Gesture-Based Continuous Authentication for Wearable Devices: The Smart Glasses Use Case

  • Jagmohan ChauhanEmail author
  • Hassan Jameel Asghar
  • Anirban Mahanti
  • Mohamed Ali Kaafar
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9696)


We study the feasibility of touch gesture behavioural biometrics for implicit authentication of users on smart glasses by proposing a continuous authentication system on Google Glass using two classifiers: SVM with RBF kernel, and a new classifier based on Chebyshev’s concentration inequality. Based on data collected from 30 users, we show that such authentication is feasible both in terms of classification accuracy and computational load on Glass. We achieve a classification accuracy of up to 99 % with only 75 training samples using behavioural biometric data from four different types of touch gestures. To show that our system can be generalized, we test its performance on touch data from smartphones and found the accuracy to be similar to Glass. Finally, our experiments on the permanence of gestures show that the negative impact of changing user behaviour with time on classification accuracy can be best alleviated by periodically replacing older training samples with new randomly chosen samples.


Support Vector Machine Classification Accuracy True Positive Rate Support Vector Machine Classifier Target User 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Amidan, B.G., Ferryman, T.A., Cooley, S.K.: Data outlier detection using the chebyshev theorem. In: IEEE Aerospace Conference, pp. 3814–3819 (2005)Google Scholar
  2. 2.
    Ben-Asher, N., Kirschnick, N., Sieger, H., Meyer, J., Ben-Oved, A., Möller, S.: On the need for different security methods on mobile phones. In: MobileHCI 2011, pp. 465–473. ACM (2011)Google Scholar
  3. 3.
    Bo, C., Zhang, L., Li, X.Y., Huang, Q., Wang, Y.: SilentSense: silent user identification via touch and movement behavioral biometrics. In: MobiCom 2013, pp. 187–190 (2013)Google Scholar
  4. 4.
    Burgbacher, U., Hinrichs, K.: An implicit author verification system for text messages based on gesture typing biometrics. In: CHI 2014, pp. 2951–2954. ACM (2014)Google Scholar
  5. 5.
    Chang, C.C., Lin, C.J.: LIBSVM: a library for support vector machines. ACM Trans. Intell. Syst. Technol. 2(3), 27:1–27:27 (2011)CrossRefGoogle Scholar
  6. 6.
    De Luca, A., Hang, A., Brudy, F., Lindner, C., Hussmann, H.: Touch me once and i know it’s you!: implicit authentication based on touch screen patterns. In: CHI 2012, pp. 987–996. ACM (2012)Google Scholar
  7. 7.
    Frank, M., Biedert, R., Ma, E., Martinovic, I., Song, D.: Touchalytics: on the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE Trans. Inf. forensics Secur. 8(1), 136–148 (2013)CrossRefGoogle Scholar
  8. 8.
    Giuffrida, C., Majdanik, K., Conti, M., Bos, H.: I sensed it was you: authenticating mobile users with sensor-enhanced keystroke dynamics. In: Dietrich, S. (ed.) DIMVA 2014. LNCS, vol. 8550, pp. 92–111. Springer, Heidelberg (2014)Google Scholar
  9. 9.
    Jakobsson, M., Shi, E., Golle, P., Chow, R.: Implicit authentication for mobile devices. In: HotSec 2009, p. 9. USENIX (2009)Google Scholar
  10. 10.
    Li, L., Zhao, X., Xue, G.: Unobservable re-authentication for smartphones. In: NDSS 2013. Internet Society (2013)Google Scholar
  11. 11.
    LiKamWa, R., Wang, Z., Carroll, A., Lin, F.X., Zhong, L.: Draining our glass: an energy and heat characterization of google glass. In: APSys 2014, pp. 10:1–10:7. ACM (2014)Google Scholar
  12. 12.
    Mondal, S., Bours, P.: Swipe gesture based continuous authentication for mobile devices. In: ICB 2015, pp. 458–465. IEEE (2015)Google Scholar
  13. 13.
    Ross, S.M.: A First Course in Probability, 4th edn. Prentice Hall, Upper Saddle River (2002)zbMATHGoogle Scholar
  14. 14.
    Schaub, F., Deyhle, R., Weber, M.: Password entry usability and shoulder surfing susceptibility on different smartphone platforms. In: MUM 2012, pp. 13:1–13:10. ACM (2012)Google Scholar
  15. 15.
    Serwadda, A., Phoha, V.V., Wang, Z.: Which verifiers work?: a benchmark evaluation of touch-based authentication algorithms. In: BTAS 2013, pp. 1–8. IEEE (2013)Google Scholar
  16. 16.
    Shahzad, M., Liu, A.X., Samuel, A.: Secure unlocking of mobile touch screen devices by simple gestures: you can see it but you can not do it. In: MobiCom 2013, pp. 39–50. ACM (2013)Google Scholar
  17. 17.
    Stanciu, V.D., Spolaor, R., Conti, M., Giuffrida, C.: On the effectiveness of sensor-enhanced keystroke dynamics against statistical attacks. In: CODASPY 2016, pp. 105–112. ACM (2016)Google Scholar
  18. 18.
    Uellenbeck, S., Dürmuth, M., Wolf, C., Holz, T.: Quantifying the security of graphical passwords: the case of android unlock patterns. In: CCS 2013, pp. 161–172. ACM (2013)Google Scholar
  19. 19.
    Xu, H., Zhou, Y., Lyu, M.R.: Towards continuous and passive authentication via touch biometrics: an experimental study on smartphones. In: SOUPS 2014, pp. 187–198. ACM (2014)Google Scholar
  20. 20.
    Zheng, N., Bai, K., Huang, H., Wang, H.: You are how you touch: User verification on smartphones via tapping behaviors. In: ICNP 2014, pp. 221–232. ACM (2014)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  • Jagmohan Chauhan
    • 1
    • 2
    Email author
  • Hassan Jameel Asghar
    • 2
  • Anirban Mahanti
    • 2
  • Mohamed Ali Kaafar
    • 2
  1. 1.UNSWSydneyAustralia
  2. 2.Data61CSIROSydneyAustralia

Personalised recommendations