Abstract
Behavioral biometrics, such as gait patterns and keystroke dynamics, have been becoming increasingly used in human identity recognition research for enhancing the smartphone security. A new multimodal authentication method able to strengthen the smartphone authentication system is proposed in this paper. The proposed mechanism acquires gait patterns from the accelerometer, as well as keystroke dynamics, continuously without user intervention through simultaneous walk and text input. More specifically, features are extracted from both modalities. Afterward, a feature level fusion method is applied to build a multimodal biometrics profile for the user. Fused feature vectors are subjected to the sequential floating forward selection algorithm to reduce their dimensions as well as the computational complexity. The effectiveness of the proposed method is examined through a real multimodal dataset collected from 20 subjects under various scenarios, using different machine learning classifiers. The experimental results achieved a promising accuracy of 99.11% when using multilayer perceptron classifier with the average false acceptance rate, false rejection rate and equal error rate values of 0.684%, 7%, and 1%, respectively. Furthermore, the security strength of the proposed method was evaluated against two types of attacks, the zero-effort attack and minimal-effort mimicking attack. Results demonstrate that our approach represents a robust and secure authentication solution.









Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Akhtar Z, Buriro A, Crispo B, Falk TH (2017) Multimodal smartphone user authentication using touchstroke, phone-movement and face patterns. In: Signal and information processing (GlobalSIP), 2017 IEEE Global Conference. IEEE, pp 1368–1372. https://doi.org/10.1109/GlobalSIP.2017.8309185
Almohammad MS, Salama GI, Mahmoud TA (2012) Human identification system based on feature level fusion using face and gait biometrics. In: Engineering and technology (ICET), 2012 international conference. IEEE, pp 1–5. https://doi.org/10.1109/ICEngTechnol.201.6396120
Alsultan A, Warwick K, Wei H (2016) Free-text keystroke dynamics authentication for Arabic language. IET Biometr 5:164–169. https://doi.org/10.1049/iet-bmt.2015.0101
Alzubaidi A, Kalita J (2016) Authentication of smartphone users using behavioral biometrics. IEEE Commun Surv Tutor 18:1998–2026. https://doi.org/10.1109/COMST.2016.2537748
Antal M, Szabó LZ (2015) An evaluation of one-class and two-class classification algorithms for keystroke dynamics authentication on mobile devices. In: Control systems and computer science (CSCS), 2015 20th international conference. IEEE, pp 343–350. https://doi.org/10.1109/CSCS.2015.16
Antal M, Szabó LZ, László I (2015) Keystroke dynamics on android platform. Procedia Technol 19:820–826. https://doi.org/10.1016/j.protcy.2015.02.118
Aviv AJ, Gibson KL, Mossop E, Blaze M, Smith JM (2010) Smudge attacks on smartphone. Touch Screens Woot 10:1–7. https://doi.org/10.1145/1610252.1610287
Bersch SD, Azzi D, Khusainov R, Achumba IE, Ries J (2014) Sensor data acquisition and processing parameters for human activity classification. Sensors 14:4239–4270. https://doi.org/10.3390/s140304239
Bours P, Mondal S (2015) Continuous authentication with keystroke dynamics. Norwegian Information Security Laboratory NISlab 41–58. https://doi.org/10.13140/2.1.2642.5125
Brown M, Rogers SJ (1993) User identification via keystroke characteristics of typed names using neural networks Int J Man Mach Stud 39:999–1014. https://doi.org/10.1006/imms.1993.1092
Buschek D, De Luca A, Alt F (2015) Improving accuracy, applicability and usability of keystroke biometrics on mobile touchscreen devices. In: Proceedings of the 33rd annual ACM conference on human factors in computing systems. ACM, pp 1393–1402. https://doi.org/10.1145/2702123.2702252
Choi S, Youn I-H, LeMay R, Burns S, Youn J-H (2014) Biometric gait recognition based on wireless acceleration sensor using k-nearest neighbor classification. In: Computing, networking and communications (ICNC), 2014 international conference. IEEE, pp 1091–1095. https://doi.org/10.1109/ICCNC.2014.6785491
Crawford H, Renaud K (2014) Understanding user perceptions of transparent authentication on a mobile device. J Trust Manag 1:7. https://doi.org/10.1186/2196-064X-1-7
Crawford H, Renaud K, Storer T (2013) A framework for continuous, transparent mobile device authentication. Comput Secur 39:127–136. https://doi.org/10.1016/j.cose.2013.05.005
