Evaluation of a user authentication schema using behavioral biometrics and machine learning
arXiv preprint arXiv:2205.08371, 2022•arxiv.org
The amount of secure data being stored on mobile devices has grown immensely in recent
years. However, the security measures protecting this data have stayed static, with few
improvements being done to the vulnerabilities of current authentication methods such as
physiological biometrics or passwords. Instead of these methods, behavioral biometrics has
recently been researched as a solution to these vulnerable authentication methods. In this
study, we aim to contribute to the research being done on behavioral biometrics by creating …
years. However, the security measures protecting this data have stayed static, with few
improvements being done to the vulnerabilities of current authentication methods such as
physiological biometrics or passwords. Instead of these methods, behavioral biometrics has
recently been researched as a solution to these vulnerable authentication methods. In this
study, we aim to contribute to the research being done on behavioral biometrics by creating …
The amount of secure data being stored on mobile devices has grown immensely in recent years. However, the security measures protecting this data have stayed static, with few improvements being done to the vulnerabilities of current authentication methods such as physiological biometrics or passwords. Instead of these methods, behavioral biometrics has recently been researched as a solution to these vulnerable authentication methods. In this study, we aim to contribute to the research being done on behavioral biometrics by creating and evaluating a user authentication scheme using behavioral biometrics. The behavioral biometrics used in this study include touch dynamics and phone movement, and we evaluate the performance of different single-modal and multi-modal combinations of the two biometrics. Using two publicly available datasets - BioIdent and Hand Movement Orientation and Grasp (H-MOG), this study uses seven common machine learning algorithms to evaluate performance. The algorithms used in the evaluation include Random Forest, Support Vector Machine, K-Nearest Neighbor, Naive Bayes, Logistic Regression, Multilayer Perceptron, and Long Short-Term Memory Recurrent Neural Networks, with accuracy rates reaching as high as 86%.
arxiv.org
Showing the best result for this search. See all results