skip to main content
10.1145/3456415.3457222acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccbnConference Proceedingsconference-collections
research-article

An Implicit Identity Authentication Method Based on Deep Connected Attention CNN for Wild Environment

Authors Info & Claims
Published:06 June 2021Publication History

ABSTRACT

Continuous Implicit Authentication (CIA) provides a imperceptible and passive validation in a whole process of operating the mobile devices. In this paper, we describe users’ behavioral patterns through the build-in sensors of smartphones, and apply them to our authentication system. The current work is mainly implemented in a controlled experimental environment. We prove the effectiveness of the implicit authentication method in the natural environment through the analysis of only the touch screen process and the entire process of the user using the mobile phone. We focus on the multi-class strategy in CIA, in which a classifier has to recognize the “owner” of a series of operations from identity banks. To extract temporal domain and space domain features and enhance the classifier's discriminative power, our system utilizes Resnet with Squeeze-and-Excitation incorporating Attention blocks and Additive Angular Margin Loss. We evaluate our system both in our dataset and BrainRun dataset, and the accuracies of distinguish the correct identity achieves are 96.94% and 87.11% respectively. Specially, with the continuous data in BrainRun, the result is generated from behaviors during 5 s in a more interactive game.

References

  1. Aviv A J, Gibson K L, Mossop E, Smudge attacks on smartphone touch screens[J]. Woot, 2010, 10: 1-7.Google ScholarGoogle Scholar
  2. Wiedenbeck S, Waters J, Sobrado L, Design and evaluation of a shoulder-surfing resistant graphical password scheme[C]//Proceedings of the working conference on Advanced visual interfaces. 2006: 177-184.Google ScholarGoogle Scholar
  3. De Angeli A, Coventry L, Johnson G, Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems[J]. International journal of human-computer studies, 2005, 63(1-2): 128-152.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Wiedenbeck S, Waters J, Birget J C, PassPoints: Design and longitudinal evaluation of a graphical password system[J]. International journal of human-computer studies, 2005, 63(1-2): 102-127.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Alzubaidi A, Kalita J. Authentication of smartphone users using behavioral biometrics[J]. IEEE Communications Surveys & Tutorials, 2016, 18(3): 1998-2026.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Shepard K, Wing B, Miles C, Iris Recognition-National Science and Technology Council (NSTC)–Committee on Technology–Committee on Homeland and National Security–Subcommittee on Biometrics (EUA), last updated 31 march 2006[J]. 2006.Google ScholarGoogle Scholar
  7. Banerjee S P, Woodard D L. Biometric authentication and identification using keystroke dynamics: A survey[J]. Journal of Pattern Recognition Research, 2012, 7(1): 116-139.Google ScholarGoogle ScholarCross RefCross Ref
  8. Benegui C, Ionescu R T. Convolutional Neural Networks for User Identification based on Motion Sensors Represented as Images[J]. IEEE Access, 2020, 8: 61255-61266.Google ScholarGoogle ScholarCross RefCross Ref
  9. Li Y, Hu H, Zhu Z, SCANet: sensor-based continuous authentication with two-stream convolutional neural networks[J]. ACM Transactions on Sensor Networks (TOSN), 2020, 16(3): 1-27.Google ScholarGoogle Scholar
  10. Neverova N, Wolf C, Lacey G, Learning human identity from motion patterns[J]. IEEE Access, 2016, 4: 1810-1820.Google ScholarGoogle ScholarCross RefCross Ref
  11. Papamichail M D, Chatzidimitriou K C, Karanikiotis T, BrainRun: a behavioral biometrics dataset towards continuous implicit authentication[J]. Data, 2019, 4(2): 60.Google ScholarGoogle ScholarCross RefCross Ref
  12. Stockinger T. Implicit authentication on mobile devices[C]//The Media Informatics Advanced Seminar on Ubiquitous Computing. 2011: 8.Google ScholarGoogle Scholar
