160 likes | 357 Views
期末展示情境. 2013/10/07. 研究內容. 功能性需求與過去 大致 相同 (2010/8-2013/7) 使用者識別 / 服務管理 / 使用者 註冊 .. 主要 針對 非能性 加強 ( 為了提升 識別效果與應用情境 ) 1 st . 增加 一個 Sensor (Dynamics Approach ) 提升識別率 快速回應識別結果 (/flick) 2 nd . 研發 另一個 Approach (Histogram Approach ) 測試資料累積到一定量, 識別率會比 dynamics 高 (90%)
E N D
期末展示情境 2013/10/07
研究內容 • 功能性需求與過去大致相同(2010/8-2013/7) • 使用者識別/服務管理/使用者註冊.. • 主要針對非能性加強 (為了提升識別效果與應用情境) • 1st . 增加一個Sensor(DynamicsApproach) • 提升識別率 • 快速回應識別結果 (/flick) • 2nd . 研發另一個Approach (Histogram Approach) • 測試資料累積到一定量, 識別率會比dynamics高 (90%) • 3rd . 結合上述兩種Approaches • 取個別優點組合。
Intuition Although single modality (sensor)[5][7] could construct a feasible non-intrusive authentication model; however, • Based on recent studies [8][9][10], we think that an authentication model, which combines orientation sensor and touchscreen, may gain better performance than a single modality (either orientation sensor or touchscreen). • . Orientation Orientation + Touchscreen Touchscreen *One modality may ok, but two modalities may gain better performance. *Single modality is ok, but multi-modalities may gain better performance.
分鏡腳本(Storyboard) • 案例展示只有密碼是不夠的 • 使用同樣的密碼/操作行為 • Genuine Userand Imposters • 用Applied Features展示過去版本的概念 • 只有用Orientation Sensor • 用LifeCycle介紹Smartphones內建的Sensors • 預計保護的Applications有那些Sensors可使用? • Orientation Sensor & Touchscreen • Features of Orientation Sensor and Touchscreen • Using figures of applied features todemonstrate • …
案例展示只有密碼是不夠的 Password is not sufficient for smartphones. • Shoulder surfing • Password could be • written down on a paper. • recorded (text file) and stored in a smartphone. Password xxx xxx xxx Password xxx xxx xxx
用過去展示影片的片段 • 使用同樣的密碼/操作 • A Genuine Uservs. an Imposter • (小偷/手機主人) • *子計畫一 第三年DEMO影片1280x720-v4 (0:20 ~ 1:14) *強調只有使用密碼保護是不夠的!!!
展示過去版本的概念 -90<Y<30 • Orientation Sensor -60<Z <60 0<X<20
Life Cycle介紹Smartphones內建的Sensors Camera Microphone loop loop 1st Application Telecommunications: (Voice and Facial) State 1 Textual/Graphical Password, Biometrics (Fingerprint, Facial, etc.) State 0 Idle Turn On 2nd Applications GUI Interactions: Economic (Transaction, Payment) Browsing (sensitive information)…Sensorial Interactions: Games, etc. Top 10 Smartphone Activitiesa Accelerometer Orientation Touchscreen a. O2 News Centre, Making calls has become fifth most frequent use for a Smartphone for newly-networked generation of users, http://news.o2.co.uk/Press-Releases/Making-calls-has-become-fifth-most-frequent-use-for-a-Smartphone-for-newly-networked-generation-of-users-390.aspx (2012/6/29)
Behavioral biometricsof Touch Gesture based on a Touchscreen
Behavioral biometrics obtained from Orientation and Touchscreen of a smartphone. -90<Y<30 -60<Z <60 0<X<20
M組 工作內容 -90<Y<30 -60<Z <60 0<X<20 採雙感應器(Dual Sensors),建構使用者識別機制
各年度研發內容Orientation + Touchscreen • 第一年:Dynamics Approach(快) • 以每個Flick動作產生的行為特徵做為識別基礎。 • 持握角度、角度變化、速度、加速度、移動直線距離、移動路徑長度、曲率、觸控壓力、觸控面積…。 • 第二年:Histogram Approach(慢、但更準) • 累積一定數量的Flicks動作進行統計,以其量化後行為特徵分布做為識別基礎。 • 如: 統計30個flicks動作,軌跡碰觸的位置分布範圍以及比例。(或移動路徑長度) • 第三年:整合兩Approaches的優點 • 取各自的優點混合使用(前快、後準--每人基準不同)。
References [1] Gafurov, D. Helkala, K. and Søndrol, T. (2006). Biometric Gait Authentication Using Accelerometer Sensor. Journal of Computers, 1, 51-59. [2] Google. (2011b) Face Recognition on Android™ (4.0 Ice Cream Sandwich). available from: https://sites.google.com/site/androidfacerecognition/Home (2011/11/11). [3] Nakajima, T. Lin, G. and Rahul, P. (2009) Systems and methods for identifying unauthorized users of an electronic device. US Patent & Trademark Office, Serial No. 389106, 2009. available from: http://appft1.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PG01&p=1&u=%2Fnetahtml%2FPTO%2Fsrchnum.html&r=1&f=G&l=50&s1=%2220100207721%22.PGNR.&OS=DN/20100207721&RS=DN/20100207721 (2011/11/11). [4] M. Conti, I. Z. Zlatea, and B. Crispo, “Mind how you answer me!: transparently authenticating the user of a smartphone when answering or placing a call.” In Proceedings of the 6th ACM Symposium on Information, Computer, and Communications Security, (ASIACCS '11). ACM, New York, NY, USA. pp. 249-259, March 22–24, 2011. [5] W. Shi, J. Yang, Y. Jiang, F. Yang, and Y. Xiong , “SenGuard: Passive User Identification on Smartphones Using Multiple Sensors.” 2011 IEEE 7th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Shanghai, China. pp. 141-148, 2011. [6]C.-C. Lin, C.-C. Chang, Deron Liang, C.-H. Yang, “A Preliminary Study on Non-Intrusive User Authentication Method using Smartphone Sensors,” Applied Mechanics and Materials, vols. 284-287, pp. 3270-3274, 2013. [7] C.C. Lin, D. Liang, C.C. Chang, C.H. Yang: A New Non-Intrusive Authentication Method based on the Orientation Sensor for Smartphone Users, 2012 IEEE Sixth International Conference on Software Security and Reliability (SERE’2012). (2012) June 20-22; Washingtom, D.C., USA (p245) [8] D. Gafurov, K. Helkala and T. Søndrol: Journal of Computers. Vol. 1 (2006), p. 51 [9] O. Mazhelis, J. Markuula and J. Veijalainen: Info. Manage. & Comp. Secur. Vol. 13(5) (2005), p. 367 [10] Eric Hess, Facial Recognition: A Value Tool for Law Enforcement, Forensic Magazine October/November 2010,
Example: Histogram • The 240-bin histograms of the flick trajectories of two different users.
分鏡腳本(Storyboard) • 1. 使用同樣的密碼/操作行為 • Operations of a Genuine User • Operations of Imposters