Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2556288.2557346acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

An implicit author verification system for text messages based on gesture typing biometrics

Published: 26 April 2014 Publication History

Abstract

Gesture typing is a popular text input method used on smartphones. Gesture keyboards are based on word gestures that subsequently trace all letters of a word on a virtual keyboard. Instead of tapping a word key by key, the user enters a word gesture with a single continuous stroke. In this paper, we introduce an implicit user verification approach for short text messages that are entered with a gesture keyboard. We utilize the way people interact with gesture keyboards to extract behavioral biometric features. We propose a proof-of-concept classification framework that learns the gesture typing behavior of a person and is able to decide whether a gestured message was written by the legitimate user or an imposter. Data collected from gesture keyboard users in a user study is used to assess the performance of the classification framework, demonstrating that the technique has considerable promise.

References

[1]
Shapewriter. http://www.shapewriter.com/, Sept. 2013.
[2]
Swype. http://www.swype.com/, Sept. 2013.
[3]
Asher, N. B., Kirschnick, N., Sieger, H., Meyer, J., Oved, A. B., and Möller, S. On the need for different security methods on mobile phones. In Proc. MobileHCI '11, ACM Press (2011), 465--473.
[4]
Aviv, A. J., Gibson, K., Mossop, E., Blaze, M., and Smith, J. M. Smudge attacks on smartphone touch screens. In Proc. WOOT '10, USENIX Association (2010), 1--7.
[5]
Chang, C.-C., and Lin, C.-J. LIBSVM. ACM Trans. Intell. Syst. Technol. 2, 3 (2011), 1--27.
[6]
De Luca, A., Hang, A., Brudy, F., Lindner, C., and Hussmann, H. Touch me once and I know it's you!: implicit authentication based on touch screen patterns. In Proc. CHI '12, ACM Press (2012), 987--996.
[7]
Frank, M., Biedert, R., Ma, E., Martinovic, I., and Song, D. Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE Trans. Inf. Forensics Security 8, 1 (2013), 136--148.
[8]
Kristensson, P.-O., and Zhai, S. SHARK 2. In Proc. UIST '04, ACM Press (2004), 43.
[9]
Lashkari, A. H., Farmand, S., Zakaria, D. O. B., Saleh, D. R., Bin Zakaria, O., and Saleh, R. Shoulder surfing attack in graphical password authentication. Journal of Computer Science 6, 2 (2009), 10.
[10]
Ling, R., and Baron, N. S. Text messaging and IM: Linguistic comparison of american college data. J. Lang. Soc. Psychol. 26, 3 (2007), 291--298.
[11]
Mardia, K. V. Directional statistics. J. Wiley, Chichester New York, 2000.
[12]
Monrose, F., and Rubin, A. Authentication via keystroke dynamics. In Proc. CCS '97, ACM Press (1997), 48--56.
[13]
Sae-Bae, N., Ahmed, K., Isbister, K., and Memon, N. Biometric-rich gestures: a novel approach to authentication on multi-touch devices. In Proc. CHI '12, ACM Press (2012), 977--986.
[14]
Saevanee, H., and Bhatarakosol, P. User authentication using combination of behavioral biometrics over the touchpad acting like touch screen of mobile device. In Proc. ICCEE 2008, IEEE (Dec. 2008), 82--86.
[15]
Wu, T.-F., Lin, C.-J., and Weng, R. C. Probability estimates for multi-class classification by pairwise coupling. J. Mach. Learn. Res. 5 (2004), 975--1005.
[16]
Zhai, S., and Kristensson, P. O. The word-gesture keyboard: Reimagining keyboard interaction. Commun. ACM 55, 9 (2012), 91--101.

Cited By

View all
  • (2023)Human-centered Behavioral and Physiological SecurityProceedings of the 2023 New Security Paradigms Workshop10.1145/3633500.3633504(48-61)Online publication date: 18-Sep-2023
  • (2023)Seeing the Wind: An Interactive Mist Interface for Airflow InputProceedings of the ACM on Human-Computer Interaction10.1145/36264807:ISS(398-419)Online publication date: 1-Nov-2023
  • (2023)High expectations on phase locking: Better quantifying the concentration of circular dataChaos: An Interdisciplinary Journal of Nonlinear Science10.1063/5.016646833:9Online publication date: 27-Sep-2023
  • Show More Cited By

Index Terms

  1. An implicit author verification system for text messages based on gesture typing biometrics

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CHI '14: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
    April 2014
    4206 pages
    ISBN:9781450324731
    DOI:10.1145/2556288
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 26 April 2014

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. behavioral biometrics
    2. gesture keyboards
    3. implicit authentication
    4. mobile phone security

    Qualifiers

    • Research-article

    Conference

    CHI '14
    Sponsor:
    CHI '14: CHI Conference on Human Factors in Computing Systems
    April 26 - May 1, 2014
    Ontario, Toronto, Canada

    Acceptance Rates

    CHI '14 Paper Acceptance Rate 465 of 2,043 submissions, 23%;
    Overall Acceptance Rate 6,199 of 26,314 submissions, 24%

    Upcoming Conference

    CHI 2025
    ACM CHI Conference on Human Factors in Computing Systems
    April 26 - May 1, 2025
    Yokohama , Japan

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)15
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 15 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)Human-centered Behavioral and Physiological SecurityProceedings of the 2023 New Security Paradigms Workshop10.1145/3633500.3633504(48-61)Online publication date: 18-Sep-2023
    • (2023)Seeing the Wind: An Interactive Mist Interface for Airflow InputProceedings of the ACM on Human-Computer Interaction10.1145/36264807:ISS(398-419)Online publication date: 1-Nov-2023
    • (2023)High expectations on phase locking: Better quantifying the concentration of circular dataChaos: An Interdisciplinary Journal of Nonlinear Science10.1063/5.016646833:9Online publication date: 27-Sep-2023
    • (2023)Biometrics for Continuous AuthenticationContinuous Biometric Authentication Systems10.1007/978-3-031-49071-2_4(73-104)Online publication date: 29-Oct-2023
    • (2022)Investigating the Tradeoffs of Everyday Text-Entry Collection MethodsProceedings of the 2022 CHI Conference on Human Factors in Computing Systems10.1145/3491102.3501908(1-15)Online publication date: 29-Apr-2022
    • (2020)Dense Deep Neural Network Architecture for Keystroke Dynamics Authentication in Mobile PhoneAdvances in Science, Technology and Engineering Systems Journal10.25046/aj0506375:6(307-314)Online publication date: 2020
    • (2020)Mimicry Attacks on Smartphone Keystroke AuthenticationACM Transactions on Privacy and Security10.1145/337242023:1(1-34)Online publication date: 5-Feb-2020
    • (2020)A Comprehensive Survey on various Security Authentication Schemes for Mobile Touch Screen2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)10.1109/CSNT48778.2020.9115731(248-253)Online publication date: Apr-2020
    • (2020)Exploring the Hand and Finger-Issued Behaviors Toward Natural AuthenticationIEEE Access10.1109/ACCESS.2020.29818288(55815-55825)Online publication date: 2020
    • (2020)FingerAuth: 3D magnetic finger motion pattern based implicit authentication for mobile devicesFuture Generation Computer Systems10.1016/j.future.2018.02.006108(1324-1337)Online publication date: Jul-2020
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media