Signal Processing - July 2016 - 58

Table 5. Key multimodal fusion-based continuous authentication methods for mobile devices.
Study
Zhang et al. [61]
Fridman et al. [62]
Shi et al. [63]
McCool et al. [65]
Sitova et al. [66]
Saevanee et al. [67]

Modalities
Face, touch gestures
Stylometry, application usage, web
browsing, GPS location
Accelerometer, touch screen, microphone, location history
Face, voice
HMOG, tap, keystroke

Number of Users
50
200

Fusion Method
Feature level
Decision level

Performance (%)
RR: 83.75
EER: 5 (One minute), 1 (30 minute)

Seven

Decision level

EER: -

152
100

Score level
Score level

HTER: 11.9 (male), 13.3 (female)
EER: 7.16 (walking), 10.05 (sitting)

Linguistic profiling, behavioral profiling,
keystroke dynamics

30

Score level

EER: 3.3 (weighting) - 4.4 (sum)

the security level of the continuous authentication system,
within a continuous authentication framework. Several
while a higher false rejection rate will frustrate a legitimate
research studies have specifically focused on the applicabiluser, which is less dangerous than a lower security level. It
ity of these biometrics modalities for nonintrusive authenwas argued in [70] that to be able to build reliable, effectication. It is seen that physiological biometrics such as the
tive, and usable systems, one needs specific guidelines that
face can provide higher authentication accuracy than behavtake into account the specific constraints of security mechaioral biometrics such as gait or touch gestures. Further, as
nisms. Furthermore, security systems should be built so
behavioral biometric characteristics tend to change over
as to be easy to learn and use by users with different backtime and under various environmental conditions, one has to
grounds and skills. It was also argued that human factors
constantly update the templates to maintain the performance
should be incorporated into the design of
of these techniques. The tradeoff among
continuous authentication systems, where
computation, processing speed, and accuusability is central during the whole develracy has to be considered when using
Physiological biometrics
opment process.
these modalities for transparent authentisuch as the face
Several works have discussed the issue
cation. For example, the face-based concan provide higher
of usability of continuous authenticatinuous authentication system requires
tion systems. For instance, in [68] a proone to detect, align, and recognize faces
authentication accuracy
totype was developed using keystroke,
from the images or videos collected from
than behavioral
voice, and face biometrics for continuous
the front-facing camera. Each of these
biometrics such as
authentication. The prototype was evalusubalgorithms can be very time consumgait or touch gestures.
ated using 27 participants, and the study
ing, making the overall matching algoreported that 92% of the participants
rithm computationally demanding and not
considered it more secure in comparison
real time. In contrast, touch gesture-based
to the traditional methods of authentication. Similarly, [69]
methods often do not require detection or segmentation of
conducted an in-lab study of security perception of implicit
data. Hence, they could be more efficient in terms of proauthentication with 30 users based on behavioral biometcessing speed. It can be concluded that there is not a single
rics. In their study, the researchers asked users to complete a
biometric modality that is ideally suited for all scenarios.
series of tasks on a smartphone that was ostensibly protected
However, a significant amount of prior research has shown
with varying degrees of transparent authentication. They
that continuous authentication methods based on multiple
then surveyed the participants regarding their opinion about
biometric traits are often superior to unimodal continuous
transparent authentication. They found that 73% of particiauthentication systems.
pants felt that implicit authentication based on behavioral
biometrics was more secure than traditional methods such
Usability and security issues
as PINs and passwords and 90% indicated that they would
The usability of transparent continuous authentication sysconsider using a transparent authentication method on their
tems on mobile devices has become a major issue in research
own mobile device.
[5], [68], [69]. A balance needs to be struck between security
More recently, a two-part study consisting of a controlled
and usability of a biometrics-based continuous authenticalab experiment and a field study was conducted in [5] on
tion system. The design of usable yet secure continuous user
implicit authentication usability and security perceptions with
authentication systems raises crucial questions concerning
37 participants. The study indicated that 91% of participants
how to solve conflicts between mobile security and usabilfound implicit authentication to be convenient and 81% perity. For instance, in the continuous authentication context, a
ceived the provided level of protection to be satisfactory. Furfalse rejection is less costly than a false acceptance. This is
thermore, the authors found that false accepts and detection
due to the fact that higher false acceptance rates will lower
58

