Skip to main content
Log in

Saccadic trajectory-based identity authentication

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The saccadic trajectory is generated by extra-ocular muscles in the eyes, which is a complex mechanism related to brain-driven neural signal. The saccadic trajectory has the characteristics of non-reproducibility and non-contact. In this paper, we propose a saccadic trajectory-based identity authentication method considering that saccadic trajectory can be used as a behavior-based biometric. In this method, we adopt Velocity-Threshold (I-VT) algorithm to extract saccadic trajectories from the whole eye movement data, extract features via wavelet packet transform and authenticate the identity via classifying these features by SVM. In this paper, we verify the proposed method on EMDBv1.0 dataset for horizontal eye movements. We select one subject to be the host and randomly choose another 50 subjects from the remaining 58 subjects as the attackers. We achieve the best performance via optimizing feature selection and the parameter of SVM. The experiment results show that the average accuracy for accepting the host can reach 98.09%, and the average accuracy for rejecting the attackers can reach 99.55%. It demonstrates that the saccadic trajectory-based identity authentication is promising in information security.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Bednarik R, Kinnunen T, Mihaila A, Frńti P (2005) Eye-movements as a biometric. In: Scandinavian conference on image analysis, pp. 780–789

    Chapter  Google Scholar 

  2. Chang X, Ma Z, Yang Y, Zeng Z, Hauptmann AG (2017) Bi-level semantic representation analysis for multimedia event detection. IEEE Trans Cybern 47(5):1180–1197

    Article  Google Scholar 

  3. Coifman RR, Wickerhauser MV (1992) Entropy-based algorithms for best basis selection. IEEE Press, Piscataway

    Book  Google Scholar 

  4. Ding C, Tao D (2015) Robust face recognition via multimodal deep face representation. IEEE Trans Multimed 17(11):2049–2058

    Article  Google Scholar 

  5. Kasprowski P, Ober J (2004) Eye movements in biometrics. In: Biometric authentication, ECCV 2004 international workshop, bioAW 2004. Proceedings, Prague, pp 248–258

    Chapter  Google Scholar 

  6. Kinnunen T, Sedlak F, Bednarik R (2010) Towards task-independent person authentication using eye movement signals. In: Symposium on Eye-tracking Research & applications, etra 2010, Austin, pp 187–190

  7. Komogortsev OV, Gobert DV, Jayarathna S, Koh DH, Gowda S (2010) Standardization of automated analyses of oculomotor fixation and saccadic behaviors. IEEE Trans Biomed Eng 57(11):2635–2645

    Article  Google Scholar 

  8. Komogortsev OV, Jayarathna S, Aragon C, Mahmoud M (2010) Biometric identification via an oculomotor plant mathematical model. In: Eye Tracking Research & Application, pp 57–60

  9. Komogortsev OV, Karpov A, Price LR, Aragon C (2012) Biometric authentication via oculomotor plant characteristics. In: Iapr International Conference on Biometrics, pp 413–420

  10. Leigh RJ, Zee DS (2015) A Survey of Eye Movements

    Chapter  Google Scholar 

  11. Li C, Zhou W, Yuan S (2015) Iris recognition based on a novel variation of local binary pattern. Springer, New York

  12. Li Y, Zheng W, Cui Z, Zhang T (2018) Face recognition based on recurrent regression neural network. Neurocomputing

  13. Liang Z, Tan F, Chi Z (2012) Video-based biometric identification using eye tracking technique. In: IEEE International conference on signal processing, communication and computing, pp 728–733

  14. Luo M, Nie F, Chang X, Yang Y, Hauptmann AG, Zheng Q (2018) Adaptive unsupervised feature selection with structure regularization. IEEE Trans Neural Netw Learn Syst PP(99):1–13

    Google Scholar 

  15. Ma Z, Chang X, Yang Y, Sebe N, Hauptmann AG (2017) The many shades of negativity. IEEE Trans Multimed 19(7):1558–1568

    Article  Google Scholar 

  16. Mukhopadhyay S, Nandi S (2017) Lpitrack: Eye movement pattern recognition algorithm and application to biometric identification. Machine Learning 107(2):1–19

    Article  MathSciNet  Google Scholar 

  17. Roy K, Bhattacharya P, Debnath RC (2008) Multi-class svm based iris recognition. In: International conference on computer and information technology, pp 1–6

  18. Silver DL, Biggs A (2006) Keystroke and eye-tracking biometrics for user identification. In: International conference on artificial intelligence, icai 2006, Las Vegas, pp 344–348

  19. Wang YB, De-Min YU, Zeng-Pu XU, Wang YQ (2009) Feature extraction and recognition of loudspeaker response signal based on principal components analysis. Journal of Tianjin University of Science & Technology

  20. Wang Z, Li C, Shao H, Sun J (2018) Eye recognition with mixed convolutional and residual network(micore-net). IEEE Access PP(99):1–1

    Google Scholar 

  21. Zhang Y, Juhola M (2012) On biometric verification of a user by means of eye movement data mining, pp 85–90

Download references

Acknowledgements

This work is supported by Natural Science Foundation for Distinguished Young Scholars of Shandong Province (JQ201718), Key Research and Development Foundation of Shandong Province (2016GGX101009), the Natural Science Foundation of China (U1736122) and Shandong Provincial. Key Research and Development Plan (2017CXGC1504). The contact author is Wenbo Wan (wanwenbo@sdnu.edu.cn) and Jiande Sun (jiandesun@hotmail.com).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Wenbo Wan or Jiande Sun.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shao, H., Li, J., Wan, W. et al. Saccadic trajectory-based identity authentication. Multimed Tools Appl 79, 4891–4905 (2020). https://doi.org/10.1007/s11042-018-6816-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-018-6816-5

Keywords

Navigation