JOURNAL OF LATEX CLASS FILES, VOL. 6, NO. 1, JULY 2014 1 Unlocking Smart Phone through Handwaving Biometrics Lei Yang, Member, IEEE, Yi Guo, Student Member, IEEE, Xuan Ding, Member, IEEE, Jinsong Han, Member, IEEE, Yunhao Liu, Senior Member, IEEE, Cheng Wang, Member, IEEE, Changwei Hu Abstract—Screen locking/unlocking is important for modern smart phones to avoid the unintentional operations and secure the personal stuff. Once the phone is locked, the user should take a specific action or provide some secret information to unlock the phone. The existing unlocking approaches can be categorized into four groups: motion, password, pattern, and fingerprint. Existing approaches do not support smart phones well due to the deficiency of security, high cost, and poor usability. We collect 200 users’ handwaving actions with their smart phones and discover an appealing observation: the waving pattern of a person is kind of unique, stable and distinguishable. In this paper, we propose OpenSesame, which employs the users’ waving patterns for locking/unlocking. The key feature of our system lies in using four fine-grained and statistic features of handwaving to verify users. Moreover, we utilize support vector machine (SVM) for accurate and fast classification. Our technique is robust compatible across different brands of smart phones, without the need of any specialized hardware. Results from comprehensive experiments show that the mean false positive rate of OpenSesame is around 15%, while the false negative rate is lower than 8%. Index Terms—Smart Phone, Security, Privacy, Authentication, Accelerometer F 1 I NTRODUCTION Nowadays, smart phones are no longer the devices that are only used to call or text others. They become prevalent with much more powerful functions. Acting as pocket PCs, smart phones can be used to deal with complicated tasks such as sending/receiving e-mails, shopping, mobile payment, etc.. Screen locker is a fundamental utility for smart phones to prevent the device from unauthorized use. For example, the Apple iPhones and Android phones can lock themselves automatically after being idle for a short time. It can protect the privacy of users as well as prevent unintentional operations. Classical screen lockers have been proposed long time back. (1) The most widely used one is Slide-to-Unlock. The user can unlock his/her phone through sliding his finger across a defined trajectory. This method is too simple to protect user’s privacy. (2) PIN, the most common method used by traditional digital device, is always adopted on smart phones for unlocking smart phones. However, due to the relatively small screen and frequent unlocking request, it is inconvenient to set long and complex PIN on phones. For example, there • Lei Yang, Xuan Ding, Yunhao Liu are with the School of Software, Tsinghua University, Beijing, China. E-mail: {young, xuan}@tagsys.org, [email protected]. • Yi Guo is with Department of Computer Science and Engineering, Hong Kong University of Science and Technology, Hong Kong. Email: yi@tagsys. • Jinsong Han is with the Department of Computer Science and Technology, Xi’an Jiaotong University, Shaanxi, China. Email: [email protected]. • Cheng Wang is with the Department of Computer Science and Technology, Tongji University, and with the Key Laboratory of Embedded System and Service Computing, Ministry of Education, Shanghai, China. E-mail: [email protected]. • Changwei Hu is with Shaanxi Broadcast& TV Network Intermediary (Group) Co., LTD. are only four numbers allowed to be set as unlocking PIN in iPhone’s default setting. Such a short and simple PIN can often be easily guessed [1], [2]. (3) The user can pre-define a graphical password, like connecting at least 4 circles shown in the screen. Being similar to the PIN, simple graphic passwords are easy to be peeked and guessed, while the complex pattern may confuse the user and make inconvenience. To enhance the security as well as the flexibility, many biometric authentication methods [3], [4] are introduced for screen lockers. The secrets of these methods cannot be easily spied and reproduced since they identify the user based on her natural features. The biometric measures are grouped into two main categories [5]: physiological biometrics and behavior biometrics. Physiological biometrics leverage the physiological features of human beings to identify the user, including recognitions of face [6], voice [7], fingerprint [8], ear [6], and so on. However, we find that (i) performances of these solutions are heavily influenced by external factors. For example, the face acquirement by the camera is severely affected by the illumination, resulting in the failure to identify user at night. Similarly, it is hard to distinguish the the voice from the ambient interference in an extremely noisy environments, like subway or restaurant. Any authentication method must be adapted to all kinds of conditions. (ii) Unlocking operation is a very frequent operation, of which energy consumption should be carefully considered. It is well known that the camera is one of notorious energy killers [9] in smart phones. (iii) lack of required hardware on current mainstream smartphones, like fingerprint scanner. The behavior biometrics is the other classification of biometric measure, which identify the user based on their behavior features, such as gesture [10], [11], typing behavior JOURNAL OF LATEX CLASS FILES, VOL. 6, NO. 1, JULY 2014 [6], [12], mouse movement [13], tapping behavior [14], or gait [15], However, these methods cannot either be adopted in smart phones or be suitable for unlocking smartphones. For example, in order to recognize the gait pattern, the user has to walk first or the smart phone to figure out whether he/she is valid [15]. It appears odd and inconvenient for users to perform the behavior as answering a phone call for the purpose of checking his/her emails [11]. (More discussions compared with these works are presented in Section 5). In this paper, we observe that different users wave their smart phones produce distinct features. For example, some persons used to wave their smart phones drastically while some others like to wave in a gentle way. This makes the waving speed and frequency totally different among users. Also, the waving range and the way of wrist twisting are also different from user to user. These patterns derive from user’s physical features and habits. For example, the users with longer arms wave faster and wider than those with shorter arms. Some persons are accustomed to end their waving action with a wrist twisting while some others like to begin with a wrist twisting. Moreover, the gender, age, and occupation also greatly affect the feature of waving actions. On the other hand, we also observe that when a user waves his smart phone, he always shakes in a similar way. This is because, without intentional changes, a specific person tends to follow his habits once the habits are developed. Based on above observations, we propose a handwaving biometric-based approach, called OpenSesame, to unlock the smart phone. Comparing with the existing methods, there are two major advantages of our approach. (i) It is difficult to forge. Using our approach, the authentication process is based on the features of the user’s habits and motions, which is much harder for unauthorized users to obtain. Even if the unauthorized user occasionally peeks at the user’s waving action, it is still difficult to simulate since there are still many distinct but invisible differences of waving actions. For example, users have different strength when waving or twisting. (ii) It is the simple and convenient. Our approach can free users from