<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Enhancing Smartphone Security through Behavioral Biometrics-based Gestures</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Daniela Chudá</string-name>
          <email>daniela.chuda@stuba.sk</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Lukáš Janík</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Faculty of Electrical Engineering and Information Technology, Slovak University of Technology</institution>
          ,
          <country country="SK">Slovakia</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>ITAT'24: Information Technologies - Applications and Theory</institution>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>UXtweak</institution>
          ,
          <addr-line>Bratislava</addr-line>
          ,
          <country country="SK">Slovakia</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Smartphones have become a personal device allowing access to various services with the need for additional protection against theft or leakage of personal data. One possibility is an alternative method of user recognition on the Android platform based on behavioral biometrics. We suggest using simple movement gestures performed by the user while holding the smartphone in their hand as an additional form of recognition of the authorized user. We experimentally verify the usability of individual gestures, and the security achieved in terms of the ability to distinguish the authorized user.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;behavioral biometrics</kwd>
        <kwd>user identification</kwd>
        <kwd>gestures</kwd>
        <kwd>biometric features 1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>With the advancement of technology, smartphones
are becoming a means of enabling access to various
services, increasing the importance of securing the
device and accessing its data. Achieving a sufficient
level of security is more complicated in smartphones,
as the average time of interaction with the device is
much shorter than in the case of a laptop computer,
and asking the user to authenticate again can have a
disruptive effect. A promising approach is behavioral
biometrics, which deals with monitoring the user's
behavior concerning selected activities. We can
monitor the way the user touches the display, or the
user performs the gesture with the device. Based on
such biometric (behavioral) data, it is subsequently
possible to create a unique biometric signature of the
user for identification or authentication.</p>
      <p>In this work, we propose an alternative user
recognition method on the Android platform based on
behavioral biometrics. Simple movement gestures
when the user holds the smartphone in hand serve to
model the user behavior. This approach has the
premise of easily becoming part of the user's normal
interaction with the device, without the need for the
user to think about the gesture being performed.</p>
      <p>
        The biometric characteristics should be
sufficiently invariant with respect to time with no
significant changes [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. Otherwise, the system
working with biometrics might not work properly.
The user would need to frequently repeat the
registration phase given the significant changes in the
monitored biometric characteristics.
      </p>
      <p>
        For biometric systems, there are three basic
metrics, or criteria based on which we can evaluate its
performance (correctness): the probability of false
acceptance of the user (False Acceptance Rate - FAR),
the probability of false rejection of the user (False
Rejection Rate - FRR) and the equal error rate (Equal
Error Rate - ERR) [
        <xref ref-type="bibr" rid="ref3 ref6">3, 6</xref>
        ].
      </p>
      <p>
        The most frequently used and commonly found
sensors in smartphones include the accelerometer
[
        <xref ref-type="bibr" rid="ref1 ref2 ref7 ref8">1,2,7,8</xref>
        ], gyroscope [
        <xref ref-type="bibr" rid="ref1 ref2 ref5 ref8">1,2,5,8</xref>
        ], and magnetometer [
        <xref ref-type="bibr" rid="ref1 ref2">1,2</xref>
        ].
      </p>
      <p>
        S. Lee and the collective [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] in their work dealt
with the use of gestures performed with a smartphone
held in the hand for authentication. They were based
on the idea that users can generate a password in the
form of gestures instead of a traditional numeric
password.
      </p>
      <p>
        In their work, L. Yang and colleagues [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] dealt with
the use of shaking and waving with a smartphone
(handwaving) for authentication.
      </p>
      <p>
        Z. Sun and his team [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] dealt with the
authentication system in their work using gestures
and created an application for obtaining data about
gestures and their subsequent evaluation to
distinguish the authorized user. They also tested their
solution using different devices. They attribute the
different results they achieved to differences in the
devices' sensors.
