Skip to main content

ITSME: Multi-modal and Unobtrusive Behavioural User Authentication for Smartphones

  • Conference paper
Technology and Practice of Passwords (PASSWORDS 2015)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9551))

Included in the following conference series:

Abstract

In this paper, we propose a new multi-modal behavioural biometric that uses features collected while the user slide-unlocks the smartphone to answer a call. In particular, we use the slide swipe, the arm movement in bringing the phone close to the ear and voice recognition to implement our behaviour biometric. We implemented the method on a real phone and we present a controlled user study among 26 participants in multiple scenario’s to evaluate our prototype. We show that for each tested modality the Bayesian network classifier outperforms other classifiers (Random Forest algorithm and Sequential Minimal Optimization). The multimodal system using slide and pickup features improved the unimodal result by a factor two, with a FAR of 11.01 % and a FRR of 4.12 %. The final HTER was 7.57 %.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 34.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 44.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    http://developer.android.com/reference/android/hardware/SensorManager.html.

  2. 2.

    http://weka.sourceforge.net/packageMetaData/oneClassClassifier/.

  3. 3.

    http://developer.android.com/reference/android/hardware/SensorEvent.html.

References

  1. Morrill, D.: Announcing the Android 1.0 SDK, release 1, Google (2008). http://android-developers.blogspot.in/2008/09/announcing-android-10-sdk-release-1.html. Accessed 20 April 2015

  2. Cohen, P.: Macworld Expo Keynote Live Update, PCWorld (2007). http://www.macworld.com/article/1054764/liveupdate.html. Accessed 20 April 2015

  3. IDC: Android and iOS Squeeze the Competition, Swelling to 96.3 % of the Smartphone Operating System Market for Both 4Q14 and CY14, According to IDC, IDC (2015). http://www.idc.com/getdoc.jsp?containerId=prUS25450615. Accessed 20 April 2015

  4. Wood, H.M.: The use of passwords for controlled access to computer resources, US Department of Commerce, National Bureau of Standards, vol. 500(9) (1977)

    Google Scholar 

  5. Google: Ice Cream Sandwich (2011). http://developer.android.com/about/versions/android-4.0-highlights.html. Accessed 20 April 2015

  6. Velazco, C.: Apples Touch ID Is A 500ppi Fingerprint Sensor Built Into The iPhone 5S Home Button, TechCrunch (2013). http://techcrunch.com/2013/09/10/apples-touch-id-a-500ppi-fingerprint-sensor. Accessed 20 April 2015

  7. Ross, A., Jain, A.: Information fusion in biometrics. Pattern Recogn. Lett. 24(13), 2115–2125 (2003)

    Article  Google Scholar 

  8. Kuncheva, L.I., Whitaker, C.J., Shipp, C.A., Duin, R.P.W.: Is independence good for combining classifiers?. In: Proceedings of 15th International Conference on Pattern Recognition. IEEE, vol. 2, pp. 168–171 (2000)

    Google Scholar 

  9. Bhagavatula, C., Ur, B., Iacovino, K., Mon, K.S., Cranor, L.F., Savvides, M.: Biometric Authentication on iPhone and Android: Usability, Perceptions, and Influences on Adoption (2015)

    Google Scholar 

  10. Jain, A., Flynn, P., Ross, A.A.: Handbook of Biometrics. Springer, New York (2007)

    Google Scholar 

  11. Yampolskiy, R.V., Govindaraju, V.: Behavioural biometrics: a survey and classification. Int. J. Biometrics 1(1), 81–113 (2008)

    Article  Google Scholar 

  12. Frank, M., Biedert, R., Ma, E., Martinovic, I., Song, D.: Touchalytics: on the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE Trans. Inf. Forensics Secur. 8(1), 136–148 (2013)

    Article  Google Scholar 

  13. De Luca, A., Hang, A., Brudy, F., Lindner, C., Hussman, H.: Touch me once and i know it’s you!: implicit authentication based on touch screen patterns. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, vol. 8(1), pp. 987–996 (2012)

    Google Scholar 

  14. Angulo, J., Wästlund, E.: Exploring touch-screen biometrics for user identification on smart phones. In: Camenisch, J., Crispo, B., Fischer-Hübner, S., Leenes, R., Russello, G. (eds.) Privacy and Identity Management for Life. IFIP AICT, vol. 375, pp. 130–143. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  15. Sae-Bae, N., Ahmed, K., Isbister, K., Memon, N.: Biometric-rich gestures: a novel approach to authentication on multi-touch devices. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 977–986 (2012)

    Google Scholar 

  16. Derawi, M.O., Nickel, C., Bours, P., Busch, C.: Unobtrusive user-authentication on mobile phones using biometric gait recognition. In: Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP). IEEE, pp. 306–311 (2010)

