Authenticating users through their arm movement patterns
نویسندگان
چکیده
In this paper, we propose four continuous authentication designs by using the characteristics of arm movements while individuals walk. The first design uses acceleration of arms captured by a smartwatch’s accelerometer sensor, the second design uses the rotation of arms captured by a smartwatch’s gyroscope sensor, third uses the fusion of both acceleration and rotation at the featurelevel and fourth uses the fusion at score-level. Each of these designs is implemented by using four classifiers, namely, k nearest neighbors (k-NN) with Euclidean distance, Logistic Regression, Multilayer Perceptrons, and Random Forest resulting in a total of sixteen authentication mechanisms. These authentication mechanisms are tested under three different environments, namely an intra-session, inter-session on a dataset of 40 users and an inter-phase on a dataset of 12 users. The sessions of data collection were separated by at least ten minutes, whereas the phases of data collection were separated by at least three months. Under the intra-session environment, all of the twelve authentication mechanisms achieve a mean dynamic false accept rate (DFAR) of 0% and dynamic false reject rate (DFRR) of 0%. For the inter-session environment, feature level fusion-based design with classifier k-NN achieves the best error rates that are a mean DFAR of 2.2% and DFRR of 4.2%. The DFAR and DFRR increased from 5.68% and 4.23% to 15.03% and 14.62% respectively when feature level fusion-based design with classifier k-NN was tested under the inter-phase environment on a dataset of 12 users.
منابع مشابه
Implicit Authentication through Learning User Behavior
Users are increasingly dependent on mobile devices. However, current authentication methods like password entry are significantly more frustrating and difficult to perform on these devices, leading users to create and reuse shorter passwords and pins, or no authentication at all. We present implicit authentication authenticating users based on behavior patterns. We describe our model for perfor...
متن کاملEnhanced User Authentication through Trajectory Clustering
* Hazarath Munaga alias MHM Krishna Prasad Abstract— Password authentication is the most commonly used technique to authenticate the user validity. However, due to its simplicity, it is vulnerable to pseudo attacks. It can be enhanced using various biometric techniques such as thumb impression, finger movement, eye movement etc. In this paper, we concentrate on the most economic technique, base...
متن کاملAuthenticating Mobile Device Users Through Image Selection
Adequate user authentication is a persistent problem, particularly with mobile devices such as Personal Digital Assistants (PDAs), which tend to be highly personal and at the fringes of an organization's influence. Yet these devices are being used increasingly in military and government agencies, hospitals, and other business settings, where they pose a risk to security and privacy, not only fr...
متن کاملMovement characteristics of upper extremity prostheses during basic goal-directed tasks.
BACKGROUND After an upper limb amputation a prosthesis is often used to restore the functionality. However, the frequency of prostheses use is generally low. Movement kinematics of prostheses use might suggest origins of this low use. The aim of this study was to reveal movement patterns of prostheses during basic goal-directed actions in upper limb prosthetic users and to compare this with exi...
متن کاملIt's a Hard Lock Life: A Field Study of Smartphone (Un)Locking Behavior and Risk Perception
A lot of research is being conducted into improving the us-ability and security of phone-unlocking. There is howevera severe lack of scientific data on users’ current unlockingbehavior and perceptions. We performed an online survey(n = 260) and a one-month field study (n = 52) to gaininsights into real world (un)locking behavior of smartphoneusers. One of the main goals ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1603.02211 شماره
صفحات -
تاریخ انتشار 2016