An HMM-based behavior modeling approach for continuous mobile authentication
This paper studies continuous authentication for touch interface based mobile devices. A Hidden Markov Model (HMM) based behavioral template training approach is presented, which does not require training data from other subjects other than the owner of the mobile. The stroke patterns of a user are...
Saved in:
| Published in | Proceedings of the ... IEEE International Conference on Acoustics, Speech and Signal Processing (1998) pp. 3789 - 3793 |
|---|---|
| Main Authors | , , |
| Format | Conference Proceeding |
| Language | English |
| Published |
IEEE
01.05.2014
|
| Subjects | |
| Online Access | Get full text |
| ISSN | 1520-6149 |
| DOI | 10.1109/ICASSP.2014.6854310 |
Cover
| Abstract | This paper studies continuous authentication for touch interface based mobile devices. A Hidden Markov Model (HMM) based behavioral template training approach is presented, which does not require training data from other subjects other than the owner of the mobile. The stroke patterns of a user are modeled using a continuous left-right HMM. The approach models the horizontal and vertical scrolling patterns of a user since these are the basic and mostly used interactions on a mobile device. The effectiveness of the proposed method is evaluated through extensive experiments using the Toucha-lytics database which comprises of touch data over time. The results show that the performance of the proposed approach is better than the state-of-the-art method. |
|---|---|
| AbstractList | This paper studies continuous authentication for touch interface based mobile devices. A Hidden Markov Model (HMM) based behavioral template training approach is presented, which does not require training data from other subjects other than the owner of the mobile. The stroke patterns of a user are modeled using a continuous left-right HMM. The approach models the horizontal and vertical scrolling patterns of a user since these are the basic and mostly used interactions on a mobile device. The effectiveness of the proposed method is evaluated through extensive experiments using the Toucha-lytics database which comprises of touch data over time. The results show that the performance of the proposed approach is better than the state-of-the-art method. |
| Author | Halevi, Tzipora Memon, Nasir Roy, Aditi |
| Author_xml | – sequence: 1 givenname: Aditi surname: Roy fullname: Roy, Aditi email: ar3824@nyu.edu organization: Polytech. Sch. of Eng., New York Univ., New York, NY, USA – sequence: 2 givenname: Tzipora surname: Halevi fullname: Halevi, Tzipora email: thalevi@nyu.edu organization: Polytech. Sch. of Eng., New York Univ., New York, NY, USA – sequence: 3 givenname: Nasir surname: Memon fullname: Memon, Nasir email: memon@nyu.edu organization: Polytech. Sch. of Eng., New York Univ., New York, NY, USA |
| BookMark | eNotj91KwzAcxSNMcJt7gt3kBVqT5vtyDHVCh8L0eiTpvzbSJaUfgm9vYbs6nB-HwzkrtIgpAkJbSnJKiXl62-9Op4-8IJTnUgvOKLlDG6M05cqYQhvGF2hJRUEySbl5QKth-CGEaMX1EpW7iA_HY-bsABV20NjfkHp8SRW0IX5j23V9sr7B9Ux9imOIU5qGOeBCC9hOYwMz9HYMKT6i-9q2A2xuukZfL8-f-0NWvr_OM8ssUCXGrAKjuFWCSFUr5gHk7CuqC-O084p4blnlmOBSg9C1t14X3ldM12CJFIqt0fbaGwDg3PXhYvu_8-08-wfHW1EE |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IH CBEJK RIE RIO |
| DOI | 10.1109/ICASSP.2014.6854310 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan (POP) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP) 1998-present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISBN | 9781479928934 1479928933 |