Damaševičius R, Maskeliūnas R, Venčkauskas A, Woźniak M (2016) Smartphone user identity verification using gait characteristics. Symmetry 8:100. https://doi.org/10.3390/sym8100100
Damer N, Maul F, Busch C (2016) Multi-biometric continuous authentication: a trust model for an asynchronous system. In: Information fusion (FUSION), 19th international conference. IEEE, pp 2192–2199
Derawi MO, Nickel C, Bours P, Busch C (2010) Unobtrusive user-authentication on mobile phones using biometric gait recognition. In: Intelligent information hiding and multimedia signal processing (IIH-MSP), sixth international conference, IEEE, pp 306–311. https://doi.org/10.1109/IIHMSP.2010.83
Do S, Hoang T, Luong C, Choi S, Lee D, Bang K, Choi D (2014) Using keystroke dynamics for implicit authentication on smartphone. J Korea Multim Soc 17:968–976. https://doi.org/10.9717/kmms.2014.17.8.968
Frank M, Biedert R, Ma E, Martinovic I, Song D (2013) Touchalytics: on the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE Trans Inf Forens Secur 8:136–148. https://doi.org/10.1109/TIFS.2012.2225048
Galdi C, Nappi M, Dugelay J-L (2016) Multimodal authentication on smartphones: combining iris and sensor recognition for a double check of user identity. Pattern Recogn Lett 82:144–153. https://doi.org/10.1016/j.patrec.2015.09.009
Guan Y, Wei X, Li C-T, Marcialis GL, Roli F, Tistarelli M (2013) Combining gait and face for tackling the elapsed time challenges. In: Biometrics: theory, applications and systems (BTAS), sixth international conference. IEEE, pp 1–8. https://doi.org/10.1109/BTAS.2013.6712749
Gunetti D, Picardi C (2005) Keystroke analysis of free text. ACM Trans Inf Syst Secur (TISSEC) 8:312–347. https://doi.org/10.1145/1085126.1085129
Hoang T, Choi D, Vo V, Nguyen A, Nguyen TA (2013) lightweight gait authentication on mobile phone regardless of installation error. In: IFIP international information security conference, Springer, pp 83–101. https://doi.org/10.1007/978-3-642-39218-4_7
Hofmann M, Schmidt SM, Rajagopalan AN, Rigoll G (2012) Combined face and gait recognition using alpha matte preprocessing. In: Biometrics (ICB), 2012 5th IAPR international conference, IEEE, pp 390–395. https://doi.org/10.1109/ICB.2012.6199782
Holmes G, Donkin A, Witten IH (1994) Weka: a machine learning workbench. In: Intelligent information systems, 1994. In: Proceedings of the 1994 Second Australian and New Zealand Conference. IEEE, pp 357–361. https://doi.org/10.1109/ANZIIS.1994.396988
Hossain E, Chetty G (2011) Multimodal face-gait fusion for biometric person authentication. In: Embedded and ubiquitous computing (EUC), 2011 IFIP 9th international conference. IEEE, pp 332–337. https://doi.org/10.1109/EUC.2011.52
Kambourakis G, Damopoulos D, Papamartzivanos D, Pavlidakis E (2016) Introducing touchstroke: keystroke based authentication system for smartphones. Secur Commun Netw 9:542–554. https://doi.org/10.1002/sec.1061
Kang P, Cho S (2015) Keystroke dynamics-based user authentication using long and free text strings from various input devices. Inf Sci 308:72–93. https://doi.org/10.1016/j.ins.2014.08.070
Lau E, Liu X, Xiao C, Yu X (2004) Enhanced user authentication through keystroke biometrics. Massachusetts Institute of Technology 9
Mantyjarvi J, Lindholm M, Vildjiounaite E, Makela S-M, Ailisto H (2005) Identifying users of portable devices from gait pattern with accelerometers. In: Acoustics, speech, and signal processing, 2005. Proceedings.(ICASSP’05). IEEE international conference. IEEE, pp ii/973–ii/976. Vol. 972. https://doi.org/10.1109/ICASSP.2005.1415569
Monrose F, Rubin AD (2000) Keystroke dynamics as a biometric for authentication. Futur Gen Comput Syst 16:351–359. https://doi.org/10.1016/S0167-739X(99)00059-X
Muaaz M, Mayrhofer R (2013) An analysis of different approaches to gait recognition using cell phone based accelerometers. In: Proceedings of international conference on advances in mobile computing & multimedia, ACM, p 293. https://doi.org/10.1145/2536853.2536895
Muaaz M, Mayrhofer R (2014) Orientation independent cell phone based gait authentication. In: Proceedings of the 12th international conference on advances in mobile computing and multimedia. ACM, pp 161–164. https://doi.org/10.1145/2684103.2684152
Nanda A, Sa PK, Chauhan DS, Majhi B (2017) A person re-identification framework by inlier-set group modeling for video surveillance. J Ambient Intell Human Comput:1–13. https://doi.org/10.1007/s12652-017-0580-7
Niazi AH, Yazdansepas D, Gay JL, Maier FW, Ramaswamy L, Rasheed K, Buman MP (2017) Statistical analysis of window sizes and sampling rates in human activity recognition. In: HEALTHINF, pp 319–325. https://doi.org/10.5220/0006148503190325
