Skip to main content

Multitrait Selfie: Low-Cost Multimodal Smartphone User Authentication

  • Chapter
  • First Online:
Biometric Identification Technologies Based on Modern Data Mining Methods

Abstract

Biometric identification is biometric-based authentication on mobile devices that nowadays has become ubiquitous, especially in unattended (e.g., access control for banks) and consumer (e.g., mobile phone unlocking) applications. While, face, fingerprint and inherent behavioral biometrics using inbuilt sensors such as accelerometer for smartphones person authentication, they have yet not achieved the desired or required level of efficiency, security and usability. This chapter presents an uncontrolled multibiometric smartphone framework utilizing multitrait selfie and behavioral biometrics. In particular, the presented system authenticates subject by ocular and face selfie features. This new multimodal biometric system also takes silently into account micro-movements of the phone, movements of the user’s finger on the touchscreen while user is capturing the multitrait selfie and entering passcode simultaneously in a split-screen mode of the smartphone. Addition of micro-movements behaviors enhances not only the performance but also robustness against noise and spoofing attacks. For this study, we collected a mobile multimodal dataset (MultiTouchMove) of touchstroke and phone-movement patterns in the wild from 95 subjects, which is made publicly available by the authors. Preliminary experimental analysis, using public MOBIO Face, VISOB ocular, and MultiTouchMove mobile datasets, on accuracy and usability shows promising results.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 129.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Just 2 days after the iPhone5s hit the market, it was fooled by a fingerprint spoof [3].

  2. 2.

    http://abcnews.go.com/blogs/technology/2013/05/cellphone-users-check-phones-150xday-andother-internet-fun-facts/.

  3. 3.

    Touch-typing is the act of typing input on the touchscreen of a smartphone.

  4. 4.

    The database is made publicly available for research purposes and can be obtained by contacting the authors.

  5. 5.

    http://www.galaxyresearch.com.au/.

  6. 6.

    https://www.miteksystems.com/.

  7. 7.

    http://developer.android.com/guide/topics/sensors/sensors.motion.html.

  8. 8.

    These are our rudimentary results. We are presently developing inexpensive deep learning topologies for face recognition in-the-wild on smartphones for elevated accuracy and interoperability.

References

  1. Meng, W., Wong, D. S., Furnell, S., & Zhou, J. (2015). Surveying the development of biometric user authentication on Mobile phones. IEEE Communications Surveys & Tutorials, 17(3), 1268–1293.

    Article  Google Scholar 

  2. Schaub, F., Deyhle, R., & Weber, M. (2012). Password entry usability and shoulder surfing susceptibility on different smartphone platforms. In Proc. of the 11th Int’l Conf. on Mobile and Ubiquitous Multimedia (pp. 1–10).

    Google Scholar 

  3. Akhtar, Z., Micheloni, C., & Foresti, G. L. (2015). Biometric liveness detection: Challenges and research opportunities. IEEE Security & Privacy, 13(5), 63–72.

    Article  Google Scholar 

  4. De Luca, A., Hang, A., von Zezschwitz, E., & Hussmann, H. (2015). I feel like I’m taking Selfies all day!: Towards understanding biometric authentication on smartphones. In Proc. of the 33rd Annual ACM Conference on Human Factors in Computing Systems (pp. 1411–1414).

    Chapter  Google Scholar 

  5. Buriro, A., Crispo, B., Delfrari, F., & Wrona, K. (2016). Hold and sign: A novel behavioral biometrics for smartphone user authentication. In IEEE Security and Privacy Workshops (pp. 276–285). San Jose, CA: IEEE.

    Google Scholar 

  6. Harbach, M., von Zezschwitz, E., Fichtner, A., De Luca, A., & Smith, M. (2014). It’s a hard lock life: A field study of smartphone (un)locking behavior and risk perception. In Symposium On Usable Privacy and Security (pp. 213–230).

    Google Scholar 

  7. Maltoni, D., Maio, M., Jain, A. K., & Prabhakar, S. (2009). Handbook of Fingerprint Recognition (2nd ed.). London: Springer.

    Book  Google Scholar 

  8. Sitov, Z., et al. (2016). HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users. IEEE Transactions on Information Forensics and Security, 11(5), 877–892.

