Biometric Authentication Using Mouse and Eye Movement Data

Authors

  • Jamison Rose Versive
  • Yudong Liu Computer Science Department, Western Washington University, Bellingham, WA, USA
  • Ahmed Awad School of Engineering & Computing Sciences, New York Institute of Technology, Vancouver, Canada

DOI:

https://doi.org/10.13052/2245-1439.611

Keywords:

Biometric Authentication, Mouse Movement, Eye Movement, Neural Network Classifiers

Abstract

Previous biometric systems have attempted to identify users solely by eye or mouse data. In this paper, we seek to find out if combining both kinds of data produces better results. In our system, mouse movement and eye movement data are gathered from each user simultaneously, a set of salient features are proposed, and a Neural Network classifier is trained on this data to uniquely identify users. After going through this process and investigating several Neural Network based classification models we conclude that combining the modalities results in a more accurate authentication decision and will become practical once the hardware is more widespread.

 

Downloads

Download data is not yet available.

Author Biographies

Jamison Rose, Versive

Jamison Rose received his B.S. and M.Sc. in Computer Science from Western Washington University. He is currently a Machine Learning Engineer at Versive in Seattle, WA, USA.

Yudong Liu, Computer Science Department, Western Washington University, Bellingham, WA, USA

Yudong Liu received her B.S. and M.Sc. degrees in Computer Science from Jilin University, Changchun, China, in 1999 and 2002, respectively, and Ph.D. in Computer Science from Simon Fraser University, Canada, in 2009. She joined the Computer Science Department of Western Washington University, WA, USA, as an Assistant Professor in 2013. Her research interests include Natural Language Processing, Information Extraction, Digital Humanities, and Applications of eye-tracking data. She published research papers in referred international journals, and international and national conferences.

Ahmed Awad, School of Engineering & Computing Sciences, New York Institute of Technology, Vancouver, Canada

Ahmed Awad is an associate professor at the School of Engineering and Computing Sciences, NYIT Vancouver campus. His main research interest is focused on Security Engineering, Human Computer Interaction, and Biometrics. Dr. Awad received his Ph.D. in Electrical and Computer Engineering from the University of Victoria, Victoria, BC, Canada in 2008. His Ph.D. dissertation introduced new trends in security monitoring through human computer interaction devices. Dr. Awad is the inventor of the mouse dynamics biometric, a new technology that found its way to the Continuous Authentication and Fraud Detection fields. He co-authored the first book on Continuous Authentication using Biometrics in 2011. Dr. Awad is the co-founder of Plurilock Security Solutions Inc. He worked as a Software Design Engineer, Architect, Project Manager, and Security Consultant at number of leading software firms and enterprises.

References

Ahmed, A., and Issa, T. (2007). A new biometric technology based on mouse dynamics. IEEE Trans. Dependable Sec. Comput. 4, 165–179.

Bailey, K. O., Okolica, J. S., and Peterson, G. L. (2014). User identification and authentication using multi-modal behavioral biometrics. Comput. Sec. 43, 77–89.

Bergadano, F., Gunetti, D., and Picardi, C. (2002). User authentication through keystroke dynamics. ACM Trans. Inform. Syst. Sec. 5, 367–397.

Bhattacharyya, D., Ranjan, R., Alisherov, F., and Minkyu, C. (2009). Biometric authentication: a review. Int. J. Serv. Sci. Technol. 2, 13–28.

Cantoni, V., Galdi, C., Nappi, M., Porta, M., and Riccio, D. (2015). Gant: gaze analysis technique for human identification. Pattern Recogn. 48, 1027–1038.

Chen, M. C., Anderson, J. R., and Sohn, M. H. (2001). “What can a mouse cursor tell us more?: correlation of eye/mouse movements on web browsing,” in Proceedings of the CHI ’01 Extended Abstracts on Human Factors in Computing Systems, CHI EA ’01 (New York, NY: ACM), 281–282.

Chetty, G., and Wagner, M. (2006). “Multi-level liveness verification for face-voice biometric authentication,” in Proceedings of the Biometric Consortium Conference, 2006 Biometrics Symposium: Special Session on Research (Rome: IEEE), 1–6.

Darwish, A., and Pasquier, M. (2013). “Biometric identification using the dynamic features of the eyes,” in Proceedings of the IEEE Sixth International Conference: Biometrics: Theory, Applications and Systems (BTAS), Arlington, VA, 1–6.

De Luca, A., Hang, A., Brudy, F., Lindner, C., and Hussmann, H. (2012). “Touch me once and i know it’s you!: implicit authentication based on touch screen patterns,” in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (New York City, NY: ACM), 987–996.

Dhingra, A., Kumar, A., Hanmandlu, M., and Panigrahi, B. K. (2013). “Biometric based personal authentication using eye movement tracking,” in Proceedings of the 4th International Conference on Swarm, Evolutionary, and Memetic Computing – Volume 8298, SEMCCO 2013 (New York, NY: Springer-Verlag New York, Inc), 248–256.

Fierrez-Aguilar, J., Ortega-Garcia, J., Gonzalez-Rodriguez, J., and Bigun, J. (2005). Discriminative multimodal biometric authentication based on quality measures. Pattern Recogn. 38, 777–779.

