Long-term influence of user identification based on touch ...www.researchgate.net › publication › fulltext › Long-ter

4 downloads 0 Views 675KB Size Report
Long-term influence of user identification based on touch ... › publication › fulltext › Long-ter... › publication › fulltext › Long-ter...by Y Watanabe · ‎2017 · ‎Cited by 3 · ‎Related articlesreached about 95% for basic operation and text browsing. ...
ScienceDirect ScienceDirect

Procedia Computer 00 (2017) 000–000 Available online atScience www.sciencedirect.com Procedia Computer Science 00 (2017) 000–000

ScienceDirect

www.elsevier.com/locate/procedia www.elsevier.com/locate/procedia

Procedia Computer Science 112 (2017) 2529–2536

International Conference on Knowledge Based and Intelligent Information and Engineering International Conference on Knowledge Based and2017, Intelligent Information Systems, KES2017, 6-8 September Marseille, France and Engineering Systems, KES2017, 6-8 September 2017, Marseille, France

Long-term influence of user identification based on touch operation Long-term influence of user identification based on touch operation on smart phone on smart phone Yuji Watanabe* and Liu Kun Yuji Watanabe* and Liu Kun

Nagoya City University, 1 Yamanohata, Mizuho-cho, Mizuho-ku, Nagoya 467-8501, Japan Nagoya City University, 1 Yamanohata, Mizuho-cho, Mizuho-ku, Nagoya 467-8501, Japan

Abstract Abstract In our previous study, we collected a touch operations history when 40 subjects performed basic operation, text browsing, and In our previoususing study, collected a touch operations historyhistory, when 40 basic operation, text browsing, and web browsing ourwe Android application. From the touch wesubjects extractedperformed 8 or 16 features for 6 gestures of swipe and web browsing our Android the touch history, we extracted 8 or 16showed featuresthat for 6user gestures of swiperate and pinch, and thenusing identified subjectsapplication. using someFrom machine learning algorithms. The results identification pinch, and then identified subjects using some machine learning algorithms. The results showed that user identification rate reached about 95% for basic operation and text browsing. However, we used only one day touch history for each subject, so that about 95% forwhen basiceach operation and text browsing. However, we used oneforday touchperiod historyhas forbeen eachunclear. subject, In so this that areached long-term influence subject performs the touch operations manyonly times a long a long-term influence when each subject performs touch for operations many times a longapplication period hastobeen unclear. this study, we record 10 touch operations histories of 11the subjects a half year using the for Android examine the In longstudy,changes we record 10 touch operations histories of 11 show subjects year using the Android to examine the from longterm of user identification rate. The results thatforthea half correctly classified rates forapplication pinch gestures and swipe term changes of usersimple identification rate. The that for the acorrectly classified ratesaccuracy for pinchforgestures swipe down to up during text browsing are results almostshow constant long term while the swipe and gesture in from web down to drops up during simple browsing almost constant for a long term while the accuracy for swipe gesture in web browsing by about 10%text as the numberare of experiments increases. browsing drops by about 10% as the number of experiments increases. © 2017 The Authors. Published by Elsevier B.V. © 2017 The Authors. Published by Elsevier B.V. © 2017 The Authors. Published by KES Elsevier B.V. Peer-review Peer-review under under responsibility responsibility of of KES International. International Peer-review under responsibility of KES International. Keywords: Biometrics; Smart phone; Touch-based user identification; Long-term influence; Security Keywords: Biometrics; Smart phone; Touch-based user identification; Long-term influence; Security

1. Introduction 1. Introduction For mobile devices of smart phone, tablets, and wearable computers, user authentications using PIN (personal For mobilenumber), devices of smart phone, wearable computers, authentications using PIN (personal identification password, patterntablets, key, orand physical biometrics suchuser as fingerprint are generally launched to identification pattern key, as fingerprint are generally launched to protect a lot ofnumber), importantpassword, private information in or thephysical devices.biometrics However, such they are explicitly carried out only on entryprotect a lot of important private information in the devices. However, they are explicitly carried out only on entry-

* Corresponding author. Tel.: +81-52-872-5037; fax: +81-52-872-5037. *E-mail Corresponding Tel.: +81-52-872-5037; fax: +81-52-872-5037. address:author. [email protected] E-mail address: [email protected] 1877-0509 © 2017 The Authors. Published by Elsevier B.V. Peer-review under KES International. 1877-0509 © 2017responsibility The Authors.ofPublished by Elsevier B.V. Peer-review under responsibility of KES International.

1877-0509 © 2017 The Authors. Published by Elsevier B.V. Peer-review under responsibility of KES International 10.1016/j.procs.2017.08.196

2530 2

Yuji Watanabe et al. / Procedia Computer Science 112 (2017) 2529–2536 Author name / Procedia Computer Science 00 (2017) 000–000

point. Because the explicit authentication forces user to input a specific action, for example, t