multi touch authentication using hand geometry and
play

Multi-touch Authentication Using Hand Geometry and Aokun Chen - PowerPoint PPT Presentation

Multi-touch Authentication Using Hand Geometry and Aokun Chen Behavioral Information Related Work Gait Recognition Keystroke/Mouse dynamics Gesture based authentication Threat Model and Assumption The adversary may or may not


  1. Multi-touch Authentication Using Hand Geometry and Aokun Chen Behavioral Information

  2. Related Work • Gait Recognition • Keystroke/Mouse dynamics • Gesture based authentication

  3. Threat Model and Assumption • The adversary may or may not observe the unlock gesture: • Zero-effort Attack • Smudge Attack • Shoulder Surfing Attack • Statistical Attack • The adversary does not have the capability to produce an apparatus with the exact same hand geometry while also being able to observe and replicate the behavior characteristics

  4. Methodology • TFST gestures: • “Touching with Fingers Straight and Together”

  5. Methodology • TFST Gesture features: • Multi-touch Traces • Physiological Features • 12 distances • Behavioral Features • Length, time, velocity, tool, touch, pressure, angle • 52 for 4 fingers, 39 for 3 fingers 26 for 2 fingers

  6. Data Collection • Android application on a smartphone • 161 subjects: • 131 sophomores • 18 master and PhD students • 12 faculty members or staffs • 2 months, 7-session data collection • 144 hand image data

  7. Feature Analysis • Discernibility of Physiological Features in TFST Gestures

  8. Feature Analysis • Feature Selection ሚ 𝑇 𝑐 𝑙 Fisher(k) = • Fisher Score: ሚ 𝑇 𝑢 𝑙 𝑇 𝑐 = Σ 𝑙=1 𝑄 𝑙 (෤ 𝜈 𝑙 − Ƽ 𝜈)(෤ 𝜈 𝑙 − Ƽ 𝜈) 𝑈 𝑑 1 𝑙 − ෤ 𝑙 − ෤ 𝑇 𝑢 = Σ 𝑙=1 𝑄 𝑙 Σ 𝑦 𝑗 (𝑦 𝑗 𝜈 𝑙 )(𝑦 𝑗 𝜈 𝑙 ) 𝑈 𝑑 𝑜 𝑙 𝑙 ∈𝑑 𝑙

  9. Feature Analysis • Feature Selection

  10. One-Class Classifiers • K-Nearest Neighbor • Support Vector Machine

  11. Evaluation • Training: • 1 vs 160 • 10% cross-validation • Random sample • Evaluation metrics: • FAR, FRR, EER and ROC curve • McNemar's test

  12. Evaluation • Effectiveness of TFST Gestures

  13. Evaluation • Effectiveness of different classifier

  14. Evaluation • Effectiveness of training size

  15. Evaluation • Behavior variability

  16. Evaluation • Security Analysis: Zero-effort Attack • 1 vs 160 • Similarity metric:

  17. Evaluation • Security Analysis: Smudge and Shoulder Surfing Attack • Evaluation setup: • Another 20 students each attacks 10 victims • 5 victims with similar handshape, 5 victim with different handshape • Mimic 4-figer TFST

  18. Evaluation • Security Analysis: Smudge Attack

  19. Evaluation • Security Analysis: Shoulder Surfing Attack

  20. Evaluation • Security Analysis: Statistical attack

  21. Evaluation • Security Analysis: Statistical attack

  22. Evaluation • Usability Study

  23. Questions ?

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend