Vous êtes sur la page 1sur 4

Behavioral Biometrics

Members:
Muskan Gupta (18BCI0237)
Ruchita Damodar (18BCE0916)
Rishita Konda (18BCE0925)
Akhil Saxena (18BCE0969)

Abstract:
Generally, the authentication methods are based on passwords or PINs, which are not suited towards the
kind of interaction a user has with more and more portable devices. (Frequent unlocking and short use
time.)
With the advancements of technology, we have turned towards usage of biometric security. Biometric
security (“Something you are”) is considered to be a reliable solution which is much preferred over a
password (“Something you know”) or a token (“Something you have”).
Biometric characteristics, being inherently individual are difficult to mimic or change.
The problem arises as these authentication methods are based on point-of-entry, where they check a user
once before he starts a session, and keep you logged in until a user exits that session. This leads to several
vulnerabilities to the system, where a person may target a post login session.
Behavioral Biometrics proposes a system of continuous authentication which is also non-intrusive in the
workflow of the user.
The weakness of behavioral biometrics at the current stage is due too its competition with physiological
biometrics. Since physiological biometrics provide great accuracy and have become quite fast, they have
become a much-trusted way of authentication. Though some methods of behavioral biometrics have a
high accuracy, generally they tread towards lower rate of accuracy. This is because, unlike a physiological
biometric, such as a fingerprint, or irises which stay the same your behavior may change based on various
factors or conditions. (i.e. A user may have different behavioral traits based on different moods, health
conditions, environmental conditions, etc.)
Keeping aside the fact that the accuracy is lower compared to other methods of authentication, it has
plenty of advantages such as the aforementioned continuous and non-intrusive authentication, discrete
working, no requirement of additional hardware.
Some of the methods that are popularly used are: voice recognition, keystroke dynamics behavior
profiling, handwriting recognition & linguistic profiling.
Some of the uni-modal behavioral biometrics methods are:
1. Behavioral profiling: It is a network based approach and takes into account the user’s location
based data and his usage of network, such as duration of call, dialed number, and time of call. It
may also monitor a person’s texting.
2. Keystroke Dynamics: It is based on each person’s individual typing style. It is not entirely unique
but has a sufficient amount of discrimination to be used for identification purpose. Main
characteristics that are used are: inter-key latency and hold time.
3. Handwriting Recognition: It is generally used for signature identification, and takes use of image
processing to identify the characteristics of a person’s writing style.
4. Iris Recognition: It uses mathematical pattern-recognition techniques on video images of the
irises of an individual's eyes, whose complex patterns are unique, stable, and can be seen from
some distance.
5. Voice Recognition: This system uses an individual’s voice for determining identity based on the
different characteristic voice features.
To overcome the weakness of behavioral biometrics, that is to increase the accuracy of these
authentication methods, instead of using a single method (uni-modal), we use a combination of two or
more methods (multi-modal).
We look at a few of the multi- modal methods
a) Signature while holding the device:

What it is?
This authentication method is to be used for portable devices such as mobile phones. This system
takes into account the micro-movements of the device and the movement of the finger of the user
as he is writing on the screen. This method does not take into account the final image of the
signature, rather it takes into account only the movements and the pattern of the finger movement.
Implementation:
This technique has been implemented on several commercially available devices as it does not
require usage of any additional hardware to work. Multiple sensors are used in tandem to record
the data. The sensors start working when the user first touches the screen and do not stop until he
removes his finger signaling end of the input.

Disadvantages:
Intra class variability: Variations in signatures of the same user.
Inter class similarity: Similarity between signature of different users.
Longer time than physiological biometric (approx. 3 sec)
Two handed use

Advantages:
Average power consumption is low.
Signature based authentication is already used in other modes.
Signature is easier to remember compared to a passcode.

b) Fusion of Iris and Mouse Movement:


What it is?
This is an authentication method which is to be used for desktops or laptops. Since each of these
methods individually have many disadvantages, we use a fusion of these to reduce the error rate.
Implementation
The systems which already use iris scanning can be easy modified using software to
create a multi modal approach for iris with mouse tracking.

