DOI QR코드

DOI QR Code

A Study on Multibiometrics derived from Calling Activity Context using Smartphone for Implicit User Authentication System

  • Negara, Ali Fahmi Perwira (School of Electronics and Computer Engineering, Chonnam National University) ;
  • Yeom, Jaekeun (School of Electronics and Computer Engineering, Chonnam National University) ;
  • Choi, Deokjai (School of Electronics and Computer Engineering, Chonnam National University)
  • 투고 : 2012.10.29
  • 심사 : 2013.06.17
  • 발행 : 2013.06.28

초록

Current smartphone authentication systems are deemed inconvenient and difficult for users on remembering their password as well as privacy issues on stolen or forged biometrics. New authentication system is demanded to be implicit to users with very minimum user involvement being. This idea aims towards a future model of authentication system for smartphones users without users realizing them being authenticated. We use the most frequent activity that users carry out with their smartphone, which is the calling activity. We derive two basics related interactions that are first factor being arm's flex (AF) action to pick a phone to be near ones' ears and then once getting near ear using second factor from ear shape image. Here, we combine behavior biometrics from AF in first factor and physical biometrics from ear image in second factor. Our study shows our dual-factor authentication system does not require explicit user interaction thereby improving convenience and alleviating burden from users from persistent necessity to remember password. These findings will augment development of novel implicit authentication system being transparent, easier, and unobtrusive for users.

키워드

참고문헌

  1. S. Furnell, N. Clarke, and S. Karatzouni, "Beyond the PIN: Enhancing User Authentication for Mobile Devices," Computer Fraud & Security, vol. 8, August 2008, pp.12-17.
  2. S. Chiasson, R. Biddle, and P. C. v. Oorschot, "A second look at the usability of click-based graphical passwords," Proc. SOUPS '07, 2007, pp.1-12.
  3. Google, Inc., "Enhancing Security with Device Management Policies", Retrieved September 15, 2012, from Android OS Developer Guide: http://developer.android.com/training/enterprise/device-management-policy.html [Online]
  4. M.A. Carrera-Perpinan, "Compression neural networks for feature extraction: Application to human recognition from ear images", Master (M.Sc) Thesis, Technical University of Madrid, 1995
  5. H. Chen and B. Bhanu, "Human Ear Recognition in 3D," IEEE Trans. on Pattern Analysis and Machine Intelligence, vol.29, no.4, April 2007, pp.718-737. https://doi.org/10.1109/TPAMI.2007.1005
  6. J Kent, "Malaysia car thieves steal finger", Retrieved March 31, 2005, from BBC News UK: http://news.bbc.co.uk/2/hi/asia-pacific/4396831.stm [Online]
  7. F. Aloul, S. Zahidi, and W. El-Hajj, "Multi Factor Authentication Using Mobile Phones," Int. J. of Math and Comp. Sci., vol. 4, no. 2, July 2009, pp. 65-80.
  8. A.T.B. Jin, D. N. C. Ling, and A. Goh, "Biohashing: Two Factor Authentication Featuring Fingerprint Data and Tokenised Random Number," J. of Pattern Recognition vol. 37, no. 11, November 2004, pp.2245-2255. https://doi.org/10.1016/j.patcog.2004.04.011
  9. A.P. Sabzevar and A. Stavrou, "Universal Multi-Factor Authentication Using Graphical Passwords," Proc. SITIS'08, pp.625-632.
  10. Confident Technologies, Inc., Survey Shows Smartphone Users Choose Convenience over Security, Retrieved September 29, 2011, from Confident Technologies' News Event: http://www.confidenttechnologies.com/news_events/survey-shows-smartphone-users-choose-convenience-over-security [Online]
  11. D. Roman-Liu and T. Tokarski, "Upper limb Strength in Relation to Upper Limb Posture," Int. J. of Industrial Ergonomics vol.35, no.1, January 2005, pp.19-31. https://doi.org/10.1016/j.ergon.2004.07.002
  12. A.K. Bourke, J.V. O'Brien, G.M. Lyons, "Evaluation of A Threshold-based Tri-axial Accelerometer Fall Detection Algorithm," J Gait and Posture vol. 26, no. 2, July 2007, pp.194-199.. https://doi.org/10.1016/j.gaitpost.2006.09.012
  13. Ali Fahmi PN, E. Kodirov, M. F. A. Abdullah, D. Choi, and S. Sayeed, "Arm's flex when responding Call for Implicit User Authentication in Smartphone," Int. J. of Security and Its Applications vol. 6, no. 3, July 2012, pp. 58-64.
  14. D. J. Berndt and J. Clifford, "Using Dynamic Time Warping to Find Patterns in Time Series," In AAAI Technical Report '94 Workshop on Knowledge Discovery in Databases (KDD-94), pp.359-370
  15. M. Burge and W. Burger, "Ear Biometrics", In A. Jain R. Bolle and S. Pankanti, editors, Biometics: Personal Identfication in a Networked Society, Kluwer Academic, Dordrecht-The Netherlands, 1998, pp. 273-286.
  16. T. Ojala, M. Pietikainen, and D. Harwood, "A comparative study of texture measures with classification based on feature distributions," Pattern Recognition, vol. 29, no.1, January 1996, pp. 51-59. https://doi.org/10.1016/0031-3203(95)00067-4