IEEE Signal Processing Magazine

|

July 2016

|



Table of Contents for the Digital Edition of Signal Processing - July 2016

Signal Processing - July 2016 - Cover1
Signal Processing - July 2016 - Cover2
Signal Processing - July 2016 - 1
Signal Processing - July 2016 - 2
Signal Processing - July 2016 - 3
Signal Processing - July 2016 - 4
Signal Processing - July 2016 - 5
Signal Processing - July 2016 - 6
Signal Processing - July 2016 - 7
Signal Processing - July 2016 - 8
Signal Processing - July 2016 - 9
Signal Processing - July 2016 - 10
Signal Processing - July 2016 - 11
Signal Processing - July 2016 - 12
Signal Processing - July 2016 - 13
Signal Processing - July 2016 - 14
Signal Processing - July 2016 - 15
Signal Processing - July 2016 - 16
Signal Processing - July 2016 - 17
Signal Processing - July 2016 - 18
Signal Processing - July 2016 - 19
Signal Processing - July 2016 - 20
Signal Processing - July 2016 - 21
Signal Processing - July 2016 - 22
Signal Processing - July 2016 - 23
Signal Processing - July 2016 - 24
Signal Processing - July 2016 - 25
Signal Processing - July 2016 - 26
Signal Processing - July 2016 - 27
Signal Processing - July 2016 - 28
Signal Processing - July 2016 - 29
Signal Processing - July 2016 - 30
Signal Processing - July 2016 - 31
Signal Processing - July 2016 - 32
Signal Processing - July 2016 - 33
Signal Processing - July 2016 - 34
Signal Processing - July 2016 - 35
Signal Processing - July 2016 - 36
Signal Processing - July 2016 - 37
Signal Processing - July 2016 - 38
Signal Processing - July 2016 - 39
Signal Processing - July 2016 - 40
Signal Processing - July 2016 - 41
Signal Processing - July 2016 - 42
Signal Processing - July 2016 - 43
Signal Processing - July 2016 - 44
Signal Processing - July 2016 - 45
Signal Processing - July 2016 - 46
Signal Processing - July 2016 - 47
Signal Processing - July 2016 - 48
Signal Processing - July 2016 - 49
Signal Processing - July 2016 - 50
Signal Processing - July 2016 - 51
Signal Processing - July 2016 - 52
Signal Processing - July 2016 - 53
Signal Processing - July 2016 - 54
Signal Processing - July 2016 - 55
Signal Processing - July 2016 - 56
Signal Processing - July 2016 - 57
Signal Processing - July 2016 - 58
Signal Processing - July 2016 - 59
Signal Processing - July 2016 - 60
Signal Processing - July 2016 - 61
Signal Processing - July 2016 - 62
Signal Processing - July 2016 - 63
Signal Processing - July 2016 - 64
Signal Processing - July 2016 - 65
Signal Processing - July 2016 - 66
Signal Processing - July 2016 - 67
Signal Processing - July 2016 - 68
Signal Processing - July 2016 - 69
Signal Processing - July 2016 - 70
Signal Processing - July 2016 - 71
Signal Processing - July 2016 - 72
Signal Processing - July 2016 - 73
Signal Processing - July 2016 - 74
Signal Processing - July 2016 - 75
Signal Processing - July 2016 - 76
Signal Processing - July 2016 - 77
Signal Processing - July 2016 - 78
Signal Processing - July 2016 - 79
Signal Processing - July 2016 - 80
Signal Processing - July 2016 - 81
Signal Processing - July 2016 - 82
Signal Processing - July 2016 - 83
Signal Processing - July 2016 - 84
Signal Processing - July 2016 - 85
Signal Processing - July 2016 - 86
Signal Processing - July 2016 - 87
Signal Processing - July 2016 - 88
Signal Processing - July 2016 - 89
Signal Processing - July 2016 - 90
Signal Processing - July 2016 - 91
Signal Processing - July 2016 - 92
Signal Processing - July 2016 - 93
Signal Processing - July 2016 - 94
Signal Processing - July 2016 - 95
Signal Processing - July 2016 - 96
Signal Processing - July 2016 - 97
Signal Processing - July 2016 - 98
Signal Processing - July 2016 - 99
Signal Processing - July 2016 - 100
Signal Processing - July 2016 - 101
Signal Processing - July 2016 - 102
Signal Processing - July 2016 - 103
Signal Processing - July 2016 - 104
Signal Processing - July 2016 - Cover3
Signal Processing - July 2016 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_201809
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_201807
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_201805
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_201803
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_201801
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_1117
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0917
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0717
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0517
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0317
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0117
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_1116
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0916
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0716
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0516
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0316
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0116
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_1115
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0915
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0715
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0515
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0315
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0115
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_1114
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0914
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0714
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0514
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0314
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0114
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_1113
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0913
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0713
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0513
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0313
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0113
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_1112
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0912
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0712
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0512
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0312
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0112
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_1111
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0911
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0711
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0511
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0311
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0111
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_1110
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0910
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0710
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0510
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0310
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0110
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_1109
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0909
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0709
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0509
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0309
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0109
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_1108
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0908
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0708
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0508
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0308
https://www.nxtbook.com/nxtbooks/ieee/signalprocessing_0108
https://www.nxtbookmedia.com