remembering a large number of passwords or complicated patterns for unlocking their phones, preserved the security and All the user needs to do is just naturally wave the phone for 1 or 2 seconds. However, it is challenging to mine the unique patterns from the user’s handwaving action. First, we should choose appropriate sensors to monitor the user’s waving action. The sensor should be in low cost, easy for wide deployment, and energy-efficient. After careful comparison, we use the 3axis accelerometer. Second, the main difficulty is to extract stable but unique features from the user’s waving action. We project the collected waving data into A-Space and then utilize four waving functions for feature extraction. Furthermore, we employ the support vector machine (SVM) for accurate and fast classification. We develop a prototype of handwaving unlocking system, termed as OpenSesame, and implement into three mainstreaming smart phones. We collect the handwaving traces from 200 volunteers using our app. After comprehensive experiments and tests, the result demonstrates that OpenSesame can accurately verify users via their handwaving with 2 low latency. The remainder of the paper is structured as follows. We characterize the handwaving with a large number of real users’ trace in Section 2. The system design is presented in Section 3 and the experiment results are evaluated in Section 4. We introduce the related work in Section 5. Finally, Section 6 concludes the paper. 2 WAVING C HARACTERIZATION In this section, we introduce the sensor used for waving sensing, real trace collection, and analysis on the data. 2.1 Waving Sensing For precisely characterizing user’s waving actions, selecting appropriate sensors is necessary. As the tremendous growth of MEMS technology, there are many powerful sensors equipped in our smart phone today, such as camera, microphone, proximity sensor, accelerometer, gyroscope, and magnetic sensor etc. In our system, the selected sensor should be able to depict the handwaving. In addition, it should be energy-efficient, stable, cheap, and compatible for wide deployment in most kinds of smart phones. Obviously, the first three sensors cannot capture the phone’s motion. The gyroscope sensor is attractive because it is designed for measuring or maintaining purpose, based on the principles of angular momentum. Unfortunately, this kind of sensor is not a standard equipment in most smart phones due to its high price. The magnetic sensor is usually used for compass, but it tends to be interfered by the mental objects under special environment, like inside the car or subway. In our approach, we finally select the 3-axis accelerometer as our feature detecting sensor. The accelerometer allows smart phones to detect the motion performed on them. The accelerometer in smart phones measures the acceleration of the phone relative to freefall. A value of 1 indicates that the phone is experiencing 1 g of acceleration exerting on it. 1 g of acceleration is the gravity, which the phone experiences when it is stationary. The accelerometer measures the acceleration of the phone in three different axes: X, Y, and Z. Examples of the collected data are shown in Figure 1. 2.2 Data Collection For investigating the uniqueness of handwaving, we collect the waving action data from 200 distinct smart phone users. For each specific user, he is asked to shake the smart phone for more than 10 seconds and repeat for three times. Note that there is no special restriction on user’s waving actions. He can shake the smart phone arbitrarily in each trail. Indeed, we aim at taking insight into the handwaving action but not the motion pattern. The data is collected in two sampling modes: fast and normal modes. In the fast mode, the accelerometer samples every 10 to 20 milliseconds, corresponding to the acceleration value change rate. There are 100 users’ traces collected using this mode. In the normal mode, the sampling interval is 200 milliseconds and 100 users’ traces are sampled. Clearly, using JOURNAL OF LATEX CLASS FILES, VOL. 6, NO. 1, JULY 2014 3 normal sampling mode of accelerometer loses some data, but saves energy. We will compare these two modes in the evaluation section. All the raw waving action are recorded as a sequence of tuples represented as (xt , yt , zt ), where x, y, z donate the acceleration along the x-axis, y-axis and z-axis respectively, and t donates the time. As a result, we totally collect 600 files containing 389, 373 raw tuples. 2.3 Waving Measurement To show the uniqueness of handwaving in intuition, we display four users’ traces in Figure 1. The traces are illustrated in a 3-D acceleration space, short for A-Space, where the raw tuple (xt , yt , zt ) are connected in time order. Both the Figure 1(a) and Figure 1(b) are generated from two trails of a volunteer. We can see that the two shapes are very similar. The last three figures come from three distinct persons. Figure 1(c) is plot as a circle, Figure 1(d) resembles a river, while the shape in Figure 1(e) is in the shape of crescent. From these figures, we can observe that the handwaving biometrics are unique for a certain user. A given user presents very simple shape results on different trails. Moreover, different users have clearly different results. The challenge here is how to measure the handwaving represented in A-Space. We should transform the A-Space representation into a parameterized and comparable feature vector. For this purpose, we define the waving function to measure the global geometric properties of the waving shapes, which is formally given by: f = S(A) (1) where A = {(xt0 , yt0 , zt0 ), (xt1 , yt1 , zt1 ) · · · , (xtn , ytn , ztn )}. A is a set of raw waving tuples collected during t0 and tn . The waving function considers A as input and outputs a feature vector f . A good waving function should have the following properties: • Efficiency: Since shape function will be performed in the smart phone, it should be simple enough to be fast and efficiently function. • Invariance: In most time, the smart phone is working in mobile environments. The waving function should be insensitive to the position or direction change of smart phones. • Robustness: Although the waving data generated by one person is similar, there always exist many noises and the sampling time is variable. Hence, the waving function should be robust to noise, blur, cracks, and dust in the waving. For meeting above four requirements, we propose four waving functions, S1 , S2 , S3 , S4 , as follows: • S1 : The centroid C is computed first and then two random points A and B in the A-Space are chosen. The angle ∠ACB among these three points are measured. The selection of random points is repeated for N times. At a result, N angles output and the corresponding PDF of these angles is reported as the feature vector. S2 : This waving function is similar to the S1 . The difference is that all of these three points are randomly selected. One angle among the three angles formed by these three points is recorded. As the result, the corresponding PDF of these angles is given for the feature vector. • S3 : While both S1 and S2 concentrate on the angle parameter, the other two waving functions, S3 and S4 , focus on the distances among the points. S3 randomly selects N points and calculates the Euclidean distance between the centroid and these N selected points. Finally, the corresponding PDF of distances is calculated as the feature vector. • S4 : Randomly selects N pair of points and calculates their Euclidean distance. The PDF of these distances is the feature vector. The results of above four waving functions are demonstrated in Figure 2, with the input of four