  13. Frank M, Biedert R, Ma E, Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication[J]. IEEE transactions on information forensics and security, 2012, 8(1): 136-148.Google ScholarGoogle Scholar
  14. Li L, Zhao X, Xue G. Unobservable re-authentication for smartphones[C]//NDSS. 2013, 56: 57-59.Google ScholarGoogle Scholar
  15. Zhang H, Patel V M, Fathy M, Touch gesture-based active user authentication using dictionaries[C]//2015 IEEE Winter Conference on Applications of Computer Vision. IEEE, 2015: 207-214.Google ScholarGoogle Scholar
  16. Feng T, Liu Z, Kwon K A, Continuous mobile authentication using touchscreen gestures[C]//2012 IEEE Conference on Technologies for Homeland Security (HST). IEEE, 2012: 451-456.Google ScholarGoogle Scholar
  17. Sherman M, Clark G, Yang Y, User-generated free-form gestures for authentication: Security and memorability[C]//Proceedings of the 12th annual international conference on Mobile systems, applications, and services. 2014: 176-189.Google ScholarGoogle Scholar
  18. Zhao X, Feng T, Shi W, Mobile user authentication using statistical touch dynamics images[J]. IEEE Transactions on Information Forensics and Security, 2014, 9(11): 1780-1789.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Feng T, Yang J, Yan Z, Tips: Context-aware implicit user identification using touch screen in uncontrolled environments[C]//Proceedings of the 15th Workshop on Mobile Computing Systems and Applications. 2014: 1-6.Google ScholarGoogle Scholar
  20. via touch biometrics: An experimental study on smartphones[C]//10th Symposium On Usable Privacy and Security ({SOUPS} 2014). 2014: 187-198.Google ScholarGoogle Scholar
  21. Shahzad M, Liu A X, Samuel A. Behavior based human authentication on touch screen devices using gestures and signatures[J]. IEEE Transactions on Mobile Computing, 2016, 16(10): 2726-2741.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Bo C, Zhang L, Jung T, Continuous user identification via touch and movement behavioral biometrics[C]//2014 IEEE 33rd International Performance Computing and Communications Conference (IPCCC). IEEE, 2014: 1-8.Google ScholarGoogle Scholar
  23. H Benegui C, Ionescu R T. Adversarial Attacks on Deep Learning Systems for User Identification based on Motion Sensors[C]//International Conference on Neural Information Processing. Springer, Cham, 2020: 752-761.Google ScholarGoogle Scholar
  24. Benegui C, Ionescu R T. Convolutional Neural Networks for User Identification based on Motion Sensors Represented as Images[J]. IEEE Access, 2020, 8: 61255-61266.Google ScholarGoogle ScholarCross RefCross Ref
  25. Ma X, Guo J, Tang S, DCANet: Learning Connected Attentions for Convolutional Neural Networks[J]. arXiv preprint arXiv:2007.05099, 2020.Google ScholarGoogle Scholar
  26. Hu J, Shen L, Sun G. Squeeze-and-excitation networks[C]//Proceedings of the IEEE conference on computer vision and pattern recognition. 2018: 7132-7141.Google ScholarGoogle Scholar
  27. Schroff F, Kalenichenko D, Philbin J. Facenet: A unified embedding for face recognition and clustering[C]//Proceedings of the IEEE conference on computer vision and pattern recognition. 2015: 815-823.Google ScholarGoogle Scholar
  28. Deng J, Guo J, Xue N, Arcface: Additive angular margin loss for deep face recognition[C]//Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 2019: 4690-4699.Google ScholarGoogle Scholar
  29. Lin T Y, Goyal P, Girshick R, Focal loss for dense object detection[C]//Proceedings of the IEEE international conference on computer vision. 2017: 2980-2988.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    ICCBN '21: Proceedings of the 2021 9th International Conference on Communications and Broadband Networking
    February 2021
    342 pages
    ISBN:9781450389174
    DOI:10.1145/3456415

    Copyright © 2021 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 6 June 2021

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format .

View HTML Format