Authenticating users through their arm movement patterns

نویسندگان

  • Rajesh Kumar
  • Vir V. Phoha
  • Rahul Raina
چکیده

In this paper, we propose four continuous authentication designs by using the characteristics of arm movements while individuals walk. The first design uses acceleration of arms captured by a smartwatch’s accelerometer sensor, the second design uses the rotation of arms captured by a smartwatch’s gyroscope sensor, third uses the fusion of both acceleration and rotation at the featurelevel and fourth uses the fusion at score-level. Each of these designs is implemented by using four classifiers, namely, k nearest neighbors (k-NN) with Euclidean distance, Logistic Regression, Multilayer Perceptrons, and Random Forest resulting in a total of sixteen authentication mechanisms. These authentication mechanisms are tested under three different environments, namely an intra-session, inter-session on a dataset of 40 users and an inter-phase on a dataset of 12 users. The sessions of data collection were separated by at least ten minutes, whereas the phases of data collection were separated by at least three months. Under the intra-session environment, all of the twelve authentication mechanisms achieve a mean dynamic false accept rate (DFAR) of 0% and dynamic false reject rate (DFRR) of 0%. For the inter-session environment, feature level fusion-based design with classifier k-NN achieves the best error rates that are a mean DFAR of 2.2% and DFRR of 4.2%. The DFAR and DFRR increased from 5.68% and 4.23% to 15.03% and 14.62% respectively when feature level fusion-based design with classifier k-NN was tested under the inter-phase environment on a dataset of 12 users.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Implicit Authentication through Learning User Behavior

Users are increasingly dependent on mobile devices. However, current authentication methods like password entry are significantly more frustrating and difficult to perform on these devices, leading users to create and reuse shorter passwords and pins, or no authentication at all. We present implicit authentication authenticating users based on behavior patterns. We describe our model for perfor...

متن کامل

Enhanced User Authentication through Trajectory Clustering

* Hazarath Munaga alias MHM Krishna Prasad Abstract— Password authentication is the most commonly used technique to authenticate the user validity. However, due to its simplicity, it is vulnerable to pseudo attacks. It can be enhanced using various biometric techniques such as thumb impression, finger movement, eye movement etc. In this paper, we concentrate on the most economic technique, base...

متن کامل

Authenticating Mobile Device Users Through Image Selection

Adequate user authentication is a persistent problem, particularly with mobile devices such as Personal Digital Assistants (PDAs), which tend to be highly personal and at the fringes of an organization's influence. Yet these devices are being used increasingly in military and government agencies, hospitals, and other business settings, where they pose a risk to security and privacy, not only fr...

متن کامل

Movement characteristics of upper extremity prostheses during basic goal-directed tasks.

BACKGROUND After an upper limb amputation a prosthesis is often used to restore the functionality. However, the frequency of prostheses use is generally low. Movement kinematics of prostheses use might suggest origins of this low use. The aim of this study was to reveal movement patterns of prostheses during basic goal-directed actions in upper limb prosthetic users and to compare this with exi...

متن کامل

It's a Hard Lock Life: A Field Study of Smartphone (Un)Locking Behavior and Risk Perception

A lot of research is being conducted into improving the us-ability and security of phone-unlocking. There is howevera severe lack of scientific data on users’ current unlockingbehavior and perceptions. We performed an online survey(n = 260) and a one-month field study (n = 52) to gaininsights into real world (un)locking behavior of smartphoneusers. One of the main goals ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1603.02211  شماره 

صفحات  -

تاریخ انتشار 2016