WristAuthen: A Dynamic Time Wrapping Approach for User Authentication by Hand-Interaction through Wrist-Worn Devices

by   Qi Lyu, et al.

The growing trend of using wearable devices for context-aware computing and pervasive sensing systems has raised its potentials for quick and reliable authentication techniques. Since personal writing habitats differ from each other, it is possible to realize user authentication through writing. This is of great significance as sensible information is easily collected by these devices. This paper presents a novel user authentication system through wrist-worn devices by analyzing the interaction behavior with users, which is both accurate and efficient for future usage. The key feature of our approach lies in using much more effective Savitzky-Golay filter and Dynamic Time Wrapping method to obtain fine-grained writing metrics for user authentication. These new metrics are relatively unique from person to person and independent of the computing platform. Analyses are conducted on the wristband-interaction data collected from 50 users with diversity in gender, age, and height. Extensive experimental results show that the proposed approach can identify users in a timely and accurate manner, with a false-negative rate of 1.78%, false-positive rate of 6.7%, and Area Under ROC Curve of 0.983 . Additional examination on robustness to various mimic attacks, tolerance to training data, and comparisons to further analyze the applicability.


page 3

page 7

page 9


An Ear Canal Deformation Based User Authentication Using Ear Wearable Devices

Biometric-based authentication is gaining increasing attention for weara...

Enhancing the Privacy and Computability of Location-Sensitive Data for Context Authentication

This paper proposes a new privacy-enhancing, context-aware user authenti...

Zero-Effort Two-Factor Authentication Using Wi-Fi Radio Wave Transmission and Machine Learning

The proliferation of sensitive information being stored online highlight...

Continuous Authentication of Wearable Device Users from Heart Rate, Gait, and Breathing Data

The security of private information is becoming the bedrock of an increa...

Ear Wearable (Earable) User Authentication via Acoustic Toothprint

Earables (ear wearables) is rapidly emerging as a new platform encompass...

Smarter Password Guessing Techniques Leveraging Contextual Information and OSINT

In recent decades, criminals have increasingly used the web to research,...

Please sign up or login with your details

Forgot password? Click here to reset