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Use of gestures based on behavioral biometrics</title>
      <p>In this work, we investigated the use of behavioral
biometrics in context of smartphones with a focus on
© 2024 Copyright for this paper by its authors. Use permitted under
Creative Commons License Attribution 4.0 International (CC BY 4.0).
using data from the device's sensors for behavior
modeling of the user, which can take various forms
touch, writing, or movement with the device
perceived as simple gestures. We focused on these
simple gestures in this work.</p>
      <p>We created a set of 5 gestures:
1. device shaking,
2. holding the device to the ear,
3. turning left and right,
4. movement of the device within one axis,
5. movement in a circle.</p>
      <p>We designed, implemented, and verified a
prototype mechanism using gestures to recognize a
targeted user.</p>
      <p>We devoted ourselves to researching the usability
of simple gestures from a defined set performed with
a smartphone held in the hand, as well as different
approaches in data processing for user recognition.
We can consider the most common use of gestures to
invoke some activity. However, considering the
results achieved, we can consider individual gestures
to be equivalent and usable for user recognition. We
can also consider it interesting to enrich the execution
of the gesture with the element of touch. The
proposed solution assumes a mechanism for
recognizing the targeted user based on the behavior
when performing the mentioned gestures from the
selected set. When experimenting, we use two
modules: the module that collects and logs the data of
individual gestures and the data evaluation module.
The data evaluation module implements the entire
process from processing the collected data to model
training and subsequent data evaluation. The generic
approach is an approach applicable primarily in the
case of a binary classification model, in which data
from other users is also made available during
training. In this case, we can consider creating a
generic model setting, or models, since we are
considering having a separate model on the one hand
for each gesture, but also for each sensor. For the
model created in this way, we assume that it will
generally perform well and be applicable. An
important part of the model is the very features with
which the model works. In this direction, we are also
considering the creation of a general set of features,
based on which the model will be able to sufficiently
distinguish individual users. It is important to note,
however, that under a generic model, we do not
imagine the creation of a model that will be trained
once and then be generally applicable to any user.
Model training will be performed for each user
separately, but we will have the settings and features
selected in advance.</p>
      <p>We conducted experiments with 30 participants.
Due to the sensors used, we use and log data - data in
two-dimensional space (touch data from the touch
screen of the device) and in three-dimensional space
(accelerometer, gyroscope, linear acceleration,
rotation vector). The calculated characteristics can be
divided into two basic groups - characteristics from
the time domain and the frequency domain. The
collected, logged data from participants must be
preprocessed. We used filtering, segmentation,
calculation of characteristics, and then division into
three data sets - training, validation, and testing. We
decided to experiment with models for binary
classification: k-nearest neighbors (kNN), support
vector machine (SVM), and random forest (RF). We
also decided to experiment with the size of the time
window for gesture segmentation (0.25s and 0.50s
interval) with 50% overlap. Since we collected data
from several sensors during logging, we needed to
create a separate model for each sensor and then
aggregate partial predictions into one final prediction.
For this purpose, we created a mechanism that adds
up either the percentage certainty of the prediction
belonging to the class or binary values and determines
the final prediction by comparing the resulting values.
We selected three models that achieved promising
results. The performance of individual models for
binary classification, generic model, interval 0.25s,
without touch and with touch can be seen in Figures 1
and 2.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Conclusion</title>
      <p>For a user recognition system, it is very important to
have a low FAR value, since wrong identification as an
expected user can cause considerable damage,
especially if the recognition mechanism is used for
authentication purposes. However, it is also
important to achieve low FRR, as this can also
significantly reduce the usability of the system in the
case of the expected user being too often marked as
some other user. Therefore, we consider it important
to achieve a balance between both values, which are
expressed by the EER metric and which we used in the
optimization of the models.</p>
      <p>From the point of view of the chosen size of the
time window, binary classification models generally
performed better on a shorter time window (interval
0.25s). Taking all results into account, on average the
models achieve an EER of ~0.028 at this interval
compared to ~0.030 for the longer time window
(0.50s interval). The reason for the greater success of
a shorter window can be attributed to a larger number
of samples and thus a slightly more accurate
representation of the execution of the gesture, which
also means more information for the model. To
evaluate overall success, we work with average values
that are calculated from all gestures and all
considered models. From the results achieved on the
test and validation data, as well as in comparison with
other works, we can conclude that such a user
recognition mechanism can recognize the targeted
user with sufficient accuracy. We also note that this is
a usable set of gestures for user recognition.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Noureldin</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yanyan</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          (
          <year>2017</year>
          ).