users’ waving data shown in Figure 1. From the figures, we can see that all four waving functions behave well. These four waving functions are chosen mostly for their simplicity and invariance. In particular, they are fast to compute, easy to understand, and simple to produce distributions. Despite their simplicity, we find these general purpose waving functions tare fairly distinguishable. They are robust because the probability that noises are selected is very low and hence their performance will not be affected. Third, these four functions are invariant to rotation and scaling because both the angle and distance is irrelevant to directions and positions of waving. • 2.4 Waving Matching Keeping in mind that our goal is to determine whether the screen should be unlocked according to a given waving action and the pre-defined one. We formalize the similarity of two waving actions by means of the distance between their feature vectors. Since the feature vectors are PDF of distributions, we divide the whole range of PDF into discrete bins and the average value is calculated regarding to each bin. As a result, the discretized PDF, f = [p1 , p2 , · · · , pn ], is considered the feature vector where pi denotes the probability of falling into the ith bin. Definition 1 (Similarity): Given two arbitrary feature vectors, f1 = [p1 , p2 , · · · , pn ], and f2 = [q1 , q2 , · · · , qn ], their similarity is defined as D(f1 , f2 ) = n X |pi − qi | i=1 where D(f1 , f2 ) ∈ [0, 2]. The smaller similarity means two features are very close and vice versa. We select 6 users randomly and each user conducts 3 trails. The waving function S4 is employed here to measure the handwaving. As a result, there are 3×6 = 18 features after using by S4 . Their similarity are plotted as a visualized similarity matrix in Figure 3. In the matrix, the darkness of each elements (i, j) is proportional to the magnitude of the computed similarity between the ith and j th features. Darker elements represent better matches, while lighter elements indicate worse matches. The matrix is symmetric. JOURNAL OF LATEX CLASS FILES, VOL. 6, NO. 1, JULY 2014 4 2 0 8 4 2 6 0 0 2 25 -4 15 - 5 -1 0 20 10 15 20 5 1 25 20 -2 ) 2 5 Y( m (c) User 2 /s -5 2 ) /s 15 20 ) -2 0 5 0 2 25 1 0 -5 /s Y( m 0 Y( m 5 0 2 0 1 5 -1 0 (m 1 - 1 5 ) ) (b) User 1 (Test 2) 0 2 2 -1 5 /s /s ) ) (a) User 1 (Test 1) 4 2 (m (m 2 2 /s /s -1 0 -1 5 1 2 1 0 6 X X (m (m -1 0 8 -1 0 X - 1 0 X X - 5 -1 5 -1 5 Y( m 0 2 0 ) /s 0 0 - 5 0 -2 0 0 - 5 0 -1 0 5 5 1 5 0 1 0 5 1 6 1 4 1 0- 1 5 -2 0 5 ) -2 1 5 1 0 -1 0 -4 /s -1 5 1 0 -5 0 -2 2 2 0 -5 - 2- 2 2 0 5 0 4 0 0 1 0 15 2 2 1 0 6 2 Z (m /s ) 4 1 2 2 6 ) 4 2 Z (m /s ) 2 Z (m /s ) 2 Z (m /s ) 6 1 5 8 1 4 8 8 1 0 1 6 2 Z (m /s ) 1 0 2 0 1 2 1 8 1 0 /s 1 2 1 2 Y( m 1 4 (d) User 3 (e) User 4 Fig. 1: 3-D Acceleration Space 0 .0 6 U s e U s e U s e U s e U s e 0 .0 3 5 0 .0 3 0 0 .0 2 5 r 1 T e s t 1 r 1 T e s t 2 r 2 r 3 r 4 0 .1 6 U s e U s e U s e U s e U s e 0 .0 5 0 .0 4 r 1 T e s t 1 r 1 T e s t 2 r 2 r 3 r 4 0 .0 8 U s e U s e U s e U s e U s e 0 .1 4 0 .1 2 r 1 T e s t 1 r 1 T e s t 2 r 2 r 3 r 4 0 .0 6 0 .0 3 r 1 T e s t 1 r 1 T e s t 2 r 2 r 3 r 4 0 .0 5 P D F (% ) 0 .0 1 5 P D F (% ) P D F (% ) P D F (% ) 0 .1 0 0 .0 2 0 U s e U s e U s e U s e U s e 0 .0 7 0 .0 8 0 .0 6 0 .0 4 0 .0 3 0 .0 2 0 .0 1 0 0 .0 4 0 .0 2 0 .0 1 0 .0 0 5 0 .0 2 0 .0 0 0 0 .0 0 0 2 0 4 0 6 0 8 0 1 0 0 1 2 0 In te rv a l (a) S1 1 4 0 1 6 0 1 8 0 2 0 0 0 .0 1 0 .0 0 0 2 0 4 0 6 0 8 0 1 0 0 1 2 0 1 4 0 1 6 0 1 8 0 2 0 0 0 .0 0 0 5 1 0 1 5 2 0 2 5 3 0 0 1 0 2 0 3 0 In te rv a l In te rv a l In te rv a l (b) S2 (c) S3 (d) S4 4 0 5 0 6 0 Fig. 2: Probability Density Functions with Variant Waving Functions • • • • • Fig. 3: Similarity Matrix for 6 distinct users with 3 trails Definition 2 (Self-similarity): The self-similarity is the distance of two feature vectors extracted from two hand waving generated by a same user. Especially, if the two features come from a same waving instance, they are equal and their similarity equal zero. Obviously, the elements lying in the diagonal line are the darkest because their distances equal 0. For each user, there are 3 × 3 = 9 elements for self-similarity measurement. From the figure, we can see that the self-similarity always maintains an acceptable darkness and is fully distinguishable from other users’ features. 3 O PEN S ESAME In this section, we present our unlocking method for smart phone called OpenSesame. 3.1 Overview OpenSesame consists of four components: sensing, filter, fetcher, classifier, and matcher. Sensing: This component is straightforward used to record the user’s handwaving action data. Filter: In practice, we find that there always exist some silent periods when no waving or very low level sensing data is detected. For better feature extraction, we use filter component to wipe out the silent periods. Fetcher: The filtered raw tuples is feeded into fetcher component in which four waving functions are applied to fetch the waving features. Classifier: To discriminate the authorized users and unauthorized users, the Support Vector Machine (SVM) is employed in our system for classification. Matcher: In the last component, the extracted feature is used to determine whether it matches the pre-defined one. 3.2 Filter Figure 4(a) shows 12 seconds of data acquisition. We find three special periods in which the waving values are too low to be detected. We can regard such periods as the silent periods. The silent periods may exist at the initial stage before the user shakes his smart phone, or in the final stage after the user stops his waving. The period may also be observed in the intermediate stage when an unexpected user’s pause occurs. Since the silent periods will seriously affect the accuracy of OpenSesame, we must filter those data captured during this periods. The ith raw tuple with composed acceleration value Ai is wiped out if it satisfies the equation: i+b X (Ax − x=i−b i+b X y=i−b Ay 2 ) < α, 2b + 1 (2) where b is called the tolerant static period, representing the amount of acceleration points used to determine the stability of an acceleration point. The α is the threshold to filter the silent points. Based on our algorithm, the filtered data is illustrated in Figure 4(b). JOURNAL OF LATEX CLASS FILES, VOL. 6, NO. 1, JULY 2014 5 data, we select an acceleration point Pk and form the input with the subsequence of w continuous acceleration points {Pk , Pk+1 , Pk+2 , ..., Pk+w−1 }. Then we apply the waving function on this input and deliver the PDF of the feature vectors to describe the feature of the waving action. 