Improving the Authentication with Built-in Camera Protocol Using Built-in Motion Sensors: A Deep Learning Solution

07/22/2021
by   Cezara Benegui, et al.
0

We propose an enhanced version of the Authentication with Built-in Camera (ABC) protocol by employing a deep learning solution based on built-in motion sensors. The standard ABC protocol identifies mobile devices based on the photo-response non-uniformity (PRNU) of the camera sensor, while also considering QR-code-based meta-information. During authentication, the user is required to take two photos that contain two QR codes presented on a screen. The presented QR code images also contain a unique probe signal, similar to a camera fingerprint, generated by the protocol. During verification, the server computes the fingerprint of the received photos and authenticates the user if (i) the probe signal is present, (ii) the metadata embedded in the QR codes is correct and (iii) the camera fingerprint is identified correctly. However, the protocol is vulnerable to forgery attacks when the attacker can compute the camera fingerprint from external photos, as shown in our preliminary work. In this context, we propose an enhancement for the ABC protocol based on motion sensor data, as an additional and passive authentication layer. Smartphones can be identified through their motion sensor data, which, unlike photos, is never posted by users on social media platforms, thus being more secure than using photographs alone. To this end, we transform motion signals into embedding vectors produced by deep neural networks, applying Support Vector Machines for the smartphone identification task. Our change to the ABC protocol results in a multi-modal protocol that lowers the false acceptance rate for the attack proposed in our previous work to a percentage as low as 0.07

READ FULL TEXT
research
02/18/2023

Web Photo Source Identification based on Neural Enhanced Camera Fingerprint

With the growing popularity of smartphone photography in recent years, w...
research
09/01/2020

To augment or not to augment? Data augmentation in user identification based on motion sensors

Nowadays, commonly-used authentication systems for mobile device users, ...
research
03/16/2015

Skilled Impostor Attacks Against Fingerprint Verification Systems And Its Remedy

Fingerprint verification systems are becoming ubiquitous in everyday lif...
research
09/02/2020

Adversarial Attacks on Deep Learning Systems for User Identification based on Motion Sensors

For the time being, mobile devices employ implicit authentication mechan...
research
10/25/2016

Active User Authentication for Smartphones: A Challenge Data Set and Benchmark Results

In this paper, automated user verification techniques for smartphones ar...
research
04/28/2020

A Photo-Based Mobile Crowdsourcing Frameworkfor Event Reporting

Mobile Crowdsourcing (MCS) photo-based is an arising field of interest a...
research
04/28/2020

A Photo-Based Mobile Crowdsourcing Framework for Event Reporting

Mobile Crowdsourcing (MCS) photo-based is an arising field of interest a...

Please sign up or login with your details

Forgot password? Click here to reset