    Article  Google Scholar 

  9. Zhu, J., Wu, P., Wang, X., & Zhang, J. (2013). Sensec: Mobile security through passive sensing. In IEEE Int’l Conf. on Computing, Networking and Communications (ICNC) (pp. 1128–1133).

    Google Scholar 

  10. Buriro, A., Crispo, B., DelFrari, F., & Wrona, K. (2015). Touchstroke: Smartphone user authentication based on touch-typing biometrics. In New Trends in Image Analysis and Processing–ICIAP Workshops (pp. 27–34). Cham: Springer.

    Chapter  Google Scholar 

  11. Sae-Bae, N., Ahmed, K., Isbister, K., & Memon, N. (2012). Biometric-rich gestures: A novel approach to authentication on multi-touch devices. In Proc. of Conf. on Human Factors in Computing Systems (pp. 977–986).

    Google Scholar 

  12. Blanco-Gonzalo, R., Sanchez-Reillo, R., Miguel-Hurtado, O., & Liu-Jimenez, J. (2013). Performance evaluation of handwritten signature recognition in mobile environments. IET Biometrics, 3(3), 139–146.

    Article  Google Scholar 

  13. Bhanu, B., & Govindaraju, V. (2011). Multibiometrics for human identification. Cambridge: Cambridge University Press.

    Book  Google Scholar 

  14. Jain, A. K., Flynn, P., & Ross, A. (2008). Handbook of multibiometrics. Cham: Springer.

    Book  Google Scholar 

  15. Kisku, D. R., Rattani, A., Gupta, P., & Sing, J. K. (2009). Biometric sensor image fusion for identity verification: A case study with wavelet-based fusion rules graph matching. In IEEE Conference on Technologies for Homeland Security (pp. 433–439).

    Google Scholar 

  16. Akhtar, Z., Buriro, A., Crispo, B., & Falk, T. (2017). Multimodal smartphone user authentication using Touchstroke, phone-movement and face patterns. In IEEE Global Conference on Signal and Information Processing (GlobalSIP) (pp. 1368–1372).

    Chapter  Google Scholar 

  17. Akhtar, Z., (2012). Security of multimodal biometric systems against spoof attacks. PhD thesis, University of Cagliari, Italy.

    Google Scholar 

  18. Abeni, P., Baltatu, M., & D’Alessandro, R. (2006). Implementing biometrics based authentication for mobile devices (pp. 1–5). San Francisco, CA: IEEE Globecom.

    Google Scholar 

  19. Hadid, A., Heikkila, J. Y., Silvén, O., & Pietikainen, M. Face and eye detection for person authentication in mobile phones. In First ACM/IEEE International Conference on Distributed Smart Cameras (pp. 101–108).

    Google Scholar 

  20. Tao, Q., & Veldhuis, R. (2010). Biometric authentication system on mobile personal devices. IEEE Transactions on Instrumentation and Measurement, 59, 763–773.

    Article  Google Scholar 

  21. Chen, S., Pande, A., & Mohapatra, P. (2014). Sensor-assisted facial recognition: An enhanced biometric authentication system for smartphones. In Proceedings of the 12th Annual International Conference on Mobile Systems, Applications, and Services (pp. 109–122).

    Google Scholar 

  22. Akhtar, Z., Buriro, A., Crispo, B., & Falk, T. H. (2017). Multimodal smartphone user authentication using touchstroke, phone-movement and face patterns. In Proceedings of the IEEE Global Conference on Signal and Information Processing (GlobalSIP) (pp. 1368–1372).

    Google Scholar 

  23. McCool, C., Marcel, S., Hadid, A., Pietikinen, M., Matejka, P., Cernock, J., Poh, N., Kittler, J., Larcher, A., Lvy, C., Matrouf, D., Bonastre, J., Tresadern, P., & Cootes, T. (2012). Bi-Modal Person Recognition on a Mobile Phone: using mobile phone data. In IEEE ICME Workshop on Hot Topics in Mobile Multimedia (pp. 1–6).

    Google Scholar 

  24. Teh, P. S., Zhang, N., Jin Teoh, A. B., & Chen, K. (2016). A survey on touch dynamics authentication in mobile devices. Computers & Security, 59(2), 210–235.

    Article  Google Scholar 

  25. Buriro, A., Crispo, B., Del Frari, F., Klardie, J., & Wrona, K. (2014). ITSME: Multi-modal and unobtrusive behavioural user authentication for smartphones. In International conference on passwords (pp. 45–61).

