skip to main content
10.1145/2565585.2565586acmconferencesArticle/Chapter ViewAbstractPublication PageshotmobileConference Proceedingsconference-collections
research-article

Hand authentication on multi-touch tablets

Published: 26 February 2014 Publication History

Abstract

We propose a biometric authentication scheme suitable for multi-touch devices such as tablet computers. Our scheme is based on hand geometry. It improves on prior work by introducing a dynamic element, where movement challenges are issued based on static hand geometry data. Specifically, we demonstrate a set of multi-touch interactions that can capture hand geometry information of users. For each of the interactions, we extract different but complimentary hand geometric information from the user. Our approach has several advantages over traditional text password and other biometric authentications. First, unlike other recognition based authentication schemes, a user is only expected to interact with the multi-touch surface according to the challenges she is posed. In other words, she does not have to memorize any type of credential. In addition, the system provides security against replay attacks--which is a drawback associated with many authentication schemes, such as traditional biometric system based on recognition of face, iris or fingerprint. Last but not least, our approach works on current tablet computers without any needs for updates of hardware, firmware or drivers -- it can be carried out by an application. We demonstrate experimentally a configuration using 14 consecutive challenges on iPad2 tablet (taking approximately 3.32 minutes for novice users to respond to), wherein the user is authenticated with almost 97% accuracy.

References

[1]
Apple buys authentec, fingerprint reader, to strengthen security. http://www.huffingtonpost.com/. {Online; accessed 6/02/2013}.
[2]
Fido alliance. http://fidoalliance.org/. {Online; accessed 6/02/2013}.
[3]
Gates predicts death of the password. http://news.cnet.com/2100-1029-5164733.html. {Online; accessed 5/27/2013}.
[4]
Hand geometry market analyzed by gia in report now available at marketpublishers.com. http://finance.yahoo.com/news/. {Online; accessed 5/27/2013}.
[5]
Kill the password: Why a string of characters can't protect us anymore. http://www.wired.com/. {Online; accessed 8/08/2013}.
[6]
P$$1234: the end of strong password-only security. http://www.deloitte.com/. {Online; accessed 5/27/2013}.
[7]
What are advantages and disadvantages of hand geometry? http://360biometrics.com/faq/. {Online; accessed 5/27/2013}.
[8]
H. Benko and D. Wigdor. Imprecision, inaccuracy, and frustration: The tale of touch input. In C. Müller-Tomfelde, editor, Tabletops - Horizontal Interactive Displays, Human-Computer Interaction Series, pages 249--275. Springer London, 2010.
[9]
J. Burgues, J. Fierrez, D. Ramos, and J. Ortega-Garcia. Comparison of distance-based features for hand geometry authentication. In J. Fierrez, J. Ortega-Garcia, A. Esposito, A. Drygajlo, and M. Faundez-Zanuy, editors, Biometric ID Management and Multimodal Communication, volume 5707 of Lecture Notes in Computer Science, pages 325--332. Springer Berlin Heidelberg, 2009.
[10]
M. Choras and R. Kozik. Contactless palmprint and knuckle biometrics for mobile devices. Pattern Analysis and Applications, 15(1):73--85, 2012.
[11]
N. Duta. A survey of biometric technology based on hand shape. Pattern Recognition, 42(11):2797--2806, 2009.
[12]
Y. Han, T. Tan, Z. Sun, and Y. Hao. Embedded palmprint recognition system on mobile devices. In S.-W. Lee and S. Li, editors, Advances in Biometrics, volume 4642 of Lecture Notes in Computer Science, pages 1184--1193. Springer Berlin Heidelberg, 2007.
[13]
A. Jain and N. Duta. Deformable matching of hand shapes for user verification. In Image Processing, 1999. ICIP 99. Proceedings. 1999 International Conference on, volume 2, pages 857--861 vol.2, 1999.
[14]
V. Kanhangad, A. Kumar, and D. Zhang. Combining 2d and 3d hand geometry features for biometric verification. In Computer Vision and Pattern Recognition Workshops, 2009. CVPR Workshops 2009. IEEE Computer Society Conference on, pages 39--44. IEEE, 2009.
[15]
A. Kumar, D. C. Wong, H. C. Shen, and A. K. Jain. Personal verification using palmprint and hand geometry biometric. In Audio-and Video-Based Biometric Person Authentication, pages 668--678. Springer, 2003.
[16]
I. Muslukhov, Y. Boshmaf, C. Kuo, J. Lester, and K. Beznosov. Know your enemy: The risk of unauthorized access in smartphones by insiders.
[17]
M. G. K. Ong, T. Connie, A. T. B. Jin, and D. N. C. Ling. A single-sensor hand geometry and palmprint verification system. In Proc. of the 2003 ACM SIGMM workshop on Biometrics methods and applications, pages 100--106. ACM, 2003.
[18]
A. Ross. A prototype hand geometry-based verification system. In Proceedings of 2nd Conference on Audio and Video Based Biometric Person Authentication, pages 166--171, 1999.
[19]
N. Sae-Bae, K. Ahmed, K. Isbister, and N. Memon. Biometric-rich gestures: a novel approach to authentication on multi-touch devices. In Proceedings of the 2012 ACM annual conference on human factors in computing systems, pages 977--986. ACM, 2012.
[20]
S. Schechter, A. B. Brush, and S. Egelman. It's no secret. measuring the security and reliability of authentication via 'secret' questions. In Security and Privacy, 2009 30th IEEE Symposium on, pages 375--390. IEEE, 2009.
[21]
P. Song, W. B. Goh, C.-W. Fu, Q. Meng, and P.-A. Heng. Wysiwyf: exploring and annotating volume data with a tangible handheld device. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '11, pages 1333--1342, New York, NY, USA, 2011. ACM.
[22]
D. Zhang, V. Kanhangad, N. Luo, and A. Kumar. Robust palmprint verification using 2d and 3d features. Pattern Recognition, 43(1):358--368, 2010.

