4.6 Article

Draw-a-Deep Pattern: Drawing Pattern-Based Smartphone User Authentication Based on Temporal Convolutional Neural Network

Journal

APPLIED SCIENCES-BASEL
Volume 12, Issue 15, Pages -

Publisher

MDPI
DOI: 10.3390/app12157590

Keywords

mobile user authentication; behavioral biometrics; temporal convolution neural network; recurrent neural network; sequence modeling

Funding

  1. National Research Foundation of Korea (NRF) - Korea government (MSIT) [NRF-2022R1A2C2005455]
  2. Institute of Information & communications Technology Planning & Evaluation (IITP) - Korea government (MSIT) [2021-0-00471]

Ask authors/readers for more resources

This study proposes a deep learning-based smartphone user authentication method using sequential data obtained from drawing patterns on the touchscreen. The proposed model, called DDP, is robust to common threats and requires fewer parameters for training. The TCN-based model achieves excellent authentication performance and higher computational efficiency compared to the RNN-based model.
Present-day smartphones provide various conveniences, owing to high-end hardware specifications and advanced network technology. Consequently, people rely heavily on smartphones for a myriad of daily-life tasks, such as work scheduling, financial transactions, and social networking, which require a strong and robust user authentication mechanism to protect personal data and privacy. In this study, we propose draw-a-deep-pattern (DDP)-a deep learning-based end-to-end smartphone user authentication method using sequential data obtained from drawing a character or freestyle pattern on the smartphone touchscreen. In our model, a recurrent neural network (RNN) and a temporal convolution neural network (TCN), both of which are specialized in sequential data processing, are employed. The main advantages of the proposed DDP are (1) it is robust to the threats to which current authentication systems are vulnerable, e.g., shoulder surfing attack and smudge attack, and (2) it requires few parameters for training; therefore, the model can be consistently updated in real-time, whenever new training data are available. To verify the performance of the DDP model, we collected data from 40 participants in one of the most unfavorable environments possible, wherein all potential intruders know how the authorized users draw the characters or symbols (shape, direction, stroke, etc.) of the drawing pattern used for authentication. Of the two proposed DDP models, the TCN-based model yielded excellent authentication performance with average values of 0.99%, 1.41%, and 1.23% in terms of AUROC, FAR, and FRR, respectively. Furthermore, this model exhibited improved authentication performance and higher computational efficiency than the RNN-based model in most cases. To contribute to the research/industrial communities, we made our dataset publicly available, thereby allowing anyone studying or developing a behavioral biometric-based user authentication system to use our data without any restrictions.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available