    Google Scholar 

  26. Vidas, T., Votipka, D., & Christin, N. (2011). All your droid are belong to us: A survey of current android attacks. In USENIX Conf. on Offensive Technologies (pp. 1–10).

    Google Scholar 

  27. Shi, W., Yang, J., Jiang, Y., Yang, F., & Xiong, Y. (2011). SenGuard: Passive user identification on smartphones using multiple sensors. In Proc. of the 2011 IEEE 7th International Conference on Wireless and Mobile Computing, Networking and Communications (pp. 141–148).

    Google Scholar 

  28. Zhauniarovich, Y., Russello, G., Conti, M., Crispo, B., & Fernandes, E. (2014). MOSES: Supporting and enforcing security profiles on smartphones. IEEE Transactions on Dependable and Secure Computing, 11(3), 211–223.

    Article  Google Scholar 

  29. Riva, O., Qin, C., Strauss, K., & Lymberopoulos, D. (2012). Progressive authentication: Deciding when to authenticate on mobile phones. In Proc. of the 21st USENIX Conference on Security Symposium (pp. 1–15).

    Google Scholar 

  30. Hayashi, E., Das, S., Shahriyar, S., Hong, J., & Oakley, I. (2013). CASA: Context-aware scalable authentication. In Symposium on Usable Privacy and Security (pp. 1–10).

    Google Scholar 

  31. Lienhart, R., Kuranov, A., & Pisarevsky, V. (2003). Empirical analysis of detection cascades of boosted classifiers for rapid object detection. In Proc. of the 25th DAGM Symposium on Pattern Recognition (pp. 297–304).

    Google Scholar 

  32. Kannala, J., & Rahtu, E. (2012). BSIF: Binarized statistical image features. In International Conference on Pattern Recognition (ICPR) (pp. 1363–1366).

    Google Scholar 

  33. Hyvearinen, A., Hurri, J., & Hoyer, P. O. (2009). Natural image statistics (Vol. 39). Berlin: Springer-Verlag.

    Book  Google Scholar 

  34. Rattani, A., Derakhshani, R., Saripalle, S. K., & Gottemukkula, V. (2016). ICIP 2016 competition on mobile ocular biometric recognition. In IEEE International Conference on Image Processing (ICIP) (pp. 320–324).

    Chapter  Google Scholar 

  35. Holmes, G., et al. (1994). Weka: A machine learning workbench. In Proc. Australian and New Zealand Conference on Intelligent Information Systems (pp. 357–361).

    Google Scholar 

  36. Shahzad, M., Liu, A. X., & Samuel, A. (2016). Behavior based human authentication on touch screen devices using gestures and signatures. IEEE Transactions on Mobile Computing, 15(12), 1–14.

    Google Scholar 

  37. Zhauniarovich, Y., Russello, G., Conti, M., Crispo, B., & Fernandes, E. (2014). MOSES: Supporting and enforcing security profiles on smartphones. IEEE Transactions on Dependable and Secure Computing, 11(3), 211–223.

    Article  Google Scholar 

  38. Riva, O., Qin, C., Strauss, K., & Lymberopoulos, D. (2012). Progressive authentication: Deciding when to authenticate on Mobile phones. In Proc. of the 21st USENIX Conference on Security Symposium (pp. 1–15).

    Google Scholar 

  39. Sitova, Z., Sedenka, J., Yang, Q., Peng, G., Zhou, G., Gasti, P., et al. (2015). HMOG: A new biometric modality for continuous authentication of smartphone users. arXiv preprint arXiv:1501.01199.

    Google Scholar 

  40. Buschek, D., De Luca, A., & Alt, F. (2015). Improving accuracy, applicability and usability of keystroke biometrics on mobile touchscreen devices. In 33rd Annual ACM Conference on Human Factors in Computing Systems (pp. 1393–1402).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Zahid Akhtar or Attaullah Buriro .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Akhtar, Z., Buriro, A. (2021). Multitrait Selfie: Low-Cost Multimodal Smartphone User Authentication. In: Bilan, S., Elhoseny, M., Hemanth, D.J. (eds) Biometric Identification Technologies Based on Modern Data Mining Methods. Springer, Cham. https://doi.org/10.1007/978-3-030-48378-4_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-48378-4_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-48377-7

  • Online ISBN: 978-3-030-48378-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics