Multimedia Tools and Applications

, Volume 76, Issue 3, pp 4069–4087 | Cite as

Analysis of interaction trace maps for active authentication on smart devices

  • Jamil Ahmad
  • Muhammad Sajjad
  • Zahoor Jan
  • Irfan Mehmood
  • Seungmin Rho
  • Sung Wook Baik


The availability and affordability of handheld smart devices have made life easier by enabling us to do work on the go. Their widespread use brings with it concerns relating to data security and privacy. The rising demand to secure private and highly confidential data found on smart devices has motivated researchers to devise means for ensuring privacy and security at all times. This kind of continuous user authentication scheme would add an additional layer of much needed security to smart devices. In this context, touch screen interactions have recently been studied as an effective modality to perform active user authentication on mobile devices. In this paper, a visual analysis based active authentication framework has been presented. Considering the touch screen as a canvas, interaction trace maps are constructed as a result of user interactions within various applications. The user touch gestures are captured and represented as drawing strokes on the canvas. The behavioral and physiological characteristics of users are modeled as signatures by combining texture and shape features from the interaction trace maps. A two-step mechanism with support vector machines exploit this signature to perform active user authentication. Experiments conducted with various datasets show that the proposed framework compares favorably with other state-of-the-art methods.


Active authentication Edge orientation Interaction trace maps Shape features Visual analysis 



This research is supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (2013R1A1A2012904).