3 0 2 5 A c c e le r a tio n 2 0 1 5 1 0 3.4 5 0 In te r m e d ia te s ta g e In itia l s ta g e 0 2 0 0 0 4 0 0 0 6 0 0 0 8 0 0 0 F in a l s ta g e 1 0 0 0 0 1 2 0 0 0 T im e ( m s ) (a) Before filtering 3 0 2 5 A c c e le r a tio n 2 0 1 5 1 0 5 0 0 5 0 0 0 1 0 0 0 0 T im e ( m s ) (b) After filtering Fig. 4: Comparing the features before and after filtering 3.3 Fetcher After the filter component, we need to generate the feature vector of the user’s handwaving action. According to Section 2.3, the field set of the acceleration points can be treated as one single input of waving function, and the waving function can be applied to this input to generate the feature vector. However, using the field set as an input has two shortcomings. First, the amount of acceleration points in a field set is large, usually more than 1000. In order to generate a representative feature vector for the waving action data, an extremely large number of feature vectors are required. In this way, the system overhead is high and affects the normal operation of the smart phone. Second, to unlock the smart phone, the user is required to shake his smart phone for a period to generate same amount of waving data. However, it is inconvenient to ask the user to shake the smart phone for such a long time period to generate more than 1000 acceleration points for each time he wants to unlock his phone. Therefore, the amount of acceleration points selected as an input needs to be reduced. According to our observation, the waving action of user always shows the property of repeating. In fact, the input waving action can be regarded as a series of small repeating waving actions which are very similar. Therefore, we can select a continuous sequence of acceleration points with a reasonable amount as an input to the waving function. Feature vectors can be generated from these small inputs with low data loss. We generate the feature vectors as follows: we first select a window with size w, where w is much smaller than the size of the field set of data. From the field set of Classifier The feature classifier is designed to generate a standard to discriminate authorizeds user and unauthorized users with the feature vectors of the input waving action data. In OpenSesame, the support vector machine, SVM for short, is selected as the classifier. The SVM classifier is used to classify a group of linear-inseparable training tuples into two classes. Training tuples for SVM input is donated as {v, y}, where v is the attribute vector used to describe the attributes of the training tuple, and y is the label of the training tuple, which represents the actual class it belongs to. The basic idea of SVM is to transform these attribute vectors of training tuples into a higher dimensional space to make the training tuples linear-separable. Then the training tuples can be separated into two classes by a hyperplane. The SVM classifier classifies the training tuples based on this hyperplane, attempting to classify training tuples with same label into same class. Then a classification model is generated to describe the classification standard of a given tuple. Inputting an unclassified tuple into the SVM classifier using the generated classification model, the tuple can be predicted which class it most probably belongs to. In OpenSesame, the label of the training tuple is either +1 or −1. When y = +1, the tuple is generated from the class of unauthorized users. On the contrary, y = −1 means the tuple belongs to the authorized user’s class. The attribute vector v is generated from the feature vector we gain from Section 3.3. The attribute vector can be represented as [a1 , a2 , ..., an ]T . Here, ai is ith property of the training tuple, which represents the ith value in the feature vector. By injecting enough amount of training tuples into the SVM classifier, a classification model can be achieve to verify the authentication data of user. 3.5 Matcher The matcher component is performed when the user activates the authentication interface of OpenSesame and wants to unlock the smart phone. The user shakes the smart phone to input his waving action as the authentication data. Feature vectors of the input waving action is generated and used to verify whether the user is the authorized user. If so, the access query is accepted and the smart phone is unlocked. If not, the access query is denied and the smart phone keeps locked. The most important requirement is that the feature matching phase has to be processed within a short time period, say 1 or 2 seconds. The reason is that users always expect the unlocking process to be fast and convenient. If the feature matching time is long, the inconvenience overweighs the security of our approach and the users may decide to give up our system. To reduce the response time, two aspects need to be considered. The first issue is to reduce the amount of repetition when doing authentication. This can be achieved by reducing the false negative rate of authentication, which is going to be JOURNAL OF LATEX CLASS FILES, VOL. 6, NO. 1, JULY 2014 OpenSes ame OpenSes ame Unl ocki ng 6 OpenSes ame Accessdeni ed! Accessaccept ! Cost and γ for the kernel function via the cross-validation when generating the training model. 4.2 x:0. 25878862 y:2. 901 134 z:8. 989429 (a) Screen locking (b) Access denied (c) Access accepted Fig. 5: The UI of OpenSesame discussed in the experiment section. The second issue is to reduce the waving time in the matcher component. As we designed in the fetcher component, by using a small waving function input with window size w, the waving time can be reduced to the time period for collecting w acceleration points. Since w is much smaller than the size of the field set of acceleration points. Therefore, the waving time can be reduced to a tolerant range. Normally, since the waving time is short, we assume that there is no pause in the middle of the waving action to reduce the complexity of filter. To detect the initial record feature point, stability of the ith point Pi we calculate Pithe real-time Ay 2 as x=i−b (Ax − y=i−b b+1 ) . Once the real-time stability value is greater than the threshold, acceleration point Pi is set to be the initial point, and the waving action detection terminates when acceleration point sequence {Pi , Pi+1 , ..., Pi+w } is recorded. Applying the same waving function to this sequence, we can generating the predict tuple with attribute vector [a1 , a2 , ..., an ]T . By inputting this predict tuple into the SVM classifier with the classification model we delivered in classifier component, the SVM classifier decides which class the input tuple most likely belongs to. When the input tuple is classified into the authorized user set, the authentication is successfully done and the smart phone is unlocked. Otherwise, the smart phone requires another authentication try. 4 I MPLEMENTATION AND E VALUATION In this section, we present the implementation of OpenSesame and evaluate its performance. 4.1 Implementation App We implement OpenSesame in Android-based smart phones. The version of Android system is 2.3.3. the app is developed with Android-SDK using Java SE. Figure 5 shows the GUI of our app. With this app, the user’s handwaving data is collected and analyzed by the smart phone. Specifically, the interfaces shown in Figure 5(b) and Figure5(c) are used to notice whether the unlocking access is success or not. We use the open source library tool, LIBSVM [16], to perform the classification of SVM. LIBSVM is an integrated software for support vector classification. The version we used is LIBSVM-3.12. During our experiments, we use the default kernel function (Gaussian Radial Basis Function) and find the best setting of parameters Metrics We evaluate OpenSesame in terms of the authentication accuracy. The authentication accuracy is measured via the following metrics: • False Negative Rate (FNR): The probability that an authorized user is treated as an unauthorized user. This rate is indeed the ratio of the number of incorrect authentications conducted by an authorized user to the number of his authentication attempts. • True Positive Rate (TPR): The probability that an authorized user is successfully verified. This rate derived from the ratio of correct authentication times of an authorized user to the number of his authentication attempts. • False Positive Rate (FPR): The probability that an unauthorized user is treated as an authorized user. This rate is obtained from the ratio of the incorrect authentication times of an unauthorized user to the number of his authentication attempts. Note that FNR and TPR are related to the convenience of users when they use our system, where the authorized user can successfully unlock the smart phone by a single try. The FPR reflects the security of the OpenSesame, where the unauthorized user should be denied to unlock the smart phone. 