An HMM-based behavior modeling approach for continuous mobile authentication

This paper studies continuous authentication for touch interface based mobile devices. A Hidden Markov Model (HMM) based behavioral template training approach is presented, which does not require training data from other subjects other than the owner of the mobile. The stroke patterns of a user are...

Full description

Saved in:
Bibliographic Details
Published inProceedings of the ... IEEE International Conference on Acoustics, Speech and Signal Processing (1998) pp. 3789 - 3793
Main Authors Roy, Aditi, Halevi, Tzipora, Memon, Nasir
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.05.2014
Subjects
Online AccessGet full text
ISSN1520-6149
DOI10.1109/ICASSP.2014.6854310

Cover

Abstract This paper studies continuous authentication for touch interface based mobile devices. A Hidden Markov Model (HMM) based behavioral template training approach is presented, which does not require training data from other subjects other than the owner of the mobile. The stroke patterns of a user are modeled using a continuous left-right HMM. The approach models the horizontal and vertical scrolling patterns of a user since these are the basic and mostly used interactions on a mobile device. The effectiveness of the proposed method is evaluated through extensive experiments using the Toucha-lytics database which comprises of touch data over time. The results show that the performance of the proposed approach is better than the state-of-the-art method.
AbstractList This paper studies continuous authentication for touch interface based mobile devices. A Hidden Markov Model (HMM) based behavioral template training approach is presented, which does not require training data from other subjects other than the owner of the mobile. The stroke patterns of a user are modeled using a continuous left-right HMM. The approach models the horizontal and vertical scrolling patterns of a user since these are the basic and mostly used interactions on a mobile device. The effectiveness of the proposed method is evaluated through extensive experiments using the Toucha-lytics database which comprises of touch data over time. The results show that the performance of the proposed approach is better than the state-of-the-art method.
Author Halevi, Tzipora
Memon, Nasir
Roy, Aditi
Author_xml – sequence: 1
  givenname: Aditi
  surname: Roy
  fullname: Roy, Aditi
  email: ar3824@nyu.edu
  organization: Polytech. Sch. of Eng., New York Univ., New York, NY, USA
– sequence: 2
  givenname: Tzipora
  surname: Halevi
  fullname: Halevi, Tzipora
  email: thalevi@nyu.edu
  organization: Polytech. Sch. of Eng., New York Univ., New York, NY, USA
– sequence: 3
  givenname: Nasir
  surname: Memon
  fullname: Memon, Nasir
  email: memon@nyu.edu
  organization: Polytech. Sch. of Eng., New York Univ., New York, NY, USA
BookMark eNotj91KwzAcxSNMcJt7gt3kBVqT5vtyDHVCh8L0eiTpvzbSJaUfgm9vYbs6nB-HwzkrtIgpAkJbSnJKiXl62-9Op4-8IJTnUgvOKLlDG6M05cqYQhvGF2hJRUEySbl5QKth-CGEaMX1EpW7iA_HY-bsABV20NjfkHp8SRW0IX5j23V9sr7B9Ux9imOIU5qGOeBCC9hOYwMz9HYMKT6i-9q2A2xuukZfL8-f-0NWvr_OM8ssUCXGrAKjuFWCSFUr5gHk7CuqC-O084p4blnlmOBSg9C1t14X3ldM12CJFIqt0fbaGwDg3PXhYvu_8-08-wfHW1EE
ContentType Conference Proceeding
DBID 6IE
6IH
CBEJK
RIE
RIO
DOI 10.1109/ICASSP.2014.6854310
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan (POP) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP) 1998-present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISBN 9781479928934