Advantages:
Reduces identification time.
Applies dissimilarity space using dynamic time warping for extraction of features from eye and
mouse dynamics.
Can be done in a single instance which is short and convenient for the user.

Disadvantages
The error rate could be 5% to 10%
Many factors which could decrease accuracy of recognition especially for iris.

c) Iris and Face Recognition:

What is it?
This authentication method is employed as a combination of facial recognition and Iris
recognition. Besides improving the verification performance, the fusion of both of the biometrics
has several other advantages such as enlarging user population coverage and reducing enrollment
failure.

Implementation:
We use two different strategies for fusing iris and face classifiers. The first strategy is to compute
either an unweighted or weighted sum of the two matching distances and compare the distances
to a threshold. The second strategy is to treat the matching distances of face and iris classifiers as
a two-dimensional feature vector and use a classifier such as the Fisher's discriminant analysis or
a neural network with radial basis function (RBFNN) to classify the vector as being genuine or an
impostor. We compare the results of the combined classifier with the results of the individual face
and iris classifiers.

Advantages:
An operational iris verification system would reject poor quality images . Our system
demonstrates that fusion is a way to decrease the enrollment failure rate. At the
same time, a larger number of subjects that were misclassified by the stand-alone face verification
system, which can be classified easily with the combined system.

Disadvantages:
It requires IR light source and sensor.
Visible light must be minimized for highest accuracy required for search.
Troubles with images size and quality
References:

1. Clarke, N., Furnell, S.M.: Advanced user authentication for mobile devices. Computer and
Security 26, 109–119, 2007

2. L. O’Gorman, "Comparing passwords, tokens, and biometrics for user authentication",


Proceedings of the IEEE, Vol. 91, No. 12, , pp. 2019-40, Dec. 2003

3. S. Prabhakar, S. Pankanti, and A. K. Jain, "Biometric Recognition: Security & Privacy


Concerns", IEEE Security and Privacy Magazine, Vol. 1, No. 2, pp. 33-42, March-April
2003.

4. Saevanee, H., Clarke, N., Furnell, S.M.: Multi-modal Behavioural Biometric Authentication
for Mobile Devices. Advances in Information and Communication Technology, vol 376.
Springer, Berlin, Heidelberg, 2012

5. A. Buriro, B. Crispo, F. Delfrari and K. Wrona, "Hold and Sign: A Novel Behavioral
Biometrics for Smartphone User Authentication," 2016 IEEE Security and Privacy
Workshops (SPW), San Jose, CA, pp. 276-285, 2016

6. Antal, Margit & Szabo, Laszlo & László, Izabella. Keystroke Dynamics on Android
Platform., 2014

7. Michael Fairhurst, Cheng Li, Márjory Da Costa-Abreu, "Predictive biometrics: a review and
analysis of predicting personal characteristics from biometric data", Biometrics IET, vol. 6,
no. 6, pp. 369-378, 2017.

8. S. Bhatt and T. Santhanam, "Keystroke dynamics for biometric authentication — A survey,"


2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering,
Salem, pp. 17-23, 2013

9. Yunhong Wang, Tieniu Tan, Anil K. Jain, “Combining Face and Iris Biometrics for Identity
Verification”, Lecture Notes in Computer Science, vol. 2688, 2003

10. Pawel Kasprowski, Katarzyna Harezlak, “Fusion of eye movement and mouse dynamics for
reliable behavioral biometrics”, Pattern Analysis & Applications, vol. 21, pp. 91-103, 2018

11. Israa Alsaadi, “Physiological Biometric Authentication Systems, Advantages, Disadvantages


And Future Development: A Review”, International Journal of Scientific & Technology
Research, vol. 4, pp 285-289, 2015

Vous aimerez peut-être aussi