Giot, R., El-Abed, M., and Rosenberger, C. (2009). “Keystroke dynamics authentication for collaborative systems,” in Proceedings of the CTS’09 International Symposium: Collaborative Technologies and Systems, 2009 (Rome: IEEE), 172–179.

Holland, C., and Komogortsev, O. V. (2011). “Biometric identification via eye movement scanpaths in reading,” in Proceedings of the 2011 International Joint Conference: Biometrics (IJCB), San Jose, CA, 1–8.

Holland, C. D., and Komogortsev, O. V. (2012). “Biometric verification via complex eye movements: the effects of environment and stimulus,” in Proceedings of the 2012 IEEE Fifth International Conference: Biometrics: Theory, Applications and Systems (BTAS), Montreal, QC, 39–46.

Jain, A. K., Hong, L., and Kulkarni, Y. (1999). “A multimodal biometric system using fingerprint, face and speech,” in Proceedings of the 14th International Conference on Pattern Recognition, eds A. K. Jain, S. Venkatesh, B. C. Lovell (Washington, DC: IEEE Computer Society Press).

Jorgensen, Z., and Yu, T. (2011). “On mouse dynamics as a behavioral biometric for authentication,” in Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (New York, NY: ACM), 476–482.

Karnan, M., Akila, M., and Krishnaraj, N. (2011). Biometric personal authentication using keystroke dynamics: a review. Appl. Soft Comput. 11, 1565–1573.

Kholmatov, A., and Yanikoglu, B. (2005). Identity authentication using improved online signature verification method. Pattern Recogn. Lett. 26, 2400–2408.

Kinnunen, T., Sedlak, F., and Bednarik, R. (2010). “Towards task-independent person authentication using eye movement signals,” in Proceedings of the 2010 Symposium on Eye-Tracking Research & Applications (New York, NY: ACM), 187–190.

Monrose, F., and Rubin, A. D. (2000). Keystroke dynamics as a biometric for authentication. Future Gen. Comput. Syst. 16, 351–359.

Moré, J. J. (1978). “The levenberg-marquardt algorithm: implementation and theory,” in Numerical Analysis: Watson Lecture Notes in Mathematics, Vol. 630, ed. G. A (Berlin: Springer), 105–116.

Nguyen, D., and Widrow, B. (1990). “Improving the learning speed of 2-layer neural networks by choosing initial values of the adaptive weights,” in Proceedings of the Neural Networks: IJCNN International Joint Conference, Bandera, TX, 21–26.

Pusara, M., and Brodley, C. E. (2001). “User re-authentication via mouse movements,” in Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, New York, 1–8.

Revett, K., Jahankhani, H., Sérgio, T., Magalhãaes, T., and Santos, H. (2008). A survey of user authentication based on mouse dynamics. Glob. E Sec. 5, 210–219.

Rigas, I., Economou, G., and Fotopoulos, S. (2012). Biometric identification based on the eye movements and graph matching techniques. Pattern Recogn. Lett. 33, 786–792.

Rigas, I., Economou, G., and Fotopoulos, S. (2012). “Human eye movements as a trait for biometrical identification,” in Proceedings of the 2012 IEEE Fifth International Conference: Biometrics Theory, Applications and Systems (BTAS), 217–222.

Ross, A., and Jain, A. K. (2004). “Multimodal biometrics: an overview,” in Proceedings of the Signal Processing Conference, 2004 12th European (Rome: IEEE), 1221–1224.

Sayed, B., Traore, I., Woungang, I., and Obaidat, M. S. (2013). Biometric authentication using mouse gesture dynamics. IEEE Syst. J. 7, 262–274.

Shen, C., Cai, Z., Guan, X., and Cai, J. (2010). “A hypo-optimum feature selection strategy for mouse dynamics in continuous identity authentication and monitoring,” in Proceedings of the 2010 IEEE International Conference Information Theory and Information Security (ICITIS), Beijing, 349–353.

Sim, T., Zhang, S., Janakiraman, R., and Kumar, S. (2007). Continuous verification using multimodal biometrics. IEEE Trans. Pattern Anal. Mach. Intell. 29, 687–700.

Snelick, R., Uludag, U., Mink, A., Indovina, M., and Jain, A. (2005). Large-scale evaluation of multimodal biometric authentication using state-of-the-art systems. IEEE Trans. Pattern Anal. Mach. Intell. 27, 450–455.

Wayman, J., Jain, A., Maltoni, D., and Maio, D. (2005). An introduction to biometric authentication systems. Biometric Syst. 10, 1–20.

Xu, H., Zhou, Y., and Lyu, M. R. (2014). “Towards continuous and passive authentication via touch biometrics: an experimental study on smartphones,” in Proceedings of the Symposium on Usable Privacy and Security, SOUPS, Pittsburgh, PA, 187–198.

Yeung, D.-Y., Chang, H., Xiong, Y., George, S., Kashi, R., Matsumoto, T., and Rigoll, G. (2004). “First international signature verification competition,” in Proceedings of the Biometric Authentication: First International Conference, Hong Kong, 16–22.

Zheng, N., Paloski, A., and Wang, H. (2011). “An efficient user verification system via mouse movements,” in Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS ’11 (New York, NY: ACM), 139–150.

Downloads

Published

2017-02-09

Issue

Section

Articles