1479928933
EndPage 3793
ExternalDocumentID 6854310
Genre orig-research
GroupedDBID 23M
29P
6IE
6IF
6IH
6IK
6IL
6IM
6IN
AAJGR
AAWTH
ABLEC
ACGFS
ADZIZ
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
IEGSK
IJVOP
IPLJI
M43
OCL
RIE
RIL
RIO
RNS
ID FETCH-LOGICAL-i175t-de974a75067f73cee6974d1829b8bc70c4a3db35468e58fcac82ccd38fea06573
IEDL.DBID RIE
ISSN 1520-6149
IngestDate Wed Aug 27 04:57:19 EDT 2025
IsPeerReviewed false
IsScholarly true
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i175t-de974a75067f73cee6974d1829b8bc70c4a3db35468e58fcac82ccd38fea06573
PageCount 5
ParticipantIDs ieee_primary_6854310
PublicationCentury 2000
PublicationDate 2014-May
PublicationDateYYYYMMDD 2014-05-01
PublicationDate_xml – month: 05
  year: 2014
  text: 2014-May
PublicationDecade 2010
PublicationTitle Proceedings of the ... IEEE International Conference on Acoustics, Speech and Signal Processing (1998)
PublicationTitleAbbrev ICASSP
PublicationYear 2014
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0008748
Score 2.0848262
Snippet This paper studies continuous authentication for touch interface based mobile devices. A Hidden Markov Model (HMM) based behavioral template training approach...
SourceID ieee
SourceType Publisher
StartPage 3789
SubjectTerms Authentication
Behavioral biometric
Continuous authentication
Hidden Markov Model
Hidden Markov models
Kinematics
Mobile handsets
Security
Touch pattern
Training
Training data
Title An HMM-based behavior modeling approach for continuous mobile authentication
URI https://ieeexplore.ieee.org/document/6854310
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8NAEB5qT3rx0Ypv9uDRpEl2k90eS1GqGCnUQm8l-4IipKLJxV_v7CatDzx4y2PZHXZgHrvfNwNwrXQSW2pkoB3Fh1GhAqlTHqC9TBSNjDGeIZc_ZZM5e1ikiw7cbLkw-NeDz0zoHv1dvl6r2h2VDTLhmNuYoO9wkTVcra3VFdx3ykJ35NIhNmwrDMXRcHA_Hs1mUwfjYmE7xY9eKt6V3O1DvhGiQZC8hHUlQ_Xxqz7jf6U8gP4XaY9Mt-7oEDqmPIK9b_UGe_A4KskkzwPnujTZMPSJ74aDA8imwDjBSJY4EPuqrNf1Ow6QaDxI4dDwZdWe8vVhfnf7PJ4EbTuFYIUxQoXawNyhwAgh45ZTlCbDd435xVAKqXikWEG1pCnLhEmFVYUSiVKaCmsKDFQ4PYZuuS7NCZAisVGsmcJwxDJUqLA2FiLTguMiSvFT6Ll9Wb42FTOW7Zac_f35HHadbhoY4QV0q7faXKKrr-SV1_EnFR6pOQ
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3JasMwEBUhPbS9dElK9-rQY-3YlmwpxxAanDYOgSSQW7A2CAW7tPalX9-R7aQLPfTmRUiDBmaR3ptB6F6qwDdEC0dZig8lXDpChcwBexlI4mmtK4ZcMo3iJX1ahasWethxYeBvBT7Trn2s7vJVLkt7VNaLuGVuQ4K-F1JKw5qttbO7nFW9ssAh2YSI9psaQ77X742Hg_l8ZoFc1G0m-dFNpXImoyOUbMWoMSQvblkIV378qtD4XzmPUfeLtodnO4d0glo6O0WH3yoOdtBkkOE4SRzrvBTecvRx1Q8HBuBtiXEMsSy2MPZNVublOwwQYD5wavHwWdGc83XRcvS4GMZO01DB2UCUUIA-IHtIIUaImGEEpIngXUGG0RdcSOZJmhIlSEgjrkNuZCp5IKUi3OgUQhVGzlA7yzN9jnAaGM9XVEJAYiiolBvjcx4pzmARKdkF6th9Wb_WNTPWzZZc_v35Du3Hi2Synoynz1fowOqpBhVeo3bxVuobcPyFuK30_Qkh7KyG
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=Proceedings+of+the+...+IEEE+International+Conference+on+Acoustics%2C+Speech+and+Signal+Processing+%281998%29&rft.atitle=An+HMM-based+behavior+modeling+approach+for+continuous+mobile+authentication&rft.au=Roy%2C+Aditi&rft.au=Halevi%2C+Tzipora&rft.au=Memon%2C+Nasir&rft.date=2014-05-01&rft.pub=IEEE&rft.issn=1520-6149&rft.spage=3789&rft.epage=3793&rft_id=info:doi/10.1109%2FICASSP.2014.6854310&rft.externalDocID=6854310
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1520-6149&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1520-6149&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1520-6149&client=summon