  1. 1.
    Bevan C, Fraser DS (2016) Different strokes for different folks? Revealing the physical characteristics of smartphone users from their swipe gestures. Int J Hum Comput Stud 88:51–61. doi: 10.1016/j.ijhcs.2016.01.001
  2. 2.
    Budulan Ş, Burceanu E, Rebedea T, Chiru C (2015) Continuous user authentication using machine learning on touch dynamics. In: Neural information processing. Springer, pp 591–598Google Scholar
  3. 3.
    Burnette E (2015) Hello, Android: introducing Google's mobile development platform. The pragmatic programmers, 4 edn. The Pragmatic Bookshelf, DallasGoogle Scholar
  4. 4.
    Calix K, Connors M, Levy D, Manzar H, MCabe G, Westcott S (2008) Stylometry for e-mail author identification and authentication. Proceedings of CSIS Research Day, Pace University, pp 1048–1054Google Scholar
  5. 5.
    Canales O, Monaco V, Murphy T, Zych E, Stewart J, Castro C, Sotoye O, Torres L, Truley G (2011) A stylometry system for authenticating students taking online tests. P of Student-Faculty Research Day, Ed, CSIS Pace UniversityGoogle Scholar
  6. 6.
    Chen B-W, Chen C-Y, Wang J-F (2013) Smart homecare surveillance system: behavior identification based on state-transition support vector machines and sound directivity pattern analysis. IEEE Trans Syst Man Cybern Syst 43(6):1279–1289CrossRefGoogle Scholar
  7. 7.
    Chen B-W, He X, Ji W, Rho S, Kung S-Y (2015) Support vector analysis of large-scale data based on kernels with iteratively increasing order. J Supercomput. doi: 10.1007/s11227-015-1404-1
  8. 8.
    Eom M, Jeon Y, Choi Y (2005) Fast Extraction of Edge Histogram in Dct Domain based on Mpeg-7. ITC-CSCC: 2005 Proceedings volume 4:1609–1610Google Scholar
  9. 9.
    Fathy ME, Patel VM, Yeh T, Zhang Y, Chellappa R, Davis LS (2014) Screen-based active user authentication. Pattern Recogn Lett 42:122–127Google Scholar
  10. 10.
    Feng T, Liu Z, Kwon K-A, Shi W, Carbunar B, Jiang Y, Nguyen N (2012) Continuous mobile authentication using touchscreen gestures. In: Homeland Security (HST), 2012 IEEE Conference on Technologies for. IEEE, pp 451–456Google Scholar
  11. 11.
    Frank M, Biedert R, Ma E, Martinovic I, Song D (2013) Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE Trans Inf Forensics Secur 8(1):136–148Google Scholar
  12. 12.
    Furnell S, Clarke N, Karatzouni S (2008) Beyond the pin: enhancing user authentication for mobile devices. Comput Fraud Secur 2008(8):12–17CrossRefGoogle Scholar
  13. 13.
    Guidorizzi RP (2013) Security: active authentication. IT Prof 15(4):4–7CrossRefGoogle Scholar
  14. 14.
    Guna J, Stojmenova E, Lugmayr A, Humar I, Pogačnik M (2014) User identification approach based on simple gestures. Multimedia Tools and Applications 71(1):179–194Google Scholar
  15. 15.
    Hazen TJ, Weinstein E, Heisele B, Park A, Ming J (2007) Multimodal face and speaker identification for mobile devices. In: Hammoud RI, Abidi BR, Abidi MA (eds) Face biometrics for personal identification: Multi-sensory multi-modal systems. Springer Berlin Heidelberg, Berlin, Heidelberg, pp 123–138Google Scholar
  16. 16.
    Li F, Clarke N, Papadaki M, Dowland P (2014) Active authentication for mobile devices utilising behaviour profiling. Int J Inf Secur 13(3):229–244Google Scholar
  17. 17.
    Lin C-L, Hwang T (2003) A password authentication scheme with secure password updating. Comput Secur 22(1):68–72CrossRefGoogle Scholar
  18. 18.
    Matsumiya K, Aoki S, Murase M, Tokuda H (2003) Active authentication for pervasive computing environments. In: Software security—theories and Systems. Springer, pp 28–41Google Scholar
  19. 19.
    Parhi P, Karlson AK, Bederson BB (2006) Target size study for one-handed thumb use on small touchscreen devices. In: Proceedings of the 8th conference on Human-computer interaction with mobile devices and services. ACM, pp 203–210Google Scholar
  20. 20.
    Rice RE, Katz JE (2003) Comparing internet and mobile phone usage: digital divides of usage, adoption, and dropouts. Telecommun Policy 27(8):597–623CrossRefGoogle Scholar
  21. 21.
    Saravanan P, Clarke S, Chau DHP, Zha H (2014) LatentGesture: active user authentication through background touch analysis. In: Proceedings of the Second International Symposium of Chinese CHI, ACM, pp 110–113Google Scholar
  22. 22.
    Serwadda A, Phoha VV, Wang Z (2013) Which verifiers work?: A benchmark evaluation of touch-based authentication algorithms. In: Biometrics: Theory, Applications and Systems (BTAS), 2013 IEEE Sixth International Conference on, Sept. 29 2013-Oct. 2 2013, pp 1–8. doi: 10.1109/BTAS.2013.6712758
  23. 23.
    Serwadda A, Wang Z, Koch P, Govindarajan S, Pokala R, Goodkind A, Brizan D-G, Rosenberg A, Phoha VV, Balagani K (2013) Scan-based evaluation of continuous keystroke authentication systems. IT Prof 15(4):0020–0023Google Scholar
  24. 24.
    Shen C, Cai Z, Maxion RA, Xiang G, Guan X (2012) Comparing classification algorithm for mouse dynamics based user identification. In: Biometrics: Theory, Applications and Systems (BTAS), 2012 IEEE Fifth International Conference on. IEEE, pp 61–66Google Scholar
  25. 25.
    Shen C, Zhang Y, Guan X, Maxion RA (2016) Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication. IEEE Trans Inf Forensics Secur 11(3):498–513. doi: 10.1109/TIFS.2015.2503258
  26. 26.
    Sim T, Janakiraman R (2007) Are digraphs good for free-text keystroke dynamics? In: Computer vision and pattern recognition, 2007. CVPR’07. IEEE Conference on. IEEE, pp 1–6Google Scholar
  27. 27.
    Traore I, Woungang I, Obaidat MS, Nakkabi Y, Lai I (2014) Online risk-based authentication using behavioral biometrics. Multimed Tools Appl 71(2):575–605Google Scholar
  28. 28.
    Vapnik VN, Vapnik V (1998) Statistical learning theory, vol 2. Wiley, New YorkMATHGoogle Scholar
  29. 29.
    Vielhauer C (2005) Biometric user authentication for IT security: from fundamentals to handwriting, vol 18. Springer Science & Business Media, BerlinGoogle Scholar
  30. 30.
    Wang F, Han J (2008) Multimodal biometric authentication based on score level fusion using support vector machine. Opto-Electron Rev 17(1):59–64. doi: 10.2478/s11772-008-0054-8
  31. 31.
    Zhang H, Patel VM, Fathy M, Chellappa (2015) R touch gesture-based active user authentication using dictionaries. In: Applications of Computer Vision (WACV), 2015 IEEE Winter Conference on, IEEE, pp 207–214Google Scholar

Copyright information

© Springer Science+Business Media New York 2016

Authors and Affiliations

  1. 1.College of Electronics and Information EngineeringSejong UniversitySeoulRepublic of Korea
  2. 2.Department of Computer ScienceIslamia CollegePeshawarPakistan
  3. 3.Department of MultimediaSungkyul UniversityAnyangRepublic of Korea

Personalised recommendations