    Google Scholar 

  17. Tao, Q., Veldhuis, R.: Biometric authentication for a mobile personal device. In: 3rd Annual International Conference on Mobile and Ubiquitous Systems-Workshops. IEEE, pp. 1–3 (2006)

    Google Scholar 

  18. Viola, P., Jones, M.: Robust real-time object detection. Int. J. Comput. Vis. 4, 34–47 (2001)

    Google Scholar 

  19. Baek, C., Thirunavukkarasu, S., Underwood, B.S., Guddati, M.N., Kim, Y.R.: Top-down cracking prediction tool for hot mix asphalt pavements. In: Scarpas, A., Kringos, N., Al-Qadi, I., Loizos, A. (eds.) 7th RILEM International Conference on Cracking in Pavements. RILEM Bookseries, vol. 4, pp. 465–474. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  20. Buriro, A., Crispo, B., Del Frari, F., Wrona, K.: Touchstroke: smartphone user authentication based on touch-typing biometrics. In: Murino, V., Puppo, E., Sona, D., Cristani, M., Sansone, C. (eds.) ICIAP 2015 Workshops. LNCS, vol. 9281, pp. 27–34. Springer, Heidelberg (2015)

    Chapter  Google Scholar 

  21. Aronowitz, H., Li, M., Toledo-Ronen, O., Harary, S., Geva, A., Ben-David, S., Rendel, A., Hoory, R., Ratha, N., Pankanti, S.: Multi-modal biometrics for mobile authentication. IEEE International Joint Conference on Biometrics (IJCB). IEEE, pp. 1–8 (2014)

    Google Scholar 

  22. Ferrer, M.A., Morales, A., Travieso, C.M., Alonso, J.B.: Low cost multimodal biometric identification system based on hand geometry, palm and finger print texture. In: 41st Annual IEEE International Carnahan Conference on Security Technology. IEEE, pp. 52–58 (2007)

    Google Scholar 

  23. Kim, D.-J., Hong, K.-S.: Multimodal biometric authentication using teeth image and voice in mobile environment. IEEE Trans. Consum. Electr. 54(4), 1790–1797 (2008)

    Article  MathSciNet  Google Scholar 

  24. McCool, C., Marcel, S., Hadid, A., Pietikainen, M., Matejka, P., Cernocky, J., Poh, N., Kittler, J., Larcher, A., Levy, C.: Bi-modal person recognition on a mobile phone: using mobile phone data. In: IEEE International Conference on Multimedia and Expo Workshops (ICMEW). IEEE, pp. 635–640 (2012)

    Google Scholar 

  25. Bertillon, A.: Signaletic Instructions Including the Theory and Practice of Anthropometrical Identification. Werner Company, Chicago (2008)

    Google Scholar 

  26. Sitova, Z., Sedenka, J., Yang, Q., Peng, G., Zhou, G., Gasti, P., Balagani, K.: HMOG: a new biometric modality for continuous authentication of smartphone users, arXiv preprint (2015). arxiv:1501.01199

  27. Poh, N., Bengio, S.: Database, protocols and tools for evaluating score-level fusion algorithms in biometric authentication, a review. Pattern Recogn. 39(2), 223–233 (2006)

    Article  Google Scholar 

  28. Conti, M., Zachia-Zlatea, I., Crispo, B.: Mind how you answer me!: transparently authenticating the user of a smartphone when answering or placing a call. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, Science and Technology. ACM, pp. 249–259 (2011)

    Google Scholar 

  29. Davis, S., Mermelstein, P.: Comparison of parametric representations for monosyllabic word recognition in continuously spoken sentences. IEEE Trans. Acoust. Speech Signal Process. 28(4), 357–366 (1980)

    Article  Google Scholar 

  30. Logan, B.: Mel frequency cepstral coefficients for music modeling. In: ISMIR (2000)

    Google Scholar 

  31. Survey says 70 % password dont protect mobiles: download free Mobile Toolkit (2014). http://nakedsecurity.sophos.com/2011/08/09/free-sophos-mobilesecurity-toolkit

Download references

Acknowledgement

Authors would like to thank all the volunteers, who participated in this experiment for their valuable feedback and comments.

This work has been partially supported by the TENACE PRIN Project (n. 20103P34XC) funded by the Italian MIUR and EIT Digital MobileShield project.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Attaullah Buriro .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Buriro, A., Crispo, B., Del Frari, F., Klardie, J., Wrona, K. (2016). ITSME: Multi-modal and Unobtrusive Behavioural User Authentication for Smartphones. In: Stajano, F., Mjølsnes, S.F., Jenkinson, G., Thorsheim, P. (eds) Technology and Practice of Passwords. PASSWORDS 2015. Lecture Notes in Computer Science(), vol 9551. Springer, Cham. https://doi.org/10.1007/978-3-319-29938-9_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-29938-9_4

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-29937-2

  • Online ISBN: 978-3-319-29938-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics