WristAuthen: A Dynamic Time Wrapping Approach for User Authentication by Hand-Interaction through Wrist-Worn Devices

作者: Chao Shen , Tianwei Yue , Qi Lyu , Zhifeng Kong

DOI:

关键词:

摘要: The growing trend of using wearable devices for context-aware computing and pervasive sensing systems has raised its potentials quick reliable authentication techniques. Since personal writing habitats differ from each other, it is possible to realize user through writing. This great significance as sensible information easily collected by these devices. paper presents a novel system wrist-worn analyzing the interaction behavior with users, which both accurate efficient future usage. key feature our approach lies in much more effective Savitzky-Golay filter Dynamic Time Wrapping method obtain fine-grained metrics authentication. These new are relatively unique person independent platform. Analyses conducted on wristband-interaction data 50 users diversity gender, age, height. Extensive experimental results show that proposed can identify timely manner, false-negative rate 1.78\%, false-positive 6.7\%, Area Under ROC Curve 0.983 . Additional examination robustness various mimic attacks, tolerance training data, comparisons further analyze applicability.

参考文章(8)
D.V. Klein, Foiling the cracker: A survey of, and improvements to, password security Programming and Computer Software. ,vol. 17, ,(1992)
Junshuang Yang, Yanyan Li, Mengjun Xie, MotionAuth: Motion-based authentication for wrist worn smart devices international conference on pervasive computing. pp. 550- 555 ,(2015) , 10.1109/PERCOMW.2015.7134097
Jiayang Liu, Lin Zhong, Jehan Wickramasuriya, Venu Vasudevan, User evaluation of lightweight user authentication with a single tri-axis accelerometer Proceedings of the 11th International Conference on Human-Computer Interaction with Mobile Devices and Services - MobileHCI '09. pp. 15- ,(2009) , 10.1145/1613858.1613878
Lei Yang, Yi Guo, Xuan Ding, Jinsong Han, Yunhao Liu, Cheng Wang, Changwei Hu, Unlocking Smart Phone through Handwaving Biometrics IEEE Transactions on Mobile Computing. ,vol. 14, pp. 1044- 1055 ,(2015) , 10.1109/TMC.2014.2341633
Blase Ur, Jonathan Bees, Sean M. Segreti, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Do Users' Perceptions of Password Security Match Reality? human factors in computing systems. pp. 3748- 3760 ,(2016) , 10.1145/2858036.2858546
Pankaj Agarwal, Machine Learning Toolbox Machine Learning and Applications: An International Journal. ,vol. 3, pp. 25- 34 ,(2016) , 10.5121/MLAIJ.2016.3303
Tomoaki Ohtsuki, Hiroto Kamoi, Biometrie authentication using hand movement information from wrist-worn PPG sensors 2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC). pp. 1- 5 ,(2016) , 10.1109/PIMRC.2016.7794969
Yuval Elovici, Erez Shmueli, Ben Nassi, Alona Levy, Handwritten Signature Verification Using Hand-Worn Devices arXiv: Cryptography and Security. ,(2016)