4.3 Experiment Setup For investigating the uniqueness of handwaving, we collect the waving action data from 200 distinct smart phone users. The subjects producing these datasets are randomly selected in different public places, including railway station, university library, and stadtpark. When collecting the waving action data, three smart phones from different brands are used. For collecting each specific users handwaving data, he is asked to act with the following instruction: The user first randomly selects one of the three smart phones we provided, and holds this smart phone, which is running our data collection app, in his accustomed way. Then he pushes the button of ‘start’ on the screen and begins to wave the smart phone until the hint sound is played by the smart phone. This waving process lasts for more than 10 seconds. The user repeats the above action for three times to terminate the data collection. Note that there is no special restriction on users waving actions. He can wave the smart phone arbitrarily in each trail. Indeed, we aim at taking insight into the handshaking action but not the motion pattern. Overall, 389,373 raw tuples are captured from 200 distinct users, with an average 1,947 raw tuples per user. Each user performs the handwaving for three trails while each trail persists 10 ∼ 20 seconds. For each user, the training data will be extracted from the first two trails, while the testing data will be retrieved from the last one. Therefore, there is no overlap between the training data and testing data. The classification is based on self and non-self discrimination. For a given user, JOURNAL OF LATEX CLASS FILES, VOL. 6, NO. 1, JULY 2014 7 1 0 0 0 .9 9 0 0 .8 8 0 F a ls e N e g a tiv e R a te ( % ) 1 .0 F a ls e N e g a tiv e R a te 0 .7 0 .6 0 .5 0 .4 0 .3 0 .2 0 .1 1 0 0 tr a in in g tu p le s 2 0 0 tr a in in g tu p le s 4 0 0 tr a in in g tu p le s 7 0 6 0 5 0 4 0 3 0 2 0 1 0 0 .0 0 S 1 S 2 S 3 S 4 0 1 0 2 0 S h a k in g F u n c tio n 4 0 5 0 (a) False Negative Rate (a) False Negative Rate 1 0 0 0 .9 9 0 0 .8 8 0 F a ls e P o s itiv e R a te ( % ) 1 .0 0 .7 F a ls e P o s itiv e R a te 3 0 W in d o w S iz e 0 .6 0 .5 0 .4 0 .3 0 .2 0 .1 1 0 0 tr a in in g tu p le s 2 0 0 tr a in in g tu p le s 4 0 0 tr a in in g tu p le s 7 0 6 0 5 0 4 0 3 0 2 0 1 0 0 .0 0 S 1 S 2 S 3 S 4 0 S h a k in g F u n c tio n 1 0 2 0 3 0 4 0 5 0 W in d o w S iz e (b) False Positive Rate (b) False Positive Rate Fig. 6: Impact of waving functions Fig. 7: Impact of windows size 1 .0 the training data is composed of negative samples belonging to this user, and an equal number of positive ones from others. Impact of Waving Functions There are four waving functions to parameterize the A-Space representation of handwaving. In this experiment, we select 30 users’ handwaving and maintains the window size as 50 tuples. Figure 6 plots the FNR and FPR for the four waving functions. From the Figure 6(a), we observe that the average FNR using S1 and S2 are around 20% while the values are below 10% using S3 and S4 . The similar observation is obtained on FPR, as shown in Figure 6(b). This shows that the distance-based waving functions perform better than the angle-based ones. We further focus on the distance-based waving functions. S3 and S4 have close FNRs and FPRs. However, the variance of S4 is smaller than that of S3 , which means S4 is more stable than S3 . 4.5 0 .8 T r u e P o s itiv e R a te 4.4 0 .9 Impact of SVM Window size is an important factor. For capturing enough windows, we require the users to shake their phones in a acceptable time period. A large window size will prolong the waving time period for unlocking and seriously affect user experiences. But a small window size will influence the identification accuracy. We change the windows size from 5 to 50 with the increment of 5 and employ S4 for testing. The result is shown in Figure 7. The average FNR decreases from 20% to 8% and the average FPR reduces from 42% to 18% as the window size increases. This shows that the larger 0 .7 0 .6 0 .5 0 .4 0 .3 0 .2 F a s t S a m p lin g M o d e N o r m a l S a m p lin g M o d e A c c e le r o m e te r S a m p lin g M o d e Fig. 8: Sampling mode window helps improve the accuracy. This is because that more raw tuples are extracted in a larger window and the user’s handwaving is better characterized. The number of training tuples also affect the accuracy. As illustrated in Figure 7, FNR is approximately reduced by 50%, i.e. from 15% to 8%, when window size is 50. This reduction is even obvious with small window size. On the other hand, the average FPR only reduces from 20% to 15% taking 5% off when window size is 50. This shows that FPR is less sensitive to the number of training tuples. 4.6 Impact of Sampling Rate Accelerometer in smart phones has variant modes of sampling. With different sampling modes, the collection of data can be much different. In this experiment, we test the OpenSesame both in fast sampling mode and normal sampling mode. It can JOURNAL OF LATEX CLASS FILES, VOL. 6, NO. 1, JULY 2014 8 1 0 0 2 Z (m /s ) 4 -2 0 0 Y( m/ s 20 20 1 25 10 2 ) Y ( m/ s - 1 4 1 4 ) 25 2 ) -2 1 2 5 0 7 0 - 7 /s ) 20 15 -5 0 5 -8 (m 2 /s 15 1 2 X (m 2 /s 4 0 - 4 ) 8 4 0 -8 /s 1 0 0 - 4- -1 1 8 X (m 10 X - 6 2 1 2 0 - 1 2 1 6 ) 6 0 -1 -1 5 0 - 2 0 -5 -5 6 0 0 -4 0 2 4 Y( m 5 0 P e rc e n ta g e (% ) 4 8 2 Z (m /s ) 2 Z (m /s ) 1 0 8 0 8 1 2 1 5 F a ls e N e g a tiv e R a te F a ls e P o s itiv e R a te (a) A-Space representation 1 0 0 2 0 S ta n d in g L y in g O n th e S id e 0 .0 5 S ta n d in g L y in g O n th e S id e 8 0 0 .0 4 1 2 3 4 5 S p e e d (m /s ) 0 .0 3 P D F 0 C u m u la tiv e R a te 0 0 .0 2 Fig. 9: User’s motion 6 0 4 0 2 0 0 .0 1 0 .0 0 0 0 1 0 2 0 3 0 4 0 5 0 In te rv a l 6 0 0 .7 5 0 .8 0 0 .8 5 0 .9 0 0 .9 5 1 .0 0 T r u e P o s itiv e R a te 0 .3 0 (b) Feature PDF via S4 (c) CDFs of TPR F a ls e N e g a tiv e R a te 0 .2 5 Fig. 11: Impact of phone’s orientation 0 .2 0 0 .1 5 0 .1 0 0 .0 5 0 .0 0 S m a rt P h o n e A S m a rt P h o n e B S m a rt P h o n e C S m a rt P h o n e Fig. 10: Phone Brand reach a very high 90% average accuracy in the fast sampling mode while the number is 55% with normal sampling mode. Losing part of waving data with low sampling rate is the major reason for the poor performance. 4.7 Impact of User Motion As mentioned before, our approach should be insensitive to the user’s motions because the smart phone is mainly used in mobile environment. Clearly, the user motion will introduce many noises. In this experiment, we test the relationship between the speed of user’s motions and the accuracy. Five user’s motions are considered: stationary, walking slow, walking fast, running, and taking a vehicle. The result is shown in Figure 9. From the figure, we can see that as the speed growing from 0 m/s to 5 m/s, the FNR is steady around 11%, with a standard deviation of 2.0%. This indicates that the motion of users makes a very limited effect on our approach. Besides, the FPR is also invariant when the speed of user’s motion increases. The false positive rate is around 15% with a standard deviation of 2.5%. It can be further obtained from Figure 9 that, the FNR has an slightly increase, about 7%, when the speed of user increases from 0 m/s to 5 m/s. This can be understood because the faster motion will increase vibration in his smart phone leading to more noisy. However, these motion has very limited effect on the accuracy. 