          <article-title>Game Authentication Based on Behavior Pattern</article-title>
          .
          <source>In Proceedings of the 15th International Conference on Advances in Mobile Computing &amp; Multimedia (MoMM2017)</source>
          .
          <article-title>Association for Computing Machinery</article-title>
          , New York, NY, USA,
          <fpage>151</fpage>
          -
          <lpage>156</lpage>
          . https://doi.org/10.1145/3151848.3151878
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <article-title>[2] Ehatisham-ul-</article-title>
          <string-name>
            <surname>Haq</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          , et all (
          <year>2017</year>
          ).
          <article-title>Identifying Smartphone Users based on their Activity Patterns via Mobile Sensing</article-title>
          , In Procedia Computer Science, Volume
          <volume>113</volume>
          ,
          <year>2017</year>
          , Pages
          <fpage>202</fpage>
          -
          <lpage>209</lpage>
          , ISSN 1877-
          <volume>0509</volume>
          , https://doi.org/10.1016/j.procs.
          <year>2017</year>
          .
          <volume>08</volume>
          .349.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Guse</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Müller</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          (
          <year>2012</year>
          ).
          <article-title>Gesture-based User Authentication for Mobile Devices using Accelerometer and Gyroscope</article-title>
          . Informatiktage.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Lee</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          et al. (
          <year>2012</year>
          ).
          <article-title>Access to an automated security system using gesture-based passwords</article-title>
          .
          <source>In Proceedings of the 2012 15th International Conference on Network-Based Information Systems</source>
          ,
          <string-name>
            <surname>NBIS</surname>
          </string-name>
          <year>2012</year>
          .
          <year>2012</year>
          . s.
          <volume>760</volume>
          -
          <fpage>765</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Lee</surname>
            ,
            <given-names>W.H. - LEE</given-names>
          </string-name>
          ,
          <string-name>
            <surname>R.B.</surname>
          </string-name>
          (
          <year>2017</year>
          ).
          <article-title>Sensor-Based Implicit Authentication of Smartphone Users</article-title>
          .
          <source>In Proceedings - 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks</source>
          ,
          <string-name>
            <surname>DSN</surname>
          </string-name>
          <year>2017</year>
          .
          <article-title>Institute of Electrical and Electronics Engineers Inc</article-title>
          .,
          <year>2017</year>
          . s.
          <volume>309</volume>
          -
          <fpage>320</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Sun</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          et al. (
          <year>2016</year>
          ).
          <article-title>A 3-D hand gesture signature based biometric authentication system for smartphones</article-title>
          .
          <source>In Security and Communication Networks</source>
          .
          <year>2016</year>
          . Vol.
          <volume>9</volume>
          , no.
          <issue>11</issue>
          , s.
          <fpage>1359</fpage>
          -
          <lpage>1373</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Varga</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          et al. (
          <year>2017</year>
          ).
          <article-title>Authentication based on gestures with smartphone in hand</article-title>
          .
          <source>In Journal of Electrical Engineering</source>
          .
          <year>2017</year>
          . Vol.
          <volume>68</volume>
          , s.
          <fpage>256</fpage>
          -
          <lpage>266</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Yang</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          et al. (
          <year>2015</year>
          ).
          <article-title>Unlocking Smart Phone through Handwaving Biometrics</article-title>
          .
          <source>In IEEE Transactions on Mobile Computing</source>
          .
          <year>2015</year>
          . Vol.
          <volume>14</volume>
          , no.
          <issue>5</issue>
          , s.
          <fpage>1044</fpage>
          -
          <lpage>1055</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>