Ravi N, Dandekar N, Mysore P, Littman ML (2005) Activity recognition from accelerometer data. In: AAAI, vol 2005. pp 1541–1546
Ross A, Jain AK (2004) Multimodal biometrics: an overview. In: Signal processing conference, 2004 12th European. IEEE, pp 1221–1224
Saevanee H, Clarke NL, Furnell SM (2012) Multi-modal behavioural biometric authentication for mobile devices. In: IFIP international information security conference. Springer, pp 465–474. https://doi.org/10.1007/978-3-642-30436-1_38
Salem A, Zaidan D, Swidan A, Saifan R (2016) Analysis of strong password using keystroke dynamics authentication in touch screen devices. In: Cybersecurity and cyberforensics conference (CCC). IEEE, pp 15–21. https://doi.org/10.1109/CCC.2016.11
Singha TB, Nath RK, Narsimhadhan A (2017) Person Recognition using smartphones’ accelerometer data. arXiv:171104689
Sitová Z, Šeděnka J, Yang Q, Peng G, Zhou G, Gasti P, Balagani KS (2016) HMOG: New behavioral biometric features for continuous authentication of smartphone users. IEEE Trans Inf Forens Secur 11:877–892. https://doi.org/10.1109/TIFS.2015.2506542
Somol P, Pudil P, Novovičová J, Paclık P (1999) Adaptive floating search methods in feature selection. Pattern Recognit Lett 20:1157–1163. https://doi.org/10.1016/S0167-8655(99)00083-5
Stanciu V-D, Spolaor R, Conti M, Giuffrida C (2016) On the effectiveness of sensor-enhanced keystroke dynamics against statistical attacks. In: Proceedings of the sixth ACM conference on data and application security and privacy. ACM, pp 105–112. https://doi.org/10.1145/2857705.2857748
Tang J, Alelyani S, Liu H (2014) Feature selection for classification: a review. In: Aggarwal C (ed) Data classification: algorithms and applications. CRC Press, Boca Raton, pp 37–64
Tao S, Zhang X, Cai H, Lv Z, Hu C, Xie H (2018) Gait based biometric personal authentication by using MEMS inertial sensors. J Ambient Intell Humaniz Comput:1–8. https://doi.org/10.1007/s12652-018-0880-6
Ulinskas M, Woźniak M, Damaševičius R (2017) Analysis of keystroke dynamics for fatigue recognition. In: International conference on computational science and its applications. Springer, pp 235–247. https://doi.org/10.1007/978-3-319-62404-4_18
Ulinskas M, Damaševičius R, Maskeliūnas R, Woźniak M (2018) Recognition of human daytime fatigue using keystroke data. Procedia Comput Sci 130:947–952. https://doi.org/10.1016/j.procs.2018.04.094
Vildjiounaite E, Mäkelä S-M, Lindholm M, Riihimäki R, Kyllönen V, Mäntyjärvi J, Ailisto H (2006) Unobtrusive multimodal biometrics for ensuring privacy and information security with personal devices. In: International conference on pervasive computing. Springer, pp 187–201. https://doi.org/10.1007/11748625_12
Xing X, Wang K, Lv Z (2015) Fusion of gait and facial features using coupled projections for people identification at a distance. IEEE Signal Process Lett 22:2349–2353. https://doi.org/10.1109/LSP.2015.2481930
Zakaria NH, Griffiths D, Brostoff S, Yan J (2011) Shoulder surfing defence for recall-based graphical passwords. In: Proceedings of the seventh symposium on usable privacy and security. ACM, p 6. https://doi.org/10.1145/2078827.2078835
Zhang Y, Pan G, Jia K, Lu M, Wang Y, Wu Z (2015) Accelerometer-based gait recognition by sparse representation of signature points with clusters. IEEE Trans Cybernet 45:1864–1875. https://doi.org/10.1109/TCYB.2014.2361287
Zhao Y, Zhou S (2017) Wearable device-based gait recognition using angle embedded gait dynamic images and a convolutional neural network. Sensors 17:478. https://doi.org/10.3390/s17030478
Zhong Y, Deng Y (2015) A survey on keystroke dynamics biometrics: approaches, advances, and evaluations. Recent advances in user authentication using keystroke dynamics biometrics Science Gate Publishing:1–22. https://doi.org/15579/gcsr.vol2.ch1
Zhong Y, Deng Y, Meltzner G (2015) Pace independent mobile gait biometrics. In: Biometrics theory, applications and systems (BTAS),7th international conference. IEEE, pp 1–8. https://doi.org/10.1109/BTAS.2015.7358784
Acknowledgements
This work was partially supported by the National Key R&D Program of China (2017YFB1001803), and the National Natural Science Foundation of China (nos. 61772428, 61725205).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Lamiche, I., Bin, G., Jing, Y. et al. A continuous smartphone authentication method based on gait patterns and keystroke dynamics. J Ambient Intell Human Comput 10, 4417–4430 (2019). https://doi.org/10.1007/s12652-018-1123-6
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-018-1123-6