4.8 Impact of Phone Diversity Nowadays, there are plenty of smart phone brands, such as iPhone, MOTO, SAMSUNG, HTC, etc. To promote the OpenSesame to smart phone users, one crucial issue is whether the OpenSesame can be well adapted to different brands of phones. The most effective factor on different smart phones is the type of accelerometer equipped. For different types of accelerometers, the level of sensitivity is different. Hence, the waving data collected is inequivalent. In this experiment, three different brands of phones are tested. For these three brands, the order from low to high based on the accelerometer is Phone A, Phone B, and Phone C. 40 sets of trials are tested on each smart phone and the FNR is reported in Figure 10. From the figure, we can see that the Phone C achieves the lowest FNR and Phone A has the worst value. That is because more sensitive accelerometer can collect more fine-grained data, which reflects more complete feature from waving actions. The average FNRs of three smart phone are below 10%, which is all acceptable in practice. Therefore, The OpenSesame can be well adapted to different brands of smart phones. 4.9 Impact of Smart Phone’s Orientation Although the waving habit may be similar for an identical user, the postures of users when waving the smart phone can change the orientation of the phone. In this section, we evaluate OpenSesame with variant phone’s postures. In this experiment, three user’s postures are tested: • Standing: waving phone when standing on the ground. We consider the standing as a normal posture. • Lying: waving phone when lying on the bed. The waving orientation is rotated 90 degrees upward. • On-the-side: waving phone when sleeping on the user’s left side. The waving orientation is rotated 90 degrees to the left. The results are shown in Figure 11. In the figures, we illustrate the A-Space representations of waving data by the three postures in Figure 11(a). Intuitively, these tree trails are similar, all like a shape of crescent, but having different orientation. Our approach should be insensitive to the rotation. We transform the waving from A-Space to feature PDF, shown in Figure 11(b), by means of waving function S4 . As we JOURNAL OF LATEX CLASS FILES, VOL. 6, NO. 1, JULY 2014 9 1 0 0 2 .0 1 .5 6 0 N o r m a liz e d S im ila r ity C D F (% ) 8 0 4 0 2 0 D is ta n c e to id e n tic a l u s e r D is ta n c e to d is tin c t u s e r s 1 .0 0 .5 0 0 .0 0 .2 0 .4 0 .6 0 .8 1 .0 1 .2 1 .4 1 .6 1 .8 0 .0 D is ta n c e C 1 C 2 C 3 C 4 C a s e s Fig. 12: Distances (a) OpenSesame 4.10 Discrimination We consider the OpenSesame’s capability of discrimination among different users. One user’s trace is selected and his similarity compared to other uses is calculated. The result is shown in Figure 12. From the figure, we can see that selfsimilarity is approximately bounded under 0.3, and 90% of the distances are lower than 0.25. Being different with the self-similarity, the distance between the given user and others is obvious. Only 8% of the distances are lower than 0.2, and about 20% of the distances are larger than 1.0. Hence, the discrimination of distinct users and recognition of identical users can be achieved. Although the percentage of small distances between distinct users’ features is low, it may still affect the accuracy of the OpenSesame. It is necessary to find out the reason of the failure in discriminating the distinct users’ features. In Figure 13, three users’ A-Space representation are randomly selected. For each row, the top four similar users’ A-Space representations are listed. From these figures, we can find that the similar A-Space representations cause small distance of users’ features. For extremely close A-Space representations, such as the second figure in the first row, the distance is very small, e.g. 0.074. With higher dissimilarity of A-Space representations, for instance the last figure, the distance is larger, e.g. 0.147. Since the A-Space representation can reflect the waving action on the smart phone, we can draw the 1 .0 0 .8 N o r m a liz e d S im ila r ity expected, the difference of these three PDFs is very slight. In details, the distance between standing posture (the normal posture) and the lying posture/on-the-side posture are 0.172 and 0.173, respectively. We believe these distances are small enough for the trails to be treated as coming from an identical user. Furthermore, We conduct one trail in standing posture and store the corresponding result feature vector in our smart phone. Then we attempt to unlock the smart phone in the three postures. Each posture is repeated 30 trails. Finally, the CDF of accuracy is displayed in Figure 11(c). For the standing posture, 20% trails have an accurate rate lower than 90%, while 20% of lying posture and on-the-side posture have accurate rate lower than 86% and 76%, respectively. Meanwhile, 20% lying postures and 45% on-the-side postures have their accurate rates higher than 90%. This experiment fully demonstrates that our approach is phone-orientation-insensitive. 0 .6 0 .4 0 .2 C 1 C 2 C 3 C 4 C a s e s (b) DTW Fig. 14: The normalized similarities under four cases using DTW and OpenSesame. conclusion that for the users with similar habit of waving action, the probability of failure for the OpenSesame increases. Fortunately, referring to Figure 12, such kind of probability is low and OpenSesame therefore performs well as expected. 4.11 Comparison with DTW The Dynamic Time Wrapping (DTW) is a well-established technique from speech processing, which is used to measure the similarity between two temporal sequences which may vary in time or speed. The advantage of DTW is that it can well deal with the misalign of points in the temporal sequences. DTW is only suitable for the case in which the user must wave his/her smart phone along a fixed, secrete and pre-defined movement. However, we pursue that the users are able to shake their phones in wider free movements in terms of their daily habits. In this situation, the DTW has following two major technical limitations compared with our shaking functions. First, the data acquired from the accelerator highly depends on the smart phone’s orientation. To maintain the similar shaking sequence for DTW identification, the users have to keep the same orientation as trained. Second, DTW cannot deal with the existence of noise, blur, cracks, and dust in the shaking data. Four kinds of waving functions we proposed are based on the statistics, being able to well address above issues. To further compare the performance of DTW and OpenSesame, we let the user perform the following four trails: JOURNAL OF LATEX CLASS FILES, VOL. 6, NO. 1, JULY 2014 10 1 8 1 6 1 6 1 6 1 4 1 2 8 8 8 0 0 0 -8 -1 6 -6 1 6 8 0 0 0 0 1 6 -2 0 8 0 2 Y( m 0 10 10 /s ) 2 Y( m 0 -2 4 20 -2 4 20 20 /s ) 2 10 10 /s ) 0 20 Y( m 0 Y( m /s Y( m 0 10 ) 20 2 ) - 1 6 /s 2 (b) 0.114 (m - 1 6 /s ) -2 4 - 8 X (m 2 ) ) (a) 0.074 2 0 - 1 6 /s 2 /s 2 /s - 1 6 -2 4 - 8 X (m (m (m - 1 6 -2 4 - 8 X - 8 X X - 8 /s ) 2 ) 2 1 6 -2 0 8 0 -1 0 -1 0 -1 -1 6 1 6 -2 0 8 0 -1 -2 0 -1 1 6 8 -8 -1 6 -1 4 0 0 -8 -7 -2 0 2 Z (m /s ) 6 2 Z (m /s ) 0 2 Z (m /s ) 2 Z (m /s ) 2 Z (m /s ) 7 (c) 0.161 (d) 0.162 2 0 1 4 1 6 1 5 1 5 1 6 7 8 -8 - 2 0 0 1 2 6 0 -1 -8 2 Y( m 20 1 6 1 5 1 2 0 1 0 2 Z (m /s ) 2 Z (m /s ) 6 10 (d) 0.120 2 0 7 2 Z (m /s ) 2 Z (m /s ) 2 Z (m /s ) 0 -1 5 20 (c) 0.117 1 4 1 2 ) 2 ) 0 15 10 -1 5 25 20 Y( m 0 1 (b) 0.115 1 8 /s -1 0 0 1 15 /s 5 5 0 /s Y( m /s 10 20 ) 20 2 ) -3 /s 2 /s -1 2 - 1 0 (m ) - 1 0 (m Y( m 0 ) -5 2 0 2 0 8 0 - 5 X /s ) ) - 9 (a) 0.103 1 6 5 -2 0 0 - 5 X 2 /s 2 /s 15 (m 0 3 X (m (m - 6 -1 2 1 0 5 -2 0 /s 0 - 3 X X 5 -5 ) 0 - 4 - 8 1 0 0 9 -1 0 2 -1 5 2 -1 0 -5 -1 0 0 -5 1 5 6 3 ) 4 -1 5 5 4 9 -1 5 8 2 - 2 0 8 -1 6 1 2 -5 2 Z (m /s ) -7 0 -1 4 0 2 Z (m /s ) 0 1 2 Y( m 5 2 Z (m /s ) 2 Z (m /s ) 2 Z (m /s ) 1 0 1 