skip to main content
10.1145/2592235.2592252acmotherconferencesArticle/Chapter ViewAbstractPublication Pageschinese-chiConference Proceedingsconference-collections
research-article

LatentGesture: active user authentication through background touch analysis

Published:26 April 2014Publication History

ABSTRACT

We propose a new approach for authenticating users of mobile devices that is based on analyzing the user's touch interaction with common user interface (UI) elements, e.g., buttons, checkboxes and sliders. Unlike one-off authentication techniques such as passwords or gestures, our technique works continuously in the background while the user uses the mobile device. To evaluate our approach's effectiveness, we conducted a lab study with 20 participants, where we recorded their interaction traces on a mobile phone and a tablet (e.g., touch pressure, locations), while they filled out electronic forms populated with UI widgets. Using classification methods based on SVM and Random Forests, we achieved an average of 97.9% accuracy with a mobile phone and 96.79% accuracy with a tablet for single user classification, demonstrating that our technique has strong potential for real-world use. We believe our research can help strengthen personal device security and safeguard against unintended or unauthorized uses, such as small children in a household making unauthorized online transactions on their parents' devices, or an impostor accessing the bank account belonging to the victim of a stolen device.

References

  1. Clarke, N., Furnell, S., Rodwell, P., and Reynolds, P. Acceptance of subscriber authentication methods for mobile telephony devices. Computers & Security 21, 3 (2002), 220--228. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Davis, D., Monrose, F., and Reiter, M. K. On user choice in graphical password schemes. In USENIX Security Symposium, vol. 13 (2004), 11--11. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. De Luca, A., Hang, A., Brudy, F., Lindner, C., and Hussmann, H. Touch me once and i know it's you!: Implicit authentication based on touch screen patterns. In Proc. CHI'12, CHI '12, ACM (2012), 987--996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Frank, M., Biedert, R., Ma, E., Martinovic, I., and Song, D. Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication. Information Forensics and Security, IEEE Transactions on 8, 1 (1 2013), 136--148.Google ScholarGoogle Scholar
  5. Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., and Witten, I. H. The weka data mining software: an update. ACM SIGKDD explorations newsletter 11, 1 (2009), 10--18. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Khan, M. K., Zhang, J., and Wang, X. Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices. Chaos, Solitons & Fractals 35, 3 (2008), 519--524.Google ScholarGoogle ScholarCross RefCross Ref
  7. Kim, D., Dunphy, P., Briggs*, P., and Hook, J. Multi-touch authentication on tabletops. In Proc. CHI'10, ACM Press (2010), 1093--1102. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Liu, J., Zhong, L., Wickramasuriya, J., and Vasudevan, V. uwave: Accelerometer-based personalized gesture recognition and its applications. Pervasive and Mobile Computing 5, 6 (2009), 657--675. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Rosenblatt, S. Touch id hack verified as legit, 9 2013. http://news.cnet.com/8301-1009_3-57604255-83/touch-id-hack-verified-as-legit/.Google ScholarGoogle Scholar
  10. Sae-Bae, N., Ahmed, K., Isbister, K., and Memon, N. Biometric-rich gestures: A novel approach to authentication on multi-touch devices. In Proc. CHI'12, ACM Press (2012), 977--986. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Zheng, N., Bai, K., Huang, H., and Wang, H. You are how you touch: User verication on smartphones via tapping behaviors. ACM Press (2012), 1093--1102.Google ScholarGoogle Scholar

Index Terms

  1. LatentGesture: active user authentication through background touch analysis

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          Chinese CHI '14: Proceedings of the Second International Symposium of Chinese CHI
          April 2014
          120 pages
          ISBN:9781450328760
          DOI:10.1145/2592235
          • Conference Chairs:
          • Ellen Yi-Luen Do,
          • Wei Li

          Copyright © 2014 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 26 April 2014

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate17of40submissions,43%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader