Smart Signature. Gesture Based Authentication using a Smart Ring. Tatiana Bradley, Rakshith Hiresamudra Shivegowda, and Wai Man Chan



Similar documents
Biometric Authentication using Online Signature

Advance Human Computer Interaction Using Air Signature

Human Activities Recognition in Android Smartphone Using Support Vector Machine

Method of Combining the Degrees of Similarity in Handwritten Signature Authentication Using Neural Networks

Biometric Authentication using Online Signatures

Role of Multi-biometrics in Usable Multi- Factor Authentication

Efficient on-line Signature Verification System

Identity authentication using improved online signature verification method

Effects of Time Normalization on the Accuracy of Dynamic Time Warping

Effective Use of Android Sensors Based on Visualization of Sensor Information

Leica SmartWorx Viva Software Release Notes

An Evaluation Study of Driver Profiling Fuzzy Algorithms using Smartphones

Accelerometer Based Real-Time Gesture Recognition

Biometric Authentication Platform for a Safe, Secure, and Convenient Society

CONTROL, COMMUNICATION & SIGNAL PROCESSING (CCSP)

Keywords image processing, signature verification, false acceptance rate, false rejection rate, forgeries, feature vectors, support vector machines.

Tracking devices. Important features. 6 Degrees of freedom. Mechanical devices. Types. Virtual Reality Technology and Programming

A DECISION TREE BASED PEDOMETER AND ITS IMPLEMENTATION ON THE ANDROID PLATFORM

MAC Web Based VPN Connectivity Details and Instructions

BehavioSec participation in the DARPA AA Phase 2

How To Analyze The Security On An Ipa Wireless Sensor Network

Robot Perception Continued

Establishing the Uniqueness of the Human Voice for Security Applications

Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

Mouse Control using a Web Camera based on Colour Detection

Lecture Embedded System Security A. R. Darmstadt, Introduction Mobile Security

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt

GLOVE-BASED GESTURE RECOGNITION SYSTEM

CS 758: Cryptography / Network Security

ArcAid, Interactive Archery Assistant

SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE

NFC & Biometrics. Christophe Rosenberger

Adversary Modelling 1

Alternative Biometric as Method of Information Security of Healthcare Systems

Digital Signatures. Prof. Zeph Grunschlag

3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol

About Us. Technology Solutions & Services Company. Turn Innovative Ideas into Real Products & Software, Efficiently

A colour Code Algorithm for Signature Recognition

Can the smartphone sensors be used for wheelchair accessibility studies? Dr. Manik Gupta Dr. Behzad Heravi Dr. Catherine Holloway Prof.

Internet of Things: Kris Pister. Prof. EECS, UC Berkeley Founder, Dust Networks

Motion. Complete Table 1. Record all data to three decimal places (e.g., or or 0.000). Do not include units in your answer.

WHITE PAPER Professional Series Detectors Sensor Data Fusion February 2008

Interaction Design. Intro to Human-Computer. Scott Klemmer. stanford hci group / cs147

A wireless sensor network for traffic surveillance

Digital Signatures. What are Signature Schemes?

The Design and Development of a Web-Based Virtual Closet: The Smart Closet Project

A Model of Unforgeable Digital Certificate Document System

Smart Home Security System Based on Microcontroller Using Internet and Android Smartphone

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

Visual-based ID Verification by Signature Tracking

Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard

Importing and using your Personal Authentication Certificate with Djigzo for Android

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Opening the Airspace for UAS

Android Phone Controlled Robot Using Bluetooth

Project Development Plan

Windows Web Based VPN Connectivity Details & Instructions

Application-Specific Biometric Templates

Multimedia Document Authentication using On-line Signatures as Watermarks

International Journal of Advanced Information in Arts, Science & Management Vol.2, No.2, December 2014

Bode Collection Point Electronic DNA Sample Information Program Technical Specifications

Trend Micro Incorporated Research Paper Adding Android and Mac OS X Malware to the APT Toolbox

Des Moines Area Community College


Computer Enabled Biometric Devices: A Fingerprint Scanner Hardware Overview

CEH Version8 Course Outline

ENHANCED SECURITY IN SECURE SOCKET LAYER 3.0 SPECIFICATION

Secure software updates for ITS communications devices

Server based signature service. Overview

SIGNATURE VERIFICATION

Strategic White Paper

A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms

Using Voice Biometrics in the Call Center. Best Practices for Authentication and Anti-Fraud Technology Deployment

Progressive Authentication on Mobile Devices. They are typically restricted to a single security signal in the form of a PIN, password, or unlock

Hardware In The Loop Simulator in UAV Rapid Development Life Cycle

International Journal of Recent Trends in Electrical & Electronics Engg., Feb IJRTE ISSN:

ACCREDITATION COUNCIL FOR BUSINESS SCHOOLS AND PROGRAMS ACBSP ACCREDITATION FOR FACULTY OF ECONOMICS AND COMMERCE

Introduction. Digital Signature

Accelerometer and Gyroscope Design Guidelines

ibump: Smartphone Application to Detect Car Accidents

Announcement. Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed.

Securing Electronic Medical Records using Biometric Authentication

SPeach: Automatic Classroom Captioning System for Hearing Impaired

Linux Web Based VPN Connectivity Details and Instructions

This method looks at the patterns found on a fingertip. Patterns are made by the lines on the tip of the finger.

CS 51 Intro to CS. Art Lee. September 2, 2014

EMBEDDED MAJOR PROJECTS LIST

RESEARCH ON SPOKEN LANGUAGE PROCESSING Progress Report No. 29 (2008) Indiana University

Transcription:

SmartSignature Gesture Based Authentication using a Smart Ring Tatiana Bradley, Rakshith Hiresamudra Shivegowda, and Wai Man Chan CS 244, Fall 2015 Acknowledgement: Nod Labs, for providing smart ring.

The Problem Problem: Authenticate a user using only sensor data generated by gestures performed while wearing smart ring. Why? Replace (or augment) written signatures by giving immediate feedback on authenticity. Diagram of our Proof of Concept:

Goals Speed, to avoid user frustration. Security: signature data not leaked to third party. Correctness / Unforgeability: a real signer has a high probability of being allowed access, while an adversary has a low probability of gaining access. No gesture vocabulary": user can use any gesture as a signature, as long as they are able to reproduce it consistently. Plane independence: user can sign on any plane (i.e., a surface or the air), as long as they do multi-plane samples in the training phase.

Hardware/Software Decisions Smart ring: Nod ring from Nod Labs Client: Mac OS Application, adapted from Nod Labs OpenSpatial code Server: Laptop Communication: Bluetooth Low Energy (Ring Client App) HTTPS (Client App Server) Authentication algorithm: Dynamic Time Warping

Data Format We capture accelerometer and gyroscope data from the ring that looks like this: Accel. X Accel. Y Accel. Z Gyro. X Gyro Y Gyro Z 1-0.059082 0.231934-0.975586 0.073364-0.010254 0.303345 2-0.048340 0.257812-1.031738 0.053833-0.030273 0.282349 3-0.062012 0.265137-1.073242 0.043213-0.031738 0.273682 4-0.095215 0.263672-1.186035 0.046021-0.031372 0.286377.................. 137 0.502441-3.038086-0.579590-0.283325-0.188232 0.164673 Sampling rate: 100 samples / second Challenge: How to determine how similar one sample is to another?

Key Features of Dynamic Time Warping (DTW) DTW collapses two time series (of possibly different lengths) into a single distance value that represents the difference between the two time series. DTW is a dynamic programming algorithm that warps" two time series on different scales to be on the same scale, and measures the level of distortion required to complete this warping. It solves the problem that the same gesture could be performed at different speeds in a non-linear fashion.

Our implementation of DTW Language: C++ Measure of distance: The distance between vectors (x 1, x 2,..., x 6 ) and (y 1, y 2,..., y 6 ) is: d = 6 (x i y i ) 2. i=1 Normalization: Data is normalized to be between 0 and 1 to offset normal variations in size and position. Asymptotic Running Time: O(m 2 ) where m is the length of the longer sample.

How we are using DTW: Training Phase Client collects user ID and n samples of same motion from signer and sends to server. Server creates array D of pairwise DTW distances. Server calculates a threshold t = average(d) + τ standard_deviation(d), where τ is a constant tolerance value. Server associates the threshold t, and the n reference samples, with the given user ID. Running time is in O(m 2 n 2 ), where m is the maximum sample length, and n is the number of samples.

How we are using DTW: Authentication Phase Signer gives user ID and does a gesture while wearing ring. Client collects data and sends the the test sample to server. Server grabs threshold and reference samples for given user ID. Server runs DTW on the test sample against every reference sample, and finds the minimum distance d. If d t, server sends a success signal to the client. Otherwise, server sends a failure signal. Running time is in O(m 2 n), where m is the maximum sample length, and n is the number of reference samples.

Initial Results are Promising Gesture tested: Signer s Initials # of signers tested: 2 # reference samples per signer: 20 # of trials (correct) per signer: 10 # of trials (forgery) per signer*: 10 Tolerace formula**: avg(d) + 1.65 std_dev(d) Success rate (correct) : 18/20 = 90% False positive rate (forgery) : 1/20 = 5% Est. speed of training: Est. speed of authentication***: 135 ms 250 ms * Forgeries were performed with coaching by real signer. ** Corresponds to 95% confidence level. *** Includes communication time.

Extensions and Improvements Plane independence: We did some work to allow for user to sign on multiple planes, but this allowed a forger to authenticate on one occasion. Testing: We need to test the system with more users, including users who are not co-creators of the system. Security: We have transport layer security (HTTPS), but there is the possibility that an adversary could gain access to reference samples on the server and trick the system into authenticating. Other applications: The system could be modified to be a non-security-critical gesture recognizer, e.g., to allow a Nod ring user to create custom gestures to do certain tasks.

References Md Tanvir Islam Aumi and Sven Kratz. Airauth: Evaluating in-air hand gestures for authentication. In Proceedings of the 16th International Conference on Human-computer Interaction with Mobile Devices & Services, MobileHCI 14, pages 309 318, New York, NY, USA, 2014. ACM. Nguyen Ngoc Diep, Cuong Pham, and Tu Minh Phuong. Sigver3d: Accelerometer based verification of 3-d signatures on mobile devices. In Viet-Ha Nguyen, Anh-Cuong Le, and Van-Nam Huynh, editors, Knowledge and Systems Engineering, volume 326 of Advances in Intelligent Systems and Computing, pages 353 365. Springer International Publishing, 2015. Lawrence Rabiner and Biing-Hwang Juang. Fundamentals of Speech Recognition. Prentice Hall Signal Processing Series. Prentice Hall, Englewood Cliffs, New Jersey 07632, first edition, 1993. Software: Nod Labs OpenSpatial, DTW package in R.

Screenshot of App: Sucessful Authentication

Screenshot of App: Failed Authentication