Cited By

View all
  • (2022)Presentation attack detection and biometric recognition in a challenge-response formalismEURASIP Journal on Information Security10.1186/s13635-022-00131-y2022:1Online publication date: 5-Sep-2022
  • (2020)Biometric Authentication Schemes and Methods on Mobile DevicesModern Theories and Practices for Cyber Ethics and Security Compliance10.4018/978-1-7998-3149-5.ch011(172-192)Online publication date: 2020
  • (2017)Trusted Worrier: A low-cost and high-accuracy user authentication system for firearm exploiting dynamic hand pressure biometrics2017 International Conference on Networking, Systems and Security (NSysS)10.1109/NSysS.2017.7885807(87-95)Online publication date: Jan-2017

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
HotMobile '14: Proceedings of the 15th Workshop on Mobile Computing Systems and Applications
February 2014
134 pages
ISBN:9781450327428
DOI:10.1145/2565585
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 26 February 2014

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. biometric
  2. hand geometry
  3. multi-touch interaction

Qualifiers

  • Research-article

Conference

HotMobile '14
Sponsor:

Acceptance Rates

HotMobile '14 Paper Acceptance Rate 22 of 72 submissions, 31%;
Overall Acceptance Rate 96 of 345 submissions, 28%

Upcoming Conference

HOTMOBILE '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)0
Reflects downloads up to 17 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2022)Presentation attack detection and biometric recognition in a challenge-response formalismEURASIP Journal on Information Security10.1186/s13635-022-00131-y2022:1Online publication date: 5-Sep-2022
  • (2020)Biometric Authentication Schemes and Methods on Mobile DevicesModern Theories and Practices for Cyber Ethics and Security Compliance10.4018/978-1-7998-3149-5.ch011(172-192)Online publication date: 2020
  • (2017)Trusted Worrier: A low-cost and high-accuracy user authentication system for firearm exploiting dynamic hand pressure biometrics2017 International Conference on Networking, Systems and Security (NSysS)10.1109/NSysS.2017.7885807(87-95)Online publication date: Jan-2017

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media