4.6 Article

Draw-a-Deep Pattern: Drawing Pattern-Based Smartphone User Authentication Based on Temporal Convolutional Neural Network

期刊

APPLIED SCIENCES-BASEL
卷 12, 期 15, 页码 -

出版社

MDPI
DOI: 10.3390/app12157590

关键词

mobile user authentication; behavioral biometrics; temporal convolution neural network; recurrent neural network; sequence modeling

资金

  1. National Research Foundation of Korea (NRF) - Korea government (MSIT) [NRF-2022R1A2C2005455]
  2. Institute of Information & communications Technology Planning & Evaluation (IITP) - Korea government (MSIT) [2021-0-00471]

向作者/读者索取更多资源

This study proposes a deep learning-based smartphone user authentication method using sequential data obtained from drawing patterns on the touchscreen. The proposed model, called DDP, is robust to common threats and requires fewer parameters for training. The TCN-based model achieves excellent authentication performance and higher computational efficiency compared to the RNN-based model.
Present-day smartphones provide various conveniences, owing to high-end hardware specifications and advanced network technology. Consequently, people rely heavily on smartphones for a myriad of daily-life tasks, such as work scheduling, financial transactions, and social networking, which require a strong and robust user authentication mechanism to protect personal data and privacy. In this study, we propose draw-a-deep-pattern (DDP)-a deep learning-based end-to-end smartphone user authentication method using sequential data obtained from drawing a character or freestyle pattern on the smartphone touchscreen. In our model, a recurrent neural network (RNN) and a temporal convolution neural network (TCN), both of which are specialized in sequential data processing, are employed. The main advantages of the proposed DDP are (1) it is robust to the threats to which current authentication systems are vulnerable, e.g., shoulder surfing attack and smudge attack, and (2) it requires few parameters for training; therefore, the model can be consistently updated in real-time, whenever new training data are available. To verify the performance of the DDP model, we collected data from 40 participants in one of the most unfavorable environments possible, wherein all potential intruders know how the authorized users draw the characters or symbols (shape, direction, stroke, etc.) of the drawing pattern used for authentication. Of the two proposed DDP models, the TCN-based model yielded excellent authentication performance with average values of 0.99%, 1.41%, and 1.23% in terms of AUROC, FAR, and FRR, respectively. Furthermore, this model exhibited improved authentication performance and higher computational efficiency than the RNN-based model in most cases. To contribute to the research/industrial communities, we made our dataset publicly available, thereby allowing anyone studying or developing a behavioral biometric-based user authentication system to use our data without any restrictions.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据