vision (WACV), 2015 IEEE Winter Conference on, IEEE, pp 207–214

Download references

Acknowledgments

This research is supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (2013R1A1A2012904).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sung Wook Baik.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ahmad, J., Sajjad, M., Jan, Z. et al. Analysis of interaction trace maps for active authentication on smart devices. Multimed Tools Appl 76, 4069–4087 (2017). https://doi.org/10.1007/s11042-016-3450-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-016-3450-y

Keywords

Navigation