Comparison of PIN- and pattern-based behavioral biometric authentication on mobile devices. Li, Y., Yang, J., Xie, M., Carlson, D., Jang, H., G., & Bian, J. In Proceedings of the Military Communications Conference (MILCOM), pages 1317-1322, 10, 2015.
Comparison of PIN- and pattern-based behavioral biometric authentication on mobile devices [link]Website  abstract   bibtex   
Personal identification numbers (PIN) and unlock patterns are highly popular authentication mechanisms on smart mobile devices but they are not sufficiently secure. PIN or pattern mechanisms enhanced by additional, implicit behavioral biometric authentication can offer stronger authentication assurance while preserving usability, therefore becoming very attractive. Individual studies on PIN- and pattern-based behavioral biometric authentication on smartphones were conducted but their results cannot be directly compared. In this work, we present a comparison study on the authentication accuracy between PIN-based and pattern-based behavioral biometric authentication using both smartphone and tablet. We developed a uniform framework for both PIN-based and pattern-based schemes and used two representative methods-Histogram and DTW-for user verification. We recruited 15 users and collected behavioral biometric data for both simple and complex PINs and patterns. Our experimental results show that PIN-based and pattern-based behavioral biometric authentication schemes can achieve about the same level of accuracy but not all verification methods are equal. The Histogram method can achieve more consistent results and handle template aging better than the DTW method based on our results. Our findings are expected to shed light on the exploration and analysis of effective behavioral biometric verification methods and facilitate more comprehensive investigation on behavioral biometric authentication for mobile devices.
@inProceedings{
 title = {Comparison of PIN- and pattern-based behavioral biometric authentication on mobile devices},
 type = {inProceedings},
 year = {2015},
 identifiers = {[object Object]},
 keywords = {access-control,authentication,behavioral,behavioral-biometric,biometrics,dtw,password,pin,smartphone},
 pages = {1317-1322},
 websites = {http://dx.doi.org/10.1109/MILCOM.2015.7357627},
 month = {10},
 id = {838905cb-36ab-311b-a2eb-d5d3a6f4cc66},
 created = {2018-07-12T21:31:03.651Z},
 file_attached = {false},
 profile_id = {f954d000-ce94-3da6-bd26-b983145a920f},
 group_id = {b0b145a3-980e-3ad7-a16f-c93918c606ed},
 last_modified = {2018-07-12T21:31:03.651Z},
 read = {false},
 starred = {false},
 authored = {false},
 confirmed = {true},
 hidden = {false},
 citation_key = {li:comparison15},
 source_type = {inproceedings},
 private_publication = {false},
 abstract = {Personal identification numbers (PIN) and unlock patterns are highly popular authentication mechanisms on smart mobile devices but they are not sufficiently secure. PIN or pattern mechanisms enhanced by additional, implicit behavioral biometric authentication can offer stronger authentication assurance while preserving usability, therefore becoming very attractive. Individual studies on PIN- and pattern-based behavioral biometric authentication on smartphones were conducted but their results cannot be directly compared. In this work, we present a comparison study on the authentication accuracy between PIN-based and pattern-based behavioral biometric authentication using both smartphone and tablet. We developed a uniform framework for both PIN-based and pattern-based schemes and used two representative methods-Histogram and DTW-for user verification. We recruited 15 users and collected behavioral biometric data for both simple and complex PINs and patterns. Our experimental results show that PIN-based and pattern-based behavioral biometric authentication schemes can achieve about the same level of accuracy but not all verification methods are equal. The Histogram method can achieve more consistent results and handle template aging better than the DTW method based on our results. Our findings are expected to shed light on the exploration and analysis of effective behavioral biometric verification methods and facilitate more comprehensive investigation on behavioral biometric authentication for mobile devices.},
 bibtype = {inProceedings},
 author = {Li, Yanyan and Yang, Junshuang and Xie, Mengjun and Carlson, D and Jang, H G and Bian, Jiang},
 booktitle = {Proceedings of the Military Communications Conference (MILCOM)}
}

Downloads: 0