Multi-touch Authentication Using Hand Geometry and Aokun Chen - - PowerPoint PPT Presentation

multi touch authentication using hand geometry and
SMART_READER_LITE
LIVE PREVIEW

Multi-touch Authentication Using Hand Geometry and Aokun Chen - - PowerPoint PPT Presentation

Multi-touch Authentication Using Hand Geometry and Aokun Chen Behavioral Information Related Work Gait Recognition Keystroke/Mouse dynamics Gesture based authentication Threat Model and Assumption The adversary may or may not


slide-1
SLIDE 1

Multi-touch Authentication Using Hand Geometry and Behavioral Information

Aokun Chen

slide-2
SLIDE 2

Related Work

  • Gait Recognition
  • Keystroke/Mouse dynamics
  • Gesture based authentication
slide-3
SLIDE 3

Threat Model and Assumption

  • The adversary may or may not observe the unlock

gesture:

  • Zero-effort Attack
  • Smudge Attack
  • Shoulder Surfing Attack
  • Statistical Attack
  • The adversary does not have the capability to

produce an apparatus with the exact same hand geometry while also being able to observe and replicate the behavior characteristics

slide-4
SLIDE 4

Methodology

  • TFST gestures:
  • “Touching with Fingers Straight and Together”
slide-5
SLIDE 5

Methodology

  • TFST Gesture features:
  • Multi-touch Traces
  • Physiological Features
  • 12 distances
  • Behavioral Features
  • Length, time, velocity, tool,

touch, pressure, angle

  • 52 for 4 fingers, 39 for 3 fingers

26 for 2 fingers

slide-6
SLIDE 6

Data Collection

  • Android application on a smartphone
  • 161 subjects:
  • 131 sophomores
  • 18 master and PhD students
  • 12 faculty members or staffs
  • 2 months, 7-session data collection
  • 144 hand image data
slide-7
SLIDE 7

Feature Analysis

  • Discernibility of Physiological Features in TFST

Gestures

slide-8
SLIDE 8

Feature Analysis

  • Feature Selection
  • Fisher Score:

Fisher(k) = ሚ 𝑇𝑐

𝑙

ሚ 𝑇𝑢

𝑙

𝑇𝑐 = Σ𝑙=1

𝑑

𝑄𝑙(෤ 𝜈𝑙 − Ƽ 𝜈)(෤ 𝜈𝑙 − Ƽ 𝜈)𝑈 𝑇𝑢 = Σ𝑙=1

𝑑

𝑄𝑙Σ𝑦𝑗

𝑙∈𝑑𝑙

1 𝑜𝑙 (𝑦𝑗

𝑙 − ෤

𝜈𝑙)(𝑦𝑗

𝑙 − ෤

𝜈𝑙)𝑈

slide-9
SLIDE 9

Feature Analysis

  • Feature Selection
slide-10
SLIDE 10

One-Class Classifiers

  • K-Nearest Neighbor
  • Support Vector Machine
slide-11
SLIDE 11

Evaluation

  • Training:
  • 1 vs 160
  • 10% cross-validation
  • Random sample
  • Evaluation metrics:
  • FAR, FRR, EER and ROC curve
  • McNemar's test
slide-12
SLIDE 12

Evaluation

  • Effectiveness of TFST Gestures
slide-13
SLIDE 13

Evaluation

  • Effectiveness of different classifier
slide-14
SLIDE 14

Evaluation

  • Effectiveness of training size
slide-15
SLIDE 15

Evaluation

  • Behavior variability
slide-16
SLIDE 16

Evaluation

  • Security Analysis: Zero-effort Attack
  • 1 vs 160
  • Similarity metric:
slide-17
SLIDE 17

Evaluation

  • Security Analysis: Smudge and Shoulder Surfing

Attack

  • Evaluation setup:
  • Another 20 students each attacks 10 victims
  • 5 victims with similar handshape, 5 victim with different

handshape

  • Mimic 4-figer TFST
slide-18
SLIDE 18

Evaluation

  • Security Analysis: Smudge Attack
slide-19
SLIDE 19

Evaluation

  • Security Analysis: Shoulder Surfing Attack
slide-20
SLIDE 20

Evaluation

  • Security Analysis: Statistical attack
slide-21
SLIDE 21

Evaluation

  • Security Analysis: Statistical attack
slide-22
SLIDE 22

Evaluation

  • Usability Study
slide-23
SLIDE 23

Questions ?