0 5 0 8 4 -7 0 0 -1 4 -5 2 0 2 ) 2 5 5 1 0 1 15 -1 8 25 20 25 (b) 0.128 (c) 0.139 -2 4 20 15 15 20 25 0 0 1 Y( m Y( m 5 -2 4 Y( m 0 2 ) 10 20 ) Y( m/ s 0 Y( m - 1 6 ) -2 1 /s ) - 8 0 0 -1 /s 8 -1 0 2 2 15 1 6 -1 5 /s - 1 2 /s 20 - 2 0 (m (m ) (a) 0.118 - 1 8 ) 2 /s 25 - 6 -5 ) -5 0 -1 0 X 0 6 -1 5 X 5 2 0 2 (m ) - 1 4 - 1 2 /s - 7 X 2 /s 10 0 - 6 (m (m -1 2 -56 -1 0 X X - 6 -1 5 1 2 ) 7 0 2 -1 1 4 -2 0 1 2 -5 6 0 - 2 0 0 -1 2 1 2 -1 5 0 -2 0 2 1 /s 2 4 1 8 /s -6 -1 6 (d) 0.147 Fig. 13: Top 4 Similar A-Space Points and the Distances to the Reference A-Space Points Case 1 (C1): The user waves his/her smart phones as trained. • Case 2 (C2): The user waves the smart phone as the mode he/she gets used to but not required as same as trained. • Case 3 (C3): The user waves his/her smart phone as trained but the orientation of smart phone is reversed. • Case 4 (C4): A second user attempts to wave the same smart phones as his habit. The normalized similarities using DTW and waving functions are shown in Figure 14. We observe that (1) The normalized similarities from Case 1 to Case 3 are almost below 0.5, showing that whatever the user how to wave his/her phone, the self-similarities always maintain under an acceptable level. When changing user in Case 4, the similarity exceeds the threshold of 0.5, resulting a unlocking rejects. (2) When the user waves his/her smart phone not as trained, even just reversing the orientation, the normalized similarities are much higher than that of Case 1. In summary, the system can well distinguish different users whatever using OpenSesame or DTW. However, the DTW requires the user must wave his/her smart phones as trained. 6 • 4.12 Usability We also conducted some filed trails using our prototype to evaluate the usability of our system. We invited about 10 college students who install our system and unlock their phones through OpenSesame. We measure the overall time they take to unlock the screen and ask for their feedback on our prototype. Different phone models are used in experiments, including HTC One, Xiaomi 2, Nexus 5, Huawei C8815 and Sony Xperia. 5 Time (seconds) 4 3 2 1 0 User1 User2 User3 User4 User5 User6 User7 User8 User9 User110 fi Fig. 15: Time consumption First, we collect the average and standard deviation of the time consumption for unlocking their smartphones. We see that it takes lower than 3 seconds by 6/10 users to unlock their smart phones. Compared with the slide-to-lock or PIN (taking about one second), the OpenSesame does not improve the unlocking. However, the savings come from (1) the simplified user interface as users do not need to take off the gloves for touch screen, or remember some complex passwords. (2) the security is also promoted in some extent. Second, we ask the volunteers to fill the questionnaires in terms of learning curve, user-friendly, security and accessibility. The volunteer gives a score ranging from 1 to 5 for each item. The results are shown in Table 1. We can see that all the users indicate that our solution is very easy to use and intuitive, with almost no learning curve. This is the key value of OpenSesame, which we think is even more important than speed improvement. However, the user have a little concerns about the security. It is reasonable because each JOURNAL OF LATEX CLASS FILES, VOL. 6, NO. 1, JULY 2014 TABLE 1: Trial Experience mean stdev Learning curve 1.2 0.5 Userfriendly 4.8 1.5 Security Accessibility 3.6 1.1 4.8 1.3 new technology has a process to be accepted. We believe that these concerns will gradually disappear as the OpenSesame is more widely accepted. 5 R ELATED W ORK This section reviews the related work. Accelerator based Authentication: A work parallel to ours is that Conti et al. propose to adopt the movement the user performs when answering a phone call to authenticate the user of a smartphone, which utilizes two kinds of components, accelerometer and orientation sensors, in smart phones [11]. Their work has following three major technical limitations compared to our work. First, their method in fact highly depends the phone’s trajectory, related to the phone’s movement parameters, such as the start position, end position, orientation and velocity. As long as the system learns the trajectory when the user picks up the phone from the pocket and moves to his/her ear, other trajectories, like the movement from the desktop to ear, will be rejected. On the contrary, our method concentrates on the human’s inherent characteristics, like the length arm and wrist size, among different users that leads to the waving differences. Thus, we don’t need the user to perform specific movements. Second, our four kinds of waving functions are designed to be invariant to the position or direction changes of smart phone. The user can wave the phones starting or ending at arbitrate positions. Importantly, our approach allows the existence of noise, blur, cracks, and dust in the shaking. Therefore, our approach provides much more freedom to user compared with theirs. Third, their method needs the orientation sensors, which are not fully supported by all smartphones, especially among lowgrade mobile phones. The second work parallel to ours is to identify users based on a secrete movement pattern measured by the accelerator sensor [17] and [18]. Liu et al. aims at identifying users based on a secrete movement pattern [17]. e.g. moving the phones as if to draw an ‘8’ in the air where ‘8’ is a secrete. Similarly, Okumura et al. asks the tester to grasp the device int the same way and shake it simple up and down in direction of y-axis 5 times continuously [18]. Being similar to the tranditional methods like PIN or password, an adversary might spy the movement, replay it, and get access to the phone and its data. Importantly, above methods have not been evaluated their scheme in real word scenarios while ours are verified among 200 distinct users. Touch based Authentication: These work [10], [19], [20] utilizes the unique interaction between user and the touch screen to identify the users. Sae-Bae et al. propose to use the timing of performing five-finger gestures on multi-touch capable of devices for authentication [10]. Luca et al. propose the timing of drawing the password on Antriod based touch 11 screen phones for authentication [20]. Shahzed et al. propose to utilize the correlations among predefined ‘gestures’ i.e. touch trajectories for authentication. Their work requires users to use fingers to perform the gestures with the following two major limitations compared to our work [19]. First, their methods require users to use more than two fingers of a hand to perform the predefined gestures, which is very inconvenient on small touch screens of smart phones. Second, most of smart phones employ capacitive touch screens that only recognize the human’s finger without gloves. It is a wore experience to take off the gloves for answering a phone outside in winter. Our method, shaking the smart phone, behaves much more user friendly Keystrokes based Authentication: These work proposes to identify users based on their typing behavior [12], [14], [21]. These methods mainly proposed for devices with physical keyboards and are inapplicable for smart phones. In addition, they have low accuracy because it is difficult to model typing behavior on touch screens because most people use the same finger for typing all keys on the keyboard displayed on the screen of smart phone. Gait based Authentication: There are several methods [15], [22], [23] proposed to utilize the accelerator in smart phones to authenticate users based upon their gaits. Their accuracies are vulnerable to the types of surfaces such as grass, road, snow, wet surface, and slippery surface. They are also inapplicable for unlocking smart phone, in that it is infeasible to let user walk first to figure out whether she/he is the correct user or not, in order to recognize the user from his/her walking pattern. 