Biometric Authentication Technique Using Smartphone Sensor: Asadullah Laghari, Waheed-ur-Rehman, Dr. Zulfiqar Ali Memon
Biometric Authentication Technique Using Smartphone Sensor: Asadullah Laghari, Waheed-ur-Rehman, Dr. Zulfiqar Ali Memon
Smartphone Sensor
Abstract— User identity theft is a growing challenge for security senses the motion of phone in all three dimensions [2]. Hence
of electronic systems. Traditional authentication techniques such this data is sufficient to provide adequate features to uniquely
as password and PIN code are more vulnerable to this problem. identify a person.
On the other hand, biometric authentication techniques are safer
as compared to password identification for authentication II. RELATED WORK
purpose. Biometric techniques use certain characteristics of Several authentication techniques that use the
human to authenticate the legitimate user. This paper presents a accelerometer of wearable devices or smartphones has been
biometric authentication mechanism using motion sensor of
studied. One of them uses biometric gait recognition to
smart phone. The user has to perform signature by moving his
authenticate user on smartphones [3]. This work was
phone, the motion pattern is detected using accelerometer of the
smartphone. We have used the concepts of signal matching for participated by 51 volunteers who carried the smartphone in
identification mechanism. Results depict that legitimate user can their pocket over the hip and gait data was collected. This work
be identified using a certain level of error threshold. resulted into the error rate of 20%.
Similar research was also carried out by [4]. Gait data was
Keywords—biometric; accelerometer; smartphone; collected from 31 participants. The gait data was mixed with
authentication system; password confidentiality the voice data that was collected simultaneously with the gait
data. It was observed that the gait plus voice recognition
I. INTRODUCTION performed better than the voice recognition alone.
The biometric authentication techniques such as fingerprint Accelerometer data was also used by [5] to identify certain
scanning, retina scanning or face detection are considered more characteristics of user such as height and weight. The
secure than the contemporary authentication mechanisms, such experiment was performed by volunteers who carried
as PIN, passwords, smart card technology or even pattern locks smartphone during walk. The data was collected for a short
in the smartphones. Conventional authentication mechanisms distance walk and it was used to identify the characteristics of
including graphical or alphanumeric passwords require that the volunteer. Another research was carried out to uniquely
user remembers the unique combination of password. identify the trajectory of mobile phone picking-up by using
Moreover, the confidentiality of the password is also a major unique features extracted from the accelerometer data of
concern in security systems. Password or PIN based smartphone [6].
authentication mechanisms can also be cracked by using guess
or brute force dictionary. Biometric authentications provide The robustness of signature recognition systems based on
improved reliability and usability because unlike conventional accelerometer was studied by [7]. Multiple temporal distance
methods, it needs not to be remembered. Biometric techniques algorithms were analyzed on a database of 50 users. It was
are either categorized as physiological (i.e. fingerprint scanning observed that DTW performed better than LCS. However, the
or retina scanning etc.) or behavioral such as voice. author did not implement the recognition technique for any
Handwritten Signature also belongs to behavioral biometrics. It user login system.
is one of the oldest and most widely used method for
authentication of a person on a document [1]. III. SYSTEM DESCRIPTION
This paper is aimed to build a user authentication The proposed system architecture is based on three tiers as
mechanism, in which the legitimate user is authenticated by depicted in Fig. 1. First tier is the user end. The user uses
identifying the features from his signature. The signature, smartphone to perform his signature in the air. The mobile
unlike the traditional hand written signature, has to be phone is carried by the user in his hand while he performs the
performed in air by holding the smartphone in hand. We have signature. The data of motion sensed by the accelerometer is
utilized the built in sensor of acceleration (i.e. accelerometer) then sent to the server for authentication. Server, which is the
in the smartphone to identify the pattern of motion of user’s second tier, applies matching algorithm to identify the user.
hand in the air. Accelerometer is quite common sensor and is The data generated by user is matched with the pre-set
available in almost all the smartphones. The accelerometer
ª*&&&
User End
Fig. 3. Accelerometer data of a volunteer plotted against time. The graph
depicts variations in all three components of motion
User performs 5
User enters username and
signatures on
performs signature
smartphone
All 5 signatures If result > threshold: Log in Fig. 6. Cross-correlation of signatures of legitimate user and illegitimate user
stored in with the signature template
Database else repeat the process
IX. CONCLUSION
(a) (b)
Volunteers found it easy to use. This technique is more
Fig. 5. (a) New user registration process, (b) User authentication process secure than traditional username password and similar kind of
methods. This is also more confidential than graphical
VII.CROSS CORRELATION OF SIGNATURE passwords, since graphical techniques are less confidential and
Accelerometer of the smartphone provides data obtained prone to shoulder surfing. The result of this method is
for all three axes separately. Therefore, data of each axis is to favorable. The FRR was observerd to be 6.87% and FAR was
be matched with its corresponding axis in the template data. 1.46%. However, this method can further be improved by
The data for each axis can be plotted as function of time as increasing numbers of features from the collected data.
shown in Fig 3. Since against each username, there are five Frequency analysis of the signature signal can also be
signatures that were stored during the registration process, the performed to make the authentication more accurate.