Implicit Continuous User Authentication for Mobile Devices based on Deep Reinforcement Learning

被引:2
|
作者
Jose, Christy James [1 ]
Rajasree, M. S. [2 ]
机构
[1] Govt Engn Coll, Idukki 685603, India
[2] APJ Abdul Kalam Technol Univ, Thiruvananthapuram 695016, Kerala, India
来源
关键词
Deep reinforcement learning; gaussian weighted; non-local; mean filter; cauchy kriging regression; continuous czekanowski's; implicit continuous authentication; mobile devices; SECURITY; SENSOR;
D O I
10.32604/csse.2023.025672
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The predominant method for smart phone accessing is confined to methods directing the authentication by means of Point-of-Entry that heavily depend on physiological biometrics like, fingerprint or face. Implicit continuous authentication initiating to be loftier to conventional authentication mechanisms by continuously confirming users' identities on continuing basis and mark the instant at which an illegitimate hacker grasps dominance of the session. However, divergent issues remain unaddressed. This research aims to investigate the power of Deep Reinforcement Learning technique to implicit continuous authentication for mobile devices using a method called, Gaussian Weighted Cauchy Krigingbased Continuous Czekanowski's (GWCK-CC). First, a Gaussian Weighted Non-local Mean Filter Preprocessing model is applied for reducing the noise present in the raw input face images. Cauchy Kriging Regression function is employed to reduce the dimensionality. Finally, Continuous Czekanowski's Classification is utilized for proficient classification between the genuine user and attacker. By this way, the proposed GWCK-CC method achieves accurate authentication with minimum error rate and time. Experimental assessment of the proposed GWCK-CC method and existing methods are carried out with different factors by using UMDAA-02 Face Dataset. The results confirm that the proposed GWCK-CC method enhances authentication accuracy, by 9%, reduces the authentication time, and error rate by 44%, and 43% as compared to the existing methods.
引用
收藏
页码:1357 / 1372
页数:16
相关论文
共 50 条
  • [1] Continuous User Authentication on Mobile Devices
    Patel, Vishal M.
    Chellappa, Rama
    Chandra, Deepak
    Barbello, Brandon
    [J]. IEEE SIGNAL PROCESSING MAGAZINE, 2016, 33 (04) : 49 - 61
  • [2] Attribute-based Continuous User Authentication on Mobile Devices
    Samangouei, Pouya
    Patel, Vishal M.
    Chellappa, Rama
    [J]. 2015 IEEE 7TH INTERNATIONAL CONFERENCE ON BIOMETRICS THEORY, APPLICATIONS AND SYSTEMS (BTAS 2015), 2015,
  • [3] Reconciling user privacy and implicit authentication for mobile devices
    Shahandashti, Siamak F.
    Safavi-Naini, Reihaneh
    Safa, Nashad Ahmed
    [J]. COMPUTERS & SECURITY, 2015, 53 : 215 - 233
  • [4] Implicit User Re-authentication for Mobile Devices
    Yazji, Sausan
    Chen, Xi
    Dick, Robert P.
    Scheuermann, Peter
    [J]. UBIQUITOUS INTELLIGENCE AND COMPUTING, PROCEEDINGS, 2009, 5585 : 325 - +
  • [5] A Continuous User Authentication Scheme for Mobile Devices
    Smith-Creasey, Max
    Rajarajan, Muttukrishnan
    [J]. 2016 14TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2016,
  • [6] Gait-Based Implicit Authentication Using Edge Computing and Deep Learning for Mobile Devices
    Zeng, Xin
    Zhang, Xiaomei
    Yang, Shuqun
    Shi, Zhicai
    Chi, Chihung
    [J]. SENSORS, 2021, 21 (13)
  • [7] LEARNING ON A BUDGET FOR USER AUTHENTICATION ON MOBILE DEVICES
    Kolosnjaji, Bojan
    Huefner, Antonia
    Eckert, Claudia
    Zarras, Apostolis
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2018, : 2042 - 2046
  • [8] Survey on NonObstructive and Continuous User Authentication on Mobile Devices
    Lalithamani, N.
    Balaji, Raam
    Dev, S. V. P. K. H. Satya
    [J]. 2017 4TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2017,
  • [9] Behavioral biometrics & continuous user authentication on mobile devices: A survey
    Stylios, Ioannis
    Kokolakis, Spyros
    Thanou, Olga
    Chatzis, Sotirios
    [J]. INFORMATION FUSION, 2021, 66 : 76 - 99
  • [10] Towards Implicit Enhancement of Security and User Authentication in Mobile Devices Based on Movement and Audio Analysis
    Ketabdar, Hamed
    Roshandel, Mehran
    Skripko, Daria
    [J]. PROCEEDINGS OF THE FOURTH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER-HUMAN INTERACTIONS (ACHI 2011), 2011, : 188 - 191