6 C ONCLUSION In this paper, we propose a novel behavioral biometric-based authentication approach called OpenSesame for smart phone. We design four waving functions to fetch the unique pattern of user’s handwaving actions. By applying the SVM classifier, the smart phone can accurately verify the authorized user with the pattern of handwaving action. Experiment results based on 200 distinct users’ handwaving actions show that the OpenSesame reaches high level of security and robustness, and achieves good user’s experience. ACKNOWLEDGEMENT This work is supported in part by the NSFC program under Grant No. 61190110 and No. 61125202. The research of Jinsong Han is supported from the NSFC program under Grant No.61373175, specialized Research Fund for the Doctoral Program of Higher Education under Grant No. 20130201120016, and the Fundamental Research Funds for the Central Universities of China under Project No. 2012jdgz02 (Xian Jiaotong University). R EFERENCES [1] [2] D. Florencio and C. Herley, “A large-scale study of web password habits,” in Proc. of ACM WWW, 2007. J. Bonneau, “The science of guessing: analyzing an anonymized corpus of 70 million passwords,” in Proc. of IEEE Security and Privacy (SP), 2012. JOURNAL OF LATEX CLASS FILES, VOL. 6, NO. 1, JULY 2014 [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [21] [22] [23] H.-A. Park, J. W. Hong, J. H. Park, J. Zhan, and D. H. Lee, “Combined authentication-based multilevel access control in mobile application for dailylifeservice,” IEEE Transactions on Mobile Computing, 2010. N. Ben-Asher, N. Kirschnick, H. Sieger, J. Meyer, A. Ben-Oved, and S. M¨oller, “On the need for different security methods on mobile phones,” in Proc. of ACM HCI, 2011. R. V. Yampolskiy and V. Govindaraju, “Behavioural biometrics: a survey and classification,” International Journal of Biometrics, 2008. A. H. Akkermans, T. A. Kevenaar, and D. W. Schobben, “Acoustic ear recognition for person identification,” in IEEE Workshop on Automatic Identification Advanced Technologies, 2005. A. Jain, L. Hong, and Y. Kulkarni, “A multimodal biometric system using fingerprint, face and speech,” in Proc. of Audio-and Video-based Biometric Person Authentication, 1999. P. J. Phillips, A. Martin, C. L. Wilson, and M. Przybocki, “An introduction evaluating biometric systems,” Computer, vol. 33, no. 2, pp. 56–63, 2000. R. LiKamWa, B. Priyantha, M. Philipose, L. Zhong, and P. Bahl, “Energy characterization and optimization of image sensing toward continuous mobile vision,” in Proc. of ACM MobiSys, 2013. N. Sae-Bae, K. Ahmed, K. Isbister, and N. Memon, “Biometric-rich gestures: a novel approach to authentication on multi-touch devices,” in Proc. of ACM CHI, 2012. M. Conti, I. Zachia-Zlatea, and B. Crispo, “Mind how you answer me!: transparently authenticating the user of a smartphone when answering or placing a call,” in Proc. of ACM ASIACCS, 2011. F. Monrose, M. K. Reiter, and S. Wetzel, “Password hardening based on keystroke dynamics,” International Journal of Information Security, 2002. N. Zheng, A. Paloski, and H. Wang, “An efficient user verification system via mouse movements,” in Proc. of ACM CCS, 2011. E. Miluzzo, A. Varshavsky, S. Balakrishnan, and R. R. Choudhury, “Tapprints: your finger taps have fingerprints,” in Proc. of ACM MobiSys, 2012. D. Gafurov, K. Helkala, and T. Søndrol, “Biometric gait authentication using accelerometer sensor,” Journal of computers, vol. 1, no. 7, pp. 51–59, 2006. C.-C. Chang and C.-J. Lin, “Libsvm: a library for support vector machines,” ACM Transactions on Intelligent Systems and Technology (TIST), vol. 2, no. 3, p. 27, 2011. J. Liu, L. Zhong, J. Wickramasuriya, and V. Vasudevan, “User evaluation of lightweight user authentication with a single tri-axis accelerometer,” in Proc. of ACM MobiHCI, 2009. F. Okumura, A. Kubota, Y. Hatori, K. Matsuo, M. Hashimoto, and A. Koike, “A study on biometric authentication based on arm sweep action with acceleration sensor,” in Proc. of IEEE ISPACS, 2006. M. Shahzad, A. X. Liu, and A. Samuel, “Secure unlocking of mobile touch screen devices by simple gestures: You can see it but you can not do it,” in Proc. of ACM MobiCom, 2013. A. De Luca, A. Hang, F. Brudy, C. Lindner, and H. Hussmann, “Touch me once and i know it’s you!: implicit authentication based on touch screen patterns,” in Proc. of ACM CHI, 2012. S. Zahid, M. Shahzad, S. A. Khayam, and M. Farooq, “Keystroke-based user identification on smart phones,” in Recent Advances in Intrusion Detection. Springer, 2009, pp. 224–243. J. R. Kwapisz, G. M. Weiss, and S. A. Moore, “Cell phone-based biometric identification,” in Proc. of IEEE BTAS. IEEE, 2010, pp. 1–7. J. Mantyjarvi, M. Lindholm, E. Vildjiounaite, S.-M. Makela, and H. Ailisto, “Identifying users of portable devices from gait pattern with accelerometers,” in Proc. of IEEE ICASSP, 2005. Lei Yang received the B.S. degree in the School of Software and Ph.D. degree in Department of Computer Science and Engineering from Xi’an Jiaotong, Shaanxi, China. He is currently a postdoc fellow in the School of Software at Tsinghua University, Beijing, China. His research interests include RFID, pervasive computing, network security, and smart home. He is a member of the IEEE Computer Society, and the ACM. 12 Yi Guo received his B.S. degree of Electrical and Computer Engineering from Shanghai Jiao Tong University, Shanghai, China, in 2011. He is currently a Ph.D. student in Department of Computer Science and Engineering, Hong Kong University of Science and Technology. His research interests include radio frequency identification (RFID) and pervasive computing. He is a student member of the IEEE and the ACM. Xuan Ding received his B.S. degree in the School of Software and Ph.D. degree in the Department of Computer Science and Technology from Tsinghua University, Beijing, China. He is currently a postdoc fellow in the School of Software at Tsinghua University. His research interests include RFID, Social Network, and Security & Privacy. He is a member of the IEEE and the ACM. Jinsong Han is currently an associate professor at Xi’an Jiaotong University. He received his Ph.D. degree from Hong Kong University of Science and Technology. He has published a number of research papers in highly recognized journals and conference, including IEEE TPDS, IEEE TKDE, IEEE INFOCOM, IEEE ICNP, etc. His research interests include pervasive computing, distributed system, and wireless network. He is a member of IEEE and ACM. Yunhao Liu received the B.S. degree in automation from Tsinghua University, Beijing, China, in 1995, and the M.S. and Ph.D. degrees in computer science and engineering from Michigan State University, in 2003 and 2004, respectively. Yunhao is now Changjiang Professor at School of Software and Tsinghua National Lab for Information Science and Technology, Tsinghua University, China. Cheng Wang received his Ph.D. degree in Department of Computer Science at Tongji University in 2011. Currently, he is a research professor of Computer Science at Tongji University. His research interests include wireless networking, mobile social networks, and cloud computing. Changwei Hu received his B.S. degree in the Department of Electronic Engineering from Xi’an University of Posts & Telecommunications, Shaanxi, China. He is currently an engineer in the Shaanxi Broadcast& TV Network Intermediary (Group) Co., LTD. His research interests include smart home and end-use products.
© Copyright 2024 ExpyDoc