Touch-based Continuous Mobile Device Authentication Using One-vs-One Classification Approach

被引:0
|
作者
Kudo, Masashi [1 ]
Takahashi, Tsubasa [2 ]
Yamana, Hayato [1 ]
机构
[1] Waseda Univ, Tokyo, Japan
[2] LY Corp, Tokyo, Japan
关键词
Touch-based authentication; Smartphone; Binary classification; Dynamic classifier selection; OvO; OvR;
D O I
10.1109/BigComp60711.2024.00034
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In recent years, there has been a significant increase in the number of users handling personal information on their smartphones. Although smartphones offer standard login authentication to safeguard the information, there are inherent risks ofmalicious users hacking these authentication mechanisms. Given this context, touch-based authentication using touch gestures has gained attention as a post-login authentication method. Typically, touch- based authentication research identifies the device owner as the legitimate user and all others as illegitimate users, employing the One-vs-Rest (OvR) classification approach. However, due to the variability in user touch patterns, training classifiers using data from multiple usersfor the rest class can be challenging. To address this issue, we propose a new classification method that adopts the One-vs-One (OvO) classification approach to improve accuracy. In the OvO approach, each classifier is trained using data from one legitimate user and one illegitimate user, with subsequent user identification performed through ensembling a set of OvO classifiers' output. We conducted an experimental evaluation to compare the performance of the OvR and the OvO approaches across six scenarios and five classification models. Our results showed that the proposed OvO approach outperformed the OvR approach in terms of average equal error rate (EER) among 120 combinations of scenarios and models. The best-performing OvO approach, combined with dynamic classifier selection, achieved the lowest EER of1.42%, proving its high classification performance.
引用
收藏
页码:167 / 174
页数:8
相关论文
共 50 条
  • [1] A framework of dynamic selection method for user classification in touch-based continuous mobile device authentication
    Zaidi, Ahmad Zairi
    Chong, Chun Yong
    Parthiban, Rajendran
    Sadiq, Ali Safaa
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 67
  • [2] An omnidirectional approach to touch-based continuous authentication
    Aaby, Peter
    Giuffrida, Mario Valerio
    Buchanan, William J.
    Tan, Zhiyuan
    [J]. COMPUTERS & SECURITY, 2023, 128
  • [3] Touch-based continuous mobile device authentication: State-of-the-art, challenges and opportunities
    Zaidi, Ahmad Zairi
    Chong, Chun Yong
    Jin, Zhe
    Parthiban, Rajendran
    Sadiq, Ali Safaa
    [J]. Journal of Network and Computer Applications, 2021, 191
  • [4] Touch-based continuous mobile device authentication: State-of-the-art, challenges and opportunities
    Zaidi, Ahmad Zairi
    Chong, Chun Yong
    Jin, Zhe
    Parthiban, Rajendran
    Sadiq, Ali Safaa
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2021, 191
  • [5] Techniques for Continuous Touch-Based Authentication
    Georgiev, Martin
    Eberz, Simon
    Martinovic, Ivan
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2022, 2022, 13620 : 409 - 431
  • [6] One-vs-One classification for deep neural networks
    Pawara, Pornntiwa
    Okafor, Emmanuel
    Groefsema, Marc
    He, Sheng
    Schomaker, Lambert R. B.
    Wiering, Marco A.
    [J]. PATTERN RECOGNITION, 2020, 108
  • [7] Towards Continuous User Authentication Using Personalised Touch-Based Behaviour
    Aaby, Peter
    Giuffrida, Mario Valerio
    Buchanan, William J.
    Tan, Zhiyuan
    [J]. 2020 IEEE INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, INTL CONF ON CLOUD AND BIG DATA COMPUTING, INTL CONF ON CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/CBDCOM/CYBERSCITECH), 2020, : 41 - 48
  • [8] At Your Fingertips: Considering Finger Distinctness in Continuous Touch-Based Authentication for Mobile Devices
    Ali, Zaire
    Payton, Jamie
    Sritapan, Vincent
    [J]. 2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2016), 2016, : 272 - 275
  • [9] Addressing the Overlapping Data Problem in Classification Using the One-vs-One Decomposition Strategy
    Saez, Jose A.
    Galar, Mikel
    Krawczyk, Bartosz
    [J]. IEEE ACCESS, 2019, 7 : 83396 - 83411
  • [10] Forgery-Resistant Touch-based Authentication on Mobile Devices
    Gong, Neil Zhenqiang
    Payer, Mathias
    Moazzezi, Reza
    Frank, Mario
    [J]. ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 499 - 510