| EndPage | 3793 |
| ExternalDocumentID | 6854310 |
| Genre | orig-research |
| GroupedDBID | 23M 29P 6IE 6IF 6IH 6IK 6IL 6IM 6IN AAJGR AAWTH ABLEC ACGFS ADZIZ ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO IEGSK IJVOP IPLJI M43 OCL RIE RIL RIO RNS |
| ID | FETCH-LOGICAL-i175t-de974a75067f73cee6974d1829b8bc70c4a3db35468e58fcac82ccd38fea06573 |
| IEDL.DBID | RIE |
| ISSN | 1520-6149 |
| IngestDate | Wed Aug 27 04:57:19 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | true |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i175t-de974a75067f73cee6974d1829b8bc70c4a3db35468e58fcac82ccd38fea06573 |
| PageCount | 5 |
| ParticipantIDs | ieee_primary_6854310 |
| PublicationCentury | 2000 |
| PublicationDate | 2014-May |
| PublicationDateYYYYMMDD | 2014-05-01 |
| PublicationDate_xml | – month: 05 year: 2014 text: 2014-May |
| PublicationDecade | 2010 |
| PublicationTitle | Proceedings of the ... IEEE International Conference on Acoustics, Speech and Signal Processing (1998) |
| PublicationTitleAbbrev | ICASSP |
| PublicationYear | 2014 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| SSID | ssj0008748 |
| Score | 2.0848262 |
| Snippet | This paper studies continuous authentication for touch interface based mobile devices. A Hidden Markov Model (HMM) based behavioral template training approach... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 3789 |
| SubjectTerms | Authentication Behavioral biometric Continuous authentication Hidden Markov Model Hidden Markov models Kinematics Mobile handsets Security Touch pattern Training Training data |
| Title | An HMM-based behavior modeling approach for continuous mobile authentication |
| URI | https://ieeexplore.ieee.org/document/6854310 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8NAEB5qT3rx0Ypv9uDRpEl2k90eS1GqGCnUQm8l-4IipKLJxV_v7CatDzx4y2PZHXZgHrvfNwNwrXQSW2pkoB3Fh1GhAqlTHqC9TBSNjDGeIZc_ZZM5e1ikiw7cbLkw-NeDz0zoHv1dvl6r2h2VDTLhmNuYoO9wkTVcra3VFdx3ykJ35NIhNmwrDMXRcHA_Hs1mUwfjYmE7xY9eKt6V3O1DvhGiQZC8hHUlQ_Xxqz7jf6U8gP4XaY9Mt-7oEDqmPIK9b_UGe_A4KskkzwPnujTZMPSJ74aDA8imwDjBSJY4EPuqrNf1Ow6QaDxI4dDwZdWe8vVhfnf7PJ4EbTuFYIUxQoXawNyhwAgh45ZTlCbDd435xVAKqXikWEG1pCnLhEmFVYUSiVKaCmsKDFQ4PYZuuS7NCZAisVGsmcJwxDJUqLA2FiLTguMiSvFT6Ll9Wb42FTOW7Zac_f35HHadbhoY4QV0q7faXKKrr-SV1_EnFR6pOQ |
| linkProvider | IEEE |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3JasMwEBUhPbS9dElK9-rQY-3YlmwpxxAanDYOgSSQW7A2CAW7tPalX9-R7aQLPfTmRUiDBmaR3ptB6F6qwDdEC0dZig8lXDpChcwBexlI4mmtK4ZcMo3iJX1ahasWethxYeBvBT7Trn2s7vJVLkt7VNaLuGVuQ4K-F1JKw5qttbO7nFW9ssAh2YSI9psaQ77X742Hg_l8ZoFc1G0m-dFNpXImoyOUbMWoMSQvblkIV378qtD4XzmPUfeLtodnO4d0glo6O0WH3yoOdtBkkOE4SRzrvBTecvRx1Q8HBuBtiXEMsSy2MPZNVublOwwQYD5wavHwWdGc83XRcvS4GMZO01DB2UCUUIA-IHtIIUaImGEEpIngXUGG0RdcSOZJmhIlSEgjrkNuZCp5IKUi3OgUQhVGzlA7yzN9jnAaGM9XVEJAYiiolBvjcx4pzmARKdkF6th9Wb_WNTPWzZZc_v35Du3Hi2Synoynz1fowOqpBhVeo3bxVuobcPyFuK30_Qkh7KyG |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=Proceedings+of+the+...+IEEE+International+Conference+on+Acoustics%2C+Speech+and+Signal+Processing+%281998%29&rft.atitle=An+HMM-based+behavior+modeling+approach+for+continuous+mobile+authentication&rft.au=Roy%2C+Aditi&rft.au=Halevi%2C+Tzipora&rft.au=Memon%2C+Nasir&rft.date=2014-05-01&rft.pub=IEEE&rft.issn=1520-6149&rft.spage=3789&rft.epage=3793&rft_id=info:doi/10.1109%2FICASSP.2014.6854310&rft.externalDocID=6854310 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1520-6149&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